On Sun, May 12, 2002 at 07:40:05PM -0400, Roland McGrath wrote:
> There are a few different ways to attack this:
> 
> 1. Override netfs_S_file_exec to just pass it through.  Then a setuid exec
>    will be a real setuid exec and will escape from the fakeroot and
>    fakeauth universes entirely.  This is the behavior of Linux fakeroot,
>    since it does nothing special for exec and LD_PRELOAD is ignored by
>    setuid executables.

I put it in.

Thanks,
Marcus

-- 
`Rhubarb is no Egyptian god.' Debian http://www.debian.org [EMAIL PROTECTED]
Marcus Brinkmann              GNU    http://www.gnu.org    [EMAIL PROTECTED]
[EMAIL PROTECTED]
http://www.marcus-brinkmann.de

_______________________________________________
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd

Reply via email to