On Sun, May 12, 2002 at 07:40:05PM -0400, Roland McGrath wrote: > There are a few different ways to attack this: > > 1. Override netfs_S_file_exec to just pass it through. Then a setuid exec > will be a real setuid exec and will escape from the fakeroot and > fakeauth universes entirely. This is the behavior of Linux fakeroot, > since it does nothing special for exec and LD_PRELOAD is ignored by > setuid executables.
I put it in. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org [EMAIL PROTECTED] Marcus Brinkmann GNU http://www.gnu.org [EMAIL PROTECTED] [EMAIL PROTECTED] http://www.marcus-brinkmann.de _______________________________________________ Bug-hurd mailing list [EMAIL PROTECTED] http://mail.gnu.org/mailman/listinfo/bug-hurd