The patch titled honour MNT_NOEXEC for access() has been removed from the -mm tree. Its filename was honour-mnt_noexec-for-access.patch This patch was dropped because it was merged into mainline or a subsystem tree ------------------------------------------------------ Subject: honour MNT_NOEXEC for access() From: Stas Sergeev <stsp@xxxxxxxx> Make access(X_OK) take the "noexec" mount option into account. Signed-off-by: Stas Sergeev <stsp@xxxxxxxx> Cc: Jakub Jelinek <jakub@xxxxxxxxxx> Cc: Arjan van de Ven <arjan@xxxxxxxxxxxxx> Cc: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx> Cc: Hugh Dickins <hugh@xxxxxxxxxxx> Cc: Ulrich Drepper <drepper@xxxxxxxxxx> Cc: Al Viro <viro@xxxxxxxxxxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxx> --- fs/namei.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff -puN fs/namei.c~honour-mnt_noexec-for-access fs/namei.c --- a/fs/namei.c~honour-mnt_noexec-for-access +++ a/fs/namei.c @@ -249,9 +249,11 @@ int permission(struct inode *inode, int /* * MAY_EXEC on regular files requires special handling: We override - * filesystem execute permissions if the mode bits aren't set. + * filesystem execute permissions if the mode bits aren't set or + * the fs is mounted with the "noexec" flag. */ - if ((mask & MAY_EXEC) && S_ISREG(mode) && !(mode & S_IXUGO)) + if ((mask & MAY_EXEC) && S_ISREG(mode) && (!(mode & S_IXUGO) || + (nd && nd->mnt && (nd->mnt->mnt_flags & MNT_NOEXEC)))) return -EACCES; /* Ordinary permission routines do not understand MAY_APPEND. */ _ Patches currently in -mm which might be from stsp@xxxxxxxx are origin.patch - To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html