From beba34dc223aa0dcf3e5f696966c5e8408b022c3 Mon Sep 17 00:00:00 2001 From: Robert de Bath Date: Sat, 24 Jan 2004 16:27:32 +0100 Subject: Import Dev86src-0.16.15.tar.gz --- man/as86.1 | 2 +- man/elksemu.1 | 21 ++++++++++++--------- 2 files changed, 13 insertions(+), 10 deletions(-) (limited to 'man') diff --git a/man/as86.1 b/man/as86.1 index 619d604..060984d 100644 --- a/man/as86.1 +++ b/man/as86.1 @@ -16,7 +16,7 @@ as86 \- Assembler for 8086..80386 processors .B as86_encap\ prog.s\ prog.v .RB [ prefix_ ] -.RB [ as86\ options ] +.RB [ as86_options ] .SH DESCRIPTION .B as86 diff --git a/man/elksemu.1 b/man/elksemu.1 index 6686040..5df195f 100644 --- a/man/elksemu.1 +++ b/man/elksemu.1 @@ -16,11 +16,11 @@ the .B bcc(1) C compiler. -It is not usual to invoke -.I /lib/elksemu -directly, either the simple patch or kernel module distributed with it -will cause the kernel to run -.I /lib/elksemu +Yom may use the +.I binfmt-misc +module under Linux 2.1.43 or greater as described in the elksemu README +which will cause the kernel to run +.I elksemu with the correct arguments whenever the user tries to execute an ELKS executable directly. @@ -28,14 +28,17 @@ executable directly. There are no flag options to elksemu, the first argument is the name of the program to run the rest are arguments that are passed to the Elks program. +.SH SECURITY The .B elksemu -program is normally installed suid-root and in this event it is able to +program may be installed suid-root and in this event it is able to run execute only (chmod 111) elks executables and act correctly on the -suid permission bits on those executable. This may be considered a -security hazard so elksemu does +suid permission bits on any executable. +This should be considered a security hazard so elksemu does .I not -have to be installed suid-root. +have to be installed suid-root. +If you consider using this facility you should also be aware that it will +override the 'nosuid' mount(8) option. .SH SEE ALSO bcc(1), as86(1), ld86(1) -- cgit v1.2.1