aboutsummaryrefslogtreecommitdiff
path: root/NOFORK_NOEXEC.lst
diff options
context:
space:
mode:
authorDenys Vlasenko <vda.linux@googlemail.com>2017-08-07 16:00:25 +0200
committerDenys Vlasenko <vda.linux@googlemail.com>2017-08-07 16:00:25 +0200
commit798b94518e61ced3f7be7766727705df4859878c (patch)
treeaf26ec7b4cb178933e6a76decb9561739933288d /NOFORK_NOEXEC.lst
parentb34eb4a591fa4dbbc091524a1c1159e2743134c8 (diff)
downloadbusybox-w32-798b94518e61ced3f7be7766727705df4859878c.tar.gz
busybox-w32-798b94518e61ced3f7be7766727705df4859878c.tar.bz2
busybox-w32-798b94518e61ced3f7be7766727705df4859878c.zip
ubi tools: ubiupdatevol supports "-" input and actually respects -s SIZE
Decided to not make any flash applets NOEXEC. Minor robustifications here and there. Better error messages. Save on strings: function old new delta ubi_tools_main 1235 1288 +53 ubi_get_volid_by_name 125 133 +8 ubirename_main 198 204 +6 get_num_from_file 90 94 +4 ------------------------------------------------------------------------------ (add/remove: 0/0 grow/shrink: 4/0 up/down: 71/0) Total: 71 bytes text data bss dec hex filename 915696 485 6880 923061 e15b5 busybox_old 915670 485 6880 923035 e159b busybox_unstripped Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
Diffstat (limited to 'NOFORK_NOEXEC.lst')
-rw-r--r--NOFORK_NOEXEC.lst22
1 files changed, 11 insertions, 11 deletions
diff --git a/NOFORK_NOEXEC.lst b/NOFORK_NOEXEC.lst
index d54c206fe..981a10192 100644
--- a/NOFORK_NOEXEC.lst
+++ b/NOFORK_NOEXEC.lst
@@ -123,10 +123,10 @@ fgconsole - noexec. leaks: get_console_fd_or_die() may open a new fd, or return
123fgrep - longterm runner ("CMD | fgrep ..." may run indefinitely, better to exec to conserve memory) 123fgrep - longterm runner ("CMD | fgrep ..." may run indefinitely, better to exec to conserve memory)
124find - noexec. runner 124find - noexec. runner
125findfs - suid 125findfs - suid
126flash_eraseall 126flash_eraseall - could be noexec, but I feel flash ops are risky (prone to hw/fw/sw bugs)
127flash_lock 127flash_lock - could be noexec, but I feel flash ops are risky (prone to hw/fw/sw bugs)
128flash_unlock 128flash_unlock - could be noexec, but I feel flash ops are risky (prone to hw/fw/sw bugs)
129flashcp - needs ^C. flash writing may be slow, better to free memory by execing 129flashcp - needs ^C. could be noexec, but I feel flash ops are risky (prone to hw/fw/sw bugs)
130flock - spawner, changes state (file locks), let's play safe and not be noexec 130flock - spawner, changes state (file locks), let's play safe and not be noexec
131fold - noexec. runner 131fold - noexec. runner
132free - nofork candidate(struct globals, needs to close /proc/meminfo fd) 132free - nofork candidate(struct globals, needs to close /proc/meminfo fd)
@@ -366,13 +366,13 @@ tty - NOFORK
366ttysize - NOFORK 366ttysize - NOFORK
367tunctl - noexec 367tunctl - noexec
368tune2fs - noexec. leaks: open+xfunc 368tune2fs - noexec. leaks: open+xfunc
369ubiattach 369ubiattach - could be noexec, but I feel flash ops are risky (prone to hw/fw/sw bugs)
370ubidetach 370ubidetach - could be noexec, but I feel flash ops are risky (prone to hw/fw/sw bugs)
371ubimkvol 371ubimkvol - could be noexec, but I feel flash ops are risky (prone to hw/fw/sw bugs)
372ubirename 372ubirename - could be noexec, but I feel flash ops are risky (prone to hw/fw/sw bugs)
373ubirmvol 373ubirmvol - could be noexec, but I feel flash ops are risky (prone to hw/fw/sw bugs)
374ubirsvol 374ubirsvol - could be noexec, but I feel flash ops are risky (prone to hw/fw/sw bugs)
375ubiupdatevol 375ubiupdatevol - could be noexec, but I feel flash ops are risky (prone to hw/fw/sw bugs)
376udhcpc - daemon 376udhcpc - daemon
377udhcpd - daemon 377udhcpd - daemon
378udpsvd - daemon 378udpsvd - daemon