There needs to be a Linux kernel fork that when you try to execute a directory executes all programs in the directory. In parallel. Juuuuuuuust to fuck with people who might accidentally execute the /usr/bin directory.
Those of us who use the autocd feature of shells “execute” directories all the time. For example I’d type just /usr/bin RET if I wanted to cd to /usr/bin.
The x permission on directories is exactly for this purpose. You can use the directory. You cannot read (requires rx), you cannot write (w), but you can ‘cd’ and operate on files in the directory.
This is important, you can lock someone out from a directory tree buy not giving them ‘x’ on the root. So, if your home is rwx------, no one but the owner can do anything in your home. This is effective even if some files and subdirectories have less restrictive permissions.
I remember myself asking why directories had x flags in their permissions. Like, you don’t execute them. What do they use the x flag for?
There needs to be a Linux kernel fork that when you try to execute a directory executes all programs in the directory. In parallel. Juuuuuuuust to fuck with people who might accidentally execute the
/usr/bin
directory.And if there’s a circular symlink, we fork bomb
Or worse… In order. Based on last Modified date. And use that as the basis for some scheduling agent where timing and order of execution is essential.
That’s the most evil thing I’ve heard in awhile, and I would absolutely make use of it anyway.
All you have to do is touch the files in order. Why aren’t you using this touchsched repo here….
Those of us who use the autocd feature of shells “execute” directories all the time. For example I’d type just
/usr/bin RET
if I wanted to cd to /usr/bin.The x permission on directories is exactly for this purpose. You can use the directory. You cannot read (requires rx), you cannot write (w), but you can ‘cd’ and operate on files in the directory.
This is important, you can lock someone out from a directory tree buy not giving them ‘x’ on the root. So, if your home is rwx------, no one but the owner can do anything in your home. This is effective even if some files and subdirectories have less restrictive permissions.
Does that include root?
Point for you, root is special.
Executing a list read of the inode?
It’s necessary if you want to give somebody rw access to a subdirectory but not the parent.
The parent gets “x” and the child gets “rwx”.
This way you can have multiple users with their own directories under, say, /var/www/html but restrict access to /var/www/html itself.
If the user doesn’t have “x” then they can’t see anything in that directory at all.