CRITICAL ls MEMORY LEAK
Mon Feb 22 23:47:02 GMT 2021
On 2021-02-22 14:50, Hans-Bernhard Bröker wrote:
> Am 22.02.2021 um 21:30 schrieb Brian Inglis:
>> I've often wondered if the heavy activity is due to Windows' defaults to
>> writing files with F+RX perms which triggers executable virus scans?
> That could only be the case if Windows actually had an 'x' permission bit.
Strictly speaking, I am not sure if *Unix* has an 'x' permission bit, but most
filesystems do provide such a facility (V/FAT e.g. some /boot/ do not), as do
POSIX/Solaris ACLs, and Windows NTFS, whose ACLs have execute permissions:
$ icacls /? | egrep exec\|X
RX - read and execute access
GE - generic execute
X - execute/traverse
GE grants FILE_EXECUTE and STANDARD_RIGHTS_EXECUTE access rights.
Access Mask Format:
AS ACCESS_SYSTEM_SECURITY access Security ACL in object security descriptor
Windows also supports ACLs on system objects, and there may be similar features
Take care. Thanks, Brian Inglis, Calgary, Alberta, Canada
This email may be disturbing to some readers as it contains
too much technical detail. Reader discretion is advised.
[Data in binary units and prefixes, physical quantities in SI.]
More information about the Cygwin