Coming soon - Get a detailed view of why an account is flagged as spam!
view details

This post has been de-listed

It is no longer included in search results and normal feeds (front page, hot posts, subreddit posts, etc). It remains visible only via the author's post history.

1
Setting uid bit when mounting causes permissions to be messed when running as other users
Post Flair (click to view more posts with a particular flair)
Post Body

Mount a drive like this, substituting 1000 for any user ID you want (except 0 for the purposes of this example):

sudo mount -t drvfs C: /mnt/c -o metadata,uid=1000

Now, under the drive file system, run this command:

sudo touch example.txt

You will see that example.txt is owned by user 1000 and not root! This is not good, to understate things. It means, for example, that web server processes that have access to the drive will create files that are owned by user 1000 (or whatever you set) and not the user the web server is configured to run as. I discovered this in trying to get a LEMP stack to run WordPress on my C: drive.

Author
Account Strength
100%
Account Age
7 years
Verified Email
Yes
Verified Flair
No
Total Karma
5,125
Link Karma
983
Comment Karma
4,129
Profile updated: 3 days ago
Posts updated: 7 hours ago

Subreddit

Post Details

We try to extract some basic information from the post title. This is not always successful or accurate, please use your best judgement and compare these values to the post title and body for confirmation.
Posted
4 years ago