diff options
author | Andrew Tridgell <tridge@samba.org> | 2010-03-05 23:07:26 +1100 |
---|---|---|
committer | Andrew Tridgell <tridge@samba.org> | 2010-03-05 23:07:32 +1100 |
commit | e8788808da604e867c8e1b31349abdd934a6789f (patch) | |
tree | 85dfd8414a4c588d1b0dda31dc13ca7851d3b108 | |
parent | 568f0851f0fceca1511b689040340e19ef1b538b (diff) | |
download | samba-e8788808da604e867c8e1b31349abdd934a6789f.tar.gz samba-e8788808da604e867c8e1b31349abdd934a6789f.tar.bz2 samba-e8788808da604e867c8e1b31349abdd934a6789f.zip |
s4-pvfs_sys: build on systems without O_NOFOLLOW or O_DIRECTORY
-rw-r--r-- | source4/ntvfs/posix/pvfs_sys.c | 26 |
1 files changed, 22 insertions, 4 deletions
diff --git a/source4/ntvfs/posix/pvfs_sys.c b/source4/ntvfs/posix/pvfs_sys.c index 178530775f..f110590153 100644 --- a/source4/ntvfs/posix/pvfs_sys.c +++ b/source4/ntvfs/posix/pvfs_sys.c @@ -42,6 +42,24 @@ struct pvfs_sys_ctx { struct stat st_orig; }; + +/* + we create PVFS_NOFOLLOW and PVFS_DIRECTORY as aliases for O_NOFOLLOW + and O_DIRECTORY on systems that have them. On systems that don't + have O_NOFOLLOW we are less safe, but the root override code is off + by default. + */ +#ifdef O_NOFOLLOW +#define PVFS_NOFOLLOW O_NOFOLLOW +#else +#define PVFS_NOFOLLOW 0 +#endif +#ifdef O_DIRECTORY +#define PVFS_DIRECTORY O_DIRECTORY +#else +#define PVFS_DIRECTORY 0 +#endif + /* return to original directory when context is destroyed */ @@ -97,7 +115,7 @@ static int pvfs_sys_chdir_nosymlink(struct pvfs_sys_ctx *ctx, const char *pathna int fd; struct stat st1, st2; *p = 0; - fd = open(path, O_NOFOLLOW | O_DIRECTORY | O_RDONLY); + fd = open(path, PVFS_NOFOLLOW | PVFS_DIRECTORY | O_RDONLY); if (fd == -1) { return -1; } @@ -225,7 +243,7 @@ static int pvfs_sys_chown(struct pvfs_state *pvfs, struct pvfs_sys_ctx *ctx, con { /* to avoid symlink hacks, we need to use fchown() on a directory fd */ int ret, fd; - fd = open(name, O_DIRECTORY | O_NOFOLLOW | O_RDONLY); + fd = open(name, PVFS_DIRECTORY | PVFS_NOFOLLOW | O_RDONLY); if (fd == -1) { return -1; } @@ -262,7 +280,7 @@ int pvfs_sys_open(struct pvfs_state *pvfs, const char *filename, int flags, mode } /* don't allow permission overrides to follow links */ - flags |= O_NOFOLLOW; + flags |= PVFS_NOFOLLOW; /* if O_CREAT was specified and O_EXCL was not specified @@ -386,7 +404,7 @@ int pvfs_sys_unlink(struct pvfs_state *pvfs, const char *filename) static bool contains_symlink(const char *path) { - int fd = open(path, O_NOFOLLOW | O_RDONLY); + int fd = open(path, PVFS_NOFOLLOW | O_RDONLY); if (fd != -1) { close(fd); return false; |