summaryrefslogtreecommitdiffstats
path: root/newlib/libc/stdlib/envlock.c
diff options
context:
space:
mode:
authorCorinna Vinschen <corinna@vinschen.de>2016-04-18 20:43:00 +0200
committerCorinna Vinschen <corinna@vinschen.de>2016-04-18 20:43:00 +0200
commit97d0449325b740a9c122090f46813ec8ed91edc9 (patch)
tree8f547b8f549eb77c04ab1c47d29e3bb472445105 /newlib/libc/stdlib/envlock.c
parent12cc8290e85cee8258ce1857a570506344401bbe (diff)
downloadcygnal-97d0449325b740a9c122090f46813ec8ed91edc9.tar.gz
cygnal-97d0449325b740a9c122090f46813ec8ed91edc9.tar.bz2
cygnal-97d0449325b740a9c122090f46813ec8ed91edc9.zip
Handle permissions a bit closer to POSIX 1003.1e
So far we tweaked ACL_GROUP_OBJ and ACL_MASK values the same way when creating a file. We now do what POSIX requires, namely just change ACL_MASK if it's present, otherwise ACL_GROUP_OBJ. Note that we only do this at creation time. Chmod still tweaks both to create less surprising results for the unsuspecting user. Additionally make sure to take umask only into account if no ACL_MASK value is present. That has been missed so far. * sec_acl.cc (set_posix_access): Perform check for non-existant default ACEs earlier. Ignore umask also if ACL_MASK is present. Only set owner_eq_group if we're actually handling a user entry. Mention chmod in a comment. * security.cc (set_created_file_access): Perform group/mask permission setting as required by POSIX 1003.1e. Signed-off-by: Corinna Vinschen <corinna@vinschen.de>
Diffstat (limited to 'newlib/libc/stdlib/envlock.c')
0 files changed, 0 insertions, 0 deletions