basebuilder_pel7ppc64bebuilder0
7 years ago
1 changed files with 67 additions and 0 deletions
@ -0,0 +1,67 @@
@@ -0,0 +1,67 @@
|
||||
From 04cad06bed055a5dd373b2f5babc8000a76597a6 Mon Sep 17 00:00:00 2001 |
||||
From: Karel Zak <kzak@redhat.com> |
||||
Date: Mon, 9 Oct 2017 12:44:48 +0200 |
||||
Subject: [PATCH] libmount: use eacess() rather than open() to check mtab/utab |
||||
|
||||
The open() syscall is probably the most strong way how to check write |
||||
accessibility in all situations, but it's overkill and on some |
||||
paranoid systems with enabled audit/selinux. It fills logs with |
||||
"Permission denied" entries. Let's use eaccess() if available. |
||||
|
||||
Addresses: https://bugzilla.redhat.com/show_bug.cgi?id=1499760 |
||||
Signed-off-by: Karel Zak <kzak@redhat.com> |
||||
--- |
||||
configure.ac | 1 + |
||||
libmount/src/utils.c | 19 +++++++++++++------ |
||||
2 files changed, 14 insertions(+), 6 deletions(-) |
||||
|
||||
diff --git a/configure.ac b/configure.ac |
||||
index 78258d677..96c5838cf 100644 |
||||
--- a/configure.ac |
||||
+++ b/configure.ac |
||||
@@ -315,6 +315,7 @@ AC_CHECK_FUNCS([ \ |
||||
__fpending \ |
||||
secure_getenv \ |
||||
__secure_getenv \ |
||||
+ eaccess \ |
||||
err \ |
||||
errx \ |
||||
fsync \ |
||||
diff --git a/libmount/src/utils.c b/libmount/src/utils.c |
||||
index 5c374b432..a275d0a0e 100644 |
||||
--- a/libmount/src/utils.c |
||||
+++ b/libmount/src/utils.c |
||||
@@ -653,18 +653,25 @@ done: |
||||
|
||||
static int try_write(const char *filename) |
||||
{ |
||||
- int fd; |
||||
+ int rc = 0; |
||||
|
||||
if (!filename) |
||||
return -EINVAL; |
||||
|
||||
- fd = open(filename, O_RDWR|O_CREAT|O_CLOEXEC, |
||||
+#ifdef HAVE_EACCESS |
||||
+ if (eaccess(filename, R_OK|W_OK) != 0) |
||||
+ rc = -errno; |
||||
+#else |
||||
+ { |
||||
+ int fd = open(filename, O_RDWR|O_CREAT|O_CLOEXEC, |
||||
S_IWUSR|S_IRUSR|S_IRGRP|S_IROTH); |
||||
- if (fd >= 0) { |
||||
- close(fd); |
||||
- return 0; |
||||
+ if (fd < 0) |
||||
+ rc = -errno; |
||||
+ else |
||||
+ close(fd); |
||||
} |
||||
- return -errno; |
||||
+#endif |
||||
+ return rc; |
||||
} |
||||
|
||||
/** |
||||
-- |
||||
2.13.6 |
Loading…
Reference in new issue