diff options
author | peter <peter@FreeBSD.org> | 1998-04-06 18:25:21 +0000 |
---|---|---|
committer | peter <peter@FreeBSD.org> | 1998-04-06 18:25:21 +0000 |
commit | b0a513624f1dbb09da5c7462c3516a9c7e227ac5 (patch) | |
tree | 6f1ace22af3d318f3f2d113e31d1cb7259a31155 | |
parent | 14414bee85d2577755e54fd44018790f46aeda8d (diff) | |
download | FreeBSD-src-b0a513624f1dbb09da5c7462c3516a9c7e227ac5.zip FreeBSD-src-b0a513624f1dbb09da5c7462c3516a9c7e227ac5.tar.gz |
Rather than let users get fd's to symlink files, make O_NOFOLLOW cause
an error if it gets a link (like it does if it gets a socket). The
implications of letting users try and do file operations on symlinks
themselves were too worrying.
-rw-r--r-- | sys/kern/vfs_vnops.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/sys/kern/vfs_vnops.c b/sys/kern/vfs_vnops.c index 40a2112..b243967 100644 --- a/sys/kern/vfs_vnops.c +++ b/sys/kern/vfs_vnops.c @@ -36,7 +36,7 @@ * SUCH DAMAGE. * * @(#)vfs_vnops.c 8.2 (Berkeley) 1/21/94 - * $Id: vfs_vnops.c,v 1.50 1998/02/25 05:58:47 bde Exp $ + * $Id: vfs_vnops.c,v 1.51 1998/04/06 17:38:42 peter Exp $ */ #include <sys/param.h> @@ -83,7 +83,7 @@ vn_open(ndp, fmode, cmode) if (fmode & O_CREAT) { ndp->ni_cnd.cn_nameiop = CREATE; ndp->ni_cnd.cn_flags = LOCKPARENT | LOCKLEAF; - if ((fmode & O_EXCL) == 0) + if ((fmode & O_EXCL) == 0 && (fmode & O_NOFOLLOW) == 0) ndp->ni_cnd.cn_flags |= FOLLOW; error = namei(ndp); if (error) @@ -125,7 +125,7 @@ vn_open(ndp, fmode, cmode) return (error); vp = ndp->ni_vp; } - if (vp->v_type == VSOCK) { + if (vp->v_type == VSOCK || vp->v_type == VLNK) { error = EOPNOTSUPP; goto bad; } |