summaryrefslogtreecommitdiff
path: root/meta/recipes-devtools/pseudo/files/pseudo-fchmodat-permissions.patch
AgeCommit message (Collapse)AuthorFiles
2014-12-03pseudo: remove older version and patchesSaul Wold1
Signed-off-by: Saul Wold <sgw@linux.intel.com>
2014-05-28pseudo: Honor umask againPeter Seebach1
The fchmodat-permissions patch was fine for the fchmod case, but had the unintended side effect of disregarding umask settings for open, mknod, mkdir, and their close relatives. Start tracking umask and masking the umask bits out where appropriate. Signed-off-by: Peter Seebach <peter.seebach@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2014-05-23pseudo: handle fchmodat better, mask out unwanted write bitsPeter Seebach1
It turns out that pseudo's decision not to report errors from the host system's fchmodat() can break GNU tar in a very strange way, resulting in directories being mode 0700 instead of whatever they should have been. Additionally, it turns out that if you make directories in your rootfs mode 777, that results in the local copies being mode 777, which could allow a hypothetical attacker with access to the machine to add files to your rootfs image. We should mask out the 022 bits when making actual mode changes in the rootfs. This patch represents a backport to the 1.5.1 branch of three patches from the 1.6 branch, because it took a couple of tries to get this quite right. Signed-off-by: Peter Seebach <peter.seebach@windriver.com> Signed-off-by: Saul Wold <sgw@linux.intel.com>