/* * getopt.c */ #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt #include #include #include #include "getopt.h" /** * ncp_getopt - option parser * @caller: name of the caller, for error messages * @options: the options string * @opts: an array of &struct option entries controlling parser operations * @optopt: output; will contain the current option * @optarg: output; will contain the value (if one exists) * @value: output; may be NULL; will be overwritten with the integer value * of the current argument. * * Helper to parse options on the format used by mount ("a=b,c=d,e,f"). * Returns opts->val if a matching entry in the 'opts' array is found, * 0 when no more tokens are found, -1 if an error is encountered. */ int ncp_getopt(const char *caller, char **options, const struct ncp_option *opts, char **optopt, char **optarg, unsigned long *value) { char *token; char *val; do { if ((token = strsep(options, ",")) == NULL) return 0; } while (*token == '\0'); if (optopt) *optopt = token; if ((val = strchr (token, '=')) != NULL) { *val++ = 0; } *optarg = val; for (; opts->name; opts++) { if (!strcmp(opts->name, token)) { if (!val) { if (opts->has_arg & OPT_NOPARAM) { return opts->val; } pr_info("%s: the %s option requires an argument\n", caller, token); return -EINVAL; } if (opts->has_arg & OPT_INT) { int rc = kstrtoul(val, 0, value); if (rc) { pr_info("%s: invalid numeric value in %s=%s\n", caller, token, val); return rc; } return opts->val; } if (opts->has_arg & OPT_STRING) { return opts->val; } pr_info("%s: unexpected argument %s to the %s option\n", caller, val, token); return -EINVAL; } } pr_info("%s: Unrecognized mount option %s\n", caller, token); return -EOPNOTSUPP; } /linux/net-next.git/tree/tools/include/uapi/asm-generic?h=nds-private-remove&id=497de07d89c1410d76a15bec2bb41f24a2a89f31'>treecommitdiff
diff options
context:
space:
mode:
authorGu Zheng <guzheng1@huawei.com>2017-01-09 09:34:48 +0800
committerAl Viro <viro@zeniv.linux.org.uk>2017-01-10 01:29:48 -0500
commit497de07d89c1410d76a15bec2bb41f24a2a89f31 (patch)
treefc00cca2a3a7eadf35ace0b9e8e824e83afe7f54 /tools/include/uapi/asm-generic
parentb4b8664d291ac1998e0f0bcdc96b6397f0fe68b3 (diff)
tmpfs: clear S_ISGID when setting posix ACLs
This change was missed the tmpfs modification in In CVE-2016-7097 commit 073931017b49 ("posix_acl: Clear SGID bit when setting file permissions") It can test by xfstest generic/375, which failed to clear setgid bit in the following test case on tmpfs: touch $testfile chown 100:100 $testfile chmod 2755 $testfile _runas -u 100 -g 101 -- setfacl -m u::rwx,g::rwx,o::rwx $testfile Signed-off-by: Gu Zheng <guzheng1@huawei.com> Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Diffstat (limited to 'tools/include/uapi/asm-generic')