From 898374126e2c2632bc9bf0308407898af1f4ff82 Mon Sep 17 00:00:00 2001 From: kosaki Date: Thu, 19 May 2011 12:18:41 +0000 Subject: revert O_CLOEXEC patch series completely. because boron chkbuild test result says, An old linux kernel ignore O_CLOEXEC silently instead of return an error. It may lead to bring new security risk. So, we have to be pending it until finish to implement proper fallback logic. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@31643 b2dd03c8-39d4-4d8f-98ff-823fe69b080e --- io.c | 4 ---- 1 file changed, 4 deletions(-) (limited to 'io.c') diff --git a/io.c b/io.c index 925bfd4ea0..154a01943b 100644 --- a/io.c +++ b/io.c @@ -10573,10 +10573,6 @@ Init_IO(void) /* Try to minimize cache effects of the I/O to and from this file. */ rb_file_const("DIRECT", INT2FIX(O_DIRECT)); #endif -#ifdef O_CLOEXEC - /* enable close-on-exec flag */ - rb_file_const("CLOEXEC", INT2FIX(O_CLOEXEC)); /* Linux, POSIX-2008. */ -#endif sym_mode = ID2SYM(rb_intern("mode")); sym_perm = ID2SYM(rb_intern("perm")); -- cgit v1.2.3