mirror of
https://github.com/linux-apfs/apfstests.git
synced 2026-05-01 15:01:44 -07:00
generic/317: Use relative paths to avoid traversal permission problems
generic/317 will fail because execvp(cmd) is executed without permission, where cmd is '$here/src/lstat64 $file', which is called by $here/src/nsexec -s -U -M "0 $qa_user_id 1000" -G "0 $qa_user_id 1000"\ $here/src/lstat64 $file So, you will see following output: From user_ns ... +execvp: Permission denied nsexec runs the instruction '$here/src/lstat64 $file' as a regular user, the regular user may not have permission to access path in '$here'. Actually, it has been fixed in4818302fbf("xfstests: generic/317 use relative paths..."), which then been modified byb7cecbea22("fstests: Add path $here before src/<file>"). Fixes:b7cecbea22("fstests: Add path $here before src/<file>") Signed-off-by: Zhihao Cheng <chengzhihao1@huawei.com> Reviewed-by: Eryu Guan <guaneryu@gmail.com> Signed-off-by: Eryu Guan <guaneryu@gmail.com>
This commit is contained in:
+4
-1
@@ -61,7 +61,10 @@ _print_numeric_uid()
|
||||
$here/src/lstat64 $file |head -3 |_filter_output
|
||||
|
||||
echo "From user_ns"
|
||||
$here/src/nsexec -s -U -M "0 $qa_user_id 1000" -G "0 $qa_user_id 1000" $here/src/lstat64 $file |head -3 |_filter_output
|
||||
# don't use $here/src/lstat64, as we're running cmd(src/lstat64) in
|
||||
# nsexec as a regular user, and $here may contain path component that
|
||||
# a regular user doesn't have search permission
|
||||
$here/src/nsexec -s -U -M "0 $qa_user_id 1000" -G "0 $qa_user_id 1000" src/lstat64 $file |head -3 |_filter_output
|
||||
}
|
||||
|
||||
_scratch_unmount >/dev/null 2>&1
|
||||
|
||||
Reference in New Issue
Block a user