mirror_zfs/tests/zfs-tests/tests/functional/suid
Tomohiro Kusumi 9fb6abe5ad Implement secpolicy_vnode_setid_retain()
Don't unconditionally return 0 (i.e. retain SUID/SGID).
Test CAP_FSETID capability.

https://github.com/pjd/pjdfstest/blob/master/tests/chmod/12.t
which expects SUID/SGID to be dropped on write(2) by non-owner fails
without this. Most filesystems make this decision within VFS by using
a generic file write for fops.

Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov>
Signed-off-by: Tomohiro Kusumi <kusumi.tomohiro@gmail.com>
Closes #9035 
Closes #9043
2019-07-26 13:52:30 -07:00
..
.gitignore Implement secpolicy_vnode_setid_retain() 2019-07-26 13:52:30 -07:00
cleanup.ksh Implement secpolicy_vnode_setid_retain() 2019-07-26 13:52:30 -07:00
Makefile.am Implement secpolicy_vnode_setid_retain() 2019-07-26 13:52:30 -07:00
setup.ksh Implement secpolicy_vnode_setid_retain() 2019-07-26 13:52:30 -07:00
suid_write_to_file.c Implement secpolicy_vnode_setid_retain() 2019-07-26 13:52:30 -07:00
suid_write_to_none.ksh Implement secpolicy_vnode_setid_retain() 2019-07-26 13:52:30 -07:00
suid_write_to_sgid.ksh Implement secpolicy_vnode_setid_retain() 2019-07-26 13:52:30 -07:00
suid_write_to_suid_sgid.ksh Implement secpolicy_vnode_setid_retain() 2019-07-26 13:52:30 -07:00
suid_write_to_suid.ksh Implement secpolicy_vnode_setid_retain() 2019-07-26 13:52:30 -07:00