-
Notifications
You must be signed in to change notification settings - Fork 37.7k
sandbox: add newfstatat
& copy_file_range
to allowed filesystem syscalls
#23179
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
sandbox: add newfstatat
& copy_file_range
to allowed filesystem syscalls
#23179
Conversation
Closer, but now missing
|
Added |
ACK 44d77d2 Tested that this does fix the test issues I was running into. |
newfstatat
& copy_file_range
to allowed filesystem syscalls
Code review ACK 44d77d2 |
Yes that's fine. |
Looks like it's not neccessary, GUIX build passes with those two PRs as-is. |
allowed_syscalls.insert(__NR_statfs); // get filesystem statistics | ||
allowed_syscalls.insert(__NR_statx); // get file status (extended) | ||
allowed_syscalls.insert(__NR_unlink); // delete a name and possibly the file it refers to | ||
allowed_syscalls.insert(__NR_access); // check user's permissions for a file |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it creates somewhat of a merge hotspot to re-align these comments every time something is added/removed.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
cr ACK 44d77d2
Thanks for improving the experimental syscall sandbox! :)
… allowed filesystem syscalls 44d77d2 sandbox: add copy_file_range to allowed filesystem syscalls (fanquake) ee08741 sandbox: add newfstatat to allowed filesystem syscalls (fanquake) Pull request description: Similar to bitcoin#23178, this is a follow up to bitcoin#20487, which has broken running the unit tests for some developers. Fix this by adding `newfstatat` to the list of allowed filesystem related calls. ACKs for top commit: achow101: ACK 44d77d2 laanwj: Code review ACK 44d77d2 practicalswift: cr ACK 44d77d2 Tree-SHA512: ce9d1b441ebf25bd2cf290566e05864223c1418dab315c962e1094ad877db5dd9fcab94ab98a46da8b712a8f5f46675d62ca3349215d8df46ec5b3c4d72dbaa6
Similar to #23178, this is a follow up to #20487, which has broken running the unit tests for some developers. Fix this by adding
newfstatat
to the list of allowed filesystem related calls.