diff options
author | Michael Pratt <mpratt@google.com> | 2020-06-18 09:02:14 -0700 |
---|---|---|
committer | gVisor bot <gvisor-bot@google.com> | 2020-06-18 09:03:39 -0700 |
commit | 3970c127434817304f67a2ad192cbe8094ad3353 (patch) | |
tree | 4552afc303c62603662edce735a3b31eae260a3d /test | |
parent | 07ff909e76d8233827e705476ec116fc2cecec2f (diff) |
Remove various uses of 'whitelist'
Updates #2972
PiperOrigin-RevId: 317113059
Diffstat (limited to 'test')
-rw-r--r-- | test/syscalls/linux/xattr.cc | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/test/syscalls/linux/xattr.cc b/test/syscalls/linux/xattr.cc index 3231732ec..cbcf08451 100644 --- a/test/syscalls/linux/xattr.cc +++ b/test/syscalls/linux/xattr.cc @@ -73,9 +73,10 @@ TEST_F(XattrTest, XattrLargeName) { std::string name = "user."; name += std::string(XATTR_NAME_MAX - name.length(), 'a'); - // An xattr should be whitelisted before it can be accessed--do not allow - // arbitrary xattrs to be read/written in gVisor. if (!IsRunningOnGvisor()) { + // In gVisor, access to xattrs is controlled with an explicit list of + // allowed names. This name isn't going to be configured to allow access, so + // don't test it. EXPECT_THAT(setxattr(path, name.c_str(), nullptr, 0, /*flags=*/0), SyscallSucceeds()); EXPECT_THAT(getxattr(path, name.c_str(), nullptr, 0), |