From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=0.3 required=5.0 tests=MAILING_LIST_MULTI, RCVD_IN_DNSWL_NONE,RDNS_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.2 Received: (qmail 30885 invoked from network); 10 Mar 2020 03:00:32 -0000 Received-SPF: pass (primenet.com.au: domain of zsh.org designates 203.24.36.2 as permitted sender) receiver=inbox.vuxu.org; client-ip=203.24.36.2 envelope-from= Received: from unknown (HELO primenet.com.au) (203.24.36.2) by inbox.vuxu.org with ESMTP; 10 Mar 2020 03:00:32 -0000 Received: (qmail 24 invoked by alias); 10 Mar 2020 03:00:18 -0000 Mailing-List: contact zsh-workers-help@zsh.org; run by ezmlm Precedence: bulk X-No-Archive: yes List-Id: Zsh Workers List List-Post: List-Help: List-Unsubscribe: X-Seq: 45525 Received: (qmail 28587 invoked by uid 1010); 10 Mar 2020 03:00:18 -0000 X-Qmail-Scanner-Diagnostics: from rcpt-expgw.biglobe.ne.jp by f.primenet.com.au (envelope-from , uid 7791) with qmail-scanner-2.11 (clamdscan: 0.102.2/25744. spamassassin: 3.4.2. Clear:RC:0(133.208.98.1):SA:0(-2.6/5.0):. Processed in 1.311231 secs); 10 Mar 2020 03:00:18 -0000 X-Envelope-From: takimoto-j@kba.biglobe.ne.jp X-Qmail-Scanner-Mime-Attachments: | X-Qmail-Scanner-Zip-Files: | Received-SPF: pass (ns1.primenet.com.au: SPF record at spf01.biglobe.ne.jp designates 133.208.98.1 as permitted sender) X-Biglobe-Sender: From: Jun T Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\)) Subject: P01privileged fails on CentOS/Fedora (a simple permission issue) Message-Id: <2682CEC4-4890-4363-A5F0-0431CBCF0C97@kba.biglobe.ne.jp> Date: Tue, 10 Mar 2020 11:59:37 +0900 To: zsh-workers@zsh.org X-Mailer: Apple Mail (2.3445.104.11) X-Biglobe-Spnum: 54849 At least on CentOS/Fedora the default permission of a user's home directory is rwx------. If I build/test zsh in a directory below my home dir, say /home/takimoto/src/zsh/, P01privileged fails because users with uid=3D1,2 can't read the necessary module(s). Is this well known? I'm not sure whether this need be fixed. Selecting unprivileged UID:EUID pair automatically Selecting unprivileged GID:EGID pair automatically Using unprivileged UID 1, EUID 2, GID 1, EGID 2 --- /tmp/zsh.ztst.15006/ztst.out 2020-03-10 11:20:22.808199407 = +0900 +++ /tmp/zsh.ztst.15006/ztst.tout 2020-03-10 11:20:22.805199423 = +0900 @@ -1,3 +1,3 @@ -1/1 off -2/2 off -1/2 on +1/1 +2/2 +1/2 Test ./P01privileged.ztst failed: output differs from expected as shown = above for: re_zsh $ruid $ruid -1 -1 'echo $UID/$EUID $options[privileged]' re_zsh $euid $euid -1 -1 'echo $UID/$EUID $options[privileged]' re_zsh $ruid $euid -1 -1 'echo $UID/$EUID $options[privileged]' Error output: zsh:1: failed to load module `zsh/parameter': = /home/takimoto/src/zsh/Test/Modules/zsh/parameter.so: cannot open shared = object file: Permission denied (two more same errors) Was testing: PRIVILEGED automatically enabled when RUID !=3D EUID