Searched hist:d7d2e5bb (Results 1 – 2 of 2) sorted by relevance
/openbmc/linux/tools/testing/selftests/seccomp/ |
H A D | config | d7d2e5bb Fri Jul 10 12:26:11 CDT 2020 Kees Cook <keescook@chromium.org> selftests/seccomp: Add SKIPs for failed unshare()
Running the seccomp tests as a regular user shouldn't just fail tests that require CAP_SYS_ADMIN (for getting a PID namespace). Instead, detect those cases and SKIP them. Additionally, gracefully SKIP missing CONFIG_USER_NS (and add to "config" since we'd prefer to actually test this case).
Signed-off-by: Kees Cook <keescook@chromium.org> d7d2e5bb Fri Jul 10 12:26:11 CDT 2020 Kees Cook <keescook@chromium.org> selftests/seccomp: Add SKIPs for failed unshare() Running the seccomp tests as a regular user shouldn't just fail tests that require CAP_SYS_ADMIN (for getting a PID namespace). Instead, detect those cases and SKIP them. Additionally, gracefully SKIP missing CONFIG_USER_NS (and add to "config" since we'd prefer to actually test this case). Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | seccomp_bpf.c | d7d2e5bb Fri Jul 10 12:26:11 CDT 2020 Kees Cook <keescook@chromium.org> selftests/seccomp: Add SKIPs for failed unshare()
Running the seccomp tests as a regular user shouldn't just fail tests that require CAP_SYS_ADMIN (for getting a PID namespace). Instead, detect those cases and SKIP them. Additionally, gracefully SKIP missing CONFIG_USER_NS (and add to "config" since we'd prefer to actually test this case).
Signed-off-by: Kees Cook <keescook@chromium.org> d7d2e5bb Fri Jul 10 12:26:11 CDT 2020 Kees Cook <keescook@chromium.org> selftests/seccomp: Add SKIPs for failed unshare() Running the seccomp tests as a regular user shouldn't just fail tests that require CAP_SYS_ADMIN (for getting a PID namespace). Instead, detect those cases and SKIP them. Additionally, gracefully SKIP missing CONFIG_USER_NS (and add to "config" since we'd prefer to actually test this case). Signed-off-by: Kees Cook <keescook@chromium.org>
|