summaryrefslogtreecommitdiffhomepage
diff options
context:
space:
mode:
authorJamie Liu <jamieliu@google.com>2019-01-11 14:47:14 -0800
committerShentubot <shentubot@google.com>2019-01-11 14:48:26 -0800
commit290bcb6de9c4aeff65bbfa06b8addecdbc51ca88 (patch)
tree85c890cb753e531beface651d615fd3c2916046b
parent1bcc1229e8b89d516b0a741f3aa042b29175ebd2 (diff)
Require CAP_SYS_CHROOT in ChrootTest.ProcMountsMountinfoNoEscape.
PiperOrigin-RevId: 228949227 Change-Id: I8f47bcd56aab706081218ec7498af8049ccd6d63
-rw-r--r--test/syscalls/linux/chroot.cc1
1 files changed, 1 insertions, 0 deletions
diff --git a/test/syscalls/linux/chroot.cc b/test/syscalls/linux/chroot.cc
index f921f9025..6c200f63e 100644
--- a/test/syscalls/linux/chroot.cc
+++ b/test/syscalls/linux/chroot.cc
@@ -280,6 +280,7 @@ TEST(ChrootTest, ProcMemSelfMapsNoEscapeProcOpen) {
// /proc/self/mountinfo.
TEST(ChrootTest, ProcMountsMountinfoNoEscape) {
SKIP_IF(!ASSERT_NO_ERRNO_AND_VALUE(HaveCapability(CAP_SYS_ADMIN)));
+ SKIP_IF(!ASSERT_NO_ERRNO_AND_VALUE(HaveCapability(CAP_SYS_CHROOT)));
// We are going to create some mounts and then chroot. In order to be able to
// unmount the mounts after the test run, we must chdir to the root and use