From 290bcb6de9c4aeff65bbfa06b8addecdbc51ca88 Mon Sep 17 00:00:00 2001 From: Jamie Liu Date: Fri, 11 Jan 2019 14:47:14 -0800 Subject: Require CAP_SYS_CHROOT in ChrootTest.ProcMountsMountinfoNoEscape. PiperOrigin-RevId: 228949227 Change-Id: I8f47bcd56aab706081218ec7498af8049ccd6d63 --- test/syscalls/linux/chroot.cc | 1 + 1 file changed, 1 insertion(+) (limited to 'test') diff --git a/test/syscalls/linux/chroot.cc b/test/syscalls/linux/chroot.cc index f921f9025..6c200f63e 100644 --- a/test/syscalls/linux/chroot.cc +++ b/test/syscalls/linux/chroot.cc @@ -280,6 +280,7 @@ TEST(ChrootTest, ProcMemSelfMapsNoEscapeProcOpen) { // /proc/self/mountinfo. TEST(ChrootTest, ProcMountsMountinfoNoEscape) { SKIP_IF(!ASSERT_NO_ERRNO_AND_VALUE(HaveCapability(CAP_SYS_ADMIN))); + SKIP_IF(!ASSERT_NO_ERRNO_AND_VALUE(HaveCapability(CAP_SYS_CHROOT))); // We are going to create some mounts and then chroot. In order to be able to // unmount the mounts after the test run, we must chdir to the root and use -- cgit v1.2.3