From 2fe64148a81f0d78050c302f34a6853d21f7cae4 Mon Sep 17 00:00:00 2001 From: DJ Delorie Date: Mon, 28 Mar 2022 23:53:33 -0400 Subject: Allow for unpriviledged nested containers If the build itself is run in a container, we may not be able to fully set up a nested container for test-container testing. Notably is the mounting of /proc, since it's critical that it be mounted from within the same PID namespace as its users, and thus cannot be bind mounted from outside the container like other mounts. This patch defaults to using the parent's PID namespace instead of creating a new one, as this is more likely to be allowed. If the test needs an isolated PID namespace, it should add the "pidns" command to its init script. Reviewed-by: Carlos O'Donell --- elf/tst-pldd.c | 2 ++ 1 file changed, 2 insertions(+) (limited to 'elf') diff --git a/elf/tst-pldd.c b/elf/tst-pldd.c index 8916ce5..0616545 100644 --- a/elf/tst-pldd.c +++ b/elf/tst-pldd.c @@ -85,6 +85,8 @@ in_str_list (const char *libname, const char *const strlist[]) static int do_test (void) { + support_need_proc ("needs /proc/sys/kernel/yama/ptrace_scope and /proc/$child"); + /* Check if our subprocess can be debugged with ptrace. */ { int ptrace_scope = support_ptrace_scope (); -- cgit v1.1