selftests/seccomp: Handle EINVAL on unshare(CLONE_NEWPID)
authorTerry Tritton <terry.tritton@linaro.org>
Wed, 24 Jan 2024 14:13:55 +0000 (14:13 +0000)
committerKees Cook <keescook@chromium.org>
Thu, 1 Feb 2024 18:16:03 +0000 (10:16 -0800)
commitecaaa55c9fa5e8058445a8b891070b12208cdb6d
tree97846584c70471b987504c9f62a312b324ef201c
parent41bccc98fb7931d63d03f326a746ac4d429c1dd3
selftests/seccomp: Handle EINVAL on unshare(CLONE_NEWPID)

unshare(CLONE_NEWPID) can return EINVAL if the kernel does not have the
CONFIG_PID_NS option enabled.

Add a check on these calls to skip the test if we receive EINVAL.

Signed-off-by: Terry Tritton <terry.tritton@linaro.org>
Link: https://lore.kernel.org/r/20240124141357.1243457-2-terry.tritton@linaro.org
Signed-off-by: Kees Cook <keescook@chromium.org>
tools/testing/selftests/seccomp/seccomp_bpf.c