From 2fe64148a81f0d78050c302f34a6853d21f7cae4 Mon Sep 17 00:00:00 2001 From: DJ Delorie Date: Mon, 28 Mar 2022 23:53:33 -0400 Subject: Allow for unpriviledged nested containers If the build itself is run in a container, we may not be able to fully set up a nested container for test-container testing. Notably is the mounting of /proc, since it's critical that it be mounted from within the same PID namespace as its users, and thus cannot be bind mounted from outside the container like other mounts. This patch defaults to using the parent's PID namespace instead of creating a new one, as this is more likely to be allowed. If the test needs an isolated PID namespace, it should add the "pidns" command to its init script. Reviewed-by: Carlos O'Donell --- nss/tst-reload2.c | 2 ++ 1 file changed, 2 insertions(+) (limited to 'nss') diff --git a/nss/tst-reload2.c b/nss/tst-reload2.c index fb3b94a1fa..7df0ca740b 100644 --- a/nss/tst-reload2.c +++ b/nss/tst-reload2.c @@ -95,6 +95,8 @@ do_test (void) char buf1[PATH_MAX]; char buf2[PATH_MAX]; + support_need_proc ("Our xmkdirp fails if we can't map our uid, which requires /proc."); + sprintf (buf1, "/subdir%s", support_slibdir_prefix); xmkdirp (buf1, 0777); -- cgit 1.4.1