diff options
| author | Pavel Tikhomirov <ptikhomirov@virtuozzo.com> | 2026-03-18 13:21:52 +0100 |
|---|---|---|
| committer | Christian Brauner <brauner@kernel.org> | 2026-03-20 14:44:26 +0100 |
| commit | 7c5219e1a60686c04fe12536d96721d538635130 (patch) | |
| tree | 6d1a52807d48c1ffc6cf52c8eb7de157a0aefb08 /rust/kernel/ptr/git@git.tavy.me:linux.git | |
| parent | a3bdc23ba8ead754583907419af6dbea32857ddb (diff) | |
selftests: Add tests for creating pidns init via setns
First testcase "pidns_init_via_setns" checks that a process can become
Pid 1 (init) in a new Pid namespace created via unshare() and joined via
setns().
Second testcase "pidns_init_via_setns_set_tid" checks that during this
process we can use clone3() + set_tid and set the pid in both the new
and old pid namespaces (owned by different user namespaces). This test
requires root to run to avoid complex setup for wrapper userns.
Signed-off-by: Pavel Tikhomirov <ptikhomirov@virtuozzo.com>
--
pidns_init_via_setns. Make pidns_init_via_setns_set_tid require root.
Link: https://patch.msgid.link/20260318122157.280595-5-ptikhomirov@virtuozzo.com
v6: Move wrapper userns creation for unprivileged case to the top of
Signed-off-by: Christian Brauner <brauner@kernel.org>
Diffstat (limited to 'rust/kernel/ptr/git@git.tavy.me:linux.git')
0 files changed, 0 insertions, 0 deletions
