selftests/seccomp: Check CAP_SYS_ADMIN capability in the test mode_filter_without_nnp
authorGautam Menghani <gautammenghani201@gmail.com>
Sun, 31 Jul 2022 09:25:29 +0000 (14:55 +0530)
committerKees Cook <keescook@chromium.org>
Fri, 2 Dec 2022 19:32:53 +0000 (11:32 -0800)
commitfc1e3980044f0f812252f5f164a8350376d62eb7
treefa260d5842ee2ee72fa2dd3d83711015066c435a
parent247f34f7b80357943234f93f247a1ae6b6c3a740
selftests/seccomp: Check CAP_SYS_ADMIN capability in the test mode_filter_without_nnp

In the "mode_filter_without_nnp" test in seccomp_bpf, there is currently
a TODO which asks to check the capability CAP_SYS_ADMIN instead of euid.
This patch adds support to check if the calling process has the flag
CAP_SYS_ADMIN, and also if this flag has CAP_EFFECTIVE set.

Signed-off-by: Gautam Menghani <gautammenghani201@gmail.com>
Signed-off-by: Kees Cook <keescook@chromium.org>
Link: https://lore.kernel.org/r/20220731092529.28760-1-gautammenghani201@gmail.com
tools/testing/selftests/seccomp/seccomp_bpf.c