char *opts = NULL;
unsigned long f;
+ log_info("/* %s */", __func__);
+
assert_se(mount_option_mangle(NULL, MS_RDONLY|MS_NOSUID, &f, &opts) == 0);
assert_se(f == (MS_RDONLY|MS_NOSUID));
assert_se(opts == NULL);
_cleanup_free_ char *subdir = NULL;
const char *p;
+ log_info("/* %s */", __func__);
+
if (geteuid() != 0 || have_effective_cap(CAP_SYS_ADMIN) <= 0) {
(void) log_tests_skipped("not running privileged");
return;
static void test_bind_remount_one(void) {
pid_t pid;
+ log_info("/* %s */", __func__);
+
if (geteuid() != 0 || have_effective_cap(CAP_SYS_ADMIN) <= 0) {
(void) log_tests_skipped("not running privileged");
return;