-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -long cap_prctl_drop(unsigned long cap)
+static long cap_prctl_drop(unsigned long cap)
~ {
- - if (!capable(CAP_SETPCAP))
+ if (cap_capable(current, CAP_SETPCAP) != 0)
| With this change, you
| a) prevent PF_SUPERPRIV being set, although the task did
| explicitly attempt a privileged operation.
| b) stop checking other security modules, so for instance
| selinux no longer gets a say in dropping of
| capabilities.
| Are these both intended?
No. They were an oversight while I was trimming the patch. Good catch!
+ default:
+ /* No functionality available - continue with default */
+ return 0;
| Hmm, if CONFIG_SECURITY_FILE_CAPABILITIES=n and cmd is one of the above
| like PR_CAPBSET_DROP, do we want to return 0 and allow someone else to
| handle these, or is it more appropriate to return -EINVAL?
My feeling was that if this functionality is not configured, then I
didn't want to alter legacy expectations.
I very much wanted to limit this change to affect only those brave souls
willing to use the "experimental" filesystem support for capabilities.
Cheers
Andrew
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
iD8DBQFHofmM+bHCR3gb8jsRAs5lAKDa+KhKd8i4S2FUBmd5hYti+ArjJQCff/PQ
6fqCHDzAkmDkj6YADOC69fI=
=Nl5V
-----END PGP SIGNATURE-----
-
To unsubscribe from this list: send the line "unsubscribe
linux-security-module" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html