aboutsummaryrefslogtreecommitdiff
path: root/libcap/libcap.h
AgeCommit message (Collapse)Author
2015-09-03Clean up some signed vs. unsigned comparisons in libcap.Andrew G Morgan
Suggestion from Mark Wielaard @ Redhat and, more recently from Akhil Arora @ Intel. Signed-off-by: Andrew G Morgan <morgan@kernel.org>
2015-09-03Another corner case not gracefully handled by cap_to_text.Andrew G. Morgan
This shows up when you try to run getpcaps on a system still running with 32-bit capabilities. The output is very verbose for a process with no capabilities. Now it yields '='. Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
2015-09-03Fix cap_copy_int(), add two functions cap_get_pid() and cap_compare()Andrew G. Morgan
Test new and old function with modified test. Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
2015-09-03We're moving on to v3 capabilities, to overcome a header file snafu.Andrew G. Morgan
v3 capabilities are functionally equivalent to v2 capabilities, but having a different magic value allow the kernel to warn about possibly unsafe use of v2 capabilities. Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
2015-09-03Drop dependency on current value of _LINUX_CAPABILITY_VERSIONAndrew G. Morgan
Be more explicit with a local definition of _LIBCAP_CAPABILITY_* to indicate the libraries preferred capability revision. Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
2015-09-03Revised numbers for the SECUREBITS prctl()sAndrew G. Morgan
Andrew Morton said: The hitherto-invisible-to-me PR_GET_TSC and PR_SET_TSC have turned up in mainline, so I have renumbered your prctl options to /* Get/set securebits (as per security/commoncap.c) */ #define PR_GET_SECUREBITS 27 #define PR_SET_SECUREBITS 28 Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
2015-09-03Fix malloc(size) but in capsh and numeric capabilities (for unnamed bits)Andrew G. Morgan
capsh allocated too little memory for the --inh argument - led to glibc aborting with free(). libcap has always had latent support for identifying unnamed capabilities with integers. It was untested (and therefore broken) prior to this commit. Should be fixed now. Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
2015-09-03Introduce a capability shell wrapper; capsh.Andrew G. Morgan
Capsh is a simple 'bash' wrapper program that can be used to raise and lower both the bset and pI capabilities before invoking /bin/bash (hardcoded right now). The --print option can be used as a quick test whether various capability manipulations work as expected (or not). Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
2015-09-03This is libcap-2.00.Andrew Morgan
This revision of libcap has support for 32-bit and 64-bit capabilities. It also supports filesystem capabilities of both sizes.
2015-09-03Add support for 64-bit (file) capabilitiesAndrew Morgan
This should compile with any iteration of a recent (2.6) kernel. If your kernel has 64-bit capabilities support, and the kernel headers indicate this, then it will include that. 32-bit legacy kernel support is dynamically performed by such a build of libcap.
2015-09-03Prepare for 1.95 release.Andrew Morgan
2015-09-03This is libcap-1.10Andrew Morgan
http://www.kernel.org/pub/linux/libs/security/linux-privs/kernel-2.2/libcap-1.10.tar.gz
2015-09-03This is libcap-1.01Andrew Morgan
http://www.kernel.org/pub/linux/libs/security/linux-privs/kernel-2.2/libcap-1.01.tar.gz
2015-09-03This is the source for libcap-1.0.tar.gzAndrew Morgan
http://www.kernel.org/pub/linux/libs/security/linux-privs/kernel-2.2/libcap-1.0.tar.gz