From 48a15761bbc08a0872c7df562954bd17f90c3bb6 Mon Sep 17 00:00:00 2001 From: "Andrew G. Morgan" Date: Mon, 21 Jan 2008 17:18:30 -0800 Subject: [PATCH] --- yaml --- r: 75602 b: refs/heads/master c: a6dbb1ef2fc8d73578eacd02ac701f4233175c9f h: refs/heads/master v: v3 --- [refs] | 2 +- trunk/security/commoncap.c | 13 ++++++++++--- 2 files changed, 11 insertions(+), 4 deletions(-) diff --git a/[refs] b/[refs] index beb5ee59e26c..9eef450ecb7c 100644 --- a/[refs] +++ b/[refs] @@ -1,2 +1,2 @@ --- -refs/heads/master: a10336043b8193ec603ad54bb79cdcd26bbf94b3 +refs/heads/master: a6dbb1ef2fc8d73578eacd02ac701f4233175c9f diff --git a/trunk/security/commoncap.c b/trunk/security/commoncap.c index 5bc1895f3f9c..ea61bc73f6d3 100644 --- a/trunk/security/commoncap.c +++ b/trunk/security/commoncap.c @@ -59,6 +59,12 @@ int cap_netlink_recv(struct sk_buff *skb, int cap) EXPORT_SYMBOL(cap_netlink_recv); +/* + * NOTE WELL: cap_capable() cannot be used like the kernel's capable() + * function. That is, it has the reverse semantics: cap_capable() + * returns 0 when a task has a capability, but the kernel's capable() + * returns 1 for this case. + */ int cap_capable (struct task_struct *tsk, int cap) { /* Derived from include/linux/sched.h:capable. */ @@ -107,10 +113,11 @@ static inline int cap_block_setpcap(struct task_struct *target) static inline int cap_inh_is_capped(void) { /* - * return 1 if changes to the inheritable set are limited - * to the old permitted set. + * Return 1 if changes to the inheritable set are limited + * to the old permitted set. That is, if the current task + * does *not* possess the CAP_SETPCAP capability. */ - return !cap_capable(current, CAP_SETPCAP); + return (cap_capable(current, CAP_SETPCAP) != 0); } #else /* ie., ndef CONFIG_SECURITY_FILE_CAPABILITIES */