With the introduction of per-process securebits, the capabilities-related
prctl callbacks were moved into cap_task_prctl(). Have smack use
cap_task_prctl() so that PR_SET_KEEPCAPS is defined.
Signed-off-by: Serge E. Hallyn <[email protected]>
---
security/smack/smack_lsm.c | 1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c
index 40066b6..e8ce6b6 100644
--- a/security/smack/smack_lsm.c
+++ b/security/smack/smack_lsm.c
@@ -2493,6 +2493,7 @@ static struct security_operations smack_ops = {
.task_wait = smack_task_wait,
.task_reparent_to_init = cap_task_reparent_to_init,
.task_to_inode = smack_task_to_inode,
+ .task_prctl = cap_task_prctl,
.ipc_permission = smack_ipc_permission,
--
1.5.1
--- "Serge E. Hallyn" <[email protected]> wrote:
> With the introduction of per-process securebits, the capabilities-related
> prctl callbacks were moved into cap_task_prctl(). Have smack use
> cap_task_prctl() so that PR_SET_KEEPCAPS is defined.
>
> Signed-off-by: Serge E. Hallyn <[email protected]>
Acked-by: Casey Schaufler <[email protected]>
> ---
> security/smack/smack_lsm.c | 1 +
> 1 files changed, 1 insertions(+), 0 deletions(-)
>
> diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c
> index 40066b6..e8ce6b6 100644
> --- a/security/smack/smack_lsm.c
> +++ b/security/smack/smack_lsm.c
> @@ -2493,6 +2493,7 @@ static struct security_operations smack_ops = {
> .task_wait = smack_task_wait,
> .task_reparent_to_init = cap_task_reparent_to_init,
> .task_to_inode = smack_task_to_inode,
> + .task_prctl = cap_task_prctl,
>
> .ipc_permission = smack_ipc_permission,
>
> --
> 1.5.1
>
> --
> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
> the body of a message to [email protected]
> More majordomo info at http://vger.kernel.org/majordomo-info.html
> Please read the FAQ at http://www.tux.org/lkml/
>
>
>
Casey Schaufler
[email protected]