Displaying 3 results from an estimated 3 matches for "cap_user_data_t".
2011 Jul 19
4
[PATCH v1 0/2] Support dropping of capabilities from early userspace.
This patchset applies to klibc mainline. As is it will probably collide
with Maximilian's recent patch to rename run-init to switch_root posted
last week.
To boot an untrusted environment with certain capabilities locked out,
we'd like to be able to drop the capabilities up front from early
userspace, before we actually transition onto the root volume.
This patchset implements this by
2013 Aug 21
0
Build problems: klibc with Linux 3.10.7
...eate
SYSCALL FOUND: epoll_wait
SYSCALL FOUND: tgkill
SYSCALL FOUND: flock
SYSCALL FOUND: capget
SYSCALL FOUND: sethostname
SYSCALL FOUND: getpid
SYSCALL FOUND: add_key
SYSCALL FOUND: getrlimit
SYSCALL FOUND: set_robust_list
SYSCALL FOUND: waitpid
SYSCALL FOUND: tkill
TYPE __u32: size 4, sign 0
TYPE cap_user_data_t: size 4, sign 0
TYPE cap_user_header_t: size 4, sign 0
TYPE char *: size 4, sign 0
TYPE char * const *: size 4, sign 0
TYPE const char *: size 4, sign 0
TYPE const gid_t *: size 4, sign 0
TYPE const sigset_t *: size 4, sign 0
TYPE const struct __pselect6 *: size 4, sign 0
TYPE const struct iovec *:...
2013 Aug 21
5
Build problems: klibc with Linux 3.10.7
On Tue, Aug 20, 2013 at 07:44:39AM +0200, leroy christophe wrote:
> >
> Find attached two patches I have in order to build klibc 2.0.2
> against kernel 3.8.13
> We had to introduce those patches when going from kernel 3.6 to kernel 3.7
> Hope it helps.
>
those patches are wrong and again very brittle.
just use the way it is described in `make help':
A) cd ~/src/linux