History log of /external/libcap/libcap/
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
4532c909ea439f668fb6b06747e2a47da1e93043 03-Sep-2015 Jorge Lucangeli Obes <jorgelo@google.com> Build libcap for Android.

Add Android.mk file for 'libcap' target. Also add license-related
files.

Including auto-generated file for now, will turn into a host binary
target later.

Bug: 23787966
Change-Id: Iaf2a457872bbc29e758c92cae22e65fa7436d1ed
ap_names.h
c63a1e3e546d1f2f708a7dcd759780bfb8cecf07 20-May-2014 Benedikt Morbach <benedikt.morbach@googlemail.com> don't include FAKEROOT in Makefile variables

instead, prepend it when actually using them.
This makes the variables more useful for specifying on the make invocation,
as you don't have to repeat your FAKEROOT/DESTDIR for every variable you
want to set. Just like you can set 'lib' without specifying lib_prefix.

compare:
make DESTDIR="${somevar}" prefix=/usr/local LIBDIR="${somevar}"/usr/local/lib96 MANDIR="${somevar}"/usr/share/man
to:
make DESTDIR="${somevar}" prefix=/usr/local LIBDIR=/usr/local/lib96 MANDIR=/usr/share/man

Signed-off-by: Andrew G Morgan <morgan@kernel.org>
akefile
203b6d06e3ad158d7cf5e9232c6de1b8c6a776a9 28-Mar-2014 Matthieu Crapet <mcrapet@gmail.com> Make.Rules: add gperf detection and fix INDENT test

Move gperf detection from libcap/Makefile to Make.Rules to be more cross-environment friendly.
Fix INDENT test (dollar sign must be doubled):
http://www.gnu.org/software/make/manual/make.html#Variables-in-Recipes

Signed-off-by: Matthieu Crapet <mcrapet@gmail.com>
Signed-off-by: Andrew G Morgan <morgan@kernel.org>
akefile
2749c0d767715ffd50b2a8a1049796161506eb54 10-Mar-2014 Andrew G Morgan <morgan@kernel.org> Change the location we include linux/xattr.h

This header stuff seems a bit fragile, but Serge reports including
it in sys/capability.h was causing a lot of trouble building dependent
app packages.

From the perspective of libcap, this API is only needed internally in
cap_file.c so we put an include there.

Signed-off-by: Andrew G Morgan <morgan@kernel.org>
ap_file.c
nclude/sys/capability.h
b43b071cd2a17c2537f91da736f8050a9f501b6f 03-Jan-2014 Xose Vazquez Perez <xose.vazquez@gmail.com> libcap: fix dead/empty urls.

Cc: Andrew G. Morgan <morgan@kernel.org>
Signed-off-by: Xose Vazquez Perez <xose.vazquez@gmail.com>
Signed-off-by: Andrew G Morgan <morgan@kernel.org>
nclude/uapi/linux/capability.h
180b512567edf98e7faf3a7fe4fb39175fc3f3db 06-Jan-2014 Andrew G Morgan <morgan@kernel.org> Fix libcap build issue - remove spurious /uapi

Thanks to Allan McRae for resolving it.

Signed-off-by: Andrew G Morgan <morgan@kernel.org>
akefile
7cef6f379932486d8effbf6eb0a80fbc73c64b6b 02-Jan-2014 Andrew G Morgan <morgan@kernel.org> Fix up the uapi/linux include scheme.

In adopting this uapi header file (without kernel internals), I previously
messed up on the apparent location of the files. Thanks to Tom Gundersen for
the clarification. Also, delete the non-uapi copies of things since they
are no longer needed to build the library and tools.

Signed-off-by: Andrew G Morgan <morgan@kernel.org>
nclude/linux/capability.h
nclude/linux/prctl.h
nclude/linux/securebits.h
nclude/sys/capability.h
nclude/uapi/linux/prctl.h
nclude/uapi/linux/securebits.h
94db16546f7ecdf1e3f23c88ae1e522bef0a36a4 24-Dec-2013 Andrew G Morgan <morgan@kernel.org> Clean up some signed vs. unsigned comparisons in libcap.

Suggestion from Mark Wielaard @ Redhat and, more recently from Akhil Arora @ Intel.

Signed-off-by: Andrew G Morgan <morgan@kernel.org>
ap_alloc.c
ap_extint.c
ap_file.c
ibcap.h
8e846542406535741c8aad4b7eb7c9c8fbc83321 24-Dec-2013 Andrew G Morgan <morgan@kernel.org> Add a .pc file to the library.

This patch was generated by Bryan Kadzban, and most recently supported by
Thomas H.P. Anderson.

For more info on what this file is used for, read:

http://en.wikipedia.org/wiki/Pkg-config

Signed-off-by: Andrew G Morgan <morgan@kernel.org>
akefile
ibcap.pc.in
838917d8483d46d891c6823e2faac186c4c97e48 15-Dec-2013 Andrew G Morgan <morgan@kernel.org> Get the library to compile again.

Signed-off-by: Andrew G Morgan <morgan@kernel.org>
akefile
nclude/linux/capability.h
nclude/sys/capability.h
nclude/uapi/linux/capability.h
083c4ead193d5e1cf799cd524fc72a4d31e71a77 25-Jul-2011 Andrew G. Morgan <morgan@kernel.org> Change directory to "/" after --chroot operation.

Thanks to Steve Grubb for suggesting this. He wrote:
=========
I was reviewing something recently and discovered a problem in capsh. The capsh
program has a --chroot command line option. Inspecting the code shows that it does not
do a chdir("/") after calling chroot. This means that '.' is outside the chroot.

Additional info:
http://cwe.mitre.org/data/definitions/243.html
=========

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
ap_proc.c
92246baa09b0d868c835abc484eb69316aafc902 26-Apr-2011 Andrew G. Morgan <morgan@kernel.org> Add some bounding set capability support to libcap.

Include some documentation and a link to capsh's man page.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
ap_proc.c
nclude/sys/capability.h
08fa09b44a008edb940752206e9ae851f8d945fb 13-Jan-2011 Sergey Senozhatsky <sergey.senozhatsky@gmail.com> libcap: introduce CAP_SYSLOG

Since commit 38ef4c2e437d11b5922723504b62824e96761459 syslog
operations require CAP_SYSLOG capability (intoriduced by commit
ce6ada35bdf710d16582cc4869c26722547e6f11), not CAP_SYS_ADMIN.

Patch introduces CAP_SYSLOG capability.

Signed-off-by: Sergey Senozhatsky <sergey.senozhatsky@gmail.com>
nclude/linux/capability.h
582557d140e3b302ec818d2590e6c7fe6f9bf776 30-Sep-2009 Torsten Werner <twerner@debian.org> fix Makefiles

This patch allows modifications of $(CFLAGS) when invoking make and fixes some
library linking issues.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
akefile
137016b23eda8bd6e8933f23c83823d4c54c423b 12-Jan-2010 Andrew G. Morgan <morgan@kernel.org> Clean up of prctl code.

Also add linux securebits.h file in case the system headers did not
include them.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
nclude/linux/prctl.h
nclude/linux/securebits.h
ec02235ed40b8a7f5fe578679876a7463593f716 12-Jan-2010 Serge E. Hallyn <serue@us.ibm.com> define sys/securebits.h

Hey Andrew,

Do you think this belongs in libcap? I figure it looks nice
sitting next to include/sys/capability.h... But can't
convince myself whether it's useful or not.

Signed-off-by: Serge Hallyn <serge@us.ibm.com>
Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
nclude/sys/securebits.h
bc60d255921dc33c1cc66d27ca4ce9977c865b1d 27-Dec-2009 Andrew G. Morgan <morgan@kernel.org> Update to latest kernel header 2.6.33.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
nclude/linux/capability.h
5dde8330c8c4036a30bc3a859d4d7e7afed34db0 27-Aug-2009 Andrew G. Morgan <morgan@kernel.org> Update kernel header to more recent version.

Also clean up header to avoid hackery - no longer needed apparently.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
nclude/linux/capability.h
nclude/sys/capability.h
60a0642c3175d9e5c798c9d7c37d91a22083ecd6 04-Dec-2008 Andrew G. Morgan <morgan@kernel.org> Stop using sed for parsing capability.h.

I've had a number of reports that some systems are using really
old versions of sed that don't honor the '\t' for tabs in rules.
Since perl does, we'll use that from here on.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
gitignore
akefile
makenames.c
deb35c718369bd4b454381d5e4c5d0bfa9a32234 11-Nov-2008 Andrew G. Morgan <morgan@kernel.org> Makefile tweaks mostly

add rule to build HTML
add LIBATTR=no makefile support for not including filesystem support
comment cleanup for cap_file.c.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
akefile
ap_file.c
d718c084e9f95b793d16a66788670610a37774f9 17-Oct-2008 Andrew G. Morgan <morgan@kernel.org> Another corner case not gracefully handled by cap_to_text.

This shows up when you try to run getpcaps on a system still
running with 32-bit capabilities. The output is very verbose for
a process with no capabilities. Now it yields '='.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
ap_text.c
ibcap.h
7f6da0520f432b3da828226ce54a4bec9d3e94e8 17-Oct-2008 Andrew G. Morgan <morgan@kernel.org> Make rules were not complete for compiling on unprepared systems.

Reported-by: Ulf GrĂ¼ne <ulf.gruene@t-online.de>
Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
akefile
3184213774c3fb3e467c7bea080a88f6b984b4e4 09-Oct-2008 Andrew G. Morgan <morgan@kernel.org> Remove support for kernel feature never implemented.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
ap_text.c
4f024fca1e1b882bc97bd178b806f8e39e7ce49f 11-Sep-2008 Andrew G. Morgan <morgan@kernel.org> Restore correct source location for <sys/capability.h>

Reported-by: Robby Workman <rworkman@slackware.com>
Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
akefile
915cd7369914bdab535363cfacb56046f5a1081c 10-Jul-2008 Andrew G. Morgan <morgan@kernel.org> Up to date with Linus' tree.

This change should not impact any code.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
nclude/linux/capability.h
2481202d5e1f94f6f8191e2a10d21730b4f5a135 08-Jul-2008 Andrew G. Morgan <morgan@kernel.org> Fix cap_copy_int(), add two functions cap_get_pid() and cap_compare()

Test new and old function with modified test.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
ap_extint.c
ap_flag.c
ap_proc.c
ap_text.c
nclude/sys/capability.h
ibcap.h
67703d39deb904531823ee4a9bb6d0c09644832e 06-Jul-2008 Andrew G. Morgan <morgan@kernel.org> Fix for Debian bugs 400591 & 487223: cap_copy_ext()

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=400591
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487223

Correct fix implemented as suggested by Matt.

Reported-by: Matt Kern <matt.kern@undue.org>
Reported-by: Torsten Werner <twerner@debian.org>
Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
ap_extint.c
e482cc22ad687f50882f0029ed4b9adebb01911c 30-Jun-2008 Andrew G. Morgan <morgan@kernel.org> Make text representation more readable.

When the most compact representation of a set
of capabilities involves displaying unnamed
capabilities (with numbers), folk find the output
unreadable. With this change, we make an attempt
to avoid ever printing numeric capabilities in
the common cases for capability sets.

Reported-by: Serge E. Hallyn <serue@us.ibm.com>
Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
ap_text.c
627d3a51359b2d526037c5d6fddd96d1edcd21c6 24-Jun-2008 Andrew G. Morgan <morgan@kernel.org> Leverage a different, more standard, location for xattr.h .

Reported-by: Lee Essen <lee.essen@owlsbarn.co.uk>
Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
ap_file.c
fe9965357926a1f95fcbd2dd33d86374c48caae5 03-Jun-2008 Andrew G. Morgan <morgan@kernel.org> Some makefile cleanups.

All the good parts of this change are Mike Frysinger's
<vapier@gentoo.org> work. Everything that is broken, is due to my
mangling of it.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
akefile
387f2f8dba29eddc7746eb4165ab50a517801ad7 29-May-2008 Hao Xu <hxunix@gmail.com> Make fixes.

Don't need to do -O2 twice.
Install the static library with the static libraries name(!)

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
akefile
d62769b6fc69244bd9922b018787d8bb7e332118 27-May-2008 Andrew G. Morgan <morgan@kernel.org> We're moving on to v3 capabilities, to overcome a header file snafu.

v3 capabilities are functionally equivalent to v2 capabilities, but
having a different magic value allow the kernel to warn about possibly
unsafe use of v2 capabilities.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
ap_alloc.c
ap_file.c
ap_text.c
nclude/linux/capability.h
ibcap.h
c5cf890d39d919cbdb9c9bc1420e25c206f62141 24-May-2008 Andrew G. Morgan <morgan@kernel.org> Drop dependency on current value of _LINUX_CAPABILITY_VERSION

Be more explicit with a local definition of _LIBCAP_CAPABILITY_* to
indicate the libraries preferred capability revision.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
ap_alloc.c
ap_flag.c
ap_proc.c
ibcap.h
bb286f00b4adffbb15db7bb288bdaca830cbb0b8 29-Apr-2008 Andrew G. Morgan <morgan@kernel.org> Clean up in preparation for next release.

Don't install non-existent man pages.
Update kernel header from latest 2.6.26 git tree.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
nclude/linux/capability.h
d175e8c66dc608f29d295279f02341e2ef1453a1 27-Apr-2008 Andrew G. Morgan <morgan@kernel.org> Revised numbers for the SECUREBITS prctl()s

Andrew Morton said:

The hitherto-invisible-to-me PR_GET_TSC and PR_SET_TSC have turned up in
mainline, so I have renumbered your prctl options to

/* Get/set securebits (as per security/commoncap.c) */
#define PR_GET_SECUREBITS 27
#define PR_SET_SECUREBITS 28

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
ibcap.h
fba4902800213c699320a26321613fcddb687b71 30-Mar-2008 Andrew G. Morgan <morgan@kernel.org> Add cap_clear_flag() function to clear one of the EIP capability flag vectors

This function makes modifying only one of E I and P sets easier.

cap_clear() = cap_clear_flag(,E) + cap_clear_flag(,I) + cap_clear_flag(,P)

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
ap_flag.c
nclude/sys/capability.h
3f7da3c2259741354f4e55105c466ae1443a0490 06-Mar-2008 Andrew G. Morgan <morgan@kernel.org> Address a bug manipulating 32-bit text representations of capabilities.

Reported separately by Serge and Chris Friedoff.
ap_text.c
6341ac712772d999192f5d6ec963126a2dc1f2d5 28-Feb-2008 Andrew G. Morgan <morgan@kernel.org> Revert "Add CAP_NS_OVERRIDE (34)."

This reverts commit 6f8418fa5e8a253970e317600cb963ff45fbe24e.

Serge says this was premature (and Andrew says my bad).
nclude/linux/capability.h
159fc80362a68a54ca72d1a0419975ac76333d4b 26-Feb-2008 Andrew G. Morgan <morgan@kernel.org> Add support for Kohei KaiGai's /sys/kernel/capability/ files.

This change adds support for checking for new capabilities in the
/sys/kernel/capability/{codes,names}/* files when the library wasn't
compiled with the latest capabilities.

Also update documentation for cap_from_text.3 to be more explicit
about how to free a libcap allocated string. (Bug reported by Serge.)

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
ap_text.c
b69f1683be9c544dd9119d509233135a71fc51ca 23-Feb-2008 Christian Wiese <morfoh@opensde.org> Fix libcap to build while using more than one make job

Fixes build issues while using more than one make job, assuring that
cap_names.h is generated before compiling cap_text.c.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
akefile
8d25537e776fe014f4071ec47911c4c3e2ab07c2 16-Feb-2008 Mike Frysinger <vapier@gentoo.org> Do not hard code toolchain binaries

If you are cross-compiling, you cannot execute `ar` and `ranlib` on the
target library, otherwise things may break. Here we create standard AR
and RANLIB variables which can easily be overridden by the environment.

Signed-off-by: Mike Frysinger <vapier@gentoo.org>
Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
akefile
b333cefe81cf665938bdbf70a0da4127f83e2527 16-Feb-2008 Mike Frysinger <vapier@gentoo.org> Do not run ldconfig for FAKEROOT installs

If you're installing into a temporary directory, then running ldconfig will
simply waste CPU and I/O time. The install location will not be any path
that ldconfig searches, and generally people build as non-root so the
ldconfig binary will run for a while before erroring out due to lack of
permissions.

Signed-off-by: Mike Frysinger <vapier@gentoo.org>
Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
akefile
180c70fe26629d04bc49d4d718214734ba3e82e4 16-Feb-2008 Mike Frysinger <vapier@gentoo.org> Add .gitignore files

Signed-off-by: Mike Frysinger <vapier@gentoo.org>
Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
gitignore
ab23780da4fe2011cd58992862fdca4d710de161 07-Feb-2008 Serge E. Hallyn <sergeh@us.ibm.com> Add CAP_NS_OVERRIDE (34).

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
Signed-off-by: Serge H. Hallyn <sergeh@us.ibm.com>
nclude/linux/capability.h
9fc4cbbeceac366c87d23597e3743f39e2a3a453 07-Feb-2008 Andrew G. Morgan <morgan@kernel.org> This is release 2.06.

Include copy of latest (2.6.24-mm1) capabiity.h file.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
nclude/linux/capability.h
7aff2edf61f96087e7ac47def97acb638bb7bca2 05-Feb-2008 Andrew G. Morgan <morgan@kernel.org> We don't need to export _cap_names[] any more.

I've added perfect hash generation support for looking
up names (if you have gperf installed).

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
akefile
makenames.c
ap_text.c
nclude/sys/capability.h
597369a007f20080e13ffbe3a4dfed38897c7edc 31-Jan-2008 Andrew G. Morgan <morgan@kernel.org> This commit fixes some text -> cap# mapping and works with securebits patch.
ap_text.c
c2a25909b2c4d989e49cdedcac4dd52c45f0570b 24-Jan-2008 Andrew G. Morgan <morgan@kernel.org> Fix malloc(size) but in capsh and numeric capabilities (for unnamed bits)

capsh allocated too little memory for the --inh argument - led to glibc
aborting with free().

libcap has always had latent support for identifying unnamed capabilities
with integers. It was untested (and therefore broken) prior to this commit.
Should be fixed now.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
ap_text.c
ibcap.h
c3f65b8566ae824931ed8799fad81c36a2f66537 21-Jan-2008 Andrew G. Morgan <morgan@kernel.org> Introduce a capability shell wrapper; capsh.

Capsh is a simple 'bash' wrapper program that can be used to
raise and lower both the bset and pI capabilities before invoking
/bin/bash (hardcoded right now).

The --print option can be used as a quick test whether various
capability manipulations work as expected (or not).

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
ibcap.h
907393e8d611fc887440d77335bc87adc0bed0bd 21-Jan-2008 Andrew G. Morgan <morgan@kernel.org> Introduce two new capability <-> text helper functions.

_cap_names was a really clumsy interface. With this
commit, we add cap_to_name() and cap_from_name() with
manual documentation too.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
ap_flag.c
ap_text.c
nclude/sys/capability.h
d7571cb19f4edbb30db6db63b0569d4056273a7f 31-Dec-2007 Andrew G. Morgan <morgan@kernel.org> Filesystem capabilities are only meaningful on regular files.

Do not support putting capabilies on symlinks and directories. You can
get around this with an older version of libcap, or using the raw
xattr API, but there is little point; the kernel only pays attention
to file capabilities when it exec()s a file.

Bug report: Chris Friedhoff
Suggested fix: Serge E. Hallyn
Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
ap_file.c
f88ecb591cfdce00e46780a2adba55009840cbe8 25-Dec-2007 Andrew G. Morgan <morgan@kernel.org> Fix for 32-bit filesystem capability support.

Fix a bug related to the unconditional size of the VFS capabilities.
Before, the size was based on the header used to compile the library,
now the default size is based on the process capabilities supported
by the running kernel.

Chris Friedhoff reported this bug.

Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
ap_file.c
c4086057b9e06400568602f0934a98ddaab068b4 03-Dec-2007 Casey Schaufler <casey@schaufler-ca.com> Allocate next two capabilities for MAC security modules.

This is used by the SMACK LSM module in the kernel > 2.6.24-rc3-mm1.
nclude/linux/capability.h
d26fa3e7407b24ddc297c97e17c712cb2bb59357 10-Nov-2007 Andrew Morgan <morgan@kernel.org> Prune kernel header and fix missing assignment (fixes from KaiGai Kohei)

- the kernel header doesn't need compiler.h included
+ patch submitted for upstream use.
- the cap_copy_int() function was missing a crucial assignment

Signed-off-by: Andrew Morgan <morgan@kernel.org>
ap_extint.c
nclude/linux/capability.h
f726d19d3e79b2858796b3f97dc603119f709de1 08-Nov-2007 Andrew Morgan <morgan@kernel.org> This is libcap-2.00.

This revision of libcap has support for 32-bit and 64-bit capabilities.
It also supports filesystem capabilities of both sizes.
ap_file.c
nclude/linux/capability.h
ibcap.h
32423d46c83c639c2df7db7ee74b8ec7be2b1234 01-Nov-2007 Andrew Morgan <morgan@kernel.org> Add support for 64-bit (file) capabilities

This should compile with any iteration of a recent (2.6) kernel.
If your kernel has 64-bit capabilities support, and the kernel
headers indicate this, then it will include that. 32-bit legacy
kernel support is dynamically performed by such a build of libcap.
ap_alloc.c
ap_extint.c
ap_file.c
ap_flag.c
ap_proc.c
ap_text.c
nclude/sys/capability.h
ibcap.h
aadd6fad3f09bd5abcaacf8618fb8093a5aa7ba8 14-Aug-2007 Andrew Morgan <morgan@kernel.org> Build with a pam_cap module.

Note, I've been confused about the capset/capget system calls.
It would seem that the current way(TM) is to get the raw API
from libc.
akefile
ap_sys.c
ed81ba2ae0fbcd36a6f10c2ed59984643a1778e7 22-Jul-2007 Andrew Morgan <morgan@kernel.org> Revived old setcap/getcap manual pages and added support for removing file caps
akefile
ap_file.c
7ad0c9424a86470cd62687c6666ad1c878de9393 20-Jul-2007 Andrew Morgan <morgan@kernel.org> Cleanup output; and permit setcap e value to be superset of ip.

This means one can say:

setcap "all=e cap_net_raw=p" ping

which is equivalent to

setcap "cap_net_raw=ep" ping
akefile
ap_file.c
ap_sys.c
462e9b5edb9b0f1defc14266abc888d6b85b1768 18-Jul-2007 Andrew Morgan <morgan@kernel.org> Add tentitive support for filesystem capabilities with 2.6.23-mm kernels
akefile
makenames.c
ap_file.c
ap_sys.c
nclude/sys/capability.h
9ce30db1047994f98b10a801b2b221ad178a5e0f 14-Aug-2007 Andrew Morgan <morgan@kernel.org> Don't need this any more.
ap_sys.c
dafaae69c0e72e2a3107c3e77b9badeb9354b999 14-Aug-2007 Andrew Morgan <morgan@kernel.org> Correct capset and capget system call invocations

They come from libc now.
akefile
afeec1d7c53a0f0bbe3b8f20338a5d0a28f2ede1 31-Jul-2007 Andrew Morgan <morgan@kernel.org> Enable compilation against more recent (2.6) kernel header files.

[Thanks to Joey Trungale for the bug report.]
ap_sys.c
e9d9058790d9ec1ab6b4eb5efa29c15a850a1ed6 18-Jul-2007 Andrew Morgan <morgan@kernel.org> Support for static library creation (libcap.a) + misc

Incorporate fixes from Red Hat rpm (1.10-25).
akefile
nclude/sys/capability.h
ec25bd9b420ab62bcc3ec709f467eb43d434b66d 11-Jul-2007 Andrew Morgan <morgan@kernel.org> Prepare for 1.95 release.
akefile
makenames.c
ap_alloc.c
ap_extint.c
ap_file.c
ap_flag.c
ap_proc.c
ap_sys.c
ap_text.c
nclude/sys/capability.h
ibcap.h
f9c44c45c23630bcf24135d7972a298aad5949ea 11-Jul-2007 Andrew Morgan <morgan@kernel.org> This is libcap-1.10

http://www.kernel.org/pub/linux/libs/security/linux-privs/kernel-2.2/libcap-1.10.tar.gz
ap_alloc.c
ap_text.c
nclude/sys/capability.h
ibcap.h
87185703a24b539be5aa08743b8308cdb6260358 11-Jul-2007 Andrew Morgan <morgan@kernel.org> This is libcap-1.03

http://www.kernel.org/pub/linux/libs/security/linux-privs/kernel-2.2/libcap-1.03.tar.gz
makenames.c
301d9231339864cade3e275426856c77e7f0cec2 11-Jul-2007 Andrew Morgan <morgan@kernel.org> This is libcap-1.02

http://www.kernel.org/pub/linux/libs/security/linux-privs/kernel-2.2/libcap-1.02.tar.gz
ap_proc.c
2153ffce3a55344869504792a7aaf365990cc3f0 11-Jul-2007 Andrew Morgan <morgan@kernel.org> This is libcap-1.01

http://www.kernel.org/pub/linux/libs/security/linux-privs/kernel-2.2/libcap-1.01.tar.gz
akefile
CS/Makefile,v
CS/_makenames.c,v
CS/cap_alloc.c,v
CS/cap_extint.c,v
CS/cap_file.c,v
CS/cap_flag.c,v
CS/cap_proc.c,v
CS/cap_sys.c,v
CS/cap_text.c,v
CS/libcap.h,v
makenames.c
ap_alloc.c
ap_extint.c
ap_file.c
ap_flag.c
ap_proc.c
ap_sys.c
ap_text.c
nclude/sys/RCS/capability.h,v
nclude/sys/capability.h
ibcap.h
7baf3be8302d9a7ba63c8c57131ecbc3fbd6d3eb 11-Jul-2007 Andrew Morgan <morgan@kernel.org> This is the source for libcap-1.0.tar.gz

http://www.kernel.org/pub/linux/libs/security/linux-privs/kernel-2.2/libcap-1.0.tar.gz
akefile
CS/Makefile,v
CS/_makenames.c,v
CS/cap_alloc.c,v
CS/cap_extint.c,v
CS/cap_file.c,v
CS/cap_flag.c,v
CS/cap_proc.c,v
CS/cap_sys.c,v
CS/cap_text.c,v
CS/libcap.h,v
makenames.c
ap_alloc.c
ap_extint.c
ap_file.c
ap_flag.c
ap_proc.c
ap_sys.c
ap_text.c
nclude/sys/RCS/capability.h,v
nclude/sys/capability.h
ibcap.h