public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: Michael Tremer <michael.tremer@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: [PATCH] libcap: Update to version 2.61
Date: Sun, 28 Nov 2021 12:02:38 +0000	[thread overview]
Message-ID: <C0D48100-3C5B-42C0-B43A-267AC50CF623@ipfire.org> (raw)
In-Reply-To: <20211127133555.3522239-1-adolf.belka@ipfire.org>

[-- Attachment #1: Type: text/plain, Size: 13431 bytes --]

Reviewed-by: Michael Tremer <michael.tremer(a)ipfire.org>

> On 27 Nov 2021, at 13:35, Adolf Belka <adolf.belka(a)ipfire.org> wrote:
> 
> - Update from 2.50 to 2.61
> - Update of rootfile
> - Changelog
>  Release notes for 2.61
>    Better error handling of the numerical arguments for capsh and setcap.
>        Reported by meitingli with some bug de-duping help from Artem S. Tashkinov (Bugs 214909, 214911)
>    Fix executable mode for all of the .so files. There were two situations where this was failing (with a hard to debug SIGSEGV inside libc). Bugs reported by Sam James. Both the same solution related to stack alignment and use of SSE instructions:
>        glibc and the 32-bit x86 mode (Gentoo bug 820071)
>        musl runtime library for 64-bit x86 code (Bug 215009)
>    Added an example of a shared library object with its own file capability.
>        It demonstrates how to give a shared library a file capability and offer it as a linkable privileged API service to an otherwise unprivileged binary.
>    Fix the top-level include for Make.Rules in the contrib/sucap example application
>    Add support for running constructors at libcap.so start up time when running as stand alone binary.
>        This enables the binary executable to print out some dynamically generated content when given the --summary argument.
>  Release notes for 2.60
>    Some build, code linting fixes, the addition of the cap_fill_flag() API and a memory latency optimization contributed by Google (Bugs: 214579 214601 214599)
>    General improvement in thread safety for libcap and cap package (Bug: 214715)
>    Minor API change replacing libcap:cap_launch_*() void returning functions with int + errno status returns.
>        This should be backwardly compatible for code.
>    Added a cap_iab_dup(), and (*cap.IAB).Dup() to API.
>        Fixed (*cap.IAB).Fill() which was previously malfunctioning for certain Inh and Amb copies.
>    New features for capsh
>        --quiet can be used to suppress the start up check that the local libcap is modern enough to name all of the capabilities known to the hosting kernel
>        Added -+ and =+ arguments. These are fork+exec equivalents to -- and == respectively (that use the cap_launch API).
>  Release notes for 2.59
>    libcap-2.55 ... 2.58 would SIGSEGV if an operation was attempted on a NULL value for cap_t or cap_iab_t. Restore the more tolerant error return behavior last seen with libcap-2.54. (Bug 214525)
>    More make -j13 fixes (missing dependency for make -C progs sudotest).
>    Various minor documentation fixes.
>  Release notes for 2.58
>    Fixed a potential libcap memory leak by adding a destructor (Bug 214373 reported by yan12125)
>    Major improvement is that there is a path for Linux-PAM compliant applications to support setting Ambient vector Capabilities via pam_cap.so now (Bug 214377)
>        In addition to the bug, related discussion is in two Github issues: https://github.com/shadow-maint/shadow/pull/408#issuecomment-919673098 and https://github.com/rra/pam-krb5/issues/21
>    Added support for RPM builds that generate the build-id that RPM expects (see https://github.com/rpm-software-management/rpm/issues/367 for discussion)
>    Minor contrib/sucap/su.c cleanups
>    Clean up kdebug build rules
>    More documentation cleanup
>  Release notes for 2.57
>    capsh enhancements:
>        --mode makes a guess at the libcap mode of the current process (Bug 214319)
>        --strict makes capsh less permissive and expects the user to perform more deliberate capability transactions
>            useful for learning all the steps; and helps this article be more pedagogical.
>    Build system fixes
>        Preserve $(WARNINGS) (Fix from David Seifert)
>        Don't ever build test binaries unless make test etc is invoked (speeds builds on slower systems)
>        Support make -j12 for all, test and sudotest targets
>    getcap -r / now generates readable output (Bug 214317)
>    Some documentation cleanup: more consistency.
>  Release notes for 2.56
>    Canonicalize the Makefile use (in collaboration with David Seifert)
>        In the process fixed a bug in pam_cap/test_pam_cap (reported by David Seifert, Bug 214257)
>    Doc fixes for cap_iab.3
>    Added color support to captree, which helped make the following fix generate readable output:
>        Fixed captree to not display duplicate copies of sub-trees if also exploring their ancestor (Bug 214269)
>    Fixed contrib/sucap/su to correctly handle the Inheritable flag.
>  Release notes for 2.55
>    Two rounds of fixes for the results of some static analysis performed by Zoltan Fridrich
>    Removed a clang compilation warning about memory allocation by rewriting the way cap_free() and the various libcap memory allocation mechanisms work. (Bug 214183)
>        This generated a few broken builds until it was fixed.
>    Cleanup of some man pages; some fixes and shorter URL to bugzilla link.
>    Added libcap cap_proc_root() API function (to reach parity with the Go cap package).
>        This is only potentially useful with the recently added cap_iab_get_pid() function
>    Revamped what the GOLANG=yes builds install - used to install local copies of cap and psx, but these were effectively useless because of the Go module support in recent Go releases in favor of user controller GOPATH.
>        Now make GOLANG=yes only installs the captree utility
>        Added some features to captree and created a small article on it
>        Added a man page for the captree utility
>    Some small changes to the tests to account for the idiosyncrasies of some new testing environments I've accumulated.
>        Included adding --has-b support to capsh
>  Release notes for 2.54
>    Fix for a corner case infinite loop handling long strings (patch provided by Samanta Navarro)
>    Fixes to not ignore allocation failures (patch provided by Samanta Navarro)
>    Evolving work from Samanta Navarro, found and fixed a memory leak in cap_iab_get_proc()
>    More robust discovery of the name of the dynamic loader of the build target (patch provided by Arnout Vandecappelle)
>    Revamped the Go capability comparison API for *cap.Set and *cap.IAB: (x).Cf(), and added cap.IABGetPID()
>    Added libcap cap_iab_compare() and cap_iab_get_pid() APIs.
>    Added a Go utility, captree, to display the process (and thread) graph along with the POSIX.1e and IAB capabilities of each PID{TID} tree.
>        Extended getpcaps to support the --iab command line argument, which outputs a PID's IAB tuple too (if non-default).
>    Install *.so files as executable now that they are executable as binaries
>        A feature of 2.52 but not extended to install rules at that time.
>    Absorbed a lot of wisdom from a number of downstream package workarounds including wisdom from (Zhi Li and Arnout Vandecappelle and unknown others... Bugs 214023#c16, 214085)
>        Support make FORCELINKPAM=yes or make FORCELINKPAM=no for those packagers that feel strongly about not letting this be dynamically discovered at build time.
>    Fixed a compiler warnings from the GitHub build tester (Bug 214143)
>  Release notes for 2.53
>    The (C) cap_launch functionality was previously broken when launches failed (found and fixed by Samanta Navarro)
>        Added a test case for this too.
>    Lots of tyops fixed in code and documentation (also by Samanta Navarro)
>    Support distributions that aggressively link shared objects (reported by David Runge; Bug 214023)
>        These distributions failed to observe a runnable pam_cap.so and various make options failed.
>    Support clang builds (again). (Reported by Johan Herland 214047)
>        This used to work, but by accident. It broke with the advent of a runnable libcap.so , libpsx.so and pam_cap.so support. Fixed now, and added a build target to validate it still works at release time.
>    Minor documentation updates including one for Slavi Marinov who was trying to get cap.LaunchFunc() to work.
>        Worked up a couple of example modifications to goapps/web to demonstrate a different user per web query and enabling a custom chroot per web query.
>  Release notes for 2.52
>    Revived -std=c89 compilation for make all etc. (Bug 213541 reported by Byron Stanoszek.)
>    The shared library objects: pam_cap.so, libcap.so and libpsx.so, are all now runnable as standalone binaries!
>        The support is used to display some description information.
>        To activate it, these binaries need to be installed executable (chmod +x ...)
>        We also provided a write-up of how to enable this sort of feature in other .so files here.
>    The module pam_cap.so now contains support for a default=<IAB> module argument. (Bug 213611).
>    Enhanced capsh --suggest to also compare against the capability value names and not just their descriptions.
>    Added capsh --current support.
>    Minor documentation updates.
>    Added a contrib/sucap/su.c pure-capabilities PAM implementation of su.
>        This is primarily to demonstrate that such a thing is possible, and to validate that the pam_cap.so module is capable of adding any IAB tuple of inheritables per group or user.
>        At this time, it relies on features only present in this version of libcap and HEAD of the Linux-PAM sources for the pam_unix.so module.
>  Release notes for 2.51
>    Fix capsh installation (Bug 213261 - reported by Jan Palus)
>    Add an autoauth module flag to pam_cap.so (Bug 213279 - noted a feature request hidden in StackExchange)
>    Unified libcap/cap (Go) and libcap (C) default generation of external format binary data (Bug 213375 - addressing an issue raised by Mike Schilling)
>        This standard binary format should be forwards/backwards compatible with earlier libcap2 builds and libcap/cap packages
>    API enhancement cap_fill() and (*cap.Set).Fill() - to permit copying one capability flag to another.
>        This can be used to raise all the Permitted capabilities in a Set with one API call.
>    In tree build/run/test of Go packages now uses Go module vendoring (Bug 212453).
>        This is with an eye to the imminent golang change removing support for GOPATH based building.
>    Minor compilation warning fixes
> 
> Signed-off-by: Adolf Belka <adolf.belka(a)ipfire.org>
> ---
> config/rootfiles/common/libcap | 10 ++++++++--
> lfs/libcap                     |  7 +++----
> 2 files changed, 11 insertions(+), 6 deletions(-)
> 
> diff --git a/config/rootfiles/common/libcap b/config/rootfiles/common/libcap
> index def30cb5a..c33222c49 100644
> --- a/config/rootfiles/common/libcap
> +++ b/config/rootfiles/common/libcap
> @@ -1,10 +1,10 @@
> #lib/libcap.a
> lib/libcap.so.2
> -lib/libcap.so.2.50
> +lib/libcap.so.2.61
> #lib/libpsx.a
> #lib/libpsx.so
> #lib/libpsx.so.2
> -#lib/libpsx.so.2.50
> +#lib/libpsx.so.2.61
> #lib/pkgconfig/libcap.pc
> #lib/pkgconfig/libpsx.pc
> lib/security/pam_cap.so
> @@ -23,6 +23,8 @@ usr/lib/libcap.so
> #usr/share/man/man3/cap_copy_int.3
> #usr/share/man/man3/cap_drop_bound.3
> #usr/share/man/man3/cap_dup.3
> +#usr/share/man/man3/cap_fill.3
> +#usr/share/man/man3/cap_fill_flag.3
> #usr/share/man/man3/cap_free.3
> #usr/share/man/man3/cap_from_name.3
> #usr/share/man/man3/cap_from_text.3
> @@ -36,8 +38,11 @@ usr/lib/libcap.so
> #usr/share/man/man3/cap_get_proc.3
> #usr/share/man/man3/cap_get_secbits.3
> #usr/share/man/man3/cap_iab.3
> +#usr/share/man/man3/cap_iab_compare.3
> +#usr/share/man/man3/cap_iab_dup.3
> #usr/share/man/man3/cap_iab_fill.3
> #usr/share/man/man3/cap_iab_from_text.3
> +#usr/share/man/man3/cap_iab_get_pid.3
> #usr/share/man/man3/cap_iab_get_proc.3
> #usr/share/man/man3/cap_iab_get_vector.3
> #usr/share/man/man3/cap_iab_init.3
> @@ -73,6 +78,7 @@ usr/lib/libcap.so
> #usr/share/man/man3/psx_syscall.3
> #usr/share/man/man3/psx_syscall3.3
> #usr/share/man/man3/psx_syscall6.3
> +#usr/share/man/man8/captree.8
> #usr/share/man/man8/getcap.8
> #usr/share/man/man8/getpcaps.8
> #usr/share/man/man8/setcap.8
> diff --git a/lfs/libcap b/lfs/libcap
> index 610ff474b..387d43e38 100644
> --- a/lfs/libcap
> +++ b/lfs/libcap
> @@ -24,7 +24,7 @@
> 
> include Config
> 
> -VER        = 2.50
> +VER        = 2.61
> 
> THISAPP    = libcap-$(VER)
> DL_FILE    = $(THISAPP).tar.xz
> @@ -40,7 +40,7 @@ objects = $(DL_FILE)
> 
> $(DL_FILE) = $(DL_FROM)/$(DL_FILE)
> 
> -$(DL_FILE)_MD5 = 66a561afa81666236ff973544ff4e864
> +$(DL_FILE)_MD5 = 3bf105e47a8671035a0ce0812185c5e4
> 
> install : $(TARGET)
> 
> @@ -70,13 +70,12 @@ $(subst %,%_MD5,$(objects)) :
> $(TARGET) : $(patsubst %,$(DIR_DL)/%,$(objects))
> 	@$(PREBUILD)
> 	@rm -rf $(DIR_APP) && cd $(DIR_SRC) && tar axf $(DIR_DL)/$(DL_FILE)
> -	cd $(DIR_APP) && patch -Np1 -i $(DIR_SRC)/src/patches/libcap-2.50-install_capsh_again.patch
> 	# Prevent a static library from being installed
> 	cd $(DIR_APP) && sed -i '/install.*STALIBNAME/d' libcap/Makefile
> 	cd $(DIR_APP) && make GOLANG=no
> 	cd $(DIR_APP) && make install GOLANG=no
> 	rm -vf /lib/libcap.so
> -	ln -svf /lib/libcap.so.2.50 /usr/lib/libcap.so
> +	ln -svf /lib/libcap.so.2.61 /usr/lib/libcap.so
> 	chmod +x /lib/libcap.so.*
> 	@rm -rf $(DIR_APP)
> 	@$(POSTBUILD)
> -- 
> 2.34.0
> 


      reply	other threads:[~2021-11-28 12:02 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-11-27 13:35 Adolf Belka
2021-11-28 12:02 ` Michael Tremer [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=C0D48100-3C5B-42C0-B43A-267AC50CF623@ipfire.org \
    --to=michael.tremer@ipfire.org \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox