Re: [libvirt] [PATCHv2 13/15] util: virSetUIDGIDWithCaps - change uid while keeping caps

2013-02-18 Thread Guido Günther
On Sat, Feb 16, 2013 at 05:53:05PM -0500, Laine Stump wrote: On 02/16/2013 12:20 AM, Doug Goldstein wrote: On Tue, Feb 12, 2013 at 2:15 PM, Laine Stump la...@laine.org wrote: Normally when a process' uid is changed to non-0, all the capabilities bits are cleared, even those explicitly set

Re: [libvirt] [PATCHv2 13/15] util: virSetUIDGIDWithCaps - change uid while keeping caps

2013-02-18 Thread Laine Stump
On 02/18/2013 10:09 AM, Guido Günther wrote: On Sat, Feb 16, 2013 at 05:53:05PM -0500, Laine Stump wrote: On 02/16/2013 12:20 AM, Doug Goldstein wrote: The following error bisect's down to this commit when running out of my local checkout for testing. 2013-02-16 05:16:55.102+: 29992:

Re: [libvirt] [PATCHv2 13/15] util: virSetUIDGIDWithCaps - change uid while keeping caps

2013-02-17 Thread Doug Goldstein
On Sat, Feb 16, 2013 at 4:53 PM, Laine Stump la...@laine.org wrote: On 02/16/2013 12:20 AM, Doug Goldstein wrote: On Tue, Feb 12, 2013 at 2:15 PM, Laine Stump la...@laine.org wrote: Normally when a process' uid is changed to non-0, all the capabilities bits are cleared, even those explicitly

Re: [libvirt] [PATCHv2 13/15] util: virSetUIDGIDWithCaps - change uid while keeping caps

2013-02-16 Thread Laine Stump
On 02/16/2013 12:20 AM, Doug Goldstein wrote: On Tue, Feb 12, 2013 at 2:15 PM, Laine Stump la...@laine.org wrote: Normally when a process' uid is changed to non-0, all the capabilities bits are cleared, even those explicitly set with calls to capng_update()/capng_apply() made immediately

Re: [libvirt] [PATCHv2 13/15] util: virSetUIDGIDWithCaps - change uid while keeping caps

2013-02-15 Thread Doug Goldstein
On Tue, Feb 12, 2013 at 2:15 PM, Laine Stump la...@laine.org wrote: Normally when a process' uid is changed to non-0, all the capabilities bits are cleared, even those explicitly set with calls to capng_update()/capng_apply() made immediately before setuid. And *after* the process' uid has

[libvirt] [PATCHv2 13/15] util: virSetUIDGIDWithCaps - change uid while keeping caps

2013-02-12 Thread Laine Stump
Normally when a process' uid is changed to non-0, all the capabilities bits are cleared, even those explicitly set with calls to capng_update()/capng_apply() made immediately before setuid. And *after* the process' uid has been changed, it no longer has the necessary privileges to add capabilities

Re: [libvirt] [PATCHv2 13/15] util: virSetUIDGIDWithCaps - change uid while keeping caps

2013-02-12 Thread Eric Blake
On 02/12/2013 01:15 PM, Laine Stump wrote: Normally when a process' uid is changed to non-0, all the capabilities bits are cleared, even those explicitly set with calls to capng_update()/capng_apply() made immediately before setuid. And *after* the process' uid has been changed, it no longer