The clone3_cap_checkpoint_restore.c selftest defined its own 'struct
libcap' to manually cast and manipulate the internal memory layout of
the opaque 'cap_t' type.

Starting with libcap v2.60 (commit aca076443591 "Make cap_t operations
thread safe"), a '__u8 mutex' was added to the beginning of the internal
'struct _cap_struct'. This structural shift breaks the selftest's custom
struct layout assumptions, causing capability corruption and leading to
failures during test execution.

Fix this by removing the custom struct definition and use the standard
cap_set_flag() API.

Fixes: 1d27a0be16d6 ("selftests: add clone3() CAP_CHECKPOINT_RESTORE test")
Signed-off-by: Yi Lai <[email protected]>
---
 .../clone3/clone3_cap_checkpoint_restore.c    | 20 ++++++-------------
 1 file changed, 6 insertions(+), 14 deletions(-)

diff --git a/tools/testing/selftests/clone3/clone3_cap_checkpoint_restore.c 
b/tools/testing/selftests/clone3/clone3_cap_checkpoint_restore.c
index e82281efa273..e9dbb95181ee 100644
--- a/tools/testing/selftests/clone3/clone3_cap_checkpoint_restore.c
+++ b/tools/testing/selftests/clone3/clone3_cap_checkpoint_restore.c
@@ -87,15 +87,13 @@ static int test_clone3_set_tid(struct __test_metadata 
*_metadata,
        return ret;
 }
 
-struct libcap {
-       struct __user_cap_header_struct hdr;
-       struct __user_cap_data_struct data[2];
-};
+#ifndef CAP_CHECKPOINT_RESTORE
+#define CAP_CHECKPOINT_RESTORE 40
+#endif
 
 static int set_capability(void)
 {
-       cap_value_t cap_values[] = { CAP_SETUID, CAP_SETGID };
-       struct libcap *cap;
+       cap_value_t cap_values[] = { CAP_SETUID, CAP_SETGID, 
CAP_CHECKPOINT_RESTORE };
        int ret = -1;
        cap_t caps;
 
@@ -111,14 +109,8 @@ static int set_capability(void)
                goto out;
        }
 
-       cap_set_flag(caps, CAP_EFFECTIVE, 2, cap_values, CAP_SET);
-       cap_set_flag(caps, CAP_PERMITTED, 2, cap_values, CAP_SET);
-
-       cap = (struct libcap *) caps;
-
-       /* 40 -> CAP_CHECKPOINT_RESTORE */
-       cap->data[1].effective |= 1 << (40 - 32);
-       cap->data[1].permitted |= 1 << (40 - 32);
+       cap_set_flag(caps, CAP_EFFECTIVE, 3, cap_values, CAP_SET);
+       cap_set_flag(caps, CAP_PERMITTED, 3, cap_values, CAP_SET);
 
        if (cap_set_proc(caps)) {
                perror("cap_set_proc");
-- 
2.43.0


Reply via email to