Quoting Geert Uytterhoeven ([email protected]): > On Wed, 16 Sep 2009, Subrata Modak wrote: > > On Tue, 2009-09-15 at 14:53 -0700, Matt Helsley wrote: > > > On Tue, Sep 15, 2009 at 05:30:55PM +0200, Geert Uytterhoeven wrote: > > > > - As of 2.6.24, `capability' can no longer be a module, > > > > - As of 2.6.27, CONFIG_SECURITY_CAPABILITIES no longer exists. > > > > > > > > Signed-off-by: Geert Uytterhoeven <[email protected]> > > > > --- > > > > .../kernel/security/filecaps/checkforfilecaps.sh | 3 +-- > > > > 1 files changed, 1 insertions(+), 2 deletions(-) > > > > > > > > diff --git a/testcases/kernel/security/filecaps/checkforfilecaps.sh > > > > b/testcases/kernel/security/filecaps/checkforfilecaps.sh > > > > index 20f97f5..3f6a4ec 100755 > > > > --- a/testcases/kernel/security/filecaps/checkforfilecaps.sh > > > > +++ b/testcases/kernel/security/filecaps/checkforfilecaps.sh > > > > @@ -23,8 +23,7 @@ check_simple_capset > > > > ret=$? > > > > if [ $ret -ne 0 ]; then > > > > echo Posix capabilities not compiled into the kernel. Please > > > > - echo modprobe capability or recompile your kernel with > > > > - echo CONFIG_SECURITY_CAPABILITIES=y. > > > > + echo recompile your kernel with > > > > CONFIG_SECURITY_FILE_CAPABILITIES=y. > > > > > > Then the advice is incorrect for older kernels. If LTP should still run > > > nicely for users of older kernels then perhaps something like this is > > > better: > > > > > > - echo modprobe capability or recompile your kernel with > > > - echo CONFIG_SECURITY_CAPABILITIES=y. > > > + if tst_kvercmp 2 6 24 ; then > > > + echo modprobe capability or recompile your kernel with > > > + echo CONFIG_SECURITY_CAPABILITIES=y. > > > + elif tst_kvercmp 2 6 27 ; then > > > + echo recompile your kernel with CONFIG_SECURITY_CAPABILITIES=y. > > > + else > > > + echo recompile your kernel with > > > CONFIG_SECURITY_FILE_CAPABILITIES=y. > > > + fi > > > > Yes, this is better. Please shoot off a patch. > > At your service! > > --- > >From 0e13026c931d26393671884f63446b7389318b27 Mon Sep 17 00:00:00 2001 > From: Geert Uytterhoeven <[email protected]> > Date: Tue, 15 Sep 2009 17:06:09 +0200 > Subject: [PATCH 9/9] Filecaps: Update error message for recent kernels > > - As of 2.6.24, `capability' can no longer be a module, > - As of 2.6.27, CONFIG_SECURITY_CAPABILITIES no longer exists. > > Signed-off-by: Geert Uytterhoeven <[email protected]> > -- > v2: Make the message dependent on the kernel version, as suggested by Matt > Helsley > --- > .../kernel/security/filecaps/checkforfilecaps.sh | 10 ++++++++-- > 1 files changed, 8 insertions(+), 2 deletions(-) > > diff --git a/testcases/kernel/security/filecaps/checkforfilecaps.sh > b/testcases/kernel/security/filecaps/checkforfilecaps.sh > index 20f97f5..5ca385e 100755 > --- a/testcases/kernel/security/filecaps/checkforfilecaps.sh > +++ b/testcases/kernel/security/filecaps/checkforfilecaps.sh > @@ -23,8 +23,14 @@ check_simple_capset > ret=$? > if [ $ret -ne 0 ]; then > echo Posix capabilities not compiled into the kernel. Please > - echo modprobe capability or recompile your kernel with > - echo CONFIG_SECURITY_CAPABILITIES=y. > + if tst_kvercmp 2 6 24 ; then > + echo modprobe capability or recompile your kernel with > + echo CONFIG_SECURITY_CAPABILITIES=y. > + elif tst_kvercmp 2 6 27 ; then > + echo recompile your kernel with CONFIG_SECURITY_CAPABILITIES=y. > + else > + echo recompile your kernel with > CONFIG_SECURITY_FILE_CAPABILITIES=y.
I don't think splitting these last two up is necessary - the CONFIG_SECURITY_FILE_CAPABILITIES check is in the next stanza in checkforfilecaps.sh. This check is only for CONFIG_SECURITY_CAPABILITIES itself. > + fi > exit 1 > fi -serge ------------------------------------------------------------------------------ Come build with us! The BlackBerry® Developer Conference in SF, CA is the only developer event you need to attend this year. Jumpstart your developing skills, take BlackBerry mobile applications to market and stay ahead of the curve. Join us from November 9-12, 2009. Register now! http://p.sf.net/sfu/devconf _______________________________________________ Ltp-list mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/ltp-list
