From: "Michael Kerrisk (man-pages)" <mtk.manpages@gmail.com>
To: mtk.manpages@gmail.com, Andrew Morgan <morgan@kernel.org>
Cc: linux-security-module@vger.kernel.org
Subject: [PATCH 4/4] cap_get_proc.3: change "current process" to "calling process"
Date: Wed, 10 Jun 2020 08:57:35 +0200 [thread overview]
Message-ID: <20200610065735.3975740-4-mtk.manpages@gmail.com> (raw)
In-Reply-To: <20200610065735.3975740-1-mtk.manpages@gmail.com>
The term "current process" is kernel-developer speak that is often not
understood by user-space programmers. Change to "calling process",
which is clearer.
Signed-off-by: Michael Kerrisk (man-pages) <mtk.manpages@gmail.com>
---
doc/cap_get_proc.3 | 20 ++++++++++----------
1 file changed, 10 insertions(+), 10 deletions(-)
diff --git a/doc/cap_get_proc.3 b/doc/cap_get_proc.3
index 0238601..b0a61d1 100644
--- a/doc/cap_get_proc.3
+++ b/doc/cap_get_proc.3
@@ -89,7 +89,7 @@ file.
with a
.I cap
as an argument returns the current value of this bounding set
-capability flag in effect for the current process. This operation is
+capability flag in effect for the calling process. This operation is
unprivileged. Note, a macro function
.BR "CAP_IS_SUPPORTED(cap_value_t " cap )
is provided that evaluates to true (1) if the system supports the
@@ -122,11 +122,11 @@ capability set must have a raised
.BR CAP_SETPCAP .
Further, to raise a specific ambient capability the
.IR inheritable " and " permitted
-sets of the current process must contain the specified capability, and
+sets of the calling process must contain the specified capability, and
raised ambient bits will only be retained as long as this remains true.
.PP
.BR cap_reset_ambient ()
-resets all of the ambient capabilities for the current process to
+resets all of the ambient capabilities for the calling process to
their lowered value. To complete successfully, the prevailing
.I effective
capability set must have a raised
@@ -139,12 +139,12 @@ changes to the inheritable set by the program code without explicitly
fixing up the ambient set can also drop ambient bits.
.PP
.BR cap_get_secbits ()
-returns the securebits of the current process. These bits affect the
-way in which the current process implements things like setuid-root
+returns the securebits of the calling process. These bits affect the
+way in which the calling process implements things like setuid-root
fixup and ambient capabilities.
.PP
.BR cap_set_secbits ()
-attempts to modify the securebits of the current process. Note
+attempts to modify the securebits of the calling process. Note
.B CAP_SETPCAP
must be in the effective capability set for this to be effective. Some
settings lock the sub-states of the securebits, so attempts to set values
@@ -274,13 +274,13 @@ attempts to set the capabilities of some other process(es),
If
.I pid
is positive it refers to a specific process; if it is zero, it refers
-to the current process; \-1 refers to all processes other than the
-current process and process '1' (typically
+to the calling process; \-1 refers to all processes other than the
+calling process and process '1' (typically
.BR init (8));
other negative values refer to the
.I \-pid
process group. In order to use this function, the kernel must support
-it and the current process must have
+it and the calling process must have
.B CAP_SETPCAP
raised in its Effective capability set. The capabilities set in the
target process(es) are those contained in
@@ -288,7 +288,7 @@ target process(es) are those contained in
Kernels that support filesystem capabilities redefine the semantics of
.B CAP_SETPCAP
and on such systems this function will always fail for any target not
-equal to the current process.
+equal to the calling process.
.BR capsetp ()
returns zero for success, and \-1 on failure.
--
2.26.2
next prev parent reply other threads:[~2020-06-10 6:57 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-06-10 6:57 [PATCH 1/4] cap_get_proc.3: Typo fixes Michael Kerrisk (man-pages)
2020-06-10 6:57 ` [PATCH 2/4] cap_get_proc.3: for cap_get_pid(), pid==0 means "the calling process" Michael Kerrisk (man-pages)
2020-06-10 6:57 ` [PATCH 3/4] getpcaps.8: Note that pid==0 displays capabilities of getpcaps itself Michael Kerrisk (man-pages)
2020-06-10 6:57 ` Michael Kerrisk (man-pages) [this message]
2020-06-11 15:59 ` [PATCH 4/4] cap_get_proc.3: change "current process" to "calling process" Andrew G. Morgan
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200610065735.3975740-4-mtk.manpages@gmail.com \
--to=mtk.manpages@gmail.com \
--cc=linux-security-module@vger.kernel.org \
--cc=morgan@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).