Skip to content

Commit

Permalink
capabilities: call has_ns_capability from has_capability
Browse files Browse the repository at this point in the history
Declare the more specific has_ns_capability first in the code and then call it
from has_capability.  The declaration reversal isn't stricty necessary since
they are both declared in header files, but it just makes sense to put more
specific functions first in the code.

Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by: Serge E. Hallyn <serge.hallyn@canonical.com>
  • Loading branch information
Eric Paris committed Jan 5, 2012
1 parent 2920a84 commit 25e7570
Showing 1 changed file with 10 additions and 16 deletions.
26 changes: 10 additions & 16 deletions kernel/capability.c
Original file line number Diff line number Diff line change
Expand Up @@ -287,47 +287,41 @@ SYSCALL_DEFINE2(capset, cap_user_header_t, header, const cap_user_data_t, data)
}

/**
* has_capability - Does a task have a capability in init_user_ns
* has_ns_capability - Does a task have a capability in a specific user ns
* @t: The task in question
* @ns: target user namespace
* @cap: The capability to be tested for
*
* Return true if the specified task has the given superior capability
* currently in effect to the initial user namespace, false if not.
* currently in effect to the specified user namespace, false if not.
*
* Note that this does not set PF_SUPERPRIV on the task.
*/
bool has_capability(struct task_struct *t, int cap)
bool has_ns_capability(struct task_struct *t,
struct user_namespace *ns, int cap)
{
int ret;

rcu_read_lock();
ret = security_capable(__task_cred(t), &init_user_ns, cap);
ret = security_capable(__task_cred(t), ns, cap);
rcu_read_unlock();

return (ret == 0);
}

/**
* has_capability - Does a task have a capability in a specific user ns
* has_capability - Does a task have a capability in init_user_ns
* @t: The task in question
* @ns: target user namespace
* @cap: The capability to be tested for
*
* Return true if the specified task has the given superior capability
* currently in effect to the specified user namespace, false if not.
* currently in effect to the initial user namespace, false if not.
*
* Note that this does not set PF_SUPERPRIV on the task.
*/
bool has_ns_capability(struct task_struct *t,
struct user_namespace *ns, int cap)
bool has_capability(struct task_struct *t, int cap)
{
int ret;

rcu_read_lock();
ret = security_capable(__task_cred(t), ns, cap);
rcu_read_unlock();

return (ret == 0);
return has_ns_capability(t, &init_user_ns, cap);
}

/**
Expand Down

0 comments on commit 25e7570

Please sign in to comment.