diff options
| author | Eric Paris <eparis@redhat.com> | 2012-01-03 12:25:15 -0500 | 
|---|---|---|
| committer | Eric Paris <eparis@redhat.com> | 2012-01-05 18:52:56 -0500 | 
| commit | 25e75703410a84b80623da3653db6b70282e5c6a (patch) | |
| tree | 83a5737f243ec6f95271e622fbde4c77b7ccba9f /kernel | |
| parent | 2920a8409de5a51575d03deca07e5bb2be6fc98d (diff) | |
| download | olio-linux-3.10-25e75703410a84b80623da3653db6b70282e5c6a.tar.xz olio-linux-3.10-25e75703410a84b80623da3653db6b70282e5c6a.zip  | |
capabilities: call has_ns_capability from has_capability
Declare the more specific has_ns_capability first in the code and then call it
from has_capability.  The declaration reversal isn't stricty necessary since
they are both declared in header files, but it just makes sense to put more
specific functions first in the code.
Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by: Serge E. Hallyn <serge.hallyn@canonical.com>
Diffstat (limited to 'kernel')
| -rw-r--r-- | kernel/capability.c | 26 | 
1 files changed, 10 insertions, 16 deletions
diff --git a/kernel/capability.c b/kernel/capability.c index ff50ab62cfc..fb815d1b9ea 100644 --- a/kernel/capability.c +++ b/kernel/capability.c @@ -287,47 +287,41 @@ error:  }  /** - * has_capability - Does a task have a capability in init_user_ns + * has_ns_capability - Does a task have a capability in a specific user ns   * @t: The task in question + * @ns: target user namespace   * @cap: The capability to be tested for   *   * Return true if the specified task has the given superior capability - * currently in effect to the initial user namespace, false if not. + * currently in effect to the specified user namespace, false if not.   *   * Note that this does not set PF_SUPERPRIV on the task.   */ -bool has_capability(struct task_struct *t, int cap) +bool has_ns_capability(struct task_struct *t, +		       struct user_namespace *ns, int cap)  {  	int ret;  	rcu_read_lock(); -	ret = security_capable(__task_cred(t), &init_user_ns, cap); +	ret = security_capable(__task_cred(t), ns, cap);  	rcu_read_unlock();  	return (ret == 0);  }  /** - * has_capability - Does a task have a capability in a specific user ns + * has_capability - Does a task have a capability in init_user_ns   * @t: The task in question - * @ns: target user namespace   * @cap: The capability to be tested for   *   * Return true if the specified task has the given superior capability - * currently in effect to the specified user namespace, false if not. + * currently in effect to the initial user namespace, false if not.   *   * Note that this does not set PF_SUPERPRIV on the task.   */ -bool has_ns_capability(struct task_struct *t, -		       struct user_namespace *ns, int cap) +bool has_capability(struct task_struct *t, int cap)  { -	int ret; - -	rcu_read_lock(); -	ret = security_capable(__task_cred(t), ns, cap); -	rcu_read_unlock(); - -	return (ret == 0); +	return has_ns_capability(t, &init_user_ns, cap);  }  /**  |