|
@@ -325,27 +325,47 @@ bool has_capability(struct task_struct *t, int cap)
|
|
|
}
|
|
|
|
|
|
/**
|
|
|
- * has_capability_noaudit - Does a task have a capability (unaudited)
|
|
|
+ * has_ns_capability_noaudit - Does a task have a capability (unaudited)
|
|
|
+ * in a specific user ns.
|
|
|
* @t: The task in question
|
|
|
+ * @ns: target user namespace
|
|
|
* @cap: The capability to be tested for
|
|
|
*
|
|
|
* Return true if the specified task has the given superior capability
|
|
|
- * currently in effect to init_user_ns, false if not. Don't write an
|
|
|
- * audit message for the check.
|
|
|
+ * currently in effect to the specified user namespace, false if not.
|
|
|
+ * Do not write an audit message for the check.
|
|
|
*
|
|
|
* Note that this does not set PF_SUPERPRIV on the task.
|
|
|
*/
|
|
|
-bool has_capability_noaudit(struct task_struct *t, int cap)
|
|
|
+bool has_ns_capability_noaudit(struct task_struct *t,
|
|
|
+ struct user_namespace *ns, int cap)
|
|
|
{
|
|
|
int ret;
|
|
|
|
|
|
rcu_read_lock();
|
|
|
- ret = security_capable_noaudit(__task_cred(t), &init_user_ns, cap);
|
|
|
+ ret = security_capable_noaudit(__task_cred(t), ns, cap);
|
|
|
rcu_read_unlock();
|
|
|
|
|
|
return (ret == 0);
|
|
|
}
|
|
|
|
|
|
+/**
|
|
|
+ * has_capability_noaudit - Does a task have a capability (unaudited) in the
|
|
|
+ * initial user ns
|
|
|
+ * @t: The task in question
|
|
|
+ * @cap: The capability to be tested for
|
|
|
+ *
|
|
|
+ * Return true if the specified task has the given superior capability
|
|
|
+ * currently in effect to init_user_ns, false if not. Don't write an
|
|
|
+ * audit message for the check.
|
|
|
+ *
|
|
|
+ * Note that this does not set PF_SUPERPRIV on the task.
|
|
|
+ */
|
|
|
+bool has_capability_noaudit(struct task_struct *t, int cap)
|
|
|
+{
|
|
|
+ return has_ns_capability_noaudit(t, &init_user_ns, cap);
|
|
|
+}
|
|
|
+
|
|
|
/**
|
|
|
* capable - Determine if the current task has a superior capability in effect
|
|
|
* @cap: The capability to be tested for
|