diff options
author | Eric W. Biederman <ebiederm@xmission.com> | 2011-11-17 04:32:59 -0500 |
---|---|---|
committer | Eric W. Biederman <ebiederm@xmission.com> | 2012-04-26 05:00:59 -0400 |
commit | 783291e6900292521a3895583785e0c04a56c5b3 (patch) | |
tree | 9dd368a25ea61b5913646b1d93ec99e865c058ba /security | |
parent | 7b44ab978b77a91b327058a0f4db7e6fcdb90b92 (diff) |
userns: Simplify the user_namespace by making userns->creator a kuid.
- Transform userns->creator from a user_struct reference to a simple
kuid_t, kgid_t pair.
In cap_capable this allows the check to see if we are the creator of
a namespace to become the classic suser style euid permission check.
This allows us to remove the need for a struct cred in the mapping
functions and still be able to dispaly the user namespace creators
uid and gid as 0.
- Remove the now unnecessary delayed_work in free_user_ns.
All that is left for free_user_ns to do is to call kmem_cache_free
and put_user_ns. Those functions can be called in any context
so call them directly from free_user_ns removing the need for delayed work.
Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
Diffstat (limited to 'security')
-rw-r--r-- | security/commoncap.c | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/security/commoncap.c b/security/commoncap.c index 435d074853f3..f2399d8afbe0 100644 --- a/security/commoncap.c +++ b/security/commoncap.c | |||
@@ -76,8 +76,9 @@ int cap_capable(const struct cred *cred, struct user_namespace *targ_ns, | |||
76 | int cap, int audit) | 76 | int cap, int audit) |
77 | { | 77 | { |
78 | for (;;) { | 78 | for (;;) { |
79 | /* The creator of the user namespace has all caps. */ | 79 | /* The owner of the user namespace has all caps. */ |
80 | if (targ_ns != &init_user_ns && targ_ns->creator == cred->user) | 80 | if (targ_ns != &init_user_ns && uid_eq(targ_ns->owner, |
81 | make_kuid(cred->user_ns, cred->euid))) | ||
81 | return 0; | 82 | return 0; |
82 | 83 | ||
83 | /* Do we have the necessary capabilities? */ | 84 | /* Do we have the necessary capabilities? */ |