[PATCH 07/34] capability: handle idmapped mounts
Christoph Hellwig
hch at infradead.org
Sun Nov 1 14:48:09 UTC 2020
> /**
> * capable_wrt_inode_uidgid - Check nsown_capable and uid and gid mapped
> * @inode: The inode in question
> @@ -501,9 +513,7 @@ bool privileged_wrt_inode_uidgid(struct user_namespace *ns, const struct inode *
> */
> bool capable_wrt_inode_uidgid(const struct inode *inode, int cap)
> {
> + return capable_wrt_mapped_inode_uidgid(&init_user_ns, inode, cap);
> }
> EXPORT_SYMBOL(capable_wrt_inode_uidgid);
Please avoid these silly wrappers and just switch all callers to pass
the namespaces instead of creating boilerplate code. Same for the other
functions where you do this even even worse the method calls.
More information about the Linux-security-module-archive
mailing list