return cred_has_perm(old, new, PROCESS__SETCAP);
}
-static int selinux_capable(int cap, int audit)
+static int selinux_capable(struct task_struct *tsk, const struct cred *cred,
+ int cap, int audit)
{
int rc;
- rc = secondary_ops->capable(cap, audit);
- if (rc)
- return rc;
-
- return task_has_capability(current, current_cred(), cap, audit);
-}
-
-static int selinux_task_capable(struct task_struct *tsk,
- const struct cred *cred, int cap, int audit)
-{
- int rc;
-
- rc = secondary_ops->task_capable(tsk, cred, cap, audit);
+ rc = secondary_ops->capable(tsk, cred, cap, audit);
if (rc)
return rc;
{
int rc, cap_sys_admin = 0;
- rc = selinux_capable(CAP_SYS_ADMIN, SECURITY_CAP_NOAUDIT);
+ rc = selinux_capable(current, current_cred(), CAP_SYS_ADMIN,
+ SECURITY_CAP_NOAUDIT);
if (rc == 0)
cap_sys_admin = 1;
* and lack of permission just means that we fall back to the
* in-core context value, not a denial.
*/
- error = selinux_capable(CAP_MAC_ADMIN, SECURITY_CAP_NOAUDIT);
+ error = selinux_capable(current, current_cred(), CAP_MAC_ADMIN,
+ SECURITY_CAP_NOAUDIT);
if (!error)
error = security_sid_to_context_force(isec->sid, &context,
&size);
.capset = selinux_capset,
.sysctl = selinux_sysctl,
.capable = selinux_capable,
- .task_capable = selinux_task_capable,
.quotactl = selinux_quotactl,
.quota_on = selinux_quota_on,
.syslog = selinux_syslog,