userns: Allow PR_CAPBSET_DROP in a user namespace.
authorEric W. Biederman <ebiederm@xmission.com>
Tue, 2 Jul 2013 17:04:54 +0000 (10:04 -0700)
committerEric W. Biederman <ebiederm@xmission.com>
Sat, 31 Aug 2013 00:30:39 +0000 (17:30 -0700)
commit160da84dbb39443fdade7151bc63a88f8e953077
treeddc0f7993f773a610b888a75b2a00a2520c053f9
parentdbef0c1c4c5f8ce5d1f5bd8cee092a7afb4ac21b
userns: Allow PR_CAPBSET_DROP in a user namespace.

As the capabilites and capability bounding set are per user namespace
properties it is safe to allow changing them with just CAP_SETPCAP
permission in the user namespace.

Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
Tested-by: Richard Weinberger <richard@nod.at>
Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
security/commoncap.c