Skip to content

Commit

Permalink
capabilities: use root_priveleged inline to clarify logic
Browse files Browse the repository at this point in the history
Introduce inline root_privileged() to make use of SECURE_NONROOT
easier to read.

Suggested-by: Serge Hallyn <[email protected]>
Signed-off-by: Richard Guy Briggs <[email protected]>
Reviewed-by: Serge Hallyn <[email protected]>
Acked-by: James Morris <[email protected]>
Acked-by: Kees Cook <[email protected]>
Okay-ished-by: Paul Moore <[email protected]>
Signed-off-by: James Morris <[email protected]>
  • Loading branch information
rgbriggs authored and James Morris committed Oct 20, 2017
1 parent fc7eadf commit 9304b46
Showing 1 changed file with 4 additions and 2 deletions.
6 changes: 4 additions & 2 deletions security/commoncap.c
Original file line number Diff line number Diff line change
Expand Up @@ -695,6 +695,8 @@ static int get_file_caps(struct linux_binprm *bprm, bool *effective, bool *has_f
return rc;
}

static inline bool root_privileged(void) { return !issecure(SECURE_NOROOT); }

/*
* handle_privileged_root - Handle case of privileged root
* @bprm: The execution parameters, including the proposed creds
Expand All @@ -713,7 +715,7 @@ static void handle_privileged_root(struct linux_binprm *bprm, bool has_fcap,
const struct cred *old = current_cred();
struct cred *new = bprm->cred;

if (issecure(SECURE_NOROOT))
if (!root_privileged())
return;
/*
* If the legacy file capability is set, then don't set privs
Expand Down Expand Up @@ -838,7 +840,7 @@ int cap_bprm_set_creds(struct linux_binprm *bprm)
if (__cap_grew(effective, ambient, new)) {
if (!__cap_full(effective, new) ||
!uid_eq(new->euid, root_uid) || !uid_eq(new->uid, root_uid) ||
issecure(SECURE_NOROOT)) {
!root_privileged()) {
ret = audit_log_bprm_fcaps(bprm, new, old);
if (ret < 0)
return ret;
Expand Down

0 comments on commit 9304b46

Please sign in to comment.