1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
26 #include <sys/capability.h>
27 #include <sys/prctl.h>
30 #include "alloc-util.h"
31 #include "capability-util.h"
35 #include "parse-util.h"
38 int have_effective_cap(int value
) {
39 _cleanup_cap_free_ cap_t cap
;
46 if (cap_get_flag(cap
, value
, CAP_EFFECTIVE
, &fv
) < 0)
52 unsigned long cap_last_cap(void) {
53 static thread_local
unsigned long saved
;
54 static thread_local
bool valid
= false;
55 _cleanup_free_
char *content
= NULL
;
62 /* available since linux-3.2 */
63 r
= read_one_line_file("/proc/sys/kernel/cap_last_cap", &content
);
65 r
= safe_atolu(content
, &p
);
73 /* fall back to syscall-probing for pre linux-3.2 */
74 p
= (unsigned long) CAP_LAST_CAP
;
76 if (prctl(PR_CAPBSET_READ
, p
) < 0) {
78 /* Hmm, look downwards, until we find one that
80 for (p
--; p
> 0; p
--)
81 if (prctl(PR_CAPBSET_READ
, p
) >= 0)
86 /* Hmm, look upwards, until we find one that doesn't
89 if (prctl(PR_CAPBSET_READ
, p
+1) < 0)
99 int capability_update_inherited_set(cap_t caps
, uint64_t set
) {
102 /* Add capabilities in the set to the inherited caps. Do not apply
105 for (i
= 0; i
< cap_last_cap(); i
++) {
107 if (set
& (UINT64_C(1) << i
)) {
112 /* Make the capability inheritable. */
113 if (cap_set_flag(caps
, CAP_INHERITABLE
, 1, &v
, CAP_SET
) < 0)
121 int capability_ambient_set_apply(uint64_t set
, bool also_inherit
) {
123 _cleanup_cap_free_ cap_t caps
= NULL
;
125 /* Add the capabilities to the ambient set. */
129 caps
= cap_get_proc();
133 r
= capability_update_inherited_set(caps
, set
);
137 if (cap_set_proc(caps
) < 0)
141 for (i
= 0; i
< cap_last_cap(); i
++) {
143 if (set
& (UINT64_C(1) << i
)) {
145 /* Add the capability to the ambient set. */
146 if (prctl(PR_CAP_AMBIENT
, PR_CAP_AMBIENT_RAISE
, i
, 0, 0) < 0)
154 int capability_bounding_set_drop(uint64_t keep
, bool right_now
) {
155 _cleanup_cap_free_ cap_t after_cap
= NULL
;
160 /* If we are run as PID 1 we will lack CAP_SETPCAP by default
161 * in the effective set (yes, the kernel drops that when
162 * executing init!), so get it back temporarily so that we can
163 * call PR_CAPBSET_DROP. */
165 after_cap
= cap_get_proc();
169 if (cap_get_flag(after_cap
, CAP_SETPCAP
, CAP_EFFECTIVE
, &fv
) < 0)
173 _cleanup_cap_free_ cap_t temp_cap
= NULL
;
174 static const cap_value_t v
= CAP_SETPCAP
;
176 temp_cap
= cap_dup(after_cap
);
182 if (cap_set_flag(temp_cap
, CAP_EFFECTIVE
, 1, &v
, CAP_SET
) < 0) {
187 if (cap_set_proc(temp_cap
) < 0) {
193 for (i
= 0; i
<= cap_last_cap(); i
++) {
195 if (!(keep
& (UINT64_C(1) << i
))) {
198 /* Drop it from the bounding set */
199 if (prctl(PR_CAPBSET_DROP
, i
) < 0) {
205 /* Also drop it from the inheritable set, so
206 * that anything we exec() loses the
207 * capability for good. */
208 if (cap_set_flag(after_cap
, CAP_INHERITABLE
, 1, &v
, CAP_CLEAR
) < 0) {
213 /* If we shall apply this right now drop it
214 * also from our own capability sets. */
216 if (cap_set_flag(after_cap
, CAP_PERMITTED
, 1, &v
, CAP_CLEAR
) < 0 ||
217 cap_set_flag(after_cap
, CAP_EFFECTIVE
, 1, &v
, CAP_CLEAR
) < 0) {
228 if (cap_set_proc(after_cap
) < 0)
234 static int drop_from_file(const char *fn
, uint64_t keep
) {
237 uint64_t current
, after
;
240 r
= read_one_line_file(fn
, &p
);
244 assert_cc(sizeof(hi
) == sizeof(unsigned));
245 assert_cc(sizeof(lo
) == sizeof(unsigned));
247 k
= sscanf(p
, "%u %u", &lo
, &hi
);
253 current
= (uint64_t) lo
| ((uint64_t) hi
<< 32ULL);
254 after
= current
& keep
;
256 if (current
== after
)
259 lo
= (unsigned) (after
& 0xFFFFFFFFULL
);
260 hi
= (unsigned) ((after
>> 32ULL) & 0xFFFFFFFFULL
);
262 if (asprintf(&p
, "%u %u", lo
, hi
) < 0)
265 r
= write_string_file(fn
, p
, WRITE_STRING_FILE_CREATE
);
271 int capability_bounding_set_drop_usermode(uint64_t keep
) {
274 r
= drop_from_file("/proc/sys/kernel/usermodehelper/inheritable", keep
);
278 r
= drop_from_file("/proc/sys/kernel/usermodehelper/bset", keep
);
285 int drop_privileges(uid_t uid
, gid_t gid
, uint64_t keep_capabilities
) {
286 _cleanup_cap_free_ cap_t d
= NULL
;
290 /* Unfortunately we cannot leave privilege dropping to PID 1
291 * here, since we want to run as user but want to keep some
292 * capabilities. Since file capabilities have been introduced
293 * this cannot be done across exec() anymore, unless our
294 * binary has the capability configured in the file system,
295 * which we want to avoid. */
297 if (setresgid(gid
, gid
, gid
) < 0)
298 return log_error_errno(errno
, "Failed to change group ID: %m");
300 if (setgroups(0, NULL
) < 0)
301 return log_error_errno(errno
, "Failed to drop auxiliary groups list: %m");
303 /* Ensure we keep the permitted caps across the setresuid() */
304 if (prctl(PR_SET_KEEPCAPS
, 1) < 0)
305 return log_error_errno(errno
, "Failed to enable keep capabilities flag: %m");
307 r
= setresuid(uid
, uid
, uid
);
309 return log_error_errno(errno
, "Failed to change user ID: %m");
311 if (prctl(PR_SET_KEEPCAPS
, 0) < 0)
312 return log_error_errno(errno
, "Failed to disable keep capabilities flag: %m");
314 /* Drop all caps from the bounding set, except the ones we want */
315 r
= capability_bounding_set_drop(keep_capabilities
, true);
317 return log_error_errno(r
, "Failed to drop capabilities: %m");
319 /* Now upgrade the permitted caps we still kept to effective caps */
324 if (keep_capabilities
) {
325 cap_value_t bits
[u64log2(keep_capabilities
) + 1];
327 for (i
= 0; i
< ELEMENTSOF(bits
); i
++)
328 if (keep_capabilities
& (1ULL << i
))
331 /* use enough bits */
332 assert(i
== 64 || (keep_capabilities
>> i
) == 0);
333 /* don't use too many bits */
334 assert(keep_capabilities
& (1ULL << (i
- 1)));
336 if (cap_set_flag(d
, CAP_EFFECTIVE
, j
, bits
, CAP_SET
) < 0 ||
337 cap_set_flag(d
, CAP_PERMITTED
, j
, bits
, CAP_SET
) < 0)
338 return log_error_errno(errno
, "Failed to enable capabilities bits: %m");
340 if (cap_set_proc(d
) < 0)
341 return log_error_errno(errno
, "Failed to increase capabilities: %m");
347 int drop_capability(cap_value_t cv
) {
348 _cleanup_cap_free_ cap_t tmp_cap
= NULL
;
350 tmp_cap
= cap_get_proc();
354 if ((cap_set_flag(tmp_cap
, CAP_INHERITABLE
, 1, &cv
, CAP_CLEAR
) < 0) ||
355 (cap_set_flag(tmp_cap
, CAP_PERMITTED
, 1, &cv
, CAP_CLEAR
) < 0) ||
356 (cap_set_flag(tmp_cap
, CAP_EFFECTIVE
, 1, &cv
, CAP_CLEAR
) < 0))
359 if (cap_set_proc(tmp_cap
) < 0)