blob: a13e51aec799b31301d74e0cabc8ca07448f06cf (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
|
.TH "CAPNG_CHANGE_ID" "3" "Feb 2018" "Red Hat" "Libcap-ng API"
.SH NAME
capng_change_id \- change the credentials retaining capabilities
.SH "SYNOPSIS"
.B #include <cap-ng.h>
.sp
int capng_change_id(int uid, int gid, capng_flags_t flag);
.SH "DESCRIPTION"
This function will change uid and gid to the ones given while retaining the capabilities previously specified in capng_update. It is also possible to specify -1 for either the uid or gid in which case the function will not change the uid or gid and leave it "as is". This is useful if you just want the flag options to be applied (assuming the option doesn't require more privileges that you currently have).
It is not necessary and perhaps better if capng_apply has not been called prior to this function so that all necessary privileges are still intact. The caller may be required to have CAP_SETPCAP capability still active before calling this function or capabilities cannot be changed.
This function also takes a flag parameter that helps to tailor the exact actions performed by the function to secure the environment. The option may be or'ed together. The legal values are:
.RS
.TP
.B CAPNG_NO_FLAG
Simply change uid and retain specified capabilities and that's all.
.TP
.B CAPNG_DROP_SUPP_GRP
After changing id, remove any supplement groups that may still be in effect from the old uid.
.TP
.B CAPNG_INIT_SUPP_GRP
After changing id, initialize any supplement groups that may come with the new account. If given with
.B CAPNG_DROP_SUPP_GRP
it will have no effect.
.TP
.B CAPNG_CLEAR_BOUNDING
Clear the bounding set regardless to the internal representation already setup prior to changing the uid/gid.
.TP
.B CAPNG_CLEAR_AMBIENT
Clear ambient capabilities regardless of the internal representation already setup prior to changing the uid/gid.
.RE
.SH "RETURN VALUE"
This returns 0 on success and a negative number on failure.
.RS
.TP
-1 means capng has not been initted properly
.TP
-2 means a failure requesting to keep capabilities across the uid change
.TP
-3 means that applying the intermediate capabilities failed
.TP
-4 means changing gid failed
.TP
-5 means dropping supplemental groups failed
.TP
-6 means changing the uid failed
.TP
-7 means dropping the ability to retain caps across a uid change failed
.TP
-8 means clearing the bounding set failed
.TP
-9 means dropping CAP_SETPCAP or ambient capabilities failed
.TP
-10 means initializing supplemental groups failed
.RE
Note: the only safe action to do upon failure of this function is to probably exit. This is because you are likely in a situation with partial permissions and not what you intended.
.SH "SEE ALSO"
.BR capng_update (3),
.BR capng_apply (3),
.BR prctl (2),
.BR capabilities (7)
.SH AUTHOR
Steve Grubb
|