-
-
Save visar/d1341a5b3df8f162c765 to your computer and use it in GitHub Desktop.
example of using linux capabilities interface libcap(3) and dump capabilities flags for the running process
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <sys/capability.h> | |
#include <sys/types.h> | |
#include <unistd.h> | |
#include <stdio.h> | |
#include <stdlib.h> | |
int | |
main(void) { | |
pid_t pid; | |
cap_t cap; | |
cap_value_t cap_list[CAP_LAST_CAP+1]; | |
cap_flag_t cap_flags; | |
cap_flag_value_t cap_flags_value; | |
// | |
// generated list with command line below: | |
// sed -n 's/^#define \(CAP_.*\) .*/\1/p' /usr/include/linux/capability.h | tr A-Z a-z | |
// don't take cap_last_cap which is the same as the last cap_syslog capability | |
// | |
const char *cap_name[CAP_LAST_CAP+1] = { | |
"cap_chown", | |
"cap_dac_override", | |
"cap_dac_read_search", | |
"cap_fowner", | |
"cap_fsetid", | |
"cap_kill", | |
"cap_setgid", | |
"cap_setuid", | |
"cap_setpcap", | |
"cap_linux_immutable", | |
"cap_net_bind_service", | |
"cap_net_broadcast", | |
"cap_net_admin", | |
"cap_net_raw", | |
"cap_ipc_lock", | |
"cap_ipc_owner", | |
"cap_sys_module", | |
"cap_sys_rawio", | |
"cap_sys_chroot", | |
"cap_sys_ptrace", | |
"cap_sys_pacct", | |
"cap_sys_admin", | |
"cap_sys_boot", | |
"cap_sys_nice", | |
"cap_sys_resource", | |
"cap_sys_time", | |
"cap_sys_tty_config", | |
"cap_mknod", | |
"cap_lease", | |
"cap_audit_write", | |
"cap_audit_control", | |
"cap_setfcap", | |
"cap_mac_override", | |
"cap_mac_admin", | |
"cap_syslog" | |
}; | |
int i, j; | |
/* temporary use for cap_get_flag calls */ | |
struct { | |
const char *str; | |
cap_flag_t flag; | |
} flags[3] = { | |
{"EFFECTIVE", CAP_EFFECTIVE}, | |
{"PERMITTED", CAP_PERMITTED}, | |
{"INHERITABLE", CAP_INHERITABLE} | |
}; | |
pid = getpid(); | |
cap = cap_get_pid(pid); | |
if (cap == NULL) { | |
perror("cap_get_pid"); | |
exit(-1); | |
} | |
/* effetive cap */ | |
cap_list[0] = CAP_CHOWN; | |
if (cap_set_flag(cap, CAP_EFFECTIVE, 1, cap_list, CAP_SET) == -1) { | |
perror("cap_set_flag cap_chown"); | |
cap_free(cap); | |
exit(-1); | |
} | |
/* permitted cap */ | |
cap_list[0] = CAP_MAC_ADMIN; | |
if (cap_set_flag(cap, CAP_PERMITTED, 1, cap_list, CAP_SET) == -1) { | |
perror("cap_set_flag cap_mac_admin"); | |
cap_free(cap); | |
exit(-1); | |
} | |
/* inherit cap */ | |
cap_list[0] = CAP_SETFCAP; | |
if (cap_set_flag(cap, CAP_INHERITABLE, 1, cap_list, CAP_SET) == -1) { | |
perror("cap_set_flag cap_setfcap"); | |
cap_free(cap); | |
exit(-1); | |
} | |
/* dump them */ | |
for (i=0; i < CAP_LAST_CAP + 1; i++) { | |
cap_from_name(cap_name[i], &cap_list[i]); | |
printf("%-20s %d\t\t", cap_name[i], cap_list[i]); | |
printf("flags: \t\t"); | |
for (j=0; j < 3; j++) { | |
cap_get_flag(cap, cap_list[i], flags[j].flag, &cap_flags_value); | |
printf(" %s %-4s ", flags[j].str, (cap_flags_value == CAP_SET) ? "OK" : "NOK"); | |
} | |
printf("\n"); | |
} | |
cap_free(cap); | |
return 0; | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment