x SuSE Linux 13.1-RELEASE x
x SuSE Linux 13.1-RELEASEx
CAP_GET_FILE(3) Linux Programmer's Manual CAP_GET_FILE(3)
NAME
cap_get_file, cap_set_file, cap_get_fd, cap_set_fd - capability manipu-
lation on files
SYNOPSIS
#include <sys/capability.h>
cap_t cap_get_file(const char *path_p);
int cap_set_file(const char *path_p, cap_t cap_p);
cap_t cap_get_fd(int fd);
int cap_set_fd(int fd, cap_t caps);
uid_t cap_get_nsowner(cap_t caps);
int cap_set_nsowner(cap_t caps, uid_t rootuid);
Link with -lcap.
DESCRIPTION
cap_get_file() and cap_get_fd() allocate a capability state in working
storage and set it to represent the capability state of the pathname
pointed to by path_p or the file open on descriptor fd. These func-
tions return a pointer to the newly created capability state. The ef-
fects of reading the capability state from any file other than a regu-
lar file is undefined. The caller should free any releasable memory,
when the capability state in working storage is no longer required, by
calling cap_free() with the used cap_t as an argument.
cap_set_file() and cap_set_fd() set the values for all capability flags
for all capabilities for the pathname pointed to by path_p or the file
open on descriptor fd, with the capability state identified by cap_p.
The new capability state of the file is completely determined by the
contents of cap_p. A NULL value for cap_p is used to indicate that ca-
pabilities for the file should be deleted. For these functions to suc-
ceed, the calling process must have the CAP_SETFCAP capability in its
effective set and either the effective user ID of the process must
match the file owner or the calling process must have the CAP_FOWNER
capability in its effective capability set. The effects of writing the
capability state to any file type other than a regular file are unde-
fined.
A capability set held in memory can be associated with the root user ID
in use in a specific user namespace. It is possible to get and set this
value (in the memory copy) with cap_get_nsowner() and cap_set_nsowner()
respectively. The root user ID is ignored by the libcap library in all
cases other than when the capability is written to a file. Only if the
value is non-zero will the library attempt to include it in the written
file capability set.
RETURN VALUE
cap_get_file() and cap_get_fd() return a non-NULL value on success, and
NULL on failure.
cap_set_file() and cap_set_fd() return zero on success, and -1 on fail-
ure.
On failure, errno is set to EACCES, EBADFD, ENAMETOOLONG, ENOENT,
ENOMEM, ENOTDIR, EPERM, or EROFS.
CONFORMING TO
These functions are specified by withdrawn POSIX.1e draft specifica-
tion.
NOTES
Support for file capabilities is provided on Linux since version
2.6.24.
On Linux, the file Effective set is a single bit. If it is enabled,
then all Permitted capabilities are enabled in the Effective set of the
calling process when the file is executed; otherwise, no capabilities
are enabled in the process's Effective set following an execve(2). Be-
cause the file Effective set is a single bit, if any capability is en-
abled in the Effective set of the cap_t given to cap_set_file() or
cap_set_fd(), then all capabilities whose Permitted or Inheritable flag
is enabled must also have the Effective flag enabled. Conversely, if
the Effective bit is enabled on a file, then the cap_t returned by
cap_get_file() and cap_get_fd() will have the Effective flag enabled
for each capability that has the Permitted or Inheritable flag enabled.
SEE ALSO
libcap(3), cap_clear(3), cap_copy_ext(3), cap_from_text(3),
cap_get_proc(3), cap_init(3), capabilities(7), user_namespaces(7)
2021-03-06 CAP_GET_FILE(3)
Want to link to this manual page? Use this URL:
<http://star2.abcm.com/cgi-bin/bsdi-man?query=CAP_GET_FILE&sektion=3&manpath=>