18c2aff776a775d34a4c9893a4c72e0434d68e36artem/***************************************************************************
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * util_helper.c - HAL utilities for helper (as e.g. prober/addons) et al.
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * Copyright (C) 2006 David Zeuthen, <david@fubar.dk>
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * Licensed under the Academic Free License version 2.1
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * This program is free software; you can redistribute it and/or modify
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * it under the terms of the GNU General Public License as published by
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * the Free Software Foundation; either version 2 of the License, or
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * (at your option) any later version.
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * This program is distributed in the hope that it will be useful,
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * but WITHOUT ANY WARRANTY; without even the implied warranty of
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * GNU General Public License for more details.
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * You should have received a copy of the GNU General Public License
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * along with this program; if not, write to the Free Software
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
18c2aff776a775d34a4c9893a4c72e0434d68e36artem **************************************************************************/
18c2aff776a775d34a4c9893a4c72e0434d68e36artemextern char **environ;
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * Start with the 'basic' privilege set and then remove any
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * of the 'basic' privileges that will not be needed.
f5f5f433be0d7353b064a34c51f926e86885670eJerry Gilliam * Establish the basic set of privileges.
f5f5f433be0d7353b064a34c51f926e86885670eJerry Gilliam * Note: fork/exec required for libdevinfo devlink
f5f5f433be0d7353b064a34c51f926e86885670eJerry Gilliam * interfaces are included in the basic set.
18c2aff776a775d34a4c9893a4c72e0434d68e36artem /* Clear privileges we will not need from the 'basic' set */
18c2aff776a775d34a4c9893a4c72e0434d68e36artem /* for sysevent need to be root and have this privilege */
73a8c195d0dfb19a2b8814d9df1ae6459c88d5a6fei feng - Sun Microsystems - Beijing China /* need proc_audit privilege */
73a8c195d0dfb19a2b8814d9df1ae6459c88d5a6fei feng - Sun Microsystems - Beijing China (void) priv_addset(pPrivSet, PRIV_PROC_AUDIT);
18c2aff776a775d34a4c9893a4c72e0434d68e36artem /* Set the permitted privilege set. */
f5f5f433be0d7353b064a34c51f926e86885670eJerry Gilliam (void) setppriv(PRIV_SET, PRIV_PERMITTED, pPrivSet);
f5f5f433be0d7353b064a34c51f926e86885670eJerry Gilliam /* Set the limit privilege set. */
f5f5f433be0d7353b064a34c51f926e86885670eJerry Gilliam (void) setppriv(PRIV_SET, PRIV_LIMIT, pPrivSet);
18c2aff776a775d34a4c9893a4c72e0434d68e36artem#else /* !sun */
18c2aff776a775d34a4c9893a4c72e0434d68e36artem/** Drop root privileges: Set the running user id to HAL_USER and
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * group to HAL_GROUP, and optionally retain auxiliary groups of HAL_USER.
18c2aff776a775d34a4c9893a4c72e0434d68e36artem /* determine user id */
18c2aff776a775d34a4c9893a4c72e0434d68e36artem HAL_DEBUG (("drop_privileges: user " HAL_USER " does not exist"));
18c2aff776a775d34a4c9893a4c72e0434d68e36artem /* determine primary group id */
18c2aff776a775d34a4c9893a4c72e0434d68e36artem HAL_DEBUG (("drop_privileges: group " HAL_GROUP " does not exist"));
18c2aff776a775d34a4c9893a4c72e0434d68e36artem HAL_DEBUG(("drop_privileges: could not initialize groups"));
18c2aff776a775d34a4c9893a4c72e0434d68e36artem HAL_DEBUG (("drop_privileges: could not set group id"));
18c2aff776a775d34a4c9893a4c72e0434d68e36artem HAL_DEBUG (("drop_privileges: could not set user id"));
18c2aff776a775d34a4c9893a4c72e0434d68e36artem#endif /* !sun */
18c2aff776a775d34a4c9893a4c72e0434d68e36artem unsigned int i;
18c2aff776a775d34a4c9893a4c72e0434d68e36artem /* This code is really really ugly. We make some memory layout
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * assumptions and reuse the environment array as memory to store
18c2aff776a775d34a4c9893a4c72e0434d68e36artem * our process title in */
18c2aff776a775d34a4c9893a4c72e0434d68e36artem endptr = i ? environ[i-1] + strlen (environ[i-1]) : argv[argc-1] + strlen (argv[argc-1]);
18c2aff776a775d34a4c9893a4c72e0434d68e36artem /* Make a copy of environ */
18c2aff776a775d34a4c9893a4c72e0434d68e36artem/* this code borrowed from avahi-daemon's setproctitle.c (LGPL v2) */