From f1660f96f59dad860d39f148c3a747050d112763 Mon Sep 17 00:00:00 2001 From: Lennart Poettering Date: Tue, 18 Mar 2014 17:58:19 +0100 Subject: [PATCH 1/1] core: drop CAP_MKNOD when PrivateDevices= is set --- man/systemd.exec.xml | 7 +++++-- src/core/unit.c | 3 +++ 2 files changed, 8 insertions(+), 2 deletions(-) diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml index f1bcf9b7b..90d36f9b5 100644 --- a/man/systemd.exec.xml +++ b/man/systemd.exec.xml @@ -908,8 +908,11 @@ /dev/sda. This is useful to securely turn off physical device access by the executed - process. Defaults to - false. + process. Defaults to false. Note that + enabling this option implies that + CAP_MKNOD is + removed from the capability bounding + set for the unit. diff --git a/src/core/unit.c b/src/core/unit.c index 4fb0d9caa..20b139d31 100644 --- a/src/core/unit.c +++ b/src/core/unit.c @@ -2830,6 +2830,9 @@ int unit_exec_context_patch_defaults(Unit *u, ExecContext *c) { !set_isempty(c->address_families))) c->no_new_privileges = true; + if (c->private_devices) + c->capability_bounding_set_drop |= (uint64_t) 1ULL << (uint64_t) CAP_MKNOD; + return 0; } -- 2.30.2