diff --git a/init/capabilities.cpp b/init/capabilities.cpp index 642a3642f..50987db7c 100644 --- a/init/capabilities.cpp +++ b/init/capabilities.cpp @@ -194,5 +194,18 @@ bool SetCapsForExec(const CapSet& to_keep) { return SetAmbientCaps(to_keep); } +bool DropInheritableCaps() { + ScopedCaps caps(cap_get_proc()); + if (cap_clear_flag(caps.get(), CAP_INHERITABLE) == -1) { + PLOG(ERROR) << "cap_clear_flag(INHERITABLE) failed"; + return false; + } + if (cap_set_proc(caps.get()) != 0) { + PLOG(ERROR) << "cap_set_proc() failed"; + return false; + } + return true; +} + } // namespace init } // namespace android diff --git a/init/capabilities.h b/init/capabilities.h index ede85c324..fc80c9864 100644 --- a/init/capabilities.h +++ b/init/capabilities.h @@ -35,6 +35,7 @@ int LookupCap(const std::string& cap_name); bool CapAmbientSupported(); unsigned int GetLastValidCap(); bool SetCapsForExec(const CapSet& to_keep); +bool DropInheritableCaps(); } // namespace init } // namespace android diff --git a/init/service.cpp b/init/service.cpp index 481df659c..331b859b7 100644 --- a/init/service.cpp +++ b/init/service.cpp @@ -291,6 +291,11 @@ void Service::SetProcessAttributes() { if (!SetCapsForExec(capabilities_)) { LOG(FATAL) << "cannot set capabilities for " << name_; } + } else if (uid_) { + // Inheritable caps can be non-zero when running in a container. + if (!DropInheritableCaps()) { + LOG(FATAL) << "cannot drop inheritable caps for " << name_; + } } }