diff options
author | Lorenzo Colitti <lorenzo@google.com> | 2014-06-13 21:36:01 +0900 |
---|---|---|
committer | Lorenzo Colitti <lorenzo@google.com> | 2014-06-13 21:44:10 +0900 |
commit | 7045e27d4946330f3152218fdaa81b37d02b6d6c (patch) | |
tree | cd9137751fe8cfc55f890a061bcf8f9519c1f6f5 | |
parent | b9b471e1e3788a398adeb0a04bfc52d6ba7c3cf6 (diff) | |
download | android_external_android-clat-7045e27d4946330f3152218fdaa81b37d02b6d6c.tar.gz android_external_android-clat-7045e27d4946330f3152218fdaa81b37d02b6d6c.tar.bz2 android_external_android-clat-7045e27d4946330f3152218fdaa81b37d02b6d6c.zip |
Create the tun device after dropping root privileges.
Currently, clatd creates the clat4 interface as root using
root's dac_override abilities. Instead, change the drop_root code
to acquire membership in the AID_VPN group, and use that
membership to create the interface. This removes the need for
dac_override.
Change-Id: I1f824254f52a441f21c5b7963d9993be88cea2db
-rw-r--r-- | clatd.c | 15 |
1 files changed, 8 insertions, 7 deletions
@@ -212,7 +212,7 @@ void configure_tun_ip(const struct tun_data *tunnel) { * drops root privs but keeps the needed capability */ void drop_root() { - gid_t groups[] = { AID_INET }; + gid_t groups[] = { AID_INET, AID_VPN }; if(setgroups(sizeof(groups)/sizeof(groups[0]), groups) < 0) { logmsg(ANDROID_LOG_FATAL,"drop_root/setgroups failed: %s",strerror(errno)); exit(1); @@ -486,18 +486,19 @@ int main(int argc, char **argv) { net_id_str ? net_id_str : "(none)", mark_str ? mark_str : "(none)"); - // open the tunnel device and our raw sockets before dropping privs + // open our raw sockets before dropping privs + open_sockets(&tunnel, mark); + + // run under a regular user + drop_root(); + + // we can create tun devices as non-root because we're in the VPN group. tunnel.fd4 = tun_open(); if(tunnel.fd4 < 0) { logmsg(ANDROID_LOG_FATAL, "tun_open4 failed: %s", strerror(errno)); exit(1); } - open_sockets(&tunnel, mark); - - // run under a regular user - drop_root(); - // When run from netd, the environment variable ANDROID_DNS_MODE is set to // "local", but that only works for the netd process itself. unsetenv("ANDROID_DNS_MODE"); |