1.\" Copyright (c) 1995 David Nugent <davidn@blaze.net.au> 2.\" All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, is permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice immediately at the beginning of the file, without modification, 9.\" this list of conditions, and the following disclaimer. 10.\" 2. Redistributions in binary form must reproduce the above copyright 11.\" notice, this list of conditions and the following disclaimer in the 12.\" documentation and/or other materials provided with the distribution. 13.\" 3. This work was done expressly for inclusion into FreeBSD. Other use 14.\" is permitted provided this notation is included. 15.\" 4. Absolutely no warranty of function or purpose is made by the author 16.\" David Nugent. 17.\" 5. Modifications may be freely made to this file providing the above 18.\" conditions are met. 19.\" 20.Dd May 10, 2020 21.Dt LOGIN_CLASS 3 22.Os 23.Sh NAME 24.Nm setclasscontext , 25.Nm setclasscpumask , 26.Nm setclassenvironment , 27.Nm setclassresources , 28.Nm setusercontext 29.Nd "functions for using the login class capabilities database" 30.Sh LIBRARY 31.Lb libutil 32.Sh SYNOPSIS 33.In sys/types.h 34.In login_cap.h 35.Ft int 36.Fn setclasscontext "const char *classname" "unsigned int flags" 37.Ft void 38.Fn setclasscpumask "login_cap_t *lc" 39.Ft void 40.Fn setclassenvironment "login_cap_t *lc" "const struct passwd *pwd" "int paths" 41.Ft void 42.Fn setclassresources "login_cap_t *lc" 43.Ft int 44.Fn setusercontext "login_cap_t *lc" "const struct passwd *pwd" "uid_t uid" "unsigned int flags" 45.Sh DESCRIPTION 46These functions provide a higher level interface to the login class 47database than those documented in 48.Xr login_cap 3 . 49These functions are used to set resource limits, environment and 50accounting settings for users on logging into the system and when 51selecting an appropriate set of environment and resource settings 52for system daemons based on login classes. 53These functions may only be called if the current process is 54running with root privileges. 55If the LOGIN_SETLOGIN flag is used this function calls 56.Xr setlogin 2 , 57and due care must be taken as detailed in the manpage for that 58function and this affects all processes running in the same session 59and not just the current process. 60.Pp 61The 62.Fn setclasscontext 63function sets various class context values (resource limits, umask and 64process priorities) based on values for a specific named class. 65.Pp 66The 67.Fn setusercontext 68function sets class context values based on a given login_cap_t 69object and a specific passwd record (if login_cap_t is NULL), 70the current session's login, and the current process 71user and group ownership. 72Each of these actions is selectable via bit-flags passed 73in the 74.Ar flags 75parameter, which is comprised of one or more of the following: 76.Bl -tag -width LOGIN_SETLOGINCLASS 77.It LOGIN_SETLOGIN 78Set the login associated with the current session to the user 79specified in the passwd structure using 80.Xr setlogin 2 . 81The 82.Ar pwd 83parameter must not be NULL if this option is used. 84.It LOGIN_SETUSER 85Set ownership of the current process to the uid specified in the 86.Ar uid 87parameter using 88.Xr setuid 2 . 89.It LOGIN_SETGROUP 90Set group ownership of the current process to the group id 91specified in the passwd structure using 92.Xr setgid 2 , 93and calls 94.Xr initgroups 3 95to set up the group access list for the current process. 96The 97.Ar pwd 98parameter must not be NULL if this option is used. 99.It LOGIN_SETRESOURCES 100Set resource limits for the current process based on values 101specified in the system login class database. 102Class capability tags used, with and without -cur (soft limit) 103or -max (hard limit) suffixes and the corresponding resource 104setting: 105.Bd -literal 106cputime RLIMIT_CPU 107filesize RLIMIT_FSIZE 108datasize RLIMIT_DATA 109stacksize RLIMIT_STACK 110coredumpsize RLIMIT_CORE 111memoryuse RLIMIT_RSS 112memorylocked RLIMIT_MEMLOCK 113maxproc RLIMIT_NPROC 114openfiles RLIMIT_NOFILE 115sbsize RLIMIT_SBSIZE 116vmemoryuse RLIMIT_VMEM 117pseudoterminals RLIMIT_NPTS 118swapuse RLIMIT_SWAP 119kqueues RLIMIT_KQUEUES 120umtxp RLIMIT_UMTXP 121pipebuf RLIMIT_PIPEBUF 122.Ed 123.It LOGIN_SETPRIORITY 124Set the scheduling priority for the current process based on the 125value specified in the system login class database. 126Class capability tags used: 127.Bd -literal 128priority 129.Ed 130.It LOGIN_SETUMASK 131Set the umask for the current process to a value in the user or 132system login class database. 133Class capability tags used: 134.Bd -literal 135umask 136.Ed 137.It LOGIN_SETPATH 138Set the "path" and "manpath" environment variables based on values 139in the user or system login class database. 140Class capability tags used with the corresponding environment 141variables set: 142.Bd -literal 143path PATH 144manpath MANPATH 145.Ed 146.It LOGIN_SETENV 147Set various environment variables based on values in the user or 148system login class database. 149Class capability tags used with the corresponding environment 150variables set: 151.Bd -literal 152lang LANG 153charset MM_CHARSET 154timezone TZ 155term TERM 156.Ed 157.Pp 158Additional environment variables may be set using the list type 159capability "setenv=var1 val1,var2 val2..,varN valN". 160.It LOGIN_SETMAC 161Set the MAC label for the current process to the label specified 162in system login class database. 163.It LOGIN_SETCPUMASK 164Create a new 165.Xr cpuset 2 166and set the cpu affinity to the specified mask. 167The string may contain a comma separated list of numbers and/or number 168ranges as handled by the 169.Xr cpuset 1 170utility or the case-insensitive string 171.Ql default . 172If the string is 173.Ql default 174no action will be taken. 175.It LOGIN_SETLOGINCLASS 176Set the login class of the current process using 177.Xr setloginclass 2 . 178.It LOGIN_SETALL 179Enables all of the above settings. 180.El 181.Pp 182Note that when setting environment variables and a valid passwd 183pointer is provided in the 184.Ar pwd 185parameter, the characters 186.Ql \&~ 187and 188.Ql \&$ 189are substituted for the user's home directory and login name 190respectively. 191.Pp 192The 193.Fn setclasscpumask , 194.Fn setclassresources 195and 196.Fn setclassenvironment 197functions are subsets of the setcontext functions above, but may 198be useful in isolation. 199.Sh RETURN VALUES 200The 201.Fn setclasscontext 202and 203.Fn setusercontext 204functions return -1 if an error occurred, or 0 on success. 205If an error occurs when attempting to set the user, login, group 206or resources, a message is reported to 207.Xr syslog 3 , 208with LOG_ERR priority and directed to the currently active facility. 209.Sh SEE ALSO 210.Xr cpuset 1 , 211.Xr ps 1 , 212.Xr cpuset 2 , 213.Xr setgid 2 , 214.Xr setlogin 2 , 215.Xr setloginclass 2 , 216.Xr setuid 2 , 217.Xr getcap 3 , 218.Xr initgroups 3 , 219.Xr login_cap 3 , 220.Xr mac_set_proc 3 , 221.Xr login.conf 5 , 222.Xr termcap 5 223.Sh HISTORY 224The functions 225.Fn setclasscontext , 226.Fn setclasscpumask , 227.Fn setclassenvironment , 228.Fn setclassresources 229and 230.Fn setusercontext 231first appeared in 232.Fx 2.1.5 . 233