#
23300944 |
| 30-Jun-2011 |
Peter Grehan <grehan@FreeBSD.org> |
IFC @ r223696 to pick up dfr's userboot
|
#
7b744f6b |
| 30-Jun-2011 |
Attilio Rao <attilio@FreeBSD.org> |
MFC
|
#
24c1c3bf |
| 29-Jun-2011 |
Jonathan Anderson <jonathan@FreeBSD.org> |
We may split today's CAPABILITIES into CAPABILITY_MODE (which has to do with global namespaces) and CAPABILITIES (which has to do with constraining file descriptors). Just in case, and because it's a
We may split today's CAPABILITIES into CAPABILITY_MODE (which has to do with global namespaces) and CAPABILITIES (which has to do with constraining file descriptors). Just in case, and because it's a better name anyway, let's move CAPABILITIES out of the way.
Also, change opt_capabilities.h to opt_capsicum.h; for now, this will only hold CAPABILITY_MODE, but it will probably also hold the new CAPABILITIES (implying constrained file descriptors) in the future.
Approved by: rwatson Sponsored by: Google UK Ltd
show more ...
|
#
cfdfd32d |
| 26-Jun-2011 |
Attilio Rao <attilio@FreeBSD.org> |
MFC
|
#
54350dfa |
| 25-Jun-2011 |
Jonathan Anderson <jonathan@FreeBSD.org> |
Remove redundant Capsicum sysctl.
Since we're now declaring FEATURE(security_capabilities), there's no need for an explicit SYSCTL_NODE.
Approved by: rwatson
|
#
db06a6f4 |
| 12-Mar-2011 |
Marcel Moolenaar <marcel@FreeBSD.org> |
Merge svn+ssh://svn.freebsd.org/base/head@219553
|
#
d783bbd2 |
| 04-Mar-2011 |
Alexander Leidinger <netchild@FreeBSD.org> |
- Add a FEATURE for capsicum (security_capabilities). - Rename mac FEATURE to security_mac.
Discussed with: rwatson
|
#
96fcc75f |
| 01-Mar-2011 |
Robert Watson <rwatson@FreeBSD.org> |
Add initial support for Capsicum's Capability Mode to the FreeBSD kernel, compiled conditionally on options CAPABILITIES:
Add a new credential flag, CRED_FLAG_CAPMODE, which indicates that a subject
Add initial support for Capsicum's Capability Mode to the FreeBSD kernel, compiled conditionally on options CAPABILITIES:
Add a new credential flag, CRED_FLAG_CAPMODE, which indicates that a subject (typically a process) is in capability mode.
Add two new system calls, cap_enter(2) and cap_getmode(2), which allow setting and querying (but never clearing) the flag.
Export the capability mode flag via process information sysctls.
Sponsored by: Google, Inc. Reviewed by: anderson Discussed with: benl, kris, pjd Obtained from: Capsicum Project MFC after: 3 months
show more ...
|