/freebsd/share/man/man9/ |
H A D | VFS_SET.9 | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|
/freebsd/lib/libc/gen/ |
H A D | getvfsbyname.3 | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|
/freebsd/sys/compat/freebsd32/ |
H A D | freebsd32_systrace_args.c | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|
H A D | freebsd32_proto.h | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|
H A D | freebsd32_syscall.h | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|
H A D | freebsd32_syscalls.c | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|
H A D | freebsd32_sysent.c | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|
H A D | freebsd32_misc.c | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|
/freebsd/sys/kern/ |
H A D | systrace_args.c | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|
H A D | syscalls.c | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|
H A D | init_sysent.c | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|
H A D | kern_jail.c | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|
H A D | syscalls.master | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|
/freebsd/sys/sys/ |
H A D | jail.h | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|
H A D | syscall.mk | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|
H A D | syscallsubr.h | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|
H A D | syscall.h | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|
H A D | sysproto.h | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|
/freebsd/sys/ufs/ufs/ |
H A D | ufs_vnops.c | diff 284001a222ae071c063920aa1c1b6477f168002d Thu Aug 16 20:40:16 CEST 2018 Jamie Gritton <jamie@FreeBSD.org> Put jail(2) under COMPAT_FREEBSD11. It has been the "old" way of creating jails since FreeBSD 7.
Along with the system call, put the various security.jail.allow_foo and security.jail.foo_allowed sysctls partly under COMPAT_FREEBSD11 (or BURN_BRIDGES). These sysctls had two disparate uses: on the system side, they were global permissions for jails created via jail(2) which lacked fine-grained permission controls; inside a jail, they're read-only descriptions of what the current jail is allowed to do. The first use is obsolete along with jail(2), but keep them for the second-read-only use.
Differential Revision: D14791
|