mirror of
https://git.hardenedbsd.org/hardenedbsd/HardenedBSD.git
synced 2024-11-22 03:04:34 +01:00
sys_capability.c: update the source of CAPENABLED
System calls allowed in capability mode have been specified by the CAPENABLED flag in syscalls.master since 2021.
This commit is contained in:
parent
3dd490e800
commit
8ae9921f2e
@ -50,11 +50,12 @@
|
|||||||
* derived from existing capabilities, but only if they have the same or a
|
* derived from existing capabilities, but only if they have the same or a
|
||||||
* strict subset of the rights on the original capability.
|
* strict subset of the rights on the original capability.
|
||||||
*
|
*
|
||||||
* System calls permitted in capability mode are defined in capabilities.conf;
|
* System calls permitted in capability mode are defined by CAPENABLED
|
||||||
* calls must be carefully audited for safety to ensure that they don't allow
|
* flags in syscalls.master; calls must be carefully audited for safety
|
||||||
* escape from a sandbox. Some calls permit only a subset of operations in
|
* to ensure that they don't allow escape from a sandbox. Some calls
|
||||||
* capability mode -- for example, shm_open(2) is limited to creating
|
* permit only a subset of operations in capability mode -- for example,
|
||||||
* anonymous, rather than named, POSIX shared memory objects.
|
* shm_open(2) is limited to creating anonymous, rather than named,
|
||||||
|
* POSIX shared memory objects.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include <sys/cdefs.h>
|
#include <sys/cdefs.h>
|
||||||
|
Loading…
Reference in New Issue
Block a user