sys_capability.c: update the source of CAPENABLED

System calls allowed in capability mode have been specified by the
CAPENABLED flag in syscalls.master since 2021.
This commit is contained in:
Brooks Davis 2024-10-22 18:49:43 +01:00
parent 3dd490e800
commit 8ae9921f2e

View File

@ -50,11 +50,12 @@
* derived from existing capabilities, but only if they have the same or a * derived from existing capabilities, but only if they have the same or a
* strict subset of the rights on the original capability. * strict subset of the rights on the original capability.
* *
* System calls permitted in capability mode are defined in capabilities.conf; * System calls permitted in capability mode are defined by CAPENABLED
* calls must be carefully audited for safety to ensure that they don't allow * flags in syscalls.master; calls must be carefully audited for safety
* escape from a sandbox. Some calls permit only a subset of operations in * to ensure that they don't allow escape from a sandbox. Some calls
* capability mode -- for example, shm_open(2) is limited to creating * permit only a subset of operations in capability mode -- for example,
* anonymous, rather than named, POSIX shared memory objects. * shm_open(2) is limited to creating anonymous, rather than named,
* POSIX shared memory objects.
*/ */
#include <sys/cdefs.h> #include <sys/cdefs.h>