summaryrefslogtreecommitdiffstats
path: root/sys/sys/capability.h
diff options
context:
space:
mode:
authorjonathan <jonathan@FreeBSD.org>2011-08-13 09:21:16 +0000
committerjonathan <jonathan@FreeBSD.org>2011-08-13 09:21:16 +0000
commitf63d2e920584a3d403a07e765a61eeac57210332 (patch)
tree3334bf0dc037565dbb28b66bfe83c6d9e8823738 /sys/sys/capability.h
parent0ba1fe7d116a032383d49c9a252a5f09682c76f0 (diff)
downloadFreeBSD-src-f63d2e920584a3d403a07e765a61eeac57210332.zip
FreeBSD-src-f63d2e920584a3d403a07e765a61eeac57210332.tar.gz
Allow Capsicum capabilities to delegate constrained
access to file system subtrees to sandboxed processes. - Use of absolute paths and '..' are limited in capability mode. - Use of absolute paths and '..' are limited when looking up relative to a capability. - When a name lookup is performed, identify what operation is to be performed (such as CAP_MKDIR) as well as check for CAP_LOOKUP. With these constraints, openat() and friends are now safe in capability mode, and can then be used by code such as the capability-mode runtime linker. Approved by: re (bz), mentor (rwatson) Sponsored by: Google Inc
Diffstat (limited to 'sys/sys/capability.h')
-rw-r--r--sys/sys/capability.h2
1 files changed, 1 insertions, 1 deletions
diff --git a/sys/sys/capability.h b/sys/sys/capability.h
index 54fcaa0..d67dc17 100644
--- a/sys/sys/capability.h
+++ b/sys/sys/capability.h
@@ -142,7 +142,7 @@
* Create a capability to wrap a file object.
*/
int kern_capwrap(struct thread *td, struct file *fp, cap_rights_t rights,
- struct file **cap, int *capfd);
+ int *capfd);
/*
* Unwrap a capability if its rights mask is a superset of 'rights'.
OpenPOWER on IntegriCloud