| #
8ae9921f
|
| 22-Oct-2024 |
Brooks Davis <brooks@FreeBSD.org> |
sys_capability.c: update the source of CAPENABLED
System calls allowed in capability mode have been specified by the CAPENABLED flag in syscalls.master since 2021.
|
| #
61e3e177
|
| 22-Jan-2024 |
Pawel Jakub Dawidek <pjd@FreeBSD.org> |
capsicum: SIGTRAP is delivered also on ECAPMODE error.
Approved by: oshogbo (mentor)
|
| #
9bec8413
|
| 06-Apr-2024 |
Jake Freeland <jfree@FreeBSD.org> |
ktrace: Record detailed ECAPMODE violations
When a Capsicum violation occurs in the kernel, ktrace will now record detailed information pertaining to the violation.
For example: - When a namei look
ktrace: Record detailed ECAPMODE violations
When a Capsicum violation occurs in the kernel, ktrace will now record detailed information pertaining to the violation.
For example: - When a namei lookup violation occurs, ktrace will record the path. - When a signal violation occurs, ktrace will record the signal number. - When a sendto(2) violation occurs, ktrace will record the recipient sockaddr.
For all violations, the syscall and ABI is recorded.
kdump is also modified to display this new information to the user.
Reviewed by: oshogbo, markj Approved by: markj (mentor) MFC after: 1 month Differential Revision: https://reviews.freebsd.org/D40676
show more ...
|
| #
685dc743
|
| 16-Aug-2023 |
Warner Losh <imp@FreeBSD.org> |
sys: Remove $FreeBSD$: one-line .c pattern
Remove /^[\s*]*__FBSDID\("\$FreeBSD\$"\);?\s*\n/
|
| #
4d846d26
|
| 10-May-2023 |
Warner Losh <imp@FreeBSD.org> |
spdx: The BSD-2-Clause-FreeBSD identifier is obsolete, drop -FreeBSD
The SPDX folks have obsoleted the BSD-2-Clause-FreeBSD identifier. Catch up to that fact and revert to their recommended match of
spdx: The BSD-2-Clause-FreeBSD identifier is obsolete, drop -FreeBSD
The SPDX folks have obsoleted the BSD-2-Clause-FreeBSD identifier. Catch up to that fact and revert to their recommended match of BSD-2-Clause.
Discussed with: pfg MFC After: 3 days Sponsored by: Netflix
show more ...
|
| #
f17ef286
|
| 22-Feb-2022 |
Mateusz Guzik <mjg@FreeBSD.org> |
fd: rename fget*_locked to fget*_noref
This gets rid of the error prone naming where fget_unlocked returns with a ref held, while fget_locked requires a lock but provides nothing in terms of making
fd: rename fget*_locked to fget*_noref
This gets rid of the error prone naming where fget_unlocked returns with a ref held, while fget_locked requires a lock but provides nothing in terms of making sure the file lives past unlock.
No functional changes.
show more ...
|
| #
2d896b81
|
| 19-Mar-2020 |
Mark Johnston <markj@FreeBSD.org> |
Enter a write sequence when updating rights.
The Capsicum system calls modify file descriptor table entries. To ensure that readers observe a consistent snapshot of descriptor writes, the system ca
Enter a write sequence when updating rights.
The Capsicum system calls modify file descriptor table entries. To ensure that readers observe a consistent snapshot of descriptor writes, the system calls need to signal to unlocked readers that an update is pending.
Note that ioctl rights are always checked with the descriptor table lock held, so it is not strictly necessary to signal unlocked readers. However, we probably want to enable lockless ioctl checks eventually, so use seqc_write_begin() in kern_cap_ioctls_limit() too.
Reviewed by: kib MFC after: 2 weeks Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D24119
show more ...
|
| #
dca7f66f
|
| 15-Feb-2020 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r357931 through r357965.
|
| #
eb40664d
|
| 15-Feb-2020 |
Mateusz Guzik <mjg@FreeBSD.org> |
capsicum: use new helpers
|
| #
74dc6beb
|
| 14-Feb-2020 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r357855 through r357920.
|
| #
0f5f49ef
|
| 14-Feb-2020 |
Kyle Evans <kevans@FreeBSD.org> |
u_char -> vm_prot_t in a couple of places, NFC
The latter is a typedef of the former; the typedef exists and these bits are representing vmprot values, so use the correct type.
Submitted by: sigsys
u_char -> vm_prot_t in a couple of places, NFC
The latter is a typedef of the former; the typedef exists and these bits are representing vmprot values, so use the correct type.
Submitted by: sigsys@gmail.com MFC after: 3 days
show more ...
|
| #
bc02c18c
|
| 07-Feb-2020 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r357408 through r357661.
|
| #
bcd1cf4f
|
| 03-Feb-2020 |
Mateusz Guzik <mjg@FreeBSD.org> |
capsicum: faster cap_rights_contains
Instead of doing a 2 iteration loop (determined at runeimt), take advantage of the fact that the size is already known.
While here provdie cap_check_inline so t
capsicum: faster cap_rights_contains
Instead of doing a 2 iteration loop (determined at runeimt), take advantage of the fact that the size is already known.
While here provdie cap_check_inline so that fget_unlocked does not have to do a function call.
Verified with the capsicum suite /usr/tests.
show more ...
|
| #
67350cb5
|
| 09-Dec-2018 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r340918 through r341763.
|
| #
afde86eb
|
| 06-Dec-2018 |
Mark Johnston <markj@FreeBSD.org> |
Let kern.trap_enotcap be set as a tunable.
This is handy for testing programs that are run by rc.
MFC after: 1 week Sponsored by: The FreeBSD Foundation
|
| #
c6879c6c
|
| 23-Oct-2018 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r339015 through r339669.
|
| #
98fca94d
|
| 12-Oct-2018 |
Mateusz Guzik <mjg@FreeBSD.org> |
capsicum: provide cap_rights_fde_inline
Reading caps is in the hot path (on each successful fd lookup), but completely unnecessarily requires a function call.
Approved by: re (gjb) Sponsored by: Th
capsicum: provide cap_rights_fde_inline
Reading caps is in the hot path (on each successful fd lookup), but completely unnecessarily requires a function call.
Approved by: re (gjb) Sponsored by: The FreeBSD Foundation
show more ...
|
| #
8ae9921f
|
| 22-Oct-2024 |
Brooks Davis <brooks@FreeBSD.org> |
sys_capability.c: update the source of CAPENABLED
System calls allowed in capability mode have been specified by the CAPENABLED flag in syscalls.master since 2021.
|
| #
61e3e177
|
| 22-Jan-2024 |
Pawel Jakub Dawidek <pjd@FreeBSD.org> |
capsicum: SIGTRAP is delivered also on ECAPMODE error.
Approved by: oshogbo (mentor)
|
| #
9bec8413
|
| 06-Apr-2024 |
Jake Freeland <jfree@FreeBSD.org> |
ktrace: Record detailed ECAPMODE violations
When a Capsicum violation occurs in the kernel, ktrace will now record detailed information pertaining to the violation.
For example: - When a namei look
ktrace: Record detailed ECAPMODE violations
When a Capsicum violation occurs in the kernel, ktrace will now record detailed information pertaining to the violation.
For example: - When a namei lookup violation occurs, ktrace will record the path. - When a signal violation occurs, ktrace will record the signal number. - When a sendto(2) violation occurs, ktrace will record the recipient sockaddr.
For all violations, the syscall and ABI is recorded.
kdump is also modified to display this new information to the user.
Reviewed by: oshogbo, markj Approved by: markj (mentor) MFC after: 1 month Differential Revision: https://reviews.freebsd.org/D40676
show more ...
|
| #
685dc743
|
| 16-Aug-2023 |
Warner Losh <imp@FreeBSD.org> |
sys: Remove $FreeBSD$: one-line .c pattern
Remove /^[\s*]*__FBSDID\("\$FreeBSD\$"\);?\s*\n/
|
| #
4d846d26
|
| 10-May-2023 |
Warner Losh <imp@FreeBSD.org> |
spdx: The BSD-2-Clause-FreeBSD identifier is obsolete, drop -FreeBSD
The SPDX folks have obsoleted the BSD-2-Clause-FreeBSD identifier. Catch up to that fact and revert to their recommended match of
spdx: The BSD-2-Clause-FreeBSD identifier is obsolete, drop -FreeBSD
The SPDX folks have obsoleted the BSD-2-Clause-FreeBSD identifier. Catch up to that fact and revert to their recommended match of BSD-2-Clause.
Discussed with: pfg MFC After: 3 days Sponsored by: Netflix
show more ...
|
| #
f17ef286
|
| 22-Feb-2022 |
Mateusz Guzik <mjg@FreeBSD.org> |
fd: rename fget*_locked to fget*_noref
This gets rid of the error prone naming where fget_unlocked returns with a ref held, while fget_locked requires a lock but provides nothing in terms of making
fd: rename fget*_locked to fget*_noref
This gets rid of the error prone naming where fget_unlocked returns with a ref held, while fget_locked requires a lock but provides nothing in terms of making sure the file lives past unlock.
No functional changes.
show more ...
|
| #
2d896b81
|
| 19-Mar-2020 |
Mark Johnston <markj@FreeBSD.org> |
Enter a write sequence when updating rights.
The Capsicum system calls modify file descriptor table entries. To ensure that readers observe a consistent snapshot of descriptor writes, the system ca
Enter a write sequence when updating rights.
The Capsicum system calls modify file descriptor table entries. To ensure that readers observe a consistent snapshot of descriptor writes, the system calls need to signal to unlocked readers that an update is pending.
Note that ioctl rights are always checked with the descriptor table lock held, so it is not strictly necessary to signal unlocked readers. However, we probably want to enable lockless ioctl checks eventually, so use seqc_write_begin() in kern_cap_ioctls_limit() too.
Reviewed by: kib MFC after: 2 weeks Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D24119
show more ...
|
| #
dca7f66f
|
| 15-Feb-2020 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r357931 through r357965.
|