aboutsummaryrefslogtreecommitdiff
path: root/sys/kern/sys_capability.c
Commit message (Expand)AuthorAgeFilesLines
* capsicum: perform copyout without the fildesc lock held in sys_cap_ioctls_getMariusz Zaborski2016-10-211-18/+40
* Add PROC_TRAPCAP procctl(2) controls and global sysctl kern.trap_enocap.Konstantin Belousov2016-09-211-0/+4
* Eliminate unnecessary loop in _cap_check()Allan Jude2016-08-311-7/+4
* Introduce kern_cap_rights_limit().Ed Schouten2015-08-111-25/+30
* cred: add proc_set_cred helperMateusz Guzik2015-03-161-1/+1
* Use crcopysafe(9) to make a copy of a process' credential struct. crcopy(9)Mark Johnston2015-01-051-2/+1
* Prepare fget_unlocked for reading fd table only once.Mateusz Guzik2014-07-231-6/+21
* Update kernel inclusions of capability.h to use capsicum.h instead; someRobert Watson2014-03-161-1/+1
* This looks like a typo that breaks the build. Yell at me if this isn't theSean Bruno2013-09-051-1/+1
* Change the cap_rights_t type from uint64_t to a structure that we can extendPawel Jakub Dawidek2013-09-051-94/+76
* Implement 32bit versions of the cap_ioctls_limit(2) and cap_ioctls_get(2)Pawel Jakub Dawidek2013-08-181-21/+30
* Use proper malloc type for ioctls white-list.Pawel Jakub Dawidek2013-05-231-5/+7
* Merge Capsicum overhaul:Pawel Jakub Dawidek2013-03-021-295/+350
* Remove redundant parenthesis.Pawel Jakub Dawidek2013-02-171-1/+1
* Style: move opt_*.h includes in the proper place.Pawel Jakub Dawidek2012-06-101-3/+3
* Allways call fdrop().Peter Holm2012-03-121-5/+3
* Revisit the capability failure trace points. The initial implementationDag-Erling Smørgrav2011-10-181-2/+8
* Add a new trace point, KTRFAC_CAPFAIL, which traces capability checkDag-Erling Smørgrav2011-10-111-1/+9
* In order to maximize the re-usability of kernel code in user space thisKip Macy2011-09-161-8/+8
* Add the fo_chown and fo_chmod methods to struct fileops and use themKonstantin Belousov2011-08-161-0/+22
* Update use of the FEATURE() macro in sys_capability.c to reflect the moveRobert Watson2011-08-131-1/+3
* Now that capability support has been committed, update and expand theRobert Watson2011-08-131-3/+17
* Allow Capsicum capabilities to delegate constrainedJonathan Anderson2011-08-131-9/+9
* Second-to-last commit implementing Capsicum capabilities in the FreeBSDRobert Watson2011-08-111-1/+1
* Turn on AUDIT_ARG_RIGHTS() for cap_new(2).Jonathan Anderson2011-07-221-2/+0
* Add cap_new() and cap_getrights() system calls.Jonathan Anderson2011-07-151-0/+67
* Add implementation for capabilities.Jonathan Anderson2011-07-151-4/+214
* Add kernel functions to unwrap capabilities.Jonathan Anderson2011-07-041-0/+122
* We may split today's CAPABILITIES into CAPABILITY_MODE (which hasJonathan Anderson2011-06-291-4/+4
* Remove redundant Capsicum sysctl.Jonathan Anderson2011-06-251-7/+0
* - Add a FEATURE for capsicum (security_capabilities).Alexander Leidinger2011-03-041-0/+2
* Add initial support for Capsicum's Capability Mode to the FreeBSD kernel,Robert Watson2011-03-011-0/+123