1
0
mirror of https://git.FreeBSD.org/src.git synced 2024-12-24 11:29:10 +00:00
freebsd/sys/security
Pawel Jakub Dawidek 7493f24ee6 - Implement two new system calls:
int bindat(int fd, int s, const struct sockaddr *addr, socklen_t addrlen);
	int connectat(int fd, int s, const struct sockaddr *name, socklen_t namelen);

  which allow to bind and connect respectively to a UNIX domain socket with a
  path relative to the directory associated with the given file descriptor 'fd'.

- Add manual pages for the new syscalls.

- Make the new syscalls available for processes in capability mode sandbox.

- Add capability rights CAP_BINDAT and CAP_CONNECTAT that has to be present on
  the directory descriptor for the syscalls to work.

- Update audit(4) to support those two new syscalls and to handle path
  in sockaddr_un structure relative to the given directory descriptor.

- Update procstat(1) to recognize the new capability rights.

- Document the new capability rights in cap_rights_limit(2).

Sponsored by:	The FreeBSD Foundation
Discussed with:	rwatson, jilles, kib, des
2013-03-02 21:11:30 +00:00
..
audit - Implement two new system calls: 2013-03-02 21:11:30 +00:00
mac Remove the support for using non-mpsafe filesystem modules. 2012-10-22 17:50:54 +00:00
mac_biba Remove direct access to si_name. 2012-02-10 12:35:57 +00:00
mac_bsdextended
mac_ifoff
mac_lomac Remove direct access to si_name. 2012-02-10 12:35:57 +00:00
mac_mls Check vplabel for NULL before dereferencing it. Fixes a panic 2012-05-03 15:51:34 +00:00
mac_none
mac_partition
mac_portacl
mac_seeotheruids
mac_stub
mac_test