2011-07-20 13:29:39 +00:00
|
|
|
.\"
|
|
|
|
.\" Copyright (c) 2008-2010 Robert N. M. Watson
|
|
|
|
.\" All rights reserved.
|
|
|
|
.\"
|
|
|
|
.\" This software was developed at the University of Cambridge Computer
|
|
|
|
.\" Laboratory with support from a grant from Google, Inc.
|
|
|
|
.\"
|
|
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
|
|
.\" modification, are permitted provided that the following conditions
|
|
|
|
.\" are met:
|
|
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
|
|
.\"
|
|
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
|
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
.\" SUCH DAMAGE.
|
|
|
|
.\"
|
|
|
|
.\" $FreeBSD$
|
|
|
|
.\"
|
|
|
|
.Dd July 20, 2011
|
|
|
|
.Dt CAP_NEW 2
|
|
|
|
.Os
|
|
|
|
.Sh NAME
|
|
|
|
.Nm cap_new ,
|
|
|
|
.Nm cap_getrights
|
|
|
|
.Nd System calls to manipulate capabilities
|
|
|
|
.Sh LIBRARY
|
|
|
|
.Lb libc
|
|
|
|
.Sh SYNOPSIS
|
|
|
|
.In sys/capability.h
|
|
|
|
.Ft int
|
|
|
|
.Fn cap_new "int fd" "cap_rights_t rights"
|
|
|
|
.Ft int
|
|
|
|
.Fn cap_getrights "int fd" "cap_rights_t *rightsp"
|
|
|
|
.Sh DESCRIPTION
|
|
|
|
Capabilities are special file descriptors derived from an existing file
|
|
|
|
descriptor, such as one returned by
|
|
|
|
.Xr fhopen 2 ,
|
|
|
|
.Xr kqueue 2 ,
|
|
|
|
.Xr mq_open 2 ,
|
|
|
|
.Xr open 2 ,
|
|
|
|
.Xr pipe 2 ,
|
|
|
|
.Xr shm_open 2 ,
|
|
|
|
.Xr socket 2 ,
|
|
|
|
or
|
|
|
|
.Xr socketpair 2 ,
|
|
|
|
but with a restricted set of permitted operations determined by a rights
|
|
|
|
mask set when the capability is created.
|
|
|
|
These restricted rights cannot be changed after the capability is created,
|
|
|
|
although further capabilities with yet more restricted rights may be created
|
|
|
|
from an existing capability.
|
|
|
|
In every other sense, a capability behaves in the same way as the file
|
|
|
|
descriptor it was created from.
|
|
|
|
.Pp
|
|
|
|
.Fn cap_new
|
|
|
|
creates a new capability for the existing file descriptor
|
|
|
|
.Fa fd ,
|
|
|
|
and returns a file descriptor for it.
|
|
|
|
Operations on the capability will be limited to those permitted by
|
|
|
|
.Fa rights ,
|
|
|
|
which is static for the lifetime of the capability.
|
|
|
|
If
|
|
|
|
.Fa fd
|
|
|
|
refers to an existing capability, then
|
|
|
|
.Fa rights
|
|
|
|
must be equal to or a subset of the rights on that capability.
|
|
|
|
As with
|
|
|
|
.Xr dup 2
|
|
|
|
and
|
|
|
|
.Xr dup2 2 ,
|
|
|
|
many properties are shared between the new capability and the existing file
|
|
|
|
descriptor, including open file flags, blocking disposition, and file offset.
|
|
|
|
Many applications will prefer to use the
|
|
|
|
.Xr cap_limitfd 3
|
|
|
|
library call, part of
|
|
|
|
.Xr libcapsicum 3 ,
|
|
|
|
as it offers a more convenient interface.
|
|
|
|
.Pp
|
|
|
|
.Fn cap_getrights
|
|
|
|
queries the rights associated with the capability referred to by file
|
|
|
|
descriptor
|
|
|
|
.Fa fd .
|
|
|
|
.Pp
|
|
|
|
These system calls, when combined with
|
|
|
|
.Xr cap_enter 2 ,
|
|
|
|
may be used to construct process sandboxes with highly granular rights
|
|
|
|
assignment.
|
|
|
|
.Sh RIGHTS
|
|
|
|
The following rights may be specified in a new capability rights mask:
|
|
|
|
.Bl -tag -width CAP_EXTATTR_DELETE
|
|
|
|
.It Dv CAP_ACCEPT
|
|
|
|
Permit
|
|
|
|
.Xr accept 2 .
|
|
|
|
.It Dv CAP_ACL_CHECK
|
|
|
|
Permit checking of an ACL on a file descriptor; there is no cross-reference
|
|
|
|
for this system call.
|
|
|
|
.It Dv CAP_ACL_DELETE
|
|
|
|
Permit
|
2011-12-29 21:12:22 +00:00
|
|
|
.Xr acl_delete_fd_np 3 .
|
2011-07-20 13:29:39 +00:00
|
|
|
.It Dv CAP_ACL_GET
|
|
|
|
Permit
|
2011-12-29 21:12:22 +00:00
|
|
|
.Xr acl_get_fd 3
|
2011-07-20 13:29:39 +00:00
|
|
|
and
|
2011-12-29 21:12:22 +00:00
|
|
|
.Xr acl_get_fd_np 3 .
|
2011-07-20 13:29:39 +00:00
|
|
|
.It Dv CAP_ACL_SET
|
|
|
|
Permit
|
2011-12-29 21:12:22 +00:00
|
|
|
.Xr acl_set_fd 3
|
2011-07-20 13:29:39 +00:00
|
|
|
and
|
2011-12-29 21:12:22 +00:00
|
|
|
.Xr acl_set_fd_np 3 .
|
2011-07-20 13:29:39 +00:00
|
|
|
.It Dv CAP_BIND
|
|
|
|
Permit
|
|
|
|
.Xr bind 2 .
|
|
|
|
Note that sockets can also become bound implicitly as a result of
|
|
|
|
.Xr connect 2
|
|
|
|
or
|
|
|
|
.Xr send 2 ,
|
|
|
|
and that socket options set with
|
|
|
|
.Xr setsockopt 2
|
|
|
|
may also affect binding behavior.
|
|
|
|
.It Dv CAP_CONNECT
|
|
|
|
Permit
|
|
|
|
.Xr connect 2 ;
|
|
|
|
also required for
|
|
|
|
.Xr sendto 2
|
|
|
|
with a non-NULL destination address.
|
|
|
|
.It Dv CAP_EVENT
|
|
|
|
Permit
|
|
|
|
.Xr select 2 ,
|
|
|
|
.Xr poll 2 ,
|
|
|
|
and
|
|
|
|
.Xr kevent 2
|
|
|
|
to be used in monitoring the file descriptor for events.
|
|
|
|
.It Dv CAP_FEXECVE
|
|
|
|
Permit
|
|
|
|
.Xr fexecve 2 ;
|
|
|
|
.Dv CAP_READ
|
|
|
|
will also be required.
|
|
|
|
.It Dv CAP_EXTATTR_DELETE
|
|
|
|
Permit
|
|
|
|
.Xr extattr_delete_fd 2 .
|
|
|
|
.It Dv CAP_EXTATTR_GET
|
|
|
|
Permit
|
|
|
|
.Xr extattr_get_fd 2 .
|
|
|
|
.It Dv CAP_EXTATTR_LIST
|
|
|
|
Permit
|
|
|
|
.Xr extattr_list_fd 2 .
|
|
|
|
.It Dv CAP_EXTATTR_SET
|
|
|
|
Permit
|
|
|
|
.Xr extattr_set_fd 2 .
|
|
|
|
.It Dv CAP_FCHDIR
|
|
|
|
Permit
|
|
|
|
.Xr fchdir 2 .
|
|
|
|
.It Dv CAP_FCHFLAGS
|
|
|
|
Permit
|
|
|
|
.Xr fchflags 2 .
|
|
|
|
.It Dv CAP_FCHMOD
|
|
|
|
Permit
|
|
|
|
.Xr fchmod 2 .
|
|
|
|
.It Dv CAP_FCHOWN
|
|
|
|
Permit
|
|
|
|
.Xr fchown 2 .
|
|
|
|
.It Dv CAP_FCNTL
|
|
|
|
Permit
|
|
|
|
.Xr fcntl 2 ;
|
|
|
|
be aware that this call provides indirect access to other operations, such as
|
|
|
|
.Xr flock 2 .
|
|
|
|
.It Dv CAP_FLOCK
|
|
|
|
Permit
|
|
|
|
.Xr flock 2
|
|
|
|
and related calls.
|
|
|
|
.It Dv CAP_FPATHCONF
|
|
|
|
Permit
|
|
|
|
.Xr fpathconf 2 .
|
|
|
|
.It Dv CAP_FSCK
|
|
|
|
Permit UFS background-fsck operations on the descriptor.
|
|
|
|
.It Dv CAP_FSTAT
|
|
|
|
Permit
|
|
|
|
.Xr fstat 2 .
|
|
|
|
.It Dv CAP_FSTATFS
|
|
|
|
Permit
|
|
|
|
.Xr fstatfs 2 .
|
|
|
|
.It Dv CAP_FSYNC
|
|
|
|
Permit
|
|
|
|
.Xr aio_fsync 2
|
|
|
|
and
|
|
|
|
.Xr fsync 2 .
|
|
|
|
.Pp
|
|
|
|
.It Dv CAP_FTRUNCATE
|
|
|
|
Permit
|
|
|
|
.Xr ftruncate 2 .
|
|
|
|
.It Dv CAP_FUTIMES
|
|
|
|
Permit
|
|
|
|
.Xr futimes 2 .
|
|
|
|
.It Dv CAP_GETPEERNAME
|
|
|
|
Permit
|
|
|
|
.Xr getpeername 2 .
|
|
|
|
.It Dv CAP_GETSOCKNAME
|
|
|
|
Permit
|
|
|
|
.Xr getsockname 2 .
|
|
|
|
.It Dv CAP_GETSOCKOPT
|
|
|
|
Permit
|
|
|
|
.Xr getsockopt 2 .
|
|
|
|
.It Dv CAP_IOCTL
|
|
|
|
Permit
|
|
|
|
.Xr ioctl 2 .
|
|
|
|
Be aware that this system call has enormous scope, including potentially
|
|
|
|
global scope for some objects.
|
|
|
|
.It Dv CAP_KEVENT
|
|
|
|
Permit
|
|
|
|
.Xr kevent 2 ;
|
|
|
|
.Dv CAP_EVENT
|
|
|
|
is also required on file descriptors that will be monitored using
|
|
|
|
.Xr kevent 2 .
|
|
|
|
.It Dv CAP_LISTEN
|
|
|
|
Permit
|
|
|
|
.Xr listen 2 ;
|
|
|
|
not much use (generally) without
|
|
|
|
.Dv CAP_BIND .
|
|
|
|
.It Dv CAP_LOOKUP
|
|
|
|
Permit the file descriptor to be used as a starting directory for calls such
|
|
|
|
as
|
|
|
|
.Xr linkat 2 ,
|
|
|
|
.Xr openat 2 ,
|
|
|
|
and
|
|
|
|
.Xr unlinkat 2 .
|
|
|
|
Note that these calls are not available in capability mode as they manipulate
|
|
|
|
a global name space; see
|
|
|
|
.Xr cap_enter 2
|
|
|
|
for details.
|
|
|
|
.It Dv CAP_MAC_GET
|
|
|
|
Permit
|
2011-12-29 21:12:22 +00:00
|
|
|
.Xr mac_get_fd 3 .
|
2011-07-20 13:29:39 +00:00
|
|
|
.It Dv CAP_MAC_SET
|
|
|
|
Permit
|
2011-12-29 21:12:22 +00:00
|
|
|
.Xr mac_set_fd 3 .
|
2011-07-20 13:29:39 +00:00
|
|
|
.It Dv CAP_MMAP
|
|
|
|
Permit
|
|
|
|
.Xr mmap 2 ;
|
|
|
|
specific invocations may also require
|
|
|
|
.Dv CAP_READ
|
|
|
|
or
|
|
|
|
.Dv CAP_WRITE .
|
|
|
|
.Pp
|
|
|
|
.It Dv CAP_PDGETPID
|
|
|
|
Permit
|
|
|
|
.Xr pdgetpid 2 .
|
|
|
|
.It Dv CAP_PDKILL
|
|
|
|
Permit
|
|
|
|
.Xr pdkill 2 .
|
|
|
|
.It Dv CAP_PDWAIT
|
|
|
|
Permit
|
Add experimental support for process descriptors
A "process descriptor" file descriptor is used to manage processes
without using the PID namespace. This is required for Capsicum's
Capability Mode, where the PID namespace is unavailable.
New system calls pdfork(2) and pdkill(2) offer the functional equivalents
of fork(2) and kill(2). pdgetpid(2) allows querying the PID of the remote
process for debugging purposes. The currently-unimplemented pdwait(2) will,
in the future, allow querying rusage/exit status. In the interim, poll(2)
may be used to check (and wait for) process termination.
When a process is referenced by a process descriptor, it does not issue
SIGCHLD to the parent, making it suitable for use in libraries---a common
scenario when using library compartmentalisation from within large
applications (such as web browsers). Some observers may note a similarity
to Mach task ports; process descriptors provide a subset of this behaviour,
but in a UNIX style.
This feature is enabled by "options PROCDESC", but as with several other
Capsicum kernel features, is not enabled by default in GENERIC 9.0.
Reviewed by: jhb, kib
Approved by: re (kib), mentor (rwatson)
Sponsored by: Google Inc
2011-08-18 22:51:30 +00:00
|
|
|
.Xr pdwait4 2 .
|
2011-07-20 13:29:39 +00:00
|
|
|
.It Dv CAP_PEELOFF
|
|
|
|
Permit
|
|
|
|
.Xr sctp_peeloff 2 .
|
|
|
|
.It Dv CAP_READ
|
|
|
|
Allow
|
|
|
|
.Xr aio_read 2 ,
|
|
|
|
.Xr pread 2 ,
|
|
|
|
.Xr read 2 ,
|
|
|
|
.Xr recv 2 ,
|
|
|
|
.Xr recvfrom 2 ,
|
|
|
|
.Xr recvmsg 2 ,
|
|
|
|
and related system calls.
|
|
|
|
.Pp
|
|
|
|
For files and other seekable objects,
|
|
|
|
.Dv CAP_SEEK
|
|
|
|
may also be required.
|
|
|
|
.It Dv CAP_REVOKE
|
|
|
|
Permit
|
|
|
|
.Xr frevoke 2
|
|
|
|
in certain ABI compatibility modes that support this system call.
|
|
|
|
.It Dv CAP_SEEK
|
|
|
|
Permit operations that seek on the file descriptor, such as
|
|
|
|
.Xr lseek 2 ,
|
|
|
|
but also required for I/O system calls that modify the file offset, such as
|
|
|
|
.Xr read 2
|
|
|
|
and
|
|
|
|
.Xr write 2 .
|
|
|
|
.It Dv CAP_SEM_GETVALUE
|
|
|
|
Permit
|
|
|
|
.Xr sem_getvalue 3 .
|
|
|
|
.It Dv CAP_SEM_POST
|
|
|
|
Permit
|
|
|
|
.Xr sem_post 3 .
|
|
|
|
.It Dv CAP_SEM_WAIT
|
|
|
|
Permit
|
|
|
|
.Xr sem_wait 3
|
|
|
|
and
|
|
|
|
.Xr sem_trywait 3 .
|
|
|
|
.It Dv CAP_SETSOCKOPT
|
|
|
|
Permit
|
|
|
|
.Xr setsockopt 2 ;
|
|
|
|
this controls various aspects of socket behavior and may affect binding,
|
|
|
|
connecting, and other behaviors with global scope.
|
|
|
|
.It Dv CAP_SHUTDOWN
|
|
|
|
Permit explicit
|
|
|
|
.Xr shutdown 2 ;
|
|
|
|
closing the socket will also generally shut down any connections on it.
|
|
|
|
.It Dv CAP_TTYHOOK
|
|
|
|
Allow configuration of TTY hooks, such as
|
|
|
|
.Xr snp 4 ,
|
|
|
|
on the file descriptor.
|
|
|
|
.It Dv CAP_WRITE
|
|
|
|
Allow
|
|
|
|
.Xr aio_write 2 ,
|
|
|
|
.Xr pwrite 2 ,
|
|
|
|
.Xr send 2 ,
|
|
|
|
.Xr sendmsg 2 ,
|
|
|
|
.Xr sendto 2 ,
|
|
|
|
.Xr write 2 ,
|
|
|
|
and related system calls.
|
|
|
|
.Pp
|
|
|
|
For files and other seekable objects,
|
|
|
|
.Dv CAP_SEEK
|
|
|
|
may also be required.
|
|
|
|
.Pp
|
|
|
|
For
|
|
|
|
.Xr sendto 2
|
|
|
|
with a non-NULL connection address,
|
|
|
|
.Dv CAP_CONNECT
|
|
|
|
is also required.
|
|
|
|
.El
|
|
|
|
.Sh CAVEAT
|
|
|
|
The
|
|
|
|
.Fn cap_new
|
|
|
|
system call and the capabilities it creates may be used to assign
|
|
|
|
fine-grained rights to sandboxed processes running in capability mode.
|
|
|
|
However, the semantics of objects accessed via file descriptors are complex,
|
|
|
|
so caution should be exercised in passing object capabilities into sandboxes.
|
|
|
|
.Sh RETURN VALUES
|
|
|
|
If successful,
|
|
|
|
.Fn cap_new
|
|
|
|
returns a non-negative integer, termed a file descriptor.
|
|
|
|
It returns -1 on failure, and sets
|
|
|
|
.Va errno
|
|
|
|
to indicate the error.
|
|
|
|
.Pp
|
|
|
|
.Rv -std cap_getrights
|
|
|
|
.Sh ERRORS
|
|
|
|
.Fn cap_new
|
|
|
|
may return the following errors:
|
|
|
|
.Bl -tag -width Er
|
|
|
|
.It Bq Er EBADF
|
|
|
|
The
|
|
|
|
.Fa fd
|
|
|
|
argument is not a valid active descriptor.
|
|
|
|
.It Bq Er EINVAL
|
|
|
|
An invalid right has been requested in
|
|
|
|
.Fa rights .
|
|
|
|
.It Bq Er EMFILE
|
|
|
|
The process has already reached its limit for open file descriptors.
|
|
|
|
.It Bq Er ENFILE
|
|
|
|
The system file table is full.
|
|
|
|
.It Bq Er EPERM
|
|
|
|
.Fa rights
|
|
|
|
contains requested rights not present in the current rights mask associated
|
|
|
|
with the capability referenced by
|
|
|
|
.Fa fd ,
|
|
|
|
if any.
|
|
|
|
.El
|
|
|
|
.Pp
|
|
|
|
.Fn cap_getrights
|
|
|
|
may return the following errors:
|
|
|
|
.Bl -tag -width Er
|
|
|
|
.It Bq Er EBADF
|
|
|
|
The
|
|
|
|
.Fa fd
|
|
|
|
argument is not a valid active descriptor.
|
|
|
|
.It Bq Er EINVAL
|
|
|
|
The
|
|
|
|
.Fa fd
|
|
|
|
argument is not a capability.
|
|
|
|
.El
|
|
|
|
.Sh SEE ALSO
|
|
|
|
.Xr accept 2 ,
|
|
|
|
.Xr aio_fsync 2 ,
|
2011-12-29 21:12:22 +00:00
|
|
|
.Xr aio_read 2 ,
|
2011-07-20 13:29:39 +00:00
|
|
|
.Xr aio_write 2 ,
|
|
|
|
.Xr bind 2 ,
|
|
|
|
.Xr cap_enter 2 ,
|
|
|
|
.Xr connect 2 ,
|
|
|
|
.Xr dup 2 ,
|
|
|
|
.Xr dup2 2 ,
|
|
|
|
.Xr extattr_delete_fd 2 ,
|
|
|
|
.Xr extattr_get_fd 2 ,
|
|
|
|
.Xr extattr_list_fd 2 ,
|
|
|
|
.Xr extattr_set_fd 2 ,
|
|
|
|
.Xr fchflags 2 ,
|
|
|
|
.Xr fchown 2 ,
|
|
|
|
.Xr fcntl 2 ,
|
|
|
|
.Xr fexecve 2 ,
|
|
|
|
.Xr fhopen 2 ,
|
|
|
|
.Xr flock 2 ,
|
|
|
|
.Xr fpathconf 2 ,
|
|
|
|
.Xr fstat 2 ,
|
|
|
|
.Xr fstatfs 2 ,
|
|
|
|
.Xr fsync 2 ,
|
|
|
|
.Xr ftruncate 2 ,
|
|
|
|
.Xr futimes 2 ,
|
|
|
|
.Xr getpeername 2 ,
|
|
|
|
.Xr getsockname 2 ,
|
|
|
|
.Xr getsockopt 2 ,
|
|
|
|
.Xr ioctl 2 ,
|
|
|
|
.Xr kevent 2 ,
|
|
|
|
.Xr kqueue 2 ,
|
|
|
|
.Xr linkat 2 ,
|
|
|
|
.Xr listen 2 ,
|
|
|
|
.Xr mmap 2 ,
|
|
|
|
.Xr mq_open 2 ,
|
|
|
|
.Xr open 2 ,
|
|
|
|
.Xr openat 2 ,
|
|
|
|
.Xr pdgetpid 2 ,
|
|
|
|
.Xr pdkill 2 ,
|
Add experimental support for process descriptors
A "process descriptor" file descriptor is used to manage processes
without using the PID namespace. This is required for Capsicum's
Capability Mode, where the PID namespace is unavailable.
New system calls pdfork(2) and pdkill(2) offer the functional equivalents
of fork(2) and kill(2). pdgetpid(2) allows querying the PID of the remote
process for debugging purposes. The currently-unimplemented pdwait(2) will,
in the future, allow querying rusage/exit status. In the interim, poll(2)
may be used to check (and wait for) process termination.
When a process is referenced by a process descriptor, it does not issue
SIGCHLD to the parent, making it suitable for use in libraries---a common
scenario when using library compartmentalisation from within large
applications (such as web browsers). Some observers may note a similarity
to Mach task ports; process descriptors provide a subset of this behaviour,
but in a UNIX style.
This feature is enabled by "options PROCDESC", but as with several other
Capsicum kernel features, is not enabled by default in GENERIC 9.0.
Reviewed by: jhb, kib
Approved by: re (kib), mentor (rwatson)
Sponsored by: Google Inc
2011-08-18 22:51:30 +00:00
|
|
|
.Xr pdwait4 2 ,
|
2011-07-20 13:29:39 +00:00
|
|
|
.Xr pipe 2 ,
|
|
|
|
.Xr poll 2 ,
|
|
|
|
.Xr pread 2 ,
|
|
|
|
.Xr pwrite 2 ,
|
|
|
|
.Xr read 2 ,
|
|
|
|
.Xr recv 2 ,
|
|
|
|
.Xr recvfrom 2 ,
|
|
|
|
.Xr recvmsg 2 ,
|
|
|
|
.Xr sctp_peeloff 2 ,
|
|
|
|
.Xr select 2 ,
|
|
|
|
.Xr send 2 ,
|
|
|
|
.Xr sendmsg 2 ,
|
|
|
|
.Xr sendto 2 ,
|
|
|
|
.Xr setsockopt 2 ,
|
|
|
|
.Xr shm_open 2 ,
|
|
|
|
.Xr shutdown 2 ,
|
|
|
|
.Xr socket 2 ,
|
|
|
|
.Xr socketpair 2 ,
|
|
|
|
.Xr unlinkat 2 ,
|
|
|
|
.Xr write 2 ,
|
2011-12-29 21:12:22 +00:00
|
|
|
.Xr acl_delete_fd_np 3 ,
|
|
|
|
.Xr acl_get_fd 3 ,
|
|
|
|
.Xr acl_get_fd_np 3 ,
|
|
|
|
.Xr acl_set_fd_np 3 ,
|
2011-07-20 13:29:39 +00:00
|
|
|
.Xr cap_limitfd 3 ,
|
|
|
|
.Xr libcapsicum 3 ,
|
2011-12-29 21:12:22 +00:00
|
|
|
.Xr mac_get_fd 3 ,
|
|
|
|
.Xr mac_set_fd 3 ,
|
2011-07-20 13:29:39 +00:00
|
|
|
.Xr sem_getvalue 3 ,
|
|
|
|
.Xr sem_post 3 ,
|
|
|
|
.Xr sem_trywait 3 ,
|
|
|
|
.Xr sem_wait 3 ,
|
2011-11-27 19:45:41 +00:00
|
|
|
.Xr capsicum 4 ,
|
2011-07-20 13:29:39 +00:00
|
|
|
.Xr snp 4
|
|
|
|
.Sh HISTORY
|
|
|
|
Support for capabilities and capabilities mode was developed as part of the
|
|
|
|
.Tn TrustedBSD
|
|
|
|
Project.
|
2012-03-25 16:00:56 +00:00
|
|
|
.Sh AUTHORS
|
|
|
|
These functions and the capability facility were created by
|
2012-03-29 05:02:12 +00:00
|
|
|
.An "Robert N. M. Watson"
|
2012-03-25 16:00:56 +00:00
|
|
|
at the University of Cambridge Computer Laboratory with support from a grant
|
|
|
|
from Google, Inc.
|
2011-07-20 13:29:39 +00:00
|
|
|
.Sh BUGS
|
|
|
|
This man page should list the set of permitted system calls more specifically
|
|
|
|
for each capability right.
|
|
|
|
.Pp
|
|
|
|
Capability rights sometimes have unclear indirect impacts, which should be
|
|
|
|
documented, or at least hinted at.
|