Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 4 May 2015 21:44:51 +0000 (UTC)
From:      Brooks Davis <brooks@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org
Subject:   svn commit: r282436 - in head: contrib/tcpdump sbin/ping usr.bin/kdump
Message-ID:  <201505042144.t44LipTX062354@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: brooks
Date: Mon May  4 21:44:51 2015
New Revision: 282436
URL: https://svnweb.freebsd.org/changeset/base/282436

Log:
  Remove "capability mode sandbox enabled" messages.
  
  These messages serve little purpose and break some consumers.
  
  PR:		199855
  Differential Revision:	https://reviews.freebsd.org/D2440
  Reviewed by:	rwatson
  Approved by:	pjd
  MFC after:	1 week
  Sponsored by:	DARPA, AFRL

Modified:
  head/contrib/tcpdump/tcpdump.c
  head/sbin/ping/ping.c
  head/usr.bin/kdump/kdump.c

Modified: head/contrib/tcpdump/tcpdump.c
==============================================================================
--- head/contrib/tcpdump/tcpdump.c	Mon May  4 21:34:19 2015	(r282435)
+++ head/contrib/tcpdump/tcpdump.c	Mon May  4 21:44:51 2015	(r282436)
@@ -1921,8 +1921,6 @@ main(int argc, char **argv)
 #endif
 	if (cansandbox && cap_enter() < 0 && errno != ENOSYS)
 		error("unable to enter the capability mode");
-	if (cap_sandboxed())
-		fprintf(stderr, "capability mode sandbox enabled\n");
 #endif	/* __FreeBSD__ */
 
 	do {

Modified: head/sbin/ping/ping.c
==============================================================================
--- head/sbin/ping/ping.c	Mon May  4 21:34:19 2015	(r282435)
+++ head/sbin/ping/ping.c	Mon May  4 21:44:51 2015	(r282436)
@@ -737,9 +737,6 @@ main(int argc, char *const *argv)
 	if (cansandbox && cap_enter() < 0 && errno != ENOSYS)
 		err(1, "cap_enter");
 
-	if (cap_sandboxed())
-		fprintf(stderr, "capability mode sandbox enabled\n");
-
 	cap_rights_init(&rights, CAP_RECV, CAP_EVENT, CAP_SETSOCKOPT);
 	if (cap_rights_limit(srecv, &rights) < 0 && errno != ENOSYS)
 		err(1, "cap_rights_limit srecv");

Modified: head/usr.bin/kdump/kdump.c
==============================================================================
--- head/usr.bin/kdump/kdump.c	Mon May  4 21:34:19 2015	(r282435)
+++ head/usr.bin/kdump/kdump.c	Mon May  4 21:44:51 2015	(r282436)
@@ -352,8 +352,6 @@ main(int argc, char *argv[])
 	limitfd(STDIN_FILENO);
 	limitfd(STDOUT_FILENO);
 	limitfd(STDERR_FILENO);
-	if (cap_sandboxed())
-		fprintf(stderr, "capability mode sandbox enabled\n");
 
 	TAILQ_INIT(&trace_procs);
 	drop_logged = 0;



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201505042144.t44LipTX062354>