Date: Sun, 25 Oct 2020 12:39:26 +0400 From: Gleb Popov <arrowd@freebsd.org> To: freebsd-hackers <freebsd-hackers@freebsd.org> Subject: Mapping Linux capabilities(7) to our Capsicum rights(4) Message-ID: <CALH631mtv0yFUVwKEwgHPg7_TP9WLdAuQMv=-e1YY3OvR86xsQ@mail.gmail.com>
next in thread | raw e-mail | index | archive | help
Hello hackers! I'm porting a software that employs Linux capabilities to constrain the running process. The code looks like if (!haveCapability(CAP_SYS_CHROOT) || !haveCapability(CAP_MKNOD) || !haveCapability(CAP_FOWNER)) { errorOut(); } dropCapability(CAP_SYS_CHROOT); dropCapability(CAP_MKNOD); dropCapability(CAP_FOWNER); The CAP_MKNOD looks much like our CAP_MKNODAT. The CAP_FOWNER looks more complex, but it seems it is implemented at higher granularity in Capsicum. Finally, I haven't found anything for CAP_SYS_CHROOT. I'll continue digging this up, but any hints would be appreciated. Thanks in advance.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CALH631mtv0yFUVwKEwgHPg7_TP9WLdAuQMv=-e1YY3OvR86xsQ>