|
Lines 207-212
static char *pr_allow_names[] = {
Link Here
|
| 207 |
"allow.mount.fdescfs", |
207 |
"allow.mount.fdescfs", |
| 208 |
"allow.mount.linprocfs", |
208 |
"allow.mount.linprocfs", |
| 209 |
"allow.mount.linsysfs", |
209 |
"allow.mount.linsysfs", |
|
|
210 |
"allow.read_msgbuf", |
| 210 |
}; |
211 |
}; |
| 211 |
const size_t pr_allow_names_size = sizeof(pr_allow_names); |
212 |
const size_t pr_allow_names_size = sizeof(pr_allow_names); |
| 212 |
|
213 |
|
|
Lines 226-231
static char *pr_allow_nonames[] = {
Link Here
|
| 226 |
"allow.mount.nofdescfs", |
227 |
"allow.mount.nofdescfs", |
| 227 |
"allow.mount.nolinprocfs", |
228 |
"allow.mount.nolinprocfs", |
| 228 |
"allow.mount.nolinsysfs", |
229 |
"allow.mount.nolinsysfs", |
|
|
230 |
"allow.noread_msgbuf", |
| 229 |
}; |
231 |
}; |
| 230 |
const size_t pr_allow_nonames_size = sizeof(pr_allow_nonames); |
232 |
const size_t pr_allow_nonames_size = sizeof(pr_allow_nonames); |
| 231 |
|
233 |
|
|
Lines 3889-3895
prison_priv_check(struct ucred *cred, int priv)
Link Here
|
| 3889 |
* Allow ktrace privileges for root in jail. |
3891 |
* Allow ktrace privileges for root in jail. |
| 3890 |
*/ |
3892 |
*/ |
| 3891 |
case PRIV_KTRACE: |
3893 |
case PRIV_KTRACE: |
|
|
3894 |
return (0); |
| 3892 |
|
3895 |
|
|
|
3896 |
/* |
| 3897 |
* Do not allow a process inside a jail read the kernel |
| 3898 |
* message buffer unless explicitly permitted. |
| 3899 |
*/ |
| 3900 |
case PRIV_MSGBUF: |
| 3901 |
if (cred->cr_prison->pr_allow & PR_ALLOW_READ_MSGBUF) |
| 3902 |
return (0); |
| 3903 |
else |
| 3904 |
return (EPERM); |
| 3905 |
|
| 3893 |
#if 0 |
3906 |
#if 0 |
| 3894 |
/* |
3907 |
/* |
| 3895 |
* Allow jailed processes to configure audit identity and |
3908 |
* Allow jailed processes to configure audit identity and |
|
Lines 4518-4523
SYSCTL_JAIL_PARAM(_allow, quotas, CTLTYPE_INT | CT
Link Here
|
| 4518 |
"B", "Jail may set file quotas"); |
4531 |
"B", "Jail may set file quotas"); |
| 4519 |
SYSCTL_JAIL_PARAM(_allow, socket_af, CTLTYPE_INT | CTLFLAG_RW, |
4532 |
SYSCTL_JAIL_PARAM(_allow, socket_af, CTLTYPE_INT | CTLFLAG_RW, |
| 4520 |
"B", "Jail may create sockets other than just UNIX/IPv4/IPv6/route"); |
4533 |
"B", "Jail may create sockets other than just UNIX/IPv4/IPv6/route"); |
|
|
4534 |
SYSCTL_JAIL_PARAM(_allow, read_msgbuf, CTLTYPE_INT | CTLFLAG_RW, |
| 4535 |
"B", "Jail may read the kernel message buffer"); |
| 4521 |
|
4536 |
|
| 4522 |
SYSCTL_JAIL_PARAM_SUBNODE(allow, mount, "Jail mount/unmount permission flags"); |
4537 |
SYSCTL_JAIL_PARAM_SUBNODE(allow, mount, "Jail mount/unmount permission flags"); |
| 4523 |
SYSCTL_JAIL_PARAM(_allow_mount, , CTLTYPE_INT | CTLFLAG_RW, |
4538 |
SYSCTL_JAIL_PARAM(_allow_mount, , CTLTYPE_INT | CTLFLAG_RW, |