PERFORCE change 110796 for review
Robert Watson
rwatson at FreeBSD.org
Fri Dec 1 05:01:20 PST 2006
http://perforce.freebsd.org/chv.cgi?CH=110796
Change 110796 by rwatson at rwatson_zoo on 2006/12/01 12:59:05
Revert branch-local changes in priv.h.
Affected files ...
.. //depot/projects/trustedbsd/priv/sys/sys/priv.h#10 integrate
Differences ...
==== //depot/projects/trustedbsd/priv/sys/sys/priv.h#10 (text+ko) ====
@@ -26,7 +26,7 @@
* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*
- * $FreeBSD$
+ * $FreeBSD: src/sys/sys/priv.h,v 1.1 2006/11/06 13:37:18 rwatson Exp $
*/
/*
@@ -48,7 +48,10 @@
* When adding a new privilege, remember to determine if it's appropriate for
* use in jail, and update the privilege switch in kern_jail.c as necessary.
*/
-/* Track beginning of privilege list. */
+
+/*
+ * Track beginning of privilege list.
+ */
#define _PRIV_LOWEST 0
/*
@@ -380,9 +383,8 @@
#define PRIV_VM86_INTCALL 650/* Allow invoking vm86 int handlers. */
/*
- * Set of reserved privilege values, which will be allocated to code
- * as needed, in order to avoid renumbering later privileges due to
- * insertion.
+ * Set of reserved privilege values, which will be allocated to code as
+ * needed, in order to avoid renumbering later privileges due to insertion.
*/
#define _PRIV_RESERVED0 660
#define _PRIV_RESERVED1 661
@@ -402,11 +404,11 @@
#define _PRIV_RESERVED15 675
/*
- * Define a set of valid privilege numbers that can be used by
- * loadable modules that don't yet have privilege reservations.
- * Ideally, these should not be used, since their meaning is opaque
- * to any policies that are aware of specific privileges, such as
- * jail, and as such may be arbitrarily denied.
+ * Define a set of valid privilege numbers that can be used by loadable
+ * modules that don't yet have privilege reservations. Ideally, these should
+ * not be used, since their meaning is opaque to any policies that are aware
+ * of specific privileges, such as jail, and as such may be arbitrarily
+ * denied.
*/
#define PRIV_MODULE0 700
#define PRIV_MODULE1 701
@@ -433,7 +435,8 @@
/*
* Validate that a named privilege is known by the privilege system. Invalid
* privileges presented to the privilege system by a priv_check interface
- * will result in a panic.
+ * will result in a panic. This is only approximate due to sparse allocation
+ * of the privilege space.
*/
#define PRIV_VALID(x) ((x) > _PRIV_LOWEST && (x) < _PRIV_HIGHEST)
More information about the trustedbsd-cvs
mailing list