May 22 2024
May 20 2024
May 1 2024
After this change, ktrace output is littered with 'CAP system call not allowed: $SYSCALL' on systems w/o capsicum enabled
After this change, ktrace output is littered with 'CAP system call not allowed: $SYSCALL' on systems w/o capsicum enabled, which is confusing and distracting. Can this please be reverted to behave without CAP output for systems w/o capsicum ?
Apr 7 2024
Mar 29 2024
Mar 10 2024
- Record *namei* violations instead of vfs. Slight wording change for clarity.
- Rebase on main after several months
- Rename all instances of CAPFAIL_VFS to CAPFAIL_NAMEI
- Rebase on main after several months
- Address Mark's comments
- Rebase on main after several months
Jan 18 2024
Jan 9 2024
Replace all instances of "AT_FDCWD" with "<AT_FDCWD>" when reporting a violation via ktrcapfail().
Jan 8 2024
Jan 7 2024
Actually, scratch that. I just understood your comment and this is a better solution.
It feels wrong to return inside of a macro, but I did not see any comments about it in style(9). This seems to be the solution that is most elegant in minimizing code duplication. Let me know your thoughts.
Oct 6 2023
Hello Jake,
I created this patch to make the Capsicumization experience less intimidating for inexperienced developers. Both David and Mariusz may not be the target audience for this change
Oct 5 2023
I created this patch to make the Capsicumization experience less intimidating for inexperienced developers. Both David and Mariusz may not be the target audience for this change because they already know how to extract the information that the tracing provides. Developers that are unfamiliar with Capsicum's semantics could use this tracing mode to easily determine why their program is not working in capability mode. I think it provides a solid starting point so new developers don't get lost and discouraged.
Oct 4 2023
It's doable in principle, but in practice dtrace's inability to resolve backtraces in the face of fork/exec makes it mostly unusable
Sep 29 2023
Are these events exposed to DTrace? When sandboxing, the thing I really want is a stack trace in userspace at the point where the violation happened. If so, it would be great to include a script that logged them. Ideally with an option of an explicit start marker so you can put in a fake cap_enter and be told what you still need to fix.
Sep 28 2023
Ah, ok I thought it was printed by default.
Then I don't think I have any complaints through the idea.
If I understand correctly, for application like:
localtime(); open(); cap_enter() openat()
Again, maybe I just need some more context to understand the reasoning behind this change.
To summarize the patch very briefly, this lets you ktrace an application that does not run in capability mode, and ktrace will log all events which would have triggered a Capsicum violation.
To summarize the patch very briefly, this lets you ktrace an application that does not run in capability mode, and ktrace will log all events which would have triggered a Capsicum violation.