Add a way to restrict permissions on cap duplication.
This commit is contained in:
parent
7dd10a3e53
commit
f31652b981
10 changed files with 15 additions and 15 deletions
|
|
@ -55,7 +55,7 @@ SYS5(ReplyPortSend, z_cap_t, reply_port_cap, uint64_t, num_bytes, const void*,
|
|||
SYS5(ReplyPortRecv, z_cap_t, reply_port_cap, uint64_t*, num_bytes, void*, data,
|
||||
uint64_t*, num_caps, z_cap_t*, caps);
|
||||
|
||||
SYS2(CapDuplicate, z_cap_t, cap_in, z_cap_t*, cap_out);
|
||||
SYS3(CapDuplicate, z_cap_t, cap_in, z_perm_t, perm_mask, z_cap_t*, cap_out);
|
||||
|
||||
SYS1(MutexCreate, z_cap_t*, mutex_cap);
|
||||
SYS1(MutexLock, z_cap_t, mutex_cap);
|
||||
|
|
|
|||
|
|
@ -67,6 +67,7 @@ const uint64_t kZionDebug = 0x1'0000;
|
|||
* ------------------------------*/
|
||||
|
||||
typedef uint64_t z_cap_t;
|
||||
typedef uint64_t z_perm_t;
|
||||
|
||||
const uint64_t kZionInvalidCapability = 0x0;
|
||||
|
||||
|
|
@ -87,6 +88,9 @@ const uint64_t kZionPerm_SpawnThread = 0x200;
|
|||
const uint64_t kZionPerm_Lock = 0x100;
|
||||
const uint64_t kZionPerm_Release = 0x200;
|
||||
|
||||
const z_perm_t kZionPerm_None = 0;
|
||||
const z_perm_t kZionPerm_All = -1;
|
||||
|
||||
/* ------------------------------
|
||||
* Process Init Types
|
||||
*
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue