aboutsummaryrefslogtreecommitdiff
path: root/sys/kern/kern_prot.c
Commit message (Expand)AuthorAgeFilesLines
* Use atomic loads/stores when updating td->td_stateAlex Richardson2021-02-181-1/+1
* pgrp: Prevent use after free.Konstantin Belousov2021-01-101-8/+5
* jail: Consistently handle the pr_allow bitmaskJamie Gritton2020-12-271-17/+5
* cred: fix minor nits in r367695Mateusz Guzik2020-11-191-0/+1
* thread: batch credential freeingMateusz Guzik2020-11-141-0/+75
* kern: clean up empty lines in .c and .h filesMateusz Guzik2020-09-011-2/+2
* cred: add more asserts for td_realucred == td_ucredMateusz Guzik2020-08-011-1/+3
* cred: add a prediction to crfree for td->td_realucred == crMateusz Guzik2020-07-021-1/+1
* cred: distribute reference count per threadMateusz Guzik2020-06-091-30/+166
* proc: refactor clearing credentials into proc_unset_credMateusz Guzik2020-05-251-7/+13
* Retire procfs-based process debugging.John Baldwin2020-04-011-3/+0
* Mark more nodes as CTLFLAG_MPSAFE or CTLFLAG_NEEDGIANT (17 of many)Pawel Biernacki2020-02-261-3/+4
* malloc: remove assumptions about MINALLOCSIZERyan Libby2020-01-141-1/+1
* Remove the useless return value from proc_set_credMateusz Guzik2019-12-141-4/+1
* Add kern_getsid() and use it in Linuxulator; no functional changes.Edward Tomasz Napierala2019-12-131-2/+9
* Only enable COMPAT_43 changes for syscalls ABI for a.out processes.Konstantin Belousov2019-08-111-1/+3
* Remove wrong inline keyword.Dmitry Chagin2019-05-301-1/+1
* Complete LOCAL_PEERCRED support. Cache pid of the remote process in theDmitry Chagin2019-05-301-0/+8
* Remove unused argument to priv_check_cred.Mateusz Guzik2018-12-111-15/+15
* In hardened systems, where the security.bsd.unprivileged_proc_debug sysctlJamie Gritton2018-11-271-11/+36
* proc: always store parent pid in p_oppidMateusz Guzik2018-11-161-15/+1
* call racct_proc_ucred_changed() under the proc lockAndriy Gapon2018-04-201-3/+19
* Move most of the contents of opt_compat.h to opt_global.h.Brooks Davis2018-04-061-1/+0
* sys: further adoption of SPDX licensing ID tags.Pedro F. Giffuni2017-11-201-0/+2
* Add security.bsd.see_jail_procSteve Wills2017-05-231-0/+31
* Remove register keyword from sys/ and ANSIfy prototypesEd Maste2017-05-171-13/+13
* proc: perform a lockless check in sys_issetugidMateusz Guzik2017-01-241-2/+0
* Renumber license clauses in sys/kern to avoid skipping #3Ed Maste2016-09-151-1/+1
* Audit the accepted (or rejected) username argument to setlogin(2).Robert Watson2016-08-201-0/+1
* Prepare for network stack as a moduleStephen J. Kiernan2016-07-271-48/+15
* sys/kern: spelling fixes in comments.Pedro F. Giffuni2016-04-291-2/+2
* Call crextend() before copying old credentials to the new credentialsGleb Smirnoff2016-01-141-2/+1
* Get rid of lim_update_thread and cred_update_thread.Mateusz Guzik2015-07-161-18/+0
* Generalised support for copy-on-write structures shared by threads.Mateusz Guzik2015-06-101-2/+3
* cred: add proc_set_cred_init helperMateusz Guzik2015-03-211-2/+14
* cred: add proc_set_cred helperMateusz Guzik2015-03-161-9/+34
* Add procctl(2) PROC_TRACE_CTL command to enable or disable debuggerKonstantin Belousov2015-01-181-0/+7
* Extend struct ucred with group table.Mateusz Guzik2014-11-051-3/+6
* [SA-14:25] Fix kernel stack disclosure in setlogin(2) / getlogin(2).Dag-Erling Smørgrav2014-11-041-15/+16
* Fix up an assertion in kern_setgroups, it should compare with ngroups_max + 1Mateusz Guzik2014-10-261-1/+1
* Tidy up sys_setgroups and kern_setgroups.Mateusz Guzik2014-10-261-8/+8
* Use a temporary buffer in sys_setgroups for requests with <= XU_NGROUPS groups.Mateusz Guzik2014-10-261-5/+12
* Eliminate unnecessary memory allocation in sys_getgroups and its ibcs2 counte...Mateusz Guzik2014-10-211-33/+12
* Get rid of crshared.Mateusz Guzik2014-10-051-11/+1
* Fix getppid for traced processes.Mateusz Guzik2014-08-241-6/+23
* Style fixBaptiste Daroussin2012-11-141-1/+1
* return ERANGE if the buffer is too small to contain the login as documented inBaptiste Daroussin2012-11-141-0/+2
* Fix a typo. (s/nessesary/necessary/)Hiroki Sato2012-01-081-1/+1
* In order to maximize the re-usability of kernel code in user space thisKip Macy2011-09-161-27/+27
* Notify racct when process credentials change.Edward Tomasz Napierala2011-03-311-0/+10