summaryrefslogtreecommitdiffstats
path: root/sys/kern/kern_prot.c
Commit message (Expand)AuthorAgeFilesLines
* Add kern_setgroups() and kern_getgroups() and use them to implementjhb2006-07-061-25/+42
* Audit the arguments (user/group IDs) for the system calls that set these IDs.wsalamon2006-02-061-0/+17
* Use the refcount API to manage the reference count for user credentialsjhb2005-09-271-16/+6
* Introduce p_canwait() and MAC Framework and MAC Policy entry pointsrwatson2005-04-181-0/+31
* Introduce new MAC Framework and MAC Policy entry points to control the userwatson2005-04-161-53/+137
* Impose the upper limit on signals that are allowed between kernel threadssobomax2005-03-181-2/+2
* Linuxthreads uses not only signal 32 but several signals >= 32.sobomax2005-03-181-5/+5
* In linux emulation layer try to detect attempt to use linux_clone() tosobomax2005-03-031-0/+12
* Backout addition of SIGTHR into the list of signals allowed to be deliveredsobomax2005-02-131-1/+0
* Backout previous change (disabling of security checks for signals deliveredsobomax2005-02-131-4/+5
* Split out kill(2) syscall service routine into user-level and kernel part, thesobomax2005-02-131-5/+4
* Add SIGTHR (32) into list of signals permitted to be delivered to thesobomax2005-02-111-0/+1
* Style cleanup: with removal of mutex operations, we can also removerwatson2005-01-231-4/+2
* When reading pr_securelevel from a prison, perform a lockless read,rwatson2005-01-231-4/+0
* /* -> /*- for copyright notices, minor format tweaks as necessaryimp2005-01-061-1/+1
* Remove sched_free_thread() which was only usedjulian2004-08-311-13/+0
* Rename suser_cred()'s PRISON_ROOT flag to SUSER_ALLOWJAIL. This iscperciva2004-07-261-21/+21
* In setpgid(), since td is passed in as a system call argument, use itrwatson2004-07-231-1/+1
* suser() accepts a thread argument; as suser() dereferences td_ucred, arwatson2004-07-221-0/+12
* Add a SUSER_RUID flag to suser_cred. This flag indicates that we want tocperciva2004-07-161-3/+2
* Socket MAC labels so_label and so_peerlabel are now protected byrwatson2004-06-131-0/+2
* Deorbit COMPAT_SUNOS.phk2004-06-111-3/+3
* Remove advertising clause from University of California Regent's license,imp2004-04-051-4/+0
* Don't grab Giant in crfree(), since prison_free() no longer requires it.rwatson2004-01-231-3/+1
* Rename mac_create_cred() MAC Framework entry point to mac_copy_cred(),rwatson2003-12-061-1/+1
* Add a sysctl, security.bsd.see_other_gids, similar in semanticsrwatson2003-11-171-2/+51
* Writes to p_flag in __setugid() no longer need Giant.jhb2003-10-231-4/+0
* Add a new sysctl, security.bsd.conservative_signals, to disablerwatson2003-09-141-1/+16
* Extend the mutex pool implementation to permit the creation and use oftruckman2003-07-131-1/+1
* In setpgrp(), don't assume a pgrp won't exist if the provided pgid is the samecognet2003-07-041-12/+13
* At this point targp will always be NULL, so remove the useless if.cognet2003-06-251-2/+0
* Various cr*() calls believed to be MPSAFE, since the uidinforwatson2003-06-151-0/+8
* Use __FBSDID().obrien2003-06-111-1/+3
* The issetugid() function is MPSAFE.jhb2003-06-091-1/+1
* Remove Giant from the setuid(), seteuid(), setgid(), setegid(),jhb2003-05-011-30/+0
* Remove Giant from getpgid() and getsid() and tweak the logic to morejhb2003-04-251-30/+28
* Back out M_* changes, per decision of the TRB.imp2003-02-191-4/+4
* Remove mtx_lock_giant from functions which are mp-safe.jake2003-02-101-9/+0
* Remove M_TRYWAIT/M_WAITOK/M_WAIT. Callers should use 0.alfred2003-01-211-4/+4
* Include file cleanup; mac.h and malloc.h at one point had orderingrwatson2002-08-011-1/+1
* Introduce support for Mandatory Access Control and extensiblerwatson2002-07-311-3/+21
* Introduce support for Mandatory Access Control and extensiblerwatson2002-07-311-0/+11
* Revert removal of cred_free_thread(): It is used to ensure that a thread'smini2002-07-111-0/+13
* More caddr_t removal, make fo_ioctl take a void * instead of a caddr_t.alfred2002-06-291-20/+17
* Remove unused diagnostic function cread_free_thread().mini2002-06-241-13/+0
* Squish the "could sleep with process lock" messages caused by callingalfred2002-06-191-14/+40
* setsugid() touches p->p_flag so assert that the proc is locked.alfred2002-06-181-0/+2
* Change p_can{debug,see,sched,signal}()'s first argument to be a threadjhb2002-05-191-60/+69
* As malloc(9) and free(9) are now Giant-free, remove the Giant locktanimura2002-05-031-16/+5
* Push down Giant for setpgid(), setsid() and aio_daemon(). Giant protects onlytanimura2002-04-201-11/+14
OpenPOWER on IntegriCloud