summaryrefslogtreecommitdiffstats
path: root/sys/kern/kern_prot.c
Commit message (Expand)AuthorAgeFilesLines
...
* suser() accepts a thread argument; as suser() dereferences td_ucred, arwatson2004-07-221-0/+12
* Add a SUSER_RUID flag to suser_cred. This flag indicates that we want tocperciva2004-07-161-3/+2
* Socket MAC labels so_label and so_peerlabel are now protected byrwatson2004-06-131-0/+2
* Deorbit COMPAT_SUNOS.phk2004-06-111-3/+3
* Remove advertising clause from University of California Regent's license,imp2004-04-051-4/+0
* Don't grab Giant in crfree(), since prison_free() no longer requires it.rwatson2004-01-231-3/+1
* Rename mac_create_cred() MAC Framework entry point to mac_copy_cred(),rwatson2003-12-061-1/+1
* Add a sysctl, security.bsd.see_other_gids, similar in semanticsrwatson2003-11-171-2/+51
* Writes to p_flag in __setugid() no longer need Giant.jhb2003-10-231-4/+0
* Add a new sysctl, security.bsd.conservative_signals, to disablerwatson2003-09-141-1/+16
* Extend the mutex pool implementation to permit the creation and use oftruckman2003-07-131-1/+1
* In setpgrp(), don't assume a pgrp won't exist if the provided pgid is the samecognet2003-07-041-12/+13
* At this point targp will always be NULL, so remove the useless if.cognet2003-06-251-2/+0
* Various cr*() calls believed to be MPSAFE, since the uidinforwatson2003-06-151-0/+8
* Use __FBSDID().obrien2003-06-111-1/+3
* The issetugid() function is MPSAFE.jhb2003-06-091-1/+1
* Remove Giant from the setuid(), seteuid(), setgid(), setegid(),jhb2003-05-011-30/+0
* Remove Giant from getpgid() and getsid() and tweak the logic to morejhb2003-04-251-30/+28
* Back out M_* changes, per decision of the TRB.imp2003-02-191-4/+4
* Remove mtx_lock_giant from functions which are mp-safe.jake2003-02-101-9/+0
* Remove M_TRYWAIT/M_WAITOK/M_WAIT. Callers should use 0.alfred2003-01-211-4/+4
* Include file cleanup; mac.h and malloc.h at one point had orderingrwatson2002-08-011-1/+1
* Introduce support for Mandatory Access Control and extensiblerwatson2002-07-311-3/+21
* Introduce support for Mandatory Access Control and extensiblerwatson2002-07-311-0/+11
* Revert removal of cred_free_thread(): It is used to ensure that a thread'smini2002-07-111-0/+13
* More caddr_t removal, make fo_ioctl take a void * instead of a caddr_t.alfred2002-06-291-20/+17
* Remove unused diagnostic function cread_free_thread().mini2002-06-241-13/+0
* Squish the "could sleep with process lock" messages caused by callingalfred2002-06-191-14/+40
* setsugid() touches p->p_flag so assert that the proc is locked.alfred2002-06-181-0/+2
* Change p_can{debug,see,sched,signal}()'s first argument to be a threadjhb2002-05-191-60/+69
* As malloc(9) and free(9) are now Giant-free, remove the Giant locktanimura2002-05-031-16/+5
* Push down Giant for setpgid(), setsid() and aio_daemon(). Giant protects onlytanimura2002-04-201-11/+14
* - Lock proctree_lock instead of pgrpsess_lock.jhb2002-04-161-35/+20
* - Change the algorithms of the syscalls to modify process credentials tojhb2002-04-131-83/+137
* - Axe a stale comment. We haven't allowed the ucred pointer passed tojhb2002-04-031-9/+2
* Change the suser() API to take advantage of td_ucred as well as do ajhb2002-04-011-53/+32
* Whitespace only change: use ANSI function declarations instead of K&R.jhb2002-04-011-130/+46
* Fix style bug in previous commit.jhb2002-04-011-1/+1
* Compromise for critical*()/cpu_critical*() recommit. Cleanup the interruptdillon2002-03-271-12/+11
* Use td_ucred in several trivial syscalls and remove Giant locking asjhb2002-03-221-32/+16
* Use explicit Giant locks and unlocks for rather than instrumented ones forjhb2002-03-221-6/+5
* Merge from TrustedBSD MAC branch:rwatson2002-03-221-0/+23
* Since cred never appears to be passed into the securelevel calls asrwatson2002-03-221-2/+2
* Break out the "see_other_uids" policy check from the variousrwatson2002-03-221-4/+28
* - Push down Giant into crfree() in the case that we actually free a ucred.jhb2002-03-201-0/+15
* Stop abusing the pgrpsess_lock.tanimura2002-03-111-2/+0
* Temporarily lock Giant while we update td_ucred. The proc lock doesn'tjhb2002-02-271-6/+6
* Return ESRCH if the target process is not inferior to the curproc.tanimura2002-02-271-0/+2
* Introduce a version field to `struct xucred' in place of one of thedd2002-02-271-0/+16
* Lock struct pgrp, session and sigio.tanimura2002-02-231-38/+124
OpenPOWER on IntegriCloud