summaryrefslogtreecommitdiffstats
path: root/tools/regression/security/proc_to_proc
Commit message (Collapse)AuthorAgeFilesLines
* MFC r264400,r265836:ngie2014-12-311-1/+1
| | | | | | | | | | | | | | r264400: NO_MAN= has been deprecated in favor of MAN= for some time, go ahead and finish the job. ncurses is now the only Makefile in the tree that uses it since it wasn't a simple mechanical change, and will be addressed in a future commit. r265836: Remove last two NO_MAN= in the tree. In both of these cases, MAN= is what is needed.
* Start the dreaded NOFOO -> NO_FOO conversion.ru2004-12-211-1/+1
| | | | OK'ed by: core
* For variables that are only checked with defined(), don't provideru2004-10-241-1/+1
| | | | any fake value.
* gcc now objects to a default label without any contents. Because I wantrwatson2004-07-171-0/+2
| | | | | to have a comment present in the default case, add a 'break' to each default case that previously had no actual statements.
* o Add a comment identifying the "privileged on privileged" scenario.rwatson2001-04-131-0/+1
| | | | Obtained from: TrustedBSD Project
* o Add inter-process authorization uid regression testing for ktrace().rwatson2001-04-131-43/+63
| | | | Obtained from: TrustedBSD Project
* o s/debug/ptrace/ since shortly there will be tests involving otherrwatson2001-04-131-3/+3
| | | | | | forms of debugging. Obtained from: TrustedBSD Project
* o Expand inter-process authorization regression test to includerwatson2001-04-122-46/+58
| | | | | | | signalling with sigsegv as one of the tests. o Teach errno_to_string() about ENOTSUPP. Obtained from: TrustedBSD Project
* o Enable -DSETSUGID_SUPPORTED in inter-process authorization regressionrwatson2001-04-111-1/+1
| | | | | | | test by default, as setugid() is now part of the base kernel (assuming (options REGRESSION) has been enabled for the running kernel). Obtained from: TrustedBSD Project
* o First pass at an inter-process authorization regression testing suite.rwatson2001-04-115-0/+563
This test utility attempts to evaluate the current kernel policy for authorization inter-process activities, currently ptrace(), kill(, SIGHUP), getpriority(), and setpriority(). The utility creates pairs of processes, initializes their credential sets to useful cases, and reports on whether the results are in keeping with hard-coded safety expectations. o Currently, this utility relies on the availability of __setugid(), an uncomitted system call used for managing the P_SUGID bit. Due to continuing discussion of optional regression testing kernel components ("options REGRESSION") I'll hold off on committing that until the discussion has reached its natural termination. o A number of additional testing factors should be taken into account in the testing, including tests for different classes of signals, interactions with process session characteristics, I/O signalling, broadcast activities such as broadcast signalling, mass priority setting, and to take into group-related aspects of credentials. Additional operations should also be taken into account, such as ktrace, debugging attach using procfs, and so on. o This testing suite is intended to prevent the introduction of bugs in the upcoming sets of authorization changes associated with the introduction of process capabilities and mandatory access control. Obtained from: TrustedBSD Project
OpenPOWER on IntegriCloud