Age | Commit message (Collapse) | Author | |
---|---|---|---|
2000-11-16 | support kernel event queues, from FreeBSD by Jonathan Lemon, | Niels Provos | |
okay art@, millert@ | |||
2000-11-10 | Change the ktrace interface functions from taking the trace vnode to taking the | Artur Grabowski | |
traced proc. The vnode is in the proc and all functions need the proc. | |||
2000-06-05 | Changes to exit handling. | Artur Grabowski | |
cpu_exit no longer frees the vmspace and u-area. This is now handled by a separate kernel thread "reaper". This is to avoid sleeping locks in the critical path of cpu_exit where we're not allowed to sleep. From NetBSD | |||
2000-04-21 | Change kernel-only open flag FNOSYMLINK to userland-visible O_NOFOLLOW; | Todd C. Miller | |
adapated from FreeBSD. Also change O_FSYNC to the more standard O_SYNC and document it. open(2) needs some real examples for proper usage, to come later. | |||
2000-03-03 | Use LIST_ macros instead of internal field names to walk the allproc list. | Artur Grabowski | |
1999-11-05 | more stack direction fixes; art@ ok | Michael Shalayeff | |
1999-07-18 | on exec, clear P_NOCLDWAIT; ambrisko@whistle.com | Theo de Raadt | |
1999-02-26 | uvm allocation and name changes | Artur Grabowski | |
1999-02-18 | oops | Theo de Raadt | |
1999-02-17 | missing spl; christos | Theo de Raadt | |
1998-06-07 | permit SIGUSR1/USR2 through as well in cansignal() | Theo de Raadt | |
1998-05-30 | permit sig 0 (existance checking) to setuid parents; ibo@ragnarok.val-axs.net | Theo de Raadt | |
1998-05-18 | add more signals to setuid part of cansignal() | Theo de Raadt | |
1998-05-17 | convert CANSIGNAL() macro into a function, and then add significant constraints | Theo de Raadt | |
regarding setuid/setgid targets (this is permitted by POSIX, and solves a number of security issues). This is due to a conversation months ago with dholland@hcs.harvard.edu. | |||
1998-02-20 | GCC 2.8 caught this type error, thanks | Niklas Hallqvist | |
1998-01-09 | core dumps disabled for SUID programs is default again. | Constantine Sapuntzakis | |
1998-01-09 | Get rid of dumping across symlinks. Races can cause this to be problematic | Constantine Sapuntzakis | |
from a security standpoint (i.e. arbitrary files on the FS can be wiped out). | |||
1997-12-08 | add kern.nosuidcoredump to lock things out even more | Theo de Raadt | |
1997-11-06 | Updates for VFS Lite 2 + soft update. | Constantine Sapuntzakis | |
1997-10-06 | back out vfs lite2 till after 2.2 | Theo de Raadt | |
1997-10-06 | VFS Lite2 Changes | Constantine Sapuntzakis | |
1997-09-15 | From FreeBSD (joerg@freebsd.org): | Todd C. Miller | |
Implement SA_NOCLDWAIT by reparenting kids of processes that have the appropriate bit set to PID 1, and let PID 1 handle the zombie. This assumes that PID 1 will wait for its kids (which is true of init). This also includes some FreeBSD sigaction.2. | |||
1997-09-12 | add copyright for the work i did in csignal() | Theo de Raadt | |
1997-08-31 | for non-tty TIOCSPGRP/F_SETOWN/FIOSETOWN pgid setting calls, store uid | Theo de Raadt | |
and euid as well, then deliver them using new csignal() interface which ensures that pgid setting process is permitted to signal the pgid process(es). Thanks to newsham@aloha.net for extensive help and discussion. | |||
1997-02-01 | add type & union sigval args to sendsig/trapsignal | Theo de Raadt | |
1997-01-27 | add another parameter to trapsignal() and sendsig() -- fault addr to be | Theo de Raadt | |
delivered with in the siginfo information | |||
1997-01-27 | initial cut at SA_SIGINFO support | Theo de Raadt | |
1996-10-27 | Signal handling now fully POSIX.1-1990 compliant | Thorsten Lockert | |
1996-10-27 | Allow kill(, 0) on process groups that hold only zombies; per POSIX | Thorsten Lockert | |
1996-10-27 | Don't verify that euid has write permission | Thorsten Lockert | |
1996-10-27 | Correct last fix | Thorsten Lockert | |
1996-10-26 | A process can send a signal to another process if the uid of the signalling | Thorsten Lockert | |
process is the same as the saved uid of the signalled process | |||
1996-10-20 | Further limit the cases where we write core files | Thorsten Lockert | |
1996-10-18 | From Keith Bostic, with some minor changes: | Thorsten Lockert | |
The problem reported on BUGTRACK was that ftpd could be convinced to drop core after it had discarded its special permissions, but while it still had a copy of the encrypted passwords in its buffers. Change coredump() to: + Don't drop core for any process that was ever setuid/setgid if it's not running as root. + Change errno returns from EFAULT to appropriate values -- this will be useful for when coredump() becomes a system call and gcore goes away. + Create core dump files mode 600, and don't dump to files that are owned by anyone else or readable or writable by anyone other than the owner. | |||
1996-09-03 | another typo.... | Theo de Raadt | |
1996-09-03 | do not coredump for setuid/setgid, unless run by root | Theo de Raadt | |
1996-05-02 | sync syscalls, no sys/cpu.h | Theo de Raadt | |
1996-03-03 | From NetBSD: 960217 merge | Niklas Hallqvist | |
1996-01-05 | ss_sp is correct, ss_base is not. noticed by agc@sde.uts.amdahl.com; netbsd ↵ | Theo de Raadt | |
pr#1784 | |||
1995-10-18 | initial import of NetBSD tree | Theo de Raadt | |