summaryrefslogtreecommitdiffstats
path: root/sys/kern/kern_exec.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Revert to using the SCHED_LOCK() to protect time accounting.mpi2019-06-011-3/+1
* Use a per-process mutex to protect time accounting instead of SCHED_LOCK().mpi2019-05-311-1/+3
* Fix stack info leak in execve(2). There are 2x4 bytes of paddingbluhm2019-02-081-1/+3
* If we execute a #!shell binary, the shell is an integral part of thederaadt2018-10-301-1/+3
* Decouple unveil from the pledge flags, by adding dedicated unveil flagsbeck2018-08-051-1/+2
* Remove a few leftovers from the days of emulation, which could result inderaadt2018-07-201-3/+1
* Unveiling unveil(2).beck2018-07-131-1/+9
* Put file descriptors on shared data structures when they are completelympi2018-06-181-5/+4
* Revert introduction of fdinsert(), a sanitify check triggers whenmpi2018-06-051-4/+5
* Put file descriptors on shared data structures when they are completelympi2018-06-021-5/+4
* Clean up the parameters of VOP_LOCK() and VOP_UNLOCK(). It is alwaysvisa2018-04-281-2/+2
* Move FREF() inside fd_getfile().mpi2018-04-271-1/+3
* Stop assuming <sys/file.h> will pull in fcntl.h when _KERNEL is defined.guenther2018-01-021-1/+2
* free(9) sizes for sys_execve.florian2018-01-011-16/+17
* Remove unused ps_stackgap from process structstefan2017-12-191-4/+1
* pledge()'s 2nd argument becomes char *execpromises, which becomes thederaadt2017-12-121-2/+15
* Remove old deactivated pledge path code. A replacement mechanism isderaadt2017-08-291-2/+1
* Provide mips64 with kernel-facing TCB_{GET,SET} macros that store itguenther2017-04-131-5/+2
* Add a flags argument to falloc() that lets it optionally set theguenther2017-02-111-2/+2
* Delete the obsolete fork/exec/exit emulation hooks.guenther2017-02-081-22/+1
* p_comm is the process's command and isn't per thread, so move it fromguenther2017-01-211-3/+3
* Delete dead copy of pr->ps_vmspace; uvmspace_exec() can change it anywayguenther2016-10-221-3/+3
* Reset PS_WXNEEDED in execve(2).jca2016-09-031-1/+3
* Cleanup some systrace leftovers.kettenis2016-06-111-20/+3
* Identify W^X labelled binaries at execve() time based upon WX_OPENBSD_WXNEEDEDderaadt2016-05-301-1/+4
* backout to insert correct commit messagederaadt2016-05-301-4/+1
* *** empty log message ***deraadt2016-05-301-1/+4
* Place a cpu-dependent trap/illegal instruction over the remainder of thederaadt2016-05-231-2/+8
* SROP mitigation. sendsig() stores a (per-process ^ &sigcontext) cookiederaadt2016-05-101-1/+6
* boom goes the dynamitetedu2016-04-251-31/+2
* Remove the unused flags argument from VOP_UNLOCK().natano2016-03-191-2/+2
* No more compat emulations, so remove ktrace EMUL records and the baggageguenther2016-03-061-11/+1
* remove stale lint annotationstedu2015-12-051-2/+1
* move the pledgenote annotation from `struct proc' to `struct nameidata'semarie2015-11-021-2/+2
* move p_pledgenote setting next to NDINIT()deraadt2015-10-281-2/+2
* Fold "malloc" into "stdio" and -- recognizing that no program so far hasderaadt2015-10-251-2/+2
* I forgot execve would go through the namei codepath, so a program markedderaadt2015-10-101-1/+2
* Rename tame() to pledge(). This fairly interface has evolved to be morederaadt2015-10-091-4/+4
* Add the tame "exec" request. This allows processes which requestderaadt2015-10-071-1/+5
* missing ) in COMPAT_LINUX blockderaadt2015-10-021-2/+2
* Add ktracing of argv and envp to execve(2), with envp not traced by defaultguenther2015-10-021-5/+26
* Track size of an opaque allocation to pass to free() laterderaadt2015-09-281-6/+6
* memory leak in execve with systrace, plus some unreachable codederaadt2015-07-221-3/+3
* Add kbind, a syscall for ld.so to use to securely and efficiently updateguenther2015-07-201-1/+3
* Remove some includes include-what-you-use claims don'tjsg2015-03-141-3/+1
* Change the way stackgap_random is applied. Instead of applying it within themiod2015-02-091-3/+9
* Stop using USRSTACK as the edge of the stack, but rather use the vmspacemiod2015-02-091-5/+5
* forbid execve() with argc == 0. prompted by a millert email.tedu2015-02-071-1/+7
* Move the "stackgap" from the stack into its own page at a random address.kettenis2015-01-261-6/+17
* Move ps_strings "after" the random stackgap. This makes its location akettenis2015-01-201-2/+7