|
Revision tags: release/13.4.0-p5, release/13.5.0-p1, release/14.2.0-p3, release/13.5.0, release/14.2.0-p2, release/14.1.0-p8, release/13.4.0-p4, release/14.1.0-p7, release/14.2.0-p1, release/13.4.0-p3, release/14.2.0, release/13.4.0, release/14.1.0, release/13.3.0, release/14.0.0 |
|
| #
1c63aa29 |
| 26-Oct-2023 |
Brooks Davis <[email protected]> |
procctl.2: improve phrasing for ASLR disable
Reported by: jrtc27 Reviewed by: kib Differential Revision: https://reviews.freebsd.org/D42364
(cherry picked from commit 4894205482555447c6b3372598c758
procctl.2: improve phrasing for ASLR disable
Reported by: jrtc27 Reviewed by: kib Differential Revision: https://reviews.freebsd.org/D42364
(cherry picked from commit 4894205482555447c6b3372598c7589a66596724)
show more ...
|
| #
fa9896e0 |
| 16-Aug-2023 |
Warner Losh <[email protected]> |
Remove $FreeBSD$: two-line nroff pattern
Remove /^\.\\"\n\.\\"\s*\$FreeBSD\$$\n/
|
| #
77f0e198 |
| 15-Apr-2023 |
Val Packett <[email protected]> |
procctl: add state flags to PROC_REAP_GETPIDS reports
For a process supervisor using the reaper API to track process subtrees, it is very useful to know the state of the processes on the list.
Spon
procctl: add state flags to PROC_REAP_GETPIDS reports
For a process supervisor using the reaper API to track process subtrees, it is very useful to know the state of the processes on the list.
Sponsored by: https://www.patreon.com/valpackett Reviewed by: kib MFC after: 1 week Differential Revision: https://reviews.freebsd.org/D39585
show more ...
|
|
Revision tags: release/13.2.0, release/12.4.0, release/13.1.0, release/12.3.0 |
|
| #
f5bb6e5a |
| 15-Oct-2021 |
Konstantin Belousov <[email protected]> |
procctl: actually require debug privileges over target
for state control over TRACE, TRAPCAP, ASLR, PROTMAX, STACKGAP, NO_NEWPRIVS, and WXMAP.
Reported by: emaste Reviewed by: emaste, markj Sponsor
procctl: actually require debug privileges over target
for state control over TRACE, TRAPCAP, ASLR, PROTMAX, STACKGAP, NO_NEWPRIVS, and WXMAP.
Reported by: emaste Reviewed by: emaste, markj Sponsored by: The FreeBSD Foundation MFC after: 1 week Differential revision: https://reviews.freebsd.org/D32513
show more ...
|
| #
f833ab9d |
| 15-Oct-2021 |
Konstantin Belousov <[email protected]> |
procctl(2): add consistent shortcut P_ID:0 as curproc
Reported by: bdrewery, emaste Reviewed by: emaste, markj Sponsored by: The FreeBSD Foundation MFC after: 1 week Differential revision: https://r
procctl(2): add consistent shortcut P_ID:0 as curproc
Reported by: bdrewery, emaste Reviewed by: emaste, markj Sponsored by: The FreeBSD Foundation MFC after: 1 week Differential revision: https://reviews.freebsd.org/D32513
show more ...
|
| #
796a8e1a |
| 02-Sep-2021 |
Konstantin Belousov <[email protected]> |
procctl(2): Add PROC_WXMAP_CTL/STATUS
It allows to override kern.elf{32,64}.allow_wx on per-process basis. In particular, it makes it possible to run binaries without PT_GNU_STACK and without elfctl
procctl(2): Add PROC_WXMAP_CTL/STATUS
It allows to override kern.elf{32,64}.allow_wx on per-process basis. In particular, it makes it possible to run binaries without PT_GNU_STACK and without elfctl note while allow_wx = 0.
Reviewed by: brooks, emaste, markj Sponsored by: The FreeBSD Foundation MFC after: 1 week Differential revision: https://reviews.freebsd.org/D31779
show more ...
|
| #
cf98bc28 |
| 10-Jul-2021 |
David Chisnall <[email protected]> |
Pass the syscall number to capsicum permission-denied signals
The syscall number is stored in the same register as the syscall return on amd64 (and possibly other architectures) and so it is impossi
Pass the syscall number to capsicum permission-denied signals
The syscall number is stored in the same register as the syscall return on amd64 (and possibly other architectures) and so it is impossible to recover in the signal handler after the call has returned. This small tweak delivers it in the `si_value` field of the signal, which is sufficient to catch capability violations and emulate them with a call to a more-privileged process in the signal handler.
This reapplies 3a522ba1bc852c3d4660a4fa32e4a94999d09a47 with a fix for the static assertion failure on i386.
Approved by: markj (mentor)
Reviewed by: kib, bcr (manpages)
Differential Revision: https://reviews.freebsd.org/D29185
show more ...
|
| #
d2b55828 |
| 10-Jul-2021 |
David Chisnall <[email protected]> |
Revert "Pass the syscall number to capsicum permission-denied signals"
This broke the i386 build.
This reverts commit 3a522ba1bc852c3d4660a4fa32e4a94999d09a47.
|
| #
3a522ba1 |
| 10-Jul-2021 |
David Chisnall <[email protected]> |
Pass the syscall number to capsicum permission-denied signals
The syscall number is stored in the same register as the syscall return on amd64 (and possibly other architectures) and so it is impossi
Pass the syscall number to capsicum permission-denied signals
The syscall number is stored in the same register as the syscall return on amd64 (and possibly other architectures) and so it is impossible to recover in the signal handler after the call has returned. This small tweak delivers it in the `si_value` field of the signal, which is sufficient to catch capability violations and emulate them with a call to a more-privileged process in the signal handler.
Approved by: markj (mentor)
Reviewed by: kib, bcr (manpages)
Differential Revision: https://reviews.freebsd.org/D29185
show more ...
|
| #
db8d680e |
| 01-Jul-2021 |
Edward Tomasz Napierala <[email protected]> |
procctl(2): add PROC_NO_NEW_PRIVS_CTL, PROC_NO_NEW_PRIVS_STATUS
This introduces a new, per-process flag, "NO_NEW_PRIVS", which is inherited, preserved on exec, and cannot be cleared. The flag, when
procctl(2): add PROC_NO_NEW_PRIVS_CTL, PROC_NO_NEW_PRIVS_STATUS
This introduces a new, per-process flag, "NO_NEW_PRIVS", which is inherited, preserved on exec, and cannot be cleared. The flag, when set, makes subsequent execs ignore any SUID and SGID bits, instead executing those binaries as if they not set.
The main purpose of the flag is implementation of Linux PROC_SET_NO_NEW_PRIVS prctl(2), and possibly also unpriviledged chroot.
Reviewed By: kib Sponsored By: EPSRC Differential Revision: https://reviews.freebsd.org/D30939
show more ...
|
|
Revision tags: release/13.0.0, release/12.2.0 |
|
| #
0e3972bc |
| 11-Jul-2020 |
Allan Jude <[email protected]> |
procctl(2): consistently refer to the last agrument as 'data'
Some older references called it 'arg'
Also fix a syntax error that was underlining an entire sentence.
PR: 247386 Reported by: Paul F
procctl(2): consistently refer to the last agrument as 'data'
Some older references called it 'arg'
Also fix a syntax error that was underlining an entire sentence.
PR: 247386 Reported by: Paul Floyd <[email protected]>, PauAmma (research) MFC after: 2 weeks Sponsored by: Klara Inc.
show more ...
|
| #
6cf8fba3 |
| 13-Jun-2020 |
Konstantin Belousov <[email protected]> |
procctl(2): document PROC_KPTI
Reviewed by: bcr Sponsored by: The FreeBSD Foundation MFC after: 1 week Differential revision: https://reviews.freebsd.org/D25258
|
| #
7e54fea1 |
| 13-Jun-2020 |
Konstantin Belousov <[email protected]> |
procctl(2): consistently refer to the data pointer as 'data'.
Reviewed by: bcr Sponsored by: The FreeBSD Foundation MFC after: 1 week Differential revision: https://reviews.freebsd.org/D25258
|
|
Revision tags: release/11.4.0 |
|
| #
880ff10b |
| 16-May-2020 |
Kyle Evans <[email protected]> |
procctl(2): correct a minor cut-n-pasto
This is clearly describing PROC_PROTMAX_FORCE_DISABLE, rather than PROC_ASL_FORCE_DISABLE.
Submitted by: [email protected]
|
| #
5dcf0083 |
| 24-Apr-2020 |
Mateusz Piotrowski <[email protected]> |
Fix a typo
Reported by: pstef MFC after: 2 days
|
|
Revision tags: release/12.1.0 |
|
| #
fe69291f |
| 03-Sep-2019 |
Konstantin Belousov <[email protected]> |
Add procctl(PROC_STACKGAP_CTL)
It allows a process to request that stack gap was not applied to its stacks, retroactively. Also it is possible to control the gaps in the process after exec.
PR: 23
Add procctl(PROC_STACKGAP_CTL)
It allows a process to request that stack gap was not applied to its stacks, retroactively. Also it is possible to control the gaps in the process after exec.
PR: 239894 Reviewed by: alc Sponsored by: The FreeBSD Foundation Differential revision: https://reviews.freebsd.org/D21352
show more ...
|
|
Revision tags: release/11.3.0 |
|
| #
5dc7e31a |
| 02-Jul-2019 |
Konstantin Belousov <[email protected]> |
Control implicit PROT_MAX() using procctl(2) and the FreeBSD note feature bit.
In particular, allocate the bit to opt-out the image from implicit PROTMAX enablement. Provide procctl(2) verbs to set
Control implicit PROT_MAX() using procctl(2) and the FreeBSD note feature bit.
In particular, allocate the bit to opt-out the image from implicit PROTMAX enablement. Provide procctl(2) verbs to set and query implicit PROTMAX handling. The knobs mimic the same per-image flag and per-process controls for ASLR.
Reviewed by: emaste, markj (previous version) Discussed with: brooks Sponsored by: The FreeBSD Foundation Differential revision: https://reviews.freebsd.org/D20795
show more ...
|
| #
e0a126f6 |
| 28-Jun-2019 |
Konstantin Belousov <[email protected]> |
Typo.
Sponsored by: The FreeBSD Foundation MFC after: 3 days
|
| #
9b7448fc |
| 09-Apr-2019 |
Edward Tomasz Napierala <[email protected]> |
.Xr protect(1) and proccontrol(1) from procctl(2).
MFC after: 2 weeks Sponsored by: DARPA, AFRL
|
| #
9fb91a0a |
| 26-Feb-2019 |
Konstantin Belousov <[email protected]> |
procctl(2): document ASLR knobs.
Reviewed by: 0mp Sponsored by: The FreeBSD Foundation Differential revision: https://reviews.freebsd.org/D19308
|
| #
80a3fa48 |
| 26-Feb-2019 |
Konstantin Belousov <[email protected]> |
procctl(2): fix -width parameter to .Bl.
According to 0mp, macros are not expanded in the argument provided to -width. Use plain identifiers for width specification.
Noted and reviewed by: 0mp Spo
procctl(2): fix -width parameter to .Bl.
According to 0mp, macros are not expanded in the argument provided to -width. Use plain identifiers for width specification.
Noted and reviewed by: 0mp Sponsored by: The FreeBSD Foundation MFC after: 3 days Differential revision: https://reviews.freebsd.org/D19308
show more ...
|
|
Revision tags: release/12.0.0, release/11.2.0 |
|
| #
450cd847 |
| 12-May-2018 |
Konstantin Belousov <[email protected]> |
PROC_PDEATHSIG_CTL will appear first in 11.2.
Submitted by: Thomas Munro MFC after: 3 days Differential revision: https://reviews.freebsd.org/D15399
|
| #
1302eea7 |
| 20-Apr-2018 |
Konstantin Belousov <[email protected]> |
Rename PROC_PDEATHSIG_SET -> PROC_PDEATHSIG_CTL and PROC_PDEATHSIG_GET -> PROC_PDEATHSIG_STATUS for consistency with other procctl(2) operations names.
Requested by: emaste Sponsored by: The FreeBSD
Rename PROC_PDEATHSIG_SET -> PROC_PDEATHSIG_CTL and PROC_PDEATHSIG_GET -> PROC_PDEATHSIG_STATUS for consistency with other procctl(2) operations names.
Requested by: emaste Sponsored by: The FreeBSD Foundation MFC after: 13 days
show more ...
|
| #
b9408863 |
| 18-Apr-2018 |
Konstantin Belousov <[email protected]> |
Add PROC_PDEATHSIG_SET to procctl interface.
Allow processes to request the delivery of a signal upon death of their parent process. Supposed consumer of the feature is PostgreSQL.
Submitted by: T
Add PROC_PDEATHSIG_SET to procctl interface.
Allow processes to request the delivery of a signal upon death of their parent process. Supposed consumer of the feature is PostgreSQL.
Submitted by: Thomas Munro Reviewed by: jilles, mjg MFC after: 2 weeks Differential revision: https://reviews.freebsd.org/D15106
show more ...
|
| #
ee50062c |
| 23-Nov-2017 |
Konstantin Belousov <[email protected]> |
Kill all descendants of the reaper, even if they are descendants of a subordinate reaper.
Also, mark reapers when listing pids.
Reported by: Michael Zuo <[email protected]> PR: 223745 Reviewed b
Kill all descendants of the reaper, even if they are descendants of a subordinate reaper.
Also, mark reapers when listing pids.
Reported by: Michael Zuo <[email protected]> PR: 223745 Reviewed by: bapt Sponsored by: The FreeBSD Foundation MFC after: 1 week Differential revision: https://reviews.freebsd.org/D13183
show more ...
|