freebsd-skq/sys/compat/linux
glebius 796cbcc738 Call crextend() before copying old credentials to the new credentials
and replace crcopysafe by crcopy as crcopysafe is is not intended to be
safe in a threaded environment, it drops PROC_LOCK() in while() that
can lead to unexpected results, such as overwrite kernel memory.

In my POV crcopysafe() needs special attention. For now I do not see
any problems with this function, but who knows.

Submitted by:	dchagin
Found by:	trinity
Security:	SA-16:04.linux
2016-01-14 10:16:25 +00:00
..
check_error.d
check_internal_locks.d
linux_common.c
linux_dtrace.h
linux_emul.c
linux_emul.h
linux_event.c
linux_event.h
linux_file.c
linux_file.h
linux_fork.c
linux_futex.c Change linux get_robust_list system call to match actual linux one. 2016-01-14 10:13:58 +00:00
linux_futex.h
linux_getcwd.c
linux_ioctl.c
linux_ioctl.h
linux_ipc.c
linux_ipc.h
linux_mib.c
linux_mib.h
linux_misc.c Call crextend() before copying old credentials to the new credentials 2016-01-14 10:16:25 +00:00
linux_misc.h
linux_signal.c
linux_signal.h
linux_socket.c
linux_socket.h
linux_stats.c
linux_sysctl.c
linux_sysproto.h
linux_time.c
linux_timer.c Return EINVAL in case of incorrect sigev_signo value specified instead of panicing. 2015-12-26 09:09:49 +00:00
linux_timer.h
linux_uid16.c
linux_util.c
linux_util.h
linux_vdso.c
linux_vdso.h
linux_videodev2_compat.h
linux_videodev_compat.h
linux.c
linux.h
stats_timing.d
trace_futexes.d