summaryrefslogtreecommitdiffstats
path: root/sys/kern/kern_prot.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* ansi/deregister.jsg2005-11-281-115/+32
| | | | 'go for it' deraadt@
* match syscallargs comments with realityhenning2003-09-011-3/+3
| | | | | from Patrick Latifi <patrick.l@hermes.usherb.ca> ok jason@ tedu@
* change arguments to suser. suser now takes the process, and a flagstedu2003-08-151-23/+32
| | | | | | | | | argument. old cred only calls user suser_ucred. this will allow future work to more flexibly implement the idea of a root process. looks like something i saw in freebsd, but a little different. use of suser_ucred vs suser in file system code should be looked at again, for the moment semantics remain unchanged. review and input from art@ testing and further review miod@
* Remove the advertising clause in the UCB license which Berkeleymillert2003-06-021-6/+2
| | | | rescinded 22 July 1999. Proofed by myself and Theo.
* Bring back setreuid(2) and setregid(2) as first class syscallsmillert2003-01-301-1/+67
| | | | | | | (but still implemented via setres[ug]id(2)). Basically this just moves them from COMPAT_43 into kern_prot.c. Also fixes a typo in my old implementation. The userland portion will follow in a few days. deraadt@ OK
* Implement setresuid(2), getresuid(2), setresgid(2), getresgid(2), basedmillert2002-10-301-1/+207
| | | | | | | partly on the Linux emul code and FreeBSD versions. We need these for Linux, FreeBSD, and HP-UX emulation. Also change sys_setreuid() and sys_setregid() to use uid_t and gid_t respectively.
* Match reality by changing (u_int) -> (int) in comments.nordin2002-10-151-3/+3
|
* Allocate rusage, pgrp, ucred and session with pool.art2002-01-231-6/+4
|
* Don't cast return value from splx to (void) because splx doesn't return anything.art2002-01-121-2/+2
|
* Try again. (this time it's tested).art2001-06-221-1/+20
| | | | | | Add proc_cansugid that checks if a process may raise it's privileges. Rework exec to remove the old sugid workaround and check proc_cansugid just before raising privileges.
* KNFderaadt2001-06-221-10/+10
|
* no way, you are on drugs. last commit revoked because it broke setuid majorlyderaadt2001-06-191-19/+1
|
* Add proc_cansugid used to check if a process should be allowedart2001-06-181-1/+19
| | | | to raise its privileges in exec.
* Cleanup.art2000-11-081-54/+69
| | | | | Zap COMPAT_09. Don't duplicate creds unless necessary.
* o add missing getsid() prototypemillert2000-09-121-15/+24
| | | | | | | o fix typo in getsid() that broke getsid(pid) where pid != 0 o cause getsid() and getpgid() to return EPERM if requesting the id of a session/process group not in the current session o check for NULL session in getsid() for exiting processes
* indentderaadt1997-11-171-2/+2
|
* add getsid(2), XPG4deraadt1997-11-131-2/+21
|
* COMPAT_BSDOS exec and compat changes.downsj1997-09-021-4/+4
|
* add getpgid(2) from NetBSDkstailey1997-05-301-1/+23
|
* Do return values from issetuid() correctlytholo1997-03-291-2/+4
|
* Allow set[gu]id() if the [gu]id we are trying to set is the saved [gu]id,tholo1996-10-271-1/+3
| | | | but only set effective [gu]id.
* Verify that pgid argument to setpgid() is legaltholo1996-10-261-1/+4
|
* copyinstr correctly; spotted by bitbltderaadt1996-10-021-2/+2
|
* issetugid() system call discovers if a process was started setuid or setgidderaadt1996-08-251-1/+13
|
* Implemented _POSIX_SAVED_IDS behaviour according to 1003.1-1990, withtholo1996-08-011-9/+24
| | | | allowed extension from Appendix B, section 4.2.2.
* From NetBSD: 960217 mergeniklas1996-03-031-7/+29
|
* initial import of NetBSD treederaadt1995-10-181-0/+536