summaryrefslogtreecommitdiffstats
path: root/sys/kern/kern_sig.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* permit sig 0 (existance checking) to setuid parents; ibo@ragnarok.val-axs.netderaadt1998-05-301-1/+2
|
* add more signals to setuid part of cansignal()deraadt1998-05-181-1/+5
|
* convert CANSIGNAL() macro into a function, and then add significant constraintsderaadt1998-05-171-13/+51
| | | | | | regarding setuid/setgid targets (this is permitted by POSIX, and solves a number of security issues). This is due to a conversation months ago with dholland@hcs.harvard.edu.
* GCC 2.8 caught this type error, thanksniklas1998-02-201-2/+4
|
* core dumps disabled for SUID programs is default again.csapuntz1998-01-091-2/+2
|
* Get rid of dumping across symlinks. Races can cause this to be problematiccsapuntz1998-01-091-3/+6
| | | | from a security standpoint (i.e. arbitrary files on the FS can be wiped out).
* add kern.nosuidcoredump to lock things out even morederaadt1997-12-081-1/+5
|
* Updates for VFS Lite 2 + soft update.csapuntz1997-11-061-2/+2
|
* back out vfs lite2 till after 2.2deraadt1997-10-061-2/+2
|
* VFS Lite2 Changescsapuntz1997-10-061-2/+2
|
* From FreeBSD (joerg@freebsd.org):millert1997-09-151-1/+16
| | | | | | | Implement SA_NOCLDWAIT by reparenting kids of processes that have the appropriate bit set to PID 1, and let PID 1 handle the zombie. This assumes that PID 1 will wait for its kids (which is true of init). This also includes some FreeBSD sigaction.2.
* add copyright for the work i did in csignal()deraadt1997-09-121-1/+2
|
* for non-tty TIOCSPGRP/F_SETOWN/FIOSETOWN pgid setting calls, store uidderaadt1997-08-311-1/+41
| | | | | | | and euid as well, then deliver them using new csignal() interface which ensures that pgid setting process is permitted to signal the pgid process(es). Thanks to newsham@aloha.net for extensive help and discussion.
* add type & union sigval args to sendsig/trapsignalderaadt1997-02-011-7/+28
|
* add another parameter to trapsignal() and sendsig() -- fault addr to bederaadt1997-01-271-4/+5
| | | | delivered with in the siginfo information
* initial cut at SA_SIGINFO supportderaadt1997-01-271-1/+17
|
* Signal handling now fully POSIX.1-1990 complianttholo1996-10-271-3/+4
|
* Allow kill(, 0) on process groups that hold only zombies; per POSIXtholo1996-10-271-2/+1
|
* Don't verify that euid has write permissiontholo1996-10-271-27/+2
|
* Correct last fixtholo1996-10-271-2/+2
|
* A process can send a signal to another process if the uid of the signallingtholo1996-10-261-1/+2
| | | | process is the same as the saved uid of the signalled process
* Further limit the cases where we write core filestholo1996-10-201-6/+34
|
* From Keith Bostic, with some minor changes:tholo1996-10-181-19/+34
| | | | | | | | | | | | | | | | The problem reported on BUGTRACK was that ftpd could be convinced to drop core after it had discarded its special permissions, but while it still had a copy of the encrypted passwords in its buffers. Change coredump() to: + Don't drop core for any process that was ever setuid/setgid if it's not running as root. + Change errno returns from EFAULT to appropriate values -- this will be useful for when coredump() becomes a system call and gcore goes away. + Create core dump files mode 600, and don't dump to files that are owned by anyone else or readable or writable by anyone other than the owner.
* another typo....deraadt1996-09-031-3/+3
|
* do not coredump for setuid/setgid, unless run by rootderaadt1996-09-031-3/+7
|
* sync syscalls, no sys/cpu.hderaadt1996-05-021-3/+2
|
* From NetBSD: 960217 mergeniklas1996-03-031-9/+23
|
* ss_sp is correct, ss_base is not. noticed by agc@sde.uts.amdahl.com; netbsd pr#1784deraadt1996-01-051-2/+2
|
* initial import of NetBSD treederaadt1995-10-181-0/+1137