summaryrefslogtreecommitdiff
path: root/sys/kern/kern_sig.c
AgeCommit message (Collapse)Author
1998-02-20GCC 2.8 caught this type error, thanksNiklas Hallqvist
1998-01-09core dumps disabled for SUID programs is default again.Constantine Sapuntzakis
1998-01-09Get rid of dumping across symlinks. Races can cause this to be problematicConstantine Sapuntzakis
from a security standpoint (i.e. arbitrary files on the FS can be wiped out).
1997-12-08add kern.nosuidcoredump to lock things out even moreTheo de Raadt
1997-11-06Updates for VFS Lite 2 + soft update.Constantine Sapuntzakis
1997-10-06back out vfs lite2 till after 2.2Theo de Raadt
1997-10-06VFS Lite2 ChangesConstantine Sapuntzakis
1997-09-15From FreeBSD (joerg@freebsd.org):Todd C. Miller
Implement SA_NOCLDWAIT by reparenting kids of processes that have the appropriate bit set to PID 1, and let PID 1 handle the zombie. This assumes that PID 1 will wait for its kids (which is true of init). This also includes some FreeBSD sigaction.2.
1997-09-12add copyright for the work i did in csignal()Theo de Raadt
1997-08-31for non-tty TIOCSPGRP/F_SETOWN/FIOSETOWN pgid setting calls, store uidTheo de Raadt
and euid as well, then deliver them using new csignal() interface which ensures that pgid setting process is permitted to signal the pgid process(es). Thanks to newsham@aloha.net for extensive help and discussion.
1997-02-01add type & union sigval args to sendsig/trapsignalTheo de Raadt
1997-01-27add another parameter to trapsignal() and sendsig() -- fault addr to beTheo de Raadt
delivered with in the siginfo information
1997-01-27initial cut at SA_SIGINFO supportTheo de Raadt
1996-10-27Signal handling now fully POSIX.1-1990 compliantThorsten Lockert
1996-10-27Allow kill(, 0) on process groups that hold only zombies; per POSIXThorsten Lockert
1996-10-27Don't verify that euid has write permissionThorsten Lockert
1996-10-27Correct last fixThorsten Lockert
1996-10-26A process can send a signal to another process if the uid of the signallingThorsten Lockert
process is the same as the saved uid of the signalled process
1996-10-20Further limit the cases where we write core filesThorsten Lockert
1996-10-18From Keith Bostic, with some minor changes:Thorsten Lockert
The problem reported on BUGTRACK was that ftpd could be convinced to drop core after it had discarded its special permissions, but while it still had a copy of the encrypted passwords in its buffers. Change coredump() to: + Don't drop core for any process that was ever setuid/setgid if it's not running as root. + Change errno returns from EFAULT to appropriate values -- this will be useful for when coredump() becomes a system call and gcore goes away. + Create core dump files mode 600, and don't dump to files that are owned by anyone else or readable or writable by anyone other than the owner.
1996-09-03another typo....Theo de Raadt
1996-09-03do not coredump for setuid/setgid, unless run by rootTheo de Raadt
1996-05-02sync syscalls, no sys/cpu.hTheo de Raadt
1996-03-03From NetBSD: 960217 mergeNiklas Hallqvist
1996-01-05ss_sp is correct, ss_base is not. noticed by agc@sde.uts.amdahl.com; netbsd ↵Theo de Raadt
pr#1784
1995-10-18initial import of NetBSD treeTheo de Raadt