#
04933f16 |
| 02-Aug-2024 |
guenther <guenther@openbsd.org> |
The {get,set}res[ug]id(2) family are in POSIX-2024's XSI option, so adjust the #include visibility and update the manpage.
ok millert@
|
#
c1d8b5d1 |
| 02-Aug-2024 |
guenther <guenther@openbsd.org> |
getentropy(2) is in POSIX-2024, so adjust the #include visibility, change the "too much" error to EINVAL, add GETENTROPY_MAX to <limits.h> (via sys/syslimits.h), and update the manpage.
ok deraadt@
|
#
5f31b145 |
| 18-May-2024 |
guenther <guenther@openbsd.org> |
Add pathconfat(2): pathconf(2) but with at-fd and flags arguments, the latter supporting the ability to get timestamp resolution of symlinks.
ok deraadt@ millert@
|
#
cafeb892 |
| 12-Dec-2023 |
deraadt <deraadt@openbsd.org> |
remove support for syscall(2) -- the "indirection system call" because it is a dangerous alternative entry point for all system calls, and thus incompatible with the precision system call entry point
remove support for syscall(2) -- the "indirection system call" because it is a dangerous alternative entry point for all system calls, and thus incompatible with the precision system call entry point scheme we are heading towards. This has been a 3-year mission: First perl needed a code-generated wrapper to fake syscall(2) as a giant switch table, then all the ports were cleaned with relatively minor fixes, except for "go". "go" required two fixes -- 1) a framework issue with old library versions, and 2) like perl, a fake syscall(2) wrapper to handle ioctl(2) and sysctl(2) because "syscall(SYS_ioctl" occurs all over the place in the "go" ecosystem because the "go developers" are plan9-loving unix-hating folk who tried to build an ecosystem without allowing "ioctl". ok kettenis, jsing, afresh1, sthen
show more ...
|
#
cef5a146 |
| 07-Jan-2023 |
guenther <guenther@openbsd.org> |
Add {get,set}thrname(2) for putting thread names in the kernel and exposed in a new field returned by sysctl(KERN_PROC). Update pthread_{get,set}_name_np(3) to use the syscalls. Show them, when set
Add {get,set}thrname(2) for putting thread names in the kernel and exposed in a new field returned by sysctl(KERN_PROC). Update pthread_{get,set}_name_np(3) to use the syscalls. Show them, when set, in ps -H and top -H output.
libc and libpthread minor bumps
ok mpi@, mvs@, deraadt@
show more ...
|
#
8b23add8 |
| 13-Jul-2018 |
beck <beck@openbsd.org> |
Unveiling unveil(2). This brings unveil into the tree, disabled by default - Currently this will return EPERM on all attempts to use it until we are fully certain it is ready for people to start usin
Unveiling unveil(2). This brings unveil into the tree, disabled by default - Currently this will return EPERM on all attempts to use it until we are fully certain it is ready for people to start using, but this now allows for others to do more tweaking and experimentation.
Still needs to send the unveil's across forks and execs before fully enabling.
Many thanks to robert@ and deraadt@ for extensive testing. ok deraadt@
show more ...
|
#
4ea7ed56 |
| 12-Dec-2017 |
deraadt <deraadt@openbsd.org> |
pledge()'s 2nd argument becomes char *execpromises, which becomes the pledge for a new execve image immediately upon start. Also introduces "error" which makes violations return -1 ENOSYS instead of
pledge()'s 2nd argument becomes char *execpromises, which becomes the pledge for a new execve image immediately upon start. Also introduces "error" which makes violations return -1 ENOSYS instead of killing the program ("error" may not be handed to a setuid/setgid program, which may be missing/ignoring syscall return values and would continue with inconsistant state) Discussion with many florian has used this to improve the strictness of a daemon
show more ...
|
#
15afe4d6 |
| 09-Mar-2017 |
fcambus <fcambus@openbsd.org> |
As per style.9, prototypes should not have variable names associated with the types.
OK jca@
|
#
9e9a60b0 |
| 12-Sep-2016 |
guenther <guenther@openbsd.org> |
Don't declare select() in <unistd.h>
ok deraadt@ millert@
|
#
6ecde746 |
| 09-Sep-2016 |
millert <millert@openbsd.org> |
Move the 10 (!) defintions of NULL to their own mini header file and update the NULL definition for C++11. OK deraadt@ guenther@ kettenis@
|
#
df1557eb |
| 23-May-2016 |
guenther <guenther@openbsd.org> |
Remove iruserok(_sa)? and __ivaliduser(sa)?
ok millert@ deraadt@
|
#
58857ab4 |
| 09-Oct-2015 |
deraadt <deraadt@openbsd.org> |
tame -> pledge.
|
#
2868cab3 |
| 09-Sep-2015 |
deraadt <deraadt@openbsd.org> |
Move to next tame() API. The flags are now passed as a very simple string, which results in tame() code placements being much more recognizeable. tame() can be moved to unistd.h and does not need cp
Move to next tame() API. The flags are now passed as a very simple string, which results in tame() code placements being much more recognizeable. tame() can be moved to unistd.h and does not need cpp symbols to turn the bits on and off. The resulting API is a bit unexpected, but simplifies the mapping to enabling bits in the kernel substantially. vague ok's from various including guenther doug semarie
show more ...
|
#
b3b7ef2e |
| 26-Aug-2015 |
guenther <guenther@openbsd.org> |
Hide many (194!) symbols that nothing should be using. Delete exect(2); it wasn't portable across archs and nothing used it.
ports test build by naddy@ ok deraadt@ kettenis@
|
#
7f91f423 |
| 13-Dec-2014 |
tedu <tedu@openbsd.org> |
claim posix 2008 compat. apparently people look at this and get scared when it's really old. but no actual ports fallout in espie's build. ok deraadt
|
#
0a2869cb |
| 11-Dec-2014 |
tedu <tedu@openbsd.org> |
update swab() to match the current posix definition. "rationale: none." rewrite the function to be simpler as well. the compiler can unroll the loop for us if necessary. ok schwarze
|
#
80dc78aa |
| 08-Dec-2014 |
tedu <tedu@openbsd.org> |
header changes for recent libc changes: add siphash delete setkey, encrypt, cfree
|
#
817d1ee3 |
| 21-Nov-2014 |
tedu <tedu@openbsd.org> |
change prototype for crypt_newhash. the login_cap_t is a holdover from its pwd_gensalt origins, but a string argument works equally work and is more friendly to consumers beyond local user accounts.
change prototype for crypt_newhash. the login_cap_t is a holdover from its pwd_gensalt origins, but a string argument works equally work and is more friendly to consumers beyond local user accounts. ok deraadt
show more ...
|
#
9f295d46 |
| 18-Sep-2014 |
guenther <guenther@openbsd.org> |
Our setpgrp() is the BSD version with two args and not the XSI version with zero args, so it should only be visible if __BSD_VISIBLE (and not also for __XPG_VISIBLE). Contrawise, readlink() has been
Our setpgrp() is the BSD version with two args and not the XSI version with zero args, so it should only be visible if __BSD_VISIBLE (and not also for __XPG_VISIBLE). Contrawise, readlink() has been part of base POSIX since 1995, so move to proper #if area for that. Move crypt_checkpass() to the pure-BSD section of the file.
setpgrp() issue noted by Matti Karnaattu (mkarnaattu (at) gmail.com) ok millert@
show more ...
|
#
e6ff12da |
| 01-Sep-2014 |
doug <doug@openbsd.org> |
Sync readlink(2) with IEEE Std 1003.1-2008.
discussion, help and ok guenther@
|
#
cbcba417 |
| 31-Aug-2014 |
guenther <guenther@openbsd.org> |
Declare and document getthrid()
indirectly prodded by krw@
|
#
b65639bd |
| 31-Aug-2014 |
guenther <guenther@openbsd.org> |
Add additional kernel interfaces for setting close-on-exec on fds when creating them: pipe2(), dup3(), accept4(), MSG_CMSG_CLOEXEC, SOCK_CLOEXEC. Includes SOCK_NONBLOCK support.
ok matthew@
|
#
5f651b4a |
| 08-Jul-2014 |
tedu <tedu@openbsd.org> |
update _POSIX2_FORT_RUN, so that sysconf(_SC_2_FORT_RUN) remains correct. because you care. reminded by matthew.
|
#
bbb6b662 |
| 14-Jun-2014 |
deraadt <deraadt@openbsd.org> |
Change return value of getentropy() to int 0 for success. Maximum buffersize is enforced strictly, this supplies sufficient entropy payload to act as seed material. Discourage general use of this A
Change return value of getentropy() to int 0 for success. Maximum buffersize is enforced strictly, this supplies sufficient entropy payload to act as seed material. Discourage general use of this API, but lock down this function name as the go-to for userland PRNG seeding. Improve documentation. ok miod matthew
show more ...
|
#
eacbc5b3 |
| 13-Jun-2014 |
deraadt <deraadt@openbsd.org> |
Add new getentropy() system call. Code and pressure from matthew. I accepted that he's right (again) to seperate this out from heavy sysctl API and this will simply a variety of things. Functionnam
Add new getentropy() system call. Code and pressure from matthew. I accepted that he's right (again) to seperate this out from heavy sysctl API and this will simply a variety of things. Functionname is not used by anyone in the ports tree, so we guess we can use it. Shocking that no application has a function called this. ok matthew & others who pushed him to start this early on
show more ...
|