summaryrefslogtreecommitdiff
path: root/Userland
AgeCommit message (Collapse)Author
2020-01-24Meta: Claim copyright for files created by meSergey Bugaev
This changes copyright holder to myself for the source code files that I've created or have (almost) completely rewritten. Not included are the files that were significantly changed by others even though it was me who originally created them (think HtmlView), or the many other files I've contributed code to.
2020-01-23rpcdump: Use pledge() and unveil()Brian Gianforcaro
2020-01-23lspci: Use pledge() and unveil()Brian Gianforcaro
2020-01-22man: Use unveil()Brian Gianforcaro
2020-01-22dmesg: Use pledge() and unveil()Brian Gianforcaro
2020-01-20id: Use unveil()Andreas Kling
And so "id" becomes our first user of unveil(), giving himself access to read /etc/passwd and /etc/group :^)
2020-01-20Userland: Add a dummy passthrough "flock" programAndreas Kling
This allows you to run our build system's Makefiles inside SerenityOS itself (since they rely on "flock") Obviously it doesn't do any locking as we don't support that yet.
2020-01-18Meta: Add license header to source filesAndreas Kling
As suggested by Joshua, this commit adds the 2-clause BSD license as a comment block to the top of every source file. For the first pass, I've just added myself for simplicity. I encourage everyone to add themselves as copyright holders of any file they've added or modified in some significant way. If I've added myself in error somewhere, feel free to replace it with the appropriate copyright holder instead. Going forward, all new source files should include a license header.
2020-01-17Userland: Print which path we failed to lsSergey Bugaev
2020-01-17Userland: Stop id command accepting -n in default formatrhin123
2020-01-15Userland/ls: escape non-printable charactersjoshua stein
Fixes #1044
2020-01-15Kernel: Trying to sys$link() a directory should fail with EPERMAndreas Kling
2020-01-15Ext2FS: Don't allow creating new files in removed directoriesAndreas Kling
Also don't uncache inodes when they reach i_links_count==0 unless they also have no ref counts other than the +1 from the inode cache. This prevents the FS from deleting the on-disk inode too soon.
2020-01-13mv: Use pledge()Andreas Kling
2020-01-13cp: Use pledge()Andreas Kling
2020-01-13man: Use pledge()Brian Gianforcaro
2020-01-13more: Use pledge()Brian Gianforcaro
2020-01-13md: Use pledge()Brian Gianforcaro
2020-01-13ls: Use pledge()Brian Gianforcaro
2020-01-13tail: Use pledge()Brian Gianforcaro
2020-01-12Kernel: read() and write() should EOVERFLOW if (offset+size) overflowsAndreas Kling
2020-01-12Userland: Support custom programs and mount options in chrootSergey Bugaev
2020-01-12Userland: Support comments and blank lines in /etc/fstabSergey Bugaev
2020-01-12chmod: Use pledge()Andreas Kling
2020-01-12chown: Use pledge()0xtechnobabble
2020-01-12Userland: Add the chgrp command0xtechnobabble
The chgrp command allows the user to easily modify a file's group while leaving its owner unchanged.
2020-01-12Userland: Add named gid/uid args parsing0xtechnobabble
This patch makes it so that if a user provides a groupname/username instead of an id, chown will automatically convert it to a gid/uid using getgrnam() or getpwnam() respectively.
2020-01-11cat: Use pledge()Andreas Kling
2020-01-11host: Use pledge()Andreas Kling
2020-01-11id: Use pledge()Andreas Kling
2020-01-11ping: Use pledge()Andreas Kling
2020-01-11Userland: Support mount flagsSergey Bugaev
2020-01-11Kernel+LibC: Add support for mount flagsSergey Bugaev
At the moment, the actual flags are ignored, but we correctly propagate them all the way from the original mount() syscall to each custody that resides on the mounted FS.
2020-01-11ls: Cache the user and group names instead of looking up every timeAndreas Kling
2020-01-10chroot: Add a little chroot programAndreas Kling
This program changes the current filesystem root and spawns a shell.
2020-01-10Kernel: unlink() should not follow symlinksAndreas Kling
2020-01-10rm: When invoked on a symlink, remove the symlink itselfAndreas Kling
2020-01-09ls: Widen the user and group fields a little bitAndreas Kling
I didn't like looking at /tmp/portal now that lookup:lookup owns one of the sockets there :^)
2020-01-08disk_benchmark: Unbreak this utility now that read() of O_WRONLY failsAndreas Kling
2020-01-08Kernel: open() and openat() should ignore non-permission bits in modeAndreas Kling
2020-01-08truncate: Unbreak this utility after ftruncate() syscall fixesAndreas Kling
2020-01-08ProcFS: Reads past the end of a generated file should be zero-lengthAndreas Kling
2020-01-08TmpFS: Reads past the end of a file should be zero-lengthAndreas Kling
2020-01-08Kernel: mmap() should fail with ENODEV for directoriesAndreas Kling
2020-01-07Kernel: Validate ftruncate(fd, length) syscall inputsAndreas Kling
- EINVAL if 'length' is negative - EBADF if 'fd' is not open for writing
2020-01-05ls: Display SUID files with red background colorAndreas Kling
2020-01-05Keymap: Fix map initializationTibor Nagy
Correct the number of keymap entries and initialize them. Fixes #1017
2020-01-05Userland: Support multiple input files.marprok
The user can now give more than one files to the cut command.
2020-01-04su: Use setgroups() to switch over to the target user's extra GIDsAndreas Kling
Before this, su would leave the process's extra GIDs untouched, simply inheriting them from whoever spawned su. Now we grab the target user's groups from /etc/group and setgroups().
2020-01-04id: Remove weird commas from outputAndreas Kling