Age | Commit message (Collapse) | Author | |
---|---|---|---|
2020-01-20 | id: Use unveil() | Andreas Kling | |
And so "id" becomes our first user of unveil(), giving himself access to read /etc/passwd and /etc/group :^) | |||
2020-01-20 | Userland: Add a dummy passthrough "flock" program | Andreas Kling | |
This allows you to run our build system's Makefiles inside SerenityOS itself (since they rely on "flock") Obviously it doesn't do any locking as we don't support that yet. | |||
2020-01-18 | Meta: Add license header to source files | Andreas Kling | |
As suggested by Joshua, this commit adds the 2-clause BSD license as a comment block to the top of every source file. For the first pass, I've just added myself for simplicity. I encourage everyone to add themselves as copyright holders of any file they've added or modified in some significant way. If I've added myself in error somewhere, feel free to replace it with the appropriate copyright holder instead. Going forward, all new source files should include a license header. | |||
2020-01-17 | Userland: Print which path we failed to ls | Sergey Bugaev | |
2020-01-17 | Userland: Stop id command accepting -n in default format | rhin123 | |
2020-01-15 | Userland/ls: escape non-printable characters | joshua stein | |
Fixes #1044 | |||
2020-01-15 | Kernel: Trying to sys$link() a directory should fail with EPERM | Andreas Kling | |
2020-01-15 | Ext2FS: Don't allow creating new files in removed directories | Andreas Kling | |
Also don't uncache inodes when they reach i_links_count==0 unless they also have no ref counts other than the +1 from the inode cache. This prevents the FS from deleting the on-disk inode too soon. | |||
2020-01-13 | mv: Use pledge() | Andreas Kling | |
2020-01-13 | cp: Use pledge() | Andreas Kling | |
2020-01-13 | man: Use pledge() | Brian Gianforcaro | |
2020-01-13 | more: Use pledge() | Brian Gianforcaro | |
2020-01-13 | md: Use pledge() | Brian Gianforcaro | |
2020-01-13 | ls: Use pledge() | Brian Gianforcaro | |
2020-01-13 | tail: Use pledge() | Brian Gianforcaro | |
2020-01-12 | Kernel: read() and write() should EOVERFLOW if (offset+size) overflows | Andreas Kling | |
2020-01-12 | Userland: Support custom programs and mount options in chroot | Sergey Bugaev | |
2020-01-12 | Userland: Support comments and blank lines in /etc/fstab | Sergey Bugaev | |
2020-01-12 | chmod: Use pledge() | Andreas Kling | |
2020-01-12 | chown: Use pledge() | 0xtechnobabble | |
2020-01-12 | Userland: Add the chgrp command | 0xtechnobabble | |
The chgrp command allows the user to easily modify a file's group while leaving its owner unchanged. | |||
2020-01-12 | Userland: Add named gid/uid args parsing | 0xtechnobabble | |
This patch makes it so that if a user provides a groupname/username instead of an id, chown will automatically convert it to a gid/uid using getgrnam() or getpwnam() respectively. | |||
2020-01-11 | cat: Use pledge() | Andreas Kling | |
2020-01-11 | host: Use pledge() | Andreas Kling | |
2020-01-11 | id: Use pledge() | Andreas Kling | |
2020-01-11 | ping: Use pledge() | Andreas Kling | |
2020-01-11 | Userland: Support mount flags | Sergey Bugaev | |
2020-01-11 | Kernel+LibC: Add support for mount flags | Sergey Bugaev | |
At the moment, the actual flags are ignored, but we correctly propagate them all the way from the original mount() syscall to each custody that resides on the mounted FS. | |||
2020-01-11 | ls: Cache the user and group names instead of looking up every time | Andreas Kling | |
2020-01-10 | chroot: Add a little chroot program | Andreas Kling | |
This program changes the current filesystem root and spawns a shell. | |||
2020-01-10 | Kernel: unlink() should not follow symlinks | Andreas Kling | |
2020-01-10 | rm: When invoked on a symlink, remove the symlink itself | Andreas Kling | |
2020-01-09 | ls: Widen the user and group fields a little bit | Andreas Kling | |
I didn't like looking at /tmp/portal now that lookup:lookup owns one of the sockets there :^) | |||
2020-01-08 | disk_benchmark: Unbreak this utility now that read() of O_WRONLY fails | Andreas Kling | |
2020-01-08 | Kernel: open() and openat() should ignore non-permission bits in mode | Andreas Kling | |
2020-01-08 | truncate: Unbreak this utility after ftruncate() syscall fixes | Andreas Kling | |
2020-01-08 | ProcFS: Reads past the end of a generated file should be zero-length | Andreas Kling | |
2020-01-08 | TmpFS: Reads past the end of a file should be zero-length | Andreas Kling | |
2020-01-08 | Kernel: mmap() should fail with ENODEV for directories | Andreas Kling | |
2020-01-07 | Kernel: Validate ftruncate(fd, length) syscall inputs | Andreas Kling | |
- EINVAL if 'length' is negative - EBADF if 'fd' is not open for writing | |||
2020-01-05 | ls: Display SUID files with red background color | Andreas Kling | |
2020-01-05 | Keymap: Fix map initialization | Tibor Nagy | |
Correct the number of keymap entries and initialize them. Fixes #1017 | |||
2020-01-05 | Userland: Support multiple input files. | marprok | |
The user can now give more than one files to the cut command. | |||
2020-01-04 | su: Use setgroups() to switch over to the target user's extra GIDs | Andreas Kling | |
Before this, su would leave the process's extra GIDs untouched, simply inheriting them from whoever spawned su. Now we grab the target user's groups from /etc/group and setgroups(). | |||
2020-01-04 | id: Remove weird commas from output | Andreas Kling | |
2020-01-04 | ls: Show directories with the sticky bit in a special color | Andreas Kling | |
This makes /tmp show up with a green background in "ls" output. | |||
2020-01-03 | test_io: Test that seeking past EOF and then reading returns 0 | Andreas Kling | |
2020-01-03 | test_io: Verify that write() on an O_RDONLY fd fails with EBADF | Andreas Kling | |
2020-01-03 | test_io: Verify that read() on an O_WRONLY fd fails with EBADF | Andreas Kling | |
2020-01-03 | test_io: Add a simple test program that abuses some I/O syscalls | Andreas Kling | |
This exposes some very bad behaviors that will need fixing. |