Subject: procfs security patch
To: None <port-pmax@netbsd.org>
From: Peter C. Wallace <pcw@mesanet.com>
List: port-pmax
Date: 02/22/2000 12:44:22
I tried to apply the procfs security patch to my pmax running 1.41.
The patch did not apply cleanly, here is y.rej:
***************
*** 275,280 ****
void mountroothook_destroy __P((void));
void domountroothook __P((void));
int uiomove __P((void *, int, struct uio *));
#ifdef _KERNEL
--- 275,288 ----
void mountroothook_destroy __P((void));
void domountroothook __P((void));
+ /*
+ * Exec hooks. Subsystems may want to do cleanup when a process
+ * execs.
+ */
+ void *exechook_establish __P((void (*)(struct proc *, void *), void
*));
+ void exechook_disestablish __P((void *));
+ void doexechooks __P((struct proc *));
+
int uiomove __P((void *, int, struct uio *));
#ifdef _KERNEL
I (optimistically) tried to compile a new kernel
but it blew up with:
../../../../kern/kern_exec.c: In function `sys_execve':
../../../../kern/kern_exec.c:466: warning: implicit declaration of
function `doexechooks'
What have I done wrong?
Peter Wallace
Mesa Electronics