Subject: procfs security patch
To: None <port-pmax@netbsd.org>
From: Peter C. Wallace <pcw@mesanet.com>
List: port-pmax
Date: 02/22/2000 12:44:22
I tried to apply the procfs security patch to my pmax running 1.41.

The patch did not apply cleanly, here is y.rej:

***************
*** 275,280 ****
  void  mountroothook_destroy __P((void));
  void  domountroothook __P((void));
  
  int   uiomove __P((void *, int, struct uio *));
  
  #ifdef _KERNEL
--- 275,288 ----
  void  mountroothook_destroy __P((void));
  void  domountroothook __P((void));
  
+ /*
+  * Exec hooks. Subsystems may want to do cleanup when a process
+  * execs.
+  */
+ void  *exechook_establish __P((void (*)(struct proc *, void *), void
*));
+ void  exechook_disestablish __P((void *));
+ void  doexechooks __P((struct proc *));
+ 
  int   uiomove __P((void *, int, struct uio *));
  
  #ifdef _KERNEL


I (optimistically) tried to compile a new kernel
but it blew up with:

../../../../kern/kern_exec.c: In function `sys_execve':
../../../../kern/kern_exec.c:466: warning: implicit declaration of
function `doexechooks'

What have I done wrong?

Peter Wallace
Mesa Electronics