ldmud-3.2.9/doc/
ldmud-3.2.9/doc/efun/
ldmud-3.2.9/mud/
ldmud-3.2.9/mud/heaven7/
ldmud-3.2.9/mud/heaven7/lib/
ldmud-3.2.9/mud/lp-245/
ldmud-3.2.9/mud/lp-245/banish/
ldmud-3.2.9/mud/lp-245/doc/
ldmud-3.2.9/mud/lp-245/doc/examples/
ldmud-3.2.9/mud/lp-245/doc/sefun/
ldmud-3.2.9/mud/lp-245/log/
ldmud-3.2.9/mud/lp-245/obj/Go/
ldmud-3.2.9/mud/lp-245/players/lars/
ldmud-3.2.9/mud/lp-245/room/death/
ldmud-3.2.9/mud/lp-245/room/maze1/
ldmud-3.2.9/mud/lp-245/room/sub/
ldmud-3.2.9/mud/lp-245/secure/
ldmud-3.2.9/mud/morgengrauen/
ldmud-3.2.9/mud/morgengrauen/lib/
ldmud-3.2.9/mud/sticklib/
ldmud-3.2.9/mud/sticklib/src/
ldmud-3.2.9/mudlib/uni-crasher/
ldmud-3.2.9/pkg/
ldmud-3.2.9/pkg/debugger/
ldmud-3.2.9/pkg/diff/
ldmud-3.2.9/pkg/misc/
ldmud-3.2.9/src/autoconf/
ldmud-3.2.9/src/bugs/
ldmud-3.2.9/src/bugs/MudCompress/
ldmud-3.2.9/src/bugs/b-020916-files/
ldmud-3.2.9/src/bugs/doomdark/
ldmud-3.2.9/src/bugs/ferrycode/ferry/
ldmud-3.2.9/src/bugs/ferrycode/obj/
ldmud-3.2.9/src/bugs/psql/
ldmud-3.2.9/src/done/
ldmud-3.2.9/src/done/order_alist/
ldmud-3.2.9/src/done/order_alist/obj/
ldmud-3.2.9/src/done/order_alist/room/
ldmud-3.2.9/src/gcc/
ldmud-3.2.9/src/gcc/2.7.0/
ldmud-3.2.9/src/gcc/2.7.1/
ldmud-3.2.9/src/hosts/
ldmud-3.2.9/src/hosts/GnuWin32/
ldmud-3.2.9/src/hosts/amiga/NetIncl/
ldmud-3.2.9/src/hosts/amiga/NetIncl/netinet/
ldmud-3.2.9/src/hosts/amiga/NetIncl/sys/
ldmud-3.2.9/src/hosts/i386/
ldmud-3.2.9/src/hosts/msdos/byacc/
ldmud-3.2.9/src/hosts/msdos/doc/
ldmud-3.2.9/src/hosts/os2/
ldmud-3.2.9/src/hosts/win32/
ldmud-3.2.9/src/util/
ldmud-3.2.9/src/util/erq/
ldmud-3.2.9/src/util/indent/hosts/next/
ldmud-3.2.9/src/util/xerq/
ldmud-3.2.9/src/util/xerq/lpc/
ldmud-3.2.9/src/util/xerq/lpc/www/
SYNOPSIS
        int privilege_violation(string op, mixed who, mixed arg3, mixed arg4)

DESCRIPTION
        Validate the execution of a privileged operation.
        op denotes the requested operation, who is the object
        requesting the operation (file_name or object pointer), arg3
        and arg4 are additional arguments, depending on the operation.

        The function should return >0 to grant the privilege, 0 to
        indicate that the caller was probably misleaded and the error
        might be fixed, and anything else to indicate a real
        violation, that will be handled as run time error.

        The privileged operations are:
        attach_erq_demon  Attach the erq demon to object <arg> with
                          flag <args>.
        bind_lambda          Bind a lambda-closure to object arg3.
        call_out_info          Return an array with all call_out
                          informations.
        execute_command   Execute command string <arg2> for the object
                          <arg>.
        erq               A the request <arg4> is to be send to the
                          erq-demon by the object <who>.
        input_to          Object <who> redirects the next input from
                          commandgiver <arg3>, using <arg4> as value
                          for the flags. This is used for flag values
                          including the 'no bang' option.
        limited:          Execute <arg> with reduced/changed limits.
        nomask simul_efun Attempt to get an efun <arg> via efun:: when
                          it is shadowed by a nomask type simul_efun.
        rename_object          The object <who> tries to rename the object
                          <arg3> to the name <arg4>.
        send_imp          Send UDP-data to host arg3 (deprecated).
        send_udp          Send UDP-data to host arg3.
                          the compiler.
        set_auto_include_string  Set the string automatically included by
                            the compiler (deprecated).
        get_extra_wizinfo Get the additional wiz-list info for user
                          arg3.
        set_extra_wizinfo Set the additional wiz-list info for user
                          arg3.
        set_extra_wizinfo_size Set the size of the additional user
                          info in the wiz-list to arg3.
        set_driver_hook   Set hook <arg> to <arg2>.
        set_limits        Set limits to <arg>.
        set_this_object   Set this_object() to arg3.
        shadow_add_action Add an action to function <arg4> of object <arg3>
                          from the shadow <who> which is shadowing <arg3>.
        symbol_variable   Attempt to make a symbol from a hidden
                          inherited variable. arg3 is the object in
                          question, arg4 the number of the variable in
                          the variable table.
        wizlist_info          Return an array with all wiz-list
                          information.

        call_out_info() can return the arguments to functions and
        lambda closures to be called by call_out(); you should
        consider that read access to closures, mappings and arrays
        means write access and/or other privileges.
        wizlist_info() will return an array which holds, among others,
        the extra wizlist field. While a toplevel array, if found,
        will be copied, this does not apply to nested arrays or to any
        mappings. You might also have some sensitive closures there.
        send_imp() should be watched as it could be abused to mess up
        the IMP.
        The xxx_extra_wizinfo operations are necessary for a proper
        wizlist and should therefore be restricted to admins.
        All other operations are potential sources for direct security
        breaches - any use of them should be scrutinized closely.

SEE ALSO
        simul_efun(C), call_out_info(E), shadow(E), add_action(E),
        send_erq(E), set_this_object(E), rename_object(E),
        bind_lambda(E), send_udp(E), input_to(E), execute_command(E)