Current Path : /sys/i386/ibcs2/ |
FreeBSD hs32.drive.ne.jp 9.1-RELEASE FreeBSD 9.1-RELEASE #1: Wed Jan 14 12:18:08 JST 2015 root@hs32.drive.ne.jp:/sys/amd64/compile/hs32 amd64 |
Current File : //sys/i386/ibcs2/ibcs2_other.c |
/*- * Copyright (c) 1995 Steven Wallace * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. The name of the author may not be used to endorse or promote products * derived from this software without specific prior written permission * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include <sys/cdefs.h> __FBSDID("$FreeBSD: release/9.1.0/sys/i386/ibcs2/ibcs2_other.c 225617 2011-09-16 13:58:51Z kmacy $"); /* * IBCS2 compatibility module. */ #include "opt_spx_hack.h" #include <sys/param.h> #include <sys/systm.h> #include <sys/lock.h> #include <sys/mutex.h> #include <sys/syscallsubr.h> #include <sys/sysproto.h> #include <sys/un.h> #include <i386/ibcs2/ibcs2_types.h> #include <i386/ibcs2/ibcs2_signal.h> #include <i386/ibcs2/ibcs2_util.h> #include <i386/ibcs2/ibcs2_proto.h> #define IBCS2_SECURE_GETLUID 1 #define IBCS2_SECURE_SETLUID 2 int ibcs2_secure(struct thread *td, struct ibcs2_secure_args *uap) { switch (uap->cmd) { case IBCS2_SECURE_GETLUID: /* get login uid */ td->td_retval[0] = td->td_ucred->cr_uid; return 0; case IBCS2_SECURE_SETLUID: /* set login uid */ return EPERM; default: printf("IBCS2: 'secure' cmd=%d not implemented\n", uap->cmd); } return EINVAL; } int ibcs2_lseek(struct thread *td, register struct ibcs2_lseek_args *uap) { struct lseek_args largs; int error; largs.fd = uap->fd; largs.offset = uap->offset; largs.whence = uap->whence; error = sys_lseek(td, &largs); return (error); } #ifdef SPX_HACK #include <sys/socket.h> #include <sys/un.h> int spx_open(struct thread *td) { struct socket_args sock; struct sockaddr_un sun; int fd, error; /* obtain a socket. */ DPRINTF(("SPX: open socket\n")); sock.domain = AF_UNIX; sock.type = SOCK_STREAM; sock.protocol = 0; error = sys_socket(td, &sock); if (error) return error; fd = td->td_retval[0]; /* connect the socket to standard X socket */ DPRINTF(("SPX: connect to /tmp/X11-unix/X0\n")); sun.sun_family = AF_UNIX; strcpy(sun.sun_path, "/tmp/.X11-unix/X0"); sun.sun_len = sizeof(struct sockaddr_un) - sizeof(sun.sun_path) + strlen(sun.sun_path) + 1; error = kern_connect(td, fd, (struct sockaddr *)&sun); if (error) { kern_close(td, fd); return error; } td->td_retval[0] = fd; return 0; } #endif /* SPX_HACK */