* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
- * License along with this library; if not, write to the
- * Free Software Foundation, Inc., 59 Temple Place - Suite 330,
- * Boston, MA 02111-1307, USA.
+ * License along with this library. If not, see <http://www.gnu.org/licenses/>.
*/
/*
#include <signal.h>
#include <errno.h>
-#include "gtkmountoperationprivate.h"
-
-#include "gtkalias.h"
+#if defined(__OpenBSD__)
+#include <stdlib.h>
+#include <sys/param.h>
+#include <fcntl.h>
+#include <sys/sysctl.h>
+#endif
+#include "gtkmountoperationprivate.h"
/* ---------------------------------------------------------------------------------------------------- */
/* these functions are based on code from libwnck (LGPLv2) */
while (nitems > 0)
{
int w, h;
- gboolean replace;
-
- replace = FALSE;
if (nitems < 3)
return FALSE; /* no space for w, h */
ret = g_strdup (env + n + key_len + 1);
/* skip invalid UTF-8 */
- if (!g_utf8_validate (ret, -1, (const gchar *) &end))
+ if (!g_utf8_validate (ret, -1, (const gchar **) &end))
*end = '\0';
break;
}
}
/* skip invalid UTF-8 */
- if (!g_utf8_validate (cmdline_contents, -1, (const gchar *) &end))
+ if (!g_utf8_validate (cmdline_contents, -1, (const gchar **) &end))
*end = '\0';
out:
}
/* ---------------------------------------------------------------------------------------------------- */
+
+#elif defined(__OpenBSD__)
+
+/* ---------------------------------------------------------------------------------------------------- */
+
+static GPid
+pid_get_parent (GPid pid)
+{
+ struct kinfo_proc kp;
+ size_t len;
+ GPid ppid;
+
+ int mib[] = { CTL_KERN, KERN_PROC, KERN_PROC_PID, pid,
+ sizeof(struct kinfo_proc), 0 };
+
+ if (sysctl(mib, G_N_ELEMENTS (mib), NULL, &len, NULL, 0) == -1)
+ return (-1);
+ mib[5] = (len / sizeof(struct kinfo_proc));
+
+ if (sysctl(mib, G_N_ELEMENTS (mib), &kp, &len, NULL, 0) < 0)
+ return -1;
+
+ ppid = kp.p_ppid;
+
+ return ppid;
+}
+
+static gchar *
+pid_get_env (GPid pid, const gchar *key)
+{
+ size_t len = PATH_MAX;
+ char **strs = NULL;
+ char *ret;
+ char *end;
+ int key_len;
+ int i;
+
+ int mib[] = { CTL_KERN, KERN_PROC_ARGS, pid, KERN_PROC_ENV };
+
+ strs = (char **)realloc(strs, len);
+
+ key_len = strlen (key);
+
+ ret = NULL;
+ if (sysctl(mib, G_N_ELEMENTS (mib), strs, &len, NULL, 0) != -1)
+ {
+ for (i = 0; strs[i] != NULL; i++)
+ {
+ if (g_str_has_prefix (strs[i], key) && (*(strs[i] + key_len) == '='))
+ {
+ ret = g_strdup (strs[i] + key_len + 1);
+
+ /* skip invalid UTF-8 */
+ if (!g_utf8_validate (ret, -1, (const gchar **) &end))
+ *end = '\0';
+ break;
+ }
+ }
+ }
+
+ g_free (strs);
+ return ret;
+}
+
+static gchar *
+pid_get_command_line (GPid pid)
+{
+ size_t len = PATH_MAX;
+ char **strs = NULL;
+ char *ret = NULL;
+ char *end;
+
+ int mib[] = { CTL_KERN, KERN_PROC_ARGS, pid, KERN_PROC_ARGV };
+
+ strs = (char **)realloc(strs, len);
+
+ if (sysctl(mib, G_N_ELEMENTS (mib), strs, &len, NULL, 0) == -1) {
+ g_free (strs);
+ return ret;
+ }
+
+ ret = g_strjoinv (" ", strs);
+ /* skip invalid UTF-8 */
+ if (!g_utf8_validate (ret, -1, (const gchar **) &end))
+ *end = '\0';
+
+ g_free (strs);
+ return ret;
+}
+
#else
/* TODO: please implement for your OS - must return valid UTF-8 */
if (kill ((pid_t) pid, SIGTERM) != 0)
{
+ int errsv = errno;
+
/* TODO: On EPERM, we could use a setuid helper using polkit (very easy to implement
* via pkexec(1)) to allow the user to e.g. authenticate to gain the authorization
* to kill the process. But that's not how things currently work.
ret = FALSE;
g_set_error (error,
G_IO_ERROR,
- g_io_error_from_errno (errno),
- _("Cannot end process with pid %d: %s"),
+ g_io_error_from_errno (errsv),
+ _("Cannot end process with PID %d: %s"),
pid,
- strerror (errno));
+ g_strerror (errsv));
}
return ret;