06-18-2002
Did u try "ioctl"?
I havent tried so far..but feel that u can do it using this system call.
10 More Discussions You Might Find Interesting
1. IP Networking
Hi,
I have about 30 computers for users with subnet mask x.x.x.0, and 25 computers for workers with s.m. x.x.x.128. My server has a s.m. x.x.x.128 so with workers computers I can see my server and all the computers in that s.m., but I can't see the server from the users computers and I need to see... (7 Replies)
Discussion started by: Z0DiaC
7 Replies
2. IP Networking
What is the command to change the mask to 255.255.255.0
The system was set up incorectly and the mask needs to be corrected (1 Reply)
Discussion started by: kkinnon
1 Replies
3. Shell Programming and Scripting
HP-UX 11i v2. #!/bin/sh
Hi all.
I have a flat file like this with lines like this:
|07/19/07|08:26AM|1|CupsCoffee|CupsCo|989898989 |Doe, John Y |THE PLUS CARD - Price| | |Y| | 2.00|
I would like to replace the id number (field 6) with a masked... (3 Replies)
Discussion started by: lyoncc
3 Replies
4. Shell Programming and Scripting
I have an requirement. There is a file which has the below contents
Unix|123|17-01-2010
....
....
....
....
and so an
now each letter has a corresponding predefined mapping letter in order to mask the original data.(for example U = A,
n=b, i=c, x=d, same like number 1=9,2=8,3=7. Also... (8 Replies)
Discussion started by: ksmbabu
8 Replies
5. UNIX for Dummies Questions & Answers
Hi All,
i am executing peoplesoft sqr command from unix prompt which has the unix id/password as parameter along with other parameters. i want to show whole command in log file but want to mask the id/password field. this command i am executing in shell script. Please suggest..
>sqr sqrname... (2 Replies)
Discussion started by: avi.coep
2 Replies
6. Red Hat
Hi Experts,
I'm using samba -3.6.1 on Red Hat Enterprise Linux ES release 4 (Nahant Update 8) ,all seems ok. The issue im facing is as follows.
When ever a user creates a file via windows explorer the permissions assgined to the file are as follows
-rw-rwxr--+ 1 tom group2 0 Mar 9... (1 Reply)
Discussion started by: maverick_here
1 Replies
7. UNIX for Dummies Questions & Answers
Hi Guys,
can someone explain what is mask and effective right mask in setfacl and
getfacl command with example, unable to get it. (3 Replies)
Discussion started by: Jcpratap
3 Replies
8. Shell Programming and Scripting
Hi All,
I have a script, which prompts me for my password input, then it passes that password onto an argument for another script which is then passed onto an expect script which automates my logins to a bunch of servers to execute my commands.
example.
script A - request for password,... (7 Replies)
Discussion started by: aixkidbee
7 Replies
9. Shell Programming and Scripting
Hi Guys, I'm not an expert so seeking advice on awk.
I need to mask numbers in a text field so that they show up as "*" except for the last 4.
Input:
Desired Output:
The part of the Code I am using gives me this Output
num=$(echo $num | awk 'BEGIN{FS=OFS=""}{for (i=1 ; i<=NF-4; i++)... (4 Replies)
Discussion started by: aster007
4 Replies
10. Forum Support Area for Unregistered Users & Account Problems
I was unable to login and so used the "Forgotten Password' process. I was sent a NEWLY-PROVIDED password and a link through which my password could be changed. The NEWLY-PROVIDED password allowed me to login.
Following the provided link I attempted to update my password to one of my own... (1 Reply)
Discussion started by: Rich Marton
1 Replies
LEARN ABOUT NETBSD
clockctl
CLOCKCTL(4) BSD Kernel Interfaces Manual CLOCKCTL(4)
NAME
clockctl -- Clock subsystem user control
SYNOPSIS
pseudo-device clockctl
DESCRIPTION
The clockctl interface brings clock control to non-root users. Any user with write access to /dev/clockctl will be able to perform opera-
tions such as settimeofday(2), clock_settime(2), adjtime(2), or ntp_adjtime(2), which are normally restricted to the super-user. Using the
clockctl pseudo-device, it is possible to run daemons such as ntpd(8) as non-privileged users, thus reducing the security exposure if a com-
promise is found in such a daemon.
The clockctl pseudo-device driver provides an ioctl(2) call for each privileged clock-related system call. The system call stubs in C
library will use the ioctl(2) on /dev/clockctl if the special file is present and accessible, or will revert to the plain super-user-
restricted system call if the special file is not accessible.
The following ioctl(2) calls are defined in <sys/clockctl.h>:
CLOCKCTL_SETTIMEOFDAY
This will run the settimeofday(2) system call. Argument should be a pointer to a struct clockctl_settimeofday:
struct clockctl_settimeofday {
const struct timeval *tv;
const void *tzp;
};
CLOCKCTL_CLOCK_SETTIME
This will run the clock_settime(2) system call. Argument should be a pointer to a struct clockctl_clock_settime:
struct clockctl_clock_settime {
clockid_t clock_id;
struct timespec *tp;
};
CLOCKCTL_ADJTIME
This will run the adjtime(2) system call. Argument should be a pointer to a struct clockctl_adjtime:
struct clockctl_adjtime {
const struct timeval *delta;
struct timeval *olddelta;
};
CLOCKCTL_NTP_ADJTIME
This will run the ntp_adjtime(2) system call. Argument should be a pointer to a struct clockctl_ntp_adjtime:
struct clockctl_ntp_adjtime {
struct timex *tp;
};
SEE ALSO
adjtime(2), clock_settime(2), ioctl(2), settimeofday(2)
HISTORY
clockctl appeared in NetBSD 1.6.
BSD
February 19, 2009 BSD