2000-02-17 20:38:33 +01:00
|
|
|
/* syscalls.cc: syscalls
|
|
|
|
|
2001-01-17 15:57:09 +01:00
|
|
|
Copyright 1996, 1997, 1998, 1999, 2000, 2001 Red Hat, Inc.
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
This file is part of Cygwin.
|
|
|
|
|
|
|
|
This software is a copyrighted work licensed under the terms of the
|
|
|
|
Cygwin license. Please consult the file "CYGWIN_LICENSE" for
|
|
|
|
details. */
|
|
|
|
|
2000-08-02 18:28:18 +02:00
|
|
|
#include "winsup.h"
|
2000-02-17 20:38:33 +01:00
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/vfs.h> /* needed for statfs */
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <pwd.h>
|
|
|
|
#include <grp.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <process.h>
|
|
|
|
#include <utmp.h>
|
|
|
|
#include <sys/uio.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <limits.h>
|
2000-07-27 19:30:51 +02:00
|
|
|
#include <winnls.h>
|
2001-06-09 23:25:55 +02:00
|
|
|
#include <wininet.h>
|
2000-02-17 20:38:33 +01:00
|
|
|
#include <lmcons.h> /* for UNLEN */
|
2000-09-08 04:56:55 +02:00
|
|
|
#include <cygwin/version.h>
|
|
|
|
#include <sys/cygwin.h>
|
2000-08-22 07:10:20 +02:00
|
|
|
#include "cygerrno.h"
|
2001-03-05 07:28:25 +01:00
|
|
|
#include "perprocess.h"
|
2001-07-26 21:22:24 +02:00
|
|
|
#include "security.h"
|
2000-08-22 07:10:20 +02:00
|
|
|
#include "fhandler.h"
|
|
|
|
#include "path.h"
|
2000-08-12 07:35:42 +02:00
|
|
|
#include "dtable.h"
|
2000-08-22 07:10:20 +02:00
|
|
|
#include "sync.h"
|
|
|
|
#include "sigproc.h"
|
2000-08-12 07:35:42 +02:00
|
|
|
#include "pinfo.h"
|
2000-09-03 06:16:35 +02:00
|
|
|
#include <unistd.h>
|
2000-09-07 18:23:51 +02:00
|
|
|
#include "shared_info.h"
|
2000-11-14 06:53:32 +01:00
|
|
|
#include "cygheap.h"
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2001-06-03 04:31:16 +02:00
|
|
|
extern int normalize_posix_path (const char *, char *);
|
|
|
|
|
2001-01-28 06:51:15 +01:00
|
|
|
SYSTEM_INFO system_info;
|
|
|
|
|
2000-02-17 20:38:33 +01:00
|
|
|
/* Close all files and process any queued deletions.
|
|
|
|
Lots of unix style applications will open a tmp file, unlink it,
|
|
|
|
but never call close. This function is called by _exit to
|
|
|
|
ensure we don't leave any such files lying around. */
|
|
|
|
|
|
|
|
void __stdcall
|
|
|
|
close_all_files (void)
|
|
|
|
{
|
2001-04-18 23:10:15 +02:00
|
|
|
SetResourceLock (LOCK_FD_LIST, WRITE_LOCK | READ_LOCK, "close_all_files");
|
2000-10-15 03:37:07 +02:00
|
|
|
|
2000-11-03 05:27:03 +01:00
|
|
|
fhandler_base *fh;
|
2001-04-18 23:10:15 +02:00
|
|
|
for (int i = 0; i < (int) cygheap->fdtab.size; i++)
|
|
|
|
if ((fh = cygheap->fdtab[i]) != NULL)
|
2000-10-15 03:37:07 +02:00
|
|
|
{
|
2000-11-03 05:27:03 +01:00
|
|
|
fh->close ();
|
2001-04-18 23:10:15 +02:00
|
|
|
cygheap->fdtab.release (i);
|
2000-10-15 03:37:07 +02:00
|
|
|
}
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2001-04-18 23:10:15 +02:00
|
|
|
ReleaseResourceLock (LOCK_FD_LIST, WRITE_LOCK | READ_LOCK, "close_all_files");
|
2000-02-17 20:38:33 +01:00
|
|
|
cygwin_shared->delqueue.process_queue ();
|
|
|
|
}
|
|
|
|
|
2001-08-25 19:27:31 +02:00
|
|
|
static BOOL __stdcall
|
|
|
|
check_ttys_fds (void)
|
|
|
|
{
|
|
|
|
int res = FALSE;
|
|
|
|
SetResourceLock (LOCK_FD_LIST, WRITE_LOCK | READ_LOCK, "close_all_files");
|
|
|
|
fhandler_base *fh;
|
|
|
|
for (int i = 0; i < (int) cygheap->fdtab.size; i++)
|
|
|
|
if ((fh = cygheap->fdtab[i]) != NULL && fh->get_device() == FH_TTYS)
|
|
|
|
{
|
|
|
|
res = TRUE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
ReleaseResourceLock (LOCK_FD_LIST, WRITE_LOCK | READ_LOCK, "close_all_files");
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
_unlink (const char *ourname)
|
|
|
|
{
|
|
|
|
int res = -1;
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2001-02-22 15:51:16 +01:00
|
|
|
path_conv win32_name (ourname, PC_SYM_NOFOLLOW | PC_FULL);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
if (win32_name.error)
|
|
|
|
{
|
|
|
|
set_errno (win32_name.error);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
syscall_printf ("_unlink (%s)", win32_name.get_win32 ());
|
|
|
|
|
|
|
|
DWORD atts;
|
|
|
|
atts = win32_name.file_attributes ();
|
2001-07-18 13:00:05 +02:00
|
|
|
if (atts == 0xffffffff)
|
|
|
|
{
|
|
|
|
syscall_printf ("unlinking a nonexistant file");
|
|
|
|
set_errno (ENOENT);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (atts & FILE_ATTRIBUTE_DIRECTORY)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
syscall_printf ("unlinking a directory");
|
|
|
|
set_errno (EPERM);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Windows won't check the directory mode, so we do that ourselves. */
|
2000-03-18 07:26:14 +01:00
|
|
|
if (!writable_directory (win32_name))
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
syscall_printf ("non-writable directory");
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2001-02-21 22:49:37 +01:00
|
|
|
/* Check for shortcut as symlink condition. */
|
2001-07-18 13:00:05 +02:00
|
|
|
if (atts & FILE_ATTRIBUTE_READONLY)
|
2001-02-21 22:49:37 +01:00
|
|
|
{
|
2001-06-18 23:18:59 +02:00
|
|
|
int len = strlen (win32_name);
|
|
|
|
if (len > 4 && strcasematch (win32_name + len - 4, ".lnk"))
|
|
|
|
SetFileAttributes (win32_name, atts & ~FILE_ATTRIBUTE_READONLY);
|
2001-02-21 22:49:37 +01:00
|
|
|
}
|
|
|
|
|
2001-06-18 23:18:59 +02:00
|
|
|
DWORD lasterr;
|
|
|
|
lasterr = 0;
|
2000-03-18 07:26:14 +01:00
|
|
|
for (int i = 0; i < 2; i++)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
2000-03-18 07:26:14 +01:00
|
|
|
if (DeleteFile (win32_name))
|
|
|
|
{
|
|
|
|
syscall_printf ("DeleteFile succeeded");
|
2001-06-18 23:18:59 +02:00
|
|
|
goto ok;
|
2000-03-18 07:26:14 +01:00
|
|
|
}
|
|
|
|
|
2000-05-04 21:46:32 +02:00
|
|
|
lasterr = GetLastError ();
|
2001-06-18 23:18:59 +02:00
|
|
|
if (i || lasterr != ERROR_ACCESS_DENIED || win32_name.issymlink ())
|
|
|
|
break; /* Couldn't delete it. */
|
2000-05-04 21:46:32 +02:00
|
|
|
|
2001-06-18 23:18:59 +02:00
|
|
|
/* if access denied, chmod to be writable, in case it is not,
|
|
|
|
and try again */
|
|
|
|
(void) chmod (win32_name, 0777);
|
|
|
|
}
|
2000-03-18 07:26:14 +01:00
|
|
|
|
2001-07-13 19:22:15 +02:00
|
|
|
/* Windows 9x seems to report ERROR_ACCESS_DENIED rather than sharing
|
|
|
|
violation. So, set lasterr to ERROR_SHARING_VIOLATION in this case
|
|
|
|
to simplify tests. */
|
2001-08-04 23:10:52 +02:00
|
|
|
if (!iswinnt && lasterr == ERROR_ACCESS_DENIED
|
2001-07-13 19:22:15 +02:00
|
|
|
&& !win32_name.isremote ())
|
|
|
|
lasterr = ERROR_SHARING_VIOLATION;
|
|
|
|
|
2001-06-18 23:18:59 +02:00
|
|
|
/* Tried to delete file by normal DeleteFile and by resetting protection
|
|
|
|
and then deleting. That didn't work.
|
2000-05-04 21:46:32 +02:00
|
|
|
|
2001-06-18 23:18:59 +02:00
|
|
|
There are two possible reasons for this: 1) The file may be opened and
|
|
|
|
Windows is not allowing it to be deleted, or 2) We may not have permissions
|
|
|
|
to delete the file.
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2001-06-18 23:18:59 +02:00
|
|
|
So, first assume that it may be 1) and try to remove the file using the
|
|
|
|
Windows FILE_FLAG_DELETE_ON_CLOSE semantics. This seems to work only
|
|
|
|
spottily on Windows 9x/Me but it does seem to work reliably on NT as
|
|
|
|
long as the file doesn't exist on a remote drive. */
|
2000-05-04 21:46:32 +02:00
|
|
|
|
2001-06-18 23:18:59 +02:00
|
|
|
bool delete_on_close_ok;
|
2000-03-18 07:26:14 +01:00
|
|
|
|
2001-08-04 23:10:52 +02:00
|
|
|
delete_on_close_ok = !win32_name.isremote () && iswinnt;
|
2000-05-04 21:46:32 +02:00
|
|
|
|
2001-06-18 23:18:59 +02:00
|
|
|
/* Attempt to use "delete on close" semantics to handle removing
|
|
|
|
a file which may be open. */
|
|
|
|
HANDLE h;
|
|
|
|
h = CreateFile (win32_name, GENERIC_READ, FILE_SHARE_READ, &sec_none_nih,
|
|
|
|
OPEN_EXISTING, FILE_FLAG_DELETE_ON_CLOSE, 0);
|
|
|
|
if (h == INVALID_HANDLE_VALUE)
|
|
|
|
{
|
|
|
|
if (GetLastError () == ERROR_FILE_NOT_FOUND)
|
|
|
|
goto ok;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
CloseHandle (h);
|
|
|
|
syscall_printf ("CreateFile/CloseHandle succeeded");
|
|
|
|
/* Everything is fine if the file has disappeared or if we know that the
|
|
|
|
FILE_FLAG_DELETE_ON_CLOSE will eventually work. */
|
|
|
|
if (GetFileAttributes (win32_name) == (DWORD) -1 || delete_on_close_ok)
|
|
|
|
goto ok; /* The file is either gone already or will eventually be
|
|
|
|
deleted by the OS. */
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
2001-07-13 19:22:15 +02:00
|
|
|
/* FILE_FLAGS_DELETE_ON_CLOSE was a bust. If this is a sharing
|
|
|
|
violation, then queue the file for deletion when the process
|
|
|
|
exits. Otherwise, punt. */
|
|
|
|
if (lasterr != ERROR_SHARING_VIOLATION)
|
2001-06-18 23:18:59 +02:00
|
|
|
goto err;
|
|
|
|
|
|
|
|
syscall_printf ("couldn't delete file, err %d", lasterr);
|
|
|
|
|
|
|
|
/* Add file to the "to be deleted" queue. */
|
|
|
|
cygwin_shared->delqueue.queue_file (win32_name);
|
|
|
|
|
|
|
|
/* Success condition. */
|
|
|
|
ok:
|
|
|
|
res = 0;
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
/* Error condition. */
|
|
|
|
err:
|
|
|
|
__seterrno ();
|
|
|
|
res = -1;
|
|
|
|
|
|
|
|
done:
|
2000-02-17 20:38:33 +01:00
|
|
|
syscall_printf ("%d = unlink (%s)", res, ourname);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-12-19 21:43:41 +01:00
|
|
|
extern "C" int
|
|
|
|
remove (const char *ourname)
|
|
|
|
{
|
|
|
|
path_conv win32_name (ourname, PC_SYM_NOFOLLOW | PC_FULL);
|
|
|
|
|
|
|
|
if (win32_name.error)
|
|
|
|
{
|
|
|
|
set_errno (win32_name.error);
|
|
|
|
syscall_printf ("-1 = remove (%s)", ourname);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
DWORD atts = win32_name.file_attributes ();
|
|
|
|
if (atts != 0xffffffff && atts & FILE_ATTRIBUTE_DIRECTORY)
|
|
|
|
return rmdir (ourname);
|
|
|
|
|
|
|
|
return _unlink (ourname);
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" pid_t
|
2000-02-17 20:38:33 +01:00
|
|
|
_getpid ()
|
|
|
|
{
|
|
|
|
return myself->pid;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* getppid: POSIX 4.1.1.1 */
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" pid_t
|
2000-02-17 20:38:33 +01:00
|
|
|
getppid ()
|
|
|
|
{
|
|
|
|
return myself->ppid;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* setsid: POSIX 4.3.2.1 */
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" pid_t
|
2000-02-17 20:38:33 +01:00
|
|
|
setsid (void)
|
|
|
|
{
|
|
|
|
if (myself->pgid != _getpid ())
|
|
|
|
{
|
2001-08-25 19:27:31 +02:00
|
|
|
if (myself->ctty == TTY_CONSOLE &&
|
|
|
|
!cygheap->fdtab.has_console_fds () &&
|
|
|
|
!check_ttys_fds ())
|
2001-07-26 02:10:52 +02:00
|
|
|
FreeConsole ();
|
2000-02-17 20:38:33 +01:00
|
|
|
myself->ctty = -1;
|
|
|
|
myself->sid = _getpid ();
|
|
|
|
myself->pgid = _getpid ();
|
|
|
|
syscall_printf ("sid %d, pgid %d, ctty %d", myself->sid, myself->pgid, myself->ctty);
|
|
|
|
return myself->sid;
|
|
|
|
}
|
|
|
|
set_errno (EPERM);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-03-07 21:52:33 +01:00
|
|
|
extern "C" ssize_t
|
2000-09-25 18:36:12 +02:00
|
|
|
_read (int fd, void *ptr, size_t len)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
2001-04-01 02:06:17 +02:00
|
|
|
int res;
|
|
|
|
fhandler_base *fh;
|
2000-10-15 03:37:07 +02:00
|
|
|
extern int sigcatchers;
|
2001-01-12 06:38:25 +01:00
|
|
|
|
2001-04-01 02:06:17 +02:00
|
|
|
while (1)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
2001-04-01 02:06:17 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2001-04-18 23:10:15 +02:00
|
|
|
if (cygheap->fdtab.not_open (fd))
|
2001-04-01 02:06:17 +02:00
|
|
|
{
|
|
|
|
set_errno (EBADF);
|
|
|
|
return -1;
|
|
|
|
}
|
2000-09-25 18:36:12 +02:00
|
|
|
|
2001-04-01 02:06:17 +02:00
|
|
|
// set_sig_errno (0);
|
2001-04-18 23:10:15 +02:00
|
|
|
fh = cygheap->fdtab[fd];
|
2001-08-15 09:49:15 +02:00
|
|
|
DWORD wait = fh->is_nonblocking () ? 0 : INFINITE;
|
2000-09-25 18:36:12 +02:00
|
|
|
|
2001-04-01 02:06:17 +02:00
|
|
|
/* Could block, so let user know we at least got here. */
|
|
|
|
syscall_printf ("read (%d, %p, %d) %sblocking, sigcatchers %d", fd, ptr, len, wait ? "" : "non", sigcatchers);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2001-04-01 02:06:17 +02:00
|
|
|
if (wait && (!sigcatchers || !fh->is_slow () || fh->get_r_no_interrupt ()))
|
|
|
|
debug_printf ("non-interruptible read\n");
|
|
|
|
else if (!fh->ready_for_read (fd, wait, 0))
|
|
|
|
{
|
|
|
|
if (!wait)
|
|
|
|
set_sig_errno (EAGAIN); /* Don't really need 'set_sig_errno' here, but... */
|
|
|
|
else
|
|
|
|
set_sig_errno (EINTR);
|
|
|
|
res = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check to see if this is a background read from a "tty",
|
|
|
|
sending a SIGTTIN, if appropriate */
|
|
|
|
res = fh->bg_check (SIGTTIN);
|
|
|
|
if (res > bg_eof)
|
|
|
|
{
|
|
|
|
myself->process_state |= PID_TTYIN;
|
|
|
|
res = fh->read (ptr, len);
|
|
|
|
myself->process_state &= ~PID_TTYIN;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
2001-04-02 02:18:29 +02:00
|
|
|
if (res >= 0 || get_errno () != EINTR || !thisframe.call_signal_handler ())
|
2001-04-01 02:06:17 +02:00
|
|
|
break;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
2001-01-12 06:38:25 +01:00
|
|
|
syscall_printf ("%d = read (%d<%s>, %p, %d), bin %d, errno %d", res, fd, fh->get_name (),
|
|
|
|
ptr, len, fh->get_r_binary (), get_errno ());
|
2000-02-17 20:38:33 +01:00
|
|
|
MALLOC_CHECK;
|
2000-09-25 18:36:12 +02:00
|
|
|
return res;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
2001-03-07 21:52:33 +01:00
|
|
|
extern "C" ssize_t
|
2000-02-17 20:38:33 +01:00
|
|
|
_write (int fd, const void *ptr, size_t len)
|
|
|
|
{
|
|
|
|
int res = -1;
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2001-04-18 23:10:15 +02:00
|
|
|
if (cygheap->fdtab.not_open (fd))
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
set_errno (EBADF);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Could block, so let user know we at least got here. */
|
|
|
|
if (fd == 1 || fd == 2)
|
|
|
|
paranoid_printf ("write (%d, %p, %d)", fd, ptr, len);
|
|
|
|
else
|
|
|
|
syscall_printf ("write (%d, %p, %d)", fd, ptr, len);
|
|
|
|
|
|
|
|
fhandler_base *fh;
|
2001-04-18 23:10:15 +02:00
|
|
|
fh = cygheap->fdtab[fd];
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2000-02-21 06:20:38 +01:00
|
|
|
res = fh->bg_check (SIGTTOU);
|
2001-09-03 04:13:05 +02:00
|
|
|
|
2001-01-17 15:57:09 +01:00
|
|
|
if (res > bg_eof)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
myself->process_state |= PID_TTYOU;
|
|
|
|
res = fh->write (ptr, len);
|
|
|
|
myself->process_state &= ~PID_TTYOU;
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
if (fd == 1 || fd == 2)
|
|
|
|
paranoid_printf ("%d = write (%d, %p, %d)", res, fd, ptr, len);
|
|
|
|
else
|
|
|
|
syscall_printf ("%d = write (%d, %p, %d)", res, fd, ptr, len);
|
|
|
|
|
|
|
|
MALLOC_CHECK;
|
|
|
|
return (ssize_t)res;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* FIXME - should really move this interface into fhandler, and implement
|
|
|
|
* write in terms of it. There are devices in Win32 that could do this with
|
|
|
|
* overlapped I/O much more efficiently - we should eventually use
|
|
|
|
* these.
|
|
|
|
*/
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" ssize_t
|
2000-02-17 20:38:33 +01:00
|
|
|
writev (int fd, const struct iovec *iov, int iovcnt)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
ssize_t len, total;
|
|
|
|
char *base;
|
|
|
|
|
|
|
|
if (iovcnt < 1 || iovcnt > IOV_MAX)
|
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Ensure that the sum of the iov_len values is less than
|
|
|
|
SSIZE_MAX (per spec), if so, we must fail with no output (per spec).
|
|
|
|
*/
|
|
|
|
total = 0;
|
|
|
|
for (i = 0; i < iovcnt; ++i)
|
|
|
|
{
|
|
|
|
total += iov[i].iov_len;
|
|
|
|
if (total > SSIZE_MAX)
|
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Now write the data */
|
|
|
|
for (i = 0, total = 0; i < iovcnt; i++, iov++)
|
|
|
|
{
|
|
|
|
len = iov->iov_len;
|
|
|
|
base = iov->iov_base;
|
|
|
|
while (len > 0)
|
|
|
|
{
|
|
|
|
register int nbytes;
|
|
|
|
nbytes = write (fd, base, len);
|
|
|
|
if (nbytes < 0 && total == 0)
|
|
|
|
return -1;
|
|
|
|
if (nbytes <= 0)
|
|
|
|
return total;
|
|
|
|
len -= nbytes;
|
|
|
|
total += nbytes;
|
|
|
|
base += nbytes;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return total;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* FIXME - should really move this interface into fhandler, and implement
|
|
|
|
* read in terms of it. There are devices in Win32 that could do this with
|
|
|
|
* overlapped I/O much more efficiently - we should eventually use
|
|
|
|
* these.
|
|
|
|
*/
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" ssize_t
|
2000-02-17 20:38:33 +01:00
|
|
|
readv (int fd, const struct iovec *iov, int iovcnt)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
ssize_t len, total;
|
|
|
|
char *base;
|
|
|
|
|
|
|
|
for (i = 0, total = 0; i < iovcnt; i++, iov++)
|
|
|
|
{
|
|
|
|
len = iov->iov_len;
|
|
|
|
base = iov->iov_base;
|
|
|
|
while (len > 0)
|
|
|
|
{
|
|
|
|
register int nbytes;
|
|
|
|
nbytes = read (fd, base, len);
|
|
|
|
if (nbytes < 0 && total == 0)
|
|
|
|
return -1;
|
|
|
|
if (nbytes <= 0)
|
|
|
|
return total;
|
|
|
|
len -= nbytes;
|
|
|
|
total += nbytes;
|
|
|
|
base += nbytes;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return total;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* _open */
|
|
|
|
/* newlib's fcntl.h defines _open as taking variable args so we must
|
|
|
|
correspond. The third arg if it exists is: mode_t mode. */
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
_open (const char *unix_path, int flags, ...)
|
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
int res = -1;
|
|
|
|
va_list ap;
|
|
|
|
mode_t mode = 0;
|
|
|
|
fhandler_base *fh;
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
syscall_printf ("open (%s, %p)", unix_path, flags);
|
2001-06-28 04:19:57 +02:00
|
|
|
if (!check_null_empty_str_errno (unix_path))
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
2001-03-03 04:56:34 +01:00
|
|
|
SetResourceLock (LOCK_FD_LIST, WRITE_LOCK|READ_LOCK, " open ");
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
/* check for optional mode argument */
|
|
|
|
va_start (ap, flags);
|
|
|
|
mode = va_arg (ap, mode_t);
|
|
|
|
va_end (ap);
|
|
|
|
|
2001-04-18 23:10:15 +02:00
|
|
|
fd = cygheap->fdtab.find_unused_handle ();
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
if (fd < 0)
|
|
|
|
set_errno (ENMFILE);
|
2001-04-18 23:10:15 +02:00
|
|
|
else if ((fh = cygheap->fdtab.build_fhandler (fd, unix_path, NULL)) == NULL)
|
2000-02-17 20:38:33 +01:00
|
|
|
res = -1; // errno already set
|
2001-08-07 18:14:59 +02:00
|
|
|
else if (!fh->open (unix_path, flags, (mode & 07777) & ~cygheap->umask))
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
2001-04-18 23:10:15 +02:00
|
|
|
cygheap->fdtab.release (fd);
|
2000-02-17 20:38:33 +01:00
|
|
|
res = -1;
|
|
|
|
}
|
2001-03-18 22:11:25 +01:00
|
|
|
else if ((res = fd) <= 2)
|
2000-02-17 20:38:33 +01:00
|
|
|
set_std_handle (res);
|
2001-03-03 04:56:34 +01:00
|
|
|
ReleaseResourceLock (LOCK_FD_LIST,WRITE_LOCK|READ_LOCK," open");
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
syscall_printf ("%d = open (%s, %p)", res, unix_path, flags);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" off_t
|
2000-02-17 20:38:33 +01:00
|
|
|
_lseek (int fd, off_t pos, int dir)
|
|
|
|
{
|
|
|
|
off_t res;
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2001-03-03 04:56:34 +01:00
|
|
|
if (dir != SEEK_SET && dir != SEEK_CUR && dir != SEEK_END)
|
2001-02-16 19:49:20 +01:00
|
|
|
{
|
2001-03-03 04:56:34 +01:00
|
|
|
set_errno (EINVAL);
|
2001-02-16 19:49:20 +01:00
|
|
|
res = -1;
|
|
|
|
}
|
2001-04-18 23:10:15 +02:00
|
|
|
else if (cygheap->fdtab.not_open (fd))
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
set_errno (EBADF);
|
|
|
|
res = -1;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2001-04-18 23:10:15 +02:00
|
|
|
res = cygheap->fdtab[fd]->lseek (pos, dir);
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
syscall_printf ("%d = lseek (%d, %d, %d)", res, fd, pos, dir);
|
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
_close (int fd)
|
|
|
|
{
|
|
|
|
int res;
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
syscall_printf ("close (%d)", fd);
|
|
|
|
|
|
|
|
MALLOC_CHECK;
|
2001-04-18 23:10:15 +02:00
|
|
|
if (cygheap->fdtab.not_open (fd))
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
debug_printf ("handle %d not open", fd);
|
|
|
|
set_errno (EBADF);
|
|
|
|
res = -1;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2001-03-03 04:56:34 +01:00
|
|
|
SetResourceLock (LOCK_FD_LIST,WRITE_LOCK|READ_LOCK," close");
|
2001-04-18 23:10:15 +02:00
|
|
|
res = cygheap->fdtab[fd]->close ();
|
|
|
|
cygheap->fdtab.release (fd);
|
2001-03-03 04:56:34 +01:00
|
|
|
ReleaseResourceLock (LOCK_FD_LIST,WRITE_LOCK|READ_LOCK," close");
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
syscall_printf ("%d = close (%d)", res, fd);
|
|
|
|
MALLOC_CHECK;
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
isatty (int fd)
|
|
|
|
{
|
|
|
|
int res;
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2001-04-18 23:10:15 +02:00
|
|
|
if (cygheap->fdtab.not_open (fd))
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
syscall_printf ("0 = isatty (%d)", fd);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2001-04-18 23:10:15 +02:00
|
|
|
res = cygheap->fdtab[fd]->is_tty ();
|
2000-02-17 20:38:33 +01:00
|
|
|
syscall_printf ("%d = isatty (%d)", res, fd);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Under NT, try to make a hard link using backup API. If that
|
|
|
|
fails or we are Win 95, just copy the file.
|
|
|
|
FIXME: We should actually be checking partition type, not OS.
|
|
|
|
Under NTFS, we should support hard links. On FAT partitions,
|
|
|
|
we should just copy the file.
|
|
|
|
*/
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
_link (const char *a, const char *b)
|
|
|
|
{
|
|
|
|
int res = -1;
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-07-26 03:44:16 +02:00
|
|
|
path_conv real_a (a, PC_SYM_NOFOLLOW | PC_FULL);
|
|
|
|
path_conv real_b (b, PC_SYM_NOFOLLOW | PC_FULL);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
if (real_a.error)
|
|
|
|
{
|
|
|
|
set_errno (real_a.error);
|
2000-04-20 15:52:41 +02:00
|
|
|
goto done;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
if (real_b.error)
|
|
|
|
{
|
2001-04-12 23:21:37 +02:00
|
|
|
set_errno (real_b.case_clash ? ECASECLASH : real_b.error);
|
2000-04-20 15:52:41 +02:00
|
|
|
goto done;
|
|
|
|
}
|
2001-01-29 01:46:25 +01:00
|
|
|
|
|
|
|
if (real_b.file_attributes () != (DWORD)-1)
|
|
|
|
{
|
|
|
|
syscall_printf ("file '%s' exists?", (char *)real_b);
|
|
|
|
set_errno (EEXIST);
|
|
|
|
goto done;
|
|
|
|
}
|
2000-04-20 15:52:41 +02:00
|
|
|
if (real_b.get_win32 ()[strlen (real_b.get_win32 ()) - 1] == '.')
|
|
|
|
{
|
|
|
|
syscall_printf ("trailing dot, bailing out");
|
|
|
|
set_errno (EINVAL);
|
|
|
|
goto done;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Try to make hard link first on Windows NT */
|
2001-08-04 23:10:52 +02:00
|
|
|
if (iswinnt)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
HANDLE hFileSource;
|
|
|
|
|
|
|
|
WIN32_STREAM_ID StreamId;
|
|
|
|
DWORD dwBytesWritten;
|
|
|
|
LPVOID lpContext;
|
|
|
|
DWORD cbPathLen;
|
|
|
|
DWORD StreamSize;
|
|
|
|
WCHAR wbuf[MAX_PATH];
|
|
|
|
|
|
|
|
BOOL bSuccess;
|
|
|
|
|
|
|
|
hFileSource = CreateFile (
|
|
|
|
real_a.get_win32 (),
|
|
|
|
FILE_WRITE_ATTRIBUTES,
|
|
|
|
FILE_SHARE_READ | FILE_SHARE_WRITE /*| FILE_SHARE_DELETE*/,
|
|
|
|
&sec_none_nih, // sa
|
|
|
|
OPEN_EXISTING,
|
|
|
|
0,
|
|
|
|
NULL
|
|
|
|
);
|
|
|
|
|
|
|
|
if (hFileSource == INVALID_HANDLE_VALUE)
|
|
|
|
{
|
|
|
|
syscall_printf ("cannot open source, %E");
|
|
|
|
goto docopy;
|
|
|
|
}
|
|
|
|
|
|
|
|
lpContext = NULL;
|
2000-07-26 03:44:16 +02:00
|
|
|
cbPathLen = sys_mbstowcs (wbuf, real_b.get_win32 (), MAX_PATH) * sizeof (WCHAR);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
StreamId.dwStreamId = BACKUP_LINK;
|
|
|
|
StreamId.dwStreamAttributes = 0;
|
|
|
|
StreamId.dwStreamNameSize = 0;
|
|
|
|
StreamId.Size.HighPart = 0;
|
|
|
|
StreamId.Size.LowPart = cbPathLen;
|
|
|
|
|
|
|
|
StreamSize = sizeof (WIN32_STREAM_ID) - sizeof (WCHAR**) +
|
|
|
|
StreamId.dwStreamNameSize;
|
|
|
|
|
|
|
|
/* Write the WIN32_STREAM_ID */
|
|
|
|
bSuccess = BackupWrite (
|
|
|
|
hFileSource,
|
2001-03-03 04:56:34 +01:00
|
|
|
(LPBYTE) &StreamId, // buffer to write
|
2000-02-17 20:38:33 +01:00
|
|
|
StreamSize, // number of bytes to write
|
|
|
|
&dwBytesWritten,
|
|
|
|
FALSE, // don't abort yet
|
|
|
|
FALSE, // don't process security
|
|
|
|
&lpContext);
|
|
|
|
|
|
|
|
if (bSuccess)
|
|
|
|
{
|
|
|
|
/* write the buffer containing the path */
|
|
|
|
/* FIXME: BackupWrite sometimes traps if linkname is invalid.
|
|
|
|
Need to handle. */
|
|
|
|
bSuccess = BackupWrite (
|
|
|
|
hFileSource,
|
2001-03-03 04:56:34 +01:00
|
|
|
(LPBYTE) wbuf, // buffer to write
|
2000-02-17 20:38:33 +01:00
|
|
|
cbPathLen, // number of bytes to write
|
|
|
|
&dwBytesWritten,
|
|
|
|
FALSE, // don't abort yet
|
|
|
|
FALSE, // don't process security
|
|
|
|
&lpContext
|
|
|
|
);
|
|
|
|
|
|
|
|
if (!bSuccess)
|
|
|
|
syscall_printf ("cannot write linkname, %E");
|
|
|
|
|
|
|
|
/* Free context */
|
|
|
|
BackupWrite (
|
|
|
|
hFileSource,
|
|
|
|
NULL, // buffer to write
|
|
|
|
0, // number of bytes to write
|
|
|
|
&dwBytesWritten,
|
|
|
|
TRUE, // abort
|
|
|
|
FALSE, // don't process security
|
2000-09-04 19:52:42 +02:00
|
|
|
&lpContext);
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
syscall_printf ("cannot write streamId, %E");
|
|
|
|
|
|
|
|
CloseHandle (hFileSource);
|
|
|
|
|
|
|
|
if (!bSuccess)
|
|
|
|
goto docopy;
|
|
|
|
|
|
|
|
res = 0;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
docopy:
|
|
|
|
/* do this with a copy */
|
|
|
|
if (CopyFileA (real_a.get_win32 (), real_b.get_win32 (), 1))
|
|
|
|
res = 0;
|
|
|
|
else
|
|
|
|
__seterrno ();
|
|
|
|
|
|
|
|
done:
|
|
|
|
syscall_printf ("%d = link (%s, %s)", res, a, b);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* chown: POSIX 5.6.5.1 */
|
|
|
|
/*
|
2001-03-03 04:56:34 +01:00
|
|
|
* chown () is only implemented for Windows NT. Under other operating
|
2000-02-17 20:38:33 +01:00
|
|
|
* systems, it is only a stub that always returns zero.
|
|
|
|
*/
|
2000-04-02 22:42:42 +02:00
|
|
|
static int
|
2000-07-17 21:18:21 +02:00
|
|
|
chown_worker (const char *name, unsigned fmode, uid_t uid, gid_t gid)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
int res;
|
2000-04-02 22:42:42 +02:00
|
|
|
uid_t old_uid;
|
|
|
|
gid_t old_gid;
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2001-06-28 04:19:57 +02:00
|
|
|
if (check_null_empty_str_errno (name))
|
2000-07-17 21:18:21 +02:00
|
|
|
return -1;
|
|
|
|
|
2001-08-04 23:10:52 +02:00
|
|
|
if (!iswinnt) // real chown only works on NT
|
2000-02-17 20:38:33 +01:00
|
|
|
res = 0; // return zero (and do nothing) under Windows 9x
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* we need Win32 path names because of usage of Win32 API functions */
|
2000-07-17 21:18:21 +02:00
|
|
|
path_conv win32_path (PC_NONULLEMPTY, name, fmode);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
if (win32_path.error)
|
|
|
|
{
|
|
|
|
set_errno (win32_path.error);
|
|
|
|
res = -1;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* FIXME: This makes chown on a device succeed always. Someday we'll want
|
|
|
|
to actually allow chown to work properly on devices. */
|
|
|
|
if (win32_path.is_device ())
|
|
|
|
{
|
|
|
|
res = 0;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
DWORD attrib = 0;
|
|
|
|
if (win32_path.file_attributes () & FILE_ATTRIBUTE_DIRECTORY)
|
2000-07-26 19:48:49 +02:00
|
|
|
attrib |= S_IFDIR;
|
2000-04-02 22:42:42 +02:00
|
|
|
res = get_file_attribute (win32_path.has_acls (),
|
2000-07-26 19:48:49 +02:00
|
|
|
win32_path.get_win32 (),
|
2001-05-31 07:25:46 +02:00
|
|
|
(int *) &attrib,
|
2000-07-26 19:48:49 +02:00
|
|
|
&old_uid,
|
|
|
|
&old_gid);
|
2000-02-17 20:38:33 +01:00
|
|
|
if (!res)
|
2000-07-26 19:48:49 +02:00
|
|
|
{
|
|
|
|
if (uid == (uid_t) -1)
|
|
|
|
uid = old_uid;
|
|
|
|
if (gid == (gid_t) -1)
|
|
|
|
gid = old_gid;
|
|
|
|
if (win32_path.file_attributes () & FILE_ATTRIBUTE_DIRECTORY)
|
|
|
|
attrib |= S_IFDIR;
|
2000-04-02 22:42:42 +02:00
|
|
|
res = set_file_attribute (win32_path.has_acls (),
|
2000-07-26 19:48:49 +02:00
|
|
|
win32_path.get_win32 (),
|
2000-04-02 22:42:42 +02:00
|
|
|
uid, gid, attrib,
|
2000-11-15 01:13:09 +01:00
|
|
|
cygheap->user.logsrv ());
|
2000-07-26 19:48:49 +02:00
|
|
|
}
|
2001-05-23 10:12:49 +02:00
|
|
|
if (res != 0 && (!win32_path.has_acls () || !allow_ntsec))
|
|
|
|
{
|
|
|
|
/* fake - if not supported, pretend we're like win95
|
|
|
|
where it just works */
|
|
|
|
res = 0;
|
|
|
|
}
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
2000-04-02 22:42:42 +02:00
|
|
|
syscall_printf ("%d = %schown (%s,...)",
|
2001-03-14 12:13:46 +01:00
|
|
|
res, (fmode & PC_SYM_NOFOLLOW) ? "l" : "", name);
|
2000-02-17 20:38:33 +01:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-04-02 22:42:42 +02:00
|
|
|
chown (const char * name, uid_t uid, gid_t gid)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-07-17 21:18:21 +02:00
|
|
|
return chown_worker (name, PC_SYM_FOLLOW, uid, gid);
|
2000-04-02 22:42:42 +02:00
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-04-02 22:42:42 +02:00
|
|
|
lchown (const char * name, uid_t uid, gid_t gid)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2001-03-14 12:13:46 +01:00
|
|
|
return chown_worker (name, PC_SYM_NOFOLLOW, uid, gid);
|
2000-04-02 22:42:42 +02:00
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-04-02 22:42:42 +02:00
|
|
|
fchown (int fd, uid_t uid, gid_t gid)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2001-04-18 23:10:15 +02:00
|
|
|
if (cygheap->fdtab.not_open (fd))
|
2000-04-02 22:42:42 +02:00
|
|
|
{
|
|
|
|
syscall_printf ("-1 = fchown (%d,...)", fd);
|
|
|
|
set_errno (EBADF);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-04-18 23:10:15 +02:00
|
|
|
const char *path = cygheap->fdtab[fd]->get_name ();
|
2000-04-02 22:42:42 +02:00
|
|
|
|
|
|
|
if (path == NULL)
|
|
|
|
{
|
|
|
|
syscall_printf ("-1 = fchown (%d,...) (no name)", fd);
|
|
|
|
set_errno (ENOSYS);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
syscall_printf ("fchown (%d,...): calling chown_worker (%s,FOLLOW,...)",
|
2000-07-26 19:48:49 +02:00
|
|
|
fd, path);
|
2000-07-17 21:18:21 +02:00
|
|
|
return chown_worker (path, PC_SYM_FOLLOW, uid, gid);
|
2000-04-02 22:42:42 +02:00
|
|
|
}
|
|
|
|
|
2000-02-17 20:38:33 +01:00
|
|
|
/* umask: POSIX 5.3.3.1 */
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" mode_t
|
2000-02-17 20:38:33 +01:00
|
|
|
umask (mode_t mask)
|
|
|
|
{
|
|
|
|
mode_t oldmask;
|
|
|
|
|
2000-11-14 06:53:32 +01:00
|
|
|
oldmask = cygheap->umask;
|
|
|
|
cygheap->umask = mask & 0777;
|
2000-02-17 20:38:33 +01:00
|
|
|
return oldmask;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* chmod: POSIX 5.6.4.1 */
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
chmod (const char *path, mode_t mode)
|
|
|
|
{
|
|
|
|
int res = -1;
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
path_conv win32_path (path);
|
|
|
|
|
|
|
|
if (win32_path.error)
|
|
|
|
{
|
|
|
|
set_errno (win32_path.error);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* FIXME: This makes chmod on a device succeed always. Someday we'll want
|
|
|
|
to actually allow chmod to work properly on devices. */
|
|
|
|
if (win32_path.is_device ())
|
|
|
|
{
|
|
|
|
res = 0;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (win32_path.file_attributes () == (DWORD)-1)
|
|
|
|
__seterrno ();
|
|
|
|
else
|
|
|
|
{
|
|
|
|
DWORD attr = win32_path.file_attributes ();
|
|
|
|
/* temporary erase read only bit, to be able to set file security */
|
|
|
|
SetFileAttributesA (win32_path.get_win32 (),
|
|
|
|
attr & ~FILE_ATTRIBUTE_READONLY);
|
|
|
|
|
2000-03-16 20:35:18 +01:00
|
|
|
uid_t uid;
|
|
|
|
gid_t gid;
|
2000-05-24 22:09:43 +02:00
|
|
|
|
|
|
|
if (win32_path.file_attributes () & FILE_ATTRIBUTE_DIRECTORY)
|
2000-07-26 19:48:49 +02:00
|
|
|
mode |= S_IFDIR;
|
2000-03-16 20:35:18 +01:00
|
|
|
get_file_attribute (win32_path.has_acls (),
|
2000-07-26 19:48:49 +02:00
|
|
|
win32_path.get_win32 (),
|
|
|
|
NULL, &uid, &gid);
|
2000-05-24 22:09:43 +02:00
|
|
|
if (win32_path.file_attributes () & FILE_ATTRIBUTE_DIRECTORY)
|
2000-07-26 19:48:49 +02:00
|
|
|
mode |= S_IFDIR;
|
2001-01-28 06:51:15 +01:00
|
|
|
if (!set_file_attribute (win32_path.has_acls (),
|
2000-07-26 19:48:49 +02:00
|
|
|
win32_path.get_win32 (),
|
2000-03-16 20:35:18 +01:00
|
|
|
uid, gid,
|
2000-11-15 01:13:09 +01:00
|
|
|
mode, cygheap->user.logsrv ())
|
2000-02-17 20:38:33 +01:00
|
|
|
&& allow_ntsec)
|
|
|
|
res = 0;
|
|
|
|
|
|
|
|
/* if the mode we want has any write bits set, we can't
|
|
|
|
be read only. */
|
|
|
|
if (mode & (S_IWUSR | S_IWGRP | S_IWOTH))
|
|
|
|
attr &= ~FILE_ATTRIBUTE_READONLY;
|
|
|
|
else
|
|
|
|
attr |= FILE_ATTRIBUTE_READONLY;
|
|
|
|
|
|
|
|
if (S_ISLNK (mode) || S_ISSOCK (mode))
|
|
|
|
attr |= FILE_ATTRIBUTE_SYSTEM;
|
|
|
|
|
|
|
|
if (!SetFileAttributesA (win32_path.get_win32 (), attr))
|
|
|
|
__seterrno ();
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Correct NTFS security attributes have higher priority */
|
|
|
|
if (res == 0 || !allow_ntsec)
|
|
|
|
res = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
syscall_printf ("%d = chmod (%s, %p)", res, path, mode);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* fchmod: P96 5.6.4.1 */
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
fchmod (int fd, mode_t mode)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2001-04-18 23:10:15 +02:00
|
|
|
if (cygheap->fdtab.not_open (fd))
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
syscall_printf ("-1 = fchmod (%d, 0%o)", fd, mode);
|
|
|
|
set_errno (EBADF);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-04-18 23:10:15 +02:00
|
|
|
const char *path = cygheap->fdtab[fd]->get_name ();
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
if (path == NULL)
|
|
|
|
{
|
|
|
|
syscall_printf ("-1 = fchmod (%d, 0%o) (no name)", fd, mode);
|
|
|
|
set_errno (ENOSYS);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
syscall_printf ("fchmod (%d, 0%o): calling chmod (%s, 0%o)",
|
|
|
|
fd, mode, path, mode);
|
|
|
|
return chmod (path, mode);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Cygwin internal */
|
|
|
|
static int
|
|
|
|
num_entries (const char *win32_name)
|
|
|
|
{
|
|
|
|
WIN32_FIND_DATA buf;
|
|
|
|
HANDLE handle;
|
|
|
|
char buf1[MAX_PATH];
|
|
|
|
int count = 0;
|
|
|
|
|
|
|
|
strcpy (buf1, win32_name);
|
|
|
|
int len = strlen (buf1);
|
|
|
|
if (len == 0 || isdirsep (buf1[len - 1]))
|
|
|
|
strcat (buf1, "*");
|
|
|
|
else
|
|
|
|
strcat (buf1, "/*"); /* */
|
|
|
|
|
|
|
|
handle = FindFirstFileA (buf1, &buf);
|
|
|
|
|
|
|
|
if (handle == INVALID_HANDLE_VALUE)
|
|
|
|
return 0;
|
|
|
|
count ++;
|
|
|
|
while (FindNextFileA (handle, &buf))
|
|
|
|
{
|
2001-03-18 22:11:25 +01:00
|
|
|
if ((buf.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY))
|
2000-02-17 20:38:33 +01:00
|
|
|
count ++;
|
|
|
|
}
|
|
|
|
FindClose (handle);
|
|
|
|
return count;
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
_fstat (int fd, struct stat *buf)
|
|
|
|
{
|
|
|
|
int r;
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2001-04-18 23:10:15 +02:00
|
|
|
if (cygheap->fdtab.not_open (fd))
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
syscall_printf ("-1 = fstat (%d, %p)", fd, buf);
|
|
|
|
set_errno (EBADF);
|
|
|
|
r = -1;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
memset (buf, 0, sizeof (struct stat));
|
2001-04-18 23:10:15 +02:00
|
|
|
r = cygheap->fdtab[fd]->fstat (buf);
|
2000-10-17 20:55:58 +02:00
|
|
|
syscall_printf ("%d = fstat (%d, %x)", r, fd, buf);
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* fsync: P96 6.6.1.1 */
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
fsync (int fd)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2001-04-18 23:10:15 +02:00
|
|
|
if (cygheap->fdtab.not_open (fd))
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
syscall_printf ("-1 = fsync (%d)", fd);
|
|
|
|
set_errno (EBADF);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-04-18 23:10:15 +02:00
|
|
|
HANDLE h = cygheap->fdtab[fd]->get_handle ();
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
if (FlushFileBuffers (h) == 0)
|
|
|
|
{
|
|
|
|
__seterrno ();
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* sync: standards? */
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
sync ()
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int __stdcall
|
|
|
|
stat_dev (DWORD devn, int unit, unsigned long ino, struct stat *buf)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
switch (devn)
|
|
|
|
{
|
|
|
|
case FH_PIPEW:
|
2001-03-17 06:06:14 +01:00
|
|
|
buf->st_mode = STD_WBITS | S_IWGRP | S_IWOTH;
|
2000-02-17 20:38:33 +01:00
|
|
|
break;
|
|
|
|
case FH_PIPER:
|
|
|
|
buf->st_mode = STD_RBITS;
|
|
|
|
break;
|
2001-03-17 06:11:20 +01:00
|
|
|
default:
|
2001-03-17 06:06:14 +01:00
|
|
|
buf->st_mode = STD_RBITS | STD_WBITS | S_IWGRP | S_IWOTH;
|
2000-02-17 20:38:33 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
buf->st_mode |= S_IFCHR;
|
|
|
|
buf->st_blksize = S_BLKSIZE;
|
|
|
|
buf->st_nlink = 1;
|
|
|
|
buf->st_dev = buf->st_rdev = FHDEVN (devn) << 8 | (unit & 0xff);
|
|
|
|
buf->st_ino = ino;
|
|
|
|
buf->st_atime = buf->st_mtime = buf->st_ctime = time (NULL);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-05-04 21:46:32 +02:00
|
|
|
suffix_info stat_suffixes[] =
|
2000-03-26 03:54:22 +02:00
|
|
|
{
|
|
|
|
suffix_info ("", 1),
|
2000-03-28 23:49:16 +02:00
|
|
|
suffix_info (".exe", 1),
|
|
|
|
suffix_info (NULL)
|
2000-03-26 03:54:22 +02:00
|
|
|
};
|
|
|
|
|
2000-02-17 20:38:33 +01:00
|
|
|
/* Cygwin internal */
|
|
|
|
static int
|
|
|
|
stat_worker (const char *caller, const char *name, struct stat *buf,
|
2000-10-15 03:37:07 +02:00
|
|
|
int nofollow)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
int res = -1;
|
2000-04-26 17:28:06 +02:00
|
|
|
int oret = 1;
|
2000-02-17 20:38:33 +01:00
|
|
|
int atts;
|
2001-02-06 15:07:02 +01:00
|
|
|
|
|
|
|
int attribute = 0;
|
|
|
|
uid_t uid;
|
|
|
|
gid_t gid;
|
|
|
|
|
2000-03-16 20:35:18 +01:00
|
|
|
UINT dtype;
|
2000-04-25 18:31:14 +02:00
|
|
|
fhandler_disk_file fh (NULL);
|
|
|
|
|
2000-02-17 20:38:33 +01:00
|
|
|
MALLOC_CHECK;
|
|
|
|
|
|
|
|
debug_printf ("%s (%s, %p)", caller, name, buf);
|
|
|
|
|
2000-09-03 06:16:35 +02:00
|
|
|
path_conv real_path (name, (nofollow ? PC_SYM_NOFOLLOW : PC_SYM_FOLLOW) |
|
|
|
|
PC_FULL, stat_suffixes);
|
2000-03-26 03:54:22 +02:00
|
|
|
|
2000-02-17 20:38:33 +01:00
|
|
|
if (real_path.error)
|
|
|
|
{
|
|
|
|
set_errno (real_path.error);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2001-07-14 02:09:33 +02:00
|
|
|
if (check_null_invalid_struct_errno (buf))
|
|
|
|
goto done;
|
|
|
|
|
2000-02-17 20:38:33 +01:00
|
|
|
memset (buf, 0, sizeof (struct stat));
|
|
|
|
|
|
|
|
if (real_path.is_device ())
|
|
|
|
return stat_dev (real_path.get_devn (), real_path.get_unitn (),
|
2000-04-25 21:39:05 +02:00
|
|
|
hash_path_name (0, real_path.get_win32 ()), buf);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
atts = real_path.file_attributes ();
|
|
|
|
|
2001-03-05 07:28:25 +01:00
|
|
|
debug_printf ("%d = file_attributes for '%s'", atts, real_path.get_win32 ());
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2001-06-05 12:45:52 +02:00
|
|
|
dtype = real_path.get_drive_type ();
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2001-03-18 22:11:25 +01:00
|
|
|
if ((atts == -1 || ! (atts & FILE_ATTRIBUTE_DIRECTORY) ||
|
2001-08-04 23:10:52 +02:00
|
|
|
(iswinnt
|
2000-07-26 19:48:49 +02:00
|
|
|
&& dtype != DRIVE_NO_ROOT_DIR
|
2001-02-06 15:07:02 +01:00
|
|
|
&& dtype != DRIVE_UNKNOWN)))
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
2001-02-06 15:07:02 +01:00
|
|
|
oret = fh.open (real_path, O_RDONLY | O_BINARY | O_DIROPEN |
|
|
|
|
(nofollow ? O_NOSYMLINK : 0), 0);
|
2001-06-26 23:03:08 +02:00
|
|
|
/* If we couldn't open the file, try a "query open" with no permissions.
|
|
|
|
This will allow us to determine *some* things about the file, at least. */
|
|
|
|
if (!oret)
|
|
|
|
{
|
|
|
|
fh.set_query_open (TRUE);
|
|
|
|
oret = fh.open (real_path, O_RDONLY | O_BINARY | O_DIROPEN |
|
|
|
|
(nofollow ? O_NOSYMLINK : 0), 0);
|
|
|
|
}
|
2001-02-06 15:07:02 +01:00
|
|
|
/* Check a special case here. If ntsec is ON it happens
|
|
|
|
that a process creates a file using mode 000 to disallow
|
|
|
|
other processes access. In contrast to UNIX, this results
|
|
|
|
in a failing open call in the same process. Check that
|
|
|
|
case. */
|
|
|
|
if (!oret && allow_ntsec && get_errno () == EACCES
|
2001-03-03 04:56:34 +01:00
|
|
|
&& !get_file_attribute (TRUE, real_path, &attribute, &uid, &gid)
|
2001-02-06 15:07:02 +01:00
|
|
|
&& !attribute && uid == myself->uid && gid == myself->gid)
|
|
|
|
{
|
|
|
|
set_file_attribute (TRUE, real_path, 0400);
|
|
|
|
oret = fh.open (real_path, O_RDONLY | O_BINARY | O_DIROPEN |
|
|
|
|
(nofollow ? O_NOSYMLINK : 0), 0);
|
|
|
|
set_file_attribute (TRUE, real_path.get_win32 (), 0);
|
|
|
|
}
|
|
|
|
if (oret)
|
2001-03-03 04:56:34 +01:00
|
|
|
{
|
2001-02-06 15:07:02 +01:00
|
|
|
res = fh.fstat (buf);
|
|
|
|
fh.close ();
|
|
|
|
/* The number of links to a directory includes the
|
|
|
|
number of subdirectories in the directory, since all
|
|
|
|
those subdirectories point to it.
|
|
|
|
This is too slow on remote drives, so we do without it and
|
|
|
|
set the number of links to 2. */
|
2001-03-03 04:56:34 +01:00
|
|
|
/* Unfortunately the count of 2 confuses `find (1)' command. So
|
2001-02-06 15:07:02 +01:00
|
|
|
let's try it with `1' as link count. */
|
|
|
|
if (atts != -1 && (atts & FILE_ATTRIBUTE_DIRECTORY))
|
|
|
|
buf->st_nlink = (dtype == DRIVE_REMOTE
|
2001-03-03 04:56:34 +01:00
|
|
|
? 1
|
2001-02-06 15:07:02 +01:00
|
|
|
: num_entries (real_path.get_win32 ()));
|
|
|
|
goto done;
|
2001-03-03 04:56:34 +01:00
|
|
|
}
|
2000-04-25 18:31:14 +02:00
|
|
|
}
|
2001-04-05 22:43:23 +02:00
|
|
|
if (atts != -1 && (oret || (!oret && get_errno () != ENOENT
|
|
|
|
&& get_errno () != ENOSHARE)))
|
2000-04-25 18:31:14 +02:00
|
|
|
{
|
2000-04-26 17:28:06 +02:00
|
|
|
/* Unfortunately, the above open may fail if the file exists, though.
|
2000-07-26 19:48:49 +02:00
|
|
|
So we have to care for this case here, too. */
|
2000-04-25 18:31:14 +02:00
|
|
|
WIN32_FIND_DATA wfd;
|
|
|
|
HANDLE handle;
|
|
|
|
buf->st_nlink = 1;
|
|
|
|
if (atts != -1
|
2000-07-26 19:48:49 +02:00
|
|
|
&& (atts & FILE_ATTRIBUTE_DIRECTORY)
|
|
|
|
&& dtype != DRIVE_REMOTE)
|
|
|
|
buf->st_nlink = num_entries (real_path.get_win32 ());
|
2001-03-03 04:56:34 +01:00
|
|
|
buf->st_dev = FHDEVN (FH_DISK) << 8;
|
2000-02-17 20:38:33 +01:00
|
|
|
buf->st_ino = hash_path_name (0, real_path.get_win32 ());
|
2000-04-25 18:31:14 +02:00
|
|
|
if (atts != -1 && (atts & FILE_ATTRIBUTE_DIRECTORY))
|
2000-07-26 19:48:49 +02:00
|
|
|
buf->st_mode = S_IFDIR;
|
2000-04-25 18:31:14 +02:00
|
|
|
else if (real_path.issymlink ())
|
2000-07-26 19:48:49 +02:00
|
|
|
buf->st_mode = S_IFLNK;
|
2000-04-25 18:31:14 +02:00
|
|
|
else if (real_path.issocket ())
|
2000-07-26 19:48:49 +02:00
|
|
|
buf->st_mode = S_IFSOCK;
|
2000-04-25 18:31:14 +02:00
|
|
|
else
|
2000-07-26 19:48:49 +02:00
|
|
|
buf->st_mode = S_IFREG;
|
2000-04-25 18:31:14 +02:00
|
|
|
if (!real_path.has_acls ()
|
2001-05-31 07:25:46 +02:00
|
|
|
|| get_file_attribute (TRUE, real_path.get_win32 (),
|
|
|
|
&buf->st_mode,
|
|
|
|
&buf->st_uid, &buf->st_gid))
|
2000-07-26 19:48:49 +02:00
|
|
|
{
|
|
|
|
buf->st_mode |= STD_RBITS | STD_XBITS;
|
2001-03-18 22:11:25 +01:00
|
|
|
if ((atts & FILE_ATTRIBUTE_READONLY) == 0)
|
2000-07-26 19:48:49 +02:00
|
|
|
buf->st_mode |= STD_WBITS;
|
2001-02-21 22:49:37 +01:00
|
|
|
if (real_path.issymlink ())
|
|
|
|
buf->st_mode |= S_IRWXU | S_IRWXG | S_IRWXO;
|
2000-07-26 19:48:49 +02:00
|
|
|
get_file_attribute (FALSE, real_path.get_win32 (),
|
|
|
|
NULL, &buf->st_uid, &buf->st_gid);
|
|
|
|
}
|
2001-03-18 22:11:25 +01:00
|
|
|
if ((handle = FindFirstFile (real_path.get_win32 (), &wfd))
|
2000-07-26 19:48:49 +02:00
|
|
|
!= INVALID_HANDLE_VALUE)
|
|
|
|
{
|
|
|
|
buf->st_atime = to_time_t (&wfd.ftLastAccessTime);
|
|
|
|
buf->st_mtime = to_time_t (&wfd.ftLastWriteTime);
|
|
|
|
buf->st_ctime = to_time_t (&wfd.ftCreationTime);
|
|
|
|
buf->st_size = wfd.nFileSizeLow;
|
|
|
|
buf->st_blksize = S_BLKSIZE;
|
2001-03-18 22:11:25 +01:00
|
|
|
buf->st_blocks = ((unsigned long) buf->st_size +
|
2000-07-26 19:48:49 +02:00
|
|
|
S_BLKSIZE-1) / S_BLKSIZE;
|
|
|
|
FindClose (handle);
|
|
|
|
}
|
2000-02-17 20:38:33 +01:00
|
|
|
res = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
MALLOC_CHECK;
|
|
|
|
syscall_printf ("%d = %s (%s, %p)", res, caller, name, buf);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
_stat (const char *name, struct stat *buf)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
return stat_worker ("stat", name, buf, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* lstat: Provided by SVR4 and 4.3+BSD, POSIX? */
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
lstat (const char *name, struct stat *buf)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
return stat_worker ("lstat", name, buf, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
extern int acl_access (const char *, int);
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
access (const char *fn, int flags)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
// flags were incorrectly specified
|
2001-03-03 04:56:34 +01:00
|
|
|
if (flags & ~ (F_OK|R_OK|W_OK|X_OK))
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (allow_ntsec)
|
|
|
|
return acl_access (fn, flags);
|
|
|
|
|
|
|
|
struct stat st;
|
|
|
|
int r = stat (fn, &st);
|
|
|
|
if (r)
|
|
|
|
return -1;
|
|
|
|
r = -1;
|
|
|
|
if (flags & R_OK)
|
|
|
|
{
|
|
|
|
if (st.st_uid == myself->uid)
|
2000-07-26 19:48:49 +02:00
|
|
|
{
|
2001-03-03 04:56:34 +01:00
|
|
|
if (! (st.st_mode & S_IRUSR))
|
2000-07-26 19:48:49 +02:00
|
|
|
goto done;
|
|
|
|
}
|
2000-02-17 20:38:33 +01:00
|
|
|
else if (st.st_gid == myself->gid)
|
2000-07-26 19:48:49 +02:00
|
|
|
{
|
2001-03-03 04:56:34 +01:00
|
|
|
if (! (st.st_mode & S_IRGRP))
|
2000-07-26 19:48:49 +02:00
|
|
|
goto done;
|
|
|
|
}
|
2001-03-03 04:56:34 +01:00
|
|
|
else if (! (st.st_mode & S_IROTH))
|
2000-07-26 19:48:49 +02:00
|
|
|
goto done;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
if (flags & W_OK)
|
|
|
|
{
|
|
|
|
if (st.st_uid == myself->uid)
|
2000-07-26 19:48:49 +02:00
|
|
|
{
|
2001-03-03 04:56:34 +01:00
|
|
|
if (! (st.st_mode & S_IWUSR))
|
2000-07-26 19:48:49 +02:00
|
|
|
goto done;
|
|
|
|
}
|
2000-02-17 20:38:33 +01:00
|
|
|
else if (st.st_gid == myself->gid)
|
2000-07-26 19:48:49 +02:00
|
|
|
{
|
2001-03-03 04:56:34 +01:00
|
|
|
if (! (st.st_mode & S_IWGRP))
|
2000-07-26 19:48:49 +02:00
|
|
|
goto done;
|
|
|
|
}
|
2001-03-03 04:56:34 +01:00
|
|
|
else if (! (st.st_mode & S_IWOTH))
|
2000-07-26 19:48:49 +02:00
|
|
|
goto done;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
if (flags & X_OK)
|
|
|
|
{
|
|
|
|
if (st.st_uid == myself->uid)
|
2000-07-26 19:48:49 +02:00
|
|
|
{
|
2001-03-03 04:56:34 +01:00
|
|
|
if (! (st.st_mode & S_IXUSR))
|
2000-07-26 19:48:49 +02:00
|
|
|
goto done;
|
|
|
|
}
|
2000-02-17 20:38:33 +01:00
|
|
|
else if (st.st_gid == myself->gid)
|
2000-07-26 19:48:49 +02:00
|
|
|
{
|
2001-03-03 04:56:34 +01:00
|
|
|
if (! (st.st_mode & S_IXGRP))
|
2000-07-26 19:48:49 +02:00
|
|
|
goto done;
|
|
|
|
}
|
2001-03-03 04:56:34 +01:00
|
|
|
else if (! (st.st_mode & S_IXOTH))
|
2000-07-26 19:48:49 +02:00
|
|
|
goto done;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
r = 0;
|
|
|
|
done:
|
|
|
|
if (r)
|
|
|
|
set_errno (EACCES);
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
_rename (const char *oldpath, const char *newpath)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
int res = 0;
|
2001-06-01 13:53:20 +02:00
|
|
|
char *lnk_suffix = NULL;
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2000-07-17 21:18:21 +02:00
|
|
|
path_conv real_old (oldpath, PC_SYM_NOFOLLOW);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
if (real_old.error)
|
|
|
|
{
|
|
|
|
syscall_printf ("-1 = rename (%s, %s)", oldpath, newpath);
|
2001-03-10 21:25:19 +01:00
|
|
|
set_errno (real_old.error);
|
2000-02-17 20:38:33 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2000-07-17 21:18:21 +02:00
|
|
|
path_conv real_new (newpath, PC_SYM_NOFOLLOW);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2001-02-22 15:51:16 +01:00
|
|
|
/* Shortcut hack. */
|
|
|
|
char new_lnk_buf[MAX_PATH + 5];
|
2001-04-17 13:47:37 +02:00
|
|
|
if (real_old.issymlink () && !real_new.error && !real_new.case_clash)
|
2001-02-22 15:51:16 +01:00
|
|
|
{
|
|
|
|
int len_old = strlen (real_old.get_win32 ());
|
2001-03-17 20:53:52 +01:00
|
|
|
if (strcasematch (real_old.get_win32 () + len_old - 4, ".lnk"))
|
2001-02-22 15:51:16 +01:00
|
|
|
{
|
|
|
|
strcpy (new_lnk_buf, newpath);
|
|
|
|
strcat (new_lnk_buf, ".lnk");
|
|
|
|
newpath = new_lnk_buf;
|
|
|
|
real_new.check (newpath, PC_SYM_NOFOLLOW);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2001-04-17 13:47:37 +02:00
|
|
|
if (real_new.error || real_new.case_clash)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
syscall_printf ("-1 = rename (%s, %s)", oldpath, newpath);
|
2001-04-17 13:47:37 +02:00
|
|
|
set_errno (real_new.case_clash ? ECASECLASH : real_new.error);
|
2000-02-17 20:38:33 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-01-28 06:51:15 +01:00
|
|
|
if (!writable_directory (real_old.get_win32 ())
|
|
|
|
|| !writable_directory (real_new.get_win32 ()))
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
syscall_printf ("-1 = rename (%s, %s)", oldpath, newpath);
|
2001-03-10 21:25:19 +01:00
|
|
|
set_errno (EACCES);
|
2000-02-17 20:38:33 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2000-07-17 21:18:21 +02:00
|
|
|
if (real_old.file_attributes () == (DWORD) -1) /* file to move doesn't exist */
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
syscall_printf ("file to move doesn't exist");
|
2001-03-10 21:25:19 +01:00
|
|
|
set_errno (ENOENT);
|
2000-02-17 20:38:33 +01:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
|
2001-06-01 13:53:20 +02:00
|
|
|
/* Destination file exists and is read only, change that or else
|
|
|
|
the rename won't work. */
|
2000-07-17 21:18:21 +02:00
|
|
|
if (real_new.file_attributes () != (DWORD) -1 &&
|
|
|
|
real_new.file_attributes () & FILE_ATTRIBUTE_READONLY)
|
2001-06-01 13:53:20 +02:00
|
|
|
SetFileAttributesA (real_new.get_win32 (),
|
|
|
|
real_new.file_attributes () & ~FILE_ATTRIBUTE_READONLY);
|
|
|
|
|
|
|
|
/* Shortcut hack No. 2, part 1 */
|
|
|
|
if (!real_old.issymlink () && !real_new.error && real_new.issymlink () &&
|
|
|
|
real_new.known_suffix && strcasematch (real_new.known_suffix, ".lnk") &&
|
|
|
|
(lnk_suffix = strrchr (real_new.get_win32 (), '.')))
|
|
|
|
*lnk_suffix = '\0';
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2000-04-19 05:21:13 +02:00
|
|
|
if (!MoveFile (real_old.get_win32 (), real_new.get_win32 ()))
|
|
|
|
res = -1;
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2000-05-22 19:15:47 +02:00
|
|
|
if (res == 0 || (GetLastError () != ERROR_ALREADY_EXISTS
|
2000-07-26 19:48:49 +02:00
|
|
|
&& GetLastError () != ERROR_FILE_EXISTS))
|
2000-04-19 05:21:13 +02:00
|
|
|
goto done;
|
|
|
|
|
2001-08-04 23:10:52 +02:00
|
|
|
if (iswinnt)
|
2000-04-19 05:21:13 +02:00
|
|
|
{
|
|
|
|
if (MoveFileEx (real_old.get_win32 (), real_new.get_win32 (),
|
|
|
|
MOVEFILE_REPLACE_EXISTING))
|
|
|
|
res = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
syscall_printf ("try win95 hack");
|
|
|
|
for (;;)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
2000-04-19 05:21:13 +02:00
|
|
|
if (!DeleteFileA (real_new.get_win32 ()) &&
|
|
|
|
GetLastError () != ERROR_FILE_NOT_FOUND)
|
|
|
|
{
|
|
|
|
syscall_printf ("deleting %s to be paranoid",
|
|
|
|
real_new.get_win32 ());
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
else
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
if (MoveFile (real_old.get_win32 (), real_new.get_win32 ()))
|
|
|
|
{
|
|
|
|
res = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-04-19 05:21:13 +02:00
|
|
|
done:
|
|
|
|
if (res)
|
2001-06-01 13:53:20 +02:00
|
|
|
{
|
|
|
|
__seterrno ();
|
|
|
|
/* Reset R/O attributes if neccessary. */
|
|
|
|
if (real_new.file_attributes () != (DWORD) -1 &&
|
|
|
|
real_new.file_attributes () & FILE_ATTRIBUTE_READONLY)
|
|
|
|
SetFileAttributesA (real_new.get_win32 (), real_new.file_attributes ());
|
|
|
|
}
|
|
|
|
else
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
/* make the new file have the permissions of the old one */
|
2000-07-17 21:18:21 +02:00
|
|
|
SetFileAttributesA (real_new.get_win32 (), real_old.file_attributes ());
|
2001-06-01 13:53:20 +02:00
|
|
|
|
|
|
|
/* Shortcut hack, No. 2, part 2 */
|
|
|
|
/* if the new filename was an existing shortcut, remove it now if the
|
|
|
|
new filename is equal to the shortcut name without .lnk suffix. */
|
|
|
|
if (lnk_suffix)
|
|
|
|
{
|
|
|
|
*lnk_suffix = '.';
|
|
|
|
DeleteFile (real_new.get_win32 ());
|
|
|
|
}
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
syscall_printf ("%d = rename (%s, %s)", res, real_old.get_win32 (),
|
|
|
|
real_new.get_win32 ());
|
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
system (const char *cmdstring)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
int res;
|
|
|
|
const char* command[4];
|
|
|
|
_sig_func_ptr oldint, oldquit;
|
|
|
|
sigset_t child_block, old_mask;
|
|
|
|
|
|
|
|
if (cmdstring == (const char *) NULL)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
oldint = signal (SIGINT, SIG_IGN);
|
|
|
|
oldquit = signal (SIGQUIT, SIG_IGN);
|
|
|
|
sigemptyset (&child_block);
|
|
|
|
sigaddset (&child_block, SIGCHLD);
|
|
|
|
(void) sigprocmask (SIG_BLOCK, &child_block, &old_mask);
|
|
|
|
|
|
|
|
command[0] = "sh";
|
|
|
|
command[1] = "-c";
|
|
|
|
command[2] = cmdstring;
|
|
|
|
command[3] = (const char *) NULL;
|
|
|
|
|
2001-03-18 22:11:25 +01:00
|
|
|
if ((res = spawnvp (_P_WAIT, "sh", command)) == -1)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
// when exec fails, return value should be as if shell
|
|
|
|
// executed exit (127)
|
|
|
|
res = 127;
|
|
|
|
}
|
|
|
|
|
|
|
|
signal (SIGINT, oldint);
|
|
|
|
signal (SIGQUIT, oldquit);
|
|
|
|
(void) sigprocmask (SIG_SETMASK, &old_mask, 0);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2001-01-18 05:26:04 +01:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
setdtablesize (int size)
|
|
|
|
{
|
2001-04-18 23:10:15 +02:00
|
|
|
if (size <= (int)cygheap->fdtab.size || cygheap->fdtab.extend (size - cygheap->fdtab.size))
|
2001-01-18 05:26:04 +01:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
return -1;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
getdtablesize ()
|
|
|
|
{
|
2001-08-16 16:29:21 +02:00
|
|
|
return cygheap->fdtab.size > OPEN_MAX ? cygheap->fdtab.size : OPEN_MAX;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" size_t
|
2000-02-17 20:38:33 +01:00
|
|
|
getpagesize ()
|
|
|
|
{
|
2001-01-28 06:51:15 +01:00
|
|
|
if (!system_info.dwPageSize)
|
2001-03-03 04:56:34 +01:00
|
|
|
GetSystemInfo (&system_info);
|
2001-01-28 06:51:15 +01:00
|
|
|
return (int) system_info.dwPageSize;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
2001-03-19 12:02:41 +01:00
|
|
|
static int
|
|
|
|
check_posix_perm (const char *fname, int v)
|
|
|
|
{
|
|
|
|
extern int allow_ntea, allow_ntsec, allow_smbntsec;
|
|
|
|
|
|
|
|
/* Windows 95/98/ME don't support file system security at all. */
|
2001-08-04 23:10:52 +02:00
|
|
|
if (!iswinnt)
|
2001-03-19 12:02:41 +01:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* ntea is ok for supporting permission bits but it doesn't support
|
|
|
|
full POSIX security settings. */
|
|
|
|
if (v == _PC_POSIX_PERMISSIONS && allow_ntea)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
if (!allow_ntsec)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
char *root = rootdir (strcpy ((char *)alloca (strlen (fname)), fname));
|
|
|
|
|
|
|
|
if (!allow_smbntsec
|
|
|
|
&& ((root[0] == '\\' && root[1] == '\\')
|
|
|
|
|| GetDriveType (root) == DRIVE_REMOTE))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
DWORD vsn, len, flags;
|
|
|
|
if (!GetVolumeInformation (root, NULL, 0, &vsn, &len, &flags, NULL, 16))
|
|
|
|
{
|
|
|
|
__seterrno ();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (flags & FS_PERSISTENT_ACLS) ? 1 : 0;
|
|
|
|
}
|
|
|
|
|
2000-02-17 20:38:33 +01:00
|
|
|
/* FIXME: not all values are correct... */
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" long int
|
2000-02-17 20:38:33 +01:00
|
|
|
fpathconf (int fd, int v)
|
|
|
|
{
|
2001-08-23 04:27:01 +02:00
|
|
|
if (cygheap->fdtab.not_open (fd))
|
|
|
|
{
|
|
|
|
set_errno (EBADF);
|
|
|
|
return -1;
|
|
|
|
}
|
2000-02-17 20:38:33 +01:00
|
|
|
switch (v)
|
|
|
|
{
|
|
|
|
case _PC_LINK_MAX:
|
|
|
|
return _POSIX_LINK_MAX;
|
|
|
|
case _PC_MAX_CANON:
|
|
|
|
case _PC_MAX_INPUT:
|
|
|
|
if (isatty (fd))
|
|
|
|
return _POSIX_MAX_CANON;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
set_errno (EBADF);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
case _PC_NAME_MAX:
|
|
|
|
case _PC_PATH_MAX:
|
|
|
|
return PATH_MAX;
|
|
|
|
case _PC_PIPE_BUF:
|
|
|
|
return 4096;
|
|
|
|
case _PC_CHOWN_RESTRICTED:
|
|
|
|
case _PC_NO_TRUNC:
|
|
|
|
return -1;
|
|
|
|
case _PC_VDISABLE:
|
|
|
|
if (isatty (fd))
|
|
|
|
return -1;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
set_errno (EBADF);
|
|
|
|
return -1;
|
|
|
|
}
|
2001-03-19 12:02:41 +01:00
|
|
|
case _PC_POSIX_PERMISSIONS:
|
|
|
|
case _PC_POSIX_SECURITY:
|
2001-08-23 04:27:01 +02:00
|
|
|
{
|
|
|
|
fhandler_base *fh = cygheap->fdtab[fd];
|
|
|
|
if (fh->get_device () == FH_DISK)
|
|
|
|
return check_posix_perm (fh->get_win32_name (), v);
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
2000-02-17 20:38:33 +01:00
|
|
|
default:
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" long int
|
2000-02-17 20:38:33 +01:00
|
|
|
pathconf (const char *file, int v)
|
|
|
|
{
|
|
|
|
switch (v)
|
|
|
|
{
|
|
|
|
case _PC_PATH_MAX:
|
|
|
|
return PATH_MAX - strlen (file);
|
|
|
|
case _PC_NAME_MAX:
|
|
|
|
return PATH_MAX;
|
|
|
|
case _PC_LINK_MAX:
|
|
|
|
return _POSIX_LINK_MAX;
|
|
|
|
case _PC_MAX_CANON:
|
|
|
|
case _PC_MAX_INPUT:
|
2001-03-19 12:02:41 +01:00
|
|
|
return _POSIX_MAX_CANON;
|
2000-02-17 20:38:33 +01:00
|
|
|
case _PC_PIPE_BUF:
|
|
|
|
return 4096;
|
|
|
|
case _PC_CHOWN_RESTRICTED:
|
|
|
|
case _PC_NO_TRUNC:
|
|
|
|
return -1;
|
|
|
|
case _PC_VDISABLE:
|
2001-03-19 12:02:41 +01:00
|
|
|
return -1;
|
|
|
|
case _PC_POSIX_PERMISSIONS:
|
|
|
|
case _PC_POSIX_SECURITY:
|
|
|
|
{
|
|
|
|
path_conv full_path (file, PC_SYM_FOLLOW | PC_FULL);
|
|
|
|
if (full_path.error)
|
|
|
|
{
|
|
|
|
set_errno (full_path.error);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (full_path.is_device ())
|
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return check_posix_perm (full_path, v);
|
|
|
|
}
|
2000-02-17 20:38:33 +01:00
|
|
|
default:
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-09-03 06:16:35 +02:00
|
|
|
extern "C" char *
|
|
|
|
ttyname (int fd)
|
|
|
|
{
|
2001-04-18 23:10:15 +02:00
|
|
|
if (cygheap->fdtab.not_open (fd) || !cygheap->fdtab[fd]->is_tty ())
|
2000-09-03 06:16:35 +02:00
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
2001-04-18 23:10:15 +02:00
|
|
|
return (char *) (cygheap->fdtab[fd]->ttyname ());
|
2000-09-03 06:16:35 +02:00
|
|
|
}
|
|
|
|
|
2000-07-29 18:24:59 +02:00
|
|
|
extern "C" char *
|
2000-02-17 20:38:33 +01:00
|
|
|
ctermid (char *str)
|
|
|
|
{
|
|
|
|
static NO_COPY char buf[16];
|
|
|
|
if (str == NULL)
|
|
|
|
str = buf;
|
2001-04-29 01:48:28 +02:00
|
|
|
if (!real_tty_attached (myself))
|
2000-02-17 20:38:33 +01:00
|
|
|
strcpy (str, "/dev/conin");
|
|
|
|
else
|
|
|
|
__small_sprintf (str, "/dev/tty%d", myself->ctty);
|
|
|
|
return str;
|
|
|
|
}
|
|
|
|
|
2000-05-24 01:52:50 +02:00
|
|
|
/* Tells stdio if it should do the cr/lf conversion for this file */
|
2000-09-03 06:16:35 +02:00
|
|
|
extern "C" int
|
2000-05-24 01:52:50 +02:00
|
|
|
_cygwin_istext_for_stdio (int fd)
|
|
|
|
{
|
2001-03-03 04:56:34 +01:00
|
|
|
syscall_printf ("_cygwin_istext_for_stdio (%d)\n", fd);
|
2000-05-24 01:52:50 +02:00
|
|
|
if (CYGWIN_VERSION_OLD_STDIO_CRLF_HANDLING)
|
|
|
|
{
|
2001-03-03 04:56:34 +01:00
|
|
|
syscall_printf (" _cifs: old API\n");
|
2000-05-24 01:52:50 +02:00
|
|
|
return 0; /* we do it for old apps, due to getc/putc macros */
|
|
|
|
}
|
|
|
|
|
2001-04-18 23:10:15 +02:00
|
|
|
if (cygheap->fdtab.not_open (fd))
|
2000-05-24 01:52:50 +02:00
|
|
|
{
|
2001-03-03 04:56:34 +01:00
|
|
|
syscall_printf (" _cifs: fd not open\n");
|
2000-05-24 01:52:50 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2001-04-18 23:10:15 +02:00
|
|
|
fhandler_base *p = cygheap->fdtab[fd];
|
2000-05-24 01:52:50 +02:00
|
|
|
|
2001-03-03 04:56:34 +01:00
|
|
|
if (p->get_device () != FH_DISK)
|
2000-05-24 01:52:50 +02:00
|
|
|
{
|
2001-03-03 04:56:34 +01:00
|
|
|
syscall_printf (" _cifs: fd not disk file\n");
|
2000-05-24 01:52:50 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (p->get_w_binary () || p->get_r_binary ())
|
|
|
|
{
|
2001-03-03 04:56:34 +01:00
|
|
|
syscall_printf (" _cifs: get_*_binary\n");
|
2000-05-24 01:52:50 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2001-03-03 04:56:34 +01:00
|
|
|
syscall_printf ("_cygwin_istext_for_stdio says yes\n");
|
2000-05-24 01:52:50 +02:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2000-05-19 19:15:02 +02:00
|
|
|
/* internal newlib function */
|
2001-03-03 04:56:34 +01:00
|
|
|
extern "C" int _fwalk (struct _reent *ptr, int (*function) (FILE *));
|
2000-05-19 19:15:02 +02:00
|
|
|
|
|
|
|
static int setmode_mode;
|
|
|
|
static int setmode_file;
|
|
|
|
|
|
|
|
static int
|
|
|
|
setmode_helper (FILE *f)
|
|
|
|
{
|
2001-03-03 04:56:34 +01:00
|
|
|
if (fileno (f) != setmode_file)
|
2000-05-19 19:15:02 +02:00
|
|
|
return 0;
|
2001-03-03 04:56:34 +01:00
|
|
|
syscall_printf ("setmode: file was %s now %s\n",
|
2000-05-24 01:52:50 +02:00
|
|
|
f->_flags & __SCLE ? "cle" : "raw",
|
|
|
|
setmode_mode & O_TEXT ? "cle" : "raw");
|
2000-05-19 19:15:02 +02:00
|
|
|
if (setmode_mode & O_TEXT)
|
|
|
|
f->_flags |= __SCLE;
|
|
|
|
else
|
|
|
|
f->_flags &= ~__SCLE;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-07-09 07:29:51 +02:00
|
|
|
extern "C" int
|
|
|
|
getmode (int fd)
|
|
|
|
{
|
2001-04-18 23:10:15 +02:00
|
|
|
if (cygheap->fdtab.not_open (fd))
|
2000-07-09 07:29:51 +02:00
|
|
|
{
|
|
|
|
set_errno (EBADF);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-04-18 23:10:15 +02:00
|
|
|
return cygheap->fdtab[fd]->get_flags () & (O_BINARY | O_TEXT);
|
2000-07-09 07:29:51 +02:00
|
|
|
}
|
|
|
|
|
2000-02-17 20:38:33 +01:00
|
|
|
/* Set a file descriptor into text or binary mode, returning the
|
|
|
|
previous mode. */
|
|
|
|
|
2000-07-09 07:29:51 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
setmode (int fd, int mode)
|
|
|
|
{
|
2001-04-18 23:10:15 +02:00
|
|
|
if (cygheap->fdtab.not_open (fd))
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
set_errno (EBADF);
|
|
|
|
return -1;
|
|
|
|
}
|
2001-04-23 18:46:30 +02:00
|
|
|
if (mode != O_BINARY && mode != O_TEXT && mode != 0)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-04-18 23:10:15 +02:00
|
|
|
fhandler_base *p = cygheap->fdtab[fd];
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
/* Note that we have no way to indicate the case that writes are
|
|
|
|
binary but not reads, or vice-versa. These cases can arise when
|
|
|
|
using the tty or console interface. People using those
|
|
|
|
interfaces should not use setmode. */
|
|
|
|
|
|
|
|
int res;
|
|
|
|
if (p->get_w_binary () && p->get_r_binary ())
|
|
|
|
res = O_BINARY;
|
2001-04-23 19:29:33 +02:00
|
|
|
else if (p->get_w_binset () && p->get_r_binset ())
|
|
|
|
res = O_TEXT; /* Specifically set O_TEXT */
|
2000-02-17 20:38:33 +01:00
|
|
|
else
|
2001-04-23 19:29:33 +02:00
|
|
|
res = 0;
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2001-04-24 04:07:58 +02:00
|
|
|
if (!mode)
|
|
|
|
p->reset_to_open_binmode ();
|
|
|
|
else if (mode & O_BINARY)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
p->set_w_binary (1);
|
|
|
|
p->set_r_binary (1);
|
|
|
|
}
|
2001-04-24 04:07:58 +02:00
|
|
|
else
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
p->set_w_binary (0);
|
|
|
|
p->set_r_binary (0);
|
|
|
|
}
|
|
|
|
|
2000-05-24 01:52:50 +02:00
|
|
|
if (_cygwin_istext_for_stdio (fd))
|
|
|
|
setmode_mode = O_TEXT;
|
|
|
|
else
|
|
|
|
setmode_mode = O_BINARY;
|
2000-05-19 19:15:02 +02:00
|
|
|
setmode_file = fd;
|
2001-03-03 04:56:34 +01:00
|
|
|
_fwalk (_REENT, setmode_helper);
|
2000-05-19 19:15:02 +02:00
|
|
|
|
2001-04-03 04:53:25 +02:00
|
|
|
syscall_printf ("setmode (%d<%s>, %s) returns %s\n", fd, p->get_name (),
|
|
|
|
mode & O_TEXT ? "text" : "binary",
|
|
|
|
res & O_TEXT ? "text" : "binary");
|
2000-02-17 20:38:33 +01:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* ftruncate: P96 5.6.7.1 */
|
2000-09-03 06:16:35 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
ftruncate (int fd, off_t length)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
int res = -1;
|
|
|
|
|
2001-04-18 23:10:15 +02:00
|
|
|
if (cygheap->fdtab.not_open (fd))
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
set_errno (EBADF);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2001-04-18 23:10:15 +02:00
|
|
|
HANDLE h = cygheap->fdtab[fd]->get_handle ();
|
2000-02-17 20:38:33 +01:00
|
|
|
off_t prev_loc;
|
|
|
|
|
|
|
|
if (h)
|
|
|
|
{
|
|
|
|
/* remember curr file pointer location */
|
2001-04-18 23:10:15 +02:00
|
|
|
prev_loc = cygheap->fdtab[fd]->lseek (0, SEEK_CUR);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2001-04-18 23:10:15 +02:00
|
|
|
cygheap->fdtab[fd]->lseek (length, SEEK_SET);
|
2000-02-17 20:38:33 +01:00
|
|
|
if (!SetEndOfFile (h))
|
|
|
|
{
|
|
|
|
__seterrno ();
|
|
|
|
}
|
|
|
|
else
|
|
|
|
res = 0;
|
|
|
|
|
|
|
|
/* restore original file pointer location */
|
2001-04-18 23:10:15 +02:00
|
|
|
cygheap->fdtab[fd]->lseek (prev_loc, 0);
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
syscall_printf ("%d = ftruncate (%d, %d)", res, fd, length);
|
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* truncate: Provided by SVR4 and 4.3+BSD. Not part of POSIX.1 or XPG3 */
|
2000-09-03 06:16:35 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
truncate (const char *pathname, off_t length)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
int fd;
|
|
|
|
int res = -1;
|
|
|
|
|
|
|
|
fd = open (pathname, O_RDWR);
|
|
|
|
|
|
|
|
if (fd == -1)
|
2001-08-23 04:27:01 +02:00
|
|
|
set_errno (EBADF);
|
2000-02-17 20:38:33 +01:00
|
|
|
else
|
|
|
|
{
|
|
|
|
res = ftruncate (fd, length);
|
|
|
|
close (fd);
|
|
|
|
}
|
|
|
|
syscall_printf ("%d = truncate (%s, %d)", res, pathname, length);
|
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-09-03 06:16:35 +02:00
|
|
|
extern "C" long
|
2000-02-17 20:38:33 +01:00
|
|
|
get_osfhandle (int fd)
|
|
|
|
{
|
|
|
|
long res = -1;
|
|
|
|
|
2001-04-18 23:10:15 +02:00
|
|
|
if (cygheap->fdtab.not_open (fd))
|
2001-08-23 04:27:01 +02:00
|
|
|
set_errno (EBADF);
|
2000-02-17 20:38:33 +01:00
|
|
|
else
|
2001-08-23 04:27:01 +02:00
|
|
|
res = (long) cygheap->fdtab[fd]->get_handle ();
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2001-08-23 04:27:01 +02:00
|
|
|
syscall_printf ("%d = get_osfhandle (%d)", res, fd);
|
2000-02-17 20:38:33 +01:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-09-03 06:16:35 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
statfs (const char *fname, struct statfs *sfs)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
if (!sfs)
|
|
|
|
{
|
|
|
|
set_errno (EFAULT);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-03-03 04:56:34 +01:00
|
|
|
path_conv full_path (fname, PC_SYM_FOLLOW | PC_FULL);
|
2000-02-17 20:38:33 +01:00
|
|
|
char *root = rootdir (full_path);
|
|
|
|
|
|
|
|
syscall_printf ("statfs %s", root);
|
|
|
|
|
|
|
|
DWORD spc, bps, freec, totalc;
|
|
|
|
|
|
|
|
if (!GetDiskFreeSpace (root, &spc, &bps, &freec, &totalc))
|
|
|
|
{
|
|
|
|
__seterrno ();
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
DWORD vsn, maxlen, flags;
|
|
|
|
|
|
|
|
if (!GetVolumeInformation (root, NULL, 0, &vsn, &maxlen, &flags, NULL, 0))
|
|
|
|
{
|
|
|
|
__seterrno ();
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
sfs->f_type = flags;
|
|
|
|
sfs->f_bsize = spc*bps;
|
|
|
|
sfs->f_blocks = totalc;
|
|
|
|
sfs->f_bfree = sfs->f_bavail = freec;
|
|
|
|
sfs->f_files = -1;
|
|
|
|
sfs->f_ffree = -1;
|
|
|
|
sfs->f_fsid = vsn;
|
|
|
|
sfs->f_namelen = maxlen;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-09-03 06:16:35 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
fstatfs (int fd, struct statfs *sfs)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2001-04-18 23:10:15 +02:00
|
|
|
if (cygheap->fdtab.not_open (fd))
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
set_errno (EBADF);
|
|
|
|
return -1;
|
|
|
|
}
|
2001-04-18 23:10:15 +02:00
|
|
|
fhandler_disk_file *f = (fhandler_disk_file *) cygheap->fdtab[fd];
|
2000-02-17 20:38:33 +01:00
|
|
|
return statfs (f->get_name (), sfs);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* setpgid: POSIX 4.3.3.1 */
|
2000-09-03 06:16:35 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
setpgid (pid_t pid, pid_t pgid)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
int res = -1;
|
|
|
|
if (pid == 0)
|
|
|
|
pid = getpid ();
|
|
|
|
if (pgid == 0)
|
|
|
|
pgid = pid;
|
|
|
|
|
|
|
|
if (pgid < 0)
|
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2000-07-29 18:24:59 +02:00
|
|
|
pinfo p (pid);
|
|
|
|
if (!p)
|
|
|
|
{
|
|
|
|
set_errno (ESRCH);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
/* A process may only change the process group of itself and its children */
|
|
|
|
if (p == myself || p->ppid == myself->pid)
|
|
|
|
{
|
|
|
|
p->pgid = pgid;
|
2000-10-25 05:54:50 +02:00
|
|
|
if (p->pid != p->pgid)
|
|
|
|
p->set_has_pgid_children (0);
|
2000-07-29 18:24:59 +02:00
|
|
|
res = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
set_errno (EPERM);
|
|
|
|
goto out;
|
|
|
|
}
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
out:
|
|
|
|
syscall_printf ("pid %d, pgid %d, res %d", pid, pgid, res);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-09-03 06:16:35 +02:00
|
|
|
extern "C" pid_t
|
2000-02-17 20:38:33 +01:00
|
|
|
getpgid (pid_t pid)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
if (pid == 0)
|
|
|
|
pid = getpid ();
|
|
|
|
|
2000-07-29 18:24:59 +02:00
|
|
|
pinfo p (pid);
|
2000-02-17 20:38:33 +01:00
|
|
|
if (p == 0)
|
|
|
|
{
|
|
|
|
set_errno (ESRCH);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return p->pgid;
|
|
|
|
}
|
|
|
|
|
2000-09-03 06:16:35 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
setpgrp (void)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
return setpgid (0, 0);
|
|
|
|
}
|
|
|
|
|
2000-09-03 06:16:35 +02:00
|
|
|
extern "C" pid_t
|
2000-02-17 20:38:33 +01:00
|
|
|
getpgrp (void)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
return getpgid (0);
|
|
|
|
}
|
|
|
|
|
2000-09-03 06:16:35 +02:00
|
|
|
extern "C" char *
|
2000-02-17 20:38:33 +01:00
|
|
|
ptsname (int fd)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2001-04-18 23:10:15 +02:00
|
|
|
if (cygheap->fdtab.not_open (fd))
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
set_errno (EBADF);
|
|
|
|
return 0;
|
|
|
|
}
|
2001-04-18 23:10:15 +02:00
|
|
|
return (char *) (cygheap->fdtab[fd]->ptsname ());
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* FIXME: what is this? */
|
2000-09-03 06:16:35 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
regfree ()
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* mknod was the call to create directories before the introduction
|
|
|
|
of mkdir in 4.2BSD and SVR3. Use of mknod required superuser privs
|
|
|
|
so the mkdir command had to be setuid root.
|
|
|
|
Although mknod hasn't been implemented yet, some GNU tools (e.g. the
|
|
|
|
fileutils) assume its existence so we must provide a stub that always
|
|
|
|
fails. */
|
2000-09-03 06:16:35 +02:00
|
|
|
extern "C" int
|
2001-02-09 18:17:34 +01:00
|
|
|
mknod (const char *_path, mode_t mode, dev_t dev)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
set_errno (ENOSYS);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-04-12 18:50:13 +02:00
|
|
|
extern "C" int
|
|
|
|
mkfifo (const char *_path, mode_t mode)
|
|
|
|
{
|
|
|
|
set_errno (ENOSYS);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2000-02-17 20:38:33 +01:00
|
|
|
/* setgid: POSIX 4.2.2.1 */
|
2000-09-03 06:16:35 +02:00
|
|
|
extern "C" int
|
2000-04-20 00:33:20 +02:00
|
|
|
setgid (gid_t gid)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
2000-06-16 21:36:07 +02:00
|
|
|
int ret = setegid (gid);
|
|
|
|
if (!ret)
|
2000-11-15 01:13:09 +01:00
|
|
|
cygheap->user.real_gid = myself->gid;
|
2000-06-16 21:36:07 +02:00
|
|
|
return ret;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* setuid: POSIX 4.2.2.1 */
|
2000-09-03 06:16:35 +02:00
|
|
|
extern "C" int
|
2000-04-20 00:33:20 +02:00
|
|
|
setuid (uid_t uid)
|
2000-06-16 21:36:07 +02:00
|
|
|
{
|
|
|
|
int ret = seteuid (uid);
|
|
|
|
if (!ret)
|
2000-11-15 01:13:09 +01:00
|
|
|
cygheap->user.real_uid = myself->uid;
|
|
|
|
debug_printf ("real: %d, effective: %d", cygheap->user.real_uid, myself->uid);
|
2000-06-16 21:36:07 +02:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2001-04-25 14:54:21 +02:00
|
|
|
extern struct passwd *internal_getlogin (cygheap_user &user);
|
2000-06-16 21:36:07 +02:00
|
|
|
|
|
|
|
/* seteuid: standards? */
|
2000-09-03 06:16:35 +02:00
|
|
|
extern "C" int
|
2000-06-16 21:36:07 +02:00
|
|
|
seteuid (uid_t uid)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2001-08-04 23:10:52 +02:00
|
|
|
if (iswinnt)
|
2000-04-20 00:33:20 +02:00
|
|
|
{
|
2001-06-09 23:25:55 +02:00
|
|
|
char orig_username[UNLEN + 1];
|
|
|
|
char orig_domain[INTERNET_MAX_HOST_NAME_LENGTH + 1];
|
|
|
|
char username[UNLEN + 1];
|
|
|
|
DWORD ulen = UNLEN + 1;
|
|
|
|
char domain[INTERNET_MAX_HOST_NAME_LENGTH + 1];
|
|
|
|
DWORD dlen = INTERNET_MAX_HOST_NAME_LENGTH + 1;
|
|
|
|
SID_NAME_USE use;
|
|
|
|
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
if (uid == (uid_t) -1 || uid == myself->uid)
|
2000-07-26 19:48:49 +02:00
|
|
|
{
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
debug_printf ("new euid == current euid, nothing happens");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
struct passwd *pw_new = getpwuid (uid);
|
|
|
|
if (!pw_new)
|
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
2000-07-26 19:48:49 +02:00
|
|
|
|
2001-06-09 23:25:55 +02:00
|
|
|
cygsid tok_usersid;
|
|
|
|
DWORD siz;
|
|
|
|
|
|
|
|
char *env;
|
|
|
|
orig_username[0] = orig_domain[0] = '\0';
|
|
|
|
if ((env = getenv ("USERNAME")))
|
|
|
|
strncat (orig_username, env, UNLEN + 1);
|
|
|
|
if ((env = getenv ("USERDOMAIN")))
|
|
|
|
strncat (orig_domain, env, INTERNET_MAX_HOST_NAME_LENGTH + 1);
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
if (uid == cygheap->user.orig_uid)
|
|
|
|
{
|
2001-06-09 23:25:55 +02:00
|
|
|
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
debug_printf ("RevertToSelf () (uid == orig_uid, token=%d)",
|
|
|
|
cygheap->user.token);
|
|
|
|
RevertToSelf ();
|
|
|
|
if (cygheap->user.token != INVALID_HANDLE_VALUE)
|
|
|
|
cygheap->user.impersonated = FALSE;
|
2001-06-09 23:25:55 +02:00
|
|
|
|
|
|
|
HANDLE ptok = INVALID_HANDLE_VALUE;
|
|
|
|
if (!OpenProcessToken (GetCurrentProcess (), TOKEN_QUERY, &ptok))
|
|
|
|
debug_printf ("OpenProcessToken(): %E\n");
|
|
|
|
else if (!GetTokenInformation (ptok, TokenUser, &tok_usersid,
|
|
|
|
sizeof tok_usersid, &siz))
|
|
|
|
debug_printf ("GetTokenInformation(): %E");
|
|
|
|
else if (!LookupAccountSid (NULL, tok_usersid, username, &ulen,
|
|
|
|
domain, &dlen, &use))
|
|
|
|
debug_printf ("LookupAccountSid(): %E");
|
|
|
|
else
|
|
|
|
{
|
|
|
|
setenv ("USERNAME", username, 1);
|
|
|
|
setenv ("USERDOMAIN", domain, 1);
|
|
|
|
}
|
|
|
|
if (ptok != INVALID_HANDLE_VALUE)
|
|
|
|
CloseHandle (ptok);
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2001-06-09 23:25:55 +02:00
|
|
|
cygsid usersid, pgrpsid, tok_pgrpsid;
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
HANDLE sav_token = INVALID_HANDLE_VALUE;
|
|
|
|
BOOL sav_impersonation;
|
2001-05-23 17:49:22 +02:00
|
|
|
BOOL current_token_is_internal_token = FALSE;
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
BOOL explicitely_created_token = FALSE;
|
|
|
|
|
|
|
|
struct group *gr = getgrgid (myself->gid);
|
|
|
|
debug_printf ("myself->gid: %d, gr: %d", myself->gid, gr);
|
|
|
|
|
|
|
|
usersid.getfrompw (pw_new);
|
|
|
|
pgrpsid.getfromgr (gr);
|
|
|
|
|
2001-05-23 17:49:22 +02:00
|
|
|
/* Only when ntsec is ON! */
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
/* Check if new user == user of impersonation token and
|
2001-05-23 17:49:22 +02:00
|
|
|
- if reasonable - new pgrp == pgrp of impersonation token. */
|
|
|
|
if (allow_ntsec && cygheap->user.token != INVALID_HANDLE_VALUE)
|
2000-07-26 19:48:49 +02:00
|
|
|
{
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
if (!GetTokenInformation (cygheap->user.token, TokenUser,
|
|
|
|
&tok_usersid, sizeof tok_usersid, &siz))
|
|
|
|
{
|
|
|
|
debug_printf ("GetTokenInformation(): %E");
|
|
|
|
tok_usersid = NO_SID;
|
|
|
|
}
|
|
|
|
if (!GetTokenInformation (cygheap->user.token, TokenPrimaryGroup,
|
|
|
|
&tok_pgrpsid, sizeof tok_pgrpsid, &siz))
|
2001-04-30 23:19:42 +02:00
|
|
|
{
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
debug_printf ("GetTokenInformation(): %E");
|
|
|
|
tok_pgrpsid = NO_SID;
|
|
|
|
}
|
2001-05-23 17:49:22 +02:00
|
|
|
/* Check if the current user token was internally created. */
|
|
|
|
TOKEN_SOURCE ts;
|
|
|
|
if (!GetTokenInformation (cygheap->user.token, TokenSource,
|
|
|
|
&ts, sizeof ts, &siz))
|
|
|
|
debug_printf ("GetTokenInformation(): %E");
|
|
|
|
else if (!memcmp (ts.SourceName, "Cygwin.1", 8))
|
|
|
|
current_token_is_internal_token = TRUE;
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
if ((usersid && tok_usersid && usersid != tok_usersid) ||
|
2001-05-23 17:49:22 +02:00
|
|
|
/* Check for pgrp only if current token is an internal
|
|
|
|
token. Otherwise the external provided token is
|
|
|
|
very likely overwritten here. */
|
|
|
|
(current_token_is_internal_token &&
|
|
|
|
pgrpsid && tok_pgrpsid && pgrpsid != tok_pgrpsid))
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
{
|
|
|
|
/* If not, RevertToSelf and close old token. */
|
|
|
|
debug_printf ("tsid != usersid");
|
2001-04-30 23:19:42 +02:00
|
|
|
RevertToSelf ();
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
sav_token = cygheap->user.token;
|
|
|
|
sav_impersonation = cygheap->user.impersonated;
|
|
|
|
cygheap->user.token = INVALID_HANDLE_VALUE;
|
|
|
|
cygheap->user.impersonated = FALSE;
|
2001-04-30 23:19:42 +02:00
|
|
|
}
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
}
|
|
|
|
|
2001-05-23 17:49:22 +02:00
|
|
|
/* Only when ntsec is ON! */
|
2001-06-18 23:18:59 +02:00
|
|
|
/* If no impersonation token is available, try to
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
authenticate using NtCreateToken() or subauthentication. */
|
2001-05-23 17:49:22 +02:00
|
|
|
if (allow_ntsec && cygheap->user.token == INVALID_HANDLE_VALUE)
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
{
|
|
|
|
HANDLE ptok = INVALID_HANDLE_VALUE;
|
|
|
|
|
|
|
|
ptok = create_token (usersid, pgrpsid);
|
|
|
|
if (ptok != INVALID_HANDLE_VALUE)
|
|
|
|
explicitely_created_token = TRUE;
|
2001-04-30 23:19:42 +02:00
|
|
|
else
|
|
|
|
{
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
/* create_token failed. Try subauthentication. */
|
|
|
|
debug_printf ("create token failed, try subauthentication.");
|
|
|
|
ptok = subauth (pw_new);
|
|
|
|
}
|
|
|
|
if (ptok != INVALID_HANDLE_VALUE)
|
|
|
|
{
|
|
|
|
cygwin_set_impersonation_token (ptok);
|
|
|
|
/* If sav_token was internally created, destroy it. */
|
2001-05-23 17:49:22 +02:00
|
|
|
if (sav_token != INVALID_HANDLE_VALUE &&
|
|
|
|
current_token_is_internal_token)
|
|
|
|
CloseHandle (sav_token);
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
}
|
|
|
|
else if (sav_token != INVALID_HANDLE_VALUE)
|
|
|
|
cygheap->user.token = sav_token;
|
|
|
|
}
|
|
|
|
/* If no impersonation is active but an impersonation
|
|
|
|
token is available, try to impersonate. */
|
|
|
|
if (cygheap->user.token != INVALID_HANDLE_VALUE &&
|
|
|
|
!cygheap->user.impersonated)
|
|
|
|
{
|
|
|
|
debug_printf ("Impersonate (uid == %d)", uid);
|
|
|
|
RevertToSelf ();
|
2001-04-30 23:19:42 +02:00
|
|
|
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
/* If the token was explicitely created, all information has
|
|
|
|
already been set correctly. */
|
|
|
|
if (!explicitely_created_token)
|
|
|
|
{
|
|
|
|
/* Try setting owner to same value as user. */
|
|
|
|
if (usersid &&
|
|
|
|
!SetTokenInformation (cygheap->user.token, TokenOwner,
|
|
|
|
&usersid, sizeof usersid))
|
|
|
|
debug_printf ("SetTokenInformation(user.token, "
|
|
|
|
"TokenOwner): %E");
|
|
|
|
/* Try setting primary group in token to current group
|
|
|
|
if token not explicitely created. */
|
|
|
|
if (pgrpsid &&
|
|
|
|
!SetTokenInformation (cygheap->user.token,
|
|
|
|
TokenPrimaryGroup,
|
|
|
|
&pgrpsid, sizeof pgrpsid))
|
|
|
|
debug_printf ("SetTokenInformation(user.token, "
|
|
|
|
"TokenPrimaryGroup): %E");
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Now try to impersonate. */
|
2001-06-09 23:25:55 +02:00
|
|
|
if (!LookupAccountSid (NULL, usersid, username, &ulen,
|
|
|
|
domain, &dlen, &use))
|
|
|
|
debug_printf ("LookupAccountSid (): %E");
|
|
|
|
else if (!ImpersonateLoggedOnUser (cygheap->user.token))
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
system_printf ("Impersonating (%d) in set(e)uid failed: %E",
|
|
|
|
cygheap->user.token);
|
|
|
|
else
|
2001-06-09 23:25:55 +02:00
|
|
|
{
|
|
|
|
cygheap->user.impersonated = TRUE;
|
|
|
|
setenv ("USERNAME", username, 1);
|
|
|
|
setenv ("USERDOMAIN", domain, 1);
|
|
|
|
}
|
2000-07-26 19:48:49 +02:00
|
|
|
}
|
|
|
|
}
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
|
|
|
|
cygheap_user user;
|
|
|
|
/* user.token is used in internal_getlogin () to determine if
|
|
|
|
impersonation is active. If so, the token is used for
|
|
|
|
retrieving user's SID. */
|
|
|
|
user.token = cygheap->user.impersonated ? cygheap->user.token
|
|
|
|
: INVALID_HANDLE_VALUE;
|
|
|
|
struct passwd *pw_cur = internal_getlogin (user);
|
|
|
|
if (pw_cur != pw_new)
|
|
|
|
{
|
|
|
|
debug_printf ("Diffs!!! token: %d, cur: %d, new: %d, orig: %d",
|
|
|
|
cygheap->user.token, pw_cur->pw_uid,
|
|
|
|
pw_new->pw_uid, cygheap->user.orig_uid);
|
2001-06-09 23:25:55 +02:00
|
|
|
setenv ("USERNAME", orig_username, 1);
|
|
|
|
setenv ("USERDOMAIN", orig_domain, 1);
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 10:10:47 +02:00
|
|
|
set_errno (EPERM);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
myself->uid = uid;
|
|
|
|
cygheap->user = user;
|
2000-04-20 00:33:20 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
set_errno (ENOSYS);
|
2000-11-15 01:13:09 +01:00
|
|
|
debug_printf ("real: %d, effective: %d", cygheap->user.real_uid, myself->uid);
|
2000-02-17 20:38:33 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* setegid: from System V. */
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-04-20 00:33:20 +02:00
|
|
|
setegid (gid_t gid)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2001-08-04 23:10:52 +02:00
|
|
|
if (iswinnt)
|
2000-06-16 21:36:07 +02:00
|
|
|
{
|
|
|
|
if (gid != (gid_t) -1)
|
2000-07-26 19:48:49 +02:00
|
|
|
{
|
2001-04-25 11:43:25 +02:00
|
|
|
struct group *gr;
|
|
|
|
|
|
|
|
if (!(gr = getgrgid (gid)))
|
2000-07-26 19:48:49 +02:00
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
myself->gid = gid;
|
2001-04-25 11:43:25 +02:00
|
|
|
if (allow_ntsec)
|
|
|
|
{
|
|
|
|
cygsid gsid;
|
|
|
|
HANDLE ptok;
|
|
|
|
|
* fork.cc (fork): Eliminate superfluous call to getuid().
* security.h: New define `NO_SID'. Remove declarations of functions
moved to methods into class cygsid.
(class cygsid): Declare new methods `getfromstr', `get_sid',
`getfrompw', `getfromgr', `get_rid', `get_uid', `get_gid', `string'
and new constructors and operators =, == and !=.
Declare new global cygsids `well_known_XXX_sid' substituting the
corresponding `get_XXX_sid' functions. Remove declarations of
these functions.
* sec_helper.cc (well_known_admin_sid): New global variable.
(well_known_system_sid): Ditto
(well_known_creator_owner_sid): Ditto
(well_known_world_sid): Ditto
(cygsid::string): New method, substituting `convert_sid_to_string_sid'.
(cygsid::get_sid): New method, substituting `get_sid'.
(cygsid::getfromstr): New method, substituting
`convert_string_sid_to_sid'.
(cygsid::getfrompw): New method, substituting `get_pw_sid'.
(cygsid::getfromgr): New method, substituting `get_gr_sid'.
(cygsid::get_id): New method, substituting `get_id_from_sid'.
(get_admin_sid): Eliminated.
(get_system_sid): Ditto.
(get_creator_owner_sid): Ditto.
(get_world_sid): Ditto.
* grp.cc: Use new cygsid methods and well known sids throughout.
* registry.cc: Ditto.
* sec_acl.cc: Ditto.
* security.cc: Ditto.
* shared.cc: Ditto.
* syscalls.cc (seteuid): Ditto. Eliminate redundant conditional.
* uinfo.cc (internal_getlogin): Ditto.
* spawn.cc (spawn_guts) Revert previous patch.
2001-05-15 21:23:31 +02:00
|
|
|
if (gsid.getfromgr (gr))
|
2001-04-25 11:43:25 +02:00
|
|
|
{
|
|
|
|
if (!OpenProcessToken (GetCurrentProcess (),
|
|
|
|
TOKEN_ADJUST_DEFAULT,
|
|
|
|
&ptok))
|
|
|
|
debug_printf ("OpenProcessToken(): %E\n");
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (!SetTokenInformation (ptok, TokenPrimaryGroup,
|
|
|
|
&gsid, sizeof gsid))
|
|
|
|
debug_printf ("SetTokenInformation(myself, "
|
|
|
|
"TokenPrimaryGroup): %E");
|
|
|
|
CloseHandle (ptok);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2000-07-26 19:48:49 +02:00
|
|
|
}
|
2000-06-16 21:36:07 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
set_errno (ENOSYS);
|
|
|
|
return 0;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* chroot: privileged Unix system call. */
|
2000-07-19 22:14:24 +02:00
|
|
|
/* FIXME: Not privileged here. How should this be done? */
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-07-19 22:14:24 +02:00
|
|
|
chroot (const char *newroot)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-07-19 22:14:24 +02:00
|
|
|
int ret = -1;
|
2001-03-03 04:56:34 +01:00
|
|
|
path_conv path (newroot, PC_SYM_FOLLOW | PC_FULL);
|
2000-07-26 19:48:49 +02:00
|
|
|
|
2000-07-19 22:14:24 +02:00
|
|
|
if (path.error)
|
|
|
|
goto done;
|
|
|
|
if (path.file_attributes () == (DWORD)-1)
|
|
|
|
{
|
|
|
|
set_errno (ENOENT);
|
|
|
|
goto done;
|
|
|
|
}
|
2001-06-03 04:31:16 +02:00
|
|
|
if (!(path.file_attributes () & FILE_ATTRIBUTE_DIRECTORY))
|
2000-07-19 22:14:24 +02:00
|
|
|
{
|
|
|
|
set_errno (ENOTDIR);
|
|
|
|
goto done;
|
|
|
|
}
|
2001-06-03 04:31:16 +02:00
|
|
|
char buf[MAX_PATH];
|
|
|
|
normalize_posix_path (newroot, buf);
|
|
|
|
cygheap->root.set (buf, path);
|
2000-07-19 22:14:24 +02:00
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
done:
|
|
|
|
syscall_printf ("%d = chroot (%s)", ret ? get_errno () : 0,
|
2000-07-26 19:48:49 +02:00
|
|
|
newroot ? newroot : "NULL");
|
2000-07-19 22:14:24 +02:00
|
|
|
return ret;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
creat (const char *path, mode_t mode)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
return open (path, O_WRONLY | O_CREAT | O_TRUNC, mode);
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" void
|
2000-02-17 20:38:33 +01:00
|
|
|
__assertfail ()
|
|
|
|
{
|
|
|
|
exit (99);
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
getw (FILE *fp)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
int w, ret;
|
|
|
|
ret = fread (&w, sizeof (int), 1, fp);
|
|
|
|
return ret != 1 ? EOF : w;
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
putw (int w, FILE *fp)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
int ret;
|
|
|
|
ret = fwrite (&w, sizeof (int), 1, fp);
|
|
|
|
if (feof (fp) || ferror (fp))
|
|
|
|
return -1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-05-06 19:00:53 +02:00
|
|
|
wcscmp (const wchar_t *s1, const wchar_t *s2)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
while (*s1 && *s1 == *s2)
|
|
|
|
{
|
|
|
|
s1++;
|
|
|
|
s2++;
|
|
|
|
}
|
|
|
|
|
2001-03-03 04:56:34 +01:00
|
|
|
return (* (unsigned short *) s1) - (* (unsigned short *) s2);
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" size_t
|
2000-05-06 19:00:53 +02:00
|
|
|
wcslen (const wchar_t *s1)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
int l = 0;
|
|
|
|
while (s1[l])
|
|
|
|
l++;
|
|
|
|
return l;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* FIXME: to do this right, maybe work out the usoft va_list machine
|
|
|
|
and use wsvprintfW instead?
|
|
|
|
*/
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
wprintf (const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
va_start (ap, fmt);
|
|
|
|
ret = vprintf (fmt, ap);
|
|
|
|
va_end (ap);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
vhangup ()
|
|
|
|
{
|
|
|
|
set_errno (ENOSYS);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" _PTR
|
2000-02-17 20:38:33 +01:00
|
|
|
memccpy (_PTR out, const _PTR in, int c, size_t len)
|
|
|
|
{
|
|
|
|
const char *inc = (char *) in;
|
|
|
|
char *outc = (char *) out;
|
|
|
|
|
|
|
|
while (len)
|
|
|
|
{
|
|
|
|
char x = *inc++;
|
|
|
|
*outc++ = x;
|
|
|
|
if (x == c)
|
|
|
|
return outc;
|
|
|
|
len --;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
nice (int incr)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
DWORD priority[] =
|
|
|
|
{
|
|
|
|
IDLE_PRIORITY_CLASS,
|
|
|
|
IDLE_PRIORITY_CLASS,
|
|
|
|
NORMAL_PRIORITY_CLASS,
|
|
|
|
HIGH_PRIORITY_CLASS,
|
|
|
|
REALTIME_PRIORITY_CLASS,
|
|
|
|
REALTIME_PRIORITY_CLASS
|
|
|
|
};
|
|
|
|
int curr = 2;
|
|
|
|
|
|
|
|
switch (GetPriorityClass (hMainProc))
|
|
|
|
{
|
|
|
|
case IDLE_PRIORITY_CLASS:
|
|
|
|
curr = 1;
|
|
|
|
break;
|
|
|
|
case NORMAL_PRIORITY_CLASS:
|
|
|
|
curr = 2;
|
|
|
|
break;
|
|
|
|
case HIGH_PRIORITY_CLASS:
|
|
|
|
curr = 3;
|
|
|
|
break;
|
|
|
|
case REALTIME_PRIORITY_CLASS:
|
|
|
|
curr = 4;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (incr > 0)
|
|
|
|
incr = -1;
|
|
|
|
else if (incr < 0)
|
|
|
|
incr = 1;
|
|
|
|
|
|
|
|
if (SetPriorityClass (hMainProc, priority[curr + incr]) == FALSE)
|
|
|
|
{
|
|
|
|
__seterrno ();
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Find the first bit set in I.
|
|
|
|
*/
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
ffs (int i)
|
|
|
|
{
|
|
|
|
static const unsigned char table[] =
|
|
|
|
{
|
|
|
|
0,1,2,2,3,3,3,3,4,4,4,4,4,4,4,4,5,5,5,5,5,5,5,5,5,5,5,5,5,5,5,5,
|
|
|
|
6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,
|
|
|
|
7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,
|
|
|
|
7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,
|
|
|
|
8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
|
|
|
|
8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
|
|
|
|
8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
|
|
|
|
8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8
|
|
|
|
};
|
|
|
|
unsigned long int a;
|
|
|
|
unsigned long int x = i & -i;
|
|
|
|
|
|
|
|
a = x <= 0xffff ? (x <= 0xff ? 0 : 8) : (x <= 0xffffff ? 16 : 24);
|
|
|
|
|
|
|
|
return table[x >> a] + a;
|
|
|
|
}
|
|
|
|
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" void
|
2000-02-17 20:38:33 +01:00
|
|
|
login (struct utmp *ut)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
register int fd;
|
|
|
|
int currtty = ttyslot ();
|
|
|
|
|
|
|
|
if (currtty >= 0 && (fd = open (_PATH_UTMP, O_WRONLY | O_CREAT | O_BINARY,
|
|
|
|
0644)) >= 0)
|
|
|
|
{
|
|
|
|
(void) lseek (fd, (long) (currtty * sizeof (struct utmp)), SEEK_SET);
|
|
|
|
(void) write (fd, (char *) ut, sizeof (struct utmp));
|
|
|
|
(void) close (fd);
|
|
|
|
}
|
2001-03-18 22:11:25 +01:00
|
|
|
if ((fd = open (_PATH_WTMP, O_WRONLY | O_APPEND | O_BINARY, 0)) >= 0)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
(void) write (fd, (char *) ut, sizeof (struct utmp));
|
|
|
|
(void) close (fd);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* It isn't possible to use unix-style I/O function in logout code because
|
2001-03-03 04:56:34 +01:00
|
|
|
cygwin's I/O subsystem may be inaccessible at logout () call time.
|
2000-09-30 03:56:40 +02:00
|
|
|
FIXME (cgf): huh?
|
2000-02-17 20:38:33 +01:00
|
|
|
*/
|
2000-09-30 03:56:40 +02:00
|
|
|
extern "C" int
|
2000-02-17 20:38:33 +01:00
|
|
|
logout (char *line)
|
|
|
|
{
|
2000-10-12 06:38:29 +02:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-17 20:38:33 +01:00
|
|
|
int res = 0;
|
|
|
|
HANDLE ut_fd;
|
|
|
|
static const char path_utmp[] = _PATH_UTMP;
|
|
|
|
|
|
|
|
path_conv win32_path (path_utmp);
|
|
|
|
if (win32_path.error)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
ut_fd = CreateFile (win32_path.get_win32 (),
|
|
|
|
GENERIC_READ | GENERIC_WRITE,
|
|
|
|
FILE_SHARE_READ | FILE_SHARE_WRITE,
|
|
|
|
&sec_none_nih,
|
|
|
|
OPEN_EXISTING,
|
|
|
|
FILE_ATTRIBUTE_NORMAL,
|
|
|
|
NULL);
|
|
|
|
if (ut_fd != INVALID_HANDLE_VALUE)
|
|
|
|
{
|
|
|
|
struct utmp *ut;
|
|
|
|
struct utmp ut_buf[100];
|
|
|
|
off_t pos = 0; /* Position in file */
|
|
|
|
DWORD rd;
|
|
|
|
|
|
|
|
while (!res && ReadFile (ut_fd, ut_buf, sizeof ut_buf, &rd, NULL)
|
|
|
|
&& rd != 0)
|
|
|
|
{
|
2001-03-18 22:11:25 +01:00
|
|
|
struct utmp *ut_end = (struct utmp *) ((char *) ut_buf + rd);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
for (ut = ut_buf; ut < ut_end; ut++, pos += sizeof (*ut))
|
|
|
|
if (ut->ut_name[0]
|
|
|
|
&& strncmp (ut->ut_line, line, sizeof (ut->ut_line)) == 0)
|
|
|
|
/* Found the entry for LINE; mark it as logged out. */
|
|
|
|
{
|
|
|
|
/* Zero out entries describing who's logged in. */
|
|
|
|
bzero (ut->ut_name, sizeof (ut->ut_name));
|
|
|
|
bzero (ut->ut_host, sizeof (ut->ut_host));
|
|
|
|
time (&ut->ut_time);
|
|
|
|
|
|
|
|
/* Now seek back to the position in utmp at which UT occured,
|
|
|
|
and write the new version of UT there. */
|
2001-03-18 22:11:25 +01:00
|
|
|
if ((SetFilePointer (ut_fd, pos, 0, FILE_BEGIN) != 0xFFFFFFFF)
|
2000-02-17 20:38:33 +01:00
|
|
|
&& (WriteFile (ut_fd, (char *) ut, sizeof (*ut),
|
|
|
|
&rd, NULL)))
|
|
|
|
{
|
|
|
|
res = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
CloseHandle (ut_fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|