2000-02-17 20:38:33 +01:00
|
|
|
/* shared.cc: shared data area support.
|
|
|
|
|
2001-03-18 04:34:05 +01:00
|
|
|
Copyright 1996, 1997, 1998, 1999, 2000, 2001 Red Hat, Inc.
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
This file is part of Cygwin.
|
|
|
|
|
|
|
|
This software is a copyrighted work licensed under the terms of the
|
|
|
|
Cygwin license. Please consult the file "CYGWIN_LICENSE" for
|
|
|
|
details. */
|
|
|
|
|
2000-08-02 18:28:18 +02:00
|
|
|
#include "winsup.h"
|
2000-02-17 20:38:33 +01:00
|
|
|
#include <unistd.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <grp.h>
|
|
|
|
#include <pwd.h>
|
2001-10-16 01:39:33 +02:00
|
|
|
#include <errno.h>
|
2000-08-22 07:10:20 +02:00
|
|
|
#include "sync.h"
|
|
|
|
#include "sigproc.h"
|
2000-08-12 07:35:42 +02:00
|
|
|
#include "pinfo.h"
|
2001-07-26 21:22:24 +02:00
|
|
|
#include "security.h"
|
2001-04-18 23:10:15 +02:00
|
|
|
#include "fhandler.h"
|
2001-10-01 06:10:07 +02:00
|
|
|
#include "path.h"
|
2001-04-18 23:10:15 +02:00
|
|
|
#include "dtable.h"
|
2001-10-16 01:39:33 +02:00
|
|
|
#include "cygerrno.h"
|
2000-11-15 01:13:09 +01:00
|
|
|
#include "cygheap.h"
|
2001-01-29 01:46:25 +01:00
|
|
|
#include "heap.h"
|
2001-12-26 05:53:34 +01:00
|
|
|
#include "shared_info_magic.h"
|
2000-09-08 04:56:55 +02:00
|
|
|
#include "registry.h"
|
|
|
|
#include "cygwin_version.h"
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
shared_info NO_COPY *cygwin_shared = NULL;
|
2001-01-28 06:51:15 +01:00
|
|
|
mount_info NO_COPY *mount_table = NULL;
|
2001-09-06 06:41:59 +02:00
|
|
|
HANDLE cygwin_mount_h;
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
/* General purpose security attribute objects for global use. */
|
|
|
|
SECURITY_ATTRIBUTES NO_COPY sec_none;
|
|
|
|
SECURITY_ATTRIBUTES NO_COPY sec_none_nih;
|
|
|
|
SECURITY_ATTRIBUTES NO_COPY sec_all;
|
|
|
|
SECURITY_ATTRIBUTES NO_COPY sec_all_nih;
|
|
|
|
|
|
|
|
char * __stdcall
|
|
|
|
shared_name (const char *str, int num)
|
|
|
|
{
|
|
|
|
static NO_COPY char buf[MAX_PATH] = {0};
|
2001-09-03 04:13:05 +02:00
|
|
|
extern bool _cygwin_testing;
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
__small_sprintf (buf, "%s.%s.%d", cygwin_version.shared_id, str, num);
|
2001-09-03 04:13:05 +02:00
|
|
|
if (!_cygwin_testing)
|
2001-03-18 22:11:25 +01:00
|
|
|
strcat (buf, cygwin_version.dll_build_date);
|
2000-02-17 20:38:33 +01:00
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
void * __stdcall
|
2001-10-24 23:56:54 +02:00
|
|
|
open_shared (const char *name, int n, HANDLE &shared_h, DWORD size, void *addr)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
void *shared;
|
|
|
|
|
|
|
|
if (!shared_h)
|
|
|
|
{
|
|
|
|
char *mapname;
|
|
|
|
if (!name)
|
|
|
|
mapname = NULL;
|
|
|
|
else
|
|
|
|
{
|
2001-10-24 23:56:54 +02:00
|
|
|
mapname = shared_name (name, n);
|
2000-02-17 20:38:33 +01:00
|
|
|
shared_h = OpenFileMappingA (FILE_MAP_READ | FILE_MAP_WRITE,
|
|
|
|
TRUE, mapname);
|
|
|
|
}
|
|
|
|
if (!shared_h &&
|
2001-01-30 09:10:04 +01:00
|
|
|
!(shared_h = CreateFileMappingA (INVALID_HANDLE_VALUE,
|
2000-02-17 20:38:33 +01:00
|
|
|
&sec_all,
|
|
|
|
PAGE_READWRITE,
|
|
|
|
0,
|
|
|
|
size,
|
|
|
|
mapname)))
|
|
|
|
api_fatal ("CreateFileMappingA, %E. Terminating.");
|
|
|
|
}
|
|
|
|
|
|
|
|
shared = (shared_info *) MapViewOfFileEx (shared_h,
|
|
|
|
FILE_MAP_READ | FILE_MAP_WRITE,
|
|
|
|
0, 0, 0, addr);
|
|
|
|
|
|
|
|
if (!shared)
|
|
|
|
{
|
|
|
|
/* Probably win95, so try without specifying the address. */
|
|
|
|
shared = (shared_info *) MapViewOfFileEx (shared_h,
|
|
|
|
FILE_MAP_READ|FILE_MAP_WRITE,
|
2001-07-17 05:41:52 +02:00
|
|
|
0, 0, 0, 0);
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!shared)
|
2001-01-28 06:51:15 +01:00
|
|
|
api_fatal ("MapViewOfFileEx '%s'(%p), %E. Terminating.", name, shared_h);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2001-01-28 06:51:15 +01:00
|
|
|
debug_printf ("name %s, shared %p (wanted %p), h %p", name, shared, addr, shared_h);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
/* FIXME: I couldn't find anywhere in the documentation a note about
|
|
|
|
whether the memory is initialized to zero. The code assumes it does
|
|
|
|
and since this part seems to be working, we'll leave it as is. */
|
|
|
|
return shared;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
shared_info::initialize ()
|
|
|
|
{
|
2001-12-26 22:35:16 +01:00
|
|
|
if (version)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
2001-12-26 22:35:16 +01:00
|
|
|
if (version != SHARED_VERSION_MAGIC)
|
|
|
|
multiple_cygwin_problem ("shared", version, SHARED_VERSION);
|
|
|
|
else if (cb != SHARED_INFO_CB)
|
|
|
|
multiple_cygwin_problem ("shared size", cb, SHARED_INFO_CB);
|
2000-02-17 20:38:33 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize the queue of deleted files. */
|
|
|
|
delqueue.init ();
|
|
|
|
|
|
|
|
/* Initialize tty table. */
|
|
|
|
tty.init ();
|
2001-12-26 22:35:16 +01:00
|
|
|
version = SHARED_VERSION_MAGIC;
|
|
|
|
cb = sizeof (*this);
|
|
|
|
if (cb != SHARED_INFO_CB)
|
|
|
|
system_printf ("size of shared memory region changed from %u to %u",
|
|
|
|
SHARED_INFO_CB, cb);
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void __stdcall
|
2001-01-29 01:46:25 +01:00
|
|
|
memory_init ()
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
2001-01-29 01:46:25 +01:00
|
|
|
/* Initialize general shared memory */
|
2001-01-28 06:51:15 +01:00
|
|
|
HANDLE shared_h = cygheap ? cygheap->shared_h : NULL;
|
|
|
|
cygwin_shared = (shared_info *) open_shared ("shared",
|
2001-10-24 23:56:54 +02:00
|
|
|
CYGWIN_VERSION_SHARED_DATA,
|
2001-01-28 06:51:15 +01:00
|
|
|
shared_h,
|
|
|
|
sizeof (*cygwin_shared),
|
|
|
|
cygwin_shared_address);
|
|
|
|
|
2001-01-29 01:46:25 +01:00
|
|
|
cygwin_shared->initialize ();
|
|
|
|
|
|
|
|
/* Allocate memory for the per-user mount table */
|
2001-04-30 20:21:48 +02:00
|
|
|
char user_name[UNLEN + 1];
|
|
|
|
DWORD user_name_len = UNLEN + 1;
|
2001-01-29 01:46:25 +01:00
|
|
|
|
|
|
|
if (!GetUserName (user_name, &user_name_len))
|
|
|
|
strcpy (user_name, "unknown");
|
|
|
|
|
|
|
|
/* Initialize the Cygwin heap, if necessary */
|
|
|
|
if (!cygheap)
|
|
|
|
{
|
|
|
|
cygheap_init ();
|
|
|
|
cygheap->user.set_name (user_name);
|
|
|
|
}
|
2001-09-07 23:32:07 +02:00
|
|
|
|
2001-01-28 06:51:15 +01:00
|
|
|
cygheap->shared_h = shared_h;
|
|
|
|
ProtectHandle (cygheap->shared_h);
|
2001-01-29 01:46:25 +01:00
|
|
|
|
2001-09-07 23:32:07 +02:00
|
|
|
heap_init ();
|
2001-10-24 23:56:54 +02:00
|
|
|
mount_table = (mount_info *) open_shared (user_name, MOUNT_VERSION,
|
2001-11-05 07:09:15 +01:00
|
|
|
cygwin_mount_h,
|
2001-09-07 23:32:07 +02:00
|
|
|
sizeof (mount_info), 0);
|
|
|
|
debug_printf ("opening mount table for '%s' at %p", cygheap->user.name (),
|
|
|
|
mount_table_address);
|
|
|
|
ProtectHandle (cygwin_mount_h);
|
|
|
|
debug_printf ("mount table version %x at %p", mount_table->version, mount_table);
|
|
|
|
|
2001-01-29 01:46:25 +01:00
|
|
|
/* Initialize the Cygwin per-user mount table, if necessary */
|
|
|
|
if (!mount_table->version)
|
|
|
|
{
|
2001-12-26 05:53:34 +01:00
|
|
|
mount_table->version = MOUNT_VERSION_MAGIC;
|
2001-01-29 01:46:25 +01:00
|
|
|
debug_printf ("initializing mount table");
|
2001-12-26 22:35:16 +01:00
|
|
|
mount_table->cb = sizeof (*mount_table);
|
|
|
|
if (mount_table->cb != MOUNT_INFO_CB)
|
|
|
|
system_printf ("size of mount table region changed from %u to %u",
|
|
|
|
MOUNT_INFO_CB, mount_table->cb);
|
2001-01-29 01:46:25 +01:00
|
|
|
mount_table->init (); /* Initialize the mount table. */
|
|
|
|
}
|
2001-12-26 05:53:34 +01:00
|
|
|
else if (mount_table->version != MOUNT_VERSION_MAGIC)
|
|
|
|
multiple_cygwin_problem ("mount", mount_table->version, MOUNT_VERSION);
|
2001-12-26 22:35:16 +01:00
|
|
|
else if (mount_table->cb != MOUNT_INFO_CB)
|
|
|
|
multiple_cygwin_problem ("mount table size", mount_table->cb, MOUNT_INFO_CB);
|
2001-10-24 23:56:54 +02:00
|
|
|
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void __stdcall
|
|
|
|
shared_terminate ()
|
|
|
|
{
|
2001-01-28 06:51:15 +01:00
|
|
|
if (cygheap->shared_h)
|
|
|
|
ForceCloseHandle (cygheap->shared_h);
|
|
|
|
if (cygwin_mount_h)
|
|
|
|
ForceCloseHandle (cygwin_mount_h);
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
unsigned
|
|
|
|
shared_info::heap_chunk_size ()
|
|
|
|
{
|
2001-09-09 21:06:50 +02:00
|
|
|
if (!heap_chunk_in_mb)
|
|
|
|
{
|
|
|
|
/* Fetch misc. registry entries. */
|
|
|
|
|
|
|
|
reg_key reg (KEY_READ, NULL);
|
|
|
|
|
|
|
|
/* Note that reserving a huge amount of heap space does not result in
|
|
|
|
the use of swap since we are not committing it. */
|
|
|
|
/* FIXME: We should not be restricted to a fixed size heap no matter
|
|
|
|
what the fixed size is. */
|
|
|
|
|
|
|
|
heap_chunk_in_mb = reg.get_int ("heap_chunk_in_mb", 256);
|
|
|
|
if (heap_chunk_in_mb < 4)
|
|
|
|
{
|
|
|
|
heap_chunk_in_mb = 4;
|
|
|
|
reg.set_int ("heap_chunk_in_mb", heap_chunk_in_mb);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-02-17 20:38:33 +01:00
|
|
|
return heap_chunk_in_mb << 20;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Function to return a common SECURITY_DESCRIPTOR * that
|
|
|
|
* allows all access.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static NO_COPY SECURITY_DESCRIPTOR *null_sdp = 0;
|
|
|
|
|
|
|
|
SECURITY_DESCRIPTOR *__stdcall
|
|
|
|
get_null_sd ()
|
|
|
|
{
|
|
|
|
static NO_COPY SECURITY_DESCRIPTOR sd;
|
|
|
|
|
|
|
|
if (null_sdp == 0)
|
|
|
|
{
|
|
|
|
InitializeSecurityDescriptor (&sd, SECURITY_DESCRIPTOR_REVISION);
|
|
|
|
SetSecurityDescriptorDacl (&sd, TRUE, 0, FALSE);
|
|
|
|
null_sdp = &sd;
|
|
|
|
}
|
|
|
|
return null_sdp;
|
|
|
|
}
|
|
|
|
|
|
|
|
PSECURITY_ATTRIBUTES __stdcall
|
|
|
|
sec_user (PVOID sa_buf, PSID sid2, BOOL inherit)
|
|
|
|
{
|
2002-02-16 18:47:48 +01:00
|
|
|
if (!sa_buf)
|
2002-02-17 05:59:55 +01:00
|
|
|
return inherit ? &sec_none : &sec_none_nih;
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
PSECURITY_ATTRIBUTES psa = (PSECURITY_ATTRIBUTES) sa_buf;
|
|
|
|
PSECURITY_DESCRIPTOR psd = (PSECURITY_DESCRIPTOR)
|
2000-09-03 06:16:35 +02:00
|
|
|
((char *) sa_buf + sizeof (*psa));
|
2000-02-17 20:38:33 +01:00
|
|
|
PACL acl = (PACL) ((char *) sa_buf + sizeof (*psa) + sizeof (*psd));
|
|
|
|
|
2001-04-25 11:43:25 +02:00
|
|
|
cygsid sid;
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2000-11-15 01:13:09 +01:00
|
|
|
if (cygheap->user.sid ())
|
2001-04-25 11:43:25 +02:00
|
|
|
sid = cygheap->user.sid ();
|
2002-02-16 18:47:48 +01:00
|
|
|
else if (!lookup_name (getlogin (), cygheap->user.logsrv (), sid))
|
2002-02-17 05:59:55 +01:00
|
|
|
return inherit ? &sec_none : &sec_none_nih;
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
size_t acl_len = sizeof (ACL)
|
2000-09-03 06:16:35 +02:00
|
|
|
+ 4 * (sizeof (ACCESS_ALLOWED_ACE) - sizeof (DWORD))
|
|
|
|
+ GetLengthSid (sid)
|
2001-07-16 00:40:07 +02:00
|
|
|
+ GetLengthSid (well_known_admins_sid)
|
* fork.cc (fork): Eliminate superfluous call to getuid().
* security.h: New define `NO_SID'. Remove declarations of functions
moved to methods into class cygsid.
(class cygsid): Declare new methods `getfromstr', `get_sid',
`getfrompw', `getfromgr', `get_rid', `get_uid', `get_gid', `string'
and new constructors and operators =, == and !=.
Declare new global cygsids `well_known_XXX_sid' substituting the
corresponding `get_XXX_sid' functions. Remove declarations of
these functions.
* sec_helper.cc (well_known_admin_sid): New global variable.
(well_known_system_sid): Ditto
(well_known_creator_owner_sid): Ditto
(well_known_world_sid): Ditto
(cygsid::string): New method, substituting `convert_sid_to_string_sid'.
(cygsid::get_sid): New method, substituting `get_sid'.
(cygsid::getfromstr): New method, substituting
`convert_string_sid_to_sid'.
(cygsid::getfrompw): New method, substituting `get_pw_sid'.
(cygsid::getfromgr): New method, substituting `get_gr_sid'.
(cygsid::get_id): New method, substituting `get_id_from_sid'.
(get_admin_sid): Eliminated.
(get_system_sid): Ditto.
(get_creator_owner_sid): Ditto.
(get_world_sid): Ditto.
* grp.cc: Use new cygsid methods and well known sids throughout.
* registry.cc: Ditto.
* sec_acl.cc: Ditto.
* security.cc: Ditto.
* shared.cc: Ditto.
* syscalls.cc (seteuid): Ditto. Eliminate redundant conditional.
* uinfo.cc (internal_getlogin): Ditto.
* spawn.cc (spawn_guts) Revert previous patch.
2001-05-15 21:23:31 +02:00
|
|
|
+ GetLengthSid (well_known_system_sid)
|
|
|
|
+ GetLengthSid (well_known_creator_owner_sid);
|
2000-02-17 20:38:33 +01:00
|
|
|
if (sid2)
|
|
|
|
acl_len += sizeof (ACCESS_ALLOWED_ACE) - sizeof (DWORD)
|
2000-09-03 06:16:35 +02:00
|
|
|
+ GetLengthSid (sid2);
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2002-02-16 18:47:48 +01:00
|
|
|
if (!InitializeAcl (acl, acl_len, ACL_REVISION))
|
2001-03-18 22:11:25 +01:00
|
|
|
debug_printf ("InitializeAcl %E");
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2002-02-16 18:47:48 +01:00
|
|
|
if (!AddAccessAllowedAce (acl, ACL_REVISION,
|
|
|
|
SPECIFIC_RIGHTS_ALL | STANDARD_RIGHTS_ALL,
|
|
|
|
sid))
|
2001-03-18 22:11:25 +01:00
|
|
|
debug_printf ("AddAccessAllowedAce(%s) %E", getlogin ());
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2002-02-16 18:47:48 +01:00
|
|
|
if (!AddAccessAllowedAce (acl, ACL_REVISION,
|
|
|
|
SPECIFIC_RIGHTS_ALL | STANDARD_RIGHTS_ALL,
|
|
|
|
well_known_admins_sid))
|
2001-03-18 22:11:25 +01:00
|
|
|
debug_printf ("AddAccessAllowedAce(admin) %E");
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2002-02-16 18:47:48 +01:00
|
|
|
if (!AddAccessAllowedAce (acl, ACL_REVISION,
|
|
|
|
SPECIFIC_RIGHTS_ALL | STANDARD_RIGHTS_ALL,
|
|
|
|
well_known_system_sid))
|
2001-03-18 22:11:25 +01:00
|
|
|
debug_printf ("AddAccessAllowedAce(system) %E");
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2002-02-16 18:47:48 +01:00
|
|
|
if (!AddAccessAllowedAce (acl, ACL_REVISION,
|
|
|
|
SPECIFIC_RIGHTS_ALL | STANDARD_RIGHTS_ALL,
|
|
|
|
well_known_creator_owner_sid))
|
2001-03-18 22:11:25 +01:00
|
|
|
debug_printf ("AddAccessAllowedAce(creator_owner) %E");
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
if (sid2)
|
2002-02-16 18:47:48 +01:00
|
|
|
if (!AddAccessAllowedAce (acl, ACL_REVISION,
|
|
|
|
SPECIFIC_RIGHTS_ALL | STANDARD_RIGHTS_ALL,
|
|
|
|
sid2))
|
2001-03-18 22:11:25 +01:00
|
|
|
debug_printf ("AddAccessAllowedAce(sid2) %E");
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2002-02-16 18:47:48 +01:00
|
|
|
if (!InitializeSecurityDescriptor (psd, SECURITY_DESCRIPTOR_REVISION))
|
2001-03-18 22:11:25 +01:00
|
|
|
debug_printf ("InitializeSecurityDescriptor %E");
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Setting the owner lets the created security attribute not work
|
|
|
|
* on NT4 SP3 Server. Don't know why, but the function still does
|
|
|
|
* what it should do also if the owner isn't set.
|
|
|
|
*/
|
|
|
|
#if 0
|
2002-02-16 18:47:48 +01:00
|
|
|
if (!SetSecurityDescriptorOwner (psd, sid, FALSE))
|
2001-03-18 22:11:25 +01:00
|
|
|
debug_printf ("SetSecurityDescriptorOwner %E");
|
2000-02-17 20:38:33 +01:00
|
|
|
#endif
|
|
|
|
|
2002-02-16 18:47:48 +01:00
|
|
|
if (!SetSecurityDescriptorDacl (psd, TRUE, acl, FALSE))
|
2001-03-18 22:11:25 +01:00
|
|
|
debug_printf ("SetSecurityDescriptorDacl %E");
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
psa->nLength = sizeof (SECURITY_ATTRIBUTES);
|
|
|
|
psa->lpSecurityDescriptor = psd;
|
|
|
|
psa->bInheritHandle = inherit;
|
|
|
|
return psa;
|
|
|
|
}
|
|
|
|
|
|
|
|
SECURITY_ATTRIBUTES *__stdcall
|
|
|
|
sec_user_nih (PVOID sa_buf, PSID sid2)
|
|
|
|
{
|
|
|
|
return sec_user (sa_buf, sid2, FALSE);
|
|
|
|
}
|