* cygheap.cc (cygheap_root::cygheap_root): New function.
(cygheap_root::~cygheap_root): Ditto. (cygheap_root::operator=): Ditto. (cygheap_user::~cygheap_user): Ditto. (cygheap_user::set_name): Ditto. (cygheap_user::set_logsrv): Ditto. (cygheap_user::set_domain): Ditto. (cygheap_user::set_sid): Ditto. * cygheap.h (cygheap_root): New class. (cygheap_user): Ditto. (init_cygheap): Change type of `root' member to cygheap_root. Add `user' member. * dir.cc (opendir): Use new `cygheap_root' class. * dcrt0.cc (dll_crt0_1): Use new `cygheap_user' class. * fork.cc (fork_parent): Ditto. * grp.cc (getgroups): Ditto. * passwd.cc (search_for): Ditto. * path.cc: Use new `cygheap_root' class throughout. * pinfo.h (_pinfo): Remove `use_psid'. Move `username', `psid', `logsrv', `domain', `orig_{uid,gid}' and `real_{uid,gid}' to cygheap_user class. * security.cc: Use new `cygheap_user' class throughout. * shared.cc (sec_user): Ditto. * sigproc.cc (proc_subproc): Remove copy statements for user related information moved to `cygheap_user' class. * spawn.cc (spawn_guts): Invalidate current chroot settings when creating Windows environment. Use new `cygheap_user' class. * syscalls.cc: Use new `cygheap_user' class throughout. * uinfo.cc: Ditto. * uinfo.cc (internal_getlogin): Change parameters to reflect the move of user information to cygheap.
This commit is contained in:
@@ -73,24 +73,11 @@ public:
|
||||
pid_t sid; /* Session ID */
|
||||
int ctty; /* Control tty */
|
||||
bool has_pgid_children;/* True if we've forked or spawned children with our GID. */
|
||||
char username[MAX_USER_NAME]; /* user's name */
|
||||
|
||||
/* Extendend user information.
|
||||
The information is derived from the internal_getlogin call
|
||||
when on a NT system. */
|
||||
int use_psid; /* TRUE if psid contains valid data */
|
||||
char psid[MAX_SID_LEN]; /* buffer for user's SID */
|
||||
char logsrv[MAX_HOST_NAME]; /* Logon server, may be FQDN */
|
||||
char domain[MAX_COMPUTERNAME_LENGTH+1]; /* Logon domain of the user */
|
||||
|
||||
/* token is needed if sexec should be called. It can be set by a call
|
||||
to `set_impersonation_token()'. */
|
||||
HANDLE token;
|
||||
BOOL impersonated;
|
||||
uid_t orig_uid; /* Remains intact also after impersonation */
|
||||
uid_t orig_gid; /* Ditto */
|
||||
uid_t real_uid; /* Remains intact on seteuid, replaced by setuid */
|
||||
gid_t real_gid; /* Ditto */
|
||||
|
||||
/* Resources used by process. */
|
||||
long start_time;
|
||||
|
Reference in New Issue
Block a user