2000-02-18 03:38:33 +08:00
|
|
|
/* syscalls.cc: syscalls
|
|
|
|
|
2003-01-15 18:21:23 +08:00
|
|
|
Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003 Red Hat, Inc.
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
This file is part of Cygwin.
|
|
|
|
|
|
|
|
This software is a copyrighted work licensed under the terms of the
|
|
|
|
Cygwin license. Please consult the file "CYGWIN_LICENSE" for
|
|
|
|
details. */
|
|
|
|
|
2003-03-18 03:08:11 +08:00
|
|
|
#define fstat __FOOfstat__
|
2003-08-13 19:28:42 +08:00
|
|
|
#define lstat __FOOlstat__
|
2003-03-18 03:08:11 +08:00
|
|
|
#define stat __FOOstat__
|
2002-10-21 09:00:58 +08:00
|
|
|
#define _close __FOO_close__
|
|
|
|
#define _lseek __FOO_lseek__
|
|
|
|
#define _open __FOO_open__
|
|
|
|
#define _read __FOO_read__
|
|
|
|
#define _write __FOO_write__
|
2003-03-10 05:51:00 +08:00
|
|
|
#define _open64 __FOO_open64__
|
|
|
|
#define _lseek64 __FOO_lseek64__
|
|
|
|
#define _fstat64 __FOO_fstat64__
|
2002-10-21 09:00:58 +08:00
|
|
|
|
2000-08-03 00:28:18 +08:00
|
|
|
#include "winsup.h"
|
2000-02-18 03:38:33 +08:00
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/vfs.h> /* needed for statfs */
|
|
|
|
#include <pwd.h>
|
|
|
|
#include <grp.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <process.h>
|
|
|
|
#include <utmp.h>
|
|
|
|
#include <sys/uio.h>
|
|
|
|
#include <limits.h>
|
2003-03-18 03:08:11 +08:00
|
|
|
#include <unistd.h>
|
|
|
|
#include <setjmp.h>
|
2000-07-28 01:30:51 +08:00
|
|
|
#include <winnls.h>
|
2001-06-10 05:25:55 +08:00
|
|
|
#include <wininet.h>
|
2000-02-18 03:38:33 +08:00
|
|
|
#include <lmcons.h> /* for UNLEN */
|
2003-04-16 11:03:45 +08:00
|
|
|
#include <rpc.h>
|
2003-03-18 03:08:11 +08:00
|
|
|
|
|
|
|
#undef fstat
|
2003-08-13 19:28:42 +08:00
|
|
|
#undef lstat
|
2003-03-18 03:08:11 +08:00
|
|
|
#undef stat
|
|
|
|
|
2000-09-08 10:56:55 +08:00
|
|
|
#include <cygwin/version.h>
|
|
|
|
#include <sys/cygwin.h>
|
2000-08-22 13:10:20 +08:00
|
|
|
#include "cygerrno.h"
|
2001-03-05 14:28:25 +08:00
|
|
|
#include "perprocess.h"
|
2001-07-27 03:22:24 +08:00
|
|
|
#include "security.h"
|
2000-08-22 13:10:20 +08:00
|
|
|
#include "fhandler.h"
|
|
|
|
#include "path.h"
|
2000-08-12 13:35:42 +08:00
|
|
|
#include "dtable.h"
|
2000-08-22 13:10:20 +08:00
|
|
|
#include "sigproc.h"
|
2000-08-12 13:35:42 +08:00
|
|
|
#include "pinfo.h"
|
2000-09-08 00:23:51 +08:00
|
|
|
#include "shared_info.h"
|
2000-11-14 13:53:32 +08:00
|
|
|
#include "cygheap.h"
|
2002-08-18 13:49:26 +08:00
|
|
|
#define NEED_VFORK
|
|
|
|
#include "perthread.h"
|
2002-12-10 Pierre Humblet <pierre.humblet@ieee.org>
* pwdgrp.h (pwdgrp_check::pwdgrp_state): Replace by
pwdgrp_check::isinitializing ().
(pwdgrp_check::isinitializing): Create.
* passwd.cc (grab_int): Change type to unsigned, use strtoul and
set the pointer content to 0 if the field is invalid.
(parse_pwd): Move validity test after getting pw_gid.
(read_etc_passwd): Replace "passwd_state <= " by
passwd_state::isinitializing ().
(internal_getpwuid): Ditto.
(internal_getpwnam): Ditto.
(getpwent): Ditto.
(getpass): Ditto.
* grp.cc (parse_grp): Use strtoul for gr_gid and verify the validity.
(read_etc_group): Replace "group_state <= " by
group_state::isinitializing ().
(internal_getgrgid): Ditto.
(getgrent32): Ditto.
(internal_getgrent): Ditto.
2002-12-10 Pierre Humblet <pierre.humblet@ieee.org>
* security.h: Move declarations of internal_getgrent,
internal_getpwsid and internal_getgrsid to pwdgrp.h.
* pwdgrp.h: Declare internal_getpwsid, internal_getpwnam,
internal_getpwuid, internal_getgrsid, internal_getgrgid,
internal_getgrnam, internal_getgrent and internal_getgroups.
Delete "emulated" from enum pwdgrp_state.
(pwdgrp_check::isuninitialized): Create.
(pwdgrp_check::pwdgrp_state): Change state to initializing
rather than to uninitialized.
(pwdgrp_read::gets): Remove trailing CRs.
* passwd.cc (grab_string): Don't look for NLs.
(grab_int): Ditto.
(parse_pwd): Don't look for CRs. Return 0 if entry is too short.
(search_for): Delete.
(read_etc_passwd): Simplify tests to actually read the file.
Set state to loaded before making internal_getpwXX calls.
Replace search_for calls by equivalent internal_pwgetXX calls.
(internal_getpwsid): Use passwd_state.isuninitialized to decide
to call read_etc_passwd.
(internal_getpwuid): Create.
(internal_getpwnam): Create.
(getpwuid32): Simply call internal_getpwuid.
(getpwuid_r32): Call internal_getpwuid.
(getpwnam): Simply call internal_getpwnam.
(getpwnam_r): Call internal_getpwnam.
* grp.cc (parse_grp): Don't look for CRs. Adjust blank space.
(add_grp_line): Adjust blank space.
(class group_lock): Ditto.
(read_etc_group): Simplify tests to actually read the file.
Set state to loaded before making internal_getgrXX calls.
Replace getgrXX calls by equivalent internal calls.
(internal_getgrsid): Use group_state.isuninitialized to decide
to call read_etc_group.
(internal_getgrgid): Create.
(internal_getgrnam): Create.
(getgroups32): Simply call internal_getgrgid.
(getgrnam32): Simply call internal_getgrnam.
(internal_getgrent): Call group_state.isuninitialized.
(internal_getgroups): Create from the former getgroups32, using
two of the four arguments. Set gid to myself->gid and username
to cygheap->user.name ().
(getgroups32): Simply call internal_getgroup.
(getgroups): Call internal_getgroup instead of getgroups32.
(setgroups32): Call internal versions of get{pw,gr}XX.
* sec_helper.cc: Include pwdgrp.h.
(is_grp_member): Call internal versions of get{pw,gr}XX.
* security.cc: Include pwdgrp.h.
(alloc_sd): Call internal versions of get{pw,gr}XX.
* syscalls.cc: Include pwdgrp.h.
(seteuid32): Call internal versions of get{pw,gr}XX.
(setegid32): Ditto.
* uinfo.cc: Include pwdgrp.h.
(internal_getlogin): Call internal versions of get{pw,gr}XX.
(cygheap_user::ontherange): Ditto.
* sec_acl.cc: Include pwdgrp.h.
(setacl): Call internal versions of get{pw,gr}XX.
(acl_access): Ditto and simplify logic.
(aclfromtext): Ditto.
2002-12-10 20:43:49 +08:00
|
|
|
#include "pwdgrp.h"
|
2003-04-16 11:03:45 +08:00
|
|
|
#include "cpuid.h"
|
|
|
|
#include "registry.h"
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2002-10-21 09:00:58 +08:00
|
|
|
#undef _close
|
|
|
|
#undef _lseek
|
|
|
|
#undef _open
|
|
|
|
#undef _read
|
|
|
|
#undef _write
|
2003-03-10 05:51:00 +08:00
|
|
|
#undef _open64
|
|
|
|
#undef _lseek64
|
|
|
|
#undef _fstat64
|
2002-10-21 09:00:58 +08:00
|
|
|
|
2001-01-28 13:51:15 +08:00
|
|
|
SYSTEM_INFO system_info;
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Close all files and process any queued deletions.
|
|
|
|
Lots of unix style applications will open a tmp file, unlink it,
|
|
|
|
but never call close. This function is called by _exit to
|
|
|
|
ensure we don't leave any such files lying around. */
|
|
|
|
|
|
|
|
void __stdcall
|
|
|
|
close_all_files (void)
|
|
|
|
{
|
2001-04-19 05:10:15 +08:00
|
|
|
SetResourceLock (LOCK_FD_LIST, WRITE_LOCK | READ_LOCK, "close_all_files");
|
2000-10-15 09:37:07 +08:00
|
|
|
|
2000-11-03 12:27:03 +08:00
|
|
|
fhandler_base *fh;
|
2001-04-19 05:10:15 +08:00
|
|
|
for (int i = 0; i < (int) cygheap->fdtab.size; i++)
|
|
|
|
if ((fh = cygheap->fdtab[i]) != NULL)
|
2000-10-15 09:37:07 +08:00
|
|
|
{
|
2000-11-03 12:27:03 +08:00
|
|
|
fh->close ();
|
2001-04-19 05:10:15 +08:00
|
|
|
cygheap->fdtab.release (i);
|
2000-10-15 09:37:07 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-04-19 05:10:15 +08:00
|
|
|
ReleaseResourceLock (LOCK_FD_LIST, WRITE_LOCK | READ_LOCK, "close_all_files");
|
2000-02-18 03:38:33 +08:00
|
|
|
cygwin_shared->delqueue.process_queue ();
|
|
|
|
}
|
|
|
|
|
2001-09-25 05:50:44 +08:00
|
|
|
int
|
|
|
|
dup (int fd)
|
|
|
|
{
|
2002-05-23 06:09:58 +08:00
|
|
|
return cygheap->fdtab.dup2 (fd, cygheap_fdnew ());
|
2001-09-25 05:50:44 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
dup2 (int oldfd, int newfd)
|
|
|
|
{
|
|
|
|
return cygheap->fdtab.dup2 (oldfd, newfd);
|
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2002-10-21 09:00:58 +08:00
|
|
|
unlink (const char *ourname)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
int res = -1;
|
2002-06-06 00:01:55 +08:00
|
|
|
DWORD devn;
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-02-22 22:51:16 +08:00
|
|
|
path_conv win32_name (ourname, PC_SYM_NOFOLLOW | PC_FULL);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
if (win32_name.error)
|
|
|
|
{
|
|
|
|
set_errno (win32_name.error);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2002-06-06 00:01:55 +08:00
|
|
|
if ((devn = win32_name.get_devn ()) == FH_PROC || devn == FH_REGISTRY
|
|
|
|
|| devn == FH_PROCESS)
|
|
|
|
{
|
|
|
|
set_errno (EROFS);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
syscall_printf ("_unlink (%s)", win32_name.get_win32 ());
|
|
|
|
|
2001-10-01 12:10:07 +08:00
|
|
|
if (!win32_name.exists ())
|
2001-07-18 19:00:05 +08:00
|
|
|
{
|
2001-10-01 12:10:07 +08:00
|
|
|
syscall_printf ("unlinking a nonexistent file");
|
2001-07-18 19:00:05 +08:00
|
|
|
set_errno (ENOENT);
|
|
|
|
goto done;
|
|
|
|
}
|
2001-10-01 12:10:07 +08:00
|
|
|
else if (win32_name.isdir ())
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
syscall_printf ("unlinking a directory");
|
|
|
|
set_errno (EPERM);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Windows won't check the directory mode, so we do that ourselves. */
|
2000-03-18 14:26:14 +08:00
|
|
|
if (!writable_directory (win32_name))
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
syscall_printf ("non-writable directory");
|
2003-03-10 02:10:42 +08:00
|
|
|
set_errno (EPERM);
|
2000-02-18 03:38:33 +08:00
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2003-03-20 09:34:53 +08:00
|
|
|
bool setattrs;
|
|
|
|
if (!((DWORD) win32_name & (FILE_ATTRIBUTE_READONLY | FILE_ATTRIBUTE_SYSTEM)))
|
|
|
|
setattrs = false;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Allow us to delete even if read-only */
|
2003-03-23 01:48:40 +08:00
|
|
|
setattrs = SetFileAttributes (win32_name,
|
|
|
|
(DWORD) win32_name
|
|
|
|
& ~(FILE_ATTRIBUTE_READONLY
|
|
|
|
| FILE_ATTRIBUTE_SYSTEM));
|
2003-03-20 09:34:53 +08:00
|
|
|
}
|
2003-03-09 08:10:29 +08:00
|
|
|
/* Attempt to use "delete on close" semantics to handle removing
|
|
|
|
a file which may be open. */
|
|
|
|
HANDLE h;
|
2003-03-10 02:10:42 +08:00
|
|
|
h = CreateFile (win32_name, 0, FILE_SHARE_READ, &sec_none_nih,
|
2003-03-09 08:10:29 +08:00
|
|
|
OPEN_EXISTING, FILE_FLAG_DELETE_ON_CLOSE, 0);
|
|
|
|
if (h != INVALID_HANDLE_VALUE)
|
|
|
|
{
|
2003-03-20 09:34:53 +08:00
|
|
|
if (wincap.has_hard_links () && setattrs)
|
|
|
|
(void) SetFileAttributes (win32_name, (DWORD) win32_name);
|
2003-03-10 02:10:42 +08:00
|
|
|
BOOL res = CloseHandle (h);
|
|
|
|
syscall_printf ("%d = CloseHandle (%p)", res, h);
|
2003-03-20 09:34:53 +08:00
|
|
|
if (GetFileAttributes (win32_name) == INVALID_FILE_ATTRIBUTES
|
|
|
|
|| !win32_name.isremote ())
|
2003-03-10 02:10:42 +08:00
|
|
|
{
|
|
|
|
syscall_printf ("CreateFile (FILE_FLAG_DELETE_ON_CLOSE) succeeded");
|
|
|
|
goto ok;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
syscall_printf ("CreateFile (FILE_FLAG_DELETE_ON_CLOSE) failed");
|
2003-03-20 09:34:53 +08:00
|
|
|
if (setattrs)
|
|
|
|
SetFileAttributes (win32_name, (DWORD) win32_name & ~(FILE_ATTRIBUTE_READONLY | FILE_ATTRIBUTE_SYSTEM));
|
2003-03-10 02:10:42 +08:00
|
|
|
}
|
2003-03-09 08:10:29 +08:00
|
|
|
}
|
2000-05-05 03:46:32 +08:00
|
|
|
|
2003-03-10 02:10:42 +08:00
|
|
|
/* Try a delete with attributes reset */
|
2003-03-09 08:10:29 +08:00
|
|
|
if (DeleteFile (win32_name))
|
|
|
|
{
|
2003-03-23 01:48:40 +08:00
|
|
|
syscall_printf ("DeleteFile after CreateFile/CloseHandle succeeded");
|
2003-03-09 08:10:29 +08:00
|
|
|
goto ok;
|
2001-06-19 05:18:59 +08:00
|
|
|
}
|
2000-03-18 14:26:14 +08:00
|
|
|
|
2003-03-10 02:10:42 +08:00
|
|
|
DWORD lasterr;
|
|
|
|
lasterr = GetLastError ();
|
|
|
|
|
|
|
|
(void) SetFileAttributes (win32_name, (DWORD) win32_name);
|
|
|
|
|
2001-07-14 01:22:15 +08:00
|
|
|
/* Windows 9x seems to report ERROR_ACCESS_DENIED rather than sharing
|
|
|
|
violation. So, set lasterr to ERROR_SHARING_VIOLATION in this case
|
|
|
|
to simplify tests. */
|
* Makefile.in: Build wincap.o.
* wincap.cc: New file.
* wincap.h: Ditto.
* autoload.cc: Add dynamic load statement for `CreateHardLinkA'.
* dcrt0.cc (os_being_run): Eliminated.
(osname): Ditto.
(iswinnt): Ditto.
(set_os_type): Ditto.
(dll_crt0_1): Call wincap.init() instead of set_os_type().
(_dll_crt0): Ditto.
* environ.cc (set_chunksize): New function.
(parse_thing): `forkchunk' setting now invokes function `set_chunksize'.
* fork.cc (chunksize): Eliminated. Moved to be member of wincap.
* host_dependent.h: Removed.
* syscalls.cc (_link): Try using `CreateHardLinkA' first, if available.
* cygheap.cc, dcrt0.cc, delqueue.cc, dir.cc,
environ.cc, fhandler.cc, fhandler.h, fhandler_console.cc,
fhandler_mem.cc, fork.cc, mmap.cc, net.cc, pinfo.cc, pinfo.h,
security.cc, syscalls.cc, sysconf.cc, syslog.cc, thread.cc,
times.cc, tty.cc, uinfo.cc, uname.cc, winsup.h: Use new wincap
capability check throughout.
* winsup.h: Include wincap.h. Eliminate extern declarations of
`os_being_run' and `iswinnt'. Eliminate `os_type" definition.
* include/cygwin/version.h: Bump version to 1.3.4.
2001-09-13 01:46:37 +08:00
|
|
|
if (wincap.access_denied_on_delete () && lasterr == ERROR_ACCESS_DENIED
|
2001-07-14 01:22:15 +08:00
|
|
|
&& !win32_name.isremote ())
|
|
|
|
lasterr = ERROR_SHARING_VIOLATION;
|
|
|
|
|
|
|
|
/* FILE_FLAGS_DELETE_ON_CLOSE was a bust. If this is a sharing
|
|
|
|
violation, then queue the file for deletion when the process
|
|
|
|
exits. Otherwise, punt. */
|
|
|
|
if (lasterr != ERROR_SHARING_VIOLATION)
|
2001-06-19 05:18:59 +08:00
|
|
|
goto err;
|
|
|
|
|
|
|
|
syscall_printf ("couldn't delete file, err %d", lasterr);
|
|
|
|
|
|
|
|
/* Add file to the "to be deleted" queue. */
|
|
|
|
cygwin_shared->delqueue.queue_file (win32_name);
|
|
|
|
|
|
|
|
/* Success condition. */
|
|
|
|
ok:
|
|
|
|
res = 0;
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
/* Error condition. */
|
|
|
|
err:
|
|
|
|
__seterrno ();
|
|
|
|
res = -1;
|
|
|
|
|
|
|
|
done:
|
2000-02-18 03:38:33 +08:00
|
|
|
syscall_printf ("%d = unlink (%s)", res, ourname);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-12-20 04:43:41 +08:00
|
|
|
extern "C" int
|
|
|
|
remove (const char *ourname)
|
|
|
|
{
|
|
|
|
path_conv win32_name (ourname, PC_SYM_NOFOLLOW | PC_FULL);
|
|
|
|
|
|
|
|
if (win32_name.error)
|
|
|
|
{
|
|
|
|
set_errno (win32_name.error);
|
|
|
|
syscall_printf ("-1 = remove (%s)", ourname);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2002-10-21 09:00:58 +08:00
|
|
|
return win32_name.isdir () ? rmdir (ourname) : unlink (ourname);
|
2000-12-20 04:43:41 +08:00
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" pid_t
|
2002-10-20 12:15:50 +08:00
|
|
|
getpid ()
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
return myself->pid;
|
|
|
|
}
|
|
|
|
|
2002-10-20 12:15:50 +08:00
|
|
|
extern "C" pid_t
|
|
|
|
_getpid_r (struct _reent *)
|
|
|
|
{
|
|
|
|
return getpid ();
|
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* getppid: POSIX 4.1.1.1 */
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" pid_t
|
2000-02-18 03:38:33 +08:00
|
|
|
getppid ()
|
|
|
|
{
|
|
|
|
return myself->ppid;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* setsid: POSIX 4.3.2.1 */
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" pid_t
|
2000-02-18 03:38:33 +08:00
|
|
|
setsid (void)
|
|
|
|
{
|
2002-08-18 13:49:26 +08:00
|
|
|
vfork_save *vf = vfork_storage.val ();
|
|
|
|
/* This is a horrible, horrible kludge */
|
|
|
|
if (vf && vf->pid < 0)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2002-08-18 13:49:26 +08:00
|
|
|
pid_t pid = fork ();
|
|
|
|
if (pid > 0)
|
|
|
|
{
|
|
|
|
syscall_printf ("longjmping due to vfork");
|
|
|
|
vf->restore_pid (pid);
|
|
|
|
}
|
|
|
|
/* assuming that fork was successful */
|
|
|
|
}
|
|
|
|
|
|
|
|
if (myself->pgid != myself->pid)
|
|
|
|
{
|
2003-04-18 08:25:41 +08:00
|
|
|
if (myself->ctty >= 0 && fhandler_console::open_fhs <= 0)
|
2003-03-14 07:11:38 +08:00
|
|
|
{
|
2003-07-26 12:53:59 +08:00
|
|
|
syscall_printf ("freeing console");
|
2003-03-14 07:11:38 +08:00
|
|
|
FreeConsole ();
|
|
|
|
}
|
2003-04-18 08:25:41 +08:00
|
|
|
myself->ctty = -1;
|
2002-10-20 12:15:50 +08:00
|
|
|
myself->sid = getpid ();
|
|
|
|
myself->pgid = getpid ();
|
2003-07-26 12:53:59 +08:00
|
|
|
syscall_printf ("sid %d, pgid %d, ctty %d, open_fhs %d", myself->sid,
|
|
|
|
myself->pgid, myself->ctty, fhandler_console::open_fhs);
|
2000-02-18 03:38:33 +08:00
|
|
|
return myself->sid;
|
|
|
|
}
|
2002-08-18 13:49:26 +08:00
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
set_errno (EPERM);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2002-08-18 13:49:26 +08:00
|
|
|
extern "C" pid_t
|
|
|
|
getsid (pid_t pid)
|
|
|
|
{
|
|
|
|
pid_t res;
|
|
|
|
if (!pid)
|
|
|
|
res = myself->sid;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
pinfo p (pid);
|
|
|
|
if (p)
|
|
|
|
res = p->sid;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
set_errno (ESRCH);
|
|
|
|
res = -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2001-03-08 04:52:33 +08:00
|
|
|
extern "C" ssize_t
|
2002-10-21 09:00:58 +08:00
|
|
|
read (int fd, void *ptr, size_t len)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2002-11-29 15:05:26 +08:00
|
|
|
const iovec iov =
|
2002-08-30 23:47:10 +08:00
|
|
|
{
|
|
|
|
iov_base: ptr,
|
|
|
|
iov_len: len
|
|
|
|
};
|
|
|
|
|
|
|
|
return readv (fd, &iov, 1);
|
|
|
|
}
|
2001-10-24 12:16:45 +08:00
|
|
|
|
2002-10-21 09:00:58 +08:00
|
|
|
extern "C" ssize_t _read (int, void *, size_t)
|
|
|
|
__attribute__ ((alias ("read")));
|
|
|
|
|
2002-08-30 23:47:10 +08:00
|
|
|
extern "C" ssize_t
|
2002-10-21 09:00:58 +08:00
|
|
|
write (int fd, const void *ptr, size_t len)
|
2002-08-30 23:47:10 +08:00
|
|
|
{
|
|
|
|
const struct iovec iov =
|
|
|
|
{
|
|
|
|
iov_base: (void *) ptr, // const_cast
|
|
|
|
iov_len: len
|
|
|
|
};
|
|
|
|
|
|
|
|
return writev (fd, &iov, 1);
|
|
|
|
}
|
2001-10-19 10:27:19 +08:00
|
|
|
|
2002-10-21 09:00:58 +08:00
|
|
|
extern "C" ssize_t _write (int fd, const void *ptr, size_t len)
|
|
|
|
__attribute__ ((alias ("write")));
|
|
|
|
|
2002-08-30 23:47:10 +08:00
|
|
|
extern "C" ssize_t
|
|
|
|
readv (int fd, const struct iovec *const iov, const int iovcnt)
|
|
|
|
{
|
2000-10-15 09:37:07 +08:00
|
|
|
extern int sigcatchers;
|
2002-08-30 23:47:10 +08:00
|
|
|
const int e = get_errno ();
|
|
|
|
|
|
|
|
int res = -1;
|
|
|
|
|
|
|
|
const ssize_t tot = check_iovec_for_read (iov, iovcnt);
|
|
|
|
|
|
|
|
if (tot <= 0)
|
|
|
|
{
|
|
|
|
res = tot;
|
|
|
|
goto done;
|
|
|
|
}
|
2001-01-12 13:38:25 +08:00
|
|
|
|
2001-04-01 08:06:17 +08:00
|
|
|
while (1)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2003-08-19 12:10:42 +08:00
|
|
|
sig_dispatch_pending ();
|
2001-04-01 08:06:17 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
if (cfd < 0)
|
2002-08-30 23:47:10 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
if ((cfd->get_flags () & O_ACCMODE) == O_WRONLY)
|
|
|
|
{
|
|
|
|
set_errno (EBADF);
|
|
|
|
break;
|
|
|
|
}
|
2000-09-26 00:36:12 +08:00
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
DWORD wait = cfd->is_nonblocking () ? 0 : INFINITE;
|
2000-09-26 00:36:12 +08:00
|
|
|
|
2001-04-01 08:06:17 +08:00
|
|
|
/* Could block, so let user know we at least got here. */
|
2002-08-30 23:47:10 +08:00
|
|
|
syscall_printf ("readv (%d, %p, %d) %sblocking, sigcatchers %d",
|
|
|
|
fd, iov, iovcnt, wait ? "" : "non", sigcatchers);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-11-02 07:48:34 +08:00
|
|
|
if (wait && (!cfd->is_slow () || cfd->get_r_no_interrupt ()))
|
2002-09-30 12:35:18 +08:00
|
|
|
debug_printf ("no need to call ready_for_read");
|
2001-11-04 10:31:58 +08:00
|
|
|
else if (!cfd->ready_for_read (fd, wait))
|
2001-04-01 08:06:17 +08:00
|
|
|
{
|
|
|
|
res = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2001-11-02 07:48:34 +08:00
|
|
|
/* FIXME: This is not thread safe. We need some method to
|
2001-11-05 14:09:15 +08:00
|
|
|
ensure that an fd, closed in another thread, aborts I/O
|
2001-11-02 07:48:34 +08:00
|
|
|
operations. */
|
2002-08-02 10:10:24 +08:00
|
|
|
if (!cfd.isopen ())
|
2002-08-30 23:47:10 +08:00
|
|
|
break;
|
2001-10-31 08:55:32 +08:00
|
|
|
|
2001-04-01 08:06:17 +08:00
|
|
|
/* Check to see if this is a background read from a "tty",
|
|
|
|
sending a SIGTTIN, if appropriate */
|
2001-10-16 07:39:33 +08:00
|
|
|
res = cfd->bg_check (SIGTTIN);
|
2001-11-02 07:48:34 +08:00
|
|
|
|
2002-07-29 11:18:41 +08:00
|
|
|
if (!cfd.isopen ())
|
2002-08-30 23:47:10 +08:00
|
|
|
{
|
|
|
|
res = -1;
|
|
|
|
break;
|
|
|
|
}
|
2001-11-02 07:48:34 +08:00
|
|
|
|
2001-04-01 08:06:17 +08:00
|
|
|
if (res > bg_eof)
|
|
|
|
{
|
|
|
|
myself->process_state |= PID_TTYIN;
|
2002-08-02 10:10:24 +08:00
|
|
|
if (!cfd.isopen ())
|
2002-08-30 23:47:10 +08:00
|
|
|
{
|
|
|
|
res = -1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
res = cfd->readv (iov, iovcnt, tot);
|
2001-04-01 08:06:17 +08:00
|
|
|
myself->process_state &= ~PID_TTYIN;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
2001-04-02 08:18:29 +08:00
|
|
|
if (res >= 0 || get_errno () != EINTR || !thisframe.call_signal_handler ())
|
2001-04-01 08:06:17 +08:00
|
|
|
break;
|
2001-09-12 13:09:24 +08:00
|
|
|
set_errno (e);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2002-08-30 23:47:10 +08:00
|
|
|
done:
|
|
|
|
syscall_printf ("%d = readv (%d, %p, %d), errno %d", res, fd, iov, iovcnt,
|
2001-11-05 14:09:15 +08:00
|
|
|
get_errno ());
|
2000-02-18 03:38:33 +08:00
|
|
|
MALLOC_CHECK;
|
2000-09-26 00:36:12 +08:00
|
|
|
return res;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2001-03-08 04:52:33 +08:00
|
|
|
extern "C" ssize_t
|
2002-08-30 23:47:10 +08:00
|
|
|
writev (const int fd, const struct iovec *const iov, const int iovcnt)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
int res = -1;
|
2003-08-19 12:10:42 +08:00
|
|
|
sig_dispatch_pending ();
|
2002-08-30 23:47:10 +08:00
|
|
|
const ssize_t tot = check_iovec_for_write (iov, iovcnt);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-10-19 10:27:19 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
if (cfd < 0)
|
|
|
|
goto done;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2002-08-30 23:47:10 +08:00
|
|
|
if (tot <= 0)
|
2001-11-15 11:25:52 +08:00
|
|
|
{
|
2002-08-30 23:47:10 +08:00
|
|
|
res = tot;
|
2001-11-15 11:25:52 +08:00
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2002-08-30 23:47:10 +08:00
|
|
|
if ((cfd->get_flags () & O_ACCMODE) == O_RDONLY)
|
|
|
|
{
|
|
|
|
set_errno (EBADF);
|
|
|
|
goto done;
|
|
|
|
}
|
2001-11-15 11:25:52 +08:00
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Could block, so let user know we at least got here. */
|
|
|
|
if (fd == 1 || fd == 2)
|
2002-08-30 23:47:10 +08:00
|
|
|
paranoid_printf ("writev (%d, %p, %d)", fd, iov, iovcnt);
|
2000-02-18 03:38:33 +08:00
|
|
|
else
|
2002-08-30 23:47:10 +08:00
|
|
|
syscall_printf ("writev (%d, %p, %d)", fd, iov, iovcnt);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
res = cfd->bg_check (SIGTTOU);
|
2001-09-03 10:13:05 +08:00
|
|
|
|
2001-01-17 22:57:09 +08:00
|
|
|
if (res > bg_eof)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
myself->process_state |= PID_TTYOU;
|
2002-08-30 23:47:10 +08:00
|
|
|
res = cfd->writev (iov, iovcnt, tot);
|
2000-02-18 03:38:33 +08:00
|
|
|
myself->process_state &= ~PID_TTYOU;
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
if (fd == 1 || fd == 2)
|
2002-08-30 23:47:10 +08:00
|
|
|
paranoid_printf ("%d = write (%d, %p, %d), errno %d",
|
|
|
|
res, fd, iov, iovcnt, get_errno ());
|
2000-02-18 03:38:33 +08:00
|
|
|
else
|
2002-08-30 23:47:10 +08:00
|
|
|
syscall_printf ("%d = write (%d, %p, %d), errno %d",
|
|
|
|
res, fd, iov, iovcnt, get_errno ());
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2002-08-30 23:47:10 +08:00
|
|
|
MALLOC_CHECK;
|
|
|
|
return res;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* _open */
|
|
|
|
/* newlib's fcntl.h defines _open as taking variable args so we must
|
|
|
|
correspond. The third arg if it exists is: mode_t mode. */
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2002-10-21 09:00:58 +08:00
|
|
|
open (const char *unix_path, int flags, ...)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
int res = -1;
|
|
|
|
va_list ap;
|
|
|
|
mode_t mode = 0;
|
2003-08-19 12:10:42 +08:00
|
|
|
sig_dispatch_pending ();
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
syscall_printf ("open (%s, %p)", unix_path, flags);
|
2001-06-28 10:19:57 +08:00
|
|
|
if (!check_null_empty_str_errno (unix_path))
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
/* check for optional mode argument */
|
|
|
|
va_start (ap, flags);
|
|
|
|
mode = va_arg (ap, mode_t);
|
|
|
|
va_end (ap);
|
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
fhandler_base *fh;
|
|
|
|
cygheap_fdnew fd;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-11-03 11:32:27 +08:00
|
|
|
if (fd >= 0)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-09-23 05:44:07 +08:00
|
|
|
path_conv pc;
|
2001-10-03 11:49:26 +08:00
|
|
|
if (!(fh = cygheap->fdtab.build_fhandler_from_name (fd, unix_path,
|
2001-11-05 14:09:15 +08:00
|
|
|
NULL, pc)))
|
2001-09-23 05:44:07 +08:00
|
|
|
res = -1; // errno already set
|
2001-10-04 10:34:20 +08:00
|
|
|
else if (!fh->open (&pc, flags, (mode & 07777) & ~cygheap->umask))
|
2001-09-23 05:44:07 +08:00
|
|
|
{
|
2001-10-16 07:39:33 +08:00
|
|
|
fd.release ();
|
2001-09-25 05:50:44 +08:00
|
|
|
res = -1;
|
2001-09-23 05:44:07 +08:00
|
|
|
}
|
2001-09-25 05:50:44 +08:00
|
|
|
else if ((res = fd) <= 2)
|
|
|
|
set_std_handle (res);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
syscall_printf ("%d = open (%s, %p)", res, unix_path, flags);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2002-10-21 09:00:58 +08:00
|
|
|
extern "C" int _open (const char *, int flags, ...)
|
|
|
|
__attribute__ ((alias ("open")));
|
|
|
|
|
2003-03-10 05:51:00 +08:00
|
|
|
extern "C" int _open64 (const char *, int flags, ...)
|
|
|
|
__attribute__ ((alias ("open")));
|
|
|
|
|
2003-04-02 00:11:41 +08:00
|
|
|
extern "C" _off64_t
|
|
|
|
lseek64 (int fd, _off64_t pos, int dir)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2003-04-02 00:11:41 +08:00
|
|
|
_off64_t res;
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-03-03 11:56:34 +08:00
|
|
|
if (dir != SEEK_SET && dir != SEEK_CUR && dir != SEEK_END)
|
2001-02-17 02:49:20 +08:00
|
|
|
{
|
2001-03-03 11:56:34 +08:00
|
|
|
set_errno (EINVAL);
|
2001-02-17 02:49:20 +08:00
|
|
|
res = -1;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
else
|
|
|
|
{
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
if (cfd >= 0)
|
|
|
|
res = cfd->lseek (pos, dir);
|
|
|
|
else
|
|
|
|
res = -1;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2002-02-26 01:47:51 +08:00
|
|
|
syscall_printf ("%d = lseek (%d, %D, %d)", res, fd, pos, dir);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2003-04-02 00:11:41 +08:00
|
|
|
extern "C" int _lseek64 (int fd, _off64_t pos, int dir)
|
2003-03-10 05:51:00 +08:00
|
|
|
__attribute__ ((alias ("lseek64")));
|
|
|
|
|
2003-04-02 00:11:41 +08:00
|
|
|
extern "C" _off_t
|
|
|
|
lseek (int fd, _off_t pos, int dir)
|
2002-02-26 01:47:51 +08:00
|
|
|
{
|
2003-04-02 00:11:41 +08:00
|
|
|
return lseek64 (fd, (_off64_t) pos, dir);
|
2002-02-26 01:47:51 +08:00
|
|
|
}
|
|
|
|
|
2003-04-02 00:11:41 +08:00
|
|
|
extern "C" _off_t _lseek (int, _off_t, int)
|
2002-10-21 09:00:58 +08:00
|
|
|
__attribute__ ((alias ("lseek")));
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2002-10-21 09:00:58 +08:00
|
|
|
close (int fd)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
int res;
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
syscall_printf ("close (%d)", fd);
|
|
|
|
|
|
|
|
MALLOC_CHECK;
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget cfd (fd, true);
|
|
|
|
if (cfd < 0)
|
|
|
|
res = -1;
|
2000-02-18 03:38:33 +08:00
|
|
|
else
|
|
|
|
{
|
2002-07-27 03:58:00 +08:00
|
|
|
res = cfd->close ();
|
2001-10-16 07:39:33 +08:00
|
|
|
cfd.release ();
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
syscall_printf ("%d = close (%d)", res, fd);
|
|
|
|
MALLOC_CHECK;
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2002-10-21 09:00:58 +08:00
|
|
|
extern "C" int _close (int) __attribute__ ((alias ("close")));
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
isatty (int fd)
|
|
|
|
{
|
|
|
|
int res;
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
if (cfd < 0)
|
|
|
|
res = 0;
|
2001-11-05 14:09:15 +08:00
|
|
|
else
|
2001-10-16 07:39:33 +08:00
|
|
|
res = cfd->is_tty ();
|
2000-02-18 03:38:33 +08:00
|
|
|
syscall_printf ("%d = isatty (%d)", res, fd);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Under NT, try to make a hard link using backup API. If that
|
|
|
|
fails or we are Win 95, just copy the file.
|
|
|
|
FIXME: We should actually be checking partition type, not OS.
|
|
|
|
Under NTFS, we should support hard links. On FAT partitions,
|
|
|
|
we should just copy the file.
|
|
|
|
*/
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2002-10-21 09:00:58 +08:00
|
|
|
link (const char *a, const char *b)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
int res = -1;
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2003-03-08 11:36:39 +08:00
|
|
|
path_conv real_a (a, PC_SYM_NOFOLLOW | PC_FULL);
|
2000-07-26 09:44:16 +08:00
|
|
|
path_conv real_b (b, PC_SYM_NOFOLLOW | PC_FULL);
|
2003-03-08 11:36:39 +08:00
|
|
|
extern BOOL allow_winsymlinks;
|
2002-07-02 11:06:32 +08:00
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
if (real_a.error)
|
|
|
|
{
|
|
|
|
set_errno (real_a.error);
|
2000-04-20 21:52:41 +08:00
|
|
|
goto done;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2002-06-26 12:21:01 +08:00
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
if (real_b.error)
|
|
|
|
{
|
2001-04-13 05:21:37 +08:00
|
|
|
set_errno (real_b.case_clash ? ECASECLASH : real_b.error);
|
2000-04-20 21:52:41 +08:00
|
|
|
goto done;
|
|
|
|
}
|
2001-01-29 08:46:25 +08:00
|
|
|
|
2001-10-01 12:10:07 +08:00
|
|
|
if (real_b.exists ())
|
2001-01-29 08:46:25 +08:00
|
|
|
{
|
2002-06-26 12:21:01 +08:00
|
|
|
syscall_printf ("file '%s' exists?", (char *) real_b);
|
2001-01-29 08:46:25 +08:00
|
|
|
set_errno (EEXIST);
|
|
|
|
goto done;
|
|
|
|
}
|
2002-06-26 12:21:01 +08:00
|
|
|
|
|
|
|
if (real_b[strlen (real_b) - 1] == '.')
|
2000-04-20 21:52:41 +08:00
|
|
|
{
|
|
|
|
syscall_printf ("trailing dot, bailing out");
|
|
|
|
set_errno (EINVAL);
|
|
|
|
goto done;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2003-03-08 11:36:39 +08:00
|
|
|
/* Shortcut hack. */
|
|
|
|
char new_lnk_buf[MAX_PATH + 5];
|
|
|
|
if (allow_winsymlinks && real_a.is_lnk_symlink () && !real_b.case_clash)
|
|
|
|
{
|
|
|
|
strcpy (new_lnk_buf, b);
|
|
|
|
strcat (new_lnk_buf, ".lnk");
|
|
|
|
b = new_lnk_buf;
|
2003-03-09 08:10:29 +08:00
|
|
|
real_b.check (b, PC_SYM_NOFOLLOW | PC_FULL);
|
2003-03-08 11:36:39 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Try to make hard link first on Windows NT */
|
* Makefile.in: Build wincap.o.
* wincap.cc: New file.
* wincap.h: Ditto.
* autoload.cc: Add dynamic load statement for `CreateHardLinkA'.
* dcrt0.cc (os_being_run): Eliminated.
(osname): Ditto.
(iswinnt): Ditto.
(set_os_type): Ditto.
(dll_crt0_1): Call wincap.init() instead of set_os_type().
(_dll_crt0): Ditto.
* environ.cc (set_chunksize): New function.
(parse_thing): `forkchunk' setting now invokes function `set_chunksize'.
* fork.cc (chunksize): Eliminated. Moved to be member of wincap.
* host_dependent.h: Removed.
* syscalls.cc (_link): Try using `CreateHardLinkA' first, if available.
* cygheap.cc, dcrt0.cc, delqueue.cc, dir.cc,
environ.cc, fhandler.cc, fhandler.h, fhandler_console.cc,
fhandler_mem.cc, fork.cc, mmap.cc, net.cc, pinfo.cc, pinfo.h,
security.cc, syscalls.cc, sysconf.cc, syslog.cc, thread.cc,
times.cc, tty.cc, uinfo.cc, uname.cc, winsup.h: Use new wincap
capability check throughout.
* winsup.h: Include wincap.h. Eliminate extern declarations of
`os_being_run' and `iswinnt'. Eliminate `os_type" definition.
* include/cygwin/version.h: Bump version to 1.3.4.
2001-09-13 01:46:37 +08:00
|
|
|
if (wincap.has_hard_links ())
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2002-06-26 12:21:01 +08:00
|
|
|
if (CreateHardLinkA (real_b, real_a, NULL))
|
2003-03-08 11:36:39 +08:00
|
|
|
goto success;
|
* Makefile.in: Build wincap.o.
* wincap.cc: New file.
* wincap.h: Ditto.
* autoload.cc: Add dynamic load statement for `CreateHardLinkA'.
* dcrt0.cc (os_being_run): Eliminated.
(osname): Ditto.
(iswinnt): Ditto.
(set_os_type): Ditto.
(dll_crt0_1): Call wincap.init() instead of set_os_type().
(_dll_crt0): Ditto.
* environ.cc (set_chunksize): New function.
(parse_thing): `forkchunk' setting now invokes function `set_chunksize'.
* fork.cc (chunksize): Eliminated. Moved to be member of wincap.
* host_dependent.h: Removed.
* syscalls.cc (_link): Try using `CreateHardLinkA' first, if available.
* cygheap.cc, dcrt0.cc, delqueue.cc, dir.cc,
environ.cc, fhandler.cc, fhandler.h, fhandler_console.cc,
fhandler_mem.cc, fork.cc, mmap.cc, net.cc, pinfo.cc, pinfo.h,
security.cc, syscalls.cc, sysconf.cc, syslog.cc, thread.cc,
times.cc, tty.cc, uinfo.cc, uname.cc, winsup.h: Use new wincap
capability check throughout.
* winsup.h: Include wincap.h. Eliminate extern declarations of
`os_being_run' and `iswinnt'. Eliminate `os_type" definition.
* include/cygwin/version.h: Bump version to 1.3.4.
2001-09-13 01:46:37 +08:00
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
HANDLE hFileSource;
|
|
|
|
|
|
|
|
WIN32_STREAM_ID StreamId;
|
|
|
|
DWORD dwBytesWritten;
|
|
|
|
LPVOID lpContext;
|
|
|
|
DWORD cbPathLen;
|
|
|
|
DWORD StreamSize;
|
|
|
|
WCHAR wbuf[MAX_PATH];
|
|
|
|
|
|
|
|
BOOL bSuccess;
|
|
|
|
|
2002-09-19 23:12:48 +08:00
|
|
|
hFileSource = CreateFile (real_a, FILE_WRITE_ATTRIBUTES,
|
|
|
|
FILE_SHARE_READ | FILE_SHARE_WRITE /*| FILE_SHARE_DELETE*/,
|
|
|
|
&sec_none_nih, // sa
|
|
|
|
OPEN_EXISTING, 0, NULL);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
if (hFileSource == INVALID_HANDLE_VALUE)
|
|
|
|
{
|
|
|
|
syscall_printf ("cannot open source, %E");
|
|
|
|
goto docopy;
|
|
|
|
}
|
|
|
|
|
2002-06-26 12:21:01 +08:00
|
|
|
cbPathLen = sys_mbstowcs (wbuf, real_b, MAX_PATH) * sizeof (WCHAR);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
StreamId.dwStreamId = BACKUP_LINK;
|
|
|
|
StreamId.dwStreamAttributes = 0;
|
|
|
|
StreamId.dwStreamNameSize = 0;
|
|
|
|
StreamId.Size.HighPart = 0;
|
|
|
|
StreamId.Size.LowPart = cbPathLen;
|
|
|
|
|
|
|
|
StreamSize = sizeof (WIN32_STREAM_ID) - sizeof (WCHAR**) +
|
2002-06-26 12:21:01 +08:00
|
|
|
StreamId.dwStreamNameSize;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2002-06-26 12:21:01 +08:00
|
|
|
lpContext = NULL;
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Write the WIN32_STREAM_ID */
|
|
|
|
bSuccess = BackupWrite (
|
|
|
|
hFileSource,
|
2001-03-03 11:56:34 +08:00
|
|
|
(LPBYTE) &StreamId, // buffer to write
|
2000-02-18 03:38:33 +08:00
|
|
|
StreamSize, // number of bytes to write
|
|
|
|
&dwBytesWritten,
|
|
|
|
FALSE, // don't abort yet
|
|
|
|
FALSE, // don't process security
|
|
|
|
&lpContext);
|
|
|
|
|
|
|
|
if (bSuccess)
|
|
|
|
{
|
|
|
|
/* write the buffer containing the path */
|
|
|
|
/* FIXME: BackupWrite sometimes traps if linkname is invalid.
|
|
|
|
Need to handle. */
|
|
|
|
bSuccess = BackupWrite (
|
|
|
|
hFileSource,
|
2001-03-03 11:56:34 +08:00
|
|
|
(LPBYTE) wbuf, // buffer to write
|
2000-02-18 03:38:33 +08:00
|
|
|
cbPathLen, // number of bytes to write
|
|
|
|
&dwBytesWritten,
|
|
|
|
FALSE, // don't abort yet
|
|
|
|
FALSE, // don't process security
|
|
|
|
&lpContext
|
|
|
|
);
|
|
|
|
|
|
|
|
if (!bSuccess)
|
|
|
|
syscall_printf ("cannot write linkname, %E");
|
|
|
|
|
|
|
|
/* Free context */
|
|
|
|
BackupWrite (
|
|
|
|
hFileSource,
|
|
|
|
NULL, // buffer to write
|
|
|
|
0, // number of bytes to write
|
|
|
|
&dwBytesWritten,
|
|
|
|
TRUE, // abort
|
|
|
|
FALSE, // don't process security
|
2000-09-05 01:52:42 +08:00
|
|
|
&lpContext);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
else
|
|
|
|
syscall_printf ("cannot write streamId, %E");
|
|
|
|
|
|
|
|
CloseHandle (hFileSource);
|
|
|
|
|
|
|
|
if (!bSuccess)
|
|
|
|
goto docopy;
|
|
|
|
|
2003-03-08 11:36:39 +08:00
|
|
|
success:
|
2000-02-18 03:38:33 +08:00
|
|
|
res = 0;
|
2003-03-08 11:36:39 +08:00
|
|
|
if (!allow_winsymlinks && real_a.is_lnk_symlink ())
|
|
|
|
SetFileAttributes (real_b, (DWORD) real_a
|
|
|
|
| FILE_ATTRIBUTE_SYSTEM
|
|
|
|
| FILE_ATTRIBUTE_READONLY);
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
docopy:
|
|
|
|
/* do this with a copy */
|
2002-06-26 12:21:01 +08:00
|
|
|
if (CopyFileA (real_a, real_b, 1))
|
2000-02-18 03:38:33 +08:00
|
|
|
res = 0;
|
|
|
|
else
|
|
|
|
__seterrno ();
|
|
|
|
|
|
|
|
done:
|
|
|
|
syscall_printf ("%d = link (%s, %s)", res, a, b);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* chown: POSIX 5.6.5.1 */
|
|
|
|
/*
|
2001-03-03 11:56:34 +08:00
|
|
|
* chown () is only implemented for Windows NT. Under other operating
|
2000-02-18 03:38:33 +08:00
|
|
|
* systems, it is only a stub that always returns zero.
|
|
|
|
*/
|
2000-04-03 04:42:42 +08:00
|
|
|
static int
|
2002-05-29 23:04:29 +08:00
|
|
|
chown_worker (const char *name, unsigned fmode, __uid32_t uid, __gid32_t gid)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
int res;
|
|
|
|
|
2001-06-28 10:19:57 +08:00
|
|
|
if (check_null_empty_str_errno (name))
|
2000-07-18 03:18:21 +08:00
|
|
|
return -1;
|
|
|
|
|
* Makefile.in: Build wincap.o.
* wincap.cc: New file.
* wincap.h: Ditto.
* autoload.cc: Add dynamic load statement for `CreateHardLinkA'.
* dcrt0.cc (os_being_run): Eliminated.
(osname): Ditto.
(iswinnt): Ditto.
(set_os_type): Ditto.
(dll_crt0_1): Call wincap.init() instead of set_os_type().
(_dll_crt0): Ditto.
* environ.cc (set_chunksize): New function.
(parse_thing): `forkchunk' setting now invokes function `set_chunksize'.
* fork.cc (chunksize): Eliminated. Moved to be member of wincap.
* host_dependent.h: Removed.
* syscalls.cc (_link): Try using `CreateHardLinkA' first, if available.
* cygheap.cc, dcrt0.cc, delqueue.cc, dir.cc,
environ.cc, fhandler.cc, fhandler.h, fhandler_console.cc,
fhandler_mem.cc, fork.cc, mmap.cc, net.cc, pinfo.cc, pinfo.h,
security.cc, syscalls.cc, sysconf.cc, syslog.cc, thread.cc,
times.cc, tty.cc, uinfo.cc, uname.cc, winsup.h: Use new wincap
capability check throughout.
* winsup.h: Include wincap.h. Eliminate extern declarations of
`os_being_run' and `iswinnt'. Eliminate `os_type" definition.
* include/cygwin/version.h: Bump version to 1.3.4.
2001-09-13 01:46:37 +08:00
|
|
|
if (!wincap.has_security ()) // real chown only works on NT
|
2000-02-18 03:38:33 +08:00
|
|
|
res = 0; // return zero (and do nothing) under Windows 9x
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* we need Win32 path names because of usage of Win32 API functions */
|
2000-07-18 03:18:21 +08:00
|
|
|
path_conv win32_path (PC_NONULLEMPTY, name, fmode);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
if (win32_path.error)
|
|
|
|
{
|
|
|
|
set_errno (win32_path.error);
|
|
|
|
res = -1;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* FIXME: This makes chown on a device succeed always. Someday we'll want
|
|
|
|
to actually allow chown to work properly on devices. */
|
2003-05-04 00:03:19 +08:00
|
|
|
if (win32_path.is_device () && !win32_path.issocket ())
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
res = 0;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2003-02-11 06:43:29 +08:00
|
|
|
mode_t attrib = 0;
|
2001-10-01 12:10:07 +08:00
|
|
|
if (win32_path.isdir ())
|
2000-07-27 01:48:49 +08:00
|
|
|
attrib |= S_IFDIR;
|
2000-04-03 04:42:42 +08:00
|
|
|
res = get_file_attribute (win32_path.has_acls (),
|
2000-07-27 01:48:49 +08:00
|
|
|
win32_path.get_win32 (),
|
2003-02-11 06:43:29 +08:00
|
|
|
&attrib);
|
2000-02-18 03:38:33 +08:00
|
|
|
if (!res)
|
2003-01-26 14:42:40 +08:00
|
|
|
res = set_file_attribute (win32_path.has_acls (), win32_path, uid,
|
2002-11-20 17:23:21 +08:00
|
|
|
gid, attrib);
|
2001-05-23 16:12:49 +08:00
|
|
|
if (res != 0 && (!win32_path.has_acls () || !allow_ntsec))
|
|
|
|
{
|
|
|
|
/* fake - if not supported, pretend we're like win95
|
|
|
|
where it just works */
|
|
|
|
res = 0;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
2000-04-03 04:42:42 +08:00
|
|
|
syscall_printf ("%d = %schown (%s,...)",
|
2001-03-14 19:13:46 +08:00
|
|
|
res, (fmode & PC_SYM_NOFOLLOW) ? "l" : "", name);
|
2000-02-18 03:38:33 +08:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2002-05-29 23:04:29 +08:00
|
|
|
chown32 (const char * name, __uid32_t uid, __gid32_t gid)
|
2000-04-03 04:42:42 +08:00
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-07-18 03:18:21 +08:00
|
|
|
return chown_worker (name, PC_SYM_FOLLOW, uid, gid);
|
2000-04-03 04:42:42 +08:00
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
Change internal gid datatype from __gid16_t to __gid32_t
throughout.
* cygwin.din: Export new symbols chown32, fchown32, getegid32,
getgid32, getgrgid32, getgrnam32, getgroups32, initgroups32, lchown32,
setgid32, setegid32, getgrent32.
* grp.cc (grp32togrp16): New static function.
(getgrgid32): New function.
(getgrnam32): Ditto.
(getgrent32): Ditto.
(getgroups32): Change name of internal function from getgroups.
(getgroups32): New function.
(initgroups32): Ditto.
* syscalls.cc (chown32): Ditto.
(lchown32): Ditto.
(fchown32): Ditto.
(setegid32): Ditto.
(setgid32): Ditto.
* uinfo.cc (getgid32): Ditto.
(getegid32): Ditto.
* include/cygwin/grp.h: Remove declaration of getgrgid() and getgrnam().
Declare getgrgid32() and getgrnam32() instead. Declare getgid32().
2002-05-28 22:10:55 +08:00
|
|
|
chown (const char * name, __uid16_t uid, __gid16_t gid)
|
|
|
|
{
|
|
|
|
sigframe thisframe (mainthread);
|
2002-06-25 16:06:29 +08:00
|
|
|
return chown_worker (name, PC_SYM_FOLLOW,
|
|
|
|
uid16touid32 (uid), gid16togid32 (gid));
|
Change internal gid datatype from __gid16_t to __gid32_t
throughout.
* cygwin.din: Export new symbols chown32, fchown32, getegid32,
getgid32, getgrgid32, getgrnam32, getgroups32, initgroups32, lchown32,
setgid32, setegid32, getgrent32.
* grp.cc (grp32togrp16): New static function.
(getgrgid32): New function.
(getgrnam32): Ditto.
(getgrent32): Ditto.
(getgroups32): Change name of internal function from getgroups.
(getgroups32): New function.
(initgroups32): Ditto.
* syscalls.cc (chown32): Ditto.
(lchown32): Ditto.
(fchown32): Ditto.
(setegid32): Ditto.
(setgid32): Ditto.
* uinfo.cc (getgid32): Ditto.
(getegid32): Ditto.
* include/cygwin/grp.h: Remove declaration of getgrgid() and getgrnam().
Declare getgrgid32() and getgrnam32() instead. Declare getgid32().
2002-05-28 22:10:55 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" int
|
2002-05-29 23:04:29 +08:00
|
|
|
lchown32 (const char * name, __uid32_t uid, __gid32_t gid)
|
2000-04-03 04:42:42 +08:00
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2001-03-14 19:13:46 +08:00
|
|
|
return chown_worker (name, PC_SYM_NOFOLLOW, uid, gid);
|
2000-04-03 04:42:42 +08:00
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
Change internal gid datatype from __gid16_t to __gid32_t
throughout.
* cygwin.din: Export new symbols chown32, fchown32, getegid32,
getgid32, getgrgid32, getgrnam32, getgroups32, initgroups32, lchown32,
setgid32, setegid32, getgrent32.
* grp.cc (grp32togrp16): New static function.
(getgrgid32): New function.
(getgrnam32): Ditto.
(getgrent32): Ditto.
(getgroups32): Change name of internal function from getgroups.
(getgroups32): New function.
(initgroups32): Ditto.
* syscalls.cc (chown32): Ditto.
(lchown32): Ditto.
(fchown32): Ditto.
(setegid32): Ditto.
(setgid32): Ditto.
* uinfo.cc (getgid32): Ditto.
(getegid32): Ditto.
* include/cygwin/grp.h: Remove declaration of getgrgid() and getgrnam().
Declare getgrgid32() and getgrnam32() instead. Declare getgid32().
2002-05-28 22:10:55 +08:00
|
|
|
lchown (const char * name, __uid16_t uid, __gid16_t gid)
|
|
|
|
{
|
|
|
|
sigframe thisframe (mainthread);
|
2002-06-25 16:06:29 +08:00
|
|
|
return chown_worker (name, PC_SYM_NOFOLLOW,
|
|
|
|
uid16touid32 (uid), gid16togid32 (gid));
|
Change internal gid datatype from __gid16_t to __gid32_t
throughout.
* cygwin.din: Export new symbols chown32, fchown32, getegid32,
getgid32, getgrgid32, getgrnam32, getgroups32, initgroups32, lchown32,
setgid32, setegid32, getgrent32.
* grp.cc (grp32togrp16): New static function.
(getgrgid32): New function.
(getgrnam32): Ditto.
(getgrent32): Ditto.
(getgroups32): Change name of internal function from getgroups.
(getgroups32): New function.
(initgroups32): Ditto.
* syscalls.cc (chown32): Ditto.
(lchown32): Ditto.
(fchown32): Ditto.
(setegid32): Ditto.
(setgid32): Ditto.
* uinfo.cc (getgid32): Ditto.
(getegid32): Ditto.
* include/cygwin/grp.h: Remove declaration of getgrgid() and getgrnam().
Declare getgrgid32() and getgrnam32() instead. Declare getgid32().
2002-05-28 22:10:55 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" int
|
2002-05-29 23:04:29 +08:00
|
|
|
fchown32 (int fd, __uid32_t uid, __gid32_t gid)
|
2000-04-03 04:42:42 +08:00
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
if (cfd < 0)
|
2000-04-03 04:42:42 +08:00
|
|
|
{
|
|
|
|
syscall_printf ("-1 = fchown (%d,...)", fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
const char *path = cfd->get_name ();
|
2000-04-03 04:42:42 +08:00
|
|
|
|
|
|
|
if (path == NULL)
|
|
|
|
{
|
|
|
|
syscall_printf ("-1 = fchown (%d,...) (no name)", fd);
|
|
|
|
set_errno (ENOSYS);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
syscall_printf ("fchown (%d,...): calling chown_worker (%s,FOLLOW,...)",
|
2000-07-27 01:48:49 +08:00
|
|
|
fd, path);
|
2000-07-18 03:18:21 +08:00
|
|
|
return chown_worker (path, PC_SYM_FOLLOW, uid, gid);
|
2000-04-03 04:42:42 +08:00
|
|
|
}
|
|
|
|
|
Change internal gid datatype from __gid16_t to __gid32_t
throughout.
* cygwin.din: Export new symbols chown32, fchown32, getegid32,
getgid32, getgrgid32, getgrnam32, getgroups32, initgroups32, lchown32,
setgid32, setegid32, getgrent32.
* grp.cc (grp32togrp16): New static function.
(getgrgid32): New function.
(getgrnam32): Ditto.
(getgrent32): Ditto.
(getgroups32): Change name of internal function from getgroups.
(getgroups32): New function.
(initgroups32): Ditto.
* syscalls.cc (chown32): Ditto.
(lchown32): Ditto.
(fchown32): Ditto.
(setegid32): Ditto.
(setgid32): Ditto.
* uinfo.cc (getgid32): Ditto.
(getegid32): Ditto.
* include/cygwin/grp.h: Remove declaration of getgrgid() and getgrnam().
Declare getgrgid32() and getgrnam32() instead. Declare getgid32().
2002-05-28 22:10:55 +08:00
|
|
|
extern "C" int
|
|
|
|
fchown (int fd, __uid16_t uid, __gid16_t gid)
|
|
|
|
{
|
2002-06-25 16:06:29 +08:00
|
|
|
return fchown32 (fd, uid16touid32 (uid), gid16togid32 (gid));
|
Change internal gid datatype from __gid16_t to __gid32_t
throughout.
* cygwin.din: Export new symbols chown32, fchown32, getegid32,
getgid32, getgrgid32, getgrnam32, getgroups32, initgroups32, lchown32,
setgid32, setegid32, getgrent32.
* grp.cc (grp32togrp16): New static function.
(getgrgid32): New function.
(getgrnam32): Ditto.
(getgrent32): Ditto.
(getgroups32): Change name of internal function from getgroups.
(getgroups32): New function.
(initgroups32): Ditto.
* syscalls.cc (chown32): Ditto.
(lchown32): Ditto.
(fchown32): Ditto.
(setegid32): Ditto.
(setgid32): Ditto.
* uinfo.cc (getgid32): Ditto.
(getegid32): Ditto.
* include/cygwin/grp.h: Remove declaration of getgrgid() and getgrnam().
Declare getgrgid32() and getgrnam32() instead. Declare getgid32().
2002-05-28 22:10:55 +08:00
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* umask: POSIX 5.3.3.1 */
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" mode_t
|
2000-02-18 03:38:33 +08:00
|
|
|
umask (mode_t mask)
|
|
|
|
{
|
|
|
|
mode_t oldmask;
|
|
|
|
|
2000-11-14 13:53:32 +08:00
|
|
|
oldmask = cygheap->umask;
|
|
|
|
cygheap->umask = mask & 0777;
|
2000-02-18 03:38:33 +08:00
|
|
|
return oldmask;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* chmod: POSIX 5.6.4.1 */
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
chmod (const char *path, mode_t mode)
|
|
|
|
{
|
|
|
|
int res = -1;
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
path_conv win32_path (path);
|
|
|
|
|
|
|
|
if (win32_path.error)
|
|
|
|
{
|
|
|
|
set_errno (win32_path.error);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* FIXME: This makes chmod on a device succeed always. Someday we'll want
|
|
|
|
to actually allow chmod to work properly on devices. */
|
2003-03-20 05:34:38 +08:00
|
|
|
if (win32_path.is_device () && !win32_path.issocket ())
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
res = 0;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2001-10-01 12:10:07 +08:00
|
|
|
if (!win32_path.exists ())
|
2000-02-18 03:38:33 +08:00
|
|
|
__seterrno ();
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* temporary erase read only bit, to be able to set file security */
|
2001-10-01 12:10:07 +08:00
|
|
|
SetFileAttributes (win32_path, (DWORD) win32_path & ~FILE_ATTRIBUTE_READONLY);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-10-01 12:10:07 +08:00
|
|
|
if (win32_path.isdir ())
|
2000-07-27 01:48:49 +08:00
|
|
|
mode |= S_IFDIR;
|
2002-11-20 17:23:21 +08:00
|
|
|
if (!set_file_attribute (win32_path.has_acls (), win32_path,
|
|
|
|
ILLEGAL_UID, ILLEGAL_GID, mode)
|
2000-02-18 03:38:33 +08:00
|
|
|
&& allow_ntsec)
|
|
|
|
res = 0;
|
|
|
|
|
|
|
|
/* if the mode we want has any write bits set, we can't
|
|
|
|
be read only. */
|
|
|
|
if (mode & (S_IWUSR | S_IWGRP | S_IWOTH))
|
2001-10-01 12:10:07 +08:00
|
|
|
(DWORD) win32_path &= ~FILE_ATTRIBUTE_READONLY;
|
2000-02-18 03:38:33 +08:00
|
|
|
else
|
2001-10-01 12:10:07 +08:00
|
|
|
(DWORD) win32_path |= FILE_ATTRIBUTE_READONLY;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2003-03-08 11:36:39 +08:00
|
|
|
if (!win32_path.is_lnk_symlink () && S_ISLNK (mode) || S_ISSOCK (mode))
|
2001-10-01 12:10:07 +08:00
|
|
|
(DWORD) win32_path |= FILE_ATTRIBUTE_SYSTEM;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-10-01 12:10:07 +08:00
|
|
|
if (!SetFileAttributes (win32_path, win32_path))
|
2000-02-18 03:38:33 +08:00
|
|
|
__seterrno ();
|
2002-11-12 23:51:11 +08:00
|
|
|
else if (!allow_ntsec)
|
|
|
|
/* Correct NTFS security attributes have higher priority */
|
|
|
|
res = 0;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
syscall_printf ("%d = chmod (%s, %p)", res, path, mode);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* fchmod: P96 5.6.4.1 */
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
fchmod (int fd, mode_t mode)
|
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
if (cfd < 0)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
syscall_printf ("-1 = fchmod (%d, 0%o)", fd, mode);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
const char *path = cfd->get_name ();
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
if (path == NULL)
|
|
|
|
{
|
|
|
|
syscall_printf ("-1 = fchmod (%d, 0%o) (no name)", fd, mode);
|
|
|
|
set_errno (ENOSYS);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
syscall_printf ("fchmod (%d, 0%o): calling chmod (%s, 0%o)",
|
|
|
|
fd, mode, path, mode);
|
|
|
|
return chmod (path, mode);
|
|
|
|
}
|
|
|
|
|
2002-02-26 01:47:51 +08:00
|
|
|
static void
|
|
|
|
stat64_to_stat32 (struct __stat64 *src, struct __stat32 *dst)
|
|
|
|
{
|
2002-06-04 01:44:09 +08:00
|
|
|
dst->st_dev = ((src->st_dev >> 8) & 0xff00) | (src->st_dev & 0xff);
|
2003-05-11 08:10:11 +08:00
|
|
|
dst->st_ino = ((unsigned) (src->st_ino >> 32)) | (unsigned) src->st_ino;
|
2002-02-26 01:47:51 +08:00
|
|
|
dst->st_mode = src->st_mode;
|
|
|
|
dst->st_nlink = src->st_nlink;
|
|
|
|
dst->st_uid = src->st_uid;
|
|
|
|
dst->st_gid = src->st_gid;
|
2002-06-21 23:01:19 +08:00
|
|
|
dst->st_rdev = ((src->st_rdev >> 8) & 0xff00) | (src->st_rdev & 0xff);
|
2002-02-26 01:47:51 +08:00
|
|
|
dst->st_size = src->st_size;
|
2002-06-06 23:35:09 +08:00
|
|
|
dst->st_atim = src->st_atim;
|
|
|
|
dst->st_mtim = src->st_mtim;
|
|
|
|
dst->st_ctim = src->st_ctim;
|
2002-02-26 01:47:51 +08:00
|
|
|
dst->st_blksize = src->st_blksize;
|
|
|
|
dst->st_blocks = src->st_blocks;
|
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2002-02-26 01:47:51 +08:00
|
|
|
fstat64 (int fd, struct __stat64 *buf)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-10-16 07:39:33 +08:00
|
|
|
int res;
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
if (cfd < 0)
|
|
|
|
res = -1;
|
2000-02-18 03:38:33 +08:00
|
|
|
else
|
|
|
|
{
|
2003-03-01 07:52:48 +08:00
|
|
|
path_conv pc (cfd->get_name (), PC_SYM_NOFOLLOW);
|
2002-02-26 01:47:51 +08:00
|
|
|
memset (buf, 0, sizeof (struct __stat64));
|
2002-05-28 09:55:40 +08:00
|
|
|
res = cfd->fstat (buf, &pc);
|
2003-02-21 22:29:18 +08:00
|
|
|
if (!res && cfd->get_device () != FH_SOCKET)
|
2002-06-04 01:44:09 +08:00
|
|
|
{
|
|
|
|
if (!buf->st_ino)
|
|
|
|
buf->st_ino = hash_path_name (0, cfd->get_win32_name ());
|
|
|
|
if (!buf->st_dev)
|
|
|
|
buf->st_dev = (cfd->get_device () << 16) | cfd->get_unit ();
|
2002-06-21 23:01:19 +08:00
|
|
|
if (!buf->st_rdev)
|
|
|
|
buf->st_rdev = buf->st_dev;
|
2002-06-04 01:44:09 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
syscall_printf ("%d = fstat (%d, %p)", res, fd, buf);
|
|
|
|
return res;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2003-05-12 19:06:27 +08:00
|
|
|
extern "C" int
|
|
|
|
_fstat64_r (struct _reent *ptr, int fd, struct __stat64 *buf)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
set_errno (0);
|
|
|
|
if ((ret = fstat64 (fd, buf)) == -1 && get_errno () != 0)
|
|
|
|
ptr->_errno = get_errno ();
|
|
|
|
return ret;
|
|
|
|
}
|
2003-03-10 05:51:00 +08:00
|
|
|
|
2002-02-26 01:47:51 +08:00
|
|
|
extern "C" int
|
2003-03-18 03:08:11 +08:00
|
|
|
fstat (int fd, struct __stat32 *buf)
|
2002-02-26 01:47:51 +08:00
|
|
|
{
|
|
|
|
struct __stat64 buf64;
|
|
|
|
int ret = fstat64 (fd, &buf64);
|
|
|
|
if (!ret)
|
|
|
|
stat64_to_stat32 (&buf64, buf);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2003-05-12 19:06:27 +08:00
|
|
|
extern "C" int
|
|
|
|
_fstat_r (struct _reent *ptr, int fd, struct __stat32 *buf)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
set_errno (0);
|
|
|
|
if ((ret = fstat (fd, buf)) == -1 && get_errno () != 0)
|
|
|
|
ptr->_errno = get_errno ();
|
|
|
|
return ret;
|
|
|
|
}
|
2003-03-18 03:08:11 +08:00
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* fsync: P96 6.6.1.1 */
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
fsync (int fd)
|
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
if (cfd < 0)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
syscall_printf ("-1 = fsync (%d)", fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
if (FlushFileBuffers (cfd->get_handle ()) == 0)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
__seterrno ();
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* sync: standards? */
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
sync ()
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-05-05 03:46:32 +08:00
|
|
|
suffix_info stat_suffixes[] =
|
2000-03-26 09:54:22 +08:00
|
|
|
{
|
|
|
|
suffix_info ("", 1),
|
2000-03-29 05:49:16 +08:00
|
|
|
suffix_info (".exe", 1),
|
|
|
|
suffix_info (NULL)
|
2000-03-26 09:54:22 +08:00
|
|
|
};
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Cygwin internal */
|
2001-10-05 08:17:57 +08:00
|
|
|
int __stdcall
|
2002-02-26 01:47:51 +08:00
|
|
|
stat_worker (const char *name, struct __stat64 *buf, int nofollow,
|
|
|
|
path_conv *pc)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
int res = -1;
|
2001-10-01 12:10:07 +08:00
|
|
|
path_conv real_path;
|
|
|
|
fhandler_base *fh = NULL;
|
2000-04-26 00:31:14 +08:00
|
|
|
|
2001-10-01 12:10:07 +08:00
|
|
|
if (check_null_invalid_struct_errno (buf))
|
|
|
|
goto done;
|
|
|
|
|
2002-06-02 11:13:22 +08:00
|
|
|
if (!pc)
|
|
|
|
pc = &real_path;
|
|
|
|
|
2001-10-05 08:17:57 +08:00
|
|
|
fh = cygheap->fdtab.build_fhandler_from_name (-1, name, NULL, *pc,
|
2002-06-02 11:13:22 +08:00
|
|
|
(nofollow ? PC_SYM_NOFOLLOW
|
|
|
|
: PC_SYM_FOLLOW)
|
2001-10-03 11:49:26 +08:00
|
|
|
| PC_FULL, stat_suffixes);
|
2002-06-02 11:13:22 +08:00
|
|
|
|
2001-10-05 08:17:57 +08:00
|
|
|
if (pc->error)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-10-05 12:21:41 +08:00
|
|
|
debug_printf ("got %d error from build_fhandler_from_name", pc->error);
|
2001-10-05 08:17:57 +08:00
|
|
|
set_errno (pc->error);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2001-10-01 12:10:07 +08:00
|
|
|
else
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-10-05 12:21:41 +08:00
|
|
|
debug_printf ("(%s, %p, %d, %p), file_attributes %d", name, buf, nofollow,
|
2001-11-05 14:09:15 +08:00
|
|
|
pc, (DWORD) real_path);
|
2002-06-02 11:13:22 +08:00
|
|
|
memset (buf, 0, sizeof (*buf));
|
2001-10-05 12:21:41 +08:00
|
|
|
res = fh->fstat (buf, pc);
|
2003-02-21 22:29:18 +08:00
|
|
|
if (!res && fh->get_device () != FH_SOCKET)
|
2002-06-02 11:13:22 +08:00
|
|
|
{
|
|
|
|
if (!buf->st_ino)
|
|
|
|
buf->st_ino = hash_path_name (0, fh->get_win32_name ());
|
|
|
|
if (!buf->st_dev)
|
2002-06-04 01:44:09 +08:00
|
|
|
buf->st_dev = (fh->get_device () << 16) | fh->get_unit ();
|
2002-06-21 23:01:19 +08:00
|
|
|
if (!buf->st_rdev)
|
|
|
|
buf->st_rdev = buf->st_dev;
|
2002-06-02 11:13:22 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
2001-10-30 15:43:46 +08:00
|
|
|
if (fh)
|
|
|
|
delete fh;
|
2000-02-18 03:38:33 +08:00
|
|
|
MALLOC_CHECK;
|
2001-10-05 08:17:57 +08:00
|
|
|
syscall_printf ("%d = (%s, %p)", res, name, buf);
|
2000-02-18 03:38:33 +08:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2002-02-26 01:47:51 +08:00
|
|
|
stat64 (const char *name, struct __stat64 *buf)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2001-10-05 08:17:57 +08:00
|
|
|
syscall_printf ("entering");
|
|
|
|
return stat_worker (name, buf, 0);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2003-05-12 19:06:27 +08:00
|
|
|
extern "C" int
|
|
|
|
_stat64_r (struct _reent *ptr, const char *name, struct __stat64 *buf)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
set_errno (0);
|
|
|
|
if ((ret = stat64 (name, buf)) == -1 && get_errno () != 0)
|
|
|
|
ptr->_errno = get_errno ();
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2002-02-26 01:47:51 +08:00
|
|
|
extern "C" int
|
2003-03-18 03:08:11 +08:00
|
|
|
stat (const char *name, struct __stat32 *buf)
|
2002-02-26 01:47:51 +08:00
|
|
|
{
|
|
|
|
struct __stat64 buf64;
|
|
|
|
int ret = stat64 (name, &buf64);
|
|
|
|
if (!ret)
|
|
|
|
stat64_to_stat32 (&buf64, buf);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2003-05-12 19:06:27 +08:00
|
|
|
extern "C" int
|
|
|
|
_stat_r (struct _reent *ptr, const char *name, struct __stat32 *buf)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
set_errno (0);
|
|
|
|
if ((ret = stat (name, buf)) == -1 && get_errno () != 0)
|
|
|
|
ptr->_errno = get_errno ();
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* lstat: Provided by SVR4 and 4.3+BSD, POSIX? */
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2002-02-26 01:47:51 +08:00
|
|
|
lstat64 (const char *name, struct __stat64 *buf)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2001-10-05 08:17:57 +08:00
|
|
|
syscall_printf ("entering");
|
|
|
|
return stat_worker (name, buf, 1);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2002-02-26 01:47:51 +08:00
|
|
|
/* lstat: Provided by SVR4 and 4.3+BSD, POSIX? */
|
|
|
|
extern "C" int
|
2003-08-13 19:28:42 +08:00
|
|
|
lstat (const char *name, struct __stat32 *buf)
|
2002-02-26 01:47:51 +08:00
|
|
|
{
|
|
|
|
struct __stat64 buf64;
|
|
|
|
int ret = lstat64 (name, &buf64);
|
|
|
|
if (!ret)
|
|
|
|
stat64_to_stat32 (&buf64, buf);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
access (const char *fn, int flags)
|
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
// flags were incorrectly specified
|
2001-10-08 05:16:36 +08:00
|
|
|
if (flags & ~(F_OK|R_OK|W_OK|X_OK))
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2003-02-21 22:29:18 +08:00
|
|
|
path_conv real_path (fn, PC_SYM_FOLLOW | PC_FULL, stat_suffixes);
|
|
|
|
if (real_path.error)
|
|
|
|
{
|
|
|
|
set_errno (real_path.error);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!real_path.exists ())
|
|
|
|
{
|
|
|
|
set_errno (ENOENT);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!(flags & (R_OK | W_OK | X_OK)))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (real_path.has_attribute (FILE_ATTRIBUTE_READONLY) && (flags & W_OK))
|
|
|
|
{
|
|
|
|
set_errno (EACCES);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (real_path.has_acls () && allow_ntsec)
|
|
|
|
return check_file_access (real_path, flags);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2002-02-26 01:47:51 +08:00
|
|
|
struct __stat64 st;
|
2003-03-01 07:52:48 +08:00
|
|
|
int r = stat_worker (fn, &st, 0);
|
2000-02-18 03:38:33 +08:00
|
|
|
if (r)
|
|
|
|
return -1;
|
|
|
|
r = -1;
|
|
|
|
if (flags & R_OK)
|
|
|
|
{
|
|
|
|
if (st.st_uid == myself->uid)
|
2000-07-27 01:48:49 +08:00
|
|
|
{
|
2002-06-12 00:06:16 +08:00
|
|
|
if (!(st.st_mode & S_IRUSR))
|
2000-07-27 01:48:49 +08:00
|
|
|
goto done;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
else if (st.st_gid == myself->gid)
|
2000-07-27 01:48:49 +08:00
|
|
|
{
|
2002-06-12 00:06:16 +08:00
|
|
|
if (!(st.st_mode & S_IRGRP))
|
2000-07-27 01:48:49 +08:00
|
|
|
goto done;
|
|
|
|
}
|
2002-06-12 00:06:16 +08:00
|
|
|
else if (!(st.st_mode & S_IROTH))
|
2000-07-27 01:48:49 +08:00
|
|
|
goto done;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
if (flags & W_OK)
|
|
|
|
{
|
|
|
|
if (st.st_uid == myself->uid)
|
2000-07-27 01:48:49 +08:00
|
|
|
{
|
2002-06-12 00:06:16 +08:00
|
|
|
if (!(st.st_mode & S_IWUSR))
|
2000-07-27 01:48:49 +08:00
|
|
|
goto done;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
else if (st.st_gid == myself->gid)
|
2000-07-27 01:48:49 +08:00
|
|
|
{
|
2002-06-12 00:06:16 +08:00
|
|
|
if (!(st.st_mode & S_IWGRP))
|
2000-07-27 01:48:49 +08:00
|
|
|
goto done;
|
|
|
|
}
|
2002-06-12 00:06:16 +08:00
|
|
|
else if (!(st.st_mode & S_IWOTH))
|
2000-07-27 01:48:49 +08:00
|
|
|
goto done;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
if (flags & X_OK)
|
|
|
|
{
|
|
|
|
if (st.st_uid == myself->uid)
|
2000-07-27 01:48:49 +08:00
|
|
|
{
|
2002-06-12 00:06:16 +08:00
|
|
|
if (!(st.st_mode & S_IXUSR))
|
2000-07-27 01:48:49 +08:00
|
|
|
goto done;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
else if (st.st_gid == myself->gid)
|
2000-07-27 01:48:49 +08:00
|
|
|
{
|
2002-06-12 00:06:16 +08:00
|
|
|
if (!(st.st_mode & S_IXGRP))
|
2000-07-27 01:48:49 +08:00
|
|
|
goto done;
|
|
|
|
}
|
2002-06-12 00:06:16 +08:00
|
|
|
else if (!(st.st_mode & S_IXOTH))
|
2000-07-27 01:48:49 +08:00
|
|
|
goto done;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
r = 0;
|
|
|
|
done:
|
|
|
|
if (r)
|
|
|
|
set_errno (EACCES);
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2002-10-21 09:00:58 +08:00
|
|
|
rename (const char *oldpath, const char *newpath)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
int res = 0;
|
2001-06-01 19:53:20 +08:00
|
|
|
char *lnk_suffix = NULL;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2000-07-18 03:18:21 +08:00
|
|
|
path_conv real_old (oldpath, PC_SYM_NOFOLLOW);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
if (real_old.error)
|
|
|
|
{
|
|
|
|
syscall_printf ("-1 = rename (%s, %s)", oldpath, newpath);
|
2001-03-11 04:25:19 +08:00
|
|
|
set_errno (real_old.error);
|
2000-02-18 03:38:33 +08:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2000-07-18 03:18:21 +08:00
|
|
|
path_conv real_new (newpath, PC_SYM_NOFOLLOW);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-02-22 22:51:16 +08:00
|
|
|
/* Shortcut hack. */
|
|
|
|
char new_lnk_buf[MAX_PATH + 5];
|
2003-03-08 11:36:39 +08:00
|
|
|
if (real_old.is_lnk_symlink () && !real_new.error && !real_new.case_clash)
|
2001-02-22 22:51:16 +08:00
|
|
|
{
|
2003-03-08 11:36:39 +08:00
|
|
|
strcpy (new_lnk_buf, newpath);
|
|
|
|
strcat (new_lnk_buf, ".lnk");
|
|
|
|
newpath = new_lnk_buf;
|
|
|
|
real_new.check (newpath, PC_SYM_NOFOLLOW);
|
2001-02-22 22:51:16 +08:00
|
|
|
}
|
|
|
|
|
2001-04-17 19:47:37 +08:00
|
|
|
if (real_new.error || real_new.case_clash)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
syscall_printf ("-1 = rename (%s, %s)", oldpath, newpath);
|
2001-04-17 19:47:37 +08:00
|
|
|
set_errno (real_new.case_clash ? ECASECLASH : real_new.error);
|
2000-02-18 03:38:33 +08:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-10-02 09:58:06 +08:00
|
|
|
if (!writable_directory (real_old) || !writable_directory (real_new))
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
syscall_printf ("-1 = rename (%s, %s)", oldpath, newpath);
|
2001-03-11 04:25:19 +08:00
|
|
|
set_errno (EACCES);
|
2000-02-18 03:38:33 +08:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-10-01 12:10:07 +08:00
|
|
|
if (!real_old.exists ()) /* file to move doesn't exist */
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
syscall_printf ("file to move doesn't exist");
|
2001-03-11 04:25:19 +08:00
|
|
|
set_errno (ENOENT);
|
2000-02-18 03:38:33 +08:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
|
2001-06-01 19:53:20 +08:00
|
|
|
/* Destination file exists and is read only, change that or else
|
|
|
|
the rename won't work. */
|
2001-10-01 12:10:07 +08:00
|
|
|
if (real_new.has_attribute (FILE_ATTRIBUTE_READONLY))
|
|
|
|
SetFileAttributes (real_new, (DWORD) real_new & ~FILE_ATTRIBUTE_READONLY);
|
2001-06-01 19:53:20 +08:00
|
|
|
|
|
|
|
/* Shortcut hack No. 2, part 1 */
|
2003-03-08 11:36:39 +08:00
|
|
|
if (!real_old.issymlink () && !real_new.error && real_new.is_lnk_symlink ()
|
|
|
|
&& (lnk_suffix = strrchr (real_new.get_win32 (), '.')))
|
2001-06-01 19:53:20 +08:00
|
|
|
*lnk_suffix = '\0';
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-10-02 09:58:06 +08:00
|
|
|
if (!MoveFile (real_old, real_new))
|
2000-04-19 11:21:13 +08:00
|
|
|
res = -1;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2000-05-23 01:15:47 +08:00
|
|
|
if (res == 0 || (GetLastError () != ERROR_ALREADY_EXISTS
|
2000-07-27 01:48:49 +08:00
|
|
|
&& GetLastError () != ERROR_FILE_EXISTS))
|
2000-04-19 11:21:13 +08:00
|
|
|
goto done;
|
|
|
|
|
* Makefile.in: Build wincap.o.
* wincap.cc: New file.
* wincap.h: Ditto.
* autoload.cc: Add dynamic load statement for `CreateHardLinkA'.
* dcrt0.cc (os_being_run): Eliminated.
(osname): Ditto.
(iswinnt): Ditto.
(set_os_type): Ditto.
(dll_crt0_1): Call wincap.init() instead of set_os_type().
(_dll_crt0): Ditto.
* environ.cc (set_chunksize): New function.
(parse_thing): `forkchunk' setting now invokes function `set_chunksize'.
* fork.cc (chunksize): Eliminated. Moved to be member of wincap.
* host_dependent.h: Removed.
* syscalls.cc (_link): Try using `CreateHardLinkA' first, if available.
* cygheap.cc, dcrt0.cc, delqueue.cc, dir.cc,
environ.cc, fhandler.cc, fhandler.h, fhandler_console.cc,
fhandler_mem.cc, fork.cc, mmap.cc, net.cc, pinfo.cc, pinfo.h,
security.cc, syscalls.cc, sysconf.cc, syslog.cc, thread.cc,
times.cc, tty.cc, uinfo.cc, uname.cc, winsup.h: Use new wincap
capability check throughout.
* winsup.h: Include wincap.h. Eliminate extern declarations of
`os_being_run' and `iswinnt'. Eliminate `os_type" definition.
* include/cygwin/version.h: Bump version to 1.3.4.
2001-09-13 01:46:37 +08:00
|
|
|
if (wincap.has_move_file_ex ())
|
2000-04-19 11:21:13 +08:00
|
|
|
{
|
|
|
|
if (MoveFileEx (real_old.get_win32 (), real_new.get_win32 (),
|
|
|
|
MOVEFILE_REPLACE_EXISTING))
|
|
|
|
res = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
syscall_printf ("try win95 hack");
|
2001-10-02 09:58:06 +08:00
|
|
|
for (int i = 0; i < 2; i++)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2000-04-19 11:21:13 +08:00
|
|
|
if (!DeleteFileA (real_new.get_win32 ()) &&
|
|
|
|
GetLastError () != ERROR_FILE_NOT_FOUND)
|
|
|
|
{
|
|
|
|
syscall_printf ("deleting %s to be paranoid",
|
|
|
|
real_new.get_win32 ());
|
|
|
|
break;
|
|
|
|
}
|
2001-10-02 09:58:06 +08:00
|
|
|
else if (MoveFile (real_old.get_win32 (), real_new.get_win32 ()))
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-10-02 09:58:06 +08:00
|
|
|
res = 0;
|
|
|
|
break;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-04-19 11:21:13 +08:00
|
|
|
done:
|
|
|
|
if (res)
|
2001-06-01 19:53:20 +08:00
|
|
|
{
|
|
|
|
__seterrno ();
|
|
|
|
/* Reset R/O attributes if neccessary. */
|
2001-10-01 12:10:07 +08:00
|
|
|
if (real_new.has_attribute (FILE_ATTRIBUTE_READONLY))
|
|
|
|
SetFileAttributes (real_new, real_new);
|
2001-06-01 19:53:20 +08:00
|
|
|
}
|
|
|
|
else
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
/* make the new file have the permissions of the old one */
|
2001-11-14 05:49:06 +08:00
|
|
|
DWORD attr = real_old;
|
|
|
|
#ifdef HIDDEN_DOT_FILES
|
|
|
|
char *c = strrchr (real_old.get_win32 (), '\\');
|
|
|
|
if ((c && c[1] == '.') || *real_old.get_win32 () == '.')
|
2002-05-28 09:55:40 +08:00
|
|
|
attr &= ~FILE_ATTRIBUTE_HIDDEN;
|
2001-11-14 05:49:06 +08:00
|
|
|
c = strrchr (real_new.get_win32 (), '\\');
|
|
|
|
if ((c && c[1] == '.') || *real_new.get_win32 () == '.')
|
2002-05-28 09:55:40 +08:00
|
|
|
attr |= FILE_ATTRIBUTE_HIDDEN;
|
2001-11-14 05:49:06 +08:00
|
|
|
#endif
|
|
|
|
SetFileAttributes (real_new, attr);
|
2001-06-01 19:53:20 +08:00
|
|
|
|
|
|
|
/* Shortcut hack, No. 2, part 2 */
|
|
|
|
/* if the new filename was an existing shortcut, remove it now if the
|
2001-09-08 05:32:07 +08:00
|
|
|
new filename is equal to the shortcut name without .lnk suffix. */
|
2001-06-01 19:53:20 +08:00
|
|
|
if (lnk_suffix)
|
2001-09-08 05:32:07 +08:00
|
|
|
{
|
2001-06-01 19:53:20 +08:00
|
|
|
*lnk_suffix = '.';
|
2001-10-01 12:10:07 +08:00
|
|
|
DeleteFile (real_new);
|
2001-06-01 19:53:20 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2001-10-01 12:10:07 +08:00
|
|
|
syscall_printf ("%d = rename (%s, %s)", res, (char *) real_old,
|
|
|
|
(char *) real_new);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2003-02-05 03:49:39 +08:00
|
|
|
struct system_cleanup_args
|
|
|
|
{
|
|
|
|
_sig_func_ptr oldint, oldquit;
|
|
|
|
sigset_t old_mask;
|
|
|
|
};
|
|
|
|
|
|
|
|
static void system_cleanup (void *args)
|
|
|
|
{
|
|
|
|
struct system_cleanup_args *cleanup_args = (struct system_cleanup_args *) args;
|
|
|
|
|
|
|
|
signal (SIGINT, cleanup_args->oldint);
|
|
|
|
signal (SIGQUIT, cleanup_args->oldquit);
|
|
|
|
(void) sigprocmask (SIG_SETMASK, &cleanup_args->old_mask, 0);
|
2003-03-08 11:36:39 +08:00
|
|
|
}
|
2003-02-05 03:49:39 +08:00
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
system (const char *cmdstring)
|
|
|
|
{
|
2003-01-15 04:19:27 +08:00
|
|
|
pthread_testcancel ();
|
|
|
|
|
2001-10-19 10:27:19 +08:00
|
|
|
if (check_null_empty_str_errno (cmdstring))
|
|
|
|
return -1;
|
|
|
|
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
int res;
|
|
|
|
const char* command[4];
|
2003-02-05 03:49:39 +08:00
|
|
|
struct system_cleanup_args cleanup_args;
|
|
|
|
sigset_t child_block;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
if (cmdstring == (const char *) NULL)
|
|
|
|
return 1;
|
|
|
|
|
2003-02-05 03:49:39 +08:00
|
|
|
cleanup_args.oldint = signal (SIGINT, SIG_IGN);
|
|
|
|
cleanup_args.oldquit = signal (SIGQUIT, SIG_IGN);
|
2000-02-18 03:38:33 +08:00
|
|
|
sigemptyset (&child_block);
|
|
|
|
sigaddset (&child_block, SIGCHLD);
|
2003-02-05 03:49:39 +08:00
|
|
|
(void) sigprocmask (SIG_BLOCK, &child_block, &cleanup_args.old_mask);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
command[0] = "sh";
|
|
|
|
command[1] = "-c";
|
|
|
|
command[2] = cmdstring;
|
|
|
|
command[3] = (const char *) NULL;
|
|
|
|
|
2003-02-05 03:49:39 +08:00
|
|
|
pthread_cleanup_push (system_cleanup, (void *) &cleanup_args);
|
|
|
|
|
2001-03-19 05:11:25 +08:00
|
|
|
if ((res = spawnvp (_P_WAIT, "sh", command)) == -1)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
// when exec fails, return value should be as if shell
|
|
|
|
// executed exit (127)
|
|
|
|
res = 127;
|
|
|
|
}
|
|
|
|
|
2003-02-05 03:49:39 +08:00
|
|
|
pthread_cleanup_pop (1);
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2001-01-18 12:26:04 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
setdtablesize (int size)
|
|
|
|
{
|
2001-04-19 05:10:15 +08:00
|
|
|
if (size <= (int)cygheap->fdtab.size || cygheap->fdtab.extend (size - cygheap->fdtab.size))
|
2001-01-18 12:26:04 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
return -1;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
getdtablesize ()
|
|
|
|
{
|
2001-08-16 22:29:21 +08:00
|
|
|
return cygheap->fdtab.size > OPEN_MAX ? cygheap->fdtab.size : OPEN_MAX;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" size_t
|
2000-02-18 03:38:33 +08:00
|
|
|
getpagesize ()
|
|
|
|
{
|
2001-01-28 13:51:15 +08:00
|
|
|
if (!system_info.dwPageSize)
|
2001-03-03 11:56:34 +08:00
|
|
|
GetSystemInfo (&system_info);
|
2001-01-28 13:51:15 +08:00
|
|
|
return (int) system_info.dwPageSize;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2001-03-19 19:02:41 +08:00
|
|
|
static int
|
|
|
|
check_posix_perm (const char *fname, int v)
|
|
|
|
{
|
|
|
|
/* Windows 95/98/ME don't support file system security at all. */
|
* Makefile.in: Build wincap.o.
* wincap.cc: New file.
* wincap.h: Ditto.
* autoload.cc: Add dynamic load statement for `CreateHardLinkA'.
* dcrt0.cc (os_being_run): Eliminated.
(osname): Ditto.
(iswinnt): Ditto.
(set_os_type): Ditto.
(dll_crt0_1): Call wincap.init() instead of set_os_type().
(_dll_crt0): Ditto.
* environ.cc (set_chunksize): New function.
(parse_thing): `forkchunk' setting now invokes function `set_chunksize'.
* fork.cc (chunksize): Eliminated. Moved to be member of wincap.
* host_dependent.h: Removed.
* syscalls.cc (_link): Try using `CreateHardLinkA' first, if available.
* cygheap.cc, dcrt0.cc, delqueue.cc, dir.cc,
environ.cc, fhandler.cc, fhandler.h, fhandler_console.cc,
fhandler_mem.cc, fork.cc, mmap.cc, net.cc, pinfo.cc, pinfo.h,
security.cc, syscalls.cc, sysconf.cc, syslog.cc, thread.cc,
times.cc, tty.cc, uinfo.cc, uname.cc, winsup.h: Use new wincap
capability check throughout.
* winsup.h: Include wincap.h. Eliminate extern declarations of
`os_being_run' and `iswinnt'. Eliminate `os_type" definition.
* include/cygwin/version.h: Bump version to 1.3.4.
2001-09-13 01:46:37 +08:00
|
|
|
if (!wincap.has_security ())
|
2001-03-19 19:02:41 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* ntea is ok for supporting permission bits but it doesn't support
|
|
|
|
full POSIX security settings. */
|
|
|
|
if (v == _PC_POSIX_PERMISSIONS && allow_ntea)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
if (!allow_ntsec)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
char *root = rootdir (strcpy ((char *)alloca (strlen (fname)), fname));
|
|
|
|
|
|
|
|
if (!allow_smbntsec
|
|
|
|
&& ((root[0] == '\\' && root[1] == '\\')
|
2001-09-08 05:32:07 +08:00
|
|
|
|| GetDriveType (root) == DRIVE_REMOTE))
|
2001-03-19 19:02:41 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
DWORD vsn, len, flags;
|
|
|
|
if (!GetVolumeInformation (root, NULL, 0, &vsn, &len, &flags, NULL, 16))
|
|
|
|
{
|
|
|
|
__seterrno ();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (flags & FS_PERSISTENT_ACLS) ? 1 : 0;
|
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* FIXME: not all values are correct... */
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" long int
|
2000-02-18 03:38:33 +08:00
|
|
|
fpathconf (int fd, int v)
|
|
|
|
{
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
if (cfd < 0)
|
|
|
|
return -1;
|
2000-02-18 03:38:33 +08:00
|
|
|
switch (v)
|
|
|
|
{
|
|
|
|
case _PC_LINK_MAX:
|
|
|
|
return _POSIX_LINK_MAX;
|
|
|
|
case _PC_MAX_CANON:
|
|
|
|
case _PC_MAX_INPUT:
|
|
|
|
if (isatty (fd))
|
|
|
|
return _POSIX_MAX_CANON;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
set_errno (EBADF);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
case _PC_NAME_MAX:
|
|
|
|
case _PC_PATH_MAX:
|
|
|
|
return PATH_MAX;
|
|
|
|
case _PC_PIPE_BUF:
|
2001-09-07 16:31:16 +08:00
|
|
|
return PIPE_BUF;
|
2000-02-18 03:38:33 +08:00
|
|
|
case _PC_CHOWN_RESTRICTED:
|
|
|
|
case _PC_NO_TRUNC:
|
|
|
|
return -1;
|
|
|
|
case _PC_VDISABLE:
|
2001-10-16 07:39:33 +08:00
|
|
|
if (cfd->is_tty ())
|
2000-02-18 03:38:33 +08:00
|
|
|
return -1;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
set_errno (EBADF);
|
|
|
|
return -1;
|
|
|
|
}
|
2001-03-19 19:02:41 +08:00
|
|
|
case _PC_POSIX_PERMISSIONS:
|
|
|
|
case _PC_POSIX_SECURITY:
|
2001-10-16 07:39:33 +08:00
|
|
|
if (cfd->get_device () == FH_DISK)
|
|
|
|
return check_posix_perm (cfd->get_win32_name (), v);
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
2000-02-18 03:38:33 +08:00
|
|
|
default:
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" long int
|
2000-02-18 03:38:33 +08:00
|
|
|
pathconf (const char *file, int v)
|
|
|
|
{
|
|
|
|
switch (v)
|
|
|
|
{
|
|
|
|
case _PC_PATH_MAX:
|
2002-01-10 21:24:28 +08:00
|
|
|
if (check_null_empty_str_errno (file))
|
2002-05-28 09:55:40 +08:00
|
|
|
return -1;
|
2000-02-18 03:38:33 +08:00
|
|
|
return PATH_MAX - strlen (file);
|
|
|
|
case _PC_NAME_MAX:
|
|
|
|
return PATH_MAX;
|
|
|
|
case _PC_LINK_MAX:
|
|
|
|
return _POSIX_LINK_MAX;
|
|
|
|
case _PC_MAX_CANON:
|
|
|
|
case _PC_MAX_INPUT:
|
2001-03-19 19:02:41 +08:00
|
|
|
return _POSIX_MAX_CANON;
|
2000-02-18 03:38:33 +08:00
|
|
|
case _PC_PIPE_BUF:
|
2001-09-07 16:31:16 +08:00
|
|
|
return PIPE_BUF;
|
2000-02-18 03:38:33 +08:00
|
|
|
case _PC_CHOWN_RESTRICTED:
|
|
|
|
case _PC_NO_TRUNC:
|
|
|
|
return -1;
|
|
|
|
case _PC_VDISABLE:
|
2001-03-19 19:02:41 +08:00
|
|
|
return -1;
|
|
|
|
case _PC_POSIX_PERMISSIONS:
|
|
|
|
case _PC_POSIX_SECURITY:
|
|
|
|
{
|
2001-09-08 05:32:07 +08:00
|
|
|
path_conv full_path (file, PC_SYM_FOLLOW | PC_FULL);
|
2001-03-19 19:02:41 +08:00
|
|
|
if (full_path.error)
|
|
|
|
{
|
|
|
|
set_errno (full_path.error);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (full_path.is_device ())
|
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
2001-09-08 05:32:07 +08:00
|
|
|
return check_posix_perm (full_path, v);
|
2001-03-19 19:02:41 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
default:
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-09-03 12:16:35 +08:00
|
|
|
extern "C" char *
|
|
|
|
ttyname (int fd)
|
|
|
|
{
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
if (cfd < 0 || !cfd->is_tty ())
|
2000-09-03 12:16:35 +08:00
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
2001-10-16 07:39:33 +08:00
|
|
|
return (char *) (cfd->ttyname ());
|
2000-09-03 12:16:35 +08:00
|
|
|
}
|
|
|
|
|
2000-07-30 00:24:59 +08:00
|
|
|
extern "C" char *
|
2000-02-18 03:38:33 +08:00
|
|
|
ctermid (char *str)
|
|
|
|
{
|
|
|
|
static NO_COPY char buf[16];
|
|
|
|
if (str == NULL)
|
|
|
|
str = buf;
|
2001-04-29 07:48:28 +08:00
|
|
|
if (!real_tty_attached (myself))
|
2000-02-18 03:38:33 +08:00
|
|
|
strcpy (str, "/dev/conin");
|
|
|
|
else
|
|
|
|
__small_sprintf (str, "/dev/tty%d", myself->ctty);
|
|
|
|
return str;
|
|
|
|
}
|
|
|
|
|
2000-05-24 07:52:50 +08:00
|
|
|
/* Tells stdio if it should do the cr/lf conversion for this file */
|
2000-09-03 12:16:35 +08:00
|
|
|
extern "C" int
|
2000-05-24 07:52:50 +08:00
|
|
|
_cygwin_istext_for_stdio (int fd)
|
|
|
|
{
|
2002-09-30 12:35:18 +08:00
|
|
|
syscall_printf ("_cygwin_istext_for_stdio (%d)", fd);
|
2000-05-24 07:52:50 +08:00
|
|
|
if (CYGWIN_VERSION_OLD_STDIO_CRLF_HANDLING)
|
|
|
|
{
|
2002-09-30 12:35:18 +08:00
|
|
|
syscall_printf (" _cifs: old API");
|
2000-05-24 07:52:50 +08:00
|
|
|
return 0; /* we do it for old apps, due to getc/putc macros */
|
|
|
|
}
|
|
|
|
|
2001-10-16 11:31:50 +08:00
|
|
|
cygheap_fdget cfd (fd, false, false);
|
2001-10-16 07:39:33 +08:00
|
|
|
if (cfd < 0)
|
2000-05-24 07:52:50 +08:00
|
|
|
{
|
2002-09-30 12:35:18 +08:00
|
|
|
syscall_printf (" _cifs: fd not open");
|
2000-05-24 07:52:50 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
if (cfd->get_device () != FH_DISK)
|
2000-05-24 07:52:50 +08:00
|
|
|
{
|
2002-09-30 12:35:18 +08:00
|
|
|
syscall_printf (" _cifs: fd not disk file");
|
2000-05-24 07:52:50 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
if (cfd->get_w_binary () || cfd->get_r_binary ())
|
2000-05-24 07:52:50 +08:00
|
|
|
{
|
2002-09-30 12:35:18 +08:00
|
|
|
syscall_printf (" _cifs: get_*_binary");
|
2000-05-24 07:52:50 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2002-09-30 12:35:18 +08:00
|
|
|
syscall_printf ("_cygwin_istext_for_stdio says yes");
|
2000-05-24 07:52:50 +08:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2000-05-20 01:15:02 +08:00
|
|
|
/* internal newlib function */
|
2001-03-03 11:56:34 +08:00
|
|
|
extern "C" int _fwalk (struct _reent *ptr, int (*function) (FILE *));
|
2000-05-20 01:15:02 +08:00
|
|
|
|
|
|
|
static int setmode_mode;
|
|
|
|
static int setmode_file;
|
|
|
|
|
|
|
|
static int
|
|
|
|
setmode_helper (FILE *f)
|
|
|
|
{
|
2001-03-03 11:56:34 +08:00
|
|
|
if (fileno (f) != setmode_file)
|
2000-05-20 01:15:02 +08:00
|
|
|
return 0;
|
2002-09-30 12:35:18 +08:00
|
|
|
syscall_printf ("setmode: file was %s now %s",
|
2002-06-05 09:42:28 +08:00
|
|
|
f->_flags & __SCLE ? "text" : "raw",
|
|
|
|
setmode_mode & O_TEXT ? "text" : "raw");
|
2000-05-20 01:15:02 +08:00
|
|
|
if (setmode_mode & O_TEXT)
|
|
|
|
f->_flags |= __SCLE;
|
|
|
|
else
|
|
|
|
f->_flags &= ~__SCLE;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-07-09 13:29:51 +08:00
|
|
|
extern "C" int
|
|
|
|
getmode (int fd)
|
|
|
|
{
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
if (cfd < 0)
|
|
|
|
return -1;
|
2000-07-09 13:29:51 +08:00
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
return cfd->get_flags () & (O_BINARY | O_TEXT);
|
2000-07-09 13:29:51 +08:00
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Set a file descriptor into text or binary mode, returning the
|
|
|
|
previous mode. */
|
|
|
|
|
2000-07-09 13:29:51 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
setmode (int fd, int mode)
|
|
|
|
{
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
if (cfd < 0)
|
|
|
|
return -1;
|
2001-04-24 00:46:30 +08:00
|
|
|
if (mode != O_BINARY && mode != O_TEXT && mode != 0)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Note that we have no way to indicate the case that writes are
|
|
|
|
binary but not reads, or vice-versa. These cases can arise when
|
|
|
|
using the tty or console interface. People using those
|
|
|
|
interfaces should not use setmode. */
|
|
|
|
|
|
|
|
int res;
|
2001-10-16 07:39:33 +08:00
|
|
|
if (cfd->get_w_binary () && cfd->get_r_binary ())
|
2000-02-18 03:38:33 +08:00
|
|
|
res = O_BINARY;
|
2001-10-16 07:39:33 +08:00
|
|
|
else if (cfd->get_w_binset () && cfd->get_r_binset ())
|
2001-04-24 01:29:33 +08:00
|
|
|
res = O_TEXT; /* Specifically set O_TEXT */
|
2000-02-18 03:38:33 +08:00
|
|
|
else
|
2001-04-24 01:29:33 +08:00
|
|
|
res = 0;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-04-24 10:07:58 +08:00
|
|
|
if (!mode)
|
2001-10-16 07:39:33 +08:00
|
|
|
cfd->reset_to_open_binmode ();
|
2001-04-24 10:07:58 +08:00
|
|
|
else
|
2002-06-05 09:42:28 +08:00
|
|
|
cfd->set_flags ((cfd->get_flags () & ~(O_TEXT | O_BINARY)) | mode);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2000-05-24 07:52:50 +08:00
|
|
|
if (_cygwin_istext_for_stdio (fd))
|
|
|
|
setmode_mode = O_TEXT;
|
|
|
|
else
|
|
|
|
setmode_mode = O_BINARY;
|
2000-05-20 01:15:02 +08:00
|
|
|
setmode_file = fd;
|
2001-03-03 11:56:34 +08:00
|
|
|
_fwalk (_REENT, setmode_helper);
|
2000-05-20 01:15:02 +08:00
|
|
|
|
2002-09-30 12:35:18 +08:00
|
|
|
syscall_printf ("setmode (%d<%s>, %p) returns %s", fd, cfd->get_name (),
|
2002-06-05 09:42:28 +08:00
|
|
|
mode, res & O_TEXT ? "text" : "binary");
|
2000-02-18 03:38:33 +08:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-09-03 12:16:35 +08:00
|
|
|
extern "C" int
|
2003-04-02 00:11:41 +08:00
|
|
|
ftruncate64 (int fd, _off64_t length)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
int res = -1;
|
|
|
|
|
2001-09-16 22:26:11 +08:00
|
|
|
if (length < 0)
|
2001-10-16 07:39:33 +08:00
|
|
|
set_errno (EINVAL);
|
2000-02-18 03:38:33 +08:00
|
|
|
else
|
|
|
|
{
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
if (cfd >= 0)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-10-16 07:39:33 +08:00
|
|
|
HANDLE h = cygheap->fdtab[fd]->get_handle ();
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
if (cfd->get_handle ())
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-10-16 07:39:33 +08:00
|
|
|
/* remember curr file pointer location */
|
2003-04-02 00:11:41 +08:00
|
|
|
_off64_t prev_loc = cfd->lseek (0, SEEK_CUR);
|
2001-10-16 07:39:33 +08:00
|
|
|
|
|
|
|
cfd->lseek (length, SEEK_SET);
|
|
|
|
if (!SetEndOfFile (h))
|
|
|
|
__seterrno ();
|
|
|
|
else
|
|
|
|
res = 0;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
/* restore original file pointer location */
|
2002-02-26 01:47:51 +08:00
|
|
|
cfd->lseek (prev_loc, SEEK_SET);
|
2001-10-16 07:39:33 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
syscall_printf ("%d = ftruncate (%d, %d)", res, fd, length);
|
2000-02-18 03:38:33 +08:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2002-02-26 01:47:51 +08:00
|
|
|
/* ftruncate: P96 5.6.7.1 */
|
|
|
|
extern "C" int
|
2003-04-02 00:11:41 +08:00
|
|
|
ftruncate (int fd, _off_t length)
|
2002-02-26 01:47:51 +08:00
|
|
|
{
|
2003-04-02 00:11:41 +08:00
|
|
|
return ftruncate64 (fd, (_off64_t)length);
|
2002-02-26 01:47:51 +08:00
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* truncate: Provided by SVR4 and 4.3+BSD. Not part of POSIX.1 or XPG3 */
|
2000-09-03 12:16:35 +08:00
|
|
|
extern "C" int
|
2003-04-02 00:11:41 +08:00
|
|
|
truncate64 (const char *pathname, _off64_t length)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
int fd;
|
|
|
|
int res = -1;
|
|
|
|
|
|
|
|
fd = open (pathname, O_RDWR);
|
|
|
|
|
|
|
|
if (fd == -1)
|
2001-08-23 10:27:01 +08:00
|
|
|
set_errno (EBADF);
|
2000-02-18 03:38:33 +08:00
|
|
|
else
|
|
|
|
{
|
2002-03-05 00:47:41 +08:00
|
|
|
res = ftruncate64 (fd, length);
|
2000-02-18 03:38:33 +08:00
|
|
|
close (fd);
|
|
|
|
}
|
|
|
|
syscall_printf ("%d = truncate (%s, %d)", res, pathname, length);
|
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2002-02-26 01:47:51 +08:00
|
|
|
/* truncate: Provided by SVR4 and 4.3+BSD. Not part of POSIX.1 or XPG3 */
|
|
|
|
extern "C" int
|
2003-04-02 00:11:41 +08:00
|
|
|
truncate (const char *pathname, _off_t length)
|
2002-02-26 01:47:51 +08:00
|
|
|
{
|
2003-04-02 00:11:41 +08:00
|
|
|
return truncate64 (pathname, (_off64_t)length);
|
2002-02-26 01:47:51 +08:00
|
|
|
}
|
|
|
|
|
2000-09-03 12:16:35 +08:00
|
|
|
extern "C" long
|
2000-02-18 03:38:33 +08:00
|
|
|
get_osfhandle (int fd)
|
|
|
|
{
|
2001-10-16 07:39:33 +08:00
|
|
|
long res;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
if (cfd >= 0)
|
|
|
|
res = (long) cfd->get_handle ();
|
2000-02-18 03:38:33 +08:00
|
|
|
else
|
2001-10-16 07:39:33 +08:00
|
|
|
res = -1;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-08-23 10:27:01 +08:00
|
|
|
syscall_printf ("%d = get_osfhandle (%d)", res, fd);
|
2000-02-18 03:38:33 +08:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-09-03 12:16:35 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
statfs (const char *fname, struct statfs *sfs)
|
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
if (!sfs)
|
|
|
|
{
|
|
|
|
set_errno (EFAULT);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-03-03 11:56:34 +08:00
|
|
|
path_conv full_path (fname, PC_SYM_FOLLOW | PC_FULL);
|
2003-05-25 17:18:43 +08:00
|
|
|
|
|
|
|
const char *root = full_path.root_dir();
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
syscall_printf ("statfs %s", root);
|
|
|
|
|
2003-05-27 00:52:58 +08:00
|
|
|
/* GetDiskFreeSpaceEx must be called before GetDiskFreeSpace on
|
|
|
|
WinME, to avoid the MS KB 314417 bug */
|
|
|
|
ULARGE_INTEGER availb, freeb, totalb;
|
|
|
|
BOOL status = GetDiskFreeSpaceEx (root, &availb, &totalb, &freeb);
|
|
|
|
|
2003-05-25 17:18:43 +08:00
|
|
|
DWORD spc, bps, availc, freec, totalc;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
if (!GetDiskFreeSpace (root, &spc, &bps, &freec, &totalc))
|
|
|
|
{
|
|
|
|
__seterrno ();
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2003-05-27 00:52:58 +08:00
|
|
|
if (status)
|
2003-05-25 17:18:43 +08:00
|
|
|
{
|
|
|
|
availc = availb.QuadPart / (spc*bps);
|
|
|
|
totalc = totalb.QuadPart / (spc*bps);
|
|
|
|
freec = freeb.QuadPart / (spc*bps);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
availc = freec;
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
DWORD vsn, maxlen, flags;
|
|
|
|
|
|
|
|
if (!GetVolumeInformation (root, NULL, 0, &vsn, &maxlen, &flags, NULL, 0))
|
|
|
|
{
|
|
|
|
__seterrno ();
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
sfs->f_type = flags;
|
|
|
|
sfs->f_bsize = spc*bps;
|
|
|
|
sfs->f_blocks = totalc;
|
2003-05-25 17:18:43 +08:00
|
|
|
sfs->f_bavail = availc;
|
|
|
|
sfs->f_bfree = freec;
|
2000-02-18 03:38:33 +08:00
|
|
|
sfs->f_files = -1;
|
|
|
|
sfs->f_ffree = -1;
|
|
|
|
sfs->f_fsid = vsn;
|
|
|
|
sfs->f_namelen = maxlen;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-09-03 12:16:35 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
fstatfs (int fd, struct statfs *sfs)
|
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
if (cfd < 0)
|
|
|
|
return -1;
|
|
|
|
return statfs (cfd->get_name (), sfs);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* setpgid: POSIX 4.3.3.1 */
|
2000-09-03 12:16:35 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
setpgid (pid_t pid, pid_t pgid)
|
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
int res = -1;
|
|
|
|
if (pid == 0)
|
|
|
|
pid = getpid ();
|
|
|
|
if (pgid == 0)
|
|
|
|
pgid = pid;
|
|
|
|
|
|
|
|
if (pgid < 0)
|
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2000-07-30 00:24:59 +08:00
|
|
|
pinfo p (pid);
|
|
|
|
if (!p)
|
|
|
|
{
|
|
|
|
set_errno (ESRCH);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
/* A process may only change the process group of itself and its children */
|
|
|
|
if (p == myself || p->ppid == myself->pid)
|
|
|
|
{
|
|
|
|
p->pgid = pgid;
|
2000-10-25 11:54:50 +08:00
|
|
|
if (p->pid != p->pgid)
|
|
|
|
p->set_has_pgid_children (0);
|
2000-07-30 00:24:59 +08:00
|
|
|
res = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
set_errno (EPERM);
|
|
|
|
goto out;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
out:
|
|
|
|
syscall_printf ("pid %d, pgid %d, res %d", pid, pgid, res);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2000-09-03 12:16:35 +08:00
|
|
|
extern "C" pid_t
|
2000-02-18 03:38:33 +08:00
|
|
|
getpgid (pid_t pid)
|
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
if (pid == 0)
|
|
|
|
pid = getpid ();
|
|
|
|
|
2000-07-30 00:24:59 +08:00
|
|
|
pinfo p (pid);
|
2000-02-18 03:38:33 +08:00
|
|
|
if (p == 0)
|
|
|
|
{
|
|
|
|
set_errno (ESRCH);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return p->pgid;
|
|
|
|
}
|
|
|
|
|
2000-09-03 12:16:35 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
setpgrp (void)
|
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
return setpgid (0, 0);
|
|
|
|
}
|
|
|
|
|
2000-09-03 12:16:35 +08:00
|
|
|
extern "C" pid_t
|
2000-02-18 03:38:33 +08:00
|
|
|
getpgrp (void)
|
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
return getpgid (0);
|
|
|
|
}
|
|
|
|
|
2000-09-03 12:16:35 +08:00
|
|
|
extern "C" char *
|
2000-02-18 03:38:33 +08:00
|
|
|
ptsname (int fd)
|
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
if (cfd < 0)
|
|
|
|
return 0;
|
|
|
|
return (char *) (cfd->ptsname ());
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* FIXME: what is this? */
|
2002-01-21 11:15:24 +08:00
|
|
|
extern "C" int __declspec(dllexport)
|
2000-02-18 03:38:33 +08:00
|
|
|
regfree ()
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* mknod was the call to create directories before the introduction
|
|
|
|
of mkdir in 4.2BSD and SVR3. Use of mknod required superuser privs
|
|
|
|
so the mkdir command had to be setuid root.
|
|
|
|
Although mknod hasn't been implemented yet, some GNU tools (e.g. the
|
|
|
|
fileutils) assume its existence so we must provide a stub that always
|
|
|
|
fails. */
|
2000-09-03 12:16:35 +08:00
|
|
|
extern "C" int
|
2003-03-10 05:51:00 +08:00
|
|
|
mknod32 (const char *_path, mode_t mode, __dev32_t dev)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
set_errno (ENOSYS);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2003-03-10 05:51:00 +08:00
|
|
|
extern "C" int
|
|
|
|
mknod (const char *_path, mode_t mode, __dev16_t dev)
|
|
|
|
{
|
|
|
|
return mknod32 (_path, mode, (__dev32_t) dev);
|
|
|
|
}
|
|
|
|
|
2001-04-13 00:50:13 +08:00
|
|
|
extern "C" int
|
|
|
|
mkfifo (const char *_path, mode_t mode)
|
|
|
|
{
|
|
|
|
set_errno (ENOSYS);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2000-06-17 03:36:07 +08:00
|
|
|
/* seteuid: standards? */
|
2000-09-03 12:16:35 +08:00
|
|
|
extern "C" int
|
2002-05-29 23:04:29 +08:00
|
|
|
seteuid32 (__uid32_t uid)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2003-01-25 18:36:46 +08:00
|
|
|
debug_printf ("uid: %u myself->gid: %u", uid, myself->gid);
|
2002-05-27 19:48:15 +08:00
|
|
|
|
2003-01-25 18:36:46 +08:00
|
|
|
if (uid == myself->uid && !cygheap->user.groups.ischanged)
|
2002-05-27 19:48:15 +08:00
|
|
|
{
|
2002-07-02 11:06:32 +08:00
|
|
|
debug_printf ("Nothing happens");
|
2002-05-27 19:48:15 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2002-07-29 20:51:52 +08:00
|
|
|
cygsid usersid;
|
|
|
|
user_groups &groups = cygheap->user.groups;
|
2003-06-30 21:07:36 +08:00
|
|
|
HANDLE ptok, new_token = INVALID_HANDLE_VALUE;
|
2002-06-15 02:01:21 +08:00
|
|
|
struct passwd * pw_new;
|
2002-05-27 19:48:15 +08:00
|
|
|
PSID origpsid, psid2 = NO_SID;
|
2003-06-30 21:07:36 +08:00
|
|
|
BOOL token_is_internal;
|
2002-05-27 19:48:15 +08:00
|
|
|
|
2002-12-10 Pierre Humblet <pierre.humblet@ieee.org>
* pwdgrp.h (pwdgrp_check::pwdgrp_state): Replace by
pwdgrp_check::isinitializing ().
(pwdgrp_check::isinitializing): Create.
* passwd.cc (grab_int): Change type to unsigned, use strtoul and
set the pointer content to 0 if the field is invalid.
(parse_pwd): Move validity test after getting pw_gid.
(read_etc_passwd): Replace "passwd_state <= " by
passwd_state::isinitializing ().
(internal_getpwuid): Ditto.
(internal_getpwnam): Ditto.
(getpwent): Ditto.
(getpass): Ditto.
* grp.cc (parse_grp): Use strtoul for gr_gid and verify the validity.
(read_etc_group): Replace "group_state <= " by
group_state::isinitializing ().
(internal_getgrgid): Ditto.
(getgrent32): Ditto.
(internal_getgrent): Ditto.
2002-12-10 Pierre Humblet <pierre.humblet@ieee.org>
* security.h: Move declarations of internal_getgrent,
internal_getpwsid and internal_getgrsid to pwdgrp.h.
* pwdgrp.h: Declare internal_getpwsid, internal_getpwnam,
internal_getpwuid, internal_getgrsid, internal_getgrgid,
internal_getgrnam, internal_getgrent and internal_getgroups.
Delete "emulated" from enum pwdgrp_state.
(pwdgrp_check::isuninitialized): Create.
(pwdgrp_check::pwdgrp_state): Change state to initializing
rather than to uninitialized.
(pwdgrp_read::gets): Remove trailing CRs.
* passwd.cc (grab_string): Don't look for NLs.
(grab_int): Ditto.
(parse_pwd): Don't look for CRs. Return 0 if entry is too short.
(search_for): Delete.
(read_etc_passwd): Simplify tests to actually read the file.
Set state to loaded before making internal_getpwXX calls.
Replace search_for calls by equivalent internal_pwgetXX calls.
(internal_getpwsid): Use passwd_state.isuninitialized to decide
to call read_etc_passwd.
(internal_getpwuid): Create.
(internal_getpwnam): Create.
(getpwuid32): Simply call internal_getpwuid.
(getpwuid_r32): Call internal_getpwuid.
(getpwnam): Simply call internal_getpwnam.
(getpwnam_r): Call internal_getpwnam.
* grp.cc (parse_grp): Don't look for CRs. Adjust blank space.
(add_grp_line): Adjust blank space.
(class group_lock): Ditto.
(read_etc_group): Simplify tests to actually read the file.
Set state to loaded before making internal_getgrXX calls.
Replace getgrXX calls by equivalent internal calls.
(internal_getgrsid): Use group_state.isuninitialized to decide
to call read_etc_group.
(internal_getgrgid): Create.
(internal_getgrnam): Create.
(getgroups32): Simply call internal_getgrgid.
(getgrnam32): Simply call internal_getgrnam.
(internal_getgrent): Call group_state.isuninitialized.
(internal_getgroups): Create from the former getgroups32, using
two of the four arguments. Set gid to myself->gid and username
to cygheap->user.name ().
(getgroups32): Simply call internal_getgroup.
(getgroups): Call internal_getgroup instead of getgroups32.
(setgroups32): Call internal versions of get{pw,gr}XX.
* sec_helper.cc: Include pwdgrp.h.
(is_grp_member): Call internal versions of get{pw,gr}XX.
* security.cc: Include pwdgrp.h.
(alloc_sd): Call internal versions of get{pw,gr}XX.
* syscalls.cc: Include pwdgrp.h.
(seteuid32): Call internal versions of get{pw,gr}XX.
(setegid32): Ditto.
* uinfo.cc: Include pwdgrp.h.
(internal_getlogin): Call internal versions of get{pw,gr}XX.
(cygheap_user::ontherange): Ditto.
* sec_acl.cc: Include pwdgrp.h.
(setacl): Call internal versions of get{pw,gr}XX.
(acl_access): Ditto and simplify logic.
(aclfromtext): Ditto.
2002-12-10 20:43:49 +08:00
|
|
|
pw_new = internal_getpwuid (uid);
|
2003-01-25 18:36:46 +08:00
|
|
|
if (!wincap.has_security () && pw_new)
|
2003-06-30 21:07:36 +08:00
|
|
|
goto success_9x;
|
2002-07-29 20:51:52 +08:00
|
|
|
if (!usersid.getfrompw (pw_new))
|
2000-04-20 06:33:20 +08:00
|
|
|
{
|
2002-05-27 19:48:15 +08:00
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
2001-06-10 05:25:55 +08:00
|
|
|
|
2002-09-22 11:38:57 +08:00
|
|
|
RevertToSelf ();
|
2002-06-19 23:27:27 +08:00
|
|
|
if (!OpenProcessToken (hMainProc, TOKEN_QUERY | TOKEN_ADJUST_DEFAULT, &ptok))
|
2002-05-27 19:48:15 +08:00
|
|
|
{
|
|
|
|
__seterrno ();
|
2003-06-30 21:07:36 +08:00
|
|
|
goto failed_ptok;;
|
2002-05-27 19:48:15 +08:00
|
|
|
}
|
2003-06-30 21:07:36 +08:00
|
|
|
|
|
|
|
/* Verify if the process token is suitable. */
|
|
|
|
if (verify_token (ptok, usersid, groups))
|
2003-07-15 01:04:21 +08:00
|
|
|
new_token = ptok;
|
|
|
|
/* Verify if the external token is suitable */
|
|
|
|
else if (cygheap->user.external_token != INVALID_HANDLE_VALUE
|
2003-06-30 21:07:36 +08:00
|
|
|
&& verify_token (cygheap->user.external_token, usersid, groups))
|
2003-07-15 01:04:21 +08:00
|
|
|
new_token = cygheap->user.external_token;
|
|
|
|
/* Verify if the current token (internal or former external) is suitable */
|
|
|
|
else if (cygheap->user.current_token != INVALID_HANDLE_VALUE
|
|
|
|
&& cygheap->user.current_token != cygheap->user.external_token
|
|
|
|
&& verify_token (cygheap->user.current_token, usersid, groups,
|
|
|
|
&token_is_internal))
|
|
|
|
new_token = cygheap->user.current_token;
|
|
|
|
/* Verify if the internal token is suitable */
|
|
|
|
else if (cygheap->user.internal_token != INVALID_HANDLE_VALUE
|
|
|
|
&& cygheap->user.internal_token != cygheap->user.current_token
|
2003-06-30 21:07:36 +08:00
|
|
|
&& verify_token (cygheap->user.internal_token, usersid, groups,
|
|
|
|
&token_is_internal))
|
2003-07-15 01:04:21 +08:00
|
|
|
new_token = cygheap->user.internal_token;
|
2000-07-27 01:48:49 +08:00
|
|
|
|
2003-07-15 01:04:21 +08:00
|
|
|
debug_printf ("Found token %d", new_token);
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 16:10:47 +08:00
|
|
|
|
2002-05-27 19:48:15 +08:00
|
|
|
/* Set process def dacl to allow access to impersonated token */
|
2003-07-15 01:04:21 +08:00
|
|
|
if (cygheap->user.current_token != new_token)
|
2002-05-27 19:48:15 +08:00
|
|
|
{
|
2003-07-15 01:04:21 +08:00
|
|
|
char dacl_buf[MAX_DACL_LEN (5)];
|
|
|
|
if (usersid != (origpsid = cygheap->user.orig_sid ()))
|
|
|
|
psid2 = usersid;
|
|
|
|
if (sec_acl ((PACL) dacl_buf, FALSE, origpsid, psid2))
|
2003-07-26 12:53:59 +08:00
|
|
|
{
|
2003-07-15 01:04:21 +08:00
|
|
|
TOKEN_DEFAULT_DACL tdacl;
|
|
|
|
tdacl.DefaultDacl = (PACL) dacl_buf;
|
|
|
|
if (!SetTokenInformation (ptok, TokenDefaultDacl,
|
|
|
|
&tdacl, sizeof dacl_buf))
|
|
|
|
debug_printf ("SetTokenInformation"
|
|
|
|
"(TokenDefaultDacl): %E");
|
|
|
|
}
|
2002-05-27 19:48:15 +08:00
|
|
|
}
|
* autoload.cc: Add load statements for `LookupAccountNameW',
`LsaClose', `LsaEnumerateAccountRights', `LsaFreeMemory',
`LsaOpenPolicy', `LsaQueryInformationPolicy', `NetLocalGroupEnum',
`NetLocalGroupGetMembers', `NetServerEnum', `NetUserGetGroups' and
`NtCreateToken'.
* ntdll.h: Add declaration for `NtCreateToken'.
* sec_helper.cc: Add `well_known_local_sid', `well_known_dialup_sid',
`well_known_network_sid', `well_known_batch_sid',
`well_known_interactive_sid', `well_known_service_sid' and
`well_known_authenticated_users_sid'.
(cygsid::string): Define as const method.
(cygsid::get_sid): Set psid to NO_SID on error.
(cygsid::getfromstr): Ditto.
(cygsid::getfrompw): Simplify.
(cygsid::getfromgr): Check for gr == NULL.
(legal_sid_type): Move to security.h.
(set_process_privilege): Return -1 on error, otherwise 0 or 1 related
to previous privilege setting.
* security.cc (extract_nt_dom_user): Remove `static'.
(lsa2wchar): New function.
(open_local_policy): Ditto.
(close_local_policy): Ditto.
(get_lsa_srv_inf): Ditto.
(get_logon_server): Ditto.
(get_logon_server_and_user_domain): Ditto.
(get_user_groups): Ditto.
(is_group_member): Ditto.
(get_user_local_groups): Ditto.
(sid_in_token_groups): Ditto.
(get_user_primary_group): Ditto.
(get_group_sidlist): Ditto.
(get_system_priv_list): Ditto.
(get_priv_list): Ditto.
(get_dacl): Ditto.
(create_token): Ditto.
(subauth): Return immediately if SE_TCB_NAME can't be assigned.
Change all return statements in case of error to jumps to `out'
label. Add `out' label to support cleanup.
* security.h: Add extern declarations for `well_known_local_sid',
`well_known_dialup_sid', `well_known_network_sid',
`well_known_batch_sid', `well_known_interactive_sid',
`well_known_service_sid' and `well_known_authenticated_users_sid'.
Add extern declarations for functions `create_token',
`extract_nt_dom_user' and `get_logon_server_and_user_domain'.
(class cygsid): Add method `assign'. Change operator= to call new
`assign' method. Add `debug_print' method.
(class cygsidlist): New class.
(legal_sid_type): Moved from sec_helper.cc to here.
* spawn.cc (spawn_guts) Revert reversion of previous patch.
Call `RevertToSelf' and `ImpersonateLoggedOnUser' instead of `seteuid'
again.
* syscalls.cc (seteuid): Rearranged. Call `create_token' now when
needed. Call `subauth' if `create_token' fails. Try setting token
owner and primary group only if token was not explicitely created
by `create_token'.
* uinfo.cc (internal_getlogin): Try harder to generate correct user
information. Especially don't trust return value of `GetUserName'.
2001-05-20 16:10:47 +08:00
|
|
|
|
2003-07-15 01:04:21 +08:00
|
|
|
/* If no impersonation token is available, try to
|
|
|
|
authenticate using NtCreateToken () or subauthentication. */
|
|
|
|
if (new_token == INVALID_HANDLE_VALUE)
|
2002-05-27 19:48:15 +08:00
|
|
|
{
|
2003-06-30 21:07:36 +08:00
|
|
|
new_token = create_token (usersid, groups, pw_new);
|
|
|
|
if (new_token == INVALID_HANDLE_VALUE)
|
2002-05-28 09:55:40 +08:00
|
|
|
{
|
2002-05-27 19:48:15 +08:00
|
|
|
/* create_token failed. Try subauthentication. */
|
|
|
|
debug_printf ("create token failed, try subauthentication.");
|
2003-06-30 21:07:36 +08:00
|
|
|
new_token = subauth (pw_new);
|
|
|
|
if (new_token == INVALID_HANDLE_VALUE)
|
2002-07-02 07:42:05 +08:00
|
|
|
goto failed;
|
2000-07-27 01:48:49 +08:00
|
|
|
}
|
2003-07-15 01:04:21 +08:00
|
|
|
/* Keep at most one internal token */
|
|
|
|
if (cygheap->user.internal_token != INVALID_HANDLE_VALUE)
|
|
|
|
CloseHandle (cygheap->user.internal_token);
|
|
|
|
cygheap->user.internal_token = new_token;
|
2002-05-27 19:48:15 +08:00
|
|
|
}
|
2003-07-15 01:04:21 +08:00
|
|
|
else if (new_token != ptok)
|
2002-05-27 19:48:15 +08:00
|
|
|
{
|
2003-07-15 01:04:21 +08:00
|
|
|
/* Try setting owner to same value as user. */
|
|
|
|
if (!SetTokenInformation (new_token, TokenOwner,
|
|
|
|
&usersid, sizeof usersid))
|
|
|
|
debug_printf ("SetTokenInformation(user.token, "
|
|
|
|
"TokenOwner): %E");
|
|
|
|
/* Try setting primary group in token to current group */
|
|
|
|
if (!SetTokenInformation (new_token,
|
|
|
|
TokenPrimaryGroup,
|
|
|
|
&groups.pgsid, sizeof (cygsid)))
|
|
|
|
debug_printf ("SetTokenInformation(user.token, "
|
|
|
|
"TokenPrimaryGroup): %E");
|
2002-05-27 19:48:15 +08:00
|
|
|
}
|
2003-06-30 21:07:36 +08:00
|
|
|
|
|
|
|
CloseHandle (ptok);
|
2003-07-15 01:04:21 +08:00
|
|
|
cygheap->user.set_sid (usersid);
|
|
|
|
cygheap->user.current_token = new_token == ptok ? INVALID_HANDLE_VALUE
|
|
|
|
: new_token;
|
|
|
|
cygheap->user.reimpersonate ();
|
2003-06-30 21:07:36 +08:00
|
|
|
success_9x:
|
2003-01-25 18:36:46 +08:00
|
|
|
cygheap->user.set_name (pw_new->pw_name);
|
2002-06-15 02:01:21 +08:00
|
|
|
myself->uid = uid;
|
2002-07-29 20:51:52 +08:00
|
|
|
groups.ischanged = FALSE;
|
2002-06-15 02:01:21 +08:00
|
|
|
return 0;
|
2002-05-27 19:48:15 +08:00
|
|
|
|
2003-03-08 00:35:56 +08:00
|
|
|
failed:
|
2003-06-30 21:07:36 +08:00
|
|
|
CloseHandle (ptok);
|
|
|
|
failed_ptok:
|
|
|
|
cygheap->user.reimpersonate ();
|
2002-05-27 19:48:15 +08:00
|
|
|
return -1;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2002-05-29 23:04:29 +08:00
|
|
|
extern "C" int
|
|
|
|
seteuid (__uid16_t uid)
|
|
|
|
{
|
|
|
|
return seteuid32 (uid16touid32 (uid));
|
|
|
|
}
|
|
|
|
|
|
|
|
/* setuid: POSIX 4.2.2.1 */
|
|
|
|
extern "C" int
|
|
|
|
setuid32 (__uid32_t uid)
|
|
|
|
{
|
|
|
|
int ret = seteuid32 (uid);
|
|
|
|
if (!ret)
|
|
|
|
cygheap->user.real_uid = myself->uid;
|
|
|
|
debug_printf ("real: %d, effective: %d", cygheap->user.real_uid, myself->uid);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" int
|
|
|
|
setuid (__uid16_t uid)
|
|
|
|
{
|
|
|
|
return setuid32 (uid16touid32 (uid));
|
|
|
|
}
|
|
|
|
|
2003-01-24 23:23:15 +08:00
|
|
|
extern "C" int
|
|
|
|
setreuid32 (__uid32_t ruid, __uid32_t euid)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
bool tried = false;
|
|
|
|
__uid32_t old_euid = myself->uid;
|
|
|
|
|
|
|
|
if (ruid != ILLEGAL_UID && cygheap->user.real_uid != ruid && euid != ruid)
|
|
|
|
tried = !(ret = seteuid32 (ruid));
|
|
|
|
if (!ret && euid != ILLEGAL_UID)
|
|
|
|
ret = seteuid32 (euid);
|
|
|
|
if (tried && (ret || euid == ILLEGAL_UID) && seteuid32 (old_euid))
|
|
|
|
system_printf ("Cannot restore original euid %u", old_euid);
|
|
|
|
if (!ret && ruid != ILLEGAL_UID)
|
|
|
|
cygheap->user.real_uid = ruid;
|
|
|
|
debug_printf ("real: %u, effective: %u", cygheap->user.real_uid, myself->uid);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" int
|
|
|
|
setreuid (__uid16_t ruid, __uid16_t euid)
|
|
|
|
{
|
|
|
|
return setreuid32 (uid16touid32 (ruid), uid16touid32 (euid));
|
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* setegid: from System V. */
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
Change internal gid datatype from __gid16_t to __gid32_t
throughout.
* cygwin.din: Export new symbols chown32, fchown32, getegid32,
getgid32, getgrgid32, getgrnam32, getgroups32, initgroups32, lchown32,
setgid32, setegid32, getgrent32.
* grp.cc (grp32togrp16): New static function.
(getgrgid32): New function.
(getgrnam32): Ditto.
(getgrent32): Ditto.
(getgroups32): Change name of internal function from getgroups.
(getgroups32): New function.
(initgroups32): Ditto.
* syscalls.cc (chown32): Ditto.
(lchown32): Ditto.
(fchown32): Ditto.
(setegid32): Ditto.
(setgid32): Ditto.
* uinfo.cc (getgid32): Ditto.
(getegid32): Ditto.
* include/cygwin/grp.h: Remove declaration of getgrgid() and getgrnam().
Declare getgrgid32() and getgrnam32() instead. Declare getgid32().
2002-05-28 22:10:55 +08:00
|
|
|
setegid32 (__gid32_t gid)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2003-01-25 18:36:46 +08:00
|
|
|
debug_printf ("new egid: %u current: %u", gid, myself->gid);
|
2002-05-27 19:48:15 +08:00
|
|
|
|
2003-01-25 18:36:46 +08:00
|
|
|
if (gid == myself->gid || !wincap.has_security ())
|
2002-09-13 17:00:28 +08:00
|
|
|
{
|
2003-01-25 18:36:46 +08:00
|
|
|
myself->gid = gid;
|
|
|
|
return 0;
|
2002-09-13 17:00:28 +08:00
|
|
|
}
|
|
|
|
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2002-07-29 20:51:52 +08:00
|
|
|
user_groups * groups = &cygheap->user.groups;
|
2002-05-27 19:48:15 +08:00
|
|
|
cygsid gsid;
|
|
|
|
HANDLE ptok;
|
2002-12-10 Pierre Humblet <pierre.humblet@ieee.org>
* pwdgrp.h (pwdgrp_check::pwdgrp_state): Replace by
pwdgrp_check::isinitializing ().
(pwdgrp_check::isinitializing): Create.
* passwd.cc (grab_int): Change type to unsigned, use strtoul and
set the pointer content to 0 if the field is invalid.
(parse_pwd): Move validity test after getting pw_gid.
(read_etc_passwd): Replace "passwd_state <= " by
passwd_state::isinitializing ().
(internal_getpwuid): Ditto.
(internal_getpwnam): Ditto.
(getpwent): Ditto.
(getpass): Ditto.
* grp.cc (parse_grp): Use strtoul for gr_gid and verify the validity.
(read_etc_group): Replace "group_state <= " by
group_state::isinitializing ().
(internal_getgrgid): Ditto.
(getgrent32): Ditto.
(internal_getgrent): Ditto.
2002-12-10 Pierre Humblet <pierre.humblet@ieee.org>
* security.h: Move declarations of internal_getgrent,
internal_getpwsid and internal_getgrsid to pwdgrp.h.
* pwdgrp.h: Declare internal_getpwsid, internal_getpwnam,
internal_getpwuid, internal_getgrsid, internal_getgrgid,
internal_getgrnam, internal_getgrent and internal_getgroups.
Delete "emulated" from enum pwdgrp_state.
(pwdgrp_check::isuninitialized): Create.
(pwdgrp_check::pwdgrp_state): Change state to initializing
rather than to uninitialized.
(pwdgrp_read::gets): Remove trailing CRs.
* passwd.cc (grab_string): Don't look for NLs.
(grab_int): Ditto.
(parse_pwd): Don't look for CRs. Return 0 if entry is too short.
(search_for): Delete.
(read_etc_passwd): Simplify tests to actually read the file.
Set state to loaded before making internal_getpwXX calls.
Replace search_for calls by equivalent internal_pwgetXX calls.
(internal_getpwsid): Use passwd_state.isuninitialized to decide
to call read_etc_passwd.
(internal_getpwuid): Create.
(internal_getpwnam): Create.
(getpwuid32): Simply call internal_getpwuid.
(getpwuid_r32): Call internal_getpwuid.
(getpwnam): Simply call internal_getpwnam.
(getpwnam_r): Call internal_getpwnam.
* grp.cc (parse_grp): Don't look for CRs. Adjust blank space.
(add_grp_line): Adjust blank space.
(class group_lock): Ditto.
(read_etc_group): Simplify tests to actually read the file.
Set state to loaded before making internal_getgrXX calls.
Replace getgrXX calls by equivalent internal calls.
(internal_getgrsid): Use group_state.isuninitialized to decide
to call read_etc_group.
(internal_getgrgid): Create.
(internal_getgrnam): Create.
(getgroups32): Simply call internal_getgrgid.
(getgrnam32): Simply call internal_getgrnam.
(internal_getgrent): Call group_state.isuninitialized.
(internal_getgroups): Create from the former getgroups32, using
two of the four arguments. Set gid to myself->gid and username
to cygheap->user.name ().
(getgroups32): Simply call internal_getgroup.
(getgroups): Call internal_getgroup instead of getgroups32.
(setgroups32): Call internal versions of get{pw,gr}XX.
* sec_helper.cc: Include pwdgrp.h.
(is_grp_member): Call internal versions of get{pw,gr}XX.
* security.cc: Include pwdgrp.h.
(alloc_sd): Call internal versions of get{pw,gr}XX.
* syscalls.cc: Include pwdgrp.h.
(seteuid32): Call internal versions of get{pw,gr}XX.
(setegid32): Ditto.
* uinfo.cc: Include pwdgrp.h.
(internal_getlogin): Call internal versions of get{pw,gr}XX.
(cygheap_user::ontherange): Ditto.
* sec_acl.cc: Include pwdgrp.h.
(setacl): Call internal versions of get{pw,gr}XX.
(acl_access): Ditto and simplify logic.
(aclfromtext): Ditto.
2002-12-10 20:43:49 +08:00
|
|
|
struct __group32 * gr = internal_getgrgid (gid);
|
2003-01-25 18:36:46 +08:00
|
|
|
|
|
|
|
if (!gsid.getfromgr (gr))
|
2000-06-17 03:36:07 +08:00
|
|
|
{
|
2002-05-27 19:48:15 +08:00
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
myself->gid = gid;
|
2001-04-25 17:43:25 +08:00
|
|
|
|
2002-07-29 20:51:52 +08:00
|
|
|
groups->update_pgrp (gsid);
|
2002-05-27 19:48:15 +08:00
|
|
|
/* If impersonated, update primary group and revert */
|
2002-06-17 07:34:43 +08:00
|
|
|
if (cygheap->user.issetuid ())
|
2002-05-27 19:48:15 +08:00
|
|
|
{
|
2003-06-30 21:07:36 +08:00
|
|
|
if (!SetTokenInformation (cygheap->user.token (),
|
2002-05-27 19:48:15 +08:00
|
|
|
TokenPrimaryGroup,
|
|
|
|
&gsid, sizeof gsid))
|
|
|
|
debug_printf ("SetTokenInformation(thread, "
|
|
|
|
"TokenPrimaryGroup): %E");
|
|
|
|
RevertToSelf ();
|
2000-06-17 03:36:07 +08:00
|
|
|
}
|
2002-06-19 23:27:27 +08:00
|
|
|
if (!OpenProcessToken (hMainProc, TOKEN_ADJUST_DEFAULT, &ptok))
|
2002-09-30 12:35:18 +08:00
|
|
|
debug_printf ("OpenProcessToken(): %E");
|
2000-06-17 03:36:07 +08:00
|
|
|
else
|
2002-05-27 19:48:15 +08:00
|
|
|
{
|
|
|
|
if (!SetTokenInformation (ptok, TokenPrimaryGroup,
|
|
|
|
&gsid, sizeof gsid))
|
|
|
|
debug_printf ("SetTokenInformation(process, "
|
|
|
|
"TokenPrimaryGroup): %E");
|
|
|
|
CloseHandle (ptok);
|
|
|
|
}
|
2002-06-17 07:34:43 +08:00
|
|
|
if (cygheap->user.issetuid ()
|
2003-06-30 21:07:36 +08:00
|
|
|
&& !ImpersonateLoggedOnUser (cygheap->user.token ()))
|
2002-05-27 19:48:15 +08:00
|
|
|
system_printf ("Impersonating in setegid failed: %E");
|
2000-06-17 03:36:07 +08:00
|
|
|
return 0;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
Change internal gid datatype from __gid16_t to __gid32_t
throughout.
* cygwin.din: Export new symbols chown32, fchown32, getegid32,
getgid32, getgrgid32, getgrnam32, getgroups32, initgroups32, lchown32,
setgid32, setegid32, getgrent32.
* grp.cc (grp32togrp16): New static function.
(getgrgid32): New function.
(getgrnam32): Ditto.
(getgrent32): Ditto.
(getgroups32): Change name of internal function from getgroups.
(getgroups32): New function.
(initgroups32): Ditto.
* syscalls.cc (chown32): Ditto.
(lchown32): Ditto.
(fchown32): Ditto.
(setegid32): Ditto.
(setgid32): Ditto.
* uinfo.cc (getgid32): Ditto.
(getegid32): Ditto.
* include/cygwin/grp.h: Remove declaration of getgrgid() and getgrnam().
Declare getgrgid32() and getgrnam32() instead. Declare getgid32().
2002-05-28 22:10:55 +08:00
|
|
|
extern "C" int
|
|
|
|
setegid (__gid16_t gid)
|
|
|
|
{
|
2002-05-29 23:04:29 +08:00
|
|
|
return setegid32 (gid16togid32 (gid));
|
Change internal gid datatype from __gid16_t to __gid32_t
throughout.
* cygwin.din: Export new symbols chown32, fchown32, getegid32,
getgid32, getgrgid32, getgrnam32, getgroups32, initgroups32, lchown32,
setgid32, setegid32, getgrent32.
* grp.cc (grp32togrp16): New static function.
(getgrgid32): New function.
(getgrnam32): Ditto.
(getgrent32): Ditto.
(getgroups32): Change name of internal function from getgroups.
(getgroups32): New function.
(initgroups32): Ditto.
* syscalls.cc (chown32): Ditto.
(lchown32): Ditto.
(fchown32): Ditto.
(setegid32): Ditto.
(setgid32): Ditto.
* uinfo.cc (getgid32): Ditto.
(getegid32): Ditto.
* include/cygwin/grp.h: Remove declaration of getgrgid() and getgrnam().
Declare getgrgid32() and getgrnam32() instead. Declare getgid32().
2002-05-28 22:10:55 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* setgid: POSIX 4.2.2.1 */
|
|
|
|
extern "C" int
|
|
|
|
setgid32 (__gid32_t gid)
|
|
|
|
{
|
|
|
|
int ret = setegid32 (gid);
|
|
|
|
if (!ret)
|
|
|
|
cygheap->user.real_gid = myself->gid;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" int
|
|
|
|
setgid (__gid16_t gid)
|
|
|
|
{
|
2002-05-29 23:04:29 +08:00
|
|
|
int ret = setegid32 (gid16togid32 (gid));
|
Change internal gid datatype from __gid16_t to __gid32_t
throughout.
* cygwin.din: Export new symbols chown32, fchown32, getegid32,
getgid32, getgrgid32, getgrnam32, getgroups32, initgroups32, lchown32,
setgid32, setegid32, getgrent32.
* grp.cc (grp32togrp16): New static function.
(getgrgid32): New function.
(getgrnam32): Ditto.
(getgrent32): Ditto.
(getgroups32): Change name of internal function from getgroups.
(getgroups32): New function.
(initgroups32): Ditto.
* syscalls.cc (chown32): Ditto.
(lchown32): Ditto.
(fchown32): Ditto.
(setegid32): Ditto.
(setgid32): Ditto.
* uinfo.cc (getgid32): Ditto.
(getegid32): Ditto.
* include/cygwin/grp.h: Remove declaration of getgrgid() and getgrnam().
Declare getgrgid32() and getgrnam32() instead. Declare getgid32().
2002-05-28 22:10:55 +08:00
|
|
|
if (!ret)
|
|
|
|
cygheap->user.real_gid = myself->gid;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2003-01-24 23:23:15 +08:00
|
|
|
extern "C" int
|
|
|
|
setregid32 (__gid32_t rgid, __gid32_t egid)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
bool tried = false;
|
|
|
|
__gid32_t old_egid = myself->gid;
|
|
|
|
|
|
|
|
if (rgid != ILLEGAL_GID && cygheap->user.real_gid != rgid && egid != rgid)
|
|
|
|
tried = !(ret = setegid32 (rgid));
|
|
|
|
if (!ret && egid != ILLEGAL_GID)
|
|
|
|
ret = setegid32 (egid);
|
|
|
|
if (tried && (ret || egid == ILLEGAL_GID) && setegid32 (old_egid))
|
|
|
|
system_printf ("Cannot restore original egid %u", old_egid);
|
|
|
|
if (!ret && rgid != ILLEGAL_GID)
|
|
|
|
cygheap->user.real_gid = rgid;
|
|
|
|
debug_printf ("real: %u, effective: %u", cygheap->user.real_gid, myself->gid);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" int
|
|
|
|
setregid (__gid16_t rgid, __gid16_t egid)
|
|
|
|
{
|
|
|
|
return setregid32 (gid16togid32 (rgid), gid16togid32 (egid));
|
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* chroot: privileged Unix system call. */
|
2000-07-20 04:14:24 +08:00
|
|
|
/* FIXME: Not privileged here. How should this be done? */
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2000-07-20 04:14:24 +08:00
|
|
|
chroot (const char *newroot)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2002-05-02 12:13:48 +08:00
|
|
|
path_conv path (newroot, PC_SYM_FOLLOW | PC_FULL | PC_POSIX);
|
2000-07-27 01:48:49 +08:00
|
|
|
|
2001-10-01 12:10:07 +08:00
|
|
|
int ret;
|
2000-07-20 04:14:24 +08:00
|
|
|
if (path.error)
|
2001-10-01 12:10:07 +08:00
|
|
|
ret = -1;
|
|
|
|
else if (!path.exists ())
|
2000-07-20 04:14:24 +08:00
|
|
|
{
|
|
|
|
set_errno (ENOENT);
|
2001-10-01 12:10:07 +08:00
|
|
|
ret = -1;
|
2000-07-20 04:14:24 +08:00
|
|
|
}
|
2001-10-01 12:10:07 +08:00
|
|
|
else if (!path.isdir ())
|
2000-07-20 04:14:24 +08:00
|
|
|
{
|
|
|
|
set_errno (ENOTDIR);
|
2001-10-01 12:10:07 +08:00
|
|
|
ret = -1;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2002-05-02 12:13:48 +08:00
|
|
|
cygheap->root.set (path.normalized_path, path);
|
2001-10-01 12:10:07 +08:00
|
|
|
ret = 0;
|
2000-07-20 04:14:24 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
syscall_printf ("%d = chroot (%s)", ret ? get_errno () : 0,
|
2000-07-27 01:48:49 +08:00
|
|
|
newroot ? newroot : "NULL");
|
2000-07-20 04:14:24 +08:00
|
|
|
return ret;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
creat (const char *path, mode_t mode)
|
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
return open (path, O_WRONLY | O_CREAT | O_TRUNC, mode);
|
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" void
|
2000-02-18 03:38:33 +08:00
|
|
|
__assertfail ()
|
|
|
|
{
|
|
|
|
exit (99);
|
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
getw (FILE *fp)
|
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
int w, ret;
|
|
|
|
ret = fread (&w, sizeof (int), 1, fp);
|
|
|
|
return ret != 1 ? EOF : w;
|
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
putw (int w, FILE *fp)
|
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
int ret;
|
|
|
|
ret = fwrite (&w, sizeof (int), 1, fp);
|
|
|
|
if (feof (fp) || ferror (fp))
|
|
|
|
return -1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2000-05-07 01:00:53 +08:00
|
|
|
wcscmp (const wchar_t *s1, const wchar_t *s2)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
while (*s1 && *s1 == *s2)
|
|
|
|
{
|
|
|
|
s1++;
|
|
|
|
s2++;
|
|
|
|
}
|
|
|
|
|
2001-03-03 11:56:34 +08:00
|
|
|
return (* (unsigned short *) s1) - (* (unsigned short *) s2);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" size_t
|
2000-05-07 01:00:53 +08:00
|
|
|
wcslen (const wchar_t *s1)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
int l = 0;
|
|
|
|
while (s1[l])
|
|
|
|
l++;
|
|
|
|
return l;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* FIXME: to do this right, maybe work out the usoft va_list machine
|
|
|
|
and use wsvprintfW instead?
|
|
|
|
*/
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
wprintf (const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
va_start (ap, fmt);
|
|
|
|
ret = vprintf (fmt, ap);
|
|
|
|
va_end (ap);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
vhangup ()
|
|
|
|
{
|
|
|
|
set_errno (ENOSYS);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" _PTR
|
2000-02-18 03:38:33 +08:00
|
|
|
memccpy (_PTR out, const _PTR in, int c, size_t len)
|
|
|
|
{
|
|
|
|
const char *inc = (char *) in;
|
|
|
|
char *outc = (char *) out;
|
|
|
|
|
|
|
|
while (len)
|
|
|
|
{
|
|
|
|
char x = *inc++;
|
|
|
|
*outc++ = x;
|
|
|
|
if (x == c)
|
|
|
|
return outc;
|
|
|
|
len --;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
nice (int incr)
|
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
DWORD priority[] =
|
|
|
|
{
|
|
|
|
IDLE_PRIORITY_CLASS,
|
|
|
|
IDLE_PRIORITY_CLASS,
|
|
|
|
NORMAL_PRIORITY_CLASS,
|
|
|
|
HIGH_PRIORITY_CLASS,
|
|
|
|
REALTIME_PRIORITY_CLASS,
|
|
|
|
REALTIME_PRIORITY_CLASS
|
|
|
|
};
|
|
|
|
int curr = 2;
|
|
|
|
|
|
|
|
switch (GetPriorityClass (hMainProc))
|
|
|
|
{
|
|
|
|
case IDLE_PRIORITY_CLASS:
|
|
|
|
curr = 1;
|
|
|
|
break;
|
|
|
|
case NORMAL_PRIORITY_CLASS:
|
|
|
|
curr = 2;
|
|
|
|
break;
|
|
|
|
case HIGH_PRIORITY_CLASS:
|
|
|
|
curr = 3;
|
|
|
|
break;
|
|
|
|
case REALTIME_PRIORITY_CLASS:
|
|
|
|
curr = 4;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (incr > 0)
|
|
|
|
incr = -1;
|
|
|
|
else if (incr < 0)
|
|
|
|
incr = 1;
|
|
|
|
|
|
|
|
if (SetPriorityClass (hMainProc, priority[curr + incr]) == FALSE)
|
|
|
|
{
|
|
|
|
__seterrno ();
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Find the first bit set in I.
|
|
|
|
*/
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
ffs (int i)
|
|
|
|
{
|
|
|
|
static const unsigned char table[] =
|
|
|
|
{
|
|
|
|
0,1,2,2,3,3,3,3,4,4,4,4,4,4,4,4,5,5,5,5,5,5,5,5,5,5,5,5,5,5,5,5,
|
|
|
|
6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,
|
|
|
|
7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,
|
|
|
|
7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,
|
|
|
|
8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
|
|
|
|
8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
|
|
|
|
8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
|
|
|
|
8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8
|
|
|
|
};
|
|
|
|
unsigned long int a;
|
|
|
|
unsigned long int x = i & -i;
|
|
|
|
|
|
|
|
a = x <= 0xffff ? (x <= 0xff ? 0 : 8) : (x <= 0xffffff ? 16 : 24);
|
|
|
|
|
|
|
|
return table[x >> a] + a;
|
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" void
|
2000-02-18 03:38:33 +08:00
|
|
|
login (struct utmp *ut)
|
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
register int fd;
|
|
|
|
|
2002-11-07 10:19:52 +08:00
|
|
|
pututline (ut);
|
2003-03-08 11:36:39 +08:00
|
|
|
endutent ();
|
2003-03-29 21:15:55 +08:00
|
|
|
/* Writing to wtmp must be atomic to prevent mixed up data. */
|
2003-05-21 16:01:57 +08:00
|
|
|
char mutex_name[MAX_PATH];
|
|
|
|
HANDLE mutex = CreateMutex (NULL, FALSE,
|
|
|
|
shared_name (mutex_name, "wtmp_mutex", 0));
|
2003-03-29 20:44:01 +08:00
|
|
|
if (mutex)
|
|
|
|
while (WaitForSingleObject (mutex, INFINITE) == WAIT_ABANDONED)
|
|
|
|
;
|
2001-03-19 05:11:25 +08:00
|
|
|
if ((fd = open (_PATH_WTMP, O_WRONLY | O_APPEND | O_BINARY, 0)) >= 0)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2003-03-29 20:44:01 +08:00
|
|
|
write (fd, ut, sizeof *ut);
|
|
|
|
close (fd);
|
|
|
|
}
|
|
|
|
if (mutex)
|
|
|
|
{
|
|
|
|
ReleaseMutex (mutex);
|
|
|
|
CloseHandle (mutex);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-09-30 09:56:40 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
logout (char *line)
|
|
|
|
{
|
2000-10-12 12:38:29 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2003-03-29 20:44:01 +08:00
|
|
|
struct utmp ut_buf, *ut;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2003-03-29 20:44:01 +08:00
|
|
|
memset (&ut_buf, 0, sizeof ut_buf);
|
|
|
|
strncpy (ut_buf.ut_line, line, sizeof ut_buf.ut_line);
|
|
|
|
setutent ();
|
|
|
|
ut = getutline (&ut_buf);
|
2003-08-05 12:49:44 +08:00
|
|
|
|
2003-03-29 20:44:01 +08:00
|
|
|
if (ut)
|
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
|
2003-08-05 12:49:44 +08:00
|
|
|
ut->ut_type = DEAD_PROCESS;
|
|
|
|
memset (ut->ut_user, 0, sizeof ut->ut_user);
|
|
|
|
time (&ut->ut_time);
|
2003-03-29 21:15:55 +08:00
|
|
|
/* Writing to wtmp must be atomic to prevent mixed up data. */
|
2003-05-21 16:01:57 +08:00
|
|
|
char mutex_name[MAX_PATH];
|
|
|
|
HANDLE mutex = CreateMutex (NULL, FALSE,
|
2003-07-26 12:53:59 +08:00
|
|
|
shared_name (mutex_name, "wtmp_mutex", 0));
|
2003-03-29 20:44:01 +08:00
|
|
|
if (mutex)
|
|
|
|
while (WaitForSingleObject (mutex, INFINITE) == WAIT_ABANDONED)
|
|
|
|
;
|
|
|
|
if ((fd = open (_PATH_WTMP, O_WRONLY | O_APPEND | O_BINARY, 0)) >= 0)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2003-03-29 20:44:01 +08:00
|
|
|
write (fd, &ut_buf, sizeof ut_buf);
|
2003-08-05 12:49:44 +08:00
|
|
|
debug_printf ("set logout time for %s", line);
|
2003-03-29 20:44:01 +08:00
|
|
|
close (fd);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2003-03-29 20:44:01 +08:00
|
|
|
if (mutex)
|
|
|
|
{
|
|
|
|
ReleaseMutex (mutex);
|
|
|
|
CloseHandle (mutex);
|
|
|
|
}
|
2003-08-05 12:49:44 +08:00
|
|
|
memset (ut->ut_line, 0, sizeof ut_buf.ut_line);
|
|
|
|
ut->ut_time = 0;
|
|
|
|
pututline (ut);
|
2003-03-29 20:44:01 +08:00
|
|
|
endutent ();
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2003-03-29 20:44:01 +08:00
|
|
|
return 1;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2001-12-28 23:53:27 +08:00
|
|
|
|
2003-03-29 20:44:01 +08:00
|
|
|
static int utmp_fd = -1;
|
|
|
|
static bool utmp_readonly = false;
|
2001-12-28 23:53:27 +08:00
|
|
|
static char *utmp_file = (char *) _PATH_UTMP;
|
|
|
|
|
2003-03-29 20:44:01 +08:00
|
|
|
static void
|
|
|
|
internal_setutent (bool force_readwrite)
|
2001-12-28 23:53:27 +08:00
|
|
|
{
|
|
|
|
sigframe thisframe (mainthread);
|
2003-03-29 20:44:01 +08:00
|
|
|
if (force_readwrite && utmp_readonly)
|
|
|
|
endutent ();
|
|
|
|
if (utmp_fd < 0)
|
|
|
|
{
|
|
|
|
utmp_fd = open (utmp_file, O_RDWR | O_BINARY);
|
|
|
|
/* If open fails, we assume an unprivileged process (who?). In this
|
|
|
|
case we try again for reading only unless the process calls
|
|
|
|
pututline() (==force_readwrite) in which case opening just fails. */
|
|
|
|
if (utmp_fd < 0 && !force_readwrite)
|
2003-07-26 12:53:59 +08:00
|
|
|
{
|
2003-03-29 20:44:01 +08:00
|
|
|
utmp_fd = open (utmp_file, O_RDONLY | O_BINARY);
|
|
|
|
if (utmp_fd >= 0)
|
|
|
|
utmp_readonly = true;
|
2003-07-26 12:53:59 +08:00
|
|
|
}
|
2003-03-29 20:44:01 +08:00
|
|
|
}
|
2003-03-08 11:36:39 +08:00
|
|
|
else
|
|
|
|
lseek (utmp_fd, 0, SEEK_SET);
|
2001-12-28 23:53:27 +08:00
|
|
|
}
|
|
|
|
|
2003-03-29 20:44:01 +08:00
|
|
|
extern "C" void
|
|
|
|
setutent ()
|
|
|
|
{
|
|
|
|
internal_setutent (false);
|
|
|
|
}
|
|
|
|
|
2001-12-28 23:53:27 +08:00
|
|
|
extern "C" void
|
|
|
|
endutent ()
|
|
|
|
{
|
|
|
|
sigframe thisframe (mainthread);
|
2003-03-29 20:44:01 +08:00
|
|
|
if (utmp_fd >= 0)
|
2002-11-07 10:19:52 +08:00
|
|
|
{
|
|
|
|
close (utmp_fd);
|
2003-03-29 20:44:01 +08:00
|
|
|
utmp_fd = -1;
|
|
|
|
utmp_readonly = false;
|
2002-11-07 10:19:52 +08:00
|
|
|
}
|
2001-12-28 23:53:27 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" void
|
|
|
|
utmpname (_CONST char *file)
|
|
|
|
{
|
|
|
|
sigframe thisframe (mainthread);
|
|
|
|
if (check_null_empty_str (file))
|
|
|
|
{
|
|
|
|
debug_printf ("Invalid file");
|
|
|
|
return;
|
|
|
|
}
|
2002-11-07 10:19:52 +08:00
|
|
|
endutent ();
|
2001-12-28 23:53:27 +08:00
|
|
|
utmp_file = strdup (file);
|
|
|
|
debug_printf ("New UTMP file: %s", utmp_file);
|
|
|
|
}
|
|
|
|
|
2003-08-05 12:49:44 +08:00
|
|
|
/* Note: do not make NO_COPY */
|
|
|
|
static struct utmp utmp_data_buf[16];
|
|
|
|
static unsigned utix = 0;
|
|
|
|
#define nutdbuf (sizeof (utmp_data_buf) / sizeof (utmp_data_buf[0]))
|
|
|
|
#define utmp_data ({ \
|
|
|
|
if (utix > nutdbuf) \
|
|
|
|
utix = 0; \
|
|
|
|
utmp_data_buf + utix++; \
|
|
|
|
})
|
|
|
|
|
2001-12-28 23:53:27 +08:00
|
|
|
extern "C" struct utmp *
|
|
|
|
getutent ()
|
|
|
|
{
|
|
|
|
sigframe thisframe (mainthread);
|
2003-03-29 20:44:01 +08:00
|
|
|
if (utmp_fd < 0)
|
|
|
|
{
|
|
|
|
internal_setutent (false);
|
|
|
|
if (utmp_fd < 0)
|
2003-07-26 12:53:59 +08:00
|
|
|
return NULL;
|
2003-03-29 20:44:01 +08:00
|
|
|
}
|
2003-08-05 12:49:44 +08:00
|
|
|
|
|
|
|
utmp *ut = utmp_data;
|
|
|
|
if (read (utmp_fd, ut, sizeof *ut) != sizeof *ut)
|
2001-12-28 23:53:27 +08:00
|
|
|
return NULL;
|
2003-08-05 12:49:44 +08:00
|
|
|
return ut;
|
2001-12-28 23:53:27 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" struct utmp *
|
|
|
|
getutid (struct utmp *id)
|
|
|
|
{
|
|
|
|
sigframe thisframe (mainthread);
|
|
|
|
if (check_null_invalid_struct_errno (id))
|
|
|
|
return NULL;
|
2003-03-29 20:44:01 +08:00
|
|
|
if (utmp_fd < 0)
|
|
|
|
{
|
|
|
|
internal_setutent (false);
|
|
|
|
if (utmp_fd < 0)
|
2003-07-26 12:53:59 +08:00
|
|
|
return NULL;
|
2003-03-29 20:44:01 +08:00
|
|
|
}
|
2003-08-05 12:49:44 +08:00
|
|
|
|
|
|
|
utmp *ut = utmp_data;
|
|
|
|
while (read (utmp_fd, ut, sizeof *ut) == sizeof *ut)
|
2001-12-28 23:53:27 +08:00
|
|
|
{
|
|
|
|
switch (id->ut_type)
|
|
|
|
{
|
|
|
|
case RUN_LVL:
|
|
|
|
case BOOT_TIME:
|
|
|
|
case OLD_TIME:
|
|
|
|
case NEW_TIME:
|
2003-08-05 12:49:44 +08:00
|
|
|
if (id->ut_type == ut->ut_type)
|
|
|
|
return ut;
|
2001-12-28 23:53:27 +08:00
|
|
|
break;
|
|
|
|
case INIT_PROCESS:
|
|
|
|
case LOGIN_PROCESS:
|
|
|
|
case USER_PROCESS:
|
|
|
|
case DEAD_PROCESS:
|
2003-08-05 12:49:44 +08:00
|
|
|
if (strncmp (id->ut_id, ut->ut_id, UT_IDLEN) == 0)
|
|
|
|
return ut;
|
2001-12-28 23:53:27 +08:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" struct utmp *
|
|
|
|
getutline (struct utmp *line)
|
|
|
|
{
|
|
|
|
sigframe thisframe (mainthread);
|
|
|
|
if (check_null_invalid_struct_errno (line))
|
|
|
|
return NULL;
|
2003-03-29 20:44:01 +08:00
|
|
|
if (utmp_fd < 0)
|
|
|
|
{
|
|
|
|
internal_setutent (false);
|
|
|
|
if (utmp_fd < 0)
|
2003-07-26 12:53:59 +08:00
|
|
|
return NULL;
|
2003-03-29 20:44:01 +08:00
|
|
|
}
|
2003-08-05 12:49:44 +08:00
|
|
|
|
|
|
|
utmp *ut = utmp_data;
|
|
|
|
while (read (utmp_fd, ut, sizeof *ut) == sizeof *ut)
|
|
|
|
if ((ut->ut_type == LOGIN_PROCESS ||
|
|
|
|
ut->ut_type == USER_PROCESS) &&
|
|
|
|
!strncmp (ut->ut_line, line->ut_line, sizeof (ut->ut_line)))
|
|
|
|
return ut;
|
|
|
|
|
2001-12-28 23:53:27 +08:00
|
|
|
return NULL;
|
|
|
|
}
|
2002-11-07 10:19:52 +08:00
|
|
|
|
|
|
|
extern "C" void
|
|
|
|
pututline (struct utmp *ut)
|
|
|
|
{
|
|
|
|
sigframe thisframe (mainthread);
|
|
|
|
if (check_null_invalid_struct (ut))
|
|
|
|
return;
|
2003-03-29 20:44:01 +08:00
|
|
|
internal_setutent (true);
|
|
|
|
if (utmp_fd < 0)
|
2003-08-05 12:49:44 +08:00
|
|
|
{
|
|
|
|
debug_printf ("error: utmp_fd %d", utmp_fd);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
debug_printf ("ut->ut_type %d, ut->ut_pid %d, ut->ut_line '%s', ut->ut_id '%s'\n",
|
|
|
|
ut->ut_type, ut->ut_pid, ut->ut_line, ut->ut_id);
|
|
|
|
debug_printf ("ut->ut_user '%s', ut->ut_host '%s'\n",
|
|
|
|
ut->ut_user, ut->ut_host);
|
2003-03-29 20:44:01 +08:00
|
|
|
/* Read/write to utmp must be atomic to prevent overriding data
|
|
|
|
by concurrent processes. */
|
2003-05-21 16:01:57 +08:00
|
|
|
char mutex_name[MAX_PATH];
|
|
|
|
HANDLE mutex = CreateMutex (NULL, FALSE,
|
|
|
|
shared_name (mutex_name, "utmp_mutex", 0));
|
2003-03-29 20:44:01 +08:00
|
|
|
if (mutex)
|
|
|
|
while (WaitForSingleObject (mutex, INFINITE) == WAIT_ABANDONED)
|
|
|
|
;
|
2002-11-07 10:19:52 +08:00
|
|
|
struct utmp *u;
|
|
|
|
if ((u = getutid (ut)))
|
2003-03-29 20:44:01 +08:00
|
|
|
lseek (utmp_fd, -sizeof *ut, SEEK_CUR);
|
2002-11-07 10:19:52 +08:00
|
|
|
else
|
|
|
|
lseek (utmp_fd, 0, SEEK_END);
|
2003-03-29 20:44:01 +08:00
|
|
|
write (utmp_fd, ut, sizeof *ut);
|
|
|
|
if (mutex)
|
|
|
|
{
|
|
|
|
ReleaseMutex (mutex);
|
|
|
|
CloseHandle (mutex);
|
|
|
|
}
|
2002-11-07 10:19:52 +08:00
|
|
|
}
|
2003-04-16 11:03:45 +08:00
|
|
|
|
|
|
|
extern "C"
|
|
|
|
long gethostid(void)
|
|
|
|
{
|
|
|
|
unsigned data[13] = {0x92895012,
|
2003-07-26 12:53:59 +08:00
|
|
|
0x10293412,
|
|
|
|
0x29602018,
|
|
|
|
0x81928167,
|
|
|
|
0x34601329,
|
|
|
|
0x75630198,
|
|
|
|
0x89860395,
|
|
|
|
0x62897564,
|
|
|
|
0x00194362,
|
|
|
|
0x20548593,
|
|
|
|
0x96839102,
|
|
|
|
0x12219854,
|
|
|
|
0x00290012};
|
2003-04-16 11:03:45 +08:00
|
|
|
|
|
|
|
bool has_cpuid = false;
|
2003-07-07 04:08:42 +08:00
|
|
|
sigframe thisframe (mainthread);
|
|
|
|
|
|
|
|
DWORD opmask = SetThreadAffinityMask (GetCurrentThread (), 1);
|
|
|
|
if (!opmask)
|
|
|
|
debug_printf ("SetThreadAffinityMask to 1 failed, %E");
|
2003-04-16 11:03:45 +08:00
|
|
|
|
|
|
|
if (!can_set_flag (0x00040000))
|
|
|
|
debug_printf ("386 processor - no cpuid");
|
|
|
|
else
|
|
|
|
{
|
|
|
|
debug_printf ("486 processor");
|
|
|
|
if (can_set_flag (0x00200000))
|
2003-07-26 12:53:59 +08:00
|
|
|
{
|
|
|
|
debug_printf ("processor supports CPUID instruction");
|
|
|
|
has_cpuid = true;
|
|
|
|
}
|
2003-04-16 11:03:45 +08:00
|
|
|
else
|
2003-07-26 12:53:59 +08:00
|
|
|
debug_printf ("processor does not support CPUID instruction");
|
2003-04-16 11:03:45 +08:00
|
|
|
}
|
|
|
|
if (has_cpuid)
|
|
|
|
{
|
|
|
|
unsigned maxf, unused[3];
|
|
|
|
cpuid (&maxf, &unused[0], &unused[1], &unused[2], 0);
|
|
|
|
maxf &= 0xffff;
|
|
|
|
if (maxf >= 1)
|
2003-07-26 12:53:59 +08:00
|
|
|
{
|
|
|
|
unsigned features;
|
|
|
|
cpuid (&data[0], &unused[0], &unused[1], &features, 1);
|
|
|
|
if (features & (1 << 18))
|
|
|
|
{
|
|
|
|
debug_printf ("processor has psn");
|
|
|
|
if (maxf >= 3)
|
|
|
|
{
|
|
|
|
cpuid (&unused[0], &unused[1], &data[1], &data[2], 3);
|
|
|
|
debug_printf ("Processor PSN: %04x-%04x-%04x-%04x-%04x-%04x",
|
|
|
|
data[0] >> 16, data[0] & 0xffff, data[2] >> 16, data[2] & 0xffff, data[1] >> 16, data[1] & 0xffff);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
debug_printf ("processor does not have psn");
|
|
|
|
}
|
2003-04-16 11:03:45 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
UUID Uuid;
|
|
|
|
RPC_STATUS status = UuidCreateSequential (&Uuid);
|
|
|
|
if (GetLastError () == ERROR_PROC_NOT_FOUND)
|
|
|
|
status = UuidCreate (&Uuid);
|
|
|
|
if (status == RPC_S_OK)
|
|
|
|
{
|
|
|
|
data[4] = *(unsigned *)&Uuid.Data4[2];
|
|
|
|
data[5] = *(unsigned short *)&Uuid.Data4[6];
|
|
|
|
// Unfortunately Windows will sometimes pick a virtual Ethernet card
|
|
|
|
// e.g. VMWare Virtual Ethernet Adaptor
|
|
|
|
debug_printf ("MAC address of first Ethernet card: %02x:%02x:%02x:%02x:%02x:%02x",
|
2003-07-26 12:53:59 +08:00
|
|
|
Uuid.Data4[2], Uuid.Data4[3], Uuid.Data4[4],
|
|
|
|
Uuid.Data4[5], Uuid.Data4[6], Uuid.Data4[7]);
|
2003-04-16 11:03:45 +08:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
debug_printf ("no Ethernet card installed");
|
|
|
|
}
|
|
|
|
|
|
|
|
reg_key key (HKEY_LOCAL_MACHINE, KEY_READ, "SOFTWARE", "Microsoft", "Windows", "CurrentVersion", NULL);
|
|
|
|
key.get_string ("ProductId", (char *)&data[6], 24, "00000-000-0000000-00000");
|
|
|
|
debug_printf ("Windows Product ID: %s", (char *)&data[6]);
|
|
|
|
|
|
|
|
GetDiskFreeSpaceEx ("C:\\", NULL, (PULARGE_INTEGER) &data[11], NULL);
|
|
|
|
if (GetLastError () == ERROR_PROC_NOT_FOUND)
|
|
|
|
GetDiskFreeSpace ("C:\\", NULL, NULL, NULL, (DWORD *)&data[11]);
|
|
|
|
|
|
|
|
debug_printf ("hostid entropy: %08x %08x %08x %08x "
|
2003-07-26 12:53:59 +08:00
|
|
|
"%08x %08x %08x %08x "
|
|
|
|
"%08x %08x %08x %08x "
|
|
|
|
"%08x",
|
|
|
|
data[0], data[1],
|
|
|
|
data[2], data[3],
|
|
|
|
data[4], data[5],
|
|
|
|
data[6], data[7],
|
|
|
|
data[8], data[9],
|
|
|
|
data[10], data[11],
|
|
|
|
data[12]);
|
2003-04-16 11:03:45 +08:00
|
|
|
|
|
|
|
long hostid = 0x40291372;
|
|
|
|
// a random hashing algorithm
|
|
|
|
// dependancy on md5 is probably too costly
|
|
|
|
for (int i=0;i<13;i++)
|
2003-07-07 04:13:48 +08:00
|
|
|
hostid ^= ((data[i] << (i << 2)) | (data[i] >> (32 - (i << 2))));
|
2003-04-16 11:03:45 +08:00
|
|
|
|
2003-07-07 04:08:42 +08:00
|
|
|
if (opmask && !SetThreadAffinityMask (GetCurrentThread (), opmask))
|
|
|
|
debug_printf ("SetThreadAffinityMask to %p failed, %E", opmask);
|
|
|
|
|
2003-04-16 11:03:45 +08:00
|
|
|
debug_printf ("hostid: %08x", hostid);
|
|
|
|
|
|
|
|
return hostid;
|
|
|
|
}
|