- From 7c0b0dbd0345cf2f01bbb373763ecc4679c3da17 Mon Sep 17 00:00:00 2001
- From: Roland Mainz <roland.mainz@nrubsig.org>
- Date: Sat, 25 May 2024 12:05:10 +0200
- Subject: [PATCH 1/7] build.vc19,libtirpc: Compile libtirpc with
- WarningLevel=Level4
- Compile libtirpc with WarningLevel=Level4
- Signed-off-by: Cedric Blancher <cedric.blancher@gmail.com>
- ---
- build.vc19/libtirpc/libtirpc.vcxproj | 12 ++++++++----
- libtirpc/src/auth_sspi.c | 23 +++++++++++++----------
- libtirpc/src/auth_time.c | 6 ++++--
- libtirpc/src/authsspi_prot.c | 8 +++++---
- libtirpc/src/bindresvport.c | 2 +-
- libtirpc/src/clnt_dg.c | 2 +-
- libtirpc/src/clnt_generic.c | 2 +-
- libtirpc/src/clnt_simple.c | 2 +-
- libtirpc/src/clnt_vc.c | 2 +-
- libtirpc/src/getnetconfig.c | 5 -----
- libtirpc/src/key_call.c | 8 +++++++-
- libtirpc/src/key_prot_xdr.c | 8 +++++++-
- libtirpc/src/mt_misc.c | 10 +++++-----
- libtirpc/src/rpc_generic.c | 15 ++++++++-------
- libtirpc/src/svc_vc.c | 2 +-
- libtirpc/src/wintirpc.c | 4 ++--
- libtirpc/src/xdr.c | 10 ++++++++++
- libtirpc/tirpc/rpc/auth_sspi.h | 6 +++---
- 18 files changed, 78 insertions(+), 49 deletions(-)
- diff --git a/build.vc19/libtirpc/libtirpc.vcxproj b/build.vc19/libtirpc/libtirpc.vcxproj
- index bbb7dd4..c2d5d32 100644
- --- a/build.vc19/libtirpc/libtirpc.vcxproj
- +++ b/build.vc19/libtirpc/libtirpc.vcxproj
- @@ -85,7 +85,7 @@
- <ClCompile>
- <PrecompiledHeader>
- </PrecompiledHeader>
- - <WarningLevel>Level3</WarningLevel>
- + <WarningLevel>Level4</WarningLevel>
- <Optimization>Disabled</Optimization>
- <PreprocessorDefinitions>FD_SETSIZE=1024;INET6;NO_CB_4_KRB5P;PORTMAP;_WINSOCK_DEPRECATED_NO_WARNINGS;WIN32;UNICODE;_UNICODE;_DEBUG;_WINDOWS;_USRDLL;LIBTIRPC_EXPORTS;%(PreprocessorDefinitions)</PreprocessorDefinitions>
- <AdditionalIncludeDirectories>..\..\libtirpc\tirpc;%(AdditionalIncludeDirectories)</AdditionalIncludeDirectories>
- @@ -94,6 +94,7 @@
- <BasicRuntimeChecks>Default</BasicRuntimeChecks>
- <BufferSecurityCheck>false</BufferSecurityCheck>
- <RuntimeLibrary>MultiThreadedDebugDLL</RuntimeLibrary>
- + <AdditionalOptions>/wd4100 /wd4131 /wd4389</AdditionalOptions>
- </ClCompile>
- <Link>
- <SubSystem>Windows</SubSystem>
- @@ -106,7 +107,7 @@
- <ClCompile>
- <PrecompiledHeader>
- </PrecompiledHeader>
- - <WarningLevel>Level3</WarningLevel>
- + <WarningLevel>Level4</WarningLevel>
- <Optimization>Disabled</Optimization>
- <PreprocessorDefinitions>FD_SETSIZE=1024;INET6;NO_CB_4_KRB5P;PORTMAP;_WINSOCK_DEPRECATED_NO_WARNINGS;WIN32;UNICODE;_UNICODE;_DEBUG;_WINDOWS;_USRDLL;LIBTIRPC_EXPORTS;%(PreprocessorDefinitions)</PreprocessorDefinitions>
- <AdditionalIncludeDirectories>..\..\libtirpc\tirpc;%(AdditionalIncludeDirectories)</AdditionalIncludeDirectories>
- @@ -115,6 +116,7 @@
- <BasicRuntimeChecks>Default</BasicRuntimeChecks>
- <BufferSecurityCheck>false</BufferSecurityCheck>
- <RuntimeLibrary>MultiThreadedDebugDLL</RuntimeLibrary>
- + <AdditionalOptions>/wd4100 /wd4131 /wd4389</AdditionalOptions>
- </ClCompile>
- <Link>
- <SubSystem>Windows</SubSystem>
- @@ -125,7 +127,7 @@
- </ItemDefinitionGroup>
- <ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Release|Win32'">
- <ClCompile>
- - <WarningLevel>Level3</WarningLevel>
- + <WarningLevel>Level4</WarningLevel>
- <PrecompiledHeader>
- </PrecompiledHeader>
- <Optimization>MaxSpeed</Optimization>
- @@ -137,6 +139,7 @@
- <StringPooling>true</StringPooling>
- <BufferSecurityCheck>false</BufferSecurityCheck>
- <RuntimeLibrary>MultiThreadedDLL</RuntimeLibrary>
- + <AdditionalOptions>/wd4100 /wd4131 /wd4389</AdditionalOptions>
- </ClCompile>
- <Link>
- <SubSystem>Windows</SubSystem>
- @@ -149,7 +152,7 @@
- </ItemDefinitionGroup>
- <ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Release|x64'">
- <ClCompile>
- - <WarningLevel>Level3</WarningLevel>
- + <WarningLevel>Level4</WarningLevel>
- <PrecompiledHeader>
- </PrecompiledHeader>
- <Optimization>MaxSpeed</Optimization>
- @@ -161,6 +164,7 @@
- <StringPooling>true</StringPooling>
- <BufferSecurityCheck>false</BufferSecurityCheck>
- <RuntimeLibrary>MultiThreadedDLL</RuntimeLibrary>
- + <AdditionalOptions>/wd4100 /wd4131 /wd4389</AdditionalOptions>
- </ClCompile>
- <Link>
- <SubSystem>Windows</SubSystem>
- diff --git a/libtirpc/src/auth_sspi.c b/libtirpc/src/auth_sspi.c
- index 67f242e..345b5ba 100644
- --- a/libtirpc/src/auth_sspi.c
- +++ b/libtirpc/src/auth_sspi.c
- @@ -159,7 +159,7 @@ authsspi_create_default(CLIENT *clnt, char *service, int svc)
- goto out_err;
- sec->svc = svc;
- // Let's acquire creds here for now
- - maj_stat = AcquireCredentialsHandleA(NULL, sec_pkg_name, SECPKG_CRED_BOTH,
- + maj_stat = AcquireCredentialsHandleA(NULL, (LPSTR)sec_pkg_name, SECPKG_CRED_BOTH,
- NULL, NULL, NULL, NULL, &sec->cred, &sec->expiry);
- if (maj_stat != SEC_E_OK) {
- log_debug("authgss_create_default: AcquireCredentialsHandleA failed with %x", maj_stat);
- @@ -275,7 +275,8 @@ static bool_t
- authsspi_validate(AUTH *auth, struct opaque_auth *verf, u_int seq)
- {
- struct rpc_sspi_data *gd;
- - u_int num, qop_state, cur_seq;
- + u_int num, cur_seq = 0;
- + unsigned long qop_state;
- sspi_buffer_desc signbuf, checksum;
- uint32_t maj_stat;
- @@ -345,7 +346,8 @@ authsspi_refresh(AUTH *auth, void *tmp)
- struct rpc_sspi_data *gd;
- struct rpc_sspi_init_res gr;
- sspi_buffer_desc *recv_tokenp, send_token;
- - uint32_t maj_stat, call_stat, ret_flags, i;
- + uint32_t maj_stat, call_stat, i;
- + unsigned long ret_flags;
- unsigned long flags =
- ISC_REQ_MUTUAL_AUTH|ISC_REQ_INTEGRITY|ISC_REQ_ALLOCATE_MEMORY;
- SecBufferDesc out_desc, in_desc;
- @@ -493,7 +495,8 @@ authsspi_refresh(AUTH *auth, void *tmp)
- */
- if (maj_stat == SEC_E_OK) {
- sspi_buffer_desc bufin;
- - u_int seq, qop_state = 0;
- + u_int seq;
- + unsigned long qop_state = 0;
- print_negotiated_attrs(&gd->ctx);
- @@ -664,7 +667,7 @@ uint32_t sspi_get_mic(PCtxtHandle ctx, u_int qop, u_int seq,
- maj_stat = QueryContextAttributesA(ctx, SECPKG_ATTR_SIZES, &ContextSizes);
- if (maj_stat != SEC_E_OK) return maj_stat;
- - if (ContextSizes.cbMaxSignature == 0) return SEC_E_INTERNAL_ERROR;
- + if (ContextSizes.cbMaxSignature == 0) return (uint32_t)SEC_E_INTERNAL_ERROR;
- desc.cBuffers = 2;
- desc.pBuffers = sec_tkn;
- @@ -675,7 +678,7 @@ uint32_t sspi_get_mic(PCtxtHandle ctx, u_int qop, u_int seq,
- sec_tkn[1].BufferType = SECBUFFER_TOKEN;
- sec_tkn[1].cbBuffer = ContextSizes.cbMaxSignature;
- sec_tkn[1].pvBuffer = calloc(ContextSizes.cbMaxSignature, sizeof(char));
- - if (sec_tkn[1].pvBuffer == NULL) return SEC_E_INSUFFICIENT_MEMORY;
- + if (sec_tkn[1].pvBuffer == NULL) return (uint32_t)SEC_E_INSUFFICIENT_MEMORY;
- maj_stat = MakeSignature(ctx, 0, &desc, seq);
- if (maj_stat == SEC_E_OK) {
- @@ -689,7 +692,7 @@ uint32_t sspi_get_mic(PCtxtHandle ctx, u_int qop, u_int seq,
- }
- uint32_t sspi_verify_mic(PCtxtHandle ctx, u_int seq, sspi_buffer_desc *bufin,
- - sspi_buffer_desc *bufout, u_int *qop_state)
- + sspi_buffer_desc *bufout, unsigned long *qop_state)
- {
- SecBufferDesc desc;
- SecBuffer sec_tkn[2];
- @@ -722,7 +725,7 @@ uint32_t sspi_import_name(sspi_buffer_desc *name_in, sspi_name_t *name_out)
- {
- *name_out = calloc((size_t)name_in->length + 5L, sizeof(char));
- if (*name_out == NULL)
- - return SEC_E_INSUFFICIENT_MEMORY;
- + return (uint32_t)SEC_E_INSUFFICIENT_MEMORY;
- strcpy(*name_out, "nfs/");
- strncat(*name_out, name_in->value, name_in->length);
- @@ -787,7 +790,7 @@ out:
- uint32_t sspi_unwrap(PCtxtHandle ctx, u_int seq, sspi_buffer_desc *bufin,
- sspi_buffer_desc *bufout, u_int *conf_state,
- - u_int *qop_state)
- + unsigned long *qop_state)
- {
- uint32_t maj_stat;
- SecBufferDesc BuffDesc;
- @@ -913,7 +916,7 @@ void print_negotiated_attrs(PCtxtHandle ctx)
- }
- -void log_hexdump(bool_t on, const u_char *title, const u_char *buf,
- +void log_hexdump(bool_t on, const char *title, const u_char *buf,
- int len, int offset)
- {
- int i, j, jm, c;
- diff --git a/libtirpc/src/auth_time.c b/libtirpc/src/auth_time.c
- index 95faae8..bce1df4 100644
- --- a/libtirpc/src/auth_time.c
- +++ b/libtirpc/src/auth_time.c
- @@ -248,8 +248,10 @@ __rpc_get_time_offset(td, srv, thost, uaddr, netid)
- int a1, a2, a3, a4;
- char ut[64], ipuaddr[64];
- endpoint teps[32];
- - nis_server tsrv;
- + nis_server tsrv = { 0 };
- +#ifndef _WIN32
- void (*oldsig)() = NULL; /* old alarm handler */
- +#endif
- struct sockaddr_in sin;
- int s = RPC_ANYSOCK;
- socklen_t len;
- @@ -404,7 +406,7 @@ __rpc_get_time_offset(td, srv, thost, uaddr, netid)
- FD_SET(_get_osfhandle(s), &readfds);
- res = select(_rpc_dtablesize(), &readfds,
- (fd_set *)NULL, (fd_set *)NULL, &timeout);
- - } while (res == SOCKET_ERROR && WSAGetLastError() == WSAEINTR);
- + } while (res == (int)SOCKET_ERROR && WSAGetLastError() == WSAEINTR);
- if (res == SOCKET_ERROR)
- goto error;
- len = sizeof(from);
- diff --git a/libtirpc/src/authsspi_prot.c b/libtirpc/src/authsspi_prot.c
- index 714da5f..b670cd4 100644
- --- a/libtirpc/src/authsspi_prot.c
- +++ b/libtirpc/src/authsspi_prot.c
- @@ -99,7 +99,8 @@ xdr_rpc_sspi_wrap_data(XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr,
- {
- sspi_buffer_desc databuf, wrapbuf;
- uint32_t maj_stat;
- - int start, end, conf_state;
- + int start, end;
- + u_int conf_state;
- bool_t xdr_stat;
- log_debug("in xdr_rpc_sspi_wrap_data()");
- @@ -180,8 +181,9 @@ xdr_rpc_sspi_unwrap_data(XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr,
- XDR tmpxdrs;
- sspi_buffer_desc databuf, wrapbuf;
- uint32_t maj_stat;
- - u_int seq_num, qop_state;
- - int conf_state;
- + u_int seq_num;
- + unsigned long qop_state;
- + u_int conf_state;
- bool_t xdr_stat;
- log_debug("in xdr_rpc_sspi_unwrap_data()");
- diff --git a/libtirpc/src/bindresvport.c b/libtirpc/src/bindresvport.c
- index bf92ff6..d344c25 100644
- --- a/libtirpc/src/bindresvport.c
- +++ b/libtirpc/src/bindresvport.c
- @@ -190,7 +190,7 @@ bindresvport_sa(int sd, struct sockaddr *sa)
- for (n = 0 ; n < NPORTS ; n++) {
- currport = ((n+bindresvport_sa_last_n)%NPORTS)+STARTPORT;
- - portRange.StartPort = htons(currport);
- + portRange.StartPort = htons((unsigned short)currport);
- portRange.NumberOfPorts = 1;
- (void)memset(&portRes, 0, sizeof(portRes));
- diff --git a/libtirpc/src/clnt_dg.c b/libtirpc/src/clnt_dg.c
- index de318e6..7b0c981 100644
- --- a/libtirpc/src/clnt_dg.c
- +++ b/libtirpc/src/clnt_dg.c
- @@ -420,7 +420,7 @@ send_again:
- goto out;
- }
- nextsend_time = cu->cu_wait.tv_sec * 1000 + cu->cu_wait.tv_usec / 1000;
- - if (wintirpc_sendto(cu->cu_fd, cu->cu_outbuf, (int)outlen, 0, sa, salen) != outlen) {
- + if ((size_t)wintirpc_sendto(cu->cu_fd, cu->cu_outbuf, (int)outlen, 0, sa, salen) != outlen) {
- cu->cu_error.re_errno = errno;
- cu->cu_error.re_status = RPC_CANTSEND;
- goto out;
- diff --git a/libtirpc/src/clnt_generic.c b/libtirpc/src/clnt_generic.c
- index f29aae4..29bc679 100644
- --- a/libtirpc/src/clnt_generic.c
- +++ b/libtirpc/src/clnt_generic.c
- @@ -201,7 +201,7 @@ clnt_create_timed(const char *hostname, const rpcprog_t prog, const rpcvers_t ve
- CLIENT *clnt = NULL;
- void *handle;
- enum clnt_stat save_cf_stat = RPC_SUCCESS;
- - struct rpc_err save_cf_error;
- + struct rpc_err save_cf_error = { 0 };
- char nettype_array[NETIDLEN];
- char *nettype = &nettype_array[0];
- diff --git a/libtirpc/src/clnt_simple.c b/libtirpc/src/clnt_simple.c
- index c2b8ff8..cd478ad 100644
- --- a/libtirpc/src/clnt_simple.c
- +++ b/libtirpc/src/clnt_simple.c
- @@ -125,7 +125,7 @@ rpc_call(host, prognum, versnum, procnum, inproc, in, outproc, out, nettype)
- }
- if ((nettype == NULL) || (nettype[0] == 0))
- nettype = "netpath";
- - if (!(rcp->valid && rcp->pid == getpid() &&
- + if (!(rcp->valid && rcp->pid == (pid_t)getpid() &&
- (rcp->prognum == prognum) &&
- (rcp->versnum == versnum) &&
- (!strcmp(rcp->host, host)) &&
- diff --git a/libtirpc/src/clnt_vc.c b/libtirpc/src/clnt_vc.c
- index fa53041..a4884ee 100644
- --- a/libtirpc/src/clnt_vc.c
- +++ b/libtirpc/src/clnt_vc.c
- @@ -534,7 +534,7 @@ clnt_vc_call(cl, proc, xdr_args, args_ptr, xdr_results, results_ptr, timeout)
- u_int32_t *msg_x_id = &ct->ct_u.ct_mcalli; /* yuk */
- bool_t shipnow;
- static int refreshes = 2;
- - u_int seq = -1;
- + u_int seq = (u_int)-1;
- time_t start_send, time_now;
- #ifndef _WIN32
- sigset_t mask, newmask;
- diff --git a/libtirpc/src/getnetconfig.c b/libtirpc/src/getnetconfig.c
- index 2e847f9..674582f 100644
- --- a/libtirpc/src/getnetconfig.c
- +++ b/libtirpc/src/getnetconfig.c
- @@ -44,11 +44,6 @@
- //#include <unistd.h>
- #include "rpc_com.h"
- -// XXX FIXME - this is in wintirpc.c, but that is not currently built
- -static void wintirpc_debug(char *fmt, ...)
- -{
- - return;
- -}
- /*
- * The five library routines in this file provide application access to the
- diff --git a/libtirpc/src/key_call.c b/libtirpc/src/key_call.c
- index 84be343..f65fc6a 100644
- --- a/libtirpc/src/key_call.c
- +++ b/libtirpc/src/key_call.c
- @@ -41,7 +41,13 @@
- * gendeskey(deskey) - generate a secure des key
- */
- -#ifndef _WIN32
- +#ifdef _WIN32
- +/*
- + * Disable "warning C4206: nonstandard extension
- + * used: translation unit is empty" warning
- + */
- +#pragma warning (disable : 4206)
- +#else
- #include <pthread.h>
- #include <reentrant.h>
- diff --git a/libtirpc/src/key_prot_xdr.c b/libtirpc/src/key_prot_xdr.c
- index 985f55b..451fd67 100644
- --- a/libtirpc/src/key_prot_xdr.c
- +++ b/libtirpc/src/key_prot_xdr.c
- @@ -3,7 +3,13 @@
- * It was generated using rpcgen.
- */
- -#ifndef _WIN32
- +#ifdef _WIN32
- +/*
- + * Disable "warning C4206: nonstandard extension
- + * used: translation unit is empty" warning
- + */
- +#pragma warning (disable : 4206)
- +#else
- #include <rpc/key_prot.h>
- /*
- * Copyright (c) 2009, Sun Microsystems, Inc.
- diff --git a/libtirpc/src/mt_misc.c b/libtirpc/src/mt_misc.c
- index 815b590..60038cf 100644
- --- a/libtirpc/src/mt_misc.c
- +++ b/libtirpc/src/mt_misc.c
- @@ -87,11 +87,11 @@ mutex_t tsd_lock;
- /* Library global tsd keys */
- thread_key_t clnt_broadcast_key;
- -thread_key_t rpc_call_key = -1;
- -thread_key_t tcp_key = -1;
- -thread_key_t udp_key = -1;
- -thread_key_t nc_key = -1;
- -thread_key_t rce_key = -1;
- +thread_key_t rpc_call_key = (DWORD)-1;
- +thread_key_t tcp_key = (DWORD)-1;
- +thread_key_t udp_key = (DWORD)-1;
- +thread_key_t nc_key = (DWORD)-1;
- +thread_key_t rce_key = (DWORD)-1;
- /* xprtlist (svc_generic.c) */
- mutex_t xprtlist_lock;
- diff --git a/libtirpc/src/rpc_generic.c b/libtirpc/src/rpc_generic.c
- index 345c4ba..03ea42c 100644
- --- a/libtirpc/src/rpc_generic.c
- +++ b/libtirpc/src/rpc_generic.c
- @@ -263,7 +263,8 @@ __rpc_getconfip(nettype)
- struct netconfig *nconf;
- void *confighandle;
- - if (!(confighandle = setnetconfig())) {
- + confighandle = setnetconfig();
- + if (!confighandle) {
- syslog (LOG_ERR, "rpc: failed to open " NETCONFIG);
- return (NULL);
- }
- @@ -318,7 +319,8 @@ __rpc_setconf(nettype)
- case _RPC_NETPATH:
- case _RPC_CIRCUIT_N:
- case _RPC_DATAGRAM_N:
- - if (!(handle->nhandle = setnetpath())) {
- + handle->nhandle = setnetpath();
- + if (!handle->nhandle) {
- free(handle);
- return (NULL);
- }
- @@ -329,7 +331,8 @@ __rpc_setconf(nettype)
- case _RPC_DATAGRAM_V:
- case _RPC_TCP:
- case _RPC_UDP:
- - if (!(handle->nhandle = setnetconfig())) {
- + handle->nhandle = setnetconfig();
- + if (!handle->nhandle) {
- syslog (LOG_ERR, "rpc: failed to open " NETCONFIG);
- free(handle);
- return (NULL);
- @@ -491,7 +494,6 @@ __rpc_fd2sockinfo(int fd, struct __rpc_sockinfo *sip)
- WSAPROTOCOL_INFO proto_info;
- int proto_info_size = sizeof(proto_info);
- if (wintirpc_getsockopt(fd, SOL_SOCKET, SO_PROTOCOL_INFO, (char *)&proto_info, &proto_info_size) == SOCKET_ERROR) {
- - int err = WSAGetLastError();
- return 0;
- }
- len = proto_info.iMaxSockAddr;
- @@ -506,7 +508,6 @@ __rpc_fd2sockinfo(int fd, struct __rpc_sockinfo *sip)
- len = sizeof type;
- if (wintirpc_getsockopt(fd, SOL_SOCKET, SO_TYPE, (char *)&type, &len) == SOCKET_ERROR) {
- - int err = WSAGetLastError();
- return 0;
- }
- @@ -744,13 +745,13 @@ __rpc_uaddr2taddr_af(int af, const char *uaddr)
- p = strrchr(addrstr, '.');
- if (p == NULL)
- goto out;
- - portlo = (unsigned)atoi(p + 1);
- + portlo = (unsigned short)atoi(p + 1);
- *p = '\0';
- p = strrchr(addrstr, '.');
- if (p == NULL)
- goto out;
- - porthi = (unsigned)atoi(p + 1);
- + porthi = (unsigned short)atoi(p + 1);
- *p = '\0';
- port = (porthi << 8) | portlo;
- }
- diff --git a/libtirpc/src/svc_vc.c b/libtirpc/src/svc_vc.c
- index 9ea907f..2d2b429 100644
- --- a/libtirpc/src/svc_vc.c
- +++ b/libtirpc/src/svc_vc.c
- @@ -575,7 +575,7 @@ write_vc(xprtp, buf, len)
- SVCXPRT *xprt;
- int i, cnt;
- struct cf_conn *cd;
- - struct timeval tv0, tv1;
- + struct timeval tv0 = { 0 }, tv1;
- xprt = (SVCXPRT *)xprtp;
- assert(xprt != NULL);
- diff --git a/libtirpc/src/wintirpc.c b/libtirpc/src/wintirpc.c
- index 1394481..c2cc47a 100644
- --- a/libtirpc/src/wintirpc.c
- +++ b/libtirpc/src/wintirpc.c
- @@ -160,7 +160,7 @@ void wintirpc_unregister_osfhandle(SOCKET handle)
- for (i=0 ; i < WINTIRPC_MAX_OSFHANDLE_FD_NHANDLE_VALUE ; i++) {
- if (handle_fd_map[i].m_s == handle) {
- - handle_fd_map[i].m_s = SOCKET_ERROR;
- + handle_fd_map[i].m_s = (SOCKET)SOCKET_ERROR;
- handle_fd_map[i].m_fd = -1;
- return;
- }
- @@ -178,7 +178,7 @@ void wintirpc_unregister_osf_fd(int fd)
- for (i=0 ; i < WINTIRPC_MAX_OSFHANDLE_FD_NHANDLE_VALUE ; i++) {
- if (handle_fd_map[i].m_fd == fd) {
- - handle_fd_map[i].m_s = SOCKET_ERROR;
- + handle_fd_map[i].m_s = (SOCKET)SOCKET_ERROR;
- handle_fd_map[i].m_fd = -1;
- return;
- }
- diff --git a/libtirpc/src/xdr.c b/libtirpc/src/xdr.c
- index 3c24314..46c1b34 100644
- --- a/libtirpc/src/xdr.c
- +++ b/libtirpc/src/xdr.c
- @@ -464,6 +464,13 @@ xdr_enum(xdrs, ep)
- /*
- * enums are treated as ints
- */
- +
- +
- +#ifdef _WIN32
- +#pragma warning( push )
- +/* Disable "warning C4127: conditional expression is constant" */
- +#pragma warning (disable : 4127)
- +#endif
- /* LINTED */ if (sizeof (enum sizecheck) == sizeof (long)) {
- return (xdr_long(xdrs, (long *)(void *)ep));
- } else /* LINTED */ if (sizeof (enum sizecheck) == sizeof (int)) {
- @@ -473,6 +480,9 @@ xdr_enum(xdrs, ep)
- } else {
- return (FALSE);
- }
- +#ifdef _WIN32
- +#pragma warning( pop )
- +#endif
- }
- /*
- diff --git a/libtirpc/tirpc/rpc/auth_sspi.h b/libtirpc/tirpc/rpc/auth_sspi.h
- index fb965d7..b0bc558 100644
- --- a/libtirpc/tirpc/rpc/auth_sspi.h
- +++ b/libtirpc/tirpc/rpc/auth_sspi.h
- @@ -102,18 +102,18 @@ bool_t authsspi_service(AUTH *auth, int svc);
- uint32_t sspi_get_mic(void *ctx, u_int qop, u_int seq,
- sspi_buffer_desc *bufin, sspi_buffer_desc *bufout);
- uint32_t sspi_verify_mic(void *ctx, u_int seq, sspi_buffer_desc *bufin,
- - sspi_buffer_desc *bufout, u_int *qop_state);
- + sspi_buffer_desc *bufout, unsigned long *qop_state);
- uint32_t sspi_wrap(void *ctx, u_int seq, sspi_buffer_desc *bufin,
- sspi_buffer_desc *bufout, u_int *conf_state);
- uint32_t sspi_unwrap(void *ctx, u_int seq, sspi_buffer_desc *bufin,
- sspi_buffer_desc *bufout, u_int *conf_state,
- - u_int *qop_state);
- + unsigned long *qop_state);
- void sspi_release_buffer(sspi_buffer_desc *buf);
- uint32_t sspi_import_name(sspi_buffer_desc *name_in, sspi_name_t *name_out);
- void log_debug(const char *fmt, ...);
- void log_status(char *m, uint32_t major, uint32_t minor);
- -void log_hexdump(bool_t on, const u_char *title, const u_char *buf, int len, int offset);
- +void log_hexdump(bool_t on, const char *title, const u_char *buf, int len, int offset);
- __END_DECLS
- --
- 2.43.0
- From 6d4e632b513f0d5d4820ae8302311ce06b17b153 Mon Sep 17 00:00:00 2001
- From: Roland Mainz <roland.mainz@nrubsig.org>
- Date: Sat, 25 May 2024 12:06:49 +0200
- Subject: [PATCH 2/7] daemon: Fix warnings in idmapper code for
- ptr<--->(uid_t|gid_t) stunts
- Fix warnings in idmapper code for ptr<--->(uid_t|gid_t) stunts
- Signed-off-by: Cedric Blancher <cedric.blancher@gmail.com>
- ---
- daemon/idmap.c | 33 +++++++++++++++++++--------------
- daemon/util.h | 4 ++++
- 2 files changed, 23 insertions(+), 14 deletions(-)
- diff --git a/daemon/idmap.c b/daemon/idmap.c
- index 996e891..5e42d43 100644
- --- a/daemon/idmap.c
- +++ b/daemon/idmap.c
- @@ -32,6 +32,13 @@
- #include "nfs41_const.h"
- #include "list.h"
- #include "daemon_debug.h"
- +#include "util.h"
- +
- +#define PTR2UID_T(p) ((uid_t)PTR2PTRDIFF_T(p))
- +#define PTR2GID_T(p) ((gid_t)PTR2PTRDIFF_T(p))
- +#define PTR2UINT(p) ((UINT)PTR2PTRDIFF_T(p))
- +#define UID_T2PTR(u) (PTRDIFF_T2PTR((ptrdiff_t)u))
- +#define GID_T2PTR(g) (PTRDIFF_T2PTR((ptrdiff_t)g))
- #define IDLVL 2 /* dprintf level for idmap logging */
- #define CYGWINIDLVL 2 /* dprintf level for idmap logging */
- @@ -554,19 +561,19 @@ static int idmap_filter(
- char *filter,
- size_t filter_len)
- {
- - UINT_PTR i;
- + UINT i;
- int status = NO_ERROR;
- switch (lookup->type) {
- case TYPE_INT:
- - i = (UINT_PTR)lookup->value;
- + i = PTR2UINT(lookup->value);
- if (FAILED(StringCchPrintfA(filter, filter_len,
- "(&(objectClass=%s)(%s=%u))",
- config->classes[lookup->klass],
- - config->attributes[lookup->attr], (UINT)i))) {
- + config->attributes[lookup->attr], i))) {
- status = ERROR_BUFFER_OVERFLOW;
- eprintf("ldap filter buffer overflow: '%s=%u'\n",
- - config->attributes[lookup->attr], (UINT)i);
- + config->attributes[lookup->attr], i);
- }
- break;
- @@ -764,7 +771,7 @@ static int idmap_lookup_user(
- }
- }
- else if (lookup->attr == ATTR_UID) {
- - uid_t search_uid = (uid_t)(lookup->value);
- + uid_t search_uid = PTR2UID_T(lookup->value);
- char search_name[VAL_LEN];
- char res_username[VAL_LEN];
- char principal_name[VAL_LEN];
- @@ -876,7 +883,7 @@ static int idmap_lookup_group(
- }
- }
- else if (lookup->attr == ATTR_GID) {
- - gid_t search_gid = (gid_t)(lookup->value);
- + gid_t search_gid = PTR2GID_T(lookup->value);
- char search_name[VAL_LEN];
- char res_groupname[VAL_LEN];
- gid_t cy_gid = 0;
- @@ -1081,8 +1088,8 @@ static int uid_cmp(const struct list_entry *list, const void *value)
- {
- const struct idmap_user *entry = list_container(list,
- const struct idmap_user, entry);
- - const UINT_PTR uid = (const UINT_PTR)value;
- - return (UINT)uid - entry->uid;
- + const uid_t uid = PTR2UID_T(value);
- + return (int)uid - (int)entry->uid;
- }
- int nfs41_idmap_uid_to_name(
- @@ -1091,14 +1098,13 @@ int nfs41_idmap_uid_to_name(
- char *name,
- size_t len)
- {
- - UINT_PTR uidp = uid; /* convert to pointer size to pass as void* */
- struct idmap_lookup lookup = { ATTR_UID, CLASS_USER, TYPE_INT, uid_cmp };
- struct idmap_user user;
- int status;
- DPRINTF(IDLVL, ("--> nfs41_idmap_uid_to_name(%u)\n", (unsigned int)uid));
- - lookup.value = (const void*)uidp;
- + lookup.value = UID_T2PTR(uid);
- /* look up the user entry */
- status = idmap_lookup_user(context, &lookup, &user);
- @@ -1204,8 +1210,8 @@ static int gid_cmp(const struct list_entry *list, const void *value)
- {
- const struct idmap_group *entry = list_container(list,
- const struct idmap_group, entry);
- - const UINT_PTR gid = (const UINT_PTR)value;
- - return (UINT)gid - entry->gid;
- + const gid_t gid = PTR2GID_T(value);
- + return (int)gid - (int)entry->gid;
- }
- int nfs41_idmap_gid_to_group(
- @@ -1214,14 +1220,13 @@ int nfs41_idmap_gid_to_group(
- char *name,
- size_t len)
- {
- - UINT_PTR gidp = gid; /* convert to pointer size to pass as void* */
- struct idmap_lookup lookup = { ATTR_GID, CLASS_GROUP, TYPE_INT, gid_cmp };
- struct idmap_group group;
- int status;
- DPRINTF(IDLVL, ("--> nfs41_idmap_gid_to_group(%u)\n", gid));
- - lookup.value = (const void*)gidp;
- + lookup.value = GID_T2PTR(gid);
- /* look up the group entry */
- status = idmap_lookup_group(context, &lookup, &group);
- diff --git a/daemon/util.h b/daemon/util.h
- index 899711d..9c3a878 100644
- --- a/daemon/util.h
- +++ b/daemon/util.h
- @@ -23,6 +23,7 @@
- #ifndef __NFS41_DAEMON_UTIL_H__
- #define __NFS41_DAEMON_UTIL_H__
- +#include <stdlib.h>
- #include <stdbool.h>
- #include "nfs41_types.h"
- @@ -41,6 +42,9 @@ enum stable_how4;
- */
- #define FILE_INFO_TIME_NOT_SET (0LL)
- +#define PTR2PTRDIFF_T(p) ((ptrdiff_t)((char *)((void *)(p)) - ((char *)0)))
- +#define PTRDIFF_T2PTR(d) ((void *)(((char *)0) + (d)))
- +
- int safe_read(unsigned char **pos, uint32_t *remaining, void *dest, uint32_t dest_len);
- int safe_write(unsigned char **pos, uint32_t *remaining, void *dest, uint32_t dest_len);
- int get_name(unsigned char **pos, uint32_t *remaining, const char **out_name);
- --
- 2.43.0
- From beadc90bcbf43275cefdbce21408e48c09e9b5b6 Mon Sep 17 00:00:00 2001
- From: Roland Mainz <roland.mainz@nrubsig.org>
- Date: Sat, 25 May 2024 12:38:44 +0200
- Subject: [PATCH 3/7] cygwin,tests: Add newgrp(1)/sg(1)-style "winsg" util to
- switch primary group
- Add newgrp(1)/sg(1)-style "winsg" utility to switch Win32 primary
- group.
- Signed-off-by: Cedric Blancher <cedric.blancher@gmail.com>
- ---
- cygwin/Makefile | 2 +
- cygwin/Makefile.install | 5 +
- cygwin/README.bintarball.txt | 10 +
- tests/winsg/winsg.c | 450 +++++++++++++++++++++++++++++++++++
- 4 files changed, 467 insertions(+)
- create mode 100644 tests/winsg/winsg.c
- diff --git a/cygwin/Makefile b/cygwin/Makefile
- index aaa8864..bcd07d5 100644
- --- a/cygwin/Makefile
- +++ b/cygwin/Makefile
- @@ -55,6 +55,7 @@ build_32bit_debug:
- build_testutils:
- (cd "$(PROJECT_BASEDIR_DIR)/tests/winfsinfo1" && make all)
- + (cd "$(PROJECT_BASEDIR_DIR)/tests/winsg" && make all)
- build: build_32bit_release build_32bit_debug build_64bit_release build_64bit_debug build_testutils
- sync
- @@ -65,6 +66,7 @@ build: build_32bit_release build_32bit_debug build_64bit_release build_64bit_deb
- clean:
- rm -vRf $$(find "$(PROJECT_BASEDIR_DIR)/build.vc19" -name Debug -o -name Release)
- (cd "$(PROJECT_BASEDIR_DIR)/tests/winfsinfo1" && make clean)
- + (cd "$(PROJECT_BASEDIR_DIR)/tests/winsg" && make clean)
- installdest: \
- $(VS_BUILD_DIR32)/nfsd.exe \
- diff --git a/cygwin/Makefile.install b/cygwin/Makefile.install
- index a9352bc..aa0e9df 100644
- --- a/cygwin/Makefile.install
- +++ b/cygwin/Makefile.install
- @@ -70,6 +70,11 @@ installdest:
- else \
- (cd $(DESTDIR)/$(CYGWIN_BASEPATH)/bin/ && ln -sf winfsinfo.i686.exe winfsinfo.exe) \
- fi
- + if [[ "$(CYGWIN_BASEPATH)" == *64* ]] ; then \
- + cp "$(PROJECT_BASEDIR_DIR)/tests/winsg/winsg.x86_64.exe" $(DESTDIR)/$(CYGWIN_BASEPATH)/bin/winsg.exe ; \
- + else \
- + cp "$(PROJECT_BASEDIR_DIR)/tests/winsg/winsg.i686.exe" $(DESTDIR)/$(CYGWIN_BASEPATH)/bin/winsg.exe ; \
- + fi
- @ printf "# Package ksh93&co (if available) since Cygwin does not ship with it yet\n"
- [[ -x $(CYGWIN_BASEPATH)/bin/ksh93.exe ]] && cp -f $(CYGWIN_BASEPATH)/bin/ksh93.exe $(DESTDIR)/$(CYGWIN_BASEPATH)/bin/ksh93.exe || true
- [[ -x $(CYGWIN_BASEPATH)/bin/shcomp.exe ]] && cp -f $(CYGWIN_BASEPATH)/bin/shcomp.exe $(DESTDIR)/$(CYGWIN_BASEPATH)/bin/shcomp.exe || true
- diff --git a/cygwin/README.bintarball.txt b/cygwin/README.bintarball.txt
- index 8f50fd0..f82f302 100644
- --- a/cygwin/README.bintarball.txt
- +++ b/cygwin/README.bintarball.txt
- @@ -56,6 +56,16 @@ NFSv4.1 client and filesystem driver for Windows 10/11
- - uid/gid
- - Cygwin symlinks
- +- Custom primary group support
- + - Supports primary group changes in the calling process/thread
- + (via |SetTokenInformation(..., TokenPrimaryGroup,...)|), e.g.
- + if the calling process/threads switches the primary group
- + in its access token then the NFSv4.1 client will use that
- + group as GID for file creation.
- + - newgrp(1)/sg(1)-style "winsg" utilty to run cmd.exe with
- + different primary group, e.g.
- + $ winsg [-] -g group [-c command | /C command] #
- +
- - Software compatibility:
- - Any NFSv4.1 server (Linux, Solaris, Illumos, FreeBSD, nfs4j,
- ...)
- diff --git a/tests/winsg/winsg.c b/tests/winsg/winsg.c
- new file mode 100644
- index 0000000..7f8fad4
- --- /dev/null
- +++ b/tests/winsg/winsg.c
- @@ -0,0 +1,450 @@
- +
- +/*
- + * MIT License
- + *
- + * Copyright (c) 2024 Roland Mainz <roland.mainz@nrubsig.org>
- + *
- + * Permission is hereby granted, free of charge, to any person obtaining a copy
- + * of this software and associated documentation files (the "Software"), to deal
- + * in the Software without restriction, including without limitation the rights
- + * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- + * copies of the Software, and to permit persons to whom the Software is
- + * furnished to do so, subject to the following conditions:
- + *
- + * The above copyright notice and this permission notice shall be included in all
- + * copies or substantial portions of the Software.
- + *
- + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- + * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- + * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- + * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- + * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- + * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
- + * SOFTWARE.
- + */
- +
- +/*
- + * winsg.c - run Win32 or Cygwin program with a different (primary) group
- + *
- + * Written by Roland Mainz <roland.mainz@nrubsig.org>
- + */
- +
- +/*
- + * Compile with:
- + * $ clang -target x86_64-pc-windows-gnu -Wall -g winsg.c -o winsg.exe #
- + */
- +
- +#define UNICODE 1
- +#define _UNICODE 1
- +
- +#include <windows.h>
- +#include <stdio.h>
- +#include <stdbool.h>
- +#include <assert.h>
- +#include <Lmcons.h>
- +#include <process.h>
- +
- +#if 0
- +#define D(x) x
- +#else
- +#define D(x)
- +#endif
- +
- +#ifdef _WIN64
- +#define CYGWIN_BASH_PATH "C:\\cygwin64\\bin\\bash.exe"
- +#else
- +#define CYGWIN_BASH_PATH "C:\\cygwin\\bin\\bash.exe"
- +#endif /* _WIN64 */
- +#define WIN32_CMDEXE_PATH "C:\\Windows\\system32\\cmd.exe"
- +
- +/*
- + * DECLARE_SID_BUFFER - declare a buffer for a SID value
- + * Note that buffers with SID values must be 16byte aligned
- + * on Windows 32, othewise the kernel might return
- + * |ERROR_NOACCESS|(=998) - "Invalid access to memory location.
- + */
- +#define DECLARE_SID_BUFFER(varname) \
- + char (varname)[SECURITY_MAX_SID_SIZE+1] __attribute__((aligned(16)))
- +
- +/*
- + * Performance hack:
- + * GETTOKINFO_EXTRA_BUFFER - extra space for more data
- + * |GetTokenInformation()| for |TOKEN_USER| and |TOKEN_PRIMARY_GROUP|
- + * always fails in Win10 with |ERROR_INSUFFICIENT_BUFFER| if you
- + * just pass the |sizeof(TOKEN_*)| value. Instead of calling
- + * |GetTokenInformation()| with |NULL| arg to obtain the size to
- + * allocate we just provide 2048 bytes of extra space after the
- + * |TOKEN_*| size, and pray it is enough
- + */
- +#define GETTOKINFO_EXTRA_BUFFER (2048)
- +
- +D(
- +static
- +bool get_token_primarygroup_name(HANDLE tok, char *out_buffer)
- +{
- + DWORD tokdatalen;
- + PTOKEN_PRIMARY_GROUP ptpgroup;
- + PSID pgsid;
- + DWORD namesize = GNLEN+1;
- + char domainbuffer[UNLEN+1];
- + DWORD domainbuffer_size = sizeof(domainbuffer);
- + SID_NAME_USE name_use;
- +
- + tokdatalen = sizeof(TOKEN_PRIMARY_GROUP)+GETTOKINFO_EXTRA_BUFFER;
- + ptpgroup = _alloca(tokdatalen);
- + if (!GetTokenInformation(tok, TokenPrimaryGroup, ptpgroup,
- + tokdatalen, &tokdatalen)) {
- + D((void)fprintf(stderr, "get_token_primarygroup_name: "
- + "GetTokenInformation(tok=0x%p, TokenPrimaryGroup) failed, "
- + "status=%d.\n",
- + (void *)tok, (int)GetLastError()));
- + return false;
- + }
- +
- + pgsid = ptpgroup->PrimaryGroup;
- +
- + if (!LookupAccountSidA(NULL, pgsid, out_buffer, &namesize,
- + domainbuffer, &domainbuffer_size, &name_use)) {
- + D((void)fprintf(stderr, "get_token_primarygroup_name: "
- + "LookupAccountSidA() failed, status=%d.\n",
- + (int)GetLastError()));
- + return false;
- + }
- +
- + return true;
- +}
- +)
- +
- +static
- +bool is_group_in_token(HANDLE tok, PSID qsid)
- +{
- + DWORD tokdatalen;
- + PTOKEN_GROUPS ptgroups;
- +
- + tokdatalen = sizeof(TOKEN_GROUPS)+GETTOKINFO_EXTRA_BUFFER;
- + ptgroups = _alloca(tokdatalen);
- + if (!GetTokenInformation(tok, TokenGroups, ptgroups,
- + tokdatalen, &tokdatalen)) {
- + D((void)fprintf(stderr, "is_group_in_token: "
- + "GetTokenInformation(tok=0x%p, TokenGroups) failed, "
- + "status=%d.\n",
- + (void *)tok, (int)GetLastError()));
- + return false;
- + }
- +
- + int i;
- + D(
- + (void)fprintf(stderr, "is_group_in_token: got %d groups\n",
- + (int)ptgroups->GroupCount)
- + );
- + for (i = 0 ; i < ptgroups->GroupCount ; i++) {
- + if (EqualSid(qsid, ptgroups->Groups[i].Sid) &&
- + (ptgroups->Groups[i].Attributes & SE_GROUP_ENABLED)) {
- + D((void)puts("is_group_in_token: #match"));
- + return true;
- + }
- + }
- +
- + D((void)puts("is_group_in_token: #no match"));
- +
- + return false;
- +}
- +
- +static
- +bool get_group_sid(const char *groupname, PSID pgsid, PDWORD pgsid_size)
- +{
- + char domainbuffer[UNLEN+1];
- + DWORD domainbuffer_size = sizeof(domainbuffer);
- + SID_NAME_USE name_use;
- +
- + if (!LookupAccountNameA(NULL, groupname,
- + pgsid, pgsid_size, domainbuffer, &domainbuffer_size, &name_use)) {
- + D((void)fprintf(stderr, "get_group_sid: "
- + "LookupAccountNameA() failed.\n"));
- + return false;
- + }
- +
- + return true;
- +}
- +
- +static
- +bool set_token_primarygroup_sid(HANDLE tok, PSID pgsid)
- +{
- + DWORD tokdatalen;
- + TOKEN_PRIMARY_GROUP tpgroup;
- +
- + tokdatalen = sizeof(TOKEN_PRIMARY_GROUP);
- + tpgroup.PrimaryGroup = pgsid;
- + if (!SetTokenInformation(tok, TokenPrimaryGroup,
- + &tpgroup, tokdatalen)) {
- + D((void)fprintf(stderr, "set_token_primarygroup_sid: "
- + "SetTokenInformation(tok=0x%p, TokenPrimaryGroup) failed, "
- + "status=%d\n",
- + (void *)tok, (int)GetLastError()));
- + return false;
- + }
- +
- + return true;
- +}
- +
- +static
- +char *stpcpy (char *restrict s1, const char *restrict s2)
- +{
- + size_t l = strlen(s2);
- + return memcpy(s1, s2, l+1) + l;
- +}
- +
- +static
- +void win32cmd_quotearg(char *s1, const char *s2)
- +{
- + int c;
- + *s1++ = '"';
- + while ((c = *s2) != '\0') {
- + switch(c) {
- + case '"':
- + *s1++='\\';
- + *s1 = c;
- + break;
- + default:
- + *s1 = c;
- + break;
- + }
- + s1++;
- + s2++;
- + }
- + *s1++ = '"';
- + *s1 = '\0';
- +}
- +
- +static
- +int usage(void)
- +{
- + (void)fprintf(stderr, "Usage: "
- + "winsg [-] -g group [-c command | /C command]]\n"
- + "Execute command as different primary group ID\n"
- + "\n"
- + "Examples:\n"
- + "\t1. Run new cmd.exe with primary group 'abc1':\n"
- + "\t\twinsg -g abc1 /C\n"
- + "\n"
- + "\t2. Run new Cygwin bash with primary group 'abc2':\n"
- + "\t\twinsg -g abc2 /C\n"
- + "\n"
- + "\t3. Start /bin/id from cmd.exe with primary group 'abc3':\n"
- + "\t\twinsg abc3 /C 'C:\\cygwin64\\bin\\id.exe -a'\n"
- + "\n"
- + "\t4. Start /bin/id from Cygwin bash with primary group "
- + "'abc4':\n"
- + "\t\twinsg abc4 -c '/bin/id.exe -a'\n"
- + "\n"
- + "Please report bugs to "
- + "Roland Mainz <roland.mainz@nrubsig.org>.\n");
- +
- + return 2;
- +}
- +
- +
- +enum shelltype {
- + SHELLTYPE_NOT_SET = 0,
- + SHELLTYPE_NONE,
- + SHELLTYPE_CMD,
- + SHELLTYPE_SYSTEM
- +};
- +
- +int main(int ac, char *av[])
- +{
- + enum shelltype st = SHELLTYPE_NOT_SET;
- + int cmd_arg_index = -1;
- + const char *newgrpname = NULL;
- + HANDLE tok = INVALID_HANDLE_VALUE;
- + int subcmdret = EXIT_FAILURE;
- + int retval = 1;
- + int i;
- +
- + for (i=1 ; i < ac ; i++) {
- + D((void)fprintf(stderr, "# i=%d, av[i]='%s'\n", i, av[i]));
- +
- + if (!strcmp(av[i], "-")) {
- + (void)fprintf(stderr, "%s: "
- + "Run in new login not supported yet.\n", av[0]);
- + retval = 1;
- + goto done;
- + }
- + else if (!strcmp(av[i], "-c")) {
- + /* -c can take zero or one argument */
- + if ((ac-i) > 2) {
- + (void)fprintf(stderr, "%s: "
- + "Too many arguments for -c.\n", av[0]);
- + retval = 1;
- + goto done;
- + }
- +
- + st = SHELLTYPE_SYSTEM;
- + cmd_arg_index = i+1;
- + break;
- + }
- + else if (!strcmp(av[i], "/C")) {
- + /* /C can take zero or one argument */
- + if ((ac-i) > 2) {
- + (void)fprintf(stderr, "%s: "
- + "Too many arguments for /C.\n", av[0]);
- + retval = 1;
- + goto done;
- + }
- +
- + st = SHELLTYPE_CMD;
- + cmd_arg_index = i+1;
- + break;
- + }
- + else if (!strcmp(av[i], "-g")) {
- + newgrpname = av[i+1];
- + i++;
- + }
- + else if ((!strcmp(av[i], "-h")) ||
- + (!strcmp(av[i], "--help")) ||
- + (!strcmp(av[i], "--usage"))) {
- + retval = usage();
- + goto done;
- + }
- + else if ((av[i][0] == '-') || (av[i][0] == '/')) {
- + (void)fprintf(stderr, "%s: "
- + "Unsupported option '%s'.\n", av[0], av[i]);
- + retval = usage();
- + goto done;
- + }
- + else {
- + if ((i == 1) && (*av[i] != '-')) {
- + newgrpname = av[i];
- + continue;
- + }
- +
- + cmd_arg_index = i+1;
- + st = SHELLTYPE_NONE;
- + break;
- + }
- + }
- +
- + /*
- + * Handle newgrp(1)-like behaviour (run new shell (in our
- + * case cmd.exe) with requested group), e.g. ...
- + * $ winsg -g cygwingrp1
- + * $ winsg cygwingrp1
- + */
- + if ((st == SHELLTYPE_NOT_SET) && (cmd_arg_index == -1)) {
- + st = SHELLTYPE_NONE;
- + /* set |cmd_arg_index| to the end of |av|, which is |NULL| */
- + cmd_arg_index = i;
- + }
- +
- + if (!newgrpname) {
- + (void)fprintf(stderr, "%s: No group name given.\n", av[0]);
- + retval = 1;
- + goto done;
- + }
- +
- + D((void)fprintf(stderr,
- + "# shelltype=%d, cmd_arg_index=%d, "
- + "av[cmd_arg_index]='%s', "
- + "new group name '%s'\n",
- + (int)st, cmd_arg_index, av[cmd_arg_index], newgrpname));
- +
- + if (!OpenProcessToken(GetCurrentProcess(),
- + TOKEN_QUERY|TOKEN_ADJUST_DEFAULT|TOKEN_DUPLICATE,
- + &tok)) {
- + (void)fprintf(stderr, "%s: Cannot open token.\n", av[0]);
- + retval = 1;
- + goto done;
- + }
- +
- + D(
- + char pgroupname[GNLEN+1];
- +
- + get_token_primarygroup_name(tok, pgroupname);
- + (void)printf("primary group name '%s'\n", pgroupname);
- + )
- +
- + DECLARE_SID_BUFFER(sidbuff);
- + PSID pgsid = (PSID)sidbuff;
- + DWORD pgsid_size = SECURITY_MAX_SID_SIZE;
- +
- + if (!get_group_sid(newgrpname, pgsid, &pgsid_size)) {
- + (void)fprintf(stderr, "%s: Could not find group '%s'.\n",
- + av[0], newgrpname);
- + retval = 1;
- + goto done;
- + }
- +
- + if (!is_group_in_token(tok, pgsid)) {
- + (void)fprintf(stderr, "%s: "
- + "Current user is not a member of group '%s'.\n",
- + av[0], newgrpname);
- + retval = 1;
- + goto done;
- + }
- +
- + if (!set_token_primarygroup_sid(tok, pgsid)) {
- + (void)fprintf(stderr,
- + "%s: Could not switch to new primary group '%s'.\n",
- + av[0], newgrpname);
- + retval = 1;
- + goto done;
- + }
- +
- + D(
- + get_token_primarygroup_name(tok, pgroupname);
- + (void)printf("primary group name '%s'\n", pgroupname);
- + )
- +
- + (void)_flushall();
- +
- + retval = 0;
- +
- + switch(st) {
- + case SHELLTYPE_SYSTEM:
- + if (av[cmd_arg_index] != NULL) {
- + size_t cmdbuff_size = strlen(CYGWIN_BASH_PATH)+
- + 16+
- + strlen(av[cmd_arg_index])*2;
- + char *cmdbuff = alloca(cmdbuff_size);
- + char *s = cmdbuff;
- + s = stpcpy(s, CYGWIN_BASH_PATH);
- + s = stpcpy(s, " -c ");
- +
- + win32cmd_quotearg(s, av[cmd_arg_index]);
- + D((void)fprintf(stderr, "# executing '%s'\n", cmdbuff));
- + subcmdret = system(cmdbuff);
- + }
- + else {
- + subcmdret = system(CYGWIN_BASH_PATH);
- + }
- + break;
- + case SHELLTYPE_CMD:
- + if (av[cmd_arg_index] != NULL) {
- + subcmdret = _spawnl(_P_WAIT,
- + WIN32_CMDEXE_PATH, WIN32_CMDEXE_PATH,
- + "/C", av[cmd_arg_index], NULL);
- + }
- + else {
- + subcmdret = _spawnl(_P_WAIT,
- + WIN32_CMDEXE_PATH, WIN32_CMDEXE_PATH, NULL);
- + }
- + break;
- + case SHELLTYPE_NONE:
- + subcmdret = _spawnl(_P_WAIT,
- + WIN32_CMDEXE_PATH, WIN32_CMDEXE_PATH, NULL);
- + break;
- + default:
- + assert(0);
- + break;
- + }
- +
- + D((void)fprintf(stdout, "#mark winsg done, subcmdret=%d\n",
- + (int)subcmdret));
- +
- +done:
- + if (tok == INVALID_HANDLE_VALUE) {
- + (void)CloseHandle(tok);
- + }
- +
- + return retval;
- +}
- --
- 2.43.0
- From 9b797e14a3d3ec1d92f0fe818e8e238e519a8c4c Mon Sep 17 00:00:00 2001
- From: Roland Mainz <roland.mainz@nrubsig.org>
- Date: Sat, 25 May 2024 12:55:39 +0200
- Subject: [PATCH 4/7] daemon,tests: Buffers for SID values must be 16byte
- aligned on Win10/32bit
- Buffers for SID values must be 16byte aligned on Win10/32bit
- Reported-by: Cedric Blancher <cedric.blancher@gmail.com>
- Signed-off-by: Cedric Blancher <cedric.blancher@gmail.com>
- ---
- daemon/sid.c | 5 ++++-
- daemon/sid.h | 17 +++++++++++++++++
- tests/winsg/winsg.c | 11 +++++++++--
- 3 files changed, 30 insertions(+), 3 deletions(-)
- diff --git a/daemon/sid.c b/daemon/sid.c
- index bde099a..c0a04cc 100644
- --- a/daemon/sid.c
- +++ b/daemon/sid.c
- @@ -229,7 +229,10 @@ typedef struct _sidcache_entry
- char win32name[SIDCACHE_ENTRY_NAME_SIZE]; /* must fit something like "user@domain" */
- PSID sid;
- DWORD sid_len;
- - char sid_buffer[SECURITY_MAX_SID_SIZE+1];
- +#pragma warning( push )
- +#pragma warning (disable : 4324)
- + DECLARE_SID_BUFFER(sid_buffer);
- +#pragma warning( pop )
- time_t timestamp;
- } sidcache_entry;
- diff --git a/daemon/sid.h b/daemon/sid.h
- index ab04294..d310d88 100644
- --- a/daemon/sid.h
- +++ b/daemon/sid.h
- @@ -33,6 +33,23 @@ typedef struct _sidcache sidcache;
- extern sidcache user_sidcache;
- extern sidcache group_sidcache;
- +/*
- + * DECLARE_SID_BUFFER - declare a buffer for a SID value
- + * Note that buffers with SID values must be 16byte aligned
- + * on Windows 10/32bit, othewise the kernel might return
- + * |ERROR_NOACCESS|(=998) - "Invalid access to memory location".
- + */
- +#ifdef _MSC_BUILD
- +/* Visual Studio */
- +#define DECLARE_SID_BUFFER(varname) \
- + __declspec(align(16)) char (varname)[SECURITY_MAX_SID_SIZE+1]
- +#else
- +/* clang */
- +#define DECLARE_SID_BUFFER(varname) \
- + char (varname)[SECURITY_MAX_SID_SIZE+1] __attribute__((aligned(16)))
- +#endif /* _MSC_BUILD */
- +
- +
- /* prototypes */
- int create_unknownsid(WELL_KNOWN_SID_TYPE type, PSID *sid, DWORD *sid_len);
- void sidcache_init(void);
- diff --git a/tests/winsg/winsg.c b/tests/winsg/winsg.c
- index 7f8fad4..8c8996a 100644
- --- a/tests/winsg/winsg.c
- +++ b/tests/winsg/winsg.c
- @@ -60,11 +60,18 @@
- /*
- * DECLARE_SID_BUFFER - declare a buffer for a SID value
- * Note that buffers with SID values must be 16byte aligned
- - * on Windows 32, othewise the kernel might return
- - * |ERROR_NOACCESS|(=998) - "Invalid access to memory location.
- + * on Windows 10/32bit, othewise the kernel might return
- + * |ERROR_NOACCESS|(=998) - "Invalid access to memory location".
- */
- +#ifdef _MSC_BUILD
- +/* Visual Studio */
- +#define DECLARE_SID_BUFFER(varname) \
- + __declspec(align(16)) char (varname)[SECURITY_MAX_SID_SIZE+1]
- +#else
- +/* clang */
- #define DECLARE_SID_BUFFER(varname) \
- char (varname)[SECURITY_MAX_SID_SIZE+1] __attribute__((aligned(16)))
- +#endif /* _MSC_BUILD */
- /*
- * Performance hack:
- --
- 2.43.0
- From 24acc2c6e5f4eba4e8253577d06db28477b6d7cd Mon Sep 17 00:00:00 2001
- From: Roland Mainz <roland.mainz@nrubsig.org>
- Date: Sat, 25 May 2024 13:19:04 +0200
- Subject: [PATCH 5/7] daemon: Add |stpcpy()|
- Add |stpcpy()| to daemon/utils.*
- Signed-off-by: Cedric Blancher <cedric.blancher@gmail.com>
- ---
- daemon/open.c | 7 +++++--
- daemon/util.c | 6 ++++++
- daemon/util.h | 2 ++
- 3 files changed, 13 insertions(+), 2 deletions(-)
- diff --git a/daemon/open.c b/daemon/open.c
- index 5012bbf..53c9425 100644
- --- a/daemon/open.c
- +++ b/daemon/open.c
- @@ -959,14 +959,17 @@ supersede_retry:
- * chgrp on the new file
- */
- if (create == OPEN4_CREATE) {
- + char *s;
- +
- nfs41_file_info createchgrpattrs = { 0 };
- createchgrpattrs.attrmask.count = 2;
- createchgrpattrs.attrmask.arr[1] |= FATTR4_WORD1_OWNER_GROUP;
- createchgrpattrs.owner_group = createchgrpattrs.owner_group_buf;
- (void)get_token_primarygroup_name(GetCurrentThreadEffectiveToken(),
- createchgrpattrs.owner_group);
- - (void)strcat(createchgrpattrs.owner_group, "@");
- - (void)strcat(createchgrpattrs.owner_group, nfs41dg->localdomain_name);
- + s = createchgrpattrs.owner_group+strlen(createchgrpattrs.owner_group);
- + s = stpcpy(s, "@");
- + (void)stpcpy(s, nfs41dg->localdomain_name);
- DPRINTF(1, ("handle_open(): create(), groupname='%s'\n", createchgrpattrs.owner_group));
- stateid_arg stateid;
- diff --git a/daemon/util.c b/daemon/util.c
- index d38e65b..9106c07 100644
- --- a/daemon/util.c
- +++ b/daemon/util.c
- @@ -33,6 +33,12 @@
- #include "nfs41_ops.h"
- +char *stpcpy(char *restrict s1, const char *restrict s2)
- +{
- + size_t l = strlen(s2);
- + return ((char *)memcpy(s1, s2, l+1)) + l;
- +}
- +
- int safe_read(unsigned char **pos, uint32_t *remaining, void *dest, uint32_t dest_len)
- {
- if (*remaining < dest_len)
- diff --git a/daemon/util.h b/daemon/util.h
- index 9c3a878..99e2dd9 100644
- --- a/daemon/util.h
- +++ b/daemon/util.h
- @@ -45,6 +45,8 @@ enum stable_how4;
- #define PTR2PTRDIFF_T(p) ((ptrdiff_t)((char *)((void *)(p)) - ((char *)0)))
- #define PTRDIFF_T2PTR(d) ((void *)(((char *)0) + (d)))
- +char *stpcpy(char *restrict s1, const char *restrict s2);
- +
- int safe_read(unsigned char **pos, uint32_t *remaining, void *dest, uint32_t dest_len);
- int safe_write(unsigned char **pos, uint32_t *remaining, void *dest, uint32_t dest_len);
- int get_name(unsigned char **pos, uint32_t *remaining, const char **out_name);
- --
- 2.43.0
- From 21f5a83366789d7cb1ac72fc1970924d153fc1c7 Mon Sep 17 00:00:00 2001
- From: Roland Mainz <roland.mainz@nrubsig.org>
- Date: Sat, 25 May 2024 13:45:18 +0200
- Subject: [PATCH 6/7] daemon: Improve error handling for |setgid()|&co. support
- on |OPEN4_CREATE|
- Improve error handling for |setgid()|/newgrp(1)/sg(1)/winsg(1)
- support on |OPEN4_CREATE|.
- Signed-off-by: Cedric Blancher <cedric.blancher@gmail.com>
- ---
- daemon/open.c | 33 ++++++++++++++++++++++++---------
- 1 file changed, 24 insertions(+), 9 deletions(-)
- diff --git a/daemon/open.c b/daemon/open.c
- index 53c9425..ccfda2f 100644
- --- a/daemon/open.c
- +++ b/daemon/open.c
- @@ -954,27 +954,42 @@ supersede_retry:
- } else {
- #ifdef NFS41_DRIVER_SETGID_NEWGRP_SUPPORT
- /*
- - * Hack: Support |setgid()|/newgrp(1) by fetching group
- - * name from auth token for new files and do a "manual"
- - * chgrp on the new file
- + * Hack: Support |setgid()|/newgrp(1)/sg(1)/winsg(1) by
- + * fetching groupname from auth token for new files and
- + * do a "manual" chgrp on the new file
- */
- if (create == OPEN4_CREATE) {
- char *s;
- -
- + int chgrp_status;
- + stateid_arg stateid;
- nfs41_file_info createchgrpattrs = { 0 };
- +
- createchgrpattrs.attrmask.count = 2;
- createchgrpattrs.attrmask.arr[1] |= FATTR4_WORD1_OWNER_GROUP;
- createchgrpattrs.owner_group = createchgrpattrs.owner_group_buf;
- - (void)get_token_primarygroup_name(GetCurrentThreadEffectiveToken(),
- - createchgrpattrs.owner_group);
- + /* fixme: we should store the |owner_group| name in |upcall| */
- + if (!get_token_primarygroup_name(upcall->currentthread_token,
- + createchgrpattrs.owner_group)) {
- + eprintf("handle_open(): OPEN4_CREATE: "
- + "get_token_primarygroup_name() failed.\n");
- + goto create_chgrp_out;
- + }
- s = createchgrpattrs.owner_group+strlen(createchgrpattrs.owner_group);
- s = stpcpy(s, "@");
- (void)stpcpy(s, nfs41dg->localdomain_name);
- - DPRINTF(1, ("handle_open(): create(), groupname='%s'\n", createchgrpattrs.owner_group));
- + DPRINTF(1, ("handle_open(): OPEN4_CREATE: owner_group='%s'\n",
- + createchgrpattrs.owner_group));
- - stateid_arg stateid;
- nfs41_open_stateid_arg(state, &stateid);
- - (void)nfs41_setattr(state->session, &state->file, &stateid, &createchgrpattrs);
- + chgrp_status = nfs41_setattr(state->session,
- + &state->file, &stateid, &createchgrpattrs);
- + if (chgrp_status) {
- + eprintf("handle_open(): OPEN4_CREATE: "
- + "nfs41_setattr(owner_group='%s') failed with error '%s'.\n",
- + createchgrpattrs.owner_group, nfs_error_string(chgrp_status));
- + }
- +create_chgrp_out:
- + ;
- }
- #endif /* NFS41_DRIVER_SETGID_NEWGRP_SUPPORT */
- --
- 2.43.0
- From cfd1287626f39265be41fc93a6579c3d500cd4a9 Mon Sep 17 00:00:00 2001
- From: Roland Mainz <roland.mainz@nrubsig.org>
- Date: Sat, 25 May 2024 13:59:05 +0200
- Subject: [PATCH 7/7] cygwin: tail -f '/var/log/ms-nfs41-client-service.log'
- should always work
- tail -f '/var/log/ms-nfs41-client-service.log' should always work,
- so $ /sbin/msnfs41client install #
- should make sure to create a new+empty one if we move the old
- one away.
- Reported-by: Martin Wege <martin.l.wege@gmail.com>
- Signed-off-by: Cedric Blancher <cedric.blancher@gmail.com>
- ---
- cygwin/devel/msnfs41client.bash | 9 +++++++++
- 1 file changed, 9 insertions(+)
- diff --git a/cygwin/devel/msnfs41client.bash b/cygwin/devel/msnfs41client.bash
- index a0ea540..ffce9be 100644
- --- a/cygwin/devel/msnfs41client.bash
- +++ b/cygwin/devel/msnfs41client.bash
- @@ -170,6 +170,15 @@ function nfsclient_install
- "/var/log/ms-nfs41-client-service.log.old$(date +%Y%m%d_%Hh%Mm)"
- fi
- + #
- + # create new '/var/log/ms-nfs41-client-service.log'
- + # so users can do a $ tail -f
- + # '/var/log/ms-nfs41-client-service.log' at any time
- + #
- + touch '/var/log/ms-nfs41-client-service.log'
- + chown SYSTEM:SYSTEM '/var/log/ms-nfs41-client-service.log'
- + chmod u+w,go-w '/var/log/ms-nfs41-client-service.log'
- +
- # install new 'ms-nfs41-client-service'
- cygrunsrv --install \
- 'ms-nfs41-client-service' \
- --
- 2.43.0
msnfs41client: Patches for libtirpc WarningLevel=Level4, winsg+misc, 2024-05-25
Posted by Anonymous on Sat 25th May 2024 13:15
raw | new post
Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.