pastebin - collaborative debugging tool
rovema.kpaste.net RSS


msnfs41client: Patches for libtirpc WarningLevel=Level4, winsg+misc, 2024-05-25
Posted by Anonymous on Sat 25th May 2024 13:15
raw | new post

  1. From 7c0b0dbd0345cf2f01bbb373763ecc4679c3da17 Mon Sep 17 00:00:00 2001
  2. From: Roland Mainz <roland.mainz@nrubsig.org>
  3. Date: Sat, 25 May 2024 12:05:10 +0200
  4. Subject: [PATCH 1/7] build.vc19,libtirpc: Compile libtirpc with
  5.  WarningLevel=Level4
  6.  
  7. Compile libtirpc with WarningLevel=Level4
  8.  
  9. Signed-off-by: Cedric Blancher <cedric.blancher@gmail.com>
  10. ---
  11. build.vc19/libtirpc/libtirpc.vcxproj | 12 ++++++++----
  12.  libtirpc/src/auth_sspi.c             | 23 +++++++++++++----------
  13.  libtirpc/src/auth_time.c             |  6 ++++--
  14.  libtirpc/src/authsspi_prot.c         |  8 +++++---
  15.  libtirpc/src/bindresvport.c          |  2 +-
  16.  libtirpc/src/clnt_dg.c               |  2 +-
  17.  libtirpc/src/clnt_generic.c          |  2 +-
  18.  libtirpc/src/clnt_simple.c           |  2 +-
  19.  libtirpc/src/clnt_vc.c               |  2 +-
  20.  libtirpc/src/getnetconfig.c          |  5 -----
  21.  libtirpc/src/key_call.c              |  8 +++++++-
  22.  libtirpc/src/key_prot_xdr.c          |  8 +++++++-
  23.  libtirpc/src/mt_misc.c               | 10 +++++-----
  24.  libtirpc/src/rpc_generic.c           | 15 ++++++++-------
  25.  libtirpc/src/svc_vc.c                |  2 +-
  26.  libtirpc/src/wintirpc.c              |  4 ++--
  27.  libtirpc/src/xdr.c                   | 10 ++++++++++
  28.  libtirpc/tirpc/rpc/auth_sspi.h       |  6 +++---
  29.  18 files changed, 78 insertions(+), 49 deletions(-)
  30.  
  31. diff --git a/build.vc19/libtirpc/libtirpc.vcxproj b/build.vc19/libtirpc/libtirpc.vcxproj
  32. index bbb7dd4..c2d5d32 100644
  33. --- a/build.vc19/libtirpc/libtirpc.vcxproj
  34. +++ b/build.vc19/libtirpc/libtirpc.vcxproj
  35. @@ -85,7 +85,7 @@
  36.      <ClCompile>
  37.        <PrecompiledHeader>
  38.        </PrecompiledHeader>
  39. -      <WarningLevel>Level3</WarningLevel>
  40. +      <WarningLevel>Level4</WarningLevel>
  41.        <Optimization>Disabled</Optimization>
  42.        <PreprocessorDefinitions>FD_SETSIZE=1024;INET6;NO_CB_4_KRB5P;PORTMAP;_WINSOCK_DEPRECATED_NO_WARNINGS;WIN32;UNICODE;_UNICODE;_DEBUG;_WINDOWS;_USRDLL;LIBTIRPC_EXPORTS;%(PreprocessorDefinitions)</PreprocessorDefinitions>
  43.        <AdditionalIncludeDirectories>..\..\libtirpc\tirpc;%(AdditionalIncludeDirectories)</AdditionalIncludeDirectories>
  44. @@ -94,6 +94,7 @@
  45.        <BasicRuntimeChecks>Default</BasicRuntimeChecks>
  46.        <BufferSecurityCheck>false</BufferSecurityCheck>
  47.        <RuntimeLibrary>MultiThreadedDebugDLL</RuntimeLibrary>
  48. +      <AdditionalOptions>/wd4100 /wd4131 /wd4389</AdditionalOptions>
  49.      </ClCompile>
  50.      <Link>
  51.        <SubSystem>Windows</SubSystem>
  52. @@ -106,7 +107,7 @@
  53.      <ClCompile>
  54.        <PrecompiledHeader>
  55.        </PrecompiledHeader>
  56. -      <WarningLevel>Level3</WarningLevel>
  57. +      <WarningLevel>Level4</WarningLevel>
  58.        <Optimization>Disabled</Optimization>
  59.        <PreprocessorDefinitions>FD_SETSIZE=1024;INET6;NO_CB_4_KRB5P;PORTMAP;_WINSOCK_DEPRECATED_NO_WARNINGS;WIN32;UNICODE;_UNICODE;_DEBUG;_WINDOWS;_USRDLL;LIBTIRPC_EXPORTS;%(PreprocessorDefinitions)</PreprocessorDefinitions>
  60.        <AdditionalIncludeDirectories>..\..\libtirpc\tirpc;%(AdditionalIncludeDirectories)</AdditionalIncludeDirectories>
  61. @@ -115,6 +116,7 @@
  62.        <BasicRuntimeChecks>Default</BasicRuntimeChecks>
  63.        <BufferSecurityCheck>false</BufferSecurityCheck>
  64.        <RuntimeLibrary>MultiThreadedDebugDLL</RuntimeLibrary>
  65. +      <AdditionalOptions>/wd4100 /wd4131 /wd4389</AdditionalOptions>
  66.      </ClCompile>
  67.      <Link>
  68.        <SubSystem>Windows</SubSystem>
  69. @@ -125,7 +127,7 @@
  70.    </ItemDefinitionGroup>
  71.    <ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Release|Win32'">
  72.      <ClCompile>
  73. -      <WarningLevel>Level3</WarningLevel>
  74. +      <WarningLevel>Level4</WarningLevel>
  75.        <PrecompiledHeader>
  76.        </PrecompiledHeader>
  77.        <Optimization>MaxSpeed</Optimization>
  78. @@ -137,6 +139,7 @@
  79.        <StringPooling>true</StringPooling>
  80.        <BufferSecurityCheck>false</BufferSecurityCheck>
  81.        <RuntimeLibrary>MultiThreadedDLL</RuntimeLibrary>
  82. +      <AdditionalOptions>/wd4100 /wd4131 /wd4389</AdditionalOptions>
  83.      </ClCompile>
  84.      <Link>
  85.        <SubSystem>Windows</SubSystem>
  86. @@ -149,7 +152,7 @@
  87.    </ItemDefinitionGroup>
  88.    <ItemDefinitionGroup Condition="'$(Configuration)|$(Platform)'=='Release|x64'">
  89.      <ClCompile>
  90. -      <WarningLevel>Level3</WarningLevel>
  91. +      <WarningLevel>Level4</WarningLevel>
  92.        <PrecompiledHeader>
  93.        </PrecompiledHeader>
  94.        <Optimization>MaxSpeed</Optimization>
  95. @@ -161,6 +164,7 @@
  96.        <StringPooling>true</StringPooling>
  97.        <BufferSecurityCheck>false</BufferSecurityCheck>
  98.        <RuntimeLibrary>MultiThreadedDLL</RuntimeLibrary>
  99. +      <AdditionalOptions>/wd4100 /wd4131 /wd4389</AdditionalOptions>
  100.      </ClCompile>
  101.      <Link>
  102.        <SubSystem>Windows</SubSystem>
  103. diff --git a/libtirpc/src/auth_sspi.c b/libtirpc/src/auth_sspi.c
  104. index 67f242e..345b5ba 100644
  105. --- a/libtirpc/src/auth_sspi.c
  106. +++ b/libtirpc/src/auth_sspi.c
  107. @@ -159,7 +159,7 @@ authsspi_create_default(CLIENT *clnt, char *service, int svc)
  108.          goto out_err;
  109.      sec->svc = svc;
  110.      // Let's acquire creds here for now
  111. -    maj_stat = AcquireCredentialsHandleA(NULL, sec_pkg_name, SECPKG_CRED_BOTH,
  112. +    maj_stat = AcquireCredentialsHandleA(NULL, (LPSTR)sec_pkg_name, SECPKG_CRED_BOTH,
  113.          NULL, NULL, NULL, NULL, &sec->cred, &sec->expiry);
  114.      if (maj_stat != SEC_E_OK) {
  115.          log_debug("authgss_create_default: AcquireCredentialsHandleA failed with %x", maj_stat);
  116. @@ -275,7 +275,8 @@ static bool_t
  117.  authsspi_validate(AUTH *auth, struct opaque_auth *verf, u_int seq)
  118.  {
  119.         struct rpc_sspi_data *gd;
  120. -       u_int num, qop_state, cur_seq;
  121. +       u_int num, cur_seq = 0;
  122. +       unsigned long qop_state;
  123.         sspi_buffer_desc signbuf, checksum;
  124.         uint32_t maj_stat;
  125.  
  126. @@ -345,7 +346,8 @@ authsspi_refresh(AUTH *auth, void *tmp)
  127.         struct rpc_sspi_data *gd;
  128.         struct rpc_sspi_init_res gr;
  129.      sspi_buffer_desc *recv_tokenp, send_token;
  130. -       uint32_t maj_stat, call_stat, ret_flags, i;
  131. +       uint32_t maj_stat, call_stat, i;
  132. +       unsigned long ret_flags;
  133.      unsigned long flags =
  134.          ISC_REQ_MUTUAL_AUTH|ISC_REQ_INTEGRITY|ISC_REQ_ALLOCATE_MEMORY;
  135.      SecBufferDesc out_desc, in_desc;
  136. @@ -493,7 +495,8 @@ authsspi_refresh(AUTH *auth, void *tmp)
  137.                  */
  138.                 if (maj_stat == SEC_E_OK) {
  139.                         sspi_buffer_desc bufin;
  140. -                       u_int seq, qop_state = 0;
  141. +                       u_int seq;
  142. +                       unsigned long qop_state = 0;
  143.              
  144.              print_negotiated_attrs(&gd->ctx);
  145.  
  146. @@ -664,7 +667,7 @@ uint32_t sspi_get_mic(PCtxtHandle ctx, u_int qop, u_int seq,
  147.      maj_stat = QueryContextAttributesA(ctx, SECPKG_ATTR_SIZES, &ContextSizes);
  148.      if (maj_stat != SEC_E_OK) return maj_stat;
  149.  
  150. -    if (ContextSizes.cbMaxSignature == 0) return SEC_E_INTERNAL_ERROR;
  151. +    if (ContextSizes.cbMaxSignature == 0) return (uint32_t)SEC_E_INTERNAL_ERROR;
  152.  
  153.      desc.cBuffers = 2;
  154.      desc.pBuffers = sec_tkn;
  155. @@ -675,7 +678,7 @@ uint32_t sspi_get_mic(PCtxtHandle ctx, u_int qop, u_int seq,
  156.      sec_tkn[1].BufferType = SECBUFFER_TOKEN;
  157.      sec_tkn[1].cbBuffer = ContextSizes.cbMaxSignature;
  158.      sec_tkn[1].pvBuffer = calloc(ContextSizes.cbMaxSignature, sizeof(char));
  159. -    if (sec_tkn[1].pvBuffer == NULL) return SEC_E_INSUFFICIENT_MEMORY;
  160. +    if (sec_tkn[1].pvBuffer == NULL) return (uint32_t)SEC_E_INSUFFICIENT_MEMORY;
  161.  
  162.      maj_stat = MakeSignature(ctx, 0, &desc, seq);
  163.      if (maj_stat == SEC_E_OK) {
  164. @@ -689,7 +692,7 @@ uint32_t sspi_get_mic(PCtxtHandle ctx, u_int qop, u_int seq,
  165.  }
  166.  
  167.  uint32_t sspi_verify_mic(PCtxtHandle ctx, u_int seq, sspi_buffer_desc *bufin,
  168. -                            sspi_buffer_desc *bufout, u_int *qop_state)
  169. +                            sspi_buffer_desc *bufout, unsigned long *qop_state)
  170.  {
  171.      SecBufferDesc desc;
  172.      SecBuffer sec_tkn[2];    
  173. @@ -722,7 +725,7 @@ uint32_t sspi_import_name(sspi_buffer_desc *name_in, sspi_name_t *name_out)
  174.  {
  175.      *name_out = calloc((size_t)name_in->length + 5L, sizeof(char));
  176.      if (*name_out == NULL)
  177. -        return SEC_E_INSUFFICIENT_MEMORY;
  178. +        return (uint32_t)SEC_E_INSUFFICIENT_MEMORY;
  179.  
  180.      strcpy(*name_out, "nfs/");
  181.      strncat(*name_out, name_in->value, name_in->length);
  182. @@ -787,7 +790,7 @@ out:
  183.  
  184.  uint32_t sspi_unwrap(PCtxtHandle ctx, u_int seq, sspi_buffer_desc *bufin,
  185.                       sspi_buffer_desc *bufout, u_int *conf_state,
  186. -                     u_int *qop_state)
  187. +                     unsigned long *qop_state)
  188.  {
  189.      uint32_t maj_stat;
  190.      SecBufferDesc BuffDesc;
  191. @@ -913,7 +916,7 @@ void print_negotiated_attrs(PCtxtHandle ctx)
  192.  
  193.  }
  194.  
  195. -void log_hexdump(bool_t on, const u_char *title, const u_char *buf,
  196. +void log_hexdump(bool_t on, const char *title, const u_char *buf,
  197.                      int len, int offset)
  198.  {
  199.         int i, j, jm, c;
  200. diff --git a/libtirpc/src/auth_time.c b/libtirpc/src/auth_time.c
  201. index 95faae8..bce1df4 100644
  202. --- a/libtirpc/src/auth_time.c
  203. +++ b/libtirpc/src/auth_time.c
  204. @@ -248,8 +248,10 @@ __rpc_get_time_offset(td, srv, thost, uaddr, netid)
  205.         int                     a1, a2, a3, a4;
  206.         char                    ut[64], ipuaddr[64];
  207.         endpoint                teps[32];
  208. -       nis_server              tsrv;
  209. +       nis_server              tsrv = { 0 };
  210. +#ifndef _WIN32
  211.         void                    (*oldsig)() = NULL; /* old alarm handler */
  212. +#endif
  213.         struct sockaddr_in      sin;
  214.         int                     s = RPC_ANYSOCK;
  215.         socklen_t len;
  216. @@ -404,7 +406,7 @@ __rpc_get_time_offset(td, srv, thost, uaddr, netid)
  217.                                 FD_SET(_get_osfhandle(s), &readfds);
  218.                                 res = select(_rpc_dtablesize(), &readfds,
  219.                                         (fd_set *)NULL, (fd_set *)NULL, &timeout);
  220. -                       } while (res == SOCKET_ERROR && WSAGetLastError() == WSAEINTR);
  221. +                       } while (res == (int)SOCKET_ERROR && WSAGetLastError() == WSAEINTR);
  222.                         if (res == SOCKET_ERROR)
  223.                                 goto error;
  224.                         len = sizeof(from);
  225. diff --git a/libtirpc/src/authsspi_prot.c b/libtirpc/src/authsspi_prot.c
  226. index 714da5f..b670cd4 100644
  227. --- a/libtirpc/src/authsspi_prot.c
  228. +++ b/libtirpc/src/authsspi_prot.c
  229. @@ -99,7 +99,8 @@ xdr_rpc_sspi_wrap_data(XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr,
  230.  {
  231.         sspi_buffer_desc databuf, wrapbuf;
  232.         uint32_t maj_stat;
  233. -       int start, end, conf_state;
  234. +       int start, end;
  235. +        u_int conf_state;
  236.         bool_t xdr_stat;
  237.  
  238.      log_debug("in xdr_rpc_sspi_wrap_data()");
  239. @@ -180,8 +181,9 @@ xdr_rpc_sspi_unwrap_data(XDR *xdrs, xdrproc_t xdr_func, caddr_t xdr_ptr,
  240.         XDR tmpxdrs;
  241.         sspi_buffer_desc databuf, wrapbuf;
  242.         uint32_t maj_stat;
  243. -       u_int seq_num, qop_state;
  244. -       int conf_state;
  245. +       u_int seq_num;
  246. +        unsigned long qop_state;
  247. +       u_int conf_state;
  248.         bool_t xdr_stat;
  249.  
  250.      log_debug("in xdr_rpc_sspi_unwrap_data()");
  251. diff --git a/libtirpc/src/bindresvport.c b/libtirpc/src/bindresvport.c
  252. index bf92ff6..d344c25 100644
  253. --- a/libtirpc/src/bindresvport.c
  254. +++ b/libtirpc/src/bindresvport.c
  255. @@ -190,7 +190,7 @@ bindresvport_sa(int sd, struct sockaddr *sa)
  256.         for (n = 0 ; n < NPORTS ; n++) {
  257.                 currport = ((n+bindresvport_sa_last_n)%NPORTS)+STARTPORT;
  258.  
  259. -               portRange.StartPort = htons(currport);
  260. +               portRange.StartPort = htons((unsigned short)currport);
  261.                 portRange.NumberOfPorts = 1;
  262.  
  263.                 (void)memset(&portRes, 0, sizeof(portRes));
  264. diff --git a/libtirpc/src/clnt_dg.c b/libtirpc/src/clnt_dg.c
  265. index de318e6..7b0c981 100644
  266. --- a/libtirpc/src/clnt_dg.c
  267. +++ b/libtirpc/src/clnt_dg.c
  268. @@ -420,7 +420,7 @@ send_again:
  269.                 goto out;
  270.         }
  271.         nextsend_time = cu->cu_wait.tv_sec * 1000 + cu->cu_wait.tv_usec / 1000;
  272. -       if (wintirpc_sendto(cu->cu_fd, cu->cu_outbuf, (int)outlen, 0, sa, salen) != outlen) {
  273. +       if ((size_t)wintirpc_sendto(cu->cu_fd, cu->cu_outbuf, (int)outlen, 0, sa, salen) != outlen) {
  274.                 cu->cu_error.re_errno = errno;
  275.                 cu->cu_error.re_status = RPC_CANTSEND;
  276.                 goto out;
  277. diff --git a/libtirpc/src/clnt_generic.c b/libtirpc/src/clnt_generic.c
  278. index f29aae4..29bc679 100644
  279. --- a/libtirpc/src/clnt_generic.c
  280. +++ b/libtirpc/src/clnt_generic.c
  281. @@ -201,7 +201,7 @@ clnt_create_timed(const char *hostname, const rpcprog_t prog, const rpcvers_t ve
  282.         CLIENT *clnt = NULL;
  283.         void *handle;
  284.         enum clnt_stat  save_cf_stat = RPC_SUCCESS;
  285. -       struct rpc_err  save_cf_error;
  286. +       struct rpc_err  save_cf_error = { 0 };
  287.         char nettype_array[NETIDLEN];
  288.         char *nettype = &nettype_array[0];
  289.  
  290. diff --git a/libtirpc/src/clnt_simple.c b/libtirpc/src/clnt_simple.c
  291. index c2b8ff8..cd478ad 100644
  292. --- a/libtirpc/src/clnt_simple.c
  293. +++ b/libtirpc/src/clnt_simple.c
  294. @@ -125,7 +125,7 @@ rpc_call(host, prognum, versnum, procnum, inproc, in, outproc, out, nettype)
  295.         }
  296.         if ((nettype == NULL) || (nettype[0] == 0))
  297.                 nettype = "netpath";
  298. -       if (!(rcp->valid && rcp->pid == getpid() &&
  299. +       if (!(rcp->valid && rcp->pid == (pid_t)getpid() &&
  300.                 (rcp->prognum == prognum) &&
  301.                 (rcp->versnum == versnum) &&
  302.                 (!strcmp(rcp->host, host)) &&
  303. diff --git a/libtirpc/src/clnt_vc.c b/libtirpc/src/clnt_vc.c
  304. index fa53041..a4884ee 100644
  305. --- a/libtirpc/src/clnt_vc.c
  306. +++ b/libtirpc/src/clnt_vc.c
  307. @@ -534,7 +534,7 @@ clnt_vc_call(cl, proc, xdr_args, args_ptr, xdr_results, results_ptr, timeout)
  308.         u_int32_t *msg_x_id = &ct->ct_u.ct_mcalli;    /* yuk */
  309.         bool_t shipnow;
  310.         static int refreshes = 2;
  311. -    u_int seq = -1;
  312. +    u_int seq = (u_int)-1;
  313.      time_t start_send, time_now;
  314.  #ifndef _WIN32
  315.         sigset_t mask, newmask;
  316. diff --git a/libtirpc/src/getnetconfig.c b/libtirpc/src/getnetconfig.c
  317. index 2e847f9..674582f 100644
  318. --- a/libtirpc/src/getnetconfig.c
  319. +++ b/libtirpc/src/getnetconfig.c
  320. @@ -44,11 +44,6 @@
  321.  //#include <unistd.h>
  322.  #include "rpc_com.h"
  323.  
  324. -// XXX FIXME - this is in wintirpc.c, but that is not currently built
  325. -static void wintirpc_debug(char *fmt, ...)
  326. -{
  327. -    return;
  328. -}
  329.  
  330.  /*
  331.   * The five library routines in this file provide application access to the
  332. diff --git a/libtirpc/src/key_call.c b/libtirpc/src/key_call.c
  333. index 84be343..f65fc6a 100644
  334. --- a/libtirpc/src/key_call.c
  335. +++ b/libtirpc/src/key_call.c
  336. @@ -41,7 +41,13 @@
  337.   * gendeskey(deskey) - generate a secure des key
  338.   */
  339.  
  340. -#ifndef _WIN32
  341. +#ifdef _WIN32
  342. +/*
  343. + * Disable "warning C4206: nonstandard extension
  344. + * used: translation unit is empty" warning
  345. + */
  346. +#pragma warning (disable : 4206)
  347. +#else
  348.  
  349.  #include <pthread.h>
  350.  #include <reentrant.h>
  351. diff --git a/libtirpc/src/key_prot_xdr.c b/libtirpc/src/key_prot_xdr.c
  352. index 985f55b..451fd67 100644
  353. --- a/libtirpc/src/key_prot_xdr.c
  354. +++ b/libtirpc/src/key_prot_xdr.c
  355. @@ -3,7 +3,13 @@
  356.   * It was generated using rpcgen.
  357.   */
  358.  
  359. -#ifndef _WIN32
  360. +#ifdef _WIN32
  361. +/*
  362. + * Disable "warning C4206: nonstandard extension
  363. + * used: translation unit is empty" warning
  364. + */
  365. +#pragma warning (disable : 4206)
  366. +#else
  367.  #include <rpc/key_prot.h>
  368.  /*
  369.   * Copyright (c) 2009, Sun Microsystems, Inc.
  370. diff --git a/libtirpc/src/mt_misc.c b/libtirpc/src/mt_misc.c
  371. index 815b590..60038cf 100644
  372. --- a/libtirpc/src/mt_misc.c
  373. +++ b/libtirpc/src/mt_misc.c
  374. @@ -87,11 +87,11 @@ mutex_t     tsd_lock;
  375.  
  376.  /* Library global tsd keys */
  377.  thread_key_t clnt_broadcast_key;
  378. -thread_key_t rpc_call_key = -1;
  379. -thread_key_t tcp_key = -1;
  380. -thread_key_t udp_key = -1;
  381. -thread_key_t nc_key = -1;
  382. -thread_key_t rce_key = -1;
  383. +thread_key_t rpc_call_key = (DWORD)-1;
  384. +thread_key_t tcp_key = (DWORD)-1;
  385. +thread_key_t udp_key = (DWORD)-1;
  386. +thread_key_t nc_key = (DWORD)-1;
  387. +thread_key_t rce_key = (DWORD)-1;
  388.  
  389.  /* xprtlist (svc_generic.c) */
  390.  mutex_t        xprtlist_lock;
  391. diff --git a/libtirpc/src/rpc_generic.c b/libtirpc/src/rpc_generic.c
  392. index 345c4ba..03ea42c 100644
  393. --- a/libtirpc/src/rpc_generic.c
  394. +++ b/libtirpc/src/rpc_generic.c
  395. @@ -263,7 +263,8 @@ __rpc_getconfip(nettype)
  396.                 struct netconfig *nconf;
  397.                 void *confighandle;
  398.  
  399. -               if (!(confighandle = setnetconfig())) {
  400. +               confighandle = setnetconfig();
  401. +               if (!confighandle) {
  402.                         syslog (LOG_ERR, "rpc: failed to open " NETCONFIG);
  403.                         return (NULL);
  404.                 }
  405. @@ -318,7 +319,8 @@ __rpc_setconf(nettype)
  406.         case _RPC_NETPATH:
  407.         case _RPC_CIRCUIT_N:
  408.         case _RPC_DATAGRAM_N:
  409. -               if (!(handle->nhandle = setnetpath())) {
  410. +               handle->nhandle = setnetpath();
  411. +               if (!handle->nhandle) {
  412.                         free(handle);
  413.                         return (NULL);
  414.                 }
  415. @@ -329,7 +331,8 @@ __rpc_setconf(nettype)
  416.         case _RPC_DATAGRAM_V:
  417.         case _RPC_TCP:
  418.         case _RPC_UDP:
  419. -               if (!(handle->nhandle = setnetconfig())) {
  420. +               handle->nhandle = setnetconfig();
  421. +               if (!handle->nhandle) {
  422.                         syslog (LOG_ERR, "rpc: failed to open " NETCONFIG);
  423.                         free(handle);
  424.                         return (NULL);
  425. @@ -491,7 +494,6 @@ __rpc_fd2sockinfo(int fd, struct __rpc_sockinfo *sip)
  426.         WSAPROTOCOL_INFO proto_info;
  427.         int proto_info_size = sizeof(proto_info);
  428.         if (wintirpc_getsockopt(fd, SOL_SOCKET, SO_PROTOCOL_INFO, (char *)&proto_info, &proto_info_size) == SOCKET_ERROR) {
  429. -               int err = WSAGetLastError();
  430.                 return 0;
  431.         }
  432.         len = proto_info.iMaxSockAddr;
  433. @@ -506,7 +508,6 @@ __rpc_fd2sockinfo(int fd, struct __rpc_sockinfo *sip)
  434.  
  435.         len = sizeof type;
  436.         if (wintirpc_getsockopt(fd, SOL_SOCKET, SO_TYPE, (char *)&type, &len) == SOCKET_ERROR) {
  437. -               int err = WSAGetLastError();
  438.                 return 0;
  439.         }
  440.  
  441. @@ -744,13 +745,13 @@ __rpc_uaddr2taddr_af(int af, const char *uaddr)
  442.                 p = strrchr(addrstr, '.');
  443.                 if (p == NULL)
  444.                         goto out;
  445. -               portlo = (unsigned)atoi(p + 1);
  446. +               portlo = (unsigned short)atoi(p + 1);
  447.                 *p = '\0';
  448.  
  449.                 p = strrchr(addrstr, '.');
  450.                 if (p == NULL)
  451.                         goto out;
  452. -               porthi = (unsigned)atoi(p + 1);
  453. +               porthi = (unsigned short)atoi(p + 1);
  454.                 *p = '\0';
  455.                 port = (porthi << 8) | portlo;
  456.         }
  457. diff --git a/libtirpc/src/svc_vc.c b/libtirpc/src/svc_vc.c
  458. index 9ea907f..2d2b429 100644
  459. --- a/libtirpc/src/svc_vc.c
  460. +++ b/libtirpc/src/svc_vc.c
  461. @@ -575,7 +575,7 @@ write_vc(xprtp, buf, len)
  462.         SVCXPRT *xprt;
  463.         int i, cnt;
  464.         struct cf_conn *cd;
  465. -       struct timeval tv0, tv1;
  466. +       struct timeval tv0 = { 0 }, tv1;
  467.  
  468.         xprt = (SVCXPRT *)xprtp;
  469.         assert(xprt != NULL);
  470. diff --git a/libtirpc/src/wintirpc.c b/libtirpc/src/wintirpc.c
  471. index 1394481..c2cc47a 100644
  472. --- a/libtirpc/src/wintirpc.c
  473. +++ b/libtirpc/src/wintirpc.c
  474. @@ -160,7 +160,7 @@ void wintirpc_unregister_osfhandle(SOCKET handle)
  475.  
  476.         for (i=0 ; i < WINTIRPC_MAX_OSFHANDLE_FD_NHANDLE_VALUE ; i++) {
  477.                 if (handle_fd_map[i].m_s == handle) {
  478. -                       handle_fd_map[i].m_s = SOCKET_ERROR;
  479. +                       handle_fd_map[i].m_s = (SOCKET)SOCKET_ERROR;
  480.                         handle_fd_map[i].m_fd = -1;
  481.                         return;
  482.                 }
  483. @@ -178,7 +178,7 @@ void wintirpc_unregister_osf_fd(int fd)
  484.  
  485.         for (i=0 ; i < WINTIRPC_MAX_OSFHANDLE_FD_NHANDLE_VALUE ; i++) {
  486.                 if (handle_fd_map[i].m_fd == fd) {
  487. -                       handle_fd_map[i].m_s = SOCKET_ERROR;
  488. +                       handle_fd_map[i].m_s = (SOCKET)SOCKET_ERROR;
  489.                         handle_fd_map[i].m_fd = -1;
  490.                         return;
  491.                 }
  492. diff --git a/libtirpc/src/xdr.c b/libtirpc/src/xdr.c
  493. index 3c24314..46c1b34 100644
  494. --- a/libtirpc/src/xdr.c
  495. +++ b/libtirpc/src/xdr.c
  496. @@ -464,6 +464,13 @@ xdr_enum(xdrs, ep)
  497.         /*
  498.          * enums are treated as ints
  499.          */
  500. +
  501. +
  502. +#ifdef _WIN32
  503. +#pragma warning( push )
  504. +/* Disable "warning C4127: conditional expression is constant" */
  505. +#pragma warning (disable : 4127)
  506. +#endif
  507.         /* LINTED */ if (sizeof (enum sizecheck) == sizeof (long)) {
  508.                 return (xdr_long(xdrs, (long *)(void *)ep));
  509.         } else /* LINTED */ if (sizeof (enum sizecheck) == sizeof (int)) {
  510. @@ -473,6 +480,9 @@ xdr_enum(xdrs, ep)
  511.         } else {
  512.                 return (FALSE);
  513.         }
  514. +#ifdef _WIN32
  515. +#pragma warning( pop )
  516. +#endif
  517.  }
  518.  
  519.  /*
  520. diff --git a/libtirpc/tirpc/rpc/auth_sspi.h b/libtirpc/tirpc/rpc/auth_sspi.h
  521. index fb965d7..b0bc558 100644
  522. --- a/libtirpc/tirpc/rpc/auth_sspi.h
  523. +++ b/libtirpc/tirpc/rpc/auth_sspi.h
  524. @@ -102,18 +102,18 @@ bool_t authsspi_service(AUTH *auth, int svc);
  525.  uint32_t sspi_get_mic(void *ctx, u_int qop, u_int seq,
  526.                        sspi_buffer_desc *bufin, sspi_buffer_desc *bufout);
  527.  uint32_t sspi_verify_mic(void *ctx, u_int seq, sspi_buffer_desc *bufin,
  528. -                         sspi_buffer_desc *bufout, u_int *qop_state);
  529. +                         sspi_buffer_desc *bufout, unsigned long *qop_state);
  530.  uint32_t sspi_wrap(void *ctx, u_int seq, sspi_buffer_desc *bufin,
  531.                           sspi_buffer_desc *bufout, u_int *conf_state);
  532.  uint32_t sspi_unwrap(void *ctx, u_int seq, sspi_buffer_desc *bufin,
  533.                       sspi_buffer_desc *bufout, u_int *conf_state,
  534. -                     u_int *qop_state);
  535. +                     unsigned long *qop_state);
  536.  void sspi_release_buffer(sspi_buffer_desc *buf);
  537.  uint32_t sspi_import_name(sspi_buffer_desc *name_in, sspi_name_t *name_out);
  538.  
  539.  void log_debug(const char *fmt, ...);
  540.  void log_status(char *m, uint32_t major, uint32_t minor);
  541. -void log_hexdump(bool_t on, const u_char *title, const u_char *buf, int len, int offset);
  542. +void log_hexdump(bool_t on, const char *title, const u_char *buf, int len, int offset);
  543.  
  544.  __END_DECLS
  545.  
  546. --
  547. 2.43.0
  548.  
  549. From 6d4e632b513f0d5d4820ae8302311ce06b17b153 Mon Sep 17 00:00:00 2001
  550. From: Roland Mainz <roland.mainz@nrubsig.org>
  551. Date: Sat, 25 May 2024 12:06:49 +0200
  552. Subject: [PATCH 2/7] daemon: Fix warnings in idmapper code for
  553.  ptr<--->(uid_t|gid_t) stunts
  554.  
  555. Fix warnings in idmapper code for ptr<--->(uid_t|gid_t) stunts
  556.  
  557. Signed-off-by: Cedric Blancher <cedric.blancher@gmail.com>
  558. ---
  559. daemon/idmap.c | 33 +++++++++++++++++++--------------
  560.  daemon/util.h  |  4 ++++
  561.  2 files changed, 23 insertions(+), 14 deletions(-)
  562.  
  563. diff --git a/daemon/idmap.c b/daemon/idmap.c
  564. index 996e891..5e42d43 100644
  565. --- a/daemon/idmap.c
  566. +++ b/daemon/idmap.c
  567. @@ -32,6 +32,13 @@
  568.  #include "nfs41_const.h"
  569.  #include "list.h"
  570.  #include "daemon_debug.h"
  571. +#include "util.h"
  572. +
  573. +#define PTR2UID_T(p) ((uid_t)PTR2PTRDIFF_T(p))
  574. +#define PTR2GID_T(p) ((gid_t)PTR2PTRDIFF_T(p))
  575. +#define PTR2UINT(p)  ((UINT)PTR2PTRDIFF_T(p))
  576. +#define UID_T2PTR(u) (PTRDIFF_T2PTR((ptrdiff_t)u))
  577. +#define GID_T2PTR(g) (PTRDIFF_T2PTR((ptrdiff_t)g))
  578.  
  579.  #define IDLVL 2         /* dprintf level for idmap logging */
  580.  #define CYGWINIDLVL 2   /* dprintf level for idmap logging */
  581. @@ -554,19 +561,19 @@ static int idmap_filter(
  582.      char *filter,
  583.      size_t filter_len)
  584.  {
  585. -    UINT_PTR i;
  586. +    UINT i;
  587.      int status = NO_ERROR;
  588.  
  589.      switch (lookup->type) {
  590.      case TYPE_INT:
  591. -        i = (UINT_PTR)lookup->value;
  592. +        i = PTR2UINT(lookup->value);
  593.          if (FAILED(StringCchPrintfA(filter, filter_len,
  594.                  "(&(objectClass=%s)(%s=%u))",
  595.                  config->classes[lookup->klass],
  596. -                config->attributes[lookup->attr], (UINT)i))) {
  597. +                config->attributes[lookup->attr], i))) {
  598.              status = ERROR_BUFFER_OVERFLOW;
  599.              eprintf("ldap filter buffer overflow: '%s=%u'\n",
  600. -                config->attributes[lookup->attr], (UINT)i);
  601. +                config->attributes[lookup->attr], i);
  602.          }
  603.          break;
  604.  
  605. @@ -764,7 +771,7 @@ static int idmap_lookup_user(
  606.          }
  607.      }
  608.      else if (lookup->attr == ATTR_UID) {
  609. -        uid_t search_uid = (uid_t)(lookup->value);
  610. +        uid_t search_uid = PTR2UID_T(lookup->value);
  611.          char search_name[VAL_LEN];
  612.          char res_username[VAL_LEN];
  613.          char principal_name[VAL_LEN];
  614. @@ -876,7 +883,7 @@ static int idmap_lookup_group(
  615.          }
  616.      }
  617.      else if (lookup->attr == ATTR_GID) {
  618. -        gid_t search_gid = (gid_t)(lookup->value);
  619. +        gid_t search_gid = PTR2GID_T(lookup->value);
  620.          char search_name[VAL_LEN];
  621.          char res_groupname[VAL_LEN];
  622.          gid_t cy_gid = 0;
  623. @@ -1081,8 +1088,8 @@ static int uid_cmp(const struct list_entry *list, const void *value)
  624.  {
  625.      const struct idmap_user *entry = list_container(list,
  626.          const struct idmap_user, entry);
  627. -    const UINT_PTR uid = (const UINT_PTR)value;
  628. -    return (UINT)uid - entry->uid;
  629. +    const uid_t uid = PTR2UID_T(value);
  630. +    return (int)uid - (int)entry->uid;
  631.  }
  632.  
  633.  int nfs41_idmap_uid_to_name(
  634. @@ -1091,14 +1098,13 @@ int nfs41_idmap_uid_to_name(
  635.      char *name,
  636.      size_t len)
  637.  {
  638. -    UINT_PTR uidp = uid; /* convert to pointer size to pass as void* */
  639.      struct idmap_lookup lookup = { ATTR_UID, CLASS_USER, TYPE_INT, uid_cmp };
  640.      struct idmap_user user;
  641.      int status;
  642.  
  643.      DPRINTF(IDLVL, ("--> nfs41_idmap_uid_to_name(%u)\n", (unsigned int)uid));
  644.  
  645. -    lookup.value = (const void*)uidp;
  646. +    lookup.value = UID_T2PTR(uid);
  647.  
  648.      /* look up the user entry */
  649.      status = idmap_lookup_user(context, &lookup, &user);
  650. @@ -1204,8 +1210,8 @@ static int gid_cmp(const struct list_entry *list, const void *value)
  651.  {
  652.      const struct idmap_group *entry = list_container(list,
  653.          const struct idmap_group, entry);
  654. -    const UINT_PTR gid = (const UINT_PTR)value;
  655. -    return (UINT)gid - entry->gid;
  656. +    const gid_t gid = PTR2GID_T(value);
  657. +    return (int)gid - (int)entry->gid;
  658.  }
  659.  
  660.  int nfs41_idmap_gid_to_group(
  661. @@ -1214,14 +1220,13 @@ int nfs41_idmap_gid_to_group(
  662.      char *name,
  663.      size_t len)
  664.  {
  665. -    UINT_PTR gidp = gid; /* convert to pointer size to pass as void* */
  666.      struct idmap_lookup lookup = { ATTR_GID, CLASS_GROUP, TYPE_INT, gid_cmp };
  667.      struct idmap_group group;
  668.      int status;
  669.  
  670.      DPRINTF(IDLVL, ("--> nfs41_idmap_gid_to_group(%u)\n", gid));
  671.  
  672. -    lookup.value = (const void*)gidp;
  673. +    lookup.value = GID_T2PTR(gid);
  674.  
  675.      /* look up the group entry */
  676.      status = idmap_lookup_group(context, &lookup, &group);
  677. diff --git a/daemon/util.h b/daemon/util.h
  678. index 899711d..9c3a878 100644
  679. --- a/daemon/util.h
  680. +++ b/daemon/util.h
  681. @@ -23,6 +23,7 @@
  682.  #ifndef __NFS41_DAEMON_UTIL_H__
  683.  #define __NFS41_DAEMON_UTIL_H__
  684.  
  685. +#include <stdlib.h>
  686.  #include <stdbool.h>
  687.  
  688.  #include "nfs41_types.h"
  689. @@ -41,6 +42,9 @@ enum stable_how4;
  690.   */
  691.  #define FILE_INFO_TIME_NOT_SET (0LL)
  692.  
  693. +#define PTR2PTRDIFF_T(p) ((ptrdiff_t)((char *)((void *)(p)) - ((char *)0)))
  694. +#define PTRDIFF_T2PTR(d) ((void *)(((char *)0) + (d)))
  695. +
  696.  int safe_read(unsigned char **pos, uint32_t *remaining, void *dest, uint32_t dest_len);
  697.  int safe_write(unsigned char **pos, uint32_t *remaining, void *dest, uint32_t dest_len);
  698.  int get_name(unsigned char **pos, uint32_t *remaining, const char **out_name);
  699. --
  700. 2.43.0
  701.  
  702. From beadc90bcbf43275cefdbce21408e48c09e9b5b6 Mon Sep 17 00:00:00 2001
  703. From: Roland Mainz <roland.mainz@nrubsig.org>
  704. Date: Sat, 25 May 2024 12:38:44 +0200
  705. Subject: [PATCH 3/7] cygwin,tests: Add newgrp(1)/sg(1)-style "winsg" util to
  706.  switch primary group
  707.  
  708. Add newgrp(1)/sg(1)-style "winsg" utility to switch Win32 primary
  709. group.
  710.  
  711. Signed-off-by: Cedric Blancher <cedric.blancher@gmail.com>
  712. ---
  713. cygwin/Makefile              |   2 +
  714.  cygwin/Makefile.install      |   5 +
  715.  cygwin/README.bintarball.txt |  10 +
  716.  tests/winsg/winsg.c          | 450 +++++++++++++++++++++++++++++++++++
  717.  4 files changed, 467 insertions(+)
  718.  create mode 100644 tests/winsg/winsg.c
  719.  
  720. diff --git a/cygwin/Makefile b/cygwin/Makefile
  721. index aaa8864..bcd07d5 100644
  722. --- a/cygwin/Makefile
  723. +++ b/cygwin/Makefile
  724. @@ -55,6 +55,7 @@ build_32bit_debug:
  725.  
  726.  build_testutils:
  727.         (cd "$(PROJECT_BASEDIR_DIR)/tests/winfsinfo1" && make all)
  728. +       (cd "$(PROJECT_BASEDIR_DIR)/tests/winsg" && make all)
  729.  
  730.  build: build_32bit_release build_32bit_debug build_64bit_release build_64bit_debug build_testutils
  731.         sync
  732. @@ -65,6 +66,7 @@ build: build_32bit_release build_32bit_debug build_64bit_release build_64bit_deb
  733.  clean:
  734.         rm -vRf $$(find "$(PROJECT_BASEDIR_DIR)/build.vc19" -name Debug -o -name Release)
  735.         (cd "$(PROJECT_BASEDIR_DIR)/tests/winfsinfo1" && make clean)
  736. +       (cd "$(PROJECT_BASEDIR_DIR)/tests/winsg" && make clean)
  737.  
  738.  installdest: \
  739.         $(VS_BUILD_DIR32)/nfsd.exe \
  740. diff --git a/cygwin/Makefile.install b/cygwin/Makefile.install
  741. index a9352bc..aa0e9df 100644
  742. --- a/cygwin/Makefile.install
  743. +++ b/cygwin/Makefile.install
  744. @@ -70,6 +70,11 @@ installdest:
  745.         else \
  746.                 (cd $(DESTDIR)/$(CYGWIN_BASEPATH)/bin/ && ln -sf winfsinfo.i686.exe winfsinfo.exe) \
  747.         fi
  748. +       if [[ "$(CYGWIN_BASEPATH)" == *64* ]] ; then \
  749. +               cp "$(PROJECT_BASEDIR_DIR)/tests/winsg/winsg.x86_64.exe" $(DESTDIR)/$(CYGWIN_BASEPATH)/bin/winsg.exe ; \
  750. +       else \
  751. +               cp "$(PROJECT_BASEDIR_DIR)/tests/winsg/winsg.i686.exe" $(DESTDIR)/$(CYGWIN_BASEPATH)/bin/winsg.exe ; \
  752. +       fi
  753.         @ printf "# Package ksh93&co (if available) since Cygwin does not ship with it yet\n"
  754.         [[ -x $(CYGWIN_BASEPATH)/bin/ksh93.exe ]] && cp -f $(CYGWIN_BASEPATH)/bin/ksh93.exe $(DESTDIR)/$(CYGWIN_BASEPATH)/bin/ksh93.exe || true
  755.         [[ -x $(CYGWIN_BASEPATH)/bin/shcomp.exe ]] && cp -f $(CYGWIN_BASEPATH)/bin/shcomp.exe $(DESTDIR)/$(CYGWIN_BASEPATH)/bin/shcomp.exe || true
  756. diff --git a/cygwin/README.bintarball.txt b/cygwin/README.bintarball.txt
  757. index 8f50fd0..f82f302 100644
  758. --- a/cygwin/README.bintarball.txt
  759. +++ b/cygwin/README.bintarball.txt
  760. @@ -56,6 +56,16 @@ NFSv4.1 client and filesystem driver for Windows 10/11
  761.      - uid/gid
  762.      - Cygwin symlinks
  763.  
  764. +- Custom primary group support
  765. +    - Supports primary group changes in the calling process/thread
  766. +      (via |SetTokenInformation(..., TokenPrimaryGroup,...)|), e.g.
  767. +      if the calling process/threads switches the primary group
  768. +      in its access token then the NFSv4.1 client will use that
  769. +      group as GID for file creation.
  770. +    - newgrp(1)/sg(1)-style "winsg" utilty to run cmd.exe with
  771. +      different primary group, e.g.
  772. +      $ winsg [-] -g group [-c command | /C command] #
  773. +
  774.  - Software compatibility:
  775.      - Any NFSv4.1 server (Linux, Solaris, Illumos, FreeBSD, nfs4j,
  776.          ...)
  777. diff --git a/tests/winsg/winsg.c b/tests/winsg/winsg.c
  778. new file mode 100644
  779. index 0000000..7f8fad4
  780. --- /dev/null
  781. +++ b/tests/winsg/winsg.c
  782. @@ -0,0 +1,450 @@
  783. +
  784. +/*
  785. + * MIT License
  786. + *
  787. + * Copyright (c) 2024 Roland Mainz <roland.mainz@nrubsig.org>
  788. + *
  789. + * Permission is hereby granted, free of charge, to any person obtaining a copy
  790. + * of this software and associated documentation files (the "Software"), to deal
  791. + * in the Software without restriction, including without limitation the rights
  792. + * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  793. + * copies of the Software, and to permit persons to whom the Software is
  794. + * furnished to do so, subject to the following conditions:
  795. + *
  796. + * The above copyright notice and this permission notice shall be included in all
  797. + * copies or substantial portions of the Software.
  798. + *
  799. + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  800. + * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  801. + * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  802. + * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  803. + * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  804. + * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
  805. + * SOFTWARE.
  806. + */
  807. +
  808. +/*
  809. + * winsg.c - run Win32 or Cygwin program with a different (primary) group
  810. + *
  811. + * Written by Roland Mainz <roland.mainz@nrubsig.org>
  812. + */
  813. +
  814. +/*
  815. + * Compile with:
  816. + * $ clang -target x86_64-pc-windows-gnu -Wall -g winsg.c -o winsg.exe #
  817. + */
  818. +
  819. +#define UNICODE 1
  820. +#define _UNICODE 1
  821. +
  822. +#include <windows.h>
  823. +#include <stdio.h>
  824. +#include <stdbool.h>
  825. +#include <assert.h>
  826. +#include <Lmcons.h>
  827. +#include <process.h>
  828. +
  829. +#if 0
  830. +#define D(x) x
  831. +#else
  832. +#define D(x)
  833. +#endif
  834. +
  835. +#ifdef _WIN64
  836. +#define CYGWIN_BASH_PATH "C:\\cygwin64\\bin\\bash.exe"
  837. +#else
  838. +#define CYGWIN_BASH_PATH "C:\\cygwin\\bin\\bash.exe"
  839. +#endif /* _WIN64 */
  840. +#define WIN32_CMDEXE_PATH "C:\\Windows\\system32\\cmd.exe"
  841. +
  842. +/*
  843. + * DECLARE_SID_BUFFER - declare a buffer for a SID value
  844. + * Note that buffers with SID values must be 16byte aligned
  845. + * on Windows 32, othewise the kernel might return
  846. + * |ERROR_NOACCESS|(=998) - "Invalid access to memory location.
  847. + */
  848. +#define DECLARE_SID_BUFFER(varname) \
  849. +    char (varname)[SECURITY_MAX_SID_SIZE+1] __attribute__((aligned(16)))
  850. +
  851. +/*
  852. + * Performance hack:
  853. + * GETTOKINFO_EXTRA_BUFFER - extra space for more data
  854. + * |GetTokenInformation()| for |TOKEN_USER| and |TOKEN_PRIMARY_GROUP|
  855. + * always fails in Win10 with |ERROR_INSUFFICIENT_BUFFER| if you
  856. + * just pass the |sizeof(TOKEN_*)| value. Instead of calling
  857. + * |GetTokenInformation()| with |NULL| arg to obtain the size to
  858. + * allocate we just provide 2048 bytes of extra space after the
  859. + * |TOKEN_*| size, and pray it is enough
  860. + */
  861. +#define GETTOKINFO_EXTRA_BUFFER (2048)
  862. +
  863. +D(
  864. +static
  865. +bool get_token_primarygroup_name(HANDLE tok, char *out_buffer)
  866. +{
  867. +    DWORD tokdatalen;
  868. +    PTOKEN_PRIMARY_GROUP ptpgroup;
  869. +    PSID pgsid;
  870. +    DWORD namesize = GNLEN+1;
  871. +    char domainbuffer[UNLEN+1];
  872. +    DWORD domainbuffer_size = sizeof(domainbuffer);
  873. +    SID_NAME_USE name_use;
  874. +
  875. +    tokdatalen = sizeof(TOKEN_PRIMARY_GROUP)+GETTOKINFO_EXTRA_BUFFER;
  876. +    ptpgroup = _alloca(tokdatalen);
  877. +    if (!GetTokenInformation(tok, TokenPrimaryGroup, ptpgroup,
  878. +        tokdatalen, &tokdatalen)) {
  879. +        D((void)fprintf(stderr, "get_token_primarygroup_name: "
  880. +            "GetTokenInformation(tok=0x%p, TokenPrimaryGroup) failed, "
  881. +            "status=%d.\n",
  882. +            (void *)tok, (int)GetLastError()));
  883. +        return false;
  884. +    }
  885. +
  886. +    pgsid = ptpgroup->PrimaryGroup;
  887. +
  888. +    if (!LookupAccountSidA(NULL, pgsid, out_buffer, &namesize,
  889. +        domainbuffer, &domainbuffer_size, &name_use)) {
  890. +        D((void)fprintf(stderr, "get_token_primarygroup_name: "
  891. +            "LookupAccountSidA() failed, status=%d.\n",
  892. +            (int)GetLastError()));
  893. +        return false;
  894. +    }
  895. +
  896. +    return true;
  897. +}
  898. +)
  899. +
  900. +static
  901. +bool is_group_in_token(HANDLE tok, PSID qsid)
  902. +{
  903. +    DWORD tokdatalen;
  904. +    PTOKEN_GROUPS ptgroups;
  905. +
  906. +    tokdatalen = sizeof(TOKEN_GROUPS)+GETTOKINFO_EXTRA_BUFFER;
  907. +    ptgroups = _alloca(tokdatalen);
  908. +    if (!GetTokenInformation(tok, TokenGroups, ptgroups,
  909. +        tokdatalen, &tokdatalen)) {
  910. +        D((void)fprintf(stderr, "is_group_in_token: "
  911. +            "GetTokenInformation(tok=0x%p, TokenGroups) failed, "
  912. +            "status=%d.\n",
  913. +            (void *)tok, (int)GetLastError()));
  914. +        return false;
  915. +    }
  916. +
  917. +    int i;
  918. +    D(
  919. +        (void)fprintf(stderr, "is_group_in_token: got %d groups\n",
  920. +            (int)ptgroups->GroupCount)
  921. +    );
  922. +    for (i = 0 ; i < ptgroups->GroupCount ; i++) {
  923. +        if (EqualSid(qsid, ptgroups->Groups[i].Sid) &&
  924. +            (ptgroups->Groups[i].Attributes & SE_GROUP_ENABLED)) {
  925. +            D((void)puts("is_group_in_token: #match"));
  926. +            return true;
  927. +        }
  928. +    }
  929. +
  930. +    D((void)puts("is_group_in_token: #no match"));
  931. +
  932. +    return false;
  933. +}
  934. +
  935. +static
  936. +bool get_group_sid(const char *groupname, PSID pgsid, PDWORD pgsid_size)
  937. +{
  938. +    char domainbuffer[UNLEN+1];
  939. +    DWORD domainbuffer_size = sizeof(domainbuffer);
  940. +    SID_NAME_USE name_use;
  941. +
  942. +    if (!LookupAccountNameA(NULL, groupname,
  943. +        pgsid, pgsid_size, domainbuffer, &domainbuffer_size, &name_use)) {
  944. +        D((void)fprintf(stderr, "get_group_sid: "
  945. +            "LookupAccountNameA() failed.\n"));
  946. +        return false;
  947. +    }
  948. +
  949. +    return true;
  950. +}
  951. +
  952. +static
  953. +bool set_token_primarygroup_sid(HANDLE tok, PSID pgsid)
  954. +{
  955. +    DWORD tokdatalen;
  956. +    TOKEN_PRIMARY_GROUP tpgroup;
  957. +
  958. +    tokdatalen = sizeof(TOKEN_PRIMARY_GROUP);
  959. +    tpgroup.PrimaryGroup = pgsid;
  960. +    if (!SetTokenInformation(tok, TokenPrimaryGroup,
  961. +        &tpgroup, tokdatalen)) {
  962. +        D((void)fprintf(stderr, "set_token_primarygroup_sid: "
  963. +            "SetTokenInformation(tok=0x%p, TokenPrimaryGroup) failed, "
  964. +            "status=%d\n",
  965. +            (void *)tok, (int)GetLastError()));
  966. +        return false;
  967. +    }
  968. +
  969. +    return true;
  970. +}
  971. +
  972. +static
  973. +char *stpcpy (char *restrict s1, const char *restrict s2)
  974. +{
  975. +    size_t l = strlen(s2);
  976. +    return memcpy(s1, s2, l+1) + l;
  977. +}
  978. +
  979. +static
  980. +void win32cmd_quotearg(char *s1, const char *s2)
  981. +{
  982. +    int c;
  983. +    *s1++ = '"';
  984. +    while ((c = *s2) != '\0') {
  985. +        switch(c) {
  986. +            case '"':
  987. +                *s1++='\\';
  988. +                *s1 = c;
  989. +                break;
  990. +            default:
  991. +                *s1 = c;
  992. +                break;
  993. +        }
  994. +        s1++;
  995. +        s2++;
  996. +    }
  997. +    *s1++ = '"';
  998. +    *s1 = '\0';
  999. +}
  1000. +
  1001. +static
  1002. +int usage(void)
  1003. +{
  1004. +    (void)fprintf(stderr, "Usage: "
  1005. +        "winsg [-] -g group [-c command | /C command]]\n"
  1006. +        "Execute command as different primary group ID\n"
  1007. +        "\n"
  1008. +        "Examples:\n"
  1009. +        "\t1. Run new cmd.exe with primary group 'abc1':\n"
  1010. +        "\t\twinsg -g abc1 /C\n"
  1011. +        "\n"
  1012. +        "\t2. Run new Cygwin bash with primary group 'abc2':\n"
  1013. +        "\t\twinsg -g abc2 /C\n"
  1014. +        "\n"
  1015. +        "\t3. Start /bin/id from cmd.exe with primary group 'abc3':\n"
  1016. +        "\t\twinsg abc3 /C 'C:\\cygwin64\\bin\\id.exe -a'\n"
  1017. +        "\n"
  1018. +        "\t4. Start /bin/id from Cygwin bash with primary group "
  1019. +            "'abc4':\n"
  1020. +        "\t\twinsg abc4 -c '/bin/id.exe -a'\n"
  1021. +        "\n"
  1022. +        "Please report bugs to "
  1023. +        "Roland Mainz <roland.mainz@nrubsig.org>.\n");
  1024. +
  1025. +    return 2;
  1026. +}
  1027. +
  1028. +
  1029. +enum shelltype {
  1030. +    SHELLTYPE_NOT_SET = 0,
  1031. +    SHELLTYPE_NONE,
  1032. +    SHELLTYPE_CMD,
  1033. +    SHELLTYPE_SYSTEM
  1034. +};
  1035. +
  1036. +int main(int ac, char *av[])
  1037. +{
  1038. +    enum shelltype st = SHELLTYPE_NOT_SET;
  1039. +    int cmd_arg_index = -1;
  1040. +    const char *newgrpname = NULL;
  1041. +    HANDLE tok = INVALID_HANDLE_VALUE;
  1042. +    int subcmdret = EXIT_FAILURE;
  1043. +    int retval = 1;
  1044. +    int i;
  1045. +
  1046. +    for (i=1 ; i < ac ; i++) {
  1047. +        D((void)fprintf(stderr, "# i=%d, av[i]='%s'\n", i, av[i]));
  1048. +
  1049. +        if (!strcmp(av[i], "-")) {
  1050. +            (void)fprintf(stderr, "%s: "
  1051. +                "Run in new login not supported yet.\n", av[0]);
  1052. +            retval = 1;
  1053. +            goto done;
  1054. +        }
  1055. +        else if (!strcmp(av[i], "-c")) {
  1056. +            /* -c can take zero or one argument */
  1057. +            if ((ac-i) > 2) {
  1058. +                (void)fprintf(stderr, "%s: "
  1059. +                    "Too many arguments for -c.\n", av[0]);
  1060. +                retval = 1;
  1061. +                goto done;
  1062. +            }
  1063. +
  1064. +            st = SHELLTYPE_SYSTEM;
  1065. +            cmd_arg_index = i+1;
  1066. +            break;
  1067. +        }
  1068. +        else if (!strcmp(av[i], "/C")) {
  1069. +            /* /C can take zero or one argument */
  1070. +            if ((ac-i) > 2) {
  1071. +                (void)fprintf(stderr, "%s: "
  1072. +                    "Too many arguments for /C.\n", av[0]);
  1073. +                retval = 1;
  1074. +                goto done;
  1075. +            }
  1076. +
  1077. +            st = SHELLTYPE_CMD;
  1078. +            cmd_arg_index = i+1;
  1079. +            break;
  1080. +        }
  1081. +        else if (!strcmp(av[i], "-g")) {
  1082. +            newgrpname = av[i+1];
  1083. +            i++;
  1084. +        }
  1085. +        else if ((!strcmp(av[i], "-h")) ||
  1086. +                (!strcmp(av[i], "--help")) ||
  1087. +                (!strcmp(av[i], "--usage"))) {
  1088. +            retval = usage();
  1089. +            goto done;
  1090. +        }
  1091. +        else if ((av[i][0] == '-') || (av[i][0] == '/')) {
  1092. +            (void)fprintf(stderr, "%s: "
  1093. +                "Unsupported option '%s'.\n", av[0], av[i]);
  1094. +            retval = usage();
  1095. +            goto done;
  1096. +        }
  1097. +        else {
  1098. +            if ((i == 1) && (*av[i] != '-')) {
  1099. +                newgrpname = av[i];
  1100. +                continue;
  1101. +            }
  1102. +
  1103. +            cmd_arg_index = i+1;
  1104. +            st = SHELLTYPE_NONE;
  1105. +            break;
  1106. +        }
  1107. +    }
  1108. +
  1109. +    /*
  1110. +     * Handle newgrp(1)-like behaviour (run new shell (in our
  1111. +     * case cmd.exe) with requested group), e.g. ...
  1112. +     * $ winsg -g cygwingrp1
  1113. +     * $ winsg cygwingrp1
  1114. +     */
  1115. +    if ((st == SHELLTYPE_NOT_SET) && (cmd_arg_index == -1)) {
  1116. +        st = SHELLTYPE_NONE;
  1117. +        /* set |cmd_arg_index| to the end of |av|, which is |NULL| */
  1118. +        cmd_arg_index = i;
  1119. +    }
  1120. +
  1121. +    if (!newgrpname) {
  1122. +        (void)fprintf(stderr, "%s: No group name given.\n", av[0]);
  1123. +        retval = 1;
  1124. +        goto done;
  1125. +    }
  1126. +
  1127. +    D((void)fprintf(stderr,
  1128. +        "# shelltype=%d, cmd_arg_index=%d, "
  1129. +        "av[cmd_arg_index]='%s', "
  1130. +        "new group name '%s'\n",
  1131. +        (int)st, cmd_arg_index, av[cmd_arg_index], newgrpname));
  1132. +
  1133. +    if (!OpenProcessToken(GetCurrentProcess(),
  1134. +        TOKEN_QUERY|TOKEN_ADJUST_DEFAULT|TOKEN_DUPLICATE,
  1135. +        &tok)) {
  1136. +        (void)fprintf(stderr, "%s: Cannot open token.\n", av[0]);
  1137. +        retval = 1;
  1138. +        goto done;
  1139. +    }
  1140. +
  1141. +    D(
  1142. +        char pgroupname[GNLEN+1];
  1143. +
  1144. +        get_token_primarygroup_name(tok, pgroupname);
  1145. +        (void)printf("primary group name '%s'\n", pgroupname);
  1146. +    )
  1147. +
  1148. +    DECLARE_SID_BUFFER(sidbuff);
  1149. +    PSID pgsid = (PSID)sidbuff;
  1150. +    DWORD pgsid_size = SECURITY_MAX_SID_SIZE;
  1151. +
  1152. +    if (!get_group_sid(newgrpname, pgsid, &pgsid_size)) {
  1153. +        (void)fprintf(stderr, "%s: Could not find group '%s'.\n",
  1154. +            av[0], newgrpname);
  1155. +        retval = 1;
  1156. +        goto done;
  1157. +    }
  1158. +
  1159. +    if (!is_group_in_token(tok, pgsid)) {
  1160. +        (void)fprintf(stderr, "%s: "
  1161. +            "Current user is not a member of group '%s'.\n",
  1162. +            av[0], newgrpname);
  1163. +        retval = 1;
  1164. +        goto done;
  1165. +    }
  1166. +
  1167. +    if (!set_token_primarygroup_sid(tok, pgsid)) {
  1168. +        (void)fprintf(stderr,
  1169. +            "%s: Could not switch to new primary group '%s'.\n",
  1170. +            av[0], newgrpname);
  1171. +        retval = 1;
  1172. +        goto done;
  1173. +    }
  1174. +
  1175. +    D(
  1176. +        get_token_primarygroup_name(tok, pgroupname);
  1177. +        (void)printf("primary group name '%s'\n", pgroupname);
  1178. +    )
  1179. +
  1180. +    (void)_flushall();
  1181. +
  1182. +    retval = 0;
  1183. +
  1184. +    switch(st) {
  1185. +        case SHELLTYPE_SYSTEM:
  1186. +            if (av[cmd_arg_index] != NULL) {
  1187. +                size_t cmdbuff_size = strlen(CYGWIN_BASH_PATH)+
  1188. +                    16+
  1189. +                    strlen(av[cmd_arg_index])*2;
  1190. +                char *cmdbuff = alloca(cmdbuff_size);
  1191. +                char *s = cmdbuff;
  1192. +                s = stpcpy(s, CYGWIN_BASH_PATH);
  1193. +                s = stpcpy(s, " -c ");
  1194. +
  1195. +                win32cmd_quotearg(s, av[cmd_arg_index]);
  1196. +                D((void)fprintf(stderr, "# executing '%s'\n", cmdbuff));
  1197. +                subcmdret = system(cmdbuff);
  1198. +            }
  1199. +            else {
  1200. +                subcmdret = system(CYGWIN_BASH_PATH);
  1201. +            }
  1202. +            break;
  1203. +        case SHELLTYPE_CMD:
  1204. +            if (av[cmd_arg_index] != NULL) {
  1205. +                subcmdret = _spawnl(_P_WAIT,
  1206. +                    WIN32_CMDEXE_PATH, WIN32_CMDEXE_PATH,
  1207. +                    "/C", av[cmd_arg_index], NULL);
  1208. +            }
  1209. +            else {
  1210. +                subcmdret = _spawnl(_P_WAIT,
  1211. +                    WIN32_CMDEXE_PATH, WIN32_CMDEXE_PATH, NULL);
  1212. +            }
  1213. +            break;
  1214. +        case SHELLTYPE_NONE:
  1215. +            subcmdret = _spawnl(_P_WAIT,
  1216. +                WIN32_CMDEXE_PATH, WIN32_CMDEXE_PATH, NULL);
  1217. +            break;
  1218. +        default:
  1219. +            assert(0);
  1220. +            break;
  1221. +    }
  1222. +
  1223. +    D((void)fprintf(stdout, "#mark winsg done, subcmdret=%d\n",
  1224. +        (int)subcmdret));
  1225. +
  1226. +done:
  1227. +    if (tok == INVALID_HANDLE_VALUE) {
  1228. +        (void)CloseHandle(tok);
  1229. +    }
  1230. +
  1231. +    return retval;
  1232. +}
  1233. --
  1234. 2.43.0
  1235.  
  1236. From 9b797e14a3d3ec1d92f0fe818e8e238e519a8c4c Mon Sep 17 00:00:00 2001
  1237. From: Roland Mainz <roland.mainz@nrubsig.org>
  1238. Date: Sat, 25 May 2024 12:55:39 +0200
  1239. Subject: [PATCH 4/7] daemon,tests: Buffers for SID values must be 16byte
  1240.  aligned on Win10/32bit
  1241.  
  1242. Buffers for SID values must be 16byte aligned on Win10/32bit
  1243.  
  1244. Reported-by: Cedric Blancher <cedric.blancher@gmail.com>
  1245. Signed-off-by: Cedric Blancher <cedric.blancher@gmail.com>
  1246. ---
  1247. daemon/sid.c        |  5 ++++-
  1248.  daemon/sid.h        | 17 +++++++++++++++++
  1249.  tests/winsg/winsg.c | 11 +++++++++--
  1250.  3 files changed, 30 insertions(+), 3 deletions(-)
  1251.  
  1252. diff --git a/daemon/sid.c b/daemon/sid.c
  1253. index bde099a..c0a04cc 100644
  1254. --- a/daemon/sid.c
  1255. +++ b/daemon/sid.c
  1256. @@ -229,7 +229,10 @@ typedef struct _sidcache_entry
  1257.      char    win32name[SIDCACHE_ENTRY_NAME_SIZE]; /* must fit something like "user@domain" */
  1258.      PSID    sid;
  1259.      DWORD   sid_len;
  1260. -    char    sid_buffer[SECURITY_MAX_SID_SIZE+1];
  1261. +#pragma warning( push )
  1262. +#pragma warning (disable : 4324)
  1263. +    DECLARE_SID_BUFFER(sid_buffer);
  1264. +#pragma warning( pop )
  1265.      time_t  timestamp;
  1266.  } sidcache_entry;
  1267.  
  1268. diff --git a/daemon/sid.h b/daemon/sid.h
  1269. index ab04294..d310d88 100644
  1270. --- a/daemon/sid.h
  1271. +++ b/daemon/sid.h
  1272. @@ -33,6 +33,23 @@ typedef struct _sidcache sidcache;
  1273.  extern sidcache user_sidcache;
  1274.  extern sidcache group_sidcache;
  1275.  
  1276. +/*
  1277. + * DECLARE_SID_BUFFER - declare a buffer for a SID value
  1278. + * Note that buffers with SID values must be 16byte aligned
  1279. + * on Windows 10/32bit, othewise the kernel might return
  1280. + * |ERROR_NOACCESS|(=998) - "Invalid access to memory location".
  1281. + */
  1282. +#ifdef _MSC_BUILD
  1283. +/* Visual Studio */
  1284. +#define DECLARE_SID_BUFFER(varname) \
  1285. +    __declspec(align(16)) char (varname)[SECURITY_MAX_SID_SIZE+1]
  1286. +#else
  1287. +/* clang */
  1288. +#define DECLARE_SID_BUFFER(varname) \
  1289. +    char (varname)[SECURITY_MAX_SID_SIZE+1] __attribute__((aligned(16)))
  1290. +#endif /* _MSC_BUILD */
  1291. +
  1292. +
  1293.  /* prototypes */
  1294.  int create_unknownsid(WELL_KNOWN_SID_TYPE type, PSID *sid, DWORD *sid_len);
  1295.  void sidcache_init(void);
  1296. diff --git a/tests/winsg/winsg.c b/tests/winsg/winsg.c
  1297. index 7f8fad4..8c8996a 100644
  1298. --- a/tests/winsg/winsg.c
  1299. +++ b/tests/winsg/winsg.c
  1300. @@ -60,11 +60,18 @@
  1301.  /*
  1302.   * DECLARE_SID_BUFFER - declare a buffer for a SID value
  1303.   * Note that buffers with SID values must be 16byte aligned
  1304. - * on Windows 32, othewise the kernel might return
  1305. - * |ERROR_NOACCESS|(=998) - "Invalid access to memory location.
  1306. + * on Windows 10/32bit, othewise the kernel might return
  1307. + * |ERROR_NOACCESS|(=998) - "Invalid access to memory location".
  1308.   */
  1309. +#ifdef _MSC_BUILD
  1310. +/* Visual Studio */
  1311. +#define DECLARE_SID_BUFFER(varname) \
  1312. +    __declspec(align(16)) char (varname)[SECURITY_MAX_SID_SIZE+1]
  1313. +#else
  1314. +/* clang */
  1315.  #define DECLARE_SID_BUFFER(varname) \
  1316.      char (varname)[SECURITY_MAX_SID_SIZE+1] __attribute__((aligned(16)))
  1317. +#endif /* _MSC_BUILD */
  1318.  
  1319.  /*
  1320.   * Performance hack:
  1321. --
  1322. 2.43.0
  1323.  
  1324. From 24acc2c6e5f4eba4e8253577d06db28477b6d7cd Mon Sep 17 00:00:00 2001
  1325. From: Roland Mainz <roland.mainz@nrubsig.org>
  1326. Date: Sat, 25 May 2024 13:19:04 +0200
  1327. Subject: [PATCH 5/7] daemon: Add |stpcpy()|
  1328.  
  1329. Add |stpcpy()| to daemon/utils.*
  1330.  
  1331. Signed-off-by: Cedric Blancher <cedric.blancher@gmail.com>
  1332. ---
  1333. daemon/open.c | 7 +++++--
  1334.  daemon/util.c | 6 ++++++
  1335.  daemon/util.h | 2 ++
  1336.  3 files changed, 13 insertions(+), 2 deletions(-)
  1337.  
  1338. diff --git a/daemon/open.c b/daemon/open.c
  1339. index 5012bbf..53c9425 100644
  1340. --- a/daemon/open.c
  1341. +++ b/daemon/open.c
  1342. @@ -959,14 +959,17 @@ supersede_retry:
  1343.               * chgrp on the new file
  1344.               */
  1345.              if (create == OPEN4_CREATE) {
  1346. +                char *s;
  1347. +
  1348.                  nfs41_file_info createchgrpattrs = { 0 };
  1349.                  createchgrpattrs.attrmask.count = 2;
  1350.                  createchgrpattrs.attrmask.arr[1] |= FATTR4_WORD1_OWNER_GROUP;
  1351.                  createchgrpattrs.owner_group = createchgrpattrs.owner_group_buf;
  1352.                  (void)get_token_primarygroup_name(GetCurrentThreadEffectiveToken(),
  1353.                      createchgrpattrs.owner_group);
  1354. -                (void)strcat(createchgrpattrs.owner_group, "@");
  1355. -                (void)strcat(createchgrpattrs.owner_group,  nfs41dg->localdomain_name);
  1356. +                s = createchgrpattrs.owner_group+strlen(createchgrpattrs.owner_group);
  1357. +                s = stpcpy(s, "@");
  1358. +                (void)stpcpy(s, nfs41dg->localdomain_name);
  1359.                  DPRINTF(1, ("handle_open(): create(), groupname='%s'\n", createchgrpattrs.owner_group));
  1360.  
  1361.                  stateid_arg stateid;
  1362. diff --git a/daemon/util.c b/daemon/util.c
  1363. index d38e65b..9106c07 100644
  1364. --- a/daemon/util.c
  1365. +++ b/daemon/util.c
  1366. @@ -33,6 +33,12 @@
  1367.  #include "nfs41_ops.h"
  1368.  
  1369.  
  1370. +char *stpcpy(char *restrict s1, const char *restrict s2)
  1371. +{
  1372. +    size_t l = strlen(s2);
  1373. +    return ((char *)memcpy(s1, s2, l+1)) + l;
  1374. +}
  1375. +
  1376.  int safe_read(unsigned char **pos, uint32_t *remaining, void *dest, uint32_t dest_len)
  1377.  {
  1378.      if (*remaining < dest_len)
  1379. diff --git a/daemon/util.h b/daemon/util.h
  1380. index 9c3a878..99e2dd9 100644
  1381. --- a/daemon/util.h
  1382. +++ b/daemon/util.h
  1383. @@ -45,6 +45,8 @@ enum stable_how4;
  1384.  #define PTR2PTRDIFF_T(p) ((ptrdiff_t)((char *)((void *)(p)) - ((char *)0)))
  1385.  #define PTRDIFF_T2PTR(d) ((void *)(((char *)0) + (d)))
  1386.  
  1387. +char *stpcpy(char *restrict s1, const char *restrict s2);
  1388. +
  1389.  int safe_read(unsigned char **pos, uint32_t *remaining, void *dest, uint32_t dest_len);
  1390.  int safe_write(unsigned char **pos, uint32_t *remaining, void *dest, uint32_t dest_len);
  1391.  int get_name(unsigned char **pos, uint32_t *remaining, const char **out_name);
  1392. --
  1393. 2.43.0
  1394.  
  1395. From 21f5a83366789d7cb1ac72fc1970924d153fc1c7 Mon Sep 17 00:00:00 2001
  1396. From: Roland Mainz <roland.mainz@nrubsig.org>
  1397. Date: Sat, 25 May 2024 13:45:18 +0200
  1398. Subject: [PATCH 6/7] daemon: Improve error handling for |setgid()|&co. support
  1399.  on |OPEN4_CREATE|
  1400.  
  1401. Improve error handling for |setgid()|/newgrp(1)/sg(1)/winsg(1)
  1402. support on |OPEN4_CREATE|.
  1403.  
  1404. Signed-off-by: Cedric Blancher <cedric.blancher@gmail.com>
  1405. ---
  1406. daemon/open.c | 33 ++++++++++++++++++++++++---------
  1407.  1 file changed, 24 insertions(+), 9 deletions(-)
  1408.  
  1409. diff --git a/daemon/open.c b/daemon/open.c
  1410. index 53c9425..ccfda2f 100644
  1411. --- a/daemon/open.c
  1412. +++ b/daemon/open.c
  1413. @@ -954,27 +954,42 @@ supersede_retry:
  1414.          } else {
  1415.  #ifdef NFS41_DRIVER_SETGID_NEWGRP_SUPPORT
  1416.              /*
  1417. -             * Hack: Support |setgid()|/newgrp(1) by fetching group
  1418. -             * name from auth token for new files and do a "manual"
  1419. -             * chgrp on the new file
  1420. +             * Hack: Support |setgid()|/newgrp(1)/sg(1)/winsg(1) by
  1421. +             * fetching groupname from auth token for new files and
  1422. +             * do a "manual" chgrp on the new file
  1423.               */
  1424.              if (create == OPEN4_CREATE) {
  1425.                  char *s;
  1426. -
  1427. +                int chgrp_status;
  1428. +                stateid_arg stateid;
  1429.                  nfs41_file_info createchgrpattrs = { 0 };
  1430. +
  1431.                  createchgrpattrs.attrmask.count = 2;
  1432.                  createchgrpattrs.attrmask.arr[1] |= FATTR4_WORD1_OWNER_GROUP;
  1433.                  createchgrpattrs.owner_group = createchgrpattrs.owner_group_buf;
  1434. -                (void)get_token_primarygroup_name(GetCurrentThreadEffectiveToken(),
  1435. -                    createchgrpattrs.owner_group);
  1436. +                /* fixme: we should store the |owner_group| name in |upcall| */
  1437. +                if (!get_token_primarygroup_name(upcall->currentthread_token,
  1438. +                    createchgrpattrs.owner_group)) {
  1439. +                    eprintf("handle_open(): OPEN4_CREATE: "
  1440. +                        "get_token_primarygroup_name() failed.\n");
  1441. +                    goto create_chgrp_out;
  1442. +                }
  1443.                  s = createchgrpattrs.owner_group+strlen(createchgrpattrs.owner_group);
  1444.                  s = stpcpy(s, "@");
  1445.                  (void)stpcpy(s, nfs41dg->localdomain_name);
  1446. -                DPRINTF(1, ("handle_open(): create(), groupname='%s'\n", createchgrpattrs.owner_group));
  1447. +                DPRINTF(1, ("handle_open(): OPEN4_CREATE: owner_group='%s'\n",
  1448. +                    createchgrpattrs.owner_group));
  1449.  
  1450. -                stateid_arg stateid;
  1451.                  nfs41_open_stateid_arg(state, &stateid);
  1452. -                (void)nfs41_setattr(state->session, &state->file, &stateid, &createchgrpattrs);
  1453. +                chgrp_status = nfs41_setattr(state->session,
  1454. +                    &state->file, &stateid, &createchgrpattrs);
  1455. +                if (chgrp_status) {
  1456. +                    eprintf("handle_open(): OPEN4_CREATE: "
  1457. +                        "nfs41_setattr(owner_group='%s') failed with error '%s'.\n",
  1458. +                        createchgrpattrs.owner_group, nfs_error_string(chgrp_status));
  1459. +                }
  1460. +create_chgrp_out:
  1461. +                ;
  1462.              }
  1463.  #endif /* NFS41_DRIVER_SETGID_NEWGRP_SUPPORT */
  1464.  
  1465. --
  1466. 2.43.0
  1467.  
  1468. From cfd1287626f39265be41fc93a6579c3d500cd4a9 Mon Sep 17 00:00:00 2001
  1469. From: Roland Mainz <roland.mainz@nrubsig.org>
  1470. Date: Sat, 25 May 2024 13:59:05 +0200
  1471. Subject: [PATCH 7/7] cygwin: tail -f '/var/log/ms-nfs41-client-service.log'
  1472.  should always work
  1473.  
  1474. tail -f '/var/log/ms-nfs41-client-service.log' should always work,
  1475. so $ /sbin/msnfs41client install #
  1476. should make sure to create a new+empty one if we move the old
  1477. one away.
  1478.  
  1479. Reported-by: Martin Wege <martin.l.wege@gmail.com>
  1480. Signed-off-by: Cedric Blancher <cedric.blancher@gmail.com>
  1481. ---
  1482. cygwin/devel/msnfs41client.bash | 9 +++++++++
  1483.  1 file changed, 9 insertions(+)
  1484.  
  1485. diff --git a/cygwin/devel/msnfs41client.bash b/cygwin/devel/msnfs41client.bash
  1486. index a0ea540..ffce9be 100644
  1487. --- a/cygwin/devel/msnfs41client.bash
  1488. +++ b/cygwin/devel/msnfs41client.bash
  1489. @@ -170,6 +170,15 @@ function nfsclient_install
  1490.                         "/var/log/ms-nfs41-client-service.log.old$(date +%Y%m%d_%Hh%Mm)"
  1491.         fi
  1492.  
  1493. +       #
  1494. +       # create new '/var/log/ms-nfs41-client-service.log'
  1495. +       # so users can do a $ tail -f
  1496. +       # '/var/log/ms-nfs41-client-service.log' at any time
  1497. +       #
  1498. +       touch '/var/log/ms-nfs41-client-service.log'
  1499. +       chown SYSTEM:SYSTEM '/var/log/ms-nfs41-client-service.log'
  1500. +       chmod u+w,go-w '/var/log/ms-nfs41-client-service.log'
  1501. +
  1502.         # install new 'ms-nfs41-client-service'
  1503.         cygrunsrv --install \
  1504.                 'ms-nfs41-client-service' \
  1505. --
  1506. 2.43.0

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}




All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at