/* Copyright © 1997, 1998, 1999, 2000, 2001 joost witteveen Copyright © 2002-2020 Clint Adams This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. This file contains the code (wrapper functions) that gets linked with the programes run from inside fakeroot. These programes then communicate with the fakeroot daemon, that keeps information about the "fake" ownerships etc. of the files etc. */ #ifdef __APPLE__ /* In this file, we want 'struct stat' to have a 32-bit 'ino_t'. We use 'struct stat64' when we need a 64-bit 'ino_t'. */ # include # if __DARWIN_ONLY_64_BIT_INO_T # define _DARWIN_USE_64_BIT_INODE # else # define _DARWIN_NO_64_BIT_INODE # endif #endif #include "communicate.h" #include #include #ifndef FAKEROOT_FAKENET # include # include # include #else /* FAKEROOT_FAKENET */ # include # include # include # include # ifdef HAVE_ENDIAN_H # include # endif #endif /* FAKEROOT_FAKENET */ #include #include #include #include #include #include #include #ifdef HAVE_SYS_SOCKET_H # include #endif #ifdef STUPID_ALPHA_HACK #include "stats.h" #endif #ifndef _UTSNAME_LENGTH /* for LINUX libc5 */ # define _UTSNAME_LENGTH _SYS_NMLN #endif #ifndef FAKEROOT_FAKENET int msg_snd=-1; int msg_get=-1; int sem_id=-1; #else /* FAKEROOT_FAKENET */ volatile int comm_sd = -1; static pthread_mutex_t comm_sd_mutex = PTHREAD_MUTEX_INITIALIZER; #endif /* FAKEROOT_FAKENET */ #ifdef FAKEROOT_FAKENET static void fail(const char *msg) { if (errno > 0) fprintf(stderr, "libfakeroot: %s: %s\n", msg, strerror(errno)); else fprintf(stderr, "libfakeroot: %s\n", msg); exit(1); } #endif /* FAKEROOT_FAKENET */ const char *env_var_set(const char *env){ const char *s; s=getenv(env); if(s && *s) return s; else return NULL; } void cpyfakemstat(struct fake_msg *f, const struct stat *st #ifdef STUPID_ALPHA_HACK , int ver #endif ){ #ifndef STUPID_ALPHA_HACK f->st.mode =st->st_mode; f->st.ino =st->st_ino ; f->st.uid =st->st_uid ; f->st.gid =st->st_gid ; f->st.dev =st->st_dev ; f->st.rdev =st->st_rdev; /* DO copy the nlink count. Although the system knows this one better, we need it for unlink(). This actually opens up a race condition, if another command makes a hardlink on a file, while we try to unlink it. This may cause the record to be deleted, while the link continues to live on the disk. But the chance is small, and unlikely to occur in practical fakeroot conditions. */ f->st.nlink=st->st_nlink; #else switch(ver) { case _STAT_VER_KERNEL: f->st.mode = ((struct fakeroot_kernel_stat *)st)->st_mode; f->st.ino = ((struct fakeroot_kernel_stat *)st)->st_ino; f->st.uid = ((struct fakeroot_kernel_stat *)st)->st_uid; f->st.gid = ((struct fakeroot_kernel_stat *)st)->st_gid; f->st.dev = ((struct fakeroot_kernel_stat *)st)->st_dev; f->st.rdev = ((struct fakeroot_kernel_stat *)st)->st_rdev; f->st.nlink = ((struct fakeroot_kernel_stat *)st)->st_nlink; break; case _STAT_VER_GLIBC2: f->st.mode = ((struct fakeroot_glibc2_stat *)st)->st_mode; f->st.ino = ((struct fakeroot_glibc2_stat *)st)->st_ino; f->st.uid = ((struct fakeroot_glibc2_stat *)st)->st_uid; f->st.gid = ((struct fakeroot_glibc2_stat *)st)->st_gid; f->st.dev = ((struct fakeroot_glibc2_stat *)st)->st_dev; f->st.rdev = ((struct fakeroot_glibc2_stat *)st)->st_rdev; f->st.nlink = ((struct fakeroot_glibc2_stat *)st)->st_nlink; break; case _STAT_VER_GLIBC2_1: f->st.mode = ((struct fakeroot_glibc21_stat *)st)->st_mode; f->st.ino = ((struct fakeroot_glibc21_stat *)st)->st_ino; f->st.uid = ((struct fakeroot_glibc21_stat *)st)->st_uid; f->st.gid = ((struct fakeroot_glibc21_stat *)st)->st_gid; f->st.dev = ((struct fakeroot_glibc21_stat *)st)->st_dev; f->st.rdev = ((struct fakeroot_glibc21_stat *)st)->st_rdev; f->st.nlink = ((struct fakeroot_glibc21_stat *)st)->st_nlink; break; default: f->st.mode = st->st_mode; f->st.ino = st->st_ino; f->st.uid = st->st_uid; f->st.gid = st->st_gid; f->st.dev = st->st_dev; f->st.rdev = st->st_rdev; f->st.nlink = st->st_nlink; break; } #endif } void cpystatfakem(struct stat *st, const struct fake_msg *f #ifdef STUPID_ALPHA_HACK , int ver #endif ){ #ifndef STUPID_ALPHA_HACK st->st_mode =f->st.mode; st->st_ino =f->st.ino ; st->st_uid =f->st.uid ; st->st_gid =f->st.gid ; st->st_dev =f->st.dev ; st->st_rdev =f->st.rdev; /* DON'T copy the nlink count! The system always knows this one better! */ /* st->st_nlink=f->st.nlink;*/ #else switch(ver) { case _STAT_VER_KERNEL: ((struct fakeroot_kernel_stat *)st)->st_mode = f->st.mode; ((struct fakeroot_kernel_stat *)st)->st_ino = f->st.ino; ((struct fakeroot_kernel_stat *)st)->st_uid = f->st.uid; ((struct fakeroot_kernel_stat *)st)->st_gid = f->st.gid; ((struct fakeroot_kernel_stat *)st)->st_dev = f->st.dev; ((struct fakeroot_kernel_stat *)st)->st_rdev = f->st.rdev; break; case _STAT_VER_GLIBC2: ((struct fakeroot_glibc2_stat *)st)->st_mode = f->st.mode; ((struct fakeroot_glibc2_stat *)st)->st_ino = f->st.ino; ((struct fakeroot_glibc2_stat *)st)->st_uid = f->st.uid; ((struct fakeroot_glibc2_stat *)st)->st_gid = f->st.gid; ((struct fakeroot_glibc2_stat *)st)->st_dev = f->st.dev; ((struct fakeroot_glibc2_stat *)st)->st_rdev = f->st.rdev; break; case _STAT_VER_GLIBC2_1: ((struct fakeroot_glibc21_stat *)st)->st_mode = f->st.mode; ((struct fakeroot_glibc21_stat *)st)->st_ino = f->st.ino; ((struct fakeroot_glibc21_stat *)st)->st_uid = f->st.uid; ((struct fakeroot_glibc21_stat *)st)->st_gid = f->st.gid; ((struct fakeroot_glibc21_stat *)st)->st_dev = f->st.dev; ((struct fakeroot_glibc21_stat *)st)->st_rdev = f->st.rdev; break; default: st->st_mode =f->st.mode; st->st_ino =f->st.ino ; st->st_uid =f->st.uid ; st->st_gid =f->st.gid ; st->st_dev =f->st.dev ; st->st_rdev =f->st.rdev; break; } #endif } #ifdef STAT64_SUPPORT void cpyfakemstat64(struct fake_msg *f, const struct stat64 *st #ifdef STUPID_ALPHA_HACK , int ver #endif ){ #ifndef STUPID_ALPHA_HACK f->st.mode =st->st_mode; f->st.ino =st->st_ino ; f->st.uid =st->st_uid ; f->st.gid =st->st_gid ; f->st.dev =st->st_dev ; f->st.rdev =st->st_rdev; /* DO copy the nlink count. Although the system knows this one better, we need it for unlink(). This actually opens up a race condition, if another command makes a hardlink on a file, while we try to unlink it. This may cause the record to be deleted, while the link continues to live on the disk. But the chance is small, and unlikely to occur in practical fakeroot conditions. */ f->st.nlink=st->st_nlink; #else switch(ver) { case _STAT_VER_KERNEL: f->st.mode = ((struct fakeroot_kernel_stat *)st)->st_mode; f->st.ino = ((struct fakeroot_kernel_stat *)st)->st_ino; f->st.uid = ((struct fakeroot_kernel_stat *)st)->st_uid; f->st.gid = ((struct fakeroot_kernel_stat *)st)->st_gid; f->st.dev = ((struct fakeroot_kernel_stat *)st)->st_dev; f->st.rdev = ((struct fakeroot_kernel_stat *)st)->st_rdev; f->st.nlink = ((struct fakeroot_kernel_stat *)st)->st_nlink; break; case _STAT_VER_GLIBC2: f->st.mode = ((struct fakeroot_glibc2_stat *)st)->st_mode; f->st.ino = ((struct fakeroot_glibc2_stat *)st)->st_ino; f->st.uid = ((struct fakeroot_glibc2_stat *)st)->st_uid; f->st.gid = ((struct fakeroot_glibc2_stat *)st)->st_gid; f->st.dev = ((struct fakeroot_glibc2_stat *)st)->st_dev; f->st.rdev = ((struct fakeroot_glibc2_stat *)st)->st_rdev; f->st.nlink = ((struct fakeroot_glibc2_stat *)st)->st_nlink; break; case _STAT_VER_GLIBC2_1: f->st.mode = ((struct fakeroot_glibc21_stat *)st)->st_mode; f->st.ino = ((struct fakeroot_glibc21_stat *)st)->st_ino; f->st.uid = ((struct fakeroot_glibc21_stat *)st)->st_uid; f->st.gid = ((struct fakeroot_glibc21_stat *)st)->st_gid; f->st.dev = ((struct fakeroot_glibc21_stat *)st)->st_dev; f->st.rdev = ((struct fakeroot_glibc21_stat *)st)->st_rdev; f->st.nlink = ((struct fakeroot_glibc21_stat *)st)->st_nlink; break; default: f->st.mode = st->st_mode; f->st.ino = st->st_ino; f->st.uid = st->st_uid; f->st.gid = st->st_gid; f->st.dev = st->st_dev; f->st.rdev = st->st_rdev; f->st.nlink = st->st_nlink; break; } #endif } void cpystat64fakem(struct stat64 *st, const struct fake_msg *f #ifdef STUPID_ALPHA_HACK , int ver #endif ){ #ifndef STUPID_ALPHA_HACK st->st_mode =f->st.mode; st->st_ino =f->st.ino ; st->st_uid =f->st.uid ; st->st_gid =f->st.gid ; st->st_dev =f->st.dev ; st->st_rdev =f->st.rdev; /* DON'T copy the nlink count! The system always knows this one better! */ /* st->st_nlink=f->st.nlink;*/ #else switch(ver) { case _STAT_VER_KERNEL: ((struct fakeroot_kernel_stat *)st)->st_mode = f->st.mode; ((struct fakeroot_kernel_stat *)st)->st_ino = f->st.ino; ((struct fakeroot_kernel_stat *)st)->st_uid = f->st.uid; ((struct fakeroot_kernel_stat *)st)->st_gid = f->st.gid; ((struct fakeroot_kernel_stat *)st)->st_dev = f->st.dev; ((struct fakeroot_kernel_stat *)st)->st_rdev = f->st.rdev; break; case _STAT_VER_GLIBC2: ((struct fakeroot_glibc2_stat *)st)->st_mode = f->st.mode; ((struct fakeroot_glibc2_stat *)st)->st_ino = f->st.ino; ((struct fakeroot_glibc2_stat *)st)->st_uid = f->st.uid; ((struct fakeroot_glibc2_stat *)st)->st_gid = f->st.gid; ((struct fakeroot_glibc2_stat *)st)->st_dev = f->st.dev; ((struct fakeroot_glibc2_stat *)st)->st_rdev = f->st.rdev; break; case _STAT_VER_GLIBC2_1: ((struct fakeroot_glibc21_stat *)st)->st_mode = f->st.mode; ((struct fakeroot_glibc21_stat *)st)->st_ino = f->st.ino; ((struct fakeroot_glibc21_stat *)st)->st_uid = f->st.uid; ((struct fakeroot_glibc21_stat *)st)->st_gid = f->st.gid; ((struct fakeroot_glibc21_stat *)st)->st_dev = f->st.dev; ((struct fakeroot_glibc21_stat *)st)->st_rdev = f->st.rdev; break; default: st->st_mode =f->st.mode; st->st_ino =f->st.ino ; st->st_uid =f->st.uid ; st->st_gid =f->st.gid ; st->st_dev =f->st.dev ; st->st_rdev =f->st.rdev; break; } #endif } #endif /* STAT64_SUPPORT */ void cpyfakefake(struct fakestat *dest, const struct fakestat *source){ dest->mode =source->mode; dest->ino =source->ino ; dest->uid =source->uid ; dest->gid =source->gid ; dest->dev =source->dev ; dest->rdev =source->rdev; /* DON'T copy the nlink count! The system always knows this one better! */ /* dest->nlink=source->nlink;*/ } #ifdef _LARGEFILE_SOURCE void stat64from32(struct stat64 *s64, const struct stat *s32) { /* I've added st_size and st_blocks here. Don't know why they were missing -- joost*/ s64->st_dev = s32->st_dev; s64->st_ino = s32->st_ino; s64->st_mode = s32->st_mode; s64->st_nlink = s32->st_nlink; s64->st_uid = s32->st_uid; s64->st_gid = s32->st_gid; s64->st_rdev = s32->st_rdev; s64->st_size = s32->st_size; s64->st_blksize = s32->st_blksize; s64->st_blocks = s32->st_blocks; s64->st_atime = s32->st_atime; s64->st_mtime = s32->st_mtime; s64->st_ctime = s32->st_ctime; } /* This assumes that the 64 bit structure is actually filled in and does not down case the sizes from the 32 bit one.. */ void stat32from64(struct stat *s32, const struct stat64 *s64) { s32->st_dev = s64->st_dev; s32->st_ino = s64->st_ino; s32->st_mode = s64->st_mode; s32->st_nlink = s64->st_nlink; s32->st_uid = s64->st_uid; s32->st_gid = s64->st_gid; s32->st_rdev = s64->st_rdev; s32->st_size = (long)s64->st_size; s32->st_blksize = s64->st_blksize; s32->st_blocks = (long)s64->st_blocks; s32->st_atime = s64->st_atime; s32->st_mtime = s64->st_mtime; s32->st_ctime = s64->st_ctime; } #endif #ifndef FAKEROOT_FAKENET void semaphore_up(){ struct sembuf op; if(sem_id==-1) sem_id=semget(get_ipc_key(0)+2,1,IPC_CREAT|0600); op.sem_num=0; op.sem_op=-1; op.sem_flg=SEM_UNDO; init_get_msg(); while (1) { if (semop(sem_id,&op,1)) { if (errno != EINTR) { perror("semop(1): encountered an error"); exit(1); } } else { break; } } } void semaphore_down(){ struct sembuf op; if(sem_id==-1) sem_id=semget(get_ipc_key(0)+2,1,IPC_CREAT|0600); op.sem_num=0; op.sem_op=1; op.sem_flg=SEM_UNDO; while (1) { if (semop(sem_id,&op,1)) { if (errno != EINTR) { perror("semop(2): encountered an error"); exit(1); } } else { break; } } } #else /* FAKEROOT_FAKENET */ #ifndef SOL_TCP # define SOL_TCP 6 /* this should probably be done with getprotoent */ #endif static struct sockaddr *get_addr(void) { static struct sockaddr_in addr = { 0, 0, { 0 } }; if (!addr.sin_port) { char *str; int port; str = (char *) env_var_set(FAKEROOTKEY_ENV); if (!str) { errno = 0; fail("FAKEROOTKEY not defined in environment"); } port = atoi(str); if (port <= 0 || port >= 65536) { errno = 0; fail("invalid port number in FAKEROOTKEY"); } addr.sin_family = AF_INET; addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); addr.sin_port = htons(port); } return (struct sockaddr *) &addr; } static void open_comm_sd(void) { if (comm_sd >= 0) return; comm_sd = socket(PF_INET, SOCK_STREAM, 0); if (comm_sd < 0) fail("socket"); if (fcntl(comm_sd, F_SETFD, FD_CLOEXEC) < 0) fail("fcntl(F_SETFD, FD_CLOEXEC)"); int val = 1; if (setsockopt(comm_sd, SOL_TCP, TCP_NODELAY, &val, sizeof (val)) < 0) fail("setsockopt(TCP_NODELAY)"); while (1) { if (connect(comm_sd, get_addr(), sizeof (struct sockaddr_in)) < 0) { if (errno != EINTR) fail("connect"); } else break; } } void lock_comm_sd(void) { pthread_mutex_lock(&comm_sd_mutex); } void unlock_comm_sd(void) { pthread_mutex_unlock(&comm_sd_mutex); } #endif /* FAKEROOT_FAKENET */ #ifndef FAKEROOT_FAKENET void send_fakem(const struct fake_msg *buf) { int r; struct fake_msg_buf fm = { 0 }; if(init_get_msg()!=-1){ memcpy(&fm.msg, buf, sizeof(*buf)); fm.mtype=1; #if __BYTE_ORDER == __BIG_ENDIAN ((struct fake_msg*)&fm.msg)->magic=FAKEROOT_MAGIC_BE; #elif __BYTE_ORDER == __LITTLE_ENDIAN ((struct fake_msg*)&fm.msg)->magic=FAKEROOT_MAGIC_LE; #endif do r=msgsnd(msg_snd, &fm, sizeof(fm)-sizeof(fm.mtype), 0); while((r==-1) && (errno==EINTR)); if(r==-1) perror("libfakeroot, when sending message"); } } void send_get_fakem(struct fake_msg *buf) { /* send and get a struct fakestat from the daemon. We have to use serial/pid numbers in addidtion to the semaphore locking, to prevent the following: Client 1 locks and sends a stat() request to deamon. meantime, client 2 tries to up the semaphore too, but blocks. While client 1 is waiting, it recieves a KILL signal, and dies. SysV semaphores can eighter be automatically cleaned up when a client dies, or they can stay in place. We have to use the cleanup version, as otherwise client 2 will block forever. So, the semaphore is cleaned up when client 1 recieves the KILL signal. Now, client 1 falls through the semaphore_up, and sends a stat() request to the daemon -- it will now recieve the answer intended for client 1, and hell breaks lose (yes, this has actually happened, and yes, it was hell (to debug)). I realise that I may well do away with the semaphore stuff, if I put the serial/pid numbers in the mtype field. But I cannot store both PID and serial in mtype (just 32 bits on Linux). So there will always be some (small) chance it will go wrong. */ struct fake_msg_buf fm = { 0 }; uint32_t k = 0; uint32_t magic_candidate = 0; int l; pid_t pid; uint8_t* ptr = NULL; static int serial=0; if(init_get_msg()!=-1){ pid=getpid(); semaphore_up(); serial++; buf->serial=serial; buf->pid=pid; send_fakem(buf); do { l=msgrcv(msg_get, &fm, sizeof(fm)-sizeof(fm.mtype),0,0); ptr = (uint8_t *)&fm; for (k=0; k<16; k++) { magic_candidate = *(uint32_t*)&ptr[k]; if (magic_candidate == FAKEROOT_MAGIC_LE || magic_candidate == FAKEROOT_MAGIC_BE) { memcpy(buf, &ptr[k], sizeof(*buf)); break; } } if (k == 16) { fprintf(stderr, "libfakeroot internal error: payload not recognized!\n"); continue; } /* Use swapX here instead of ntoh/hton that do nothing on big-endian machines */ #if __BYTE_ORDER == __LITTLE_ENDIAN if (magic_candidate == FAKEROOT_MAGIC_BE) { #elif __BYTE_ORDER == __BIG_ENDIAN if (magic_candidate == FAKEROOT_MAGIC_LE) { #endif buf->id = bswapl(buf->id); buf->pid = bswapl(buf->pid); buf->serial = bswapl(buf->serial); buf->st.uid = bswapl(buf->st.uid); buf->st.gid = bswapl(buf->st.gid); buf->st.ino = bswapll(buf->st.ino); buf->st.dev = bswapll(buf->st.dev); buf->st.rdev = bswapll(buf->st.rdev); buf->st.mode = bswapl(buf->st.mode); buf->st.nlink = bswapl(buf->st.nlink); buf->remote = bswapl(0); buf->xattr.buffersize = bswapl(buf->xattr.buffersize); buf->xattr.flags_rc = bswapl(buf->xattr.flags_rc); } }while(((l==-1)&&(errno==EINTR))||(buf->serial!=serial)||buf->pid!=pid); if(l==-1){ buf->xattr.flags_rc=errno; fprintf(stderr,"fakeroot internal error #%d: %s\n", errno, strerror(errno)); } semaphore_down(); /* (nah, may be wrong, due to allignment) if(l!=sizeof(*buf)-sizeof(buf->mtype)) printf("libfakeroot/fakeroot, internal bug!! get_fake: length=%i != l=%i", sizeof(*buf)-sizeof(buf->mtype),l); */ } } #else /* FAKEROOT_FAKENET */ static size_t write_all(int fd,const void*buf,size_t count) { ssize_t rc,remaining=count; while(remaining>0) { rc= write(fd, buf+(count-remaining), remaining); if(rc<=0) { if(remaining==count) return rc; else fail("partial write"); } else { remaining-=rc; } } return count-remaining; } static size_t read_all(int fd,void *buf,size_t count) { ssize_t rc,remaining=count; while(remaining>0) { rc = read(fd,buf+(count-remaining),remaining); if(rc<=0) { if(remaining==count) return rc; else fail("partial read"); } else { remaining-=rc; } } return count-remaining; } static void send_fakem_nr(const struct fake_msg *buf) { struct fake_msg fm; fm.id = htonl(buf->id); fm.st.uid = htonl(buf->st.uid); fm.st.gid = htonl(buf->st.gid); fm.st.ino = htonll(buf->st.ino); fm.st.dev = htonll(buf->st.dev); fm.st.rdev = htonll(buf->st.rdev); fm.st.mode = htonl(buf->st.mode); fm.st.nlink = htonl(buf->st.nlink); fm.remote = htonl(0); fm.xattr.buffersize = htonl(buf->xattr.buffersize); fm.xattr.flags_rc = htonl(buf->xattr.flags_rc); memcpy(fm.xattr.buf, buf->xattr.buf, MAX_IPC_BUFFER_SIZE); while (1) { ssize_t len; len = write_all(comm_sd, &fm, sizeof (fm)); if (len > 0) break; if (len == 0) { errno = 0; fail("write: socket is closed"); } if (errno == EINTR) continue; fail("write"); } } void send_fakem(const struct fake_msg *buf) { lock_comm_sd(); open_comm_sd(); send_fakem_nr(buf); unlock_comm_sd(); } static void get_fakem_nr(struct fake_msg *buf) { while (1) { ssize_t len; len = read_all(comm_sd, buf, sizeof (struct fake_msg)); if (len > 0) break; if (len == 0) { errno = 0; fail("read: socket is closed"); } if (errno == EINTR) continue; fail("read"); } buf->id = ntohl(buf->id); buf->st.uid = ntohl(buf->st.uid); buf->st.gid = ntohl(buf->st.gid); buf->st.ino = ntohll(buf->st.ino); buf->st.dev = ntohll(buf->st.dev); buf->st.rdev = ntohll(buf->st.rdev); buf->st.mode = ntohl(buf->st.mode); buf->st.nlink = ntohl(buf->st.nlink); buf->remote = ntohl(buf->remote); buf->xattr.buffersize = ntohl(buf->xattr.buffersize); buf->xattr.flags_rc = ntohl(buf->xattr.flags_rc); } void send_get_fakem(struct fake_msg *buf) { lock_comm_sd(); open_comm_sd(); send_fakem_nr(buf); get_fakem_nr(buf); unlock_comm_sd(); } #endif /* FAKEROOT_FAKENET */ void send_stat(const struct stat *st, func_id_t f #ifdef STUPID_ALPHA_HACK , int ver #endif ){ struct fake_msg buf; #ifndef FAKEROOT_FAKENET if(init_get_msg()!=-1) #endif /* ! FAKEROOT_FAKENET */ { #ifndef STUPID_ALPHA_HACK cpyfakemstat(&buf,st); #else cpyfakemstat(&buf,st,ver); #endif buf.id=f; send_fakem(&buf); } } #ifdef STAT64_SUPPORT void send_stat64(const struct stat64 *st, func_id_t f #ifdef STUPID_ALPHA_HACK , int ver #endif ){ struct fake_msg buf; #ifndef FAKEROOT_FAKENET if(init_get_msg()!=-1) #endif /* ! FAKEROOT_FAKENET */ { #ifndef STUPID_ALPHA_HACK cpyfakemstat64(&buf,st); #else cpyfakemstat64(&buf,st,ver); #endif buf.id=f; send_fakem(&buf); } } #endif /* STAT64_SUPPORT */ void send_get_stat(struct stat *st #ifdef STUPID_ALPHA_HACK , int ver #endif ){ struct fake_msg buf; #ifndef FAKEROOT_FAKENET if(init_get_msg()!=-1) #endif /* ! FAKEROOT_FAKENET */ { #ifndef STUPID_ALPHA_HACK cpyfakemstat(&buf,st); #else cpyfakemstat(&buf,st,ver); #endif buf.id=stat_func; send_get_fakem(&buf); #ifndef STUPID_ALPHA_HACK cpystatfakem(st,&buf); #else cpystatfakem(st,&buf,ver); #endif } } void send_get_xattr(struct stat *st , xattr_args *xattr #ifdef STUPID_ALPHA_HACK , int ver #endif ){ struct fake_msg buf; size_t in_size; size_t name_size; size_t total_size; #ifndef FAKEROOT_FAKENET if(init_get_msg()!=-1) #endif /* ! FAKEROOT_FAKENET */ { #ifndef STUPID_ALPHA_HACK cpyfakemstat(&buf,st); #else cpyfakemstat(&buf,st,ver); #endif in_size = xattr->size; total_size = (xattr->func == setxattr_func) ? (in_size) : 0; if (xattr->name) { name_size = strlen(xattr->name); total_size += name_size + 1; } if (total_size > MAX_IPC_BUFFER_SIZE) { xattr->rc = ERANGE; return; } if (xattr->name) { strcpy(buf.xattr.buf, xattr->name); if (xattr->func == setxattr_func) memcpy(&buf.xattr.buf[name_size + 1], xattr->value, in_size); } buf.xattr.buffersize = total_size; buf.xattr.flags_rc = xattr->flags; buf.id=xattr->func; send_get_fakem(&buf); xattr->rc = buf.xattr.flags_rc; xattr->size = buf.xattr.buffersize; if (buf.xattr.buffersize) { if (!in_size) { /* Special case. Return size of required buffer */ return; } if (xattr->size > in_size) { xattr->rc = ERANGE; return; } memcpy(xattr->value, buf.xattr.buf, xattr->size); } } } #ifdef STAT64_SUPPORT void send_get_stat64(struct stat64 *st #ifdef STUPID_ALPHA_HACK , int ver #endif ) { struct fake_msg buf; #ifndef FAKEROOT_FAKENET if(init_get_msg()!=-1) #endif /* ! FAKEROOT_FAKENET */ { #ifndef STUPID_ALPHA_HACK cpyfakemstat64(&buf,st); #else cpyfakemstat64(&buf,st,ver); #endif buf.id=stat_func; send_get_fakem(&buf); #ifndef STUPID_ALPHA_HACK cpystat64fakem(st,&buf); #else cpystat64fakem(st,&buf,ver); #endif } } void send_get_xattr64(struct stat64 *st , xattr_args *xattr #ifdef STUPID_ALPHA_HACK , int ver #endif ){ struct fake_msg buf; size_t in_size; size_t name_size; size_t total_size; #ifndef FAKEROOT_FAKENET if(init_get_msg()!=-1) #endif /* ! FAKEROOT_FAKENET */ { #ifndef STUPID_ALPHA_HACK cpyfakemstat64(&buf,st); #else cpyfakemstat64(&buf,st,ver); #endif in_size = xattr->size; total_size = (xattr->func == setxattr_func) ? (in_size) : 0; if (xattr->name) { name_size = strlen(xattr->name); total_size += name_size + 1; } if (total_size > MAX_IPC_BUFFER_SIZE) { xattr->rc = ERANGE; return; } if (xattr->name) { strcpy(buf.xattr.buf, xattr->name); if (xattr->func == setxattr_func) memcpy(&buf.xattr.buf[name_size + 1], xattr->value, in_size); } buf.xattr.buffersize = total_size; buf.xattr.flags_rc = xattr->flags; buf.id=xattr->func; send_get_fakem(&buf); xattr->rc = buf.xattr.flags_rc; xattr->size = buf.xattr.buffersize; if (buf.xattr.buffersize) { if (!in_size) { /* Special case. Return size of required buffer */ return; } if (xattr->size > in_size) { xattr->rc = ERANGE; return; } memcpy(xattr->value, buf.xattr.buf, xattr->size); } } } #endif /* STAT64_SUPPORT */ #ifndef FAKEROOT_FAKENET key_t get_ipc_key(key_t new_key) { const char *s; static key_t key=-1; if(key==-1){ if(new_key!=0) key=new_key; else if((s=env_var_set(FAKEROOTKEY_ENV))) key=atoi(s); else key=0; }; return key; } int init_get_msg(){ /* a msgget call generates a fstat() call. As fstat() is wrapped, that call will in turn call semaphore_up(). So, before the semaphores are setup, we should make sure we already have the msg_get and msg_set id. This is why semaphore_up() calls this function.*/ static int done=0; key_t key; if((!done)&&(msg_get==-1)){ key=get_ipc_key(0); if(key){ msg_snd=msgget(get_ipc_key(0),IPC_CREAT|00600); msg_get=msgget(get_ipc_key(0)+1,IPC_CREAT|00600); } else{ msg_get=-1; msg_snd=-1; } done=1; } return msg_snd; } /* fake_get_owner() allows a process which has not set LD_PRELOAD to query the fake ownership etc. of files. That process needs to know the key in use by faked - faked prints this at startup. */ int fake_get_owner(int is_lstat, const char *key, const char *path, uid_t *uid, gid_t *gid, mode_t *mode){ struct stat st; int i; if (!key || !strlen(key)) return 0; /* Do the stat or lstat */ i = (is_lstat ? lstat(path, &st) : stat(path, &st)); if (i < 0) return i; /* Now pass it to faked */ get_ipc_key(atoi(key)); #ifndef STUPID_ALPHA_HACK send_get_stat(&st); #else send_get_stat(&st, _STAT_VER); #endif /* Return the values inside the pointers */ if (uid) *uid = st.st_uid; if (gid) *gid = st.st_gid; if (mode) *mode = st.st_mode; return 0; } #endif /* ! FAKEROOT_FAKENET */