bd1ecf5379
Running the tests we have lots of these: Openat: O_NOFOLLOW missing: flags = 0x4 -wpanic turns this warning into a panic: Openat: O_NOFOLLOW missing: flags = 0x4 panic: -wpanic turns this warning into a panic: Openat: O_NOFOLLOW missing: flags = 0x4 goroutine 114 [running]: log.(*Logger).Panic(0x14000118280, {0x14000313ca8, 0x1, 0x1}) log/log.go:224 +0x90 github.com/rfjakob/gocryptfs/v2/internal/tlog.(*toggledLogger).Printf(0x14000076780, {0x1009dc2e8, 0x27}, {0x14000313d18, 0x1, 0x1}) github.com/rfjakob/gocryptfs/v2/internal/tlog/log.go:78 +0x168 github.com/rfjakob/gocryptfs/v2/internal/syscallcompat.Openat(0x9, {0x1009d0747, 0x1}, 0x4, 0x0) github.com/rfjakob/gocryptfs/v2/internal/syscallcompat/sys_common.go:59 +0xf0 github.com/rfjakob/gocryptfs/v2/internal/fusefrontend.(*Node).getXAttr(0x14000142000, {0x1400001c140, 0x3a}) github.com/rfjakob/gocryptfs/v2/internal/fusefrontend/node_xattr_darwin.go:30 +0x8c github.com/rfjakob/gocryptfs/v2/internal/fusefrontend.(*Node).Getxattr(0x14000142000, {0x100a7eba0, 0x1400000c2e8}, {0x14000016348, 0x14}, {0x14000326000, 0x20, 0x4000}) github.com/rfjakob/gocryptfs/v2/internal/fusefrontend/node_xattr.go:65 +0x1ac github.com/hanwen/go-fuse/v2/fs.(*rawBridge).GetXAttr(0x1400008e140, 0x140001901e0, 0x140001133c0, {0x14000016348, 0x14}, {0x14000326000, 0x20, 0x4000}) github.com/hanwen/go-fuse/v2@v2.1.1-0.20210825171523-3ab5d95a30ae/fs/bridge.go:685 +0x114 github.com/hanwen/go-fuse/v2/fuse.doGetXAttr(0x14000144000, 0x14000113200) github.com/hanwen/go-fuse/v2@v2.1.1-0.20210825171523-3ab5d95a30ae/fuse/opcode.go:270 +0x224 github.com/hanwen/go-fuse/v2/fuse.(*Server).handleRequest(0x14000144000, 0x14000113200) github.com/hanwen/go-fuse/v2@v2.1.1-0.20210825171523-3ab5d95a30ae/fuse/server.go:499 +0x214 created by github.com/hanwen/go-fuse/v2/fuse.(*Server).loop github.com/hanwen/go-fuse/v2@v2.1.1-0.20210825171523-3ab5d95a30ae/fuse/server.go:470 +0xac https://github.com/rfjakob/gocryptfs/issues/625
231 lines
6.3 KiB
Go
231 lines
6.3 KiB
Go
package syscallcompat
|
|
|
|
import (
|
|
"log"
|
|
"path/filepath"
|
|
"runtime"
|
|
"syscall"
|
|
"time"
|
|
"unsafe"
|
|
|
|
"golang.org/x/sys/unix"
|
|
|
|
"github.com/hanwen/go-fuse/v2/fuse"
|
|
)
|
|
|
|
const (
|
|
// O_DIRECT means uncached I/O on Linux. No direct equivalent on MacOS and defined
|
|
// to zero there.
|
|
O_DIRECT = 0
|
|
|
|
// O_PATH is only defined on Linux
|
|
O_PATH = 0
|
|
|
|
// RENAME_NOREPLACE is only defined on Linux
|
|
RENAME_NOREPLACE = 0
|
|
|
|
// KAUTH_UID_NONE and KAUTH_GID_NONE are special values to
|
|
// revert permissions to the process credentials.
|
|
KAUTH_UID_NONE = ^uint32(0) - 100
|
|
KAUTH_GID_NONE = ^uint32(0) - 100
|
|
)
|
|
|
|
// Unfortunately pthread_setugid_np does not have a syscall wrapper yet.
|
|
func pthread_setugid_np(uid uint32, gid uint32) (err error) {
|
|
_, _, e1 := syscall.RawSyscall(syscall.SYS_SETTID, uintptr(uid), uintptr(gid), 0)
|
|
if e1 != 0 {
|
|
err = e1
|
|
}
|
|
return
|
|
}
|
|
|
|
// Unfortunately fsetattrlist does not have a syscall wrapper yet.
|
|
func fsetattrlist(fd int, list unsafe.Pointer, buf unsafe.Pointer, size uintptr, options int) (err error) {
|
|
_, _, e1 := syscall.Syscall6(syscall.SYS_FSETATTRLIST, uintptr(fd), uintptr(list), uintptr(buf), uintptr(size), uintptr(options), 0)
|
|
if e1 != 0 {
|
|
err = e1
|
|
}
|
|
return
|
|
}
|
|
|
|
// Setattrlist already has a syscall wrapper, but it is not exported.
|
|
func setattrlist(path *byte, list unsafe.Pointer, buf unsafe.Pointer, size uintptr, options int) (err error) {
|
|
_, _, e1 := syscall.Syscall6(syscall.SYS_SETATTRLIST, uintptr(unsafe.Pointer(path)), uintptr(list), uintptr(buf), uintptr(size), uintptr(options), 0)
|
|
if e1 != 0 {
|
|
err = e1
|
|
}
|
|
return
|
|
}
|
|
|
|
// Sorry, fallocate is not available on OSX at all and
|
|
// fcntl F_PREALLOCATE is not accessible from Go.
|
|
// See https://github.com/rfjakob/gocryptfs/issues/18 if you want to help.
|
|
func EnospcPrealloc(fd int, off int64, len int64) error {
|
|
return nil
|
|
}
|
|
|
|
// See above.
|
|
func Fallocate(fd int, mode uint32, off int64, len int64) error {
|
|
return syscall.EOPNOTSUPP
|
|
}
|
|
|
|
// Dup3 is not available on Darwin, so we use Dup2 instead.
|
|
func Dup3(oldfd int, newfd int, flags int) (err error) {
|
|
if flags != 0 {
|
|
log.Panic("darwin does not support dup3 flags")
|
|
}
|
|
return syscall.Dup2(oldfd, newfd)
|
|
}
|
|
|
|
////////////////////////////////////////////////////////
|
|
//// Emulated Syscalls (see emulate.go) ////////////////
|
|
////////////////////////////////////////////////////////
|
|
|
|
func OpenatUser(dirfd int, path string, flags int, mode uint32, context *fuse.Context) (fd int, err error) {
|
|
if context != nil {
|
|
runtime.LockOSThread()
|
|
defer runtime.UnlockOSThread()
|
|
|
|
err = pthread_setugid_np(context.Owner.Uid, context.Owner.Gid)
|
|
if err != nil {
|
|
return -1, err
|
|
}
|
|
defer pthread_setugid_np(KAUTH_UID_NONE, KAUTH_GID_NONE)
|
|
}
|
|
|
|
return Openat(dirfd, path, flags, mode)
|
|
}
|
|
|
|
func Mknodat(dirfd int, path string, mode uint32, dev int) (err error) {
|
|
return emulateMknodat(dirfd, path, mode, dev)
|
|
}
|
|
|
|
func MknodatUser(dirfd int, path string, mode uint32, dev int, context *fuse.Context) (err error) {
|
|
if context != nil {
|
|
runtime.LockOSThread()
|
|
defer runtime.UnlockOSThread()
|
|
|
|
err = pthread_setugid_np(context.Owner.Uid, context.Owner.Gid)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer pthread_setugid_np(KAUTH_UID_NONE, KAUTH_GID_NONE)
|
|
}
|
|
|
|
return Mknodat(dirfd, path, mode, dev)
|
|
}
|
|
|
|
func FchmodatNofollow(dirfd int, path string, mode uint32) (err error) {
|
|
return unix.Fchmodat(dirfd, path, mode, unix.AT_SYMLINK_NOFOLLOW)
|
|
}
|
|
|
|
func SymlinkatUser(oldpath string, newdirfd int, newpath string, context *fuse.Context) (err error) {
|
|
if context != nil {
|
|
runtime.LockOSThread()
|
|
defer runtime.UnlockOSThread()
|
|
|
|
err = pthread_setugid_np(context.Owner.Uid, context.Owner.Gid)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer pthread_setugid_np(KAUTH_UID_NONE, KAUTH_GID_NONE)
|
|
}
|
|
|
|
return unix.Symlinkat(oldpath, newdirfd, newpath)
|
|
}
|
|
|
|
func MkdiratUser(dirfd int, path string, mode uint32, context *fuse.Context) (err error) {
|
|
if context != nil {
|
|
runtime.LockOSThread()
|
|
defer runtime.UnlockOSThread()
|
|
|
|
err = pthread_setugid_np(context.Owner.Uid, context.Owner.Gid)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer pthread_setugid_np(KAUTH_UID_NONE, KAUTH_GID_NONE)
|
|
}
|
|
|
|
return unix.Mkdirat(dirfd, path, mode)
|
|
}
|
|
|
|
type attrList struct {
|
|
bitmapCount uint16
|
|
_ uint16
|
|
CommonAttr uint32
|
|
VolAttr uint32
|
|
DirAttr uint32
|
|
FileAttr uint32
|
|
Forkattr uint32
|
|
}
|
|
|
|
func timesToAttrList(a *time.Time, m *time.Time) (attrList attrList, attributes [2]unix.Timespec) {
|
|
attrList.bitmapCount = unix.ATTR_BIT_MAP_COUNT
|
|
attrList.CommonAttr = 0
|
|
i := 0
|
|
if m != nil {
|
|
attributes[i] = unix.Timespec(fuse.UtimeToTimespec(m))
|
|
attrList.CommonAttr |= unix.ATTR_CMN_MODTIME
|
|
i += 1
|
|
}
|
|
if a != nil {
|
|
attributes[i] = unix.Timespec(fuse.UtimeToTimespec(a))
|
|
attrList.CommonAttr |= unix.ATTR_CMN_ACCTIME
|
|
i += 1
|
|
}
|
|
return attrList, attributes
|
|
}
|
|
|
|
// FutimesNano syscall.
|
|
func FutimesNano(fd int, a *time.Time, m *time.Time) (err error) {
|
|
attrList, attributes := timesToAttrList(a, m)
|
|
return fsetattrlist(fd, unsafe.Pointer(&attrList), unsafe.Pointer(&attributes),
|
|
unsafe.Sizeof(attributes), 0)
|
|
}
|
|
|
|
// UtimesNanoAtNofollow is like UtimesNanoAt but never follows symlinks.
|
|
//
|
|
// Unfortunately we cannot use unix.UtimesNanoAt since it is broken and just
|
|
// ignores the provided 'dirfd'. In addition, it also lacks handling of 'nil'
|
|
// pointers (used to preserve one of both timestamps).
|
|
func UtimesNanoAtNofollow(dirfd int, path string, a *time.Time, m *time.Time) (err error) {
|
|
if !filepath.IsAbs(path) {
|
|
chdirMutex.Lock()
|
|
defer chdirMutex.Unlock()
|
|
var cwd int
|
|
cwd, err = syscall.Open(".", syscall.O_RDONLY, 0)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer syscall.Close(cwd)
|
|
err = syscall.Fchdir(dirfd)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer syscall.Fchdir(cwd)
|
|
}
|
|
|
|
_p0, err := syscall.BytePtrFromString(path)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
attrList, attributes := timesToAttrList(a, m)
|
|
return setattrlist(_p0, unsafe.Pointer(&attrList), unsafe.Pointer(&attributes),
|
|
unsafe.Sizeof(attributes), unix.FSOPT_NOFOLLOW)
|
|
}
|
|
|
|
func Getdents(fd int) ([]fuse.DirEntry, error) {
|
|
entries, _, err := emulateGetdents(fd)
|
|
return entries, err
|
|
}
|
|
|
|
func GetdentsSpecial(fd int) (entries []fuse.DirEntry, entriesSpecial []fuse.DirEntry, err error) {
|
|
return emulateGetdents(fd)
|
|
}
|
|
|
|
// Renameat2 does not exist on Darwin, so we call Renameat and ignore the flags.
|
|
func Renameat2(olddirfd int, oldpath string, newdirfd int, newpath string, flags uint) (err error) {
|
|
return unix.Renameat(olddirfd, oldpath, newdirfd, newpath)
|
|
}
|