1998-02-27 07:54:42 +03:00
|
|
|
/* Various utilities - Unix variants
|
2007-09-25 19:33:35 +04:00
|
|
|
Copyright (C) 1994, 1995, 1996, 1998, 1999, 2000, 2001, 2002, 2003,
|
|
|
|
2004, 2005, 2007 Free Software Foundation, Inc.
|
1998-02-27 07:54:42 +03:00
|
|
|
Written 1994, 1995, 1996 by:
|
|
|
|
Miguel de Icaza, Janne Kukonlehto, Dugan Porter,
|
|
|
|
Jakub Jelinek, Mauricio Plaza.
|
|
|
|
|
2005-01-13 22:37:46 +03:00
|
|
|
The mc_realpath routine is mostly from uClibc package, written
|
|
|
|
by Rick Sladkey <jrs@world.std.com>
|
|
|
|
|
1998-02-27 07:54:42 +03:00
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
|
|
(at your option) any later version.
|
2010-04-30 17:31:06 +04:00
|
|
|
|
1998-02-27 07:54:42 +03:00
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program; if not, write to the Free Software
|
2005-05-27 07:35:10 +04:00
|
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. */
|
1998-02-27 07:54:42 +03:00
|
|
|
|
2009-02-05 21:28:18 +03:00
|
|
|
/** \file utilunix.c
|
|
|
|
* \brief Source: various utilities - Unix variant
|
|
|
|
*/
|
|
|
|
|
1998-02-27 07:54:42 +03:00
|
|
|
#include <config.h>
|
2005-02-08 12:04:03 +03:00
|
|
|
|
|
|
|
#include <ctype.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <limits.h>
|
|
|
|
#include <signal.h>
|
|
|
|
#include <stdarg.h>
|
1998-02-27 07:54:42 +03:00
|
|
|
#include <stdio.h>
|
2005-02-08 12:04:03 +03:00
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
2009-02-06 02:30:45 +03:00
|
|
|
#include <fcntl.h>
|
2005-02-08 12:04:03 +03:00
|
|
|
#include <sys/param.h>
|
1998-02-27 07:54:42 +03:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
2009-02-27 14:54:26 +03:00
|
|
|
#include <sys/wait.h>
|
2001-09-11 06:18:02 +04:00
|
|
|
#ifdef HAVE_SYS_IOCTL_H
|
2001-09-07 21:52:19 +04:00
|
|
|
# include <sys/ioctl.h>
|
1998-02-27 07:54:42 +03:00
|
|
|
#endif
|
2005-02-08 12:04:03 +03:00
|
|
|
#include <unistd.h>
|
2009-02-06 02:30:45 +03:00
|
|
|
#include <pwd.h>
|
|
|
|
#include <grp.h>
|
2001-09-03 09:07:40 +04:00
|
|
|
|
2010-01-20 18:11:52 +03:00
|
|
|
#include "lib/global.h"
|
2010-09-10 11:27:21 +04:00
|
|
|
#include "lib/vfs/mc-vfs/vfs.h" /* VFS_ENCODING_PREFIX */
|
|
|
|
|
2010-01-21 13:47:01 +03:00
|
|
|
#include "src/execute.h"
|
2010-04-30 17:31:06 +04:00
|
|
|
#include "src/wtools.h" /* message() */
|
1998-02-27 07:54:42 +03:00
|
|
|
|
|
|
|
struct sigaction startup_handler;
|
|
|
|
|
|
|
|
#define UID_CACHE_SIZE 200
|
|
|
|
#define GID_CACHE_SIZE 30
|
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
typedef struct
|
|
|
|
{
|
|
|
|
int index;
|
1998-02-27 07:54:42 +03:00
|
|
|
char *string;
|
|
|
|
} int_cache;
|
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
static int_cache uid_cache[UID_CACHE_SIZE];
|
|
|
|
static int_cache gid_cache[GID_CACHE_SIZE];
|
1998-02-27 07:54:42 +03:00
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
static char *
|
|
|
|
i_cache_match (int id, int_cache * cache, int size)
|
1998-02-27 07:54:42 +03:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < size; i++)
|
2010-04-30 17:31:06 +04:00
|
|
|
if (cache[i].index == id)
|
|
|
|
return cache[i].string;
|
1998-02-27 07:54:42 +03:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
static void
|
|
|
|
i_cache_add (int id, int_cache * cache, int size, char *text, int *last)
|
1998-02-27 07:54:42 +03:00
|
|
|
{
|
2010-04-30 17:31:06 +04:00
|
|
|
g_free (cache[*last].string);
|
|
|
|
cache[*last].string = g_strdup (text);
|
|
|
|
cache[*last].index = id;
|
|
|
|
*last = ((*last) + 1) % size;
|
1998-02-27 07:54:42 +03:00
|
|
|
}
|
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
char *
|
|
|
|
get_owner (int uid)
|
1998-02-27 07:54:42 +03:00
|
|
|
{
|
|
|
|
struct passwd *pwd;
|
2010-04-30 17:31:06 +04:00
|
|
|
static char ibuf[10];
|
|
|
|
char *name;
|
1998-04-17 04:21:53 +04:00
|
|
|
static int uid_last;
|
2010-04-30 17:31:06 +04:00
|
|
|
|
2010-03-30 22:59:41 +04:00
|
|
|
name = i_cache_match (uid, uid_cache, UID_CACHE_SIZE);
|
|
|
|
if (name != NULL)
|
2010-04-30 17:31:06 +04:00
|
|
|
return name;
|
|
|
|
|
1998-02-27 07:54:42 +03:00
|
|
|
pwd = getpwuid (uid);
|
2010-03-30 22:59:41 +04:00
|
|
|
if (pwd != NULL)
|
2010-04-30 17:31:06 +04:00
|
|
|
{
|
|
|
|
i_cache_add (uid, uid_cache, UID_CACHE_SIZE, pwd->pw_name, &uid_last);
|
|
|
|
return pwd->pw_name;
|
1998-02-27 07:54:42 +03:00
|
|
|
}
|
2010-04-30 17:31:06 +04:00
|
|
|
else
|
|
|
|
{
|
|
|
|
g_snprintf (ibuf, sizeof (ibuf), "%d", uid);
|
|
|
|
return ibuf;
|
1998-02-27 07:54:42 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
char *
|
|
|
|
get_group (int gid)
|
1998-02-27 07:54:42 +03:00
|
|
|
{
|
|
|
|
struct group *grp;
|
2010-04-30 17:31:06 +04:00
|
|
|
static char gbuf[10];
|
1998-02-27 07:54:42 +03:00
|
|
|
char *name;
|
2010-04-30 17:31:06 +04:00
|
|
|
static int gid_last;
|
|
|
|
|
2010-03-30 22:59:41 +04:00
|
|
|
name = i_cache_match (gid, gid_cache, GID_CACHE_SIZE);
|
|
|
|
if (name != NULL)
|
2010-04-30 17:31:06 +04:00
|
|
|
return name;
|
|
|
|
|
1998-02-27 07:54:42 +03:00
|
|
|
grp = getgrgid (gid);
|
2010-03-30 22:59:41 +04:00
|
|
|
if (grp != NULL)
|
2010-04-30 17:31:06 +04:00
|
|
|
{
|
|
|
|
i_cache_add (gid, gid_cache, GID_CACHE_SIZE, grp->gr_name, &gid_last);
|
|
|
|
return grp->gr_name;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
g_snprintf (gbuf, sizeof (gbuf), "%d", gid);
|
|
|
|
return gbuf;
|
1998-02-27 07:54:42 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Since ncurses uses a handler that automatically refreshes the */
|
|
|
|
/* screen after a SIGCONT, and we don't want this behavior when */
|
|
|
|
/* spawning a child, we save the original handler here */
|
2010-04-30 17:31:06 +04:00
|
|
|
void
|
|
|
|
save_stop_handler (void)
|
1998-02-27 07:54:42 +03:00
|
|
|
{
|
|
|
|
sigaction (SIGTSTP, NULL, &startup_handler);
|
|
|
|
}
|
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
int
|
|
|
|
my_system (int flags, const char *shell, const char *command)
|
1998-02-27 07:54:42 +03:00
|
|
|
{
|
|
|
|
struct sigaction ignore, save_intr, save_quit, save_stop;
|
|
|
|
pid_t pid;
|
|
|
|
int status = 0;
|
2010-04-30 17:31:06 +04:00
|
|
|
|
1998-02-27 07:54:42 +03:00
|
|
|
ignore.sa_handler = SIG_IGN;
|
|
|
|
sigemptyset (&ignore.sa_mask);
|
|
|
|
ignore.sa_flags = 0;
|
2010-04-30 17:31:06 +04:00
|
|
|
|
|
|
|
sigaction (SIGINT, &ignore, &save_intr);
|
1998-02-27 07:54:42 +03:00
|
|
|
sigaction (SIGQUIT, &ignore, &save_quit);
|
|
|
|
|
|
|
|
/* Restore the original SIGTSTP handler, we don't want ncurses' */
|
|
|
|
/* handler messing the screen after the SIGCONT */
|
|
|
|
sigaction (SIGTSTP, &startup_handler, &save_stop);
|
|
|
|
|
2010-03-30 22:59:41 +04:00
|
|
|
pid = fork ();
|
|
|
|
if (pid < 0)
|
2010-04-30 17:31:06 +04:00
|
|
|
{
|
|
|
|
fprintf (stderr, "\n\nfork () = -1\n");
|
2010-04-17 23:16:36 +04:00
|
|
|
status = -1;
|
2010-04-30 17:31:06 +04:00
|
|
|
}
|
2010-04-17 23:16:36 +04:00
|
|
|
else if (pid == 0)
|
2010-04-30 17:31:06 +04:00
|
|
|
{
|
|
|
|
signal (SIGINT, SIG_DFL);
|
|
|
|
signal (SIGQUIT, SIG_DFL);
|
|
|
|
signal (SIGTSTP, SIG_DFL);
|
|
|
|
signal (SIGCHLD, SIG_DFL);
|
|
|
|
|
|
|
|
if (flags & EXECUTE_AS_SHELL)
|
|
|
|
execl (shell, shell, "-c", command, (char *) NULL);
|
|
|
|
else
|
|
|
|
{
|
|
|
|
gchar **shell_tokens;
|
|
|
|
const gchar *only_cmd;
|
|
|
|
|
2010-03-30 22:59:41 +04:00
|
|
|
shell_tokens = g_strsplit (shell, " ", 2);
|
2010-04-30 17:31:06 +04:00
|
|
|
if (shell_tokens == NULL)
|
|
|
|
only_cmd = shell;
|
|
|
|
else
|
2010-03-30 22:59:41 +04:00
|
|
|
only_cmd = (*shell_tokens != NULL) ? *shell_tokens : shell;
|
2010-04-30 17:31:06 +04:00
|
|
|
|
|
|
|
execlp (only_cmd, shell, command, (char *) NULL);
|
|
|
|
|
|
|
|
/*
|
|
|
|
execlp will replace current process,
|
|
|
|
therefore no sence in call of g_strfreev().
|
|
|
|
But this keeped for estetic reason :)
|
|
|
|
*/
|
|
|
|
g_strfreev (shell_tokens);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
_exit (127); /* Exec error */
|
1998-02-27 07:54:42 +03:00
|
|
|
}
|
2010-04-30 17:31:06 +04:00
|
|
|
else
|
|
|
|
{
|
2010-04-17 23:16:36 +04:00
|
|
|
while (TRUE)
|
|
|
|
{
|
|
|
|
if (waitpid (pid, &status, 0) > 0)
|
|
|
|
{
|
|
|
|
status = WEXITSTATUS(status);
|
|
|
|
break;
|
|
|
|
}
|
2010-04-30 17:31:06 +04:00
|
|
|
if (errno != EINTR)
|
|
|
|
{
|
|
|
|
status = -1;
|
|
|
|
break;
|
|
|
|
}
|
2010-04-17 23:16:36 +04:00
|
|
|
}
|
1998-02-27 07:54:42 +03:00
|
|
|
}
|
2010-04-30 17:31:06 +04:00
|
|
|
sigaction (SIGINT, &save_intr, NULL);
|
1998-02-27 07:54:42 +03:00
|
|
|
sigaction (SIGQUIT, &save_quit, NULL);
|
|
|
|
sigaction (SIGTSTP, &save_stop, NULL);
|
|
|
|
|
2010-04-17 23:16:36 +04:00
|
|
|
return status;
|
1998-02-27 07:54:42 +03:00
|
|
|
}
|
|
|
|
|
2003-11-27 12:45:22 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Perform tilde expansion if possible.
|
|
|
|
* Always return a newly allocated string, even if it's unchanged.
|
|
|
|
*/
|
|
|
|
char *
|
|
|
|
tilde_expand (const char *directory)
|
1998-02-27 07:54:42 +03:00
|
|
|
{
|
|
|
|
struct passwd *passwd;
|
2003-11-28 18:23:19 +03:00
|
|
|
const char *p, *q;
|
1998-02-27 07:54:42 +03:00
|
|
|
char *name;
|
2003-11-27 12:45:22 +03:00
|
|
|
|
1998-02-27 07:54:42 +03:00
|
|
|
if (*directory != '~')
|
2010-04-30 17:31:06 +04:00
|
|
|
return g_strdup (directory);
|
1998-02-27 07:54:42 +03:00
|
|
|
|
2003-11-28 18:23:19 +03:00
|
|
|
p = directory + 1;
|
2003-11-27 12:45:22 +03:00
|
|
|
|
1998-02-27 07:54:42 +03:00
|
|
|
/* d = "~" or d = "~/" */
|
2010-04-30 17:31:06 +04:00
|
|
|
if (!(*p) || (*p == PATH_SEP))
|
|
|
|
{
|
|
|
|
passwd = getpwuid (geteuid ());
|
|
|
|
q = (*p == PATH_SEP) ? p + 1 : "";
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
q = strchr (p, PATH_SEP);
|
|
|
|
if (!q)
|
|
|
|
{
|
|
|
|
passwd = getpwnam (p);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
name = g_strndup (p, q - p);
|
|
|
|
passwd = getpwnam (name);
|
|
|
|
q++;
|
|
|
|
g_free (name);
|
|
|
|
}
|
1998-02-27 07:54:42 +03:00
|
|
|
}
|
|
|
|
|
2003-11-27 12:45:22 +03:00
|
|
|
/* If we can't figure the user name, leave tilde unexpanded */
|
1998-02-27 07:54:42 +03:00
|
|
|
if (!passwd)
|
2010-04-30 17:31:06 +04:00
|
|
|
return g_strdup (directory);
|
1998-02-27 07:54:42 +03:00
|
|
|
|
2004-09-24 19:05:28 +04:00
|
|
|
return g_strconcat (passwd->pw_dir, PATH_SEP_STR, q, (char *) NULL);
|
1998-02-27 07:54:42 +03:00
|
|
|
}
|
|
|
|
|
2002-09-11 08:58:24 +04:00
|
|
|
/*
|
|
|
|
* Return the directory where mc should keep its temporary files.
|
2004-08-19 00:34:01 +04:00
|
|
|
* This directory is (in Bourne shell terms) "${TMPDIR=/tmp}/mc-$USER"
|
2002-09-11 08:58:24 +04:00
|
|
|
* When called the first time, the directory is created if needed.
|
|
|
|
* The first call should be done early, since we are using fprintf()
|
|
|
|
* and not message() to report possible problems.
|
|
|
|
*/
|
|
|
|
const char *
|
|
|
|
mc_tmpdir (void)
|
|
|
|
{
|
2002-12-26 17:47:46 +03:00
|
|
|
static char buffer[64];
|
|
|
|
static const char *tmpdir;
|
2002-09-11 08:58:24 +04:00
|
|
|
const char *sys_tmp;
|
|
|
|
struct passwd *pwd;
|
2002-12-26 17:47:46 +03:00
|
|
|
struct stat st;
|
|
|
|
const char *error = NULL;
|
2002-09-11 08:58:24 +04:00
|
|
|
|
2005-07-27 19:03:24 +04:00
|
|
|
/* Check if already correctly initialized */
|
|
|
|
if (tmpdir && lstat (tmpdir, &st) == 0 && S_ISDIR (st.st_mode) &&
|
2010-04-30 17:31:06 +04:00
|
|
|
st.st_uid == getuid () && (st.st_mode & 0777) == 0700)
|
|
|
|
return tmpdir;
|
2002-09-11 08:58:24 +04:00
|
|
|
|
|
|
|
sys_tmp = getenv ("TMPDIR");
|
2010-04-30 17:31:06 +04:00
|
|
|
if (!sys_tmp || sys_tmp[0] != '/')
|
|
|
|
{
|
|
|
|
sys_tmp = TMPDIR_DEFAULT;
|
2002-09-11 08:58:24 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
pwd = getpwuid (getuid ());
|
2004-08-17 22:45:47 +04:00
|
|
|
|
|
|
|
if (pwd)
|
2010-04-30 17:31:06 +04:00
|
|
|
g_snprintf (buffer, sizeof (buffer), "%s/mc-%s", sys_tmp, pwd->pw_name);
|
2004-08-17 22:45:47 +04:00
|
|
|
else
|
2010-04-30 17:31:06 +04:00
|
|
|
g_snprintf (buffer, sizeof (buffer), "%s/mc-%lu", sys_tmp, (unsigned long) getuid ());
|
2004-08-17 22:45:47 +04:00
|
|
|
|
2002-12-26 17:47:46 +03:00
|
|
|
canonicalize_pathname (buffer);
|
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
if (lstat (buffer, &st) == 0)
|
|
|
|
{
|
|
|
|
/* Sanity check for existing directory */
|
|
|
|
if (!S_ISDIR (st.st_mode))
|
|
|
|
error = _("%s is not a directory\n");
|
|
|
|
else if (st.st_uid != getuid ())
|
|
|
|
error = _("Directory %s is not owned by you\n");
|
|
|
|
else if (((st.st_mode & 0777) != 0700) && (chmod (buffer, 0700) != 0))
|
|
|
|
error = _("Cannot set correct permissions for directory %s\n");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Need to create directory */
|
|
|
|
if (mkdir (buffer, S_IRWXU) != 0)
|
|
|
|
{
|
|
|
|
fprintf (stderr,
|
|
|
|
_("Cannot create temporary directory %s: %s\n"),
|
|
|
|
buffer, unix_error_string (errno));
|
|
|
|
error = "";
|
|
|
|
}
|
2002-09-11 08:58:24 +04:00
|
|
|
}
|
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
if (error != NULL)
|
|
|
|
{
|
|
|
|
int test_fd;
|
|
|
|
char *test_fn, *fallback_prefix;
|
|
|
|
int fallback_ok = 0;
|
|
|
|
|
|
|
|
if (*error)
|
|
|
|
fprintf (stderr, error, buffer);
|
|
|
|
|
|
|
|
/* Test if sys_tmp is suitable for temporary files */
|
|
|
|
fallback_prefix = g_strdup_printf ("%s/mctest", sys_tmp);
|
|
|
|
test_fd = mc_mkstemps (&test_fn, fallback_prefix, NULL);
|
|
|
|
g_free (fallback_prefix);
|
|
|
|
if (test_fd != -1)
|
|
|
|
{
|
|
|
|
close (test_fd);
|
|
|
|
test_fd = open (test_fn, O_RDONLY);
|
|
|
|
if (test_fd != -1)
|
|
|
|
{
|
|
|
|
close (test_fd);
|
|
|
|
unlink (test_fn);
|
|
|
|
fallback_ok = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fallback_ok)
|
|
|
|
{
|
|
|
|
fprintf (stderr, _("Temporary files will be created in %s\n"), sys_tmp);
|
|
|
|
g_snprintf (buffer, sizeof (buffer), "%s", sys_tmp);
|
|
|
|
error = NULL;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
fprintf (stderr, _("Temporary files will not be created\n"));
|
|
|
|
g_snprintf (buffer, sizeof (buffer), "%s", "/dev/null/");
|
|
|
|
}
|
|
|
|
|
|
|
|
fprintf (stderr, "%s\n", _("Press any key to continue..."));
|
|
|
|
getc (stdin);
|
2002-12-26 17:47:46 +03:00
|
|
|
}
|
|
|
|
|
2007-01-02 18:55:01 +03:00
|
|
|
tmpdir = buffer;
|
|
|
|
|
2004-08-19 00:34:01 +04:00
|
|
|
if (!error)
|
2010-04-30 17:31:06 +04:00
|
|
|
g_setenv ("MC_TMPDIR", tmpdir, TRUE);
|
2004-08-19 00:34:01 +04:00
|
|
|
|
2002-09-11 08:58:24 +04:00
|
|
|
return tmpdir;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
1998-02-27 07:54:42 +03:00
|
|
|
/* Pipes are guaranteed to be able to hold at least 4096 bytes */
|
|
|
|
/* More than that would be unportable */
|
|
|
|
#define MAX_PIPE_SIZE 4096
|
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
static int error_pipe[2]; /* File descriptors of error pipe */
|
|
|
|
static int old_error; /* File descriptor of old standard error */
|
1998-02-27 07:54:42 +03:00
|
|
|
|
|
|
|
/* Creates a pipe to hold standard error for a later analysis. */
|
|
|
|
/* The pipe can hold 4096 bytes. Make sure no more is written */
|
|
|
|
/* or a deadlock might occur. */
|
2010-04-30 17:31:06 +04:00
|
|
|
void
|
|
|
|
open_error_pipe (void)
|
1998-02-27 07:54:42 +03:00
|
|
|
{
|
2010-04-30 17:31:06 +04:00
|
|
|
if (pipe (error_pipe) < 0)
|
|
|
|
{
|
2010-05-15 18:45:13 +04:00
|
|
|
message (D_NORMAL, _("Warning"), _("Pipe failed"));
|
1998-02-27 07:54:42 +03:00
|
|
|
}
|
|
|
|
old_error = dup (2);
|
2010-04-30 17:31:06 +04:00
|
|
|
if (old_error < 0 || close (2) || dup (error_pipe[1]) != 2)
|
|
|
|
{
|
2010-05-15 18:45:13 +04:00
|
|
|
message (D_NORMAL, _("Warning"), _("Dup failed"));
|
2009-06-20 17:29:44 +04:00
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
close (error_pipe[0]);
|
|
|
|
error_pipe[0] = -1;
|
1998-02-27 07:54:42 +03:00
|
|
|
}
|
2009-06-26 14:24:10 +04:00
|
|
|
else
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Settng stderr in nonblocking mode as we close it earlier, than
|
|
|
|
* program stops. We try to read some error at program startup,
|
|
|
|
* but we should not block on it.
|
|
|
|
*
|
|
|
|
* TODO: make piped stdin/stderr poll()/select()able to get rid
|
|
|
|
* of following hack.
|
|
|
|
*/
|
|
|
|
int fd_flags;
|
|
|
|
fd_flags = fcntl (error_pipe[0], F_GETFL, NULL);
|
|
|
|
if (fd_flags != -1)
|
|
|
|
{
|
|
|
|
fd_flags |= O_NONBLOCK;
|
2010-04-30 17:31:06 +04:00
|
|
|
if (fcntl (error_pipe[0], F_SETFL, fd_flags) == -1)
|
2009-06-26 14:24:10 +04:00
|
|
|
{
|
|
|
|
/* TODO: handle it somehow */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2009-06-20 17:29:44 +04:00
|
|
|
/* we never write there */
|
1998-02-27 07:54:42 +03:00
|
|
|
close (error_pipe[1]);
|
2009-06-20 17:29:44 +04:00
|
|
|
error_pipe[1] = -1;
|
1998-02-27 07:54:42 +03:00
|
|
|
}
|
|
|
|
|
1999-03-18 21:43:52 +03:00
|
|
|
/*
|
|
|
|
* Returns true if an error was displayed
|
2002-08-24 21:25:27 +04:00
|
|
|
* error: -1 - ignore errors, 0 - display warning, 1 - display error
|
|
|
|
* text is prepended to the error message from the pipe
|
1999-03-18 21:43:52 +03:00
|
|
|
*/
|
|
|
|
int
|
2004-08-30 03:20:01 +04:00
|
|
|
close_error_pipe (int error, const char *text)
|
1998-02-27 07:54:42 +03:00
|
|
|
{
|
2004-09-19 19:55:58 +04:00
|
|
|
const char *title;
|
1998-02-27 07:54:42 +03:00
|
|
|
char msg[MAX_PIPE_SIZE];
|
|
|
|
int len = 0;
|
|
|
|
|
2009-06-20 17:29:44 +04:00
|
|
|
/* already closed */
|
|
|
|
if (error_pipe[0] == -1)
|
2010-04-30 17:31:06 +04:00
|
|
|
return 0;
|
2009-06-20 17:29:44 +04:00
|
|
|
|
1998-02-27 07:54:42 +03:00
|
|
|
if (error)
|
2010-04-30 17:31:06 +04:00
|
|
|
title = MSG_ERROR;
|
1998-02-27 07:54:42 +03:00
|
|
|
else
|
2010-04-30 17:31:06 +04:00
|
|
|
title = _("Warning");
|
|
|
|
if (old_error >= 0)
|
|
|
|
{
|
2010-05-05 22:52:27 +04:00
|
|
|
if (dup2 (old_error, 2) == -1)
|
2010-04-30 17:31:06 +04:00
|
|
|
{
|
2010-05-15 18:45:13 +04:00
|
|
|
message (error, MSG_ERROR, _("Error dup'ing old error pipe"));
|
2010-04-30 17:31:06 +04:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
close (old_error);
|
|
|
|
len = read (error_pipe[0], msg, MAX_PIPE_SIZE - 1);
|
|
|
|
|
|
|
|
if (len >= 0)
|
|
|
|
msg[len] = 0;
|
|
|
|
close (error_pipe[0]);
|
|
|
|
error_pipe[0] = -1;
|
1998-02-27 07:54:42 +03:00
|
|
|
}
|
|
|
|
if (error < 0)
|
2010-04-30 17:31:06 +04:00
|
|
|
return 0; /* Just ignore error message */
|
|
|
|
if (text == NULL)
|
|
|
|
{
|
|
|
|
if (len <= 0)
|
|
|
|
return 0; /* Nothing to show */
|
|
|
|
|
|
|
|
/* Show message from pipe */
|
|
|
|
message (error, title, "%s", msg);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Show given text and possible message from pipe */
|
2010-05-15 18:45:13 +04:00
|
|
|
message (error, title, "%s\n%s", text, msg);
|
1998-02-27 07:54:42 +03:00
|
|
|
}
|
1999-03-18 21:43:52 +03:00
|
|
|
return 1;
|
1998-02-27 07:54:42 +03:00
|
|
|
}
|
|
|
|
|
2004-01-24 03:17:34 +03:00
|
|
|
/*
|
|
|
|
* Canonicalize path, and return a new path. Do everything in place.
|
|
|
|
* The new path differs from path in:
|
2010-04-30 17:31:06 +04:00
|
|
|
* Multiple `/'s are collapsed to a single `/'.
|
|
|
|
* Leading `./'s and trailing `/.'s are removed.
|
|
|
|
* Trailing `/'s are removed.
|
|
|
|
* Non-leading `../'s and trailing `..'s are handled by removing
|
|
|
|
* portions of the path.
|
2004-01-24 03:17:34 +03:00
|
|
|
* Well formed UNC paths are modified only in the local part.
|
|
|
|
*/
|
2004-01-24 02:53:37 +03:00
|
|
|
void
|
2009-11-23 11:45:46 +03:00
|
|
|
custom_canonicalize_pathname (char *path, CANON_PATH_FLAGS flags)
|
1998-02-27 07:54:42 +03:00
|
|
|
{
|
2003-03-10 09:52:57 +03:00
|
|
|
char *p, *s;
|
|
|
|
int len;
|
2010-04-30 17:31:06 +04:00
|
|
|
char *lpath = path; /* path without leading UNC part */
|
2004-01-24 03:17:34 +03:00
|
|
|
|
|
|
|
/* Detect and preserve UNC paths: //server/... */
|
2010-04-30 17:31:06 +04:00
|
|
|
if ((flags & CANON_PATH_GUARDUNC) && path[0] == PATH_SEP && path[1] == PATH_SEP)
|
|
|
|
{
|
|
|
|
p = path + 2;
|
|
|
|
while (p[0] && p[0] != '/')
|
|
|
|
p++;
|
|
|
|
if (p[0] == '/' && p > path + 2)
|
|
|
|
lpath = p;
|
2004-01-24 03:17:34 +03:00
|
|
|
}
|
1998-02-27 07:54:42 +03:00
|
|
|
|
2004-01-24 03:17:34 +03:00
|
|
|
if (!lpath[0] || !lpath[1])
|
2010-04-30 17:31:06 +04:00
|
|
|
return;
|
|
|
|
|
|
|
|
if (flags & CANON_PATH_JOINSLASHES)
|
|
|
|
{
|
|
|
|
/* Collapse multiple slashes */
|
|
|
|
p = lpath;
|
|
|
|
while (*p)
|
|
|
|
{
|
|
|
|
if (p[0] == PATH_SEP && p[1] == PATH_SEP)
|
|
|
|
{
|
|
|
|
s = p + 1;
|
|
|
|
while (*(++s) == PATH_SEP);
|
|
|
|
str_move (p + 1, s);
|
|
|
|
}
|
|
|
|
p++;
|
|
|
|
}
|
2003-03-10 09:52:57 +03:00
|
|
|
}
|
1998-02-27 07:54:42 +03:00
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
if (flags & CANON_PATH_JOINSLASHES)
|
|
|
|
{
|
|
|
|
/* Collapse "/./" -> "/" */
|
|
|
|
p = lpath;
|
|
|
|
while (*p)
|
|
|
|
{
|
|
|
|
if (p[0] == PATH_SEP && p[1] == '.' && p[2] == PATH_SEP)
|
|
|
|
str_move (p, p + 2);
|
|
|
|
else
|
|
|
|
p++;
|
|
|
|
}
|
2003-03-10 09:52:57 +03:00
|
|
|
}
|
1998-02-27 07:54:42 +03:00
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
if (flags & CANON_PATH_REMSLASHDOTS)
|
|
|
|
{
|
|
|
|
/* Remove trailing slashes */
|
|
|
|
p = lpath + strlen (lpath) - 1;
|
|
|
|
while (p > lpath && *p == PATH_SEP)
|
|
|
|
*p-- = 0;
|
|
|
|
|
|
|
|
/* Remove leading "./" */
|
|
|
|
if (lpath[0] == '.' && lpath[1] == PATH_SEP)
|
|
|
|
{
|
|
|
|
if (lpath[2] == 0)
|
|
|
|
{
|
|
|
|
lpath[1] = 0;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
str_move (lpath, lpath + 2);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Remove trailing "/" or "/." */
|
|
|
|
len = strlen (lpath);
|
|
|
|
if (len < 2)
|
|
|
|
return;
|
|
|
|
if (lpath[len - 1] == PATH_SEP)
|
|
|
|
{
|
|
|
|
lpath[len - 1] = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (lpath[len - 1] == '.' && lpath[len - 2] == PATH_SEP)
|
|
|
|
{
|
|
|
|
if (len == 2)
|
|
|
|
{
|
|
|
|
lpath[1] = 0;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
lpath[len - 2] = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2009-11-23 11:45:46 +03:00
|
|
|
}
|
1998-02-27 07:54:42 +03:00
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
if (flags & CANON_PATH_REMDOUBLEDOTS)
|
|
|
|
{
|
2010-09-10 11:27:21 +04:00
|
|
|
const size_t enc_prefix_len = strlen (VFS_ENCODING_PREFIX);
|
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
/* Collapse "/.." with the previous part of path */
|
|
|
|
p = lpath;
|
|
|
|
while (p[0] && p[1] && p[2])
|
|
|
|
{
|
|
|
|
if ((p[0] != PATH_SEP || p[1] != '.' || p[2] != '.') || (p[3] != PATH_SEP && p[3] != 0))
|
|
|
|
{
|
|
|
|
p++;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* search for the previous token */
|
|
|
|
s = p - 1;
|
|
|
|
while (s >= lpath && *s != PATH_SEP)
|
|
|
|
s--;
|
|
|
|
|
|
|
|
s++;
|
|
|
|
|
|
|
|
/* If the previous token is "..", we cannot collapse it */
|
|
|
|
if (s[0] == '.' && s[1] == '.' && s + 2 == p)
|
|
|
|
{
|
|
|
|
p += 3;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (p[3] != 0)
|
|
|
|
{
|
|
|
|
if (s == lpath && *s == PATH_SEP)
|
|
|
|
{
|
|
|
|
/* "/../foo" -> "/foo" */
|
|
|
|
str_move (s + 1, p + 4);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* "token/../foo" -> "foo" */
|
2010-09-09 16:50:26 +04:00
|
|
|
#if HAVE_CHARSET
|
2010-09-10 11:27:21 +04:00
|
|
|
if (strncmp (s, VFS_ENCODING_PREFIX, enc_prefix_len) == 0)
|
|
|
|
/* special case: remove encoding */
|
2010-09-09 16:50:26 +04:00
|
|
|
str_move (s, p + 1);
|
|
|
|
else
|
|
|
|
#endif /* HAVE_CHARSET */
|
|
|
|
str_move (s, p + 4);
|
2010-04-30 17:31:06 +04:00
|
|
|
}
|
|
|
|
p = (s > lpath) ? s - 1 : s;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* trailing ".." */
|
|
|
|
if (s == lpath)
|
|
|
|
{
|
|
|
|
/* "token/.." -> "." */
|
|
|
|
if (lpath[0] != PATH_SEP)
|
|
|
|
{
|
|
|
|
lpath[0] = '.';
|
|
|
|
}
|
|
|
|
lpath[1] = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* "foo/token/.." -> "foo" */
|
|
|
|
if (s == lpath + 1)
|
|
|
|
s[0] = 0;
|
2010-09-09 16:50:26 +04:00
|
|
|
#if HAVE_CHARSET
|
2010-09-10 11:27:21 +04:00
|
|
|
else if (strncmp (s, VFS_ENCODING_PREFIX, enc_prefix_len) == 0)
|
2010-09-09 16:50:26 +04:00
|
|
|
{
|
|
|
|
/* special case: remove encoding */
|
|
|
|
s[0] = '.';
|
|
|
|
s[1] = '.';
|
|
|
|
s[2] = '\0';
|
|
|
|
|
|
|
|
/* search for the previous token */
|
|
|
|
/* s[-1] == PATH_SEP */
|
|
|
|
p = s - 1;
|
|
|
|
while (p >= lpath && *p != PATH_SEP)
|
|
|
|
p--;
|
|
|
|
|
|
|
|
if (p != NULL)
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
#endif /* HAVE_CHARSET */
|
2010-04-30 17:31:06 +04:00
|
|
|
else
|
|
|
|
s[-1] = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
1998-02-27 07:54:42 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-11-23 11:45:46 +03:00
|
|
|
void
|
|
|
|
canonicalize_pathname (char *path)
|
|
|
|
{
|
|
|
|
custom_canonicalize_pathname (path, CANON_PATH_ALL);
|
|
|
|
}
|
|
|
|
|
2002-07-30 03:12:31 +04:00
|
|
|
#ifdef HAVE_GET_PROCESS_STATS
|
|
|
|
# include <sys/procstats.h>
|
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
int
|
|
|
|
gettimeofday (struct timeval *tp, void *tzp)
|
2002-07-30 03:12:31 +04:00
|
|
|
{
|
2010-04-30 17:31:06 +04:00
|
|
|
return get_process_stats (tp, PS_SELF, 0, 0);
|
2002-07-30 03:12:31 +04:00
|
|
|
}
|
|
|
|
#endif /* HAVE_GET_PROCESS_STATS */
|
|
|
|
|
2010-05-13 21:28:12 +04:00
|
|
|
#ifndef HAVE_REALPATH
|
2005-01-13 22:37:46 +03:00
|
|
|
char *
|
2010-05-13 21:28:12 +04:00
|
|
|
mc_realpath (const char *path, char *resolved_path)
|
2005-01-13 22:37:46 +03:00
|
|
|
{
|
|
|
|
char copy_path[PATH_MAX];
|
|
|
|
char link_path[PATH_MAX];
|
|
|
|
char got_path[PATH_MAX];
|
|
|
|
char *new_path = got_path;
|
|
|
|
char *max_path;
|
|
|
|
int readlinks = 0;
|
|
|
|
int n;
|
|
|
|
|
|
|
|
/* Make a copy of the source path since we may need to modify it. */
|
2010-04-30 17:31:06 +04:00
|
|
|
if (strlen (path) >= PATH_MAX - 2)
|
|
|
|
{
|
|
|
|
errno = ENAMETOOLONG;
|
|
|
|
return NULL;
|
2005-01-13 22:37:46 +03:00
|
|
|
}
|
|
|
|
strcpy (copy_path, path);
|
|
|
|
path = copy_path;
|
|
|
|
max_path = copy_path + PATH_MAX - 2;
|
|
|
|
/* If it's a relative pathname use getwd for starters. */
|
2010-04-30 17:31:06 +04:00
|
|
|
if (*path != '/')
|
|
|
|
{
|
|
|
|
|
|
|
|
new_path = g_get_current_dir ();
|
|
|
|
if (new_path == NULL)
|
|
|
|
{
|
|
|
|
strcpy (got_path, "");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
g_snprintf (got_path, PATH_MAX, "%s", new_path);
|
|
|
|
g_free (new_path);
|
2009-12-29 01:53:09 +03:00
|
|
|
new_path = got_path;
|
2010-04-30 17:31:06 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
new_path += strlen (got_path);
|
|
|
|
if (new_path[-1] != '/')
|
|
|
|
*new_path++ = '/';
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
*new_path++ = '/';
|
|
|
|
path++;
|
2005-01-13 22:37:46 +03:00
|
|
|
}
|
|
|
|
/* Expand each slash-separated pathname component. */
|
2010-04-30 17:31:06 +04:00
|
|
|
while (*path != '\0')
|
|
|
|
{
|
|
|
|
/* Ignore stray "/". */
|
|
|
|
if (*path == '/')
|
|
|
|
{
|
|
|
|
path++;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (*path == '.')
|
|
|
|
{
|
|
|
|
/* Ignore ".". */
|
|
|
|
if (path[1] == '\0' || path[1] == '/')
|
|
|
|
{
|
|
|
|
path++;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (path[1] == '.')
|
|
|
|
{
|
|
|
|
if (path[2] == '\0' || path[2] == '/')
|
|
|
|
{
|
|
|
|
path += 2;
|
|
|
|
/* Ignore ".." at root. */
|
|
|
|
if (new_path == got_path + 1)
|
|
|
|
continue;
|
|
|
|
/* Handle ".." by backing up. */
|
|
|
|
while ((--new_path)[-1] != '/');
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Safely copy the next pathname component. */
|
|
|
|
while (*path != '\0' && *path != '/')
|
|
|
|
{
|
|
|
|
if (path > max_path)
|
|
|
|
{
|
|
|
|
errno = ENAMETOOLONG;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
*new_path++ = *path++;
|
|
|
|
}
|
2005-01-13 22:37:46 +03:00
|
|
|
#ifdef S_IFLNK
|
2010-04-30 17:31:06 +04:00
|
|
|
/* Protect against infinite loops. */
|
|
|
|
if (readlinks++ > MAXSYMLINKS)
|
|
|
|
{
|
|
|
|
errno = ELOOP;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
/* See if latest pathname component is a symlink. */
|
|
|
|
*new_path = '\0';
|
|
|
|
n = readlink (got_path, link_path, PATH_MAX - 1);
|
|
|
|
if (n < 0)
|
|
|
|
{
|
|
|
|
/* EINVAL means the file exists but isn't a symlink. */
|
|
|
|
if (errno != EINVAL)
|
|
|
|
{
|
|
|
|
/* Make sure it's null terminated. */
|
|
|
|
*new_path = '\0';
|
|
|
|
strcpy (resolved_path, got_path);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Note: readlink doesn't add the null byte. */
|
|
|
|
link_path[n] = '\0';
|
|
|
|
if (*link_path == '/')
|
|
|
|
/* Start over for an absolute symlink. */
|
|
|
|
new_path = got_path;
|
|
|
|
else
|
|
|
|
/* Otherwise back up over this component. */
|
|
|
|
while (*(--new_path) != '/');
|
|
|
|
/* Safe sex check. */
|
|
|
|
if (strlen (path) + n >= PATH_MAX - 2)
|
|
|
|
{
|
|
|
|
errno = ENAMETOOLONG;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
/* Insert symlink contents into path. */
|
|
|
|
strcat (link_path, path);
|
|
|
|
strcpy (copy_path, link_path);
|
|
|
|
path = copy_path;
|
|
|
|
}
|
|
|
|
#endif /* S_IFLNK */
|
|
|
|
*new_path++ = '/';
|
2005-01-13 22:37:46 +03:00
|
|
|
}
|
|
|
|
/* Delete trailing slash but don't whomp a lone slash. */
|
|
|
|
if (new_path != got_path + 1 && new_path[-1] == '/')
|
2010-04-30 17:31:06 +04:00
|
|
|
new_path--;
|
2005-01-13 22:37:46 +03:00
|
|
|
/* Make sure it's null terminated. */
|
|
|
|
*new_path = '\0';
|
|
|
|
strcpy (resolved_path, got_path);
|
|
|
|
return resolved_path;
|
|
|
|
}
|
2010-05-13 21:28:12 +04:00
|
|
|
#endif /* HAVE_REALPATH */
|
2005-07-23 01:16:50 +04:00
|
|
|
|
|
|
|
/* Return the index of the permissions triplet */
|
|
|
|
int
|
2010-04-30 17:31:06 +04:00
|
|
|
get_user_permissions (struct stat *st)
|
|
|
|
{
|
2009-02-06 01:46:07 +03:00
|
|
|
static gboolean initialized = FALSE;
|
2005-07-23 01:16:50 +04:00
|
|
|
static gid_t *groups;
|
|
|
|
static int ngroups;
|
|
|
|
static uid_t uid;
|
|
|
|
int i;
|
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
if (!initialized)
|
|
|
|
{
|
|
|
|
uid = geteuid ();
|
2005-07-23 01:16:50 +04:00
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
ngroups = getgroups (0, NULL);
|
|
|
|
if (ngroups == -1)
|
|
|
|
ngroups = 0; /* ignore errors */
|
2005-07-23 01:16:50 +04:00
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
/* allocate space for one element in addition to what
|
|
|
|
* will be filled by getgroups(). */
|
|
|
|
groups = g_new (gid_t, ngroups + 1);
|
2005-07-23 01:16:50 +04:00
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
if (ngroups != 0)
|
|
|
|
{
|
|
|
|
ngroups = getgroups (ngroups, groups);
|
|
|
|
if (ngroups == -1)
|
|
|
|
ngroups = 0; /* ignore errors */
|
|
|
|
}
|
2005-07-23 01:16:50 +04:00
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
/* getgroups() may or may not return the effective group ID,
|
|
|
|
* so we always include it at the end of the list. */
|
|
|
|
groups[ngroups++] = getegid ();
|
2005-07-23 01:16:50 +04:00
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
initialized = TRUE;
|
2005-07-23 01:16:50 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (st->st_uid == uid || uid == 0)
|
2010-04-30 17:31:06 +04:00
|
|
|
return 0;
|
2005-07-23 01:16:50 +04:00
|
|
|
|
2010-04-30 17:31:06 +04:00
|
|
|
for (i = 0; i < ngroups; i++)
|
|
|
|
{
|
|
|
|
if (st->st_gid == groups[i])
|
|
|
|
return 1;
|
2005-07-23 01:16:50 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return 2;
|
|
|
|
}
|