2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Jeremy Allison 1998-2005
6 Copyright (C) Timur Bakeyev 2005
7 Copyright (C) Bjoern Jacke 2006-2007
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "system/syslog.h"
25 #include "system/capability.h"
26 #include "system/passwd.h"
27 #include "system/filesys.h"
29 #ifdef HAVE_SYS_SYSCTL_H
30 #include <sys/sysctl.h>
33 #ifdef HAVE_SYS_PRCTL_H
34 #include <sys/prctl.h>
38 The idea is that this file will eventually have wrappers around all
39 important system calls in samba. The aims are:
41 - to enable easier porting by putting OS dependent stuff in here
43 - to allow for hooks into other "pseudo-filesystems"
45 - to allow easier integration of things like the japanese extensions
47 - to support the philosophy of Samba to expose the features of
48 the OS within the SMB model. In general whatever file/printer/variable
49 expansions/etc make sense to the OS should be acceptable to Samba.
54 /*******************************************************************
55 A read wrapper that will deal with EINTR.
56 ********************************************************************/
58 ssize_t sys_read(int fd, void *buf, size_t count)
63 ret = read(fd, buf, count);
64 #if defined(EWOULDBLOCK)
65 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
67 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
72 /*******************************************************************
73 A write wrapper that will deal with EINTR.
74 ********************************************************************/
76 ssize_t sys_write(int fd, const void *buf, size_t count)
81 ret = write(fd, buf, count);
82 #if defined(EWOULDBLOCK)
83 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
85 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
90 /*******************************************************************
91 A writev wrapper that will deal with EINTR.
92 ********************************************************************/
94 ssize_t sys_writev(int fd, const struct iovec *iov, int iovcnt)
99 /* Try to confuse write_data_iov a bit */
100 if ((random() % 5) == 0) {
101 return sys_write(fd, iov[0].iov_base, iov[0].iov_len);
103 if (iov[0].iov_len > 1) {
104 return sys_write(fd, iov[0].iov_base,
105 (random() % (iov[0].iov_len-1)) + 1);
110 ret = writev(fd, iov, iovcnt);
111 #if defined(EWOULDBLOCK)
112 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
114 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
119 /*******************************************************************
120 A pread wrapper that will deal with EINTR
121 ********************************************************************/
123 #if defined(HAVE_PREAD)
124 ssize_t sys_pread(int fd, void *buf, size_t count, SMB_OFF_T off)
129 ret = pread(fd, buf, count, off);
130 } while (ret == -1 && errno == EINTR);
135 /*******************************************************************
136 A write wrapper that will deal with EINTR
137 ********************************************************************/
139 #if defined(HAVE_PWRITE)
140 ssize_t sys_pwrite(int fd, const void *buf, size_t count, SMB_OFF_T off)
145 ret = pwrite(fd, buf, count, off);
146 } while (ret == -1 && errno == EINTR);
151 /*******************************************************************
152 A send wrapper that will deal with EINTR or EAGAIN or EWOULDBLOCK.
153 ********************************************************************/
155 ssize_t sys_send(int s, const void *msg, size_t len, int flags)
160 ret = send(s, msg, len, flags);
161 #if defined(EWOULDBLOCK)
162 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
164 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
169 /*******************************************************************
170 A recvfrom wrapper that will deal with EINTR.
171 ********************************************************************/
173 ssize_t sys_recvfrom(int s, void *buf, size_t len, int flags, struct sockaddr *from, socklen_t *fromlen)
178 ret = recvfrom(s, buf, len, flags, from, fromlen);
179 #if defined(EWOULDBLOCK)
180 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
182 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
187 /*******************************************************************
188 A fcntl wrapper that will deal with EINTR.
189 ********************************************************************/
191 int sys_fcntl_ptr(int fd, int cmd, void *arg)
196 ret = fcntl(fd, cmd, arg);
197 } while (ret == -1 && errno == EINTR);
201 /****************************************************************************
202 Get/Set all the possible time fields from a stat struct as a timespec.
203 ****************************************************************************/
205 static struct timespec get_atimespec(const struct stat *pst)
207 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
210 /* Old system - no ns timestamp. */
211 ret.tv_sec = pst->st_atime;
215 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
217 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
219 ret.tv_sec = pst->st_atime;
220 ret.tv_nsec = pst->st_atimensec;
222 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
224 ret.tv_sec = pst->st_atime;
225 ret.tv_nsec = pst->st_atime_n;
227 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
229 ret.tv_sec = pst->st_atime;
230 ret.tv_nsec = pst->st_uatime * 1000;
232 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
233 return pst->st_atimespec;
235 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
240 static struct timespec get_mtimespec(const struct stat *pst)
242 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
245 /* Old system - no ns timestamp. */
246 ret.tv_sec = pst->st_mtime;
250 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
252 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
254 ret.tv_sec = pst->st_mtime;
255 ret.tv_nsec = pst->st_mtimensec;
257 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
259 ret.tv_sec = pst->st_mtime;
260 ret.tv_nsec = pst->st_mtime_n;
262 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
264 ret.tv_sec = pst->st_mtime;
265 ret.tv_nsec = pst->st_umtime * 1000;
267 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
268 return pst->st_mtimespec;
270 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
275 static struct timespec get_ctimespec(const struct stat *pst)
277 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
280 /* Old system - no ns timestamp. */
281 ret.tv_sec = pst->st_ctime;
285 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
287 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
289 ret.tv_sec = pst->st_ctime;
290 ret.tv_nsec = pst->st_ctimensec;
292 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
294 ret.tv_sec = pst->st_ctime;
295 ret.tv_nsec = pst->st_ctime_n;
297 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
299 ret.tv_sec = pst->st_ctime;
300 ret.tv_nsec = pst->st_uctime * 1000;
302 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
303 return pst->st_ctimespec;
305 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
310 /****************************************************************************
311 Return the best approximation to a 'create time' under UNIX from a stat
313 ****************************************************************************/
315 static struct timespec calc_create_time_stat(const struct stat *st)
317 struct timespec ret, ret1;
318 struct timespec c_time = get_ctimespec(st);
319 struct timespec m_time = get_mtimespec(st);
320 struct timespec a_time = get_atimespec(st);
322 ret = timespec_compare(&c_time, &m_time) < 0 ? c_time : m_time;
323 ret1 = timespec_compare(&ret, &a_time) < 0 ? ret : a_time;
325 if(!null_timespec(ret1)) {
330 * One of ctime, mtime or atime was zero (probably atime).
331 * Just return MIN(ctime, mtime).
336 /****************************************************************************
337 Return the best approximation to a 'create time' under UNIX from a stat_ex
339 ****************************************************************************/
341 static struct timespec calc_create_time_stat_ex(const struct stat_ex *st)
343 struct timespec ret, ret1;
344 struct timespec c_time = st->st_ex_ctime;
345 struct timespec m_time = st->st_ex_mtime;
346 struct timespec a_time = st->st_ex_atime;
348 ret = timespec_compare(&c_time, &m_time) < 0 ? c_time : m_time;
349 ret1 = timespec_compare(&ret, &a_time) < 0 ? ret : a_time;
351 if(!null_timespec(ret1)) {
356 * One of ctime, mtime or atime was zero (probably atime).
357 * Just return MIN(ctime, mtime).
362 /****************************************************************************
363 Return the 'create time' from a stat struct if it exists (birthtime) or else
364 use the best approximation.
365 ****************************************************************************/
367 static void make_create_timespec(const struct stat *pst, struct stat_ex *dst,
368 bool fake_dir_create_times)
370 if (S_ISDIR(pst->st_mode) && fake_dir_create_times) {
371 dst->st_ex_btime.tv_sec = 315493200L; /* 1/1/1980 */
372 dst->st_ex_btime.tv_nsec = 0;
375 dst->st_ex_calculated_birthtime = false;
377 #if defined(HAVE_STRUCT_STAT_ST_BIRTHTIMESPEC_TV_NSEC)
378 dst->st_ex_btime = pst->st_birthtimespec;
379 #elif defined(HAVE_STRUCT_STAT_ST_BIRTHTIMENSEC)
380 dst->st_ex_btime.tv_sec = pst->st_birthtime;
381 dst->st_ex_btime.tv_nsec = pst->st_birthtimenspec;
382 #elif defined(HAVE_STRUCT_STAT_ST_BIRTHTIME)
383 dst->st_ex_btime.tv_sec = pst->st_birthtime;
384 dst->st_ex_btime.tv_nsec = 0;
386 dst->st_ex_btime = calc_create_time_stat(pst);
387 dst->st_ex_calculated_birthtime = true;
390 /* Deal with systems that don't initialize birthtime correctly.
391 * Pointed out by SATOH Fumiyasu <fumiyas@osstech.jp>.
393 if (null_timespec(dst->st_ex_btime)) {
394 dst->st_ex_btime = calc_create_time_stat(pst);
395 dst->st_ex_calculated_birthtime = true;
399 /****************************************************************************
400 If we update a timestamp in a stat_ex struct we may have to recalculate
401 the birthtime. For now only implement this for write time, but we may
402 also need to do it for atime and ctime. JRA.
403 ****************************************************************************/
405 void update_stat_ex_mtime(struct stat_ex *dst,
406 struct timespec write_ts)
408 dst->st_ex_mtime = write_ts;
410 /* We may have to recalculate btime. */
411 if (dst->st_ex_calculated_birthtime) {
412 dst->st_ex_btime = calc_create_time_stat_ex(dst);
416 void update_stat_ex_create_time(struct stat_ex *dst,
417 struct timespec create_time)
419 dst->st_ex_btime = create_time;
420 dst->st_ex_calculated_birthtime = false;
423 void init_stat_ex_from_stat (struct stat_ex *dst,
424 const struct stat *src,
425 bool fake_dir_create_times)
427 dst->st_ex_dev = src->st_dev;
428 dst->st_ex_ino = src->st_ino;
429 dst->st_ex_mode = src->st_mode;
430 dst->st_ex_nlink = src->st_nlink;
431 dst->st_ex_uid = src->st_uid;
432 dst->st_ex_gid = src->st_gid;
433 dst->st_ex_rdev = src->st_rdev;
434 dst->st_ex_size = src->st_size;
435 dst->st_ex_atime = get_atimespec(src);
436 dst->st_ex_mtime = get_mtimespec(src);
437 dst->st_ex_ctime = get_ctimespec(src);
438 make_create_timespec(src, dst, fake_dir_create_times);
439 #ifdef HAVE_STAT_ST_BLKSIZE
440 dst->st_ex_blksize = src->st_blksize;
442 dst->st_ex_blksize = STAT_ST_BLOCKSIZE;
445 #ifdef HAVE_STAT_ST_BLOCKS
446 dst->st_ex_blocks = src->st_blocks;
448 dst->st_ex_blocks = src->st_size / dst->st_ex_blksize + 1;
451 #ifdef HAVE_STAT_ST_FLAGS
452 dst->st_ex_flags = src->st_flags;
454 dst->st_ex_flags = 0;
458 /*******************************************************************
460 ********************************************************************/
462 int sys_stat(const char *fname, SMB_STRUCT_STAT *sbuf,
463 bool fake_dir_create_times)
467 ret = stat(fname, &statbuf);
469 /* we always want directories to appear zero size */
470 if (S_ISDIR(statbuf.st_mode)) {
473 init_stat_ex_from_stat(sbuf, &statbuf, fake_dir_create_times);
478 /*******************************************************************
480 ********************************************************************/
482 int sys_fstat(int fd, SMB_STRUCT_STAT *sbuf, bool fake_dir_create_times)
486 ret = fstat(fd, &statbuf);
488 /* we always want directories to appear zero size */
489 if (S_ISDIR(statbuf.st_mode)) {
492 init_stat_ex_from_stat(sbuf, &statbuf, fake_dir_create_times);
497 /*******************************************************************
499 ********************************************************************/
501 int sys_lstat(const char *fname,SMB_STRUCT_STAT *sbuf,
502 bool fake_dir_create_times)
506 ret = lstat(fname, &statbuf);
508 /* we always want directories to appear zero size */
509 if (S_ISDIR(statbuf.st_mode)) {
512 init_stat_ex_from_stat(sbuf, &statbuf, fake_dir_create_times);
517 /*******************************************************************
518 An posix_fallocate() wrapper.
519 ********************************************************************/
520 int sys_posix_fallocate(int fd, SMB_OFF_T offset, SMB_OFF_T len)
522 #if defined(HAVE_POSIX_FALLOCATE) && !defined(HAVE_BROKEN_POSIX_FALLOCATE)
523 return posix_fallocate(fd, offset, len);
524 #elif defined(F_RESVSP64)
525 /* this handles XFS on IRIX */
527 SMB_OFF_T new_len = offset + len;
531 /* unlikely to get a too large file on a 64bit system but ... */
535 fl.l_whence = SEEK_SET;
539 ret=fcntl(fd, F_RESVSP64, &fl);
544 /* Make sure the file gets enlarged after we allocated space: */
546 if (new_len > sbuf.st_size)
547 ftruncate64(fd, new_len);
554 /*******************************************************************
555 An fallocate() function that matches the semantics of the Linux one.
556 ********************************************************************/
558 #ifdef HAVE_LINUX_FALLOC_H
559 #include <linux/falloc.h>
562 int sys_fallocate(int fd, enum vfs_fallocate_mode mode, SMB_OFF_T offset, SMB_OFF_T len)
564 #if defined(HAVE_LINUX_FALLOCATE64) || defined(HAVE_LINUX_FALLOCATE)
567 case VFS_FALLOCATE_EXTEND_SIZE:
570 case VFS_FALLOCATE_KEEP_SIZE:
571 lmode = FALLOC_FL_KEEP_SIZE;
577 #if defined(HAVE_LINUX_FALLOCATE)
578 return fallocate(fd, lmode, offset, len);
581 /* TODO - plumb in fallocate from other filesysetms like VXFS etc. JRA. */
587 /*******************************************************************
589 ********************************************************************/
591 FILE *sys_fopen(const char *path, const char *type)
593 return fopen(path, type);
597 #if HAVE_KERNEL_SHARE_MODES
599 #define LOCK_MAND 32 /* This is a mandatory flock */
600 #define LOCK_READ 64 /* ... Which allows concurrent read operations */
601 #define LOCK_WRITE 128 /* ... Which allows concurrent write operations */
602 #define LOCK_RW 192 /* ... Which allows concurrent read & write ops */
606 /*******************************************************************
607 A flock() wrapper that will perform the kernel flock.
608 ********************************************************************/
610 void kernel_flock(int fd, uint32 share_mode, uint32 access_mask)
612 #if HAVE_KERNEL_SHARE_MODES
614 if (share_mode == FILE_SHARE_WRITE) {
615 kernel_mode = LOCK_MAND|LOCK_WRITE;
616 } else if (share_mode == FILE_SHARE_READ) {
617 kernel_mode = LOCK_MAND|LOCK_READ;
618 } else if (share_mode == FILE_SHARE_NONE) {
619 kernel_mode = LOCK_MAND;
622 flock(fd, kernel_mode);
630 /*******************************************************************
632 ********************************************************************/
634 SMB_STRUCT_DIR *sys_opendir(const char *name)
636 return opendir(name);
639 /*******************************************************************
640 An fdopendir wrapper.
641 Ugly hack - we need dirfd for this to work correctly in the
643 ********************************************************************/
645 SMB_STRUCT_DIR *sys_fdopendir(int fd)
647 #if defined(HAVE_FDOPENDIR) && defined(HAVE_DIRFD)
648 return fdopendir(fd);
655 /*******************************************************************
657 ********************************************************************/
659 SMB_STRUCT_DIRENT *sys_readdir(SMB_STRUCT_DIR *dirp)
661 return readdir(dirp);
664 /*******************************************************************
666 ********************************************************************/
668 void sys_seekdir(SMB_STRUCT_DIR *dirp, long offset)
670 seekdir(dirp, offset);
673 /*******************************************************************
675 ********************************************************************/
677 long sys_telldir(SMB_STRUCT_DIR *dirp)
679 return (long)telldir(dirp);
682 /*******************************************************************
684 ********************************************************************/
686 void sys_rewinddir(SMB_STRUCT_DIR *dirp)
691 /*******************************************************************
693 ********************************************************************/
695 int sys_closedir(SMB_STRUCT_DIR *dirp)
697 return closedir(dirp);
700 /*******************************************************************
702 ********************************************************************/
704 int sys_mknod(const char *path, mode_t mode, SMB_DEV_T dev)
706 #if defined(HAVE_MKNOD)
707 return mknod(path, mode, dev);
709 /* No mknod system call. */
715 /*******************************************************************
716 The wait() calls vary between systems
717 ********************************************************************/
719 int sys_waitpid(pid_t pid,int *status,int options)
722 return waitpid(pid,status,options);
723 #else /* HAVE_WAITPID */
724 return wait4(pid, status, options, NULL);
725 #endif /* HAVE_WAITPID */
728 /*******************************************************************
729 System wrapper for getwd. Always returns MALLOC'ed memory, or NULL
730 on error (malloc fail usually).
731 ********************************************************************/
733 char *sys_getwd(void)
735 #ifdef GETCWD_TAKES_NULL
736 return getcwd(NULL, 0);
738 char *wd = NULL, *s = NULL;
739 size_t allocated = PATH_MAX;
742 s = SMB_REALLOC_ARRAY(s, char, allocated);
746 wd = getcwd(s, allocated);
750 if (errno != ERANGE) {
755 if (allocated < PATH_MAX) {
762 char *s = SMB_MALLOC_ARRAY(char, PATH_MAX);
770 #if defined(HAVE_POSIX_CAPABILITIES)
772 /**************************************************************************
773 Try and abstract process capabilities (for systems that have them).
774 ****************************************************************************/
776 /* Set the POSIX capabilities needed for the given purpose into the effective
777 * capability set of the current process. Make sure they are always removed
778 * from the inheritable set, because there is no circumstance in which our
779 * children should inherit our elevated privileges.
781 static bool set_process_capability(enum smbd_capability capability,
784 cap_value_t cap_vals[2] = {0};
785 int num_cap_vals = 0;
789 #if defined(HAVE_PRCTL) && defined(PR_GET_KEEPCAPS) && defined(PR_SET_KEEPCAPS)
790 /* On Linux, make sure that any capabilities we grab are sticky
791 * across UID changes. We expect that this would allow us to keep both
792 * the effective and permitted capability sets, but as of circa 2.6.16,
793 * only the permitted set is kept. It is a bug (which we work around)
794 * that the effective set is lost, but we still require the effective
797 if (!prctl(PR_GET_KEEPCAPS)) {
798 prctl(PR_SET_KEEPCAPS, 1);
802 cap = cap_get_proc();
804 DEBUG(0,("set_process_capability: cap_get_proc failed: %s\n",
809 switch (capability) {
810 case KERNEL_OPLOCK_CAPABILITY:
811 #ifdef CAP_NETWORK_MGT
812 /* IRIX has CAP_NETWORK_MGT for oplocks. */
813 cap_vals[num_cap_vals++] = CAP_NETWORK_MGT;
816 case DMAPI_ACCESS_CAPABILITY:
817 #ifdef CAP_DEVICE_MGT
818 /* IRIX has CAP_DEVICE_MGT for DMAPI access. */
819 cap_vals[num_cap_vals++] = CAP_DEVICE_MGT;
821 /* Linux has CAP_MKNOD for DMAPI access. */
822 cap_vals[num_cap_vals++] = CAP_MKNOD;
825 case LEASE_CAPABILITY:
827 cap_vals[num_cap_vals++] = CAP_LEASE;
832 SMB_ASSERT(num_cap_vals <= ARRAY_SIZE(cap_vals));
834 if (num_cap_vals == 0) {
839 cap_set_flag(cap, CAP_EFFECTIVE, num_cap_vals, cap_vals,
840 enable ? CAP_SET : CAP_CLEAR);
842 /* We never want to pass capabilities down to our children, so make
843 * sure they are not inherited.
845 cap_set_flag(cap, CAP_INHERITABLE, num_cap_vals, cap_vals, CAP_CLEAR);
847 if (cap_set_proc(cap) == -1) {
848 DEBUG(0, ("set_process_capability: cap_set_proc failed: %s\n",
858 #endif /* HAVE_POSIX_CAPABILITIES */
860 /****************************************************************************
861 Gain the oplock capability from the kernel if possible.
862 ****************************************************************************/
864 void set_effective_capability(enum smbd_capability capability)
866 #if defined(HAVE_POSIX_CAPABILITIES)
867 set_process_capability(capability, True);
868 #endif /* HAVE_POSIX_CAPABILITIES */
871 void drop_effective_capability(enum smbd_capability capability)
873 #if defined(HAVE_POSIX_CAPABILITIES)
874 set_process_capability(capability, False);
875 #endif /* HAVE_POSIX_CAPABILITIES */
878 /**************************************************************************
879 Wrapper for random().
880 ****************************************************************************/
882 long sys_random(void)
884 #if defined(HAVE_RANDOM)
885 return (long)random();
886 #elif defined(HAVE_RAND)
889 DEBUG(0,("Error - no random function available !\n"));
894 /**************************************************************************
895 Wrapper for srandom().
896 ****************************************************************************/
898 void sys_srandom(unsigned int seed)
900 #if defined(HAVE_SRANDOM)
902 #elif defined(HAVE_SRAND)
905 DEBUG(0,("Error - no srandom function available !\n"));
911 #define NGROUPS_MAX 32 /* Guess... */
914 /**************************************************************************
915 Returns equivalent to NGROUPS_MAX - using sysconf if needed.
916 ****************************************************************************/
920 #if defined(SYSCONF_SC_NGROUPS_MAX)
921 int ret = sysconf(_SC_NGROUPS_MAX);
922 return (ret == -1) ? NGROUPS_MAX : ret;
928 /**************************************************************************
929 Wrap setgroups and getgroups for systems that declare getgroups() as
930 returning an array of gid_t, but actuall return an array of int.
931 ****************************************************************************/
933 #if defined(HAVE_BROKEN_GETGROUPS)
935 #ifdef HAVE_BROKEN_GETGROUPS
941 static int sys_broken_getgroups(int setlen, gid_t *gidset)
948 return getgroups(setlen, &gid);
952 * Broken case. We need to allocate a
953 * GID_T array of size setlen.
962 setlen = groups_max();
964 if((group_list = SMB_MALLOC_ARRAY(GID_T, setlen)) == NULL) {
965 DEBUG(0,("sys_getgroups: Malloc fail.\n"));
969 if((ngroups = getgroups(setlen, group_list)) < 0) {
970 int saved_errno = errno;
971 SAFE_FREE(group_list);
976 for(i = 0; i < ngroups; i++)
977 gidset[i] = (gid_t)group_list[i];
979 SAFE_FREE(group_list);
983 static int sys_broken_setgroups(int setlen, gid_t *gidset)
991 if (setlen < 0 || setlen > groups_max()) {
997 * Broken case. We need to allocate a
998 * GID_T array of size setlen.
1001 if((group_list = SMB_MALLOC_ARRAY(GID_T, setlen)) == NULL) {
1002 DEBUG(0,("sys_setgroups: Malloc fail.\n"));
1006 for(i = 0; i < setlen; i++)
1007 group_list[i] = (GID_T) gidset[i];
1009 if(setgroups(setlen, group_list) != 0) {
1010 int saved_errno = errno;
1011 SAFE_FREE(group_list);
1012 errno = saved_errno;
1016 SAFE_FREE(group_list);
1020 #endif /* HAVE_BROKEN_GETGROUPS */
1022 /* This is a list of systems that require the first GID passed to setgroups(2)
1023 * to be the effective GID. If your system is one of these, add it here.
1025 #if defined (FREEBSD) || defined (DARWINOS)
1026 #define USE_BSD_SETGROUPS
1029 #if defined(USE_BSD_SETGROUPS)
1030 /* Depending on the particular BSD implementation, the first GID that is
1031 * passed to setgroups(2) will either be ignored or will set the credential's
1032 * effective GID. In either case, the right thing to do is to guarantee that
1033 * gidset[0] is the effective GID.
1035 static int sys_bsd_setgroups(gid_t primary_gid, int setlen, const gid_t *gidset)
1037 gid_t *new_gidset = NULL;
1041 /* setgroups(2) will fail with EINVAL if we pass too many groups. */
1044 /* No group list, just make sure we are setting the efective GID. */
1046 return setgroups(1, &primary_gid);
1049 /* If the primary gid is not the first array element, grow the array
1050 * and insert it at the front.
1052 if (gidset[0] != primary_gid) {
1053 new_gidset = SMB_MALLOC_ARRAY(gid_t, setlen + 1);
1054 if (new_gidset == NULL) {
1058 memcpy(new_gidset + 1, gidset, (setlen * sizeof(gid_t)));
1059 new_gidset[0] = primary_gid;
1064 DEBUG(3, ("forced to truncate group list from %d to %d\n",
1069 #if defined(HAVE_BROKEN_GETGROUPS)
1070 ret = sys_broken_setgroups(setlen, new_gidset ? new_gidset : gidset);
1072 ret = setgroups(setlen, new_gidset ? new_gidset : gidset);
1077 SAFE_FREE(new_gidset);
1084 #endif /* USE_BSD_SETGROUPS */
1086 /**************************************************************************
1087 Wrapper for getgroups. Deals with broken (int) case.
1088 ****************************************************************************/
1090 int sys_getgroups(int setlen, gid_t *gidset)
1092 #if defined(HAVE_BROKEN_GETGROUPS)
1093 return sys_broken_getgroups(setlen, gidset);
1095 return getgroups(setlen, gidset);
1099 /**************************************************************************
1100 Wrapper for setgroups. Deals with broken (int) case and BSD case.
1101 ****************************************************************************/
1103 int sys_setgroups(gid_t UNUSED(primary_gid), int setlen, gid_t *gidset)
1105 #if !defined(HAVE_SETGROUPS)
1108 #endif /* HAVE_SETGROUPS */
1110 #if defined(USE_BSD_SETGROUPS)
1111 return sys_bsd_setgroups(primary_gid, setlen, gidset);
1112 #elif defined(HAVE_BROKEN_GETGROUPS)
1113 return sys_broken_setgroups(setlen, gidset);
1115 return setgroups(setlen, gidset);
1119 /**************************************************************************
1120 Extract a command into an arg list.
1121 ****************************************************************************/
1123 static char **extract_args(TALLOC_CTX *mem_ctx, const char *command)
1132 if (!(trunc_cmd = talloc_strdup(mem_ctx, command))) {
1133 DEBUG(0, ("talloc failed\n"));
1137 if(!(ptr = strtok_r(trunc_cmd, " \t", &saveptr))) {
1138 TALLOC_FREE(trunc_cmd);
1147 for( argcl = 1; ptr; ptr = strtok_r(NULL, " \t", &saveptr))
1150 TALLOC_FREE(trunc_cmd);
1152 if (!(argl = talloc_array(mem_ctx, char *, argcl + 1))) {
1157 * Now do the extraction.
1160 if (!(trunc_cmd = talloc_strdup(mem_ctx, command))) {
1164 ptr = strtok_r(trunc_cmd, " \t", &saveptr);
1167 if (!(argl[i++] = talloc_strdup(argl, ptr))) {
1171 while((ptr = strtok_r(NULL, " \t", &saveptr)) != NULL) {
1173 if (!(argl[i++] = talloc_strdup(argl, ptr))) {
1179 TALLOC_FREE(trunc_cmd);
1183 DEBUG(0, ("talloc failed\n"));
1184 TALLOC_FREE(trunc_cmd);
1190 /**************************************************************************
1191 Wrapper for popen. Safer as it doesn't search a path.
1192 Modified from the glibc sources.
1193 modified by tridge to return a file descriptor. We must kick our FILE* habit
1194 ****************************************************************************/
1196 typedef struct _popen_list
1200 struct _popen_list *next;
1203 static popen_list *popen_chain;
1205 int sys_popen(const char *command)
1207 int parent_end, child_end;
1209 popen_list *entry = NULL;
1212 if (pipe(pipe_fds) < 0)
1215 parent_end = pipe_fds[0];
1216 child_end = pipe_fds[1];
1223 if((entry = SMB_MALLOC_P(popen_list)) == NULL)
1226 ZERO_STRUCTP(entry);
1229 * Extract the command and args into a NULL terminated array.
1232 if(!(argl = extract_args(NULL, command)))
1235 entry->child_pid = fork();
1237 if (entry->child_pid == -1) {
1241 if (entry->child_pid == 0) {
1247 int child_std_end = STDOUT_FILENO;
1251 if (child_end != child_std_end) {
1252 dup2 (child_end, child_std_end);
1257 * POSIX.2: "popen() shall ensure that any streams from previous
1258 * popen() calls that remain open in the parent process are closed
1259 * in the new child process."
1262 for (p = popen_chain; p; p = p->next)
1265 execv(argl[0], argl);
1276 /* Link into popen_chain. */
1277 entry->next = popen_chain;
1278 popen_chain = entry;
1279 entry->fd = parent_end;
1292 /**************************************************************************
1293 Wrapper for pclose. Modified from the glibc sources.
1294 ****************************************************************************/
1296 int sys_pclose(int fd)
1299 popen_list **ptr = &popen_chain;
1300 popen_list *entry = NULL;
1304 /* Unlink from popen_chain. */
1305 for ( ; *ptr != NULL; ptr = &(*ptr)->next) {
1306 if ((*ptr)->fd == fd) {
1308 *ptr = (*ptr)->next;
1314 if (status < 0 || close(entry->fd) < 0)
1318 * As Samba is catching and eating child process
1319 * exits we don't really care about the child exit
1320 * code, a -1 with errno = ECHILD will do fine for us.
1324 wait_pid = sys_waitpid (entry->child_pid, &wstatus, 0);
1325 } while (wait_pid == -1 && errno == EINTR);
1334 /**************************************************************************
1335 Wrapper for Admin Logs.
1336 ****************************************************************************/
1338 void sys_adminlog(int priority, const char *format_str, ...)
1342 char *msgbuf = NULL;
1344 va_start( ap, format_str );
1345 ret = vasprintf( &msgbuf, format_str, ap );
1351 #if defined(HAVE_SYSLOG)
1352 syslog( priority, "%s", msgbuf );
1354 DEBUG(0,("%s", msgbuf ));
1359 /******** Solaris EA helper function prototypes ********/
1360 #ifdef HAVE_ATTROPEN
1361 #define SOLARIS_ATTRMODE S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP
1362 static int solaris_write_xattr(int attrfd, const char *value, size_t size);
1363 static ssize_t solaris_read_xattr(int attrfd, void *value, size_t size);
1364 static ssize_t solaris_list_xattr(int attrdirfd, char *list, size_t size);
1365 static int solaris_unlinkat(int attrdirfd, const char *name);
1366 static int solaris_attropen(const char *path, const char *attrpath, int oflag, mode_t mode);
1367 static int solaris_openat(int fildes, const char *path, int oflag, mode_t mode);
1370 /**************************************************************************
1371 Wrappers for extented attribute calls. Based on the Linux package with
1372 support for IRIX and (Net|Free)BSD also. Expand as other systems have them.
1373 ****************************************************************************/
1375 ssize_t sys_getxattr (const char *path, const char *name, void *value, size_t size)
1377 #if defined(HAVE_GETXATTR)
1378 #ifndef XATTR_ADD_OPT
1379 return getxattr(path, name, value, size);
1382 return getxattr(path, name, value, size, 0, options);
1384 #elif defined(HAVE_GETEA)
1385 return getea(path, name, value, size);
1386 #elif defined(HAVE_EXTATTR_GET_FILE)
1389 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1390 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1391 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1393 * The BSD implementation has a nasty habit of silently truncating
1394 * the returned value to the size of the buffer, so we have to check
1395 * that the buffer is large enough to fit the returned value.
1397 if((retval=extattr_get_file(path, attrnamespace, attrname, NULL, 0)) >= 0) {
1402 if((retval=extattr_get_file(path, attrnamespace, attrname, value, size)) >= 0)
1406 DEBUG(10,("sys_getxattr: extattr_get_file() failed with: %s\n", strerror(errno)));
1408 #elif defined(HAVE_ATTR_GET)
1409 int retval, flags = 0;
1410 int valuelength = (int)size;
1411 char *attrname = strchr(name,'.') + 1;
1413 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1415 retval = attr_get(path, attrname, (char *)value, &valuelength, flags);
1417 return retval ? retval : valuelength;
1418 #elif defined(HAVE_ATTROPEN)
1420 int attrfd = solaris_attropen(path, name, O_RDONLY, 0);
1422 ret = solaris_read_xattr(attrfd, value, size);
1432 ssize_t sys_lgetxattr (const char *path, const char *name, void *value, size_t size)
1434 #if defined(HAVE_LGETXATTR)
1435 return lgetxattr(path, name, value, size);
1436 #elif defined(HAVE_GETXATTR) && defined(XATTR_ADD_OPT)
1437 int options = XATTR_NOFOLLOW;
1438 return getxattr(path, name, value, size, 0, options);
1439 #elif defined(HAVE_LGETEA)
1440 return lgetea(path, name, value, size);
1441 #elif defined(HAVE_EXTATTR_GET_LINK)
1444 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1445 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1446 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1448 if((retval=extattr_get_link(path, attrnamespace, attrname, NULL, 0)) >= 0) {
1453 if((retval=extattr_get_link(path, attrnamespace, attrname, value, size)) >= 0)
1457 DEBUG(10,("sys_lgetxattr: extattr_get_link() failed with: %s\n", strerror(errno)));
1459 #elif defined(HAVE_ATTR_GET)
1460 int retval, flags = ATTR_DONTFOLLOW;
1461 int valuelength = (int)size;
1462 char *attrname = strchr(name,'.') + 1;
1464 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1466 retval = attr_get(path, attrname, (char *)value, &valuelength, flags);
1468 return retval ? retval : valuelength;
1469 #elif defined(HAVE_ATTROPEN)
1471 int attrfd = solaris_attropen(path, name, O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1473 ret = solaris_read_xattr(attrfd, value, size);
1483 ssize_t sys_fgetxattr (int filedes, const char *name, void *value, size_t size)
1485 #if defined(HAVE_FGETXATTR)
1486 #ifndef XATTR_ADD_OPT
1487 return fgetxattr(filedes, name, value, size);
1490 return fgetxattr(filedes, name, value, size, 0, options);
1492 #elif defined(HAVE_FGETEA)
1493 return fgetea(filedes, name, value, size);
1494 #elif defined(HAVE_EXTATTR_GET_FD)
1497 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1498 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1499 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1501 if((retval=extattr_get_fd(filedes, attrnamespace, attrname, NULL, 0)) >= 0) {
1506 if((retval=extattr_get_fd(filedes, attrnamespace, attrname, value, size)) >= 0)
1510 DEBUG(10,("sys_fgetxattr: extattr_get_fd() failed with: %s\n", strerror(errno)));
1512 #elif defined(HAVE_ATTR_GETF)
1513 int retval, flags = 0;
1514 int valuelength = (int)size;
1515 char *attrname = strchr(name,'.') + 1;
1517 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1519 retval = attr_getf(filedes, attrname, (char *)value, &valuelength, flags);
1521 return retval ? retval : valuelength;
1522 #elif defined(HAVE_ATTROPEN)
1524 int attrfd = solaris_openat(filedes, name, O_RDONLY|O_XATTR, 0);
1526 ret = solaris_read_xattr(attrfd, value, size);
1536 #if defined(HAVE_EXTATTR_LIST_FILE)
1538 #define EXTATTR_PREFIX(s) (s), (sizeof((s))-1)
1546 { EXTATTR_NAMESPACE_SYSTEM, EXTATTR_PREFIX("system.") },
1547 { EXTATTR_NAMESPACE_USER, EXTATTR_PREFIX("user.") },
1555 static ssize_t bsd_attr_list (int type, extattr_arg arg, char *list, size_t size)
1557 ssize_t list_size, total_size = 0;
1560 /* Iterate through extattr(2) namespaces */
1561 for(t = 0; t < ARRAY_SIZE(extattr); t++) {
1563 #if defined(HAVE_EXTATTR_LIST_FILE)
1565 list_size = extattr_list_file(arg.path, extattr[t].space, list, size);
1568 #if defined(HAVE_EXTATTR_LIST_LINK)
1570 list_size = extattr_list_link(arg.path, extattr[t].space, list, size);
1573 #if defined(HAVE_EXTATTR_LIST_FD)
1575 list_size = extattr_list_fd(arg.filedes, extattr[t].space, list, size);
1582 /* Some error happend. Errno should be set by the previous call */
1588 /* XXX: Call with an empty buffer may be used to calculate
1589 necessary buffer size. Unfortunately, we can't say, how
1590 many attributes were returned, so here is the potential
1591 problem with the emulation.
1594 /* Take the worse case of one char attribute names -
1595 two bytes per name plus one more for sanity.
1597 total_size += list_size + (list_size/2 + 1)*extattr[t].len;
1600 /* Count necessary offset to fit namespace prefixes */
1602 for(i = 0; i < list_size; i += list[i] + 1)
1603 len += extattr[t].len;
1605 total_size += list_size + len;
1606 /* Buffer is too small to fit the results */
1607 if(total_size > size) {
1611 /* Shift results back, so we can prepend prefixes */
1612 buf = (char *)memmove(list + len, list, list_size);
1614 for(i = 0; i < list_size; i += len + 1) {
1616 strncpy(list, extattr[t].name, extattr[t].len + 1);
1617 list += extattr[t].len;
1618 strncpy(list, buf + i + 1, len);
1629 #if defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1630 static char attr_buffer[ATTR_MAX_VALUELEN];
1632 static ssize_t irix_attr_list(const char *path, int filedes, char *list, size_t size, int flags)
1634 int retval = 0, index;
1635 attrlist_cursor_t *cursor = 0;
1637 attrlist_t * al = (attrlist_t *)attr_buffer;
1639 size_t ent_size, left = size;
1644 retval = attr_listf(filedes, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1646 retval = attr_list(path, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1648 for (index = 0; index < al->al_count; index++) {
1649 ae = ATTR_ENTRY(attr_buffer, index);
1650 ent_size = strlen(ae->a_name) + sizeof("user.");
1651 if (left >= ent_size) {
1652 strncpy(bp, "user.", sizeof("user."));
1653 strncat(bp, ae->a_name, ent_size - sizeof("user."));
1661 total_size += ent_size;
1663 if (al->al_more == 0) break;
1670 retval = attr_listf(filedes, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1672 retval = attr_list(path, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1674 for (index = 0; index < al->al_count; index++) {
1675 ae = ATTR_ENTRY(attr_buffer, index);
1676 ent_size = strlen(ae->a_name) + sizeof("system.");
1677 if (left >= ent_size) {
1678 strncpy(bp, "system.", sizeof("system."));
1679 strncat(bp, ae->a_name, ent_size - sizeof("system."));
1687 total_size += ent_size;
1689 if (al->al_more == 0) break;
1692 return (ssize_t)(retval ? retval : total_size);
1697 ssize_t sys_listxattr (const char *path, char *list, size_t size)
1699 #if defined(HAVE_LISTXATTR)
1700 #ifndef XATTR_ADD_OPT
1701 return listxattr(path, list, size);
1704 return listxattr(path, list, size, options);
1706 #elif defined(HAVE_LISTEA)
1707 return listea(path, list, size);
1708 #elif defined(HAVE_EXTATTR_LIST_FILE)
1711 return bsd_attr_list(0, arg, list, size);
1712 #elif defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1713 return irix_attr_list(path, 0, list, size, 0);
1714 #elif defined(HAVE_ATTROPEN)
1716 int attrdirfd = solaris_attropen(path, ".", O_RDONLY, 0);
1717 if (attrdirfd >= 0) {
1718 ret = solaris_list_xattr(attrdirfd, list, size);
1728 ssize_t sys_llistxattr (const char *path, char *list, size_t size)
1730 #if defined(HAVE_LLISTXATTR)
1731 return llistxattr(path, list, size);
1732 #elif defined(HAVE_LISTXATTR) && defined(XATTR_ADD_OPT)
1733 int options = XATTR_NOFOLLOW;
1734 return listxattr(path, list, size, options);
1735 #elif defined(HAVE_LLISTEA)
1736 return llistea(path, list, size);
1737 #elif defined(HAVE_EXTATTR_LIST_LINK)
1740 return bsd_attr_list(1, arg, list, size);
1741 #elif defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1742 return irix_attr_list(path, 0, list, size, ATTR_DONTFOLLOW);
1743 #elif defined(HAVE_ATTROPEN)
1745 int attrdirfd = solaris_attropen(path, ".", O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1746 if (attrdirfd >= 0) {
1747 ret = solaris_list_xattr(attrdirfd, list, size);
1757 ssize_t sys_flistxattr (int filedes, char *list, size_t size)
1759 #if defined(HAVE_FLISTXATTR)
1760 #ifndef XATTR_ADD_OPT
1761 return flistxattr(filedes, list, size);
1764 return flistxattr(filedes, list, size, options);
1766 #elif defined(HAVE_FLISTEA)
1767 return flistea(filedes, list, size);
1768 #elif defined(HAVE_EXTATTR_LIST_FD)
1770 arg.filedes = filedes;
1771 return bsd_attr_list(2, arg, list, size);
1772 #elif defined(HAVE_ATTR_LISTF)
1773 return irix_attr_list(NULL, filedes, list, size, 0);
1774 #elif defined(HAVE_ATTROPEN)
1776 int attrdirfd = solaris_openat(filedes, ".", O_RDONLY|O_XATTR, 0);
1777 if (attrdirfd >= 0) {
1778 ret = solaris_list_xattr(attrdirfd, list, size);
1788 int sys_removexattr (const char *path, const char *name)
1790 #if defined(HAVE_REMOVEXATTR)
1791 #ifndef XATTR_ADD_OPT
1792 return removexattr(path, name);
1795 return removexattr(path, name, options);
1797 #elif defined(HAVE_REMOVEEA)
1798 return removeea(path, name);
1799 #elif defined(HAVE_EXTATTR_DELETE_FILE)
1801 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1802 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1803 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1805 return extattr_delete_file(path, attrnamespace, attrname);
1806 #elif defined(HAVE_ATTR_REMOVE)
1808 char *attrname = strchr(name,'.') + 1;
1810 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1812 return attr_remove(path, attrname, flags);
1813 #elif defined(HAVE_ATTROPEN)
1815 int attrdirfd = solaris_attropen(path, ".", O_RDONLY, 0);
1816 if (attrdirfd >= 0) {
1817 ret = solaris_unlinkat(attrdirfd, name);
1827 int sys_lremovexattr (const char *path, const char *name)
1829 #if defined(HAVE_LREMOVEXATTR)
1830 return lremovexattr(path, name);
1831 #elif defined(HAVE_REMOVEXATTR) && defined(XATTR_ADD_OPT)
1832 int options = XATTR_NOFOLLOW;
1833 return removexattr(path, name, options);
1834 #elif defined(HAVE_LREMOVEEA)
1835 return lremoveea(path, name);
1836 #elif defined(HAVE_EXTATTR_DELETE_LINK)
1838 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1839 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1840 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1842 return extattr_delete_link(path, attrnamespace, attrname);
1843 #elif defined(HAVE_ATTR_REMOVE)
1844 int flags = ATTR_DONTFOLLOW;
1845 char *attrname = strchr(name,'.') + 1;
1847 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1849 return attr_remove(path, attrname, flags);
1850 #elif defined(HAVE_ATTROPEN)
1852 int attrdirfd = solaris_attropen(path, ".", O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1853 if (attrdirfd >= 0) {
1854 ret = solaris_unlinkat(attrdirfd, name);
1864 int sys_fremovexattr (int filedes, const char *name)
1866 #if defined(HAVE_FREMOVEXATTR)
1867 #ifndef XATTR_ADD_OPT
1868 return fremovexattr(filedes, name);
1871 return fremovexattr(filedes, name, options);
1873 #elif defined(HAVE_FREMOVEEA)
1874 return fremoveea(filedes, name);
1875 #elif defined(HAVE_EXTATTR_DELETE_FD)
1877 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1878 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1879 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1881 return extattr_delete_fd(filedes, attrnamespace, attrname);
1882 #elif defined(HAVE_ATTR_REMOVEF)
1884 char *attrname = strchr(name,'.') + 1;
1886 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1888 return attr_removef(filedes, attrname, flags);
1889 #elif defined(HAVE_ATTROPEN)
1891 int attrdirfd = solaris_openat(filedes, ".", O_RDONLY|O_XATTR, 0);
1892 if (attrdirfd >= 0) {
1893 ret = solaris_unlinkat(attrdirfd, name);
1903 int sys_setxattr (const char *path, const char *name, const void *value, size_t size, int flags)
1905 #if defined(HAVE_SETXATTR)
1906 #ifndef XATTR_ADD_OPT
1907 return setxattr(path, name, value, size, flags);
1910 return setxattr(path, name, value, size, 0, options);
1912 #elif defined(HAVE_SETEA)
1913 return setea(path, name, value, size, flags);
1914 #elif defined(HAVE_EXTATTR_SET_FILE)
1917 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1918 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1919 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1921 /* Check attribute existence */
1922 retval = extattr_get_file(path, attrnamespace, attrname, NULL, 0);
1924 /* REPLACE attribute, that doesn't exist */
1925 if (flags & XATTR_REPLACE && errno == ENOATTR) {
1929 /* Ignore other errors */
1932 /* CREATE attribute, that already exists */
1933 if (flags & XATTR_CREATE) {
1939 retval = extattr_set_file(path, attrnamespace, attrname, value, size);
1940 return (retval < 0) ? -1 : 0;
1941 #elif defined(HAVE_ATTR_SET)
1943 char *attrname = strchr(name,'.') + 1;
1945 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
1946 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
1947 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
1949 return attr_set(path, attrname, (const char *)value, size, myflags);
1950 #elif defined(HAVE_ATTROPEN)
1952 int myflags = O_RDWR;
1954 if (flags & XATTR_CREATE) myflags |= O_EXCL;
1955 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
1956 attrfd = solaris_attropen(path, name, myflags, (mode_t) SOLARIS_ATTRMODE);
1958 ret = solaris_write_xattr(attrfd, value, size);
1968 int sys_lsetxattr (const char *path, const char *name, const void *value, size_t size, int flags)
1970 #if defined(HAVE_LSETXATTR)
1971 return lsetxattr(path, name, value, size, flags);
1972 #elif defined(HAVE_SETXATTR) && defined(XATTR_ADD_OPT)
1973 int options = XATTR_NOFOLLOW;
1974 return setxattr(path, name, value, size, 0, options);
1975 #elif defined(LSETEA)
1976 return lsetea(path, name, value, size, flags);
1977 #elif defined(HAVE_EXTATTR_SET_LINK)
1980 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1981 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1982 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1984 /* Check attribute existence */
1985 retval = extattr_get_link(path, attrnamespace, attrname, NULL, 0);
1987 /* REPLACE attribute, that doesn't exist */
1988 if (flags & XATTR_REPLACE && errno == ENOATTR) {
1992 /* Ignore other errors */
1995 /* CREATE attribute, that already exists */
1996 if (flags & XATTR_CREATE) {
2003 retval = extattr_set_link(path, attrnamespace, attrname, value, size);
2004 return (retval < 0) ? -1 : 0;
2005 #elif defined(HAVE_ATTR_SET)
2006 int myflags = ATTR_DONTFOLLOW;
2007 char *attrname = strchr(name,'.') + 1;
2009 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
2010 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
2011 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
2013 return attr_set(path, attrname, (const char *)value, size, myflags);
2014 #elif defined(HAVE_ATTROPEN)
2016 int myflags = O_RDWR | AT_SYMLINK_NOFOLLOW;
2018 if (flags & XATTR_CREATE) myflags |= O_EXCL;
2019 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
2020 attrfd = solaris_attropen(path, name, myflags, (mode_t) SOLARIS_ATTRMODE);
2022 ret = solaris_write_xattr(attrfd, value, size);
2032 int sys_fsetxattr (int filedes, const char *name, const void *value, size_t size, int flags)
2034 #if defined(HAVE_FSETXATTR)
2035 #ifndef XATTR_ADD_OPT
2036 return fsetxattr(filedes, name, value, size, flags);
2039 return fsetxattr(filedes, name, value, size, 0, options);
2041 #elif defined(HAVE_FSETEA)
2042 return fsetea(filedes, name, value, size, flags);
2043 #elif defined(HAVE_EXTATTR_SET_FD)
2046 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
2047 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
2048 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
2050 /* Check attribute existence */
2051 retval = extattr_get_fd(filedes, attrnamespace, attrname, NULL, 0);
2053 /* REPLACE attribute, that doesn't exist */
2054 if (flags & XATTR_REPLACE && errno == ENOATTR) {
2058 /* Ignore other errors */
2061 /* CREATE attribute, that already exists */
2062 if (flags & XATTR_CREATE) {
2068 retval = extattr_set_fd(filedes, attrnamespace, attrname, value, size);
2069 return (retval < 0) ? -1 : 0;
2070 #elif defined(HAVE_ATTR_SETF)
2072 char *attrname = strchr(name,'.') + 1;
2074 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
2075 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
2076 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
2078 return attr_setf(filedes, attrname, (const char *)value, size, myflags);
2079 #elif defined(HAVE_ATTROPEN)
2081 int myflags = O_RDWR | O_XATTR;
2083 if (flags & XATTR_CREATE) myflags |= O_EXCL;
2084 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
2085 attrfd = solaris_openat(filedes, name, myflags, (mode_t) SOLARIS_ATTRMODE);
2087 ret = solaris_write_xattr(attrfd, value, size);
2097 /**************************************************************************
2098 helper functions for Solaris' EA support
2099 ****************************************************************************/
2100 #ifdef HAVE_ATTROPEN
2101 static ssize_t solaris_read_xattr(int attrfd, void *value, size_t size)
2105 if (fstat(attrfd, &sbuf) == -1) {
2110 /* This is to return the current size of the named extended attribute */
2112 return sbuf.st_size;
2115 /* check size and read xattr */
2116 if (sbuf.st_size > size) {
2121 return read(attrfd, value, sbuf.st_size);
2124 static ssize_t solaris_list_xattr(int attrdirfd, char *list, size_t size)
2129 int newfd = dup(attrdirfd);
2130 /* CAUTION: The originating file descriptor should not be
2131 used again following the call to fdopendir().
2132 For that reason we dup() the file descriptor
2133 here to make things more clear. */
2134 dirp = fdopendir(newfd);
2136 while ((de = readdir(dirp))) {
2137 size_t listlen = strlen(de->d_name) + 1;
2138 if (!strcmp(de->d_name, ".") || !strcmp(de->d_name, "..")) {
2139 /* we don't want "." and ".." here: */
2140 DEBUG(10,("skipped EA %s\n",de->d_name));
2145 /* return the current size of the list of extended attribute names*/
2148 /* check size and copy entrieѕ + nul into list. */
2149 if ((len + listlen) > size) {
2154 strlcpy(list + len, de->d_name, listlen);
2160 if (closedir(dirp) == -1) {
2161 DEBUG(0,("closedir dirp failed: %s\n",strerror(errno)));
2167 static int solaris_unlinkat(int attrdirfd, const char *name)
2169 if (unlinkat(attrdirfd, name, 0) == -1) {
2170 if (errno == ENOENT) {
2178 static int solaris_attropen(const char *path, const char *attrpath, int oflag, mode_t mode)
2180 int filedes = attropen(path, attrpath, oflag, mode);
2181 if (filedes == -1) {
2182 DEBUG(10,("attropen FAILED: path: %s, name: %s, errno: %s\n",path,attrpath,strerror(errno)));
2183 if (errno == EINVAL) {
2192 static int solaris_openat(int fildes, const char *path, int oflag, mode_t mode)
2194 int filedes = openat(fildes, path, oflag, mode);
2195 if (filedes == -1) {
2196 DEBUG(10,("openat FAILED: fd: %d, path: %s, errno: %s\n",filedes,path,strerror(errno)));
2197 if (errno == EINVAL) {
2206 static int solaris_write_xattr(int attrfd, const char *value, size_t size)
2208 if ((ftruncate(attrfd, 0) == 0) && (write(attrfd, value, size) == size)) {
2211 DEBUG(10,("solaris_write_xattr FAILED!\n"));
2215 #endif /*HAVE_ATTROPEN*/
2218 /****************************************************************************
2219 Return the major devicenumber for UNIX extensions.
2220 ****************************************************************************/
2222 uint32 unix_dev_major(SMB_DEV_T dev)
2224 #if defined(HAVE_DEVICE_MAJOR_FN)
2225 return (uint32)major(dev);
2227 return (uint32)(dev >> 8);
2231 /****************************************************************************
2232 Return the minor devicenumber for UNIX extensions.
2233 ****************************************************************************/
2235 uint32 unix_dev_minor(SMB_DEV_T dev)
2237 #if defined(HAVE_DEVICE_MINOR_FN)
2238 return (uint32)minor(dev);
2240 return (uint32)(dev & 0xff);
2245 /*******************************************************************
2246 Return the number of CPUs.
2247 ********************************************************************/
2249 int sys_get_number_of_cores(void)
2253 #if defined(HAVE_SYSCONF)
2254 #if defined(_SC_NPROCESSORS_ONLN)
2255 ret = (int)sysconf(_SC_NPROCESSORS_ONLN);
2257 #if defined(_SC_NPROCESSORS_CONF)
2259 ret = (int)sysconf(_SC_NPROCESSORS_CONF);
2262 #elif defined(HAVE_SYSCTL) && defined(CTL_HW)
2264 unsigned int len = sizeof(ret);
2267 #if defined(HW_AVAILCPU)
2268 name[1] = HW_AVAILCPU;
2270 if (sysctl(name, 2, &ret, &len, NULL, 0) == -1) {
2274 #if defined(HW_NCPU)
2278 if (sysctl(nm, 2, &count, &len, NULL, 0) == -1) {
2291 #if defined(WITH_AIO)
2293 /*******************************************************************
2294 An aio_read wrapper.
2295 ********************************************************************/
2297 int sys_aio_read(SMB_STRUCT_AIOCB *aiocb)
2299 #if defined(HAVE_AIO_READ)
2300 return aio_read(aiocb);
2307 /*******************************************************************
2308 An aio_write wrapper.
2309 ********************************************************************/
2311 int sys_aio_write(SMB_STRUCT_AIOCB *aiocb)
2313 #if defined(HAVE_AIO_WRITE)
2314 return aio_write(aiocb);
2321 /*******************************************************************
2322 An aio_return wrapper.
2323 ********************************************************************/
2325 ssize_t sys_aio_return(SMB_STRUCT_AIOCB *aiocb)
2327 #if defined(HAVE_AIO_RETURN)
2328 return aio_return(aiocb);
2335 /*******************************************************************
2336 An aio_cancel wrapper.
2337 ********************************************************************/
2339 int sys_aio_cancel(int fd, SMB_STRUCT_AIOCB *aiocb)
2341 #if defined(HAVE_AIO_CANCEL)
2342 return aio_cancel(fd, aiocb);
2349 /*******************************************************************
2350 An aio_error wrapper.
2351 ********************************************************************/
2353 int sys_aio_error(const SMB_STRUCT_AIOCB *aiocb)
2355 #if defined(HAVE_AIO_ERROR)
2356 return aio_error(aiocb);
2363 /*******************************************************************
2364 An aio_fsync wrapper.
2365 ********************************************************************/
2367 int sys_aio_fsync(int op, SMB_STRUCT_AIOCB *aiocb)
2369 #if defined(HAVE_AIO_FSYNC)
2370 return aio_fsync(op, aiocb);
2377 /*******************************************************************
2378 An aio_fsync wrapper.
2379 ********************************************************************/
2381 int sys_aio_suspend(const SMB_STRUCT_AIOCB * const cblist[], int n, const struct timespec *timeout)
2383 #if defined(HAVE_AIO_FSYNC)
2384 return aio_suspend(cblist, n, timeout);
2390 #else /* !WITH_AIO */
2392 int sys_aio_read(SMB_STRUCT_AIOCB *aiocb)
2398 int sys_aio_write(SMB_STRUCT_AIOCB *aiocb)
2404 ssize_t sys_aio_return(SMB_STRUCT_AIOCB *aiocb)
2410 int sys_aio_cancel(int fd, SMB_STRUCT_AIOCB *aiocb)
2416 int sys_aio_error(const SMB_STRUCT_AIOCB *aiocb)
2422 int sys_aio_fsync(int op, SMB_STRUCT_AIOCB *aiocb)
2428 int sys_aio_suspend(const SMB_STRUCT_AIOCB * const cblist[], int n, const struct timespec *timeout)
2433 #endif /* WITH_AIO */