2 Unix SMB/CIFS implementation.
3 Samba utility functions
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Jeremy Allison 2001-2002
6 Copyright (C) Simo Sorce 2001-2011
7 Copyright (C) Jim McDonough (jmcd@us.ibm.com) 2003.
8 Copyright (C) James J Myers 2003
9 Copyright (C) Volker Lendecke 2010
11 This program is free software; you can redistribute it and/or modify
12 it under the terms of the GNU General Public License as published by
13 the Free Software Foundation; either version 3 of the License, or
14 (at your option) any later version.
16 This program is distributed in the hope that it will be useful,
17 but WITHOUT ANY WARRANTY; without even the implied warranty of
18 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 GNU General Public License for more details.
21 You should have received a copy of the GNU General Public License
22 along with this program. If not, see <http://www.gnu.org/licenses/>.
26 #include "system/network.h"
27 #include "system/filesys.h"
28 #include "system/locale.h"
29 #include "system/shmem.h"
30 #include "system/passwd.h"
41 * @brief Misc utility functions
45 Find a suitable temporary directory. The result should be copied immediately
46 as it may be overwritten by a subsequent call.
48 _PUBLIC_ const char *tmpdir(void)
51 if ((p = getenv("TMPDIR")))
58 Create a tmp file, open it and immediately unlink it.
59 If dir is NULL uses tmpdir()
60 Returns the file descriptor or -1 on error.
62 int create_unlink_tmp(const char *dir)
72 fname = talloc_asprintf(talloc_tos(), "%s/listenerlock_XXXXXX", dir);
77 mask = umask(S_IRWXO | S_IRWXG);
84 if (unlink(fname) == -1) {
85 int sys_errno = errno;
97 Check if a file exists - call vfs_file_exist for samba files.
99 _PUBLIC_ bool file_exist(const char *fname)
103 if (stat(fname, &st) != 0) {
107 return ((S_ISREG(st.st_mode)) || (S_ISFIFO(st.st_mode)));
111 Check a files mod time.
114 _PUBLIC_ time_t file_modtime(const char *fname)
118 if (stat(fname,&st) != 0)
125 Check if a directory exists.
128 _PUBLIC_ bool directory_exist(const char *dname)
133 if (stat(dname,&st) != 0) {
137 ret = S_ISDIR(st.st_mode);
144 * Try to create the specified directory if it didn't exist.
146 * @retval true if the directory already existed and has the right permissions
147 * or was successfully created.
149 _PUBLIC_ bool directory_create_or_exist(const char *dname,
156 ret = lstat(dname, &st);
160 if (errno != ENOENT) {
161 DEBUG(0, ("lstat failed on directory %s: %s\n",
162 dname, strerror(errno)));
166 /* Create directory */
167 old_umask = umask(0);
168 ret = mkdir(dname, dir_perms);
169 if (ret == -1 && errno != EEXIST) {
170 DEBUG(0, ("mkdir failed on directory "
178 ret = lstat(dname, &st);
180 DEBUG(0, ("lstat failed on created directory %s: %s\n",
181 dname, strerror(errno)));
190 * @brief Try to create a specified directory if it doesn't exist.
192 * The function creates a directory with the given uid and permissions if it
193 * doesn't exixt. If it exists it makes sure the uid and permissions are
194 * correct and it will fail if they are different.
196 * @param[in] dname The directory to create.
198 * @param[in] uid The uid the directory needs to belong too.
200 * @param[in] dir_perms The expected permissions of the directory.
202 * @return True on success, false on error.
204 _PUBLIC_ bool directory_create_or_exist_strict(const char *dname,
212 ok = directory_create_or_exist(dname, uid, dir_perms);
217 rc = lstat(dname, &st);
219 DEBUG(0, ("lstat failed on created directory %s: %s\n",
220 dname, strerror(errno)));
224 /* Check ownership and permission on existing directory */
225 if (!S_ISDIR(st.st_mode)) {
226 DEBUG(0, ("directory %s isn't a directory\n",
230 if (st.st_uid != uid && !uwrap_enabled()) {
231 DEBUG(0, ("invalid ownership on directory "
235 if ((st.st_mode & 0777) != dir_perms) {
236 DEBUG(0, ("invalid permissions on directory "
237 "'%s': has 0%o should be 0%o\n", dname,
238 (unsigned int)(st.st_mode & 0777), (unsigned int)dir_perms));
247 Sleep for a specified number of milliseconds.
250 _PUBLIC_ void smb_msleep(unsigned int t)
252 #if defined(HAVE_NANOSLEEP)
257 ts.tv_nsec = 1000000*(t%1000);
261 ret = nanosleep(&ts, &ts);
262 } while (ret < 0 && errno == EINTR && (ts.tv_sec > 0 || ts.tv_nsec > 0));
264 unsigned int tdiff=0;
265 struct timeval tval,t1,t2;
272 tval.tv_sec = (t-tdiff)/1000;
273 tval.tv_usec = 1000*((t-tdiff)%1000);
275 /* Never wait for more than 1 sec. */
276 if (tval.tv_sec > 1) {
283 select(0,&fds,NULL,NULL,&tval);
286 if (t2.tv_sec < t1.tv_sec) {
287 /* Someone adjusted time... */
291 tdiff = usec_time_diff(&t2,&t1)/1000;
297 Get my own name, return in talloc'ed storage.
300 _PUBLIC_ char *get_myname(TALLOC_CTX *ctx)
303 char hostname[HOST_NAME_MAX];
305 /* get my host name */
306 if (gethostname(hostname, sizeof(hostname)) == -1) {
307 DEBUG(0,("gethostname failed\n"));
311 /* Ensure null termination. */
312 hostname[sizeof(hostname)-1] = '\0';
314 /* split off any parts after an initial . */
315 p = strchr_m(hostname, '.');
320 return talloc_strdup(ctx, hostname);
324 Check if a process exists. Does this work on all unixes?
327 _PUBLIC_ bool process_exists_by_pid(pid_t pid)
329 /* Doing kill with a non-positive pid causes messages to be
330 * sent to places we don't want. */
334 return(kill(pid,0) == 0 || errno != ESRCH);
338 Simple routine to do POSIX file locking. Cruft in NFS and 64->32 bit mapping
339 is dealt with in posix.c
342 _PUBLIC_ bool fcntl_lock(int fd, int op, off_t offset, off_t count, int type)
347 DEBUG(8,("fcntl_lock %d %d %.0f %.0f %d\n",fd,op,(double)offset,(double)count,type));
350 lock.l_whence = SEEK_SET;
351 lock.l_start = offset;
355 ret = fcntl(fd,op,&lock);
357 if (ret == -1 && errno != 0)
358 DEBUG(3,("fcntl_lock: fcntl lock gave errno %d (%s)\n",errno,strerror(errno)));
363 (lock.l_type != F_UNLCK) &&
365 (lock.l_pid != getpid())) {
366 DEBUG(3,("fcntl_lock: fd %d is locked by pid %d\n",fd,(int)lock.l_pid));
370 /* it must be not locked or locked by me */
374 /* a lock set or unset */
376 DEBUG(3,("fcntl_lock: lock failed at offset %.0f count %.0f op %d type %d (%s)\n",
377 (double)offset,(double)count,op,type,strerror(errno)));
381 /* everything went OK */
382 DEBUG(8,("fcntl_lock: Lock call successful\n"));
387 struct debug_channel_level {
392 static void debugadd_channel_cb(const char *buf, void *private_data)
394 struct debug_channel_level *dcl =
395 (struct debug_channel_level *)private_data;
397 DEBUGADDC(dcl->channel, dcl->level,("%s", buf));
400 static void debugadd_cb(const char *buf, void *private_data)
402 int *plevel = (int *)private_data;
403 DEBUGADD(*plevel, ("%s", buf));
406 void print_asc_cb(const uint8_t *buf, int len,
407 void (*cb)(const char *buf, void *private_data),
414 for (i=0; i<len; i++) {
415 s[0] = isprint(buf[i]) ? buf[i] : '.';
420 void print_asc(int level, const uint8_t *buf,int len)
422 print_asc_cb(buf, len, debugadd_cb, &level);
426 * Write dump of binary data to a callback
428 void dump_data_cb(const uint8_t *buf, int len,
429 bool omit_zero_bytes,
430 void (*cb)(const char *buf, void *private_data),
434 static const uint8_t empty[16] = { 0, };
435 bool skipped = false;
443 if ((omit_zero_bytes == true) &&
446 (memcmp(&buf[i], &empty, 16) == 0))
453 snprintf(tmp, sizeof(tmp), "[%04X] ", i);
454 cb(tmp, private_data);
458 snprintf(tmp, sizeof(tmp), "%02X ", (int)buf[i]);
459 cb(tmp, private_data);
462 cb(" ", private_data);
466 print_asc_cb(&buf[i-16], 8, cb, private_data);
467 cb(" ", private_data);
468 print_asc_cb(&buf[i-8], 8, cb, private_data);
469 cb("\n", private_data);
471 if ((omit_zero_bytes == true) &&
473 (memcmp(&buf[i], &empty, 16) == 0)) {
475 cb("skipping zero buffer bytes\n",
486 cb(" ", private_data);
488 cb(" ", private_data);
491 cb(" ", private_data);
494 print_asc_cb(&buf[i-(i%16)], n, cb, private_data);
495 cb(" ", private_data);
498 print_asc_cb(&buf[i-n], n, cb, private_data);
500 cb("\n", private_data);
506 * Write dump of binary data to the log file.
508 * The data is only written if the log level is at least level.
510 _PUBLIC_ void dump_data(int level, const uint8_t *buf, int len)
512 if (!DEBUGLVL(level)) {
515 dump_data_cb(buf, len, false, debugadd_cb, &level);
519 * Write dump of binary data to the log file.
521 * The data is only written if the log level is at least level for
522 * debug class dbgc_class.
524 _PUBLIC_ void dump_data_dbgc(int dbgc_class, int level, const uint8_t *buf, int len)
526 struct debug_channel_level dcl = { dbgc_class, level };
528 if (!DEBUGLVLC(dbgc_class, level)) {
529 DEBUG(0, ("dbgc_class is %d\n", dbgc_class));
532 dump_data_cb(buf, len, false, debugadd_channel_cb, &dcl);
536 * Write dump of binary data to the log file.
538 * The data is only written if the log level is at least level.
539 * 16 zero bytes in a row are omitted
541 _PUBLIC_ void dump_data_skip_zeros(int level, const uint8_t *buf, int len)
543 if (!DEBUGLVL(level)) {
546 dump_data_cb(buf, len, true, debugadd_cb, &level);
549 static void fprintf_cb(const char *buf, void *private_data)
551 FILE *f = (FILE *)private_data;
552 fprintf(f, "%s", buf);
555 void dump_data_file(const uint8_t *buf, int len, bool omit_zero_bytes,
558 dump_data_cb(buf, len, omit_zero_bytes, fprintf_cb, f);
562 malloc that aborts with smb_panic on fail or zero size.
565 _PUBLIC_ void *smb_xmalloc(size_t size)
569 smb_panic("smb_xmalloc: called with zero size.\n");
570 if ((p = malloc(size)) == NULL)
571 smb_panic("smb_xmalloc: malloc fail.\n");
576 Memdup with smb_panic on fail.
579 _PUBLIC_ void *smb_xmemdup(const void *p, size_t size)
582 p2 = smb_xmalloc(size);
588 strdup that aborts on malloc fail.
591 char *smb_xstrdup(const char *s)
593 #if defined(PARANOID_MALLOC_CHECKER)
600 #define strdup rep_strdup
603 char *s1 = strdup(s);
604 #if defined(PARANOID_MALLOC_CHECKER)
608 #define strdup(s) __ERROR_DONT_USE_STRDUP_DIRECTLY
611 smb_panic("smb_xstrdup: malloc failed");
618 strndup that aborts on malloc fail.
621 char *smb_xstrndup(const char *s, size_t n)
623 #if defined(PARANOID_MALLOC_CHECKER)
629 #if (defined(BROKEN_STRNDUP) || !defined(HAVE_STRNDUP))
631 #define strndup rep_strndup
634 char *s1 = strndup(s, n);
635 #if defined(PARANOID_MALLOC_CHECKER)
639 #define strndup(s,n) __ERROR_DONT_USE_STRNDUP_DIRECTLY
642 smb_panic("smb_xstrndup: malloc failed");
650 Like strdup but for memory.
653 _PUBLIC_ void *memdup(const void *p, size_t size)
666 * Write a password to the log file.
668 * @note Only actually does something if DEBUG_PASSWORD was defined during
671 _PUBLIC_ void dump_data_pw(const char *msg, const uint8_t * data, size_t len)
673 #ifdef DEBUG_PASSWORD
674 DEBUG(11, ("%s", msg));
675 if (data != NULL && len > 0)
677 dump_data(11, data, len);
684 * see if a range of memory is all zero. A NULL pointer is considered
687 _PUBLIC_ bool all_zero(const uint8_t *ptr, size_t size)
690 if (!ptr) return true;
691 for (i=0;i<size;i++) {
692 if (ptr[i]) return false;
698 realloc an array, checking for integer overflow in the array size
700 _PUBLIC_ void *realloc_array(void *ptr, size_t el_size, unsigned count, bool free_on_fail)
702 #define MAX_MALLOC_SIZE 0x7fffffff
704 count >= MAX_MALLOC_SIZE/el_size) {
710 return malloc(el_size * count);
712 return realloc(ptr, el_size * count);
715 /****************************************************************************
717 ****************************************************************************/
719 void *malloc_array(size_t el_size, unsigned int count)
721 return realloc_array(NULL, el_size, count, false);
724 /****************************************************************************
726 ****************************************************************************/
728 void *memalign_array(size_t el_size, size_t align, unsigned int count)
730 if (count*el_size >= MAX_MALLOC_SIZE) {
734 return memalign(align, el_size*count);
737 /****************************************************************************
739 ****************************************************************************/
741 void *calloc_array(size_t size, size_t nmemb)
743 if (nmemb >= MAX_MALLOC_SIZE/size) {
746 if (size == 0 || nmemb == 0) {
749 return calloc(nmemb, size);
753 Trim the specified elements off the front and back of a string.
755 _PUBLIC_ bool trim_string(char *s, const char *front, const char *back)
762 /* Ignore null or empty strings. */
763 if (!s || (s[0] == '\0'))
766 front_len = front? strlen(front) : 0;
767 back_len = back? strlen(back) : 0;
772 while (len && strncmp(s, front, front_len)==0) {
773 /* Must use memmove here as src & dest can
774 * easily overlap. Found by valgrind. JRA. */
775 memmove(s, s+front_len, (len-front_len)+1);
782 while ((len >= back_len) && strncmp(s+len-back_len,back,back_len)==0) {
783 s[len-back_len]='\0';
792 Find the number of 'c' chars in a string
794 _PUBLIC_ _PURE_ size_t count_chars(const char *s, char c)
799 if (*s == c) count++;
807 * Routine to get hex characters and turn them into a byte array.
808 * the array can be variable length.
809 * - "0xnn" or "0Xnn" is specially catered for.
810 * - The first non-hex-digit character (apart from possibly leading "0x"
811 * finishes the conversion and skips the rest of the input.
812 * - A single hex-digit character at the end of the string is skipped.
814 * valid examples: "0A5D15"; "0x123456"
816 _PUBLIC_ size_t strhex_to_str(char *p, size_t p_len, const char *strhex, size_t strhex_len)
819 size_t num_chars = 0;
820 uint8_t lonybble, hinybble;
821 const char *hexchars = "0123456789ABCDEF";
822 char *p1 = NULL, *p2 = NULL;
824 /* skip leading 0x prefix */
825 if (strncasecmp(strhex, "0x", 2) == 0) {
826 i += 2; /* skip two chars */
829 for (; i+1 < strhex_len && strhex[i] != 0 && strhex[i+1] != 0; i++) {
830 p1 = strchr(hexchars, toupper((unsigned char)strhex[i]));
835 i++; /* next hex digit */
837 p2 = strchr(hexchars, toupper((unsigned char)strhex[i]));
842 /* get the two nybbles */
843 hinybble = PTR_DIFF(p1, hexchars);
844 lonybble = PTR_DIFF(p2, hexchars);
846 if (num_chars >= p_len) {
850 p[num_chars] = (hinybble << 4) | lonybble;
860 * Parse a hex string and return a data blob.
862 _PUBLIC_ _PURE_ DATA_BLOB strhex_to_data_blob(TALLOC_CTX *mem_ctx, const char *strhex)
864 DATA_BLOB ret_blob = data_blob_talloc(mem_ctx, NULL, strlen(strhex)/2+1);
866 ret_blob.length = strhex_to_str((char *)ret_blob.data, ret_blob.length,
874 * Print a buf in hex. Assumes dst is at least (srclen*2)+1 large.
876 _PUBLIC_ void hex_encode_buf(char *dst, const uint8_t *src, size_t srclen)
879 for (i=0; i<srclen; i++) {
880 snprintf(dst + i*2, 3, "%02X", src[i]);
883 * Ensure 0-termination for 0-length buffers
885 dst[srclen*2] = '\0';
889 * Routine to print a buffer as HEX digits, into an allocated string.
891 _PUBLIC_ void hex_encode(const unsigned char *buff_in, size_t len, char **out_hex_buffer)
895 *out_hex_buffer = malloc_array_p(char, (len*2)+1);
896 hex_buffer = *out_hex_buffer;
897 hex_encode_buf(hex_buffer, buff_in, len);
901 * talloc version of hex_encode()
903 _PUBLIC_ char *hex_encode_talloc(TALLOC_CTX *mem_ctx, const unsigned char *buff_in, size_t len)
907 hex_buffer = talloc_array(mem_ctx, char, (len*2)+1);
911 hex_encode_buf(hex_buffer, buff_in, len);
912 talloc_set_name_const(hex_buffer, hex_buffer);
917 varient of strcmp() that handles NULL ptrs
919 _PUBLIC_ int strcmp_safe(const char *s1, const char *s2)
924 if (s1 == NULL || s2 == NULL) {
927 return strcmp(s1, s2);
932 return the number of bytes occupied by a buffer in ASCII format
933 the result includes the null termination
936 _PUBLIC_ size_t ascii_len_n(const char *src, size_t n)
940 len = strnlen(src, n);
949 Set a boolean variable from the text value stored in the passed string.
950 Returns true in success, false if the passed string does not correctly
954 _PUBLIC_ bool set_boolean(const char *boolean_string, bool *boolean)
956 if (strwicmp(boolean_string, "yes") == 0 ||
957 strwicmp(boolean_string, "true") == 0 ||
958 strwicmp(boolean_string, "on") == 0 ||
959 strwicmp(boolean_string, "1") == 0) {
962 } else if (strwicmp(boolean_string, "no") == 0 ||
963 strwicmp(boolean_string, "false") == 0 ||
964 strwicmp(boolean_string, "off") == 0 ||
965 strwicmp(boolean_string, "0") == 0) {
973 return the number of bytes occupied by a buffer in CH_UTF16 format
974 the result includes the null termination
976 _PUBLIC_ size_t utf16_len(const void *buf)
980 for (len = 0; SVAL(buf,len); len += 2) ;
986 return the number of bytes occupied by a buffer in CH_UTF16 format
987 the result includes the null termination
990 _PUBLIC_ size_t utf16_len_n(const void *src, size_t n)
994 for (len = 0; (len+2 < n) && SVAL(src, len); len += 2) ;
1005 * @brief String utilities.
1008 static bool next_token_internal_talloc(TALLOC_CTX *ctx,
1015 const char *saved_s;
1027 /* default to simple separators */
1032 /* find the first non sep char, if left-trimming is requested */
1034 while (*s && strchr_m(sep,*s)) {
1044 /* When restarting we need to go from here. */
1047 /* Work out the length needed. */
1048 for (quoted = false; *s &&
1049 (quoted || !strchr_m(sep,*s)); s++) {
1057 /* We started with len = 1 so we have space for the nul. */
1058 *pp_buff = talloc_array(ctx, char, len);
1063 /* copy over the token */
1066 for (quoted = false; *s &&
1067 (quoted || !strchr_m(sep,*s)); s++) {
1075 *ptr = (*s) ? s+1 : s;
1081 bool next_token_talloc(TALLOC_CTX *ctx,
1086 return next_token_internal_talloc(ctx, ptr, pp_buff, sep, true);
1090 * Get the next token from a string, return false if none found. Handles
1091 * double-quotes. This version does not trim leading separator characters
1092 * before looking for a token.
1095 bool next_token_no_ltrim_talloc(TALLOC_CTX *ctx,
1100 return next_token_internal_talloc(ctx, ptr, pp_buff, sep, false);
1104 * Get the next token from a string, return False if none found.
1105 * Handles double-quotes.
1107 * Based on a routine by GJC@VILLAGE.COM.
1108 * Extensively modified by Andrew.Tridgell@anu.edu.au
1110 _PUBLIC_ bool next_token(const char **ptr,char *buff, const char *sep, size_t bufsize)
1121 /* default to simple separators */
1125 /* find the first non sep char */
1126 while (*s && strchr_m(sep,*s))
1133 /* copy over the token */
1134 for (quoted = false; len < bufsize && *s && (quoted || !strchr_m(sep,*s)); s++) {
1143 *ptr = (*s) ? s+1 : s;
1149 struct anonymous_shared_header {
1156 /* Map a shared memory buffer of at least nelem counters. */
1157 void *anonymous_shared_allocate(size_t orig_bufsz)
1161 size_t pagesz = getpagesize();
1163 size_t bufsz = orig_bufsz;
1164 struct anonymous_shared_header *hdr;
1166 bufsz += sizeof(*hdr);
1168 /* round up to full pages */
1169 pagecnt = bufsz / pagesz;
1170 if (bufsz % pagesz) {
1173 bufsz = pagesz * pagecnt;
1175 if (orig_bufsz >= bufsz) {
1183 buf = mmap(NULL, bufsz, PROT_READ|PROT_WRITE, MAP_ANON|MAP_SHARED,
1184 -1 /* fd */, 0 /* offset */);
1190 fd = open("/dev/zero", O_RDWR);
1195 buf = mmap(NULL, bufsz, PROT_READ|PROT_WRITE, MAP_FILE|MAP_SHARED,
1196 fd, 0 /* offset */);
1197 saved_errno = errno;
1199 errno = saved_errno;
1203 if (buf == MAP_FAILED) {
1207 hdr = (struct anonymous_shared_header *)buf;
1208 hdr->u.length = bufsz;
1210 ptr = (void *)(&hdr[1]);
1215 void *anonymous_shared_resize(void *ptr, size_t new_size, bool maymove)
1219 size_t pagesz = getpagesize();
1222 struct anonymous_shared_header *hdr;
1230 hdr = (struct anonymous_shared_header *)ptr;
1232 if (hdr->u.length > (new_size + sizeof(*hdr))) {
1237 bufsz = new_size + sizeof(*hdr);
1239 /* round up to full pages */
1240 pagecnt = bufsz / pagesz;
1241 if (bufsz % pagesz) {
1244 bufsz = pagesz * pagecnt;
1246 if (new_size >= bufsz) {
1252 if (bufsz <= hdr->u.length) {
1257 flags = MREMAP_MAYMOVE;
1260 buf = mremap(hdr, hdr->u.length, bufsz, flags);
1262 if (buf == MAP_FAILED) {
1267 hdr = (struct anonymous_shared_header *)buf;
1268 hdr->u.length = bufsz;
1270 ptr = (void *)(&hdr[1]);
1279 void anonymous_shared_free(void *ptr)
1281 struct anonymous_shared_header *hdr;
1287 hdr = (struct anonymous_shared_header *)ptr;
1291 munmap(hdr, hdr->u.length);
1295 /* used when you want a debugger started at a particular point in the
1296 code. Mostly useful in code that runs as a child process, where
1297 normal gdb attach is harder to organise.
1299 void samba_start_debugger(void)
1302 if (asprintf(&cmd, "xterm -e \"gdb --pid %u\"&", getpid()) == -1) {
1305 if (system(cmd) == -1) {