2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Jeremy Allison 1998-2005
6 Copyright (C) Timur Bakeyev 2005
7 Copyright (C) Bjoern Jacke 2006-2007
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "system/syslog.h"
25 #include "system/capability.h"
26 #include "system/passwd.h"
27 #include "system/filesys.h"
29 #ifdef HAVE_SYS_SYSCTL_H
30 #include <sys/sysctl.h>
33 #ifdef HAVE_SYS_PRCTL_H
34 #include <sys/prctl.h>
38 The idea is that this file will eventually have wrappers around all
39 important system calls in samba. The aims are:
41 - to enable easier porting by putting OS dependent stuff in here
43 - to allow for hooks into other "pseudo-filesystems"
45 - to allow easier integration of things like the japanese extensions
47 - to support the philosophy of Samba to expose the features of
48 the OS within the SMB model. In general whatever file/printer/variable
49 expansions/etc make sense to the OS should be acceptable to Samba.
54 /*******************************************************************
55 A read wrapper that will deal with EINTR.
56 ********************************************************************/
58 ssize_t sys_read(int fd, void *buf, size_t count)
63 ret = read(fd, buf, count);
64 #if defined(EWOULDBLOCK)
65 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
67 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
72 /*******************************************************************
73 A write wrapper that will deal with EINTR.
74 ********************************************************************/
76 ssize_t sys_write(int fd, const void *buf, size_t count)
81 ret = write(fd, buf, count);
82 #if defined(EWOULDBLOCK)
83 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
85 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
90 /*******************************************************************
91 A writev wrapper that will deal with EINTR.
92 ********************************************************************/
94 ssize_t sys_writev(int fd, const struct iovec *iov, int iovcnt)
99 /* Try to confuse write_data_iov a bit */
100 if ((random() % 5) == 0) {
101 return sys_write(fd, iov[0].iov_base, iov[0].iov_len);
103 if (iov[0].iov_len > 1) {
104 return sys_write(fd, iov[0].iov_base,
105 (random() % (iov[0].iov_len-1)) + 1);
110 ret = writev(fd, iov, iovcnt);
111 #if defined(EWOULDBLOCK)
112 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
114 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
119 /*******************************************************************
120 A pread wrapper that will deal with EINTR
121 ********************************************************************/
123 #if defined(HAVE_PREAD)
124 ssize_t sys_pread(int fd, void *buf, size_t count, SMB_OFF_T off)
129 ret = pread(fd, buf, count, off);
130 } while (ret == -1 && errno == EINTR);
135 /*******************************************************************
136 A write wrapper that will deal with EINTR
137 ********************************************************************/
139 #if defined(HAVE_PWRITE)
140 ssize_t sys_pwrite(int fd, const void *buf, size_t count, SMB_OFF_T off)
145 ret = pwrite(fd, buf, count, off);
146 } while (ret == -1 && errno == EINTR);
151 /*******************************************************************
152 A send wrapper that will deal with EINTR or EAGAIN or EWOULDBLOCK.
153 ********************************************************************/
155 ssize_t sys_send(int s, const void *msg, size_t len, int flags)
160 ret = send(s, msg, len, flags);
161 #if defined(EWOULDBLOCK)
162 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
164 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
169 /*******************************************************************
170 A recvfrom wrapper that will deal with EINTR.
171 ********************************************************************/
173 ssize_t sys_recvfrom(int s, void *buf, size_t len, int flags, struct sockaddr *from, socklen_t *fromlen)
178 ret = recvfrom(s, buf, len, flags, from, fromlen);
179 #if defined(EWOULDBLOCK)
180 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
182 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
187 /*******************************************************************
188 A fcntl wrapper that will deal with EINTR.
189 ********************************************************************/
191 int sys_fcntl_ptr(int fd, int cmd, void *arg)
196 ret = fcntl(fd, cmd, arg);
197 } while (ret == -1 && errno == EINTR);
201 /****************************************************************************
202 Get/Set all the possible time fields from a stat struct as a timespec.
203 ****************************************************************************/
205 static struct timespec get_atimespec(const struct stat *pst)
207 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
210 /* Old system - no ns timestamp. */
211 ret.tv_sec = pst->st_atime;
215 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
217 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
219 ret.tv_sec = pst->st_atime;
220 ret.tv_nsec = pst->st_atimensec;
222 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
224 ret.tv_sec = pst->st_atime;
225 ret.tv_nsec = pst->st_atime_n;
227 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
229 ret.tv_sec = pst->st_atime;
230 ret.tv_nsec = pst->st_uatime * 1000;
232 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
233 return pst->st_atimespec;
235 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
240 static struct timespec get_mtimespec(const struct stat *pst)
242 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
245 /* Old system - no ns timestamp. */
246 ret.tv_sec = pst->st_mtime;
250 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
252 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
254 ret.tv_sec = pst->st_mtime;
255 ret.tv_nsec = pst->st_mtimensec;
257 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
259 ret.tv_sec = pst->st_mtime;
260 ret.tv_nsec = pst->st_mtime_n;
262 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
264 ret.tv_sec = pst->st_mtime;
265 ret.tv_nsec = pst->st_umtime * 1000;
267 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
268 return pst->st_mtimespec;
270 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
275 static struct timespec get_ctimespec(const struct stat *pst)
277 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
280 /* Old system - no ns timestamp. */
281 ret.tv_sec = pst->st_ctime;
285 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
287 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
289 ret.tv_sec = pst->st_ctime;
290 ret.tv_nsec = pst->st_ctimensec;
292 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
294 ret.tv_sec = pst->st_ctime;
295 ret.tv_nsec = pst->st_ctime_n;
297 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
299 ret.tv_sec = pst->st_ctime;
300 ret.tv_nsec = pst->st_uctime * 1000;
302 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
303 return pst->st_ctimespec;
305 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
310 /****************************************************************************
311 Return the best approximation to a 'create time' under UNIX from a stat
313 ****************************************************************************/
315 static struct timespec calc_create_time_stat(const struct stat *st)
317 struct timespec ret, ret1;
318 struct timespec c_time = get_ctimespec(st);
319 struct timespec m_time = get_mtimespec(st);
320 struct timespec a_time = get_atimespec(st);
322 ret = timespec_compare(&c_time, &m_time) < 0 ? c_time : m_time;
323 ret1 = timespec_compare(&ret, &a_time) < 0 ? ret : a_time;
325 if(!null_timespec(ret1)) {
330 * One of ctime, mtime or atime was zero (probably atime).
331 * Just return MIN(ctime, mtime).
336 /****************************************************************************
337 Return the best approximation to a 'create time' under UNIX from a stat_ex
339 ****************************************************************************/
341 static struct timespec calc_create_time_stat_ex(const struct stat_ex *st)
343 struct timespec ret, ret1;
344 struct timespec c_time = st->st_ex_ctime;
345 struct timespec m_time = st->st_ex_mtime;
346 struct timespec a_time = st->st_ex_atime;
348 ret = timespec_compare(&c_time, &m_time) < 0 ? c_time : m_time;
349 ret1 = timespec_compare(&ret, &a_time) < 0 ? ret : a_time;
351 if(!null_timespec(ret1)) {
356 * One of ctime, mtime or atime was zero (probably atime).
357 * Just return MIN(ctime, mtime).
362 /****************************************************************************
363 Return the 'create time' from a stat struct if it exists (birthtime) or else
364 use the best approximation.
365 ****************************************************************************/
367 static void make_create_timespec(const struct stat *pst, struct stat_ex *dst,
368 bool fake_dir_create_times)
370 if (S_ISDIR(pst->st_mode) && fake_dir_create_times) {
371 dst->st_ex_btime.tv_sec = 315493200L; /* 1/1/1980 */
372 dst->st_ex_btime.tv_nsec = 0;
375 dst->st_ex_calculated_birthtime = false;
377 #if defined(HAVE_STRUCT_STAT_ST_BIRTHTIMESPEC_TV_NSEC)
378 dst->st_ex_btime = pst->st_birthtimespec;
379 #elif defined(HAVE_STRUCT_STAT_ST_BIRTHTIMENSEC)
380 dst->st_ex_btime.tv_sec = pst->st_birthtime;
381 dst->st_ex_btime.tv_nsec = pst->st_birthtimenspec;
382 #elif defined(HAVE_STRUCT_STAT_ST_BIRTHTIME)
383 dst->st_ex_btime.tv_sec = pst->st_birthtime;
384 dst->st_ex_btime.tv_nsec = 0;
386 dst->st_ex_btime = calc_create_time_stat(pst);
387 dst->st_ex_calculated_birthtime = true;
390 /* Deal with systems that don't initialize birthtime correctly.
391 * Pointed out by SATOH Fumiyasu <fumiyas@osstech.jp>.
393 if (null_timespec(dst->st_ex_btime)) {
394 dst->st_ex_btime = calc_create_time_stat(pst);
395 dst->st_ex_calculated_birthtime = true;
399 /****************************************************************************
400 If we update a timestamp in a stat_ex struct we may have to recalculate
401 the birthtime. For now only implement this for write time, but we may
402 also need to do it for atime and ctime. JRA.
403 ****************************************************************************/
405 void update_stat_ex_mtime(struct stat_ex *dst,
406 struct timespec write_ts)
408 dst->st_ex_mtime = write_ts;
410 /* We may have to recalculate btime. */
411 if (dst->st_ex_calculated_birthtime) {
412 dst->st_ex_btime = calc_create_time_stat_ex(dst);
416 void update_stat_ex_create_time(struct stat_ex *dst,
417 struct timespec create_time)
419 dst->st_ex_btime = create_time;
420 dst->st_ex_calculated_birthtime = false;
423 void init_stat_ex_from_stat (struct stat_ex *dst,
424 const struct stat *src,
425 bool fake_dir_create_times)
427 dst->st_ex_dev = src->st_dev;
428 dst->st_ex_ino = src->st_ino;
429 dst->st_ex_mode = src->st_mode;
430 dst->st_ex_nlink = src->st_nlink;
431 dst->st_ex_uid = src->st_uid;
432 dst->st_ex_gid = src->st_gid;
433 dst->st_ex_rdev = src->st_rdev;
434 dst->st_ex_size = src->st_size;
435 dst->st_ex_atime = get_atimespec(src);
436 dst->st_ex_mtime = get_mtimespec(src);
437 dst->st_ex_ctime = get_ctimespec(src);
438 make_create_timespec(src, dst, fake_dir_create_times);
439 #ifdef HAVE_STAT_ST_BLKSIZE
440 dst->st_ex_blksize = src->st_blksize;
442 dst->st_ex_blksize = STAT_ST_BLOCKSIZE;
445 #ifdef HAVE_STAT_ST_BLOCKS
446 dst->st_ex_blocks = src->st_blocks;
448 dst->st_ex_blocks = src->st_size / dst->st_ex_blksize + 1;
451 #ifdef HAVE_STAT_ST_FLAGS
452 dst->st_ex_flags = src->st_flags;
454 dst->st_ex_flags = 0;
458 /*******************************************************************
460 ********************************************************************/
462 int sys_stat(const char *fname, SMB_STRUCT_STAT *sbuf,
463 bool fake_dir_create_times)
467 ret = stat(fname, &statbuf);
469 /* we always want directories to appear zero size */
470 if (S_ISDIR(statbuf.st_mode)) {
473 init_stat_ex_from_stat(sbuf, &statbuf, fake_dir_create_times);
478 /*******************************************************************
480 ********************************************************************/
482 int sys_fstat(int fd, SMB_STRUCT_STAT *sbuf, bool fake_dir_create_times)
486 ret = fstat(fd, &statbuf);
488 /* we always want directories to appear zero size */
489 if (S_ISDIR(statbuf.st_mode)) {
492 init_stat_ex_from_stat(sbuf, &statbuf, fake_dir_create_times);
497 /*******************************************************************
499 ********************************************************************/
501 int sys_lstat(const char *fname,SMB_STRUCT_STAT *sbuf,
502 bool fake_dir_create_times)
506 ret = lstat(fname, &statbuf);
508 /* we always want directories to appear zero size */
509 if (S_ISDIR(statbuf.st_mode)) {
512 init_stat_ex_from_stat(sbuf, &statbuf, fake_dir_create_times);
517 /*******************************************************************
518 An posix_fallocate() wrapper.
519 ********************************************************************/
520 int sys_posix_fallocate(int fd, SMB_OFF_T offset, SMB_OFF_T len)
522 #if defined(HAVE_POSIX_FALLOCATE) && !defined(HAVE_BROKEN_POSIX_FALLOCATE)
523 return posix_fallocate(fd, offset, len);
524 #elif defined(F_RESVSP64)
525 /* this handles XFS on IRIX */
527 SMB_OFF_T new_len = offset + len;
531 /* unlikely to get a too large file on a 64bit system but ... */
535 fl.l_whence = SEEK_SET;
539 ret=fcntl(fd, F_RESVSP64, &fl);
544 /* Make sure the file gets enlarged after we allocated space: */
546 if (new_len > sbuf.st_size)
547 ftruncate64(fd, new_len);
554 /*******************************************************************
555 An fallocate() function that matches the semantics of the Linux one.
556 ********************************************************************/
558 #ifdef HAVE_LINUX_FALLOC_H
559 #include <linux/falloc.h>
562 int sys_fallocate(int fd, enum vfs_fallocate_mode mode, SMB_OFF_T offset, SMB_OFF_T len)
564 #if defined(HAVE_LINUX_FALLOCATE64) || defined(HAVE_LINUX_FALLOCATE)
567 case VFS_FALLOCATE_EXTEND_SIZE:
570 case VFS_FALLOCATE_KEEP_SIZE:
571 lmode = FALLOC_FL_KEEP_SIZE;
577 #if defined(HAVE_LINUX_FALLOCATE)
578 return fallocate(fd, lmode, offset, len);
581 /* TODO - plumb in fallocate from other filesysetms like VXFS etc. JRA. */
587 /*******************************************************************
589 ********************************************************************/
591 int sys_creat(const char *path, mode_t mode)
593 return creat(path, mode);
596 /*******************************************************************
598 ********************************************************************/
600 int sys_open(const char *path, int oflag, mode_t mode)
602 return open(path, oflag, mode);
605 /*******************************************************************
607 ********************************************************************/
609 FILE *sys_fopen(const char *path, const char *type)
611 return fopen(path, type);
615 #if HAVE_KERNEL_SHARE_MODES
617 #define LOCK_MAND 32 /* This is a mandatory flock */
618 #define LOCK_READ 64 /* ... Which allows concurrent read operations */
619 #define LOCK_WRITE 128 /* ... Which allows concurrent write operations */
620 #define LOCK_RW 192 /* ... Which allows concurrent read & write ops */
624 /*******************************************************************
625 A flock() wrapper that will perform the kernel flock.
626 ********************************************************************/
628 void kernel_flock(int fd, uint32 share_mode, uint32 access_mask)
630 #if HAVE_KERNEL_SHARE_MODES
632 if (share_mode == FILE_SHARE_WRITE) {
633 kernel_mode = LOCK_MAND|LOCK_WRITE;
634 } else if (share_mode == FILE_SHARE_READ) {
635 kernel_mode = LOCK_MAND|LOCK_READ;
636 } else if (share_mode == FILE_SHARE_NONE) {
637 kernel_mode = LOCK_MAND;
640 flock(fd, kernel_mode);
648 /*******************************************************************
650 ********************************************************************/
652 SMB_STRUCT_DIR *sys_opendir(const char *name)
654 return opendir(name);
657 /*******************************************************************
658 An fdopendir wrapper.
659 Ugly hack - we need dirfd for this to work correctly in the
661 ********************************************************************/
663 SMB_STRUCT_DIR *sys_fdopendir(int fd)
665 #if defined(HAVE_FDOPENDIR) && defined(HAVE_DIRFD)
666 return fdopendir(fd);
673 /*******************************************************************
675 ********************************************************************/
677 SMB_STRUCT_DIRENT *sys_readdir(SMB_STRUCT_DIR *dirp)
679 return readdir(dirp);
682 /*******************************************************************
684 ********************************************************************/
686 void sys_seekdir(SMB_STRUCT_DIR *dirp, long offset)
688 seekdir(dirp, offset);
691 /*******************************************************************
693 ********************************************************************/
695 long sys_telldir(SMB_STRUCT_DIR *dirp)
697 return (long)telldir(dirp);
700 /*******************************************************************
702 ********************************************************************/
704 void sys_rewinddir(SMB_STRUCT_DIR *dirp)
709 /*******************************************************************
711 ********************************************************************/
713 int sys_closedir(SMB_STRUCT_DIR *dirp)
715 return closedir(dirp);
718 /*******************************************************************
720 ********************************************************************/
722 int sys_mknod(const char *path, mode_t mode, SMB_DEV_T dev)
724 #if defined(HAVE_MKNOD)
725 return mknod(path, mode, dev);
727 /* No mknod system call. */
733 /*******************************************************************
734 The wait() calls vary between systems
735 ********************************************************************/
737 int sys_waitpid(pid_t pid,int *status,int options)
740 return waitpid(pid,status,options);
741 #else /* HAVE_WAITPID */
742 return wait4(pid, status, options, NULL);
743 #endif /* HAVE_WAITPID */
746 /*******************************************************************
747 System wrapper for getwd. Always returns MALLOC'ed memory, or NULL
748 on error (malloc fail usually).
749 ********************************************************************/
751 char *sys_getwd(void)
753 #ifdef GETCWD_TAKES_NULL
754 return getcwd(NULL, 0);
756 char *wd = NULL, *s = NULL;
757 size_t allocated = PATH_MAX;
760 s = SMB_REALLOC_ARRAY(s, char, allocated);
764 wd = getcwd(s, allocated);
768 if (errno != ERANGE) {
773 if (allocated < PATH_MAX) {
780 char *s = SMB_MALLOC_ARRAY(char, PATH_MAX);
788 #if defined(HAVE_POSIX_CAPABILITIES)
790 /**************************************************************************
791 Try and abstract process capabilities (for systems that have them).
792 ****************************************************************************/
794 /* Set the POSIX capabilities needed for the given purpose into the effective
795 * capability set of the current process. Make sure they are always removed
796 * from the inheritable set, because there is no circumstance in which our
797 * children should inherit our elevated privileges.
799 static bool set_process_capability(enum smbd_capability capability,
802 cap_value_t cap_vals[2] = {0};
803 int num_cap_vals = 0;
807 #if defined(HAVE_PRCTL) && defined(PR_GET_KEEPCAPS) && defined(PR_SET_KEEPCAPS)
808 /* On Linux, make sure that any capabilities we grab are sticky
809 * across UID changes. We expect that this would allow us to keep both
810 * the effective and permitted capability sets, but as of circa 2.6.16,
811 * only the permitted set is kept. It is a bug (which we work around)
812 * that the effective set is lost, but we still require the effective
815 if (!prctl(PR_GET_KEEPCAPS)) {
816 prctl(PR_SET_KEEPCAPS, 1);
820 cap = cap_get_proc();
822 DEBUG(0,("set_process_capability: cap_get_proc failed: %s\n",
827 switch (capability) {
828 case KERNEL_OPLOCK_CAPABILITY:
829 #ifdef CAP_NETWORK_MGT
830 /* IRIX has CAP_NETWORK_MGT for oplocks. */
831 cap_vals[num_cap_vals++] = CAP_NETWORK_MGT;
834 case DMAPI_ACCESS_CAPABILITY:
835 #ifdef CAP_DEVICE_MGT
836 /* IRIX has CAP_DEVICE_MGT for DMAPI access. */
837 cap_vals[num_cap_vals++] = CAP_DEVICE_MGT;
839 /* Linux has CAP_MKNOD for DMAPI access. */
840 cap_vals[num_cap_vals++] = CAP_MKNOD;
843 case LEASE_CAPABILITY:
845 cap_vals[num_cap_vals++] = CAP_LEASE;
850 SMB_ASSERT(num_cap_vals <= ARRAY_SIZE(cap_vals));
852 if (num_cap_vals == 0) {
857 cap_set_flag(cap, CAP_EFFECTIVE, num_cap_vals, cap_vals,
858 enable ? CAP_SET : CAP_CLEAR);
860 /* We never want to pass capabilities down to our children, so make
861 * sure they are not inherited.
863 cap_set_flag(cap, CAP_INHERITABLE, num_cap_vals, cap_vals, CAP_CLEAR);
865 if (cap_set_proc(cap) == -1) {
866 DEBUG(0, ("set_process_capability: cap_set_proc failed: %s\n",
876 #endif /* HAVE_POSIX_CAPABILITIES */
878 /****************************************************************************
879 Gain the oplock capability from the kernel if possible.
880 ****************************************************************************/
882 void set_effective_capability(enum smbd_capability capability)
884 #if defined(HAVE_POSIX_CAPABILITIES)
885 set_process_capability(capability, True);
886 #endif /* HAVE_POSIX_CAPABILITIES */
889 void drop_effective_capability(enum smbd_capability capability)
891 #if defined(HAVE_POSIX_CAPABILITIES)
892 set_process_capability(capability, False);
893 #endif /* HAVE_POSIX_CAPABILITIES */
896 /**************************************************************************
897 Wrapper for random().
898 ****************************************************************************/
900 long sys_random(void)
902 #if defined(HAVE_RANDOM)
903 return (long)random();
904 #elif defined(HAVE_RAND)
907 DEBUG(0,("Error - no random function available !\n"));
912 /**************************************************************************
913 Wrapper for srandom().
914 ****************************************************************************/
916 void sys_srandom(unsigned int seed)
918 #if defined(HAVE_SRANDOM)
920 #elif defined(HAVE_SRAND)
923 DEBUG(0,("Error - no srandom function available !\n"));
929 #define NGROUPS_MAX 32 /* Guess... */
932 /**************************************************************************
933 Returns equivalent to NGROUPS_MAX - using sysconf if needed.
934 ****************************************************************************/
938 #if defined(SYSCONF_SC_NGROUPS_MAX)
939 int ret = sysconf(_SC_NGROUPS_MAX);
940 return (ret == -1) ? NGROUPS_MAX : ret;
946 /**************************************************************************
947 Wrap setgroups and getgroups for systems that declare getgroups() as
948 returning an array of gid_t, but actuall return an array of int.
949 ****************************************************************************/
951 #if defined(HAVE_BROKEN_GETGROUPS)
953 #ifdef HAVE_BROKEN_GETGROUPS
959 static int sys_broken_getgroups(int setlen, gid_t *gidset)
966 return getgroups(setlen, &gid);
970 * Broken case. We need to allocate a
971 * GID_T array of size setlen.
980 setlen = groups_max();
982 if((group_list = SMB_MALLOC_ARRAY(GID_T, setlen)) == NULL) {
983 DEBUG(0,("sys_getgroups: Malloc fail.\n"));
987 if((ngroups = getgroups(setlen, group_list)) < 0) {
988 int saved_errno = errno;
989 SAFE_FREE(group_list);
994 for(i = 0; i < ngroups; i++)
995 gidset[i] = (gid_t)group_list[i];
997 SAFE_FREE(group_list);
1001 static int sys_broken_setgroups(int setlen, gid_t *gidset)
1009 if (setlen < 0 || setlen > groups_max()) {
1015 * Broken case. We need to allocate a
1016 * GID_T array of size setlen.
1019 if((group_list = SMB_MALLOC_ARRAY(GID_T, setlen)) == NULL) {
1020 DEBUG(0,("sys_setgroups: Malloc fail.\n"));
1024 for(i = 0; i < setlen; i++)
1025 group_list[i] = (GID_T) gidset[i];
1027 if(setgroups(setlen, group_list) != 0) {
1028 int saved_errno = errno;
1029 SAFE_FREE(group_list);
1030 errno = saved_errno;
1034 SAFE_FREE(group_list);
1038 #endif /* HAVE_BROKEN_GETGROUPS */
1040 /* This is a list of systems that require the first GID passed to setgroups(2)
1041 * to be the effective GID. If your system is one of these, add it here.
1043 #if defined (FREEBSD) || defined (DARWINOS)
1044 #define USE_BSD_SETGROUPS
1047 #if defined(USE_BSD_SETGROUPS)
1048 /* Depending on the particular BSD implementation, the first GID that is
1049 * passed to setgroups(2) will either be ignored or will set the credential's
1050 * effective GID. In either case, the right thing to do is to guarantee that
1051 * gidset[0] is the effective GID.
1053 static int sys_bsd_setgroups(gid_t primary_gid, int setlen, const gid_t *gidset)
1055 gid_t *new_gidset = NULL;
1059 /* setgroups(2) will fail with EINVAL if we pass too many groups. */
1062 /* No group list, just make sure we are setting the efective GID. */
1064 return setgroups(1, &primary_gid);
1067 /* If the primary gid is not the first array element, grow the array
1068 * and insert it at the front.
1070 if (gidset[0] != primary_gid) {
1071 new_gidset = SMB_MALLOC_ARRAY(gid_t, setlen + 1);
1072 if (new_gidset == NULL) {
1076 memcpy(new_gidset + 1, gidset, (setlen * sizeof(gid_t)));
1077 new_gidset[0] = primary_gid;
1082 DEBUG(3, ("forced to truncate group list from %d to %d\n",
1087 #if defined(HAVE_BROKEN_GETGROUPS)
1088 ret = sys_broken_setgroups(setlen, new_gidset ? new_gidset : gidset);
1090 ret = setgroups(setlen, new_gidset ? new_gidset : gidset);
1095 SAFE_FREE(new_gidset);
1102 #endif /* USE_BSD_SETGROUPS */
1104 /**************************************************************************
1105 Wrapper for getgroups. Deals with broken (int) case.
1106 ****************************************************************************/
1108 int sys_getgroups(int setlen, gid_t *gidset)
1110 #if defined(HAVE_BROKEN_GETGROUPS)
1111 return sys_broken_getgroups(setlen, gidset);
1113 return getgroups(setlen, gidset);
1117 /**************************************************************************
1118 Wrapper for setgroups. Deals with broken (int) case and BSD case.
1119 ****************************************************************************/
1121 int sys_setgroups(gid_t UNUSED(primary_gid), int setlen, gid_t *gidset)
1123 #if !defined(HAVE_SETGROUPS)
1126 #endif /* HAVE_SETGROUPS */
1128 #if defined(USE_BSD_SETGROUPS)
1129 return sys_bsd_setgroups(primary_gid, setlen, gidset);
1130 #elif defined(HAVE_BROKEN_GETGROUPS)
1131 return sys_broken_setgroups(setlen, gidset);
1133 return setgroups(setlen, gidset);
1137 /**************************************************************************
1138 Extract a command into an arg list.
1139 ****************************************************************************/
1141 static char **extract_args(TALLOC_CTX *mem_ctx, const char *command)
1150 if (!(trunc_cmd = talloc_strdup(mem_ctx, command))) {
1151 DEBUG(0, ("talloc failed\n"));
1155 if(!(ptr = strtok_r(trunc_cmd, " \t", &saveptr))) {
1156 TALLOC_FREE(trunc_cmd);
1165 for( argcl = 1; ptr; ptr = strtok_r(NULL, " \t", &saveptr))
1168 TALLOC_FREE(trunc_cmd);
1170 if (!(argl = talloc_array(mem_ctx, char *, argcl + 1))) {
1175 * Now do the extraction.
1178 if (!(trunc_cmd = talloc_strdup(mem_ctx, command))) {
1182 ptr = strtok_r(trunc_cmd, " \t", &saveptr);
1185 if (!(argl[i++] = talloc_strdup(argl, ptr))) {
1189 while((ptr = strtok_r(NULL, " \t", &saveptr)) != NULL) {
1191 if (!(argl[i++] = talloc_strdup(argl, ptr))) {
1197 TALLOC_FREE(trunc_cmd);
1201 DEBUG(0, ("talloc failed\n"));
1202 TALLOC_FREE(trunc_cmd);
1208 /**************************************************************************
1209 Wrapper for popen. Safer as it doesn't search a path.
1210 Modified from the glibc sources.
1211 modified by tridge to return a file descriptor. We must kick our FILE* habit
1212 ****************************************************************************/
1214 typedef struct _popen_list
1218 struct _popen_list *next;
1221 static popen_list *popen_chain;
1223 int sys_popen(const char *command)
1225 int parent_end, child_end;
1227 popen_list *entry = NULL;
1230 if (pipe(pipe_fds) < 0)
1233 parent_end = pipe_fds[0];
1234 child_end = pipe_fds[1];
1241 if((entry = SMB_MALLOC_P(popen_list)) == NULL)
1244 ZERO_STRUCTP(entry);
1247 * Extract the command and args into a NULL terminated array.
1250 if(!(argl = extract_args(NULL, command)))
1253 entry->child_pid = fork();
1255 if (entry->child_pid == -1) {
1259 if (entry->child_pid == 0) {
1265 int child_std_end = STDOUT_FILENO;
1269 if (child_end != child_std_end) {
1270 dup2 (child_end, child_std_end);
1275 * POSIX.2: "popen() shall ensure that any streams from previous
1276 * popen() calls that remain open in the parent process are closed
1277 * in the new child process."
1280 for (p = popen_chain; p; p = p->next)
1283 execv(argl[0], argl);
1294 /* Link into popen_chain. */
1295 entry->next = popen_chain;
1296 popen_chain = entry;
1297 entry->fd = parent_end;
1310 /**************************************************************************
1311 Wrapper for pclose. Modified from the glibc sources.
1312 ****************************************************************************/
1314 int sys_pclose(int fd)
1317 popen_list **ptr = &popen_chain;
1318 popen_list *entry = NULL;
1322 /* Unlink from popen_chain. */
1323 for ( ; *ptr != NULL; ptr = &(*ptr)->next) {
1324 if ((*ptr)->fd == fd) {
1326 *ptr = (*ptr)->next;
1332 if (status < 0 || close(entry->fd) < 0)
1336 * As Samba is catching and eating child process
1337 * exits we don't really care about the child exit
1338 * code, a -1 with errno = ECHILD will do fine for us.
1342 wait_pid = sys_waitpid (entry->child_pid, &wstatus, 0);
1343 } while (wait_pid == -1 && errno == EINTR);
1352 /**************************************************************************
1353 Wrapper for Admin Logs.
1354 ****************************************************************************/
1356 void sys_adminlog(int priority, const char *format_str, ...)
1360 char *msgbuf = NULL;
1362 va_start( ap, format_str );
1363 ret = vasprintf( &msgbuf, format_str, ap );
1369 #if defined(HAVE_SYSLOG)
1370 syslog( priority, "%s", msgbuf );
1372 DEBUG(0,("%s", msgbuf ));
1377 /******** Solaris EA helper function prototypes ********/
1378 #ifdef HAVE_ATTROPEN
1379 #define SOLARIS_ATTRMODE S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP
1380 static int solaris_write_xattr(int attrfd, const char *value, size_t size);
1381 static ssize_t solaris_read_xattr(int attrfd, void *value, size_t size);
1382 static ssize_t solaris_list_xattr(int attrdirfd, char *list, size_t size);
1383 static int solaris_unlinkat(int attrdirfd, const char *name);
1384 static int solaris_attropen(const char *path, const char *attrpath, int oflag, mode_t mode);
1385 static int solaris_openat(int fildes, const char *path, int oflag, mode_t mode);
1388 /**************************************************************************
1389 Wrappers for extented attribute calls. Based on the Linux package with
1390 support for IRIX and (Net|Free)BSD also. Expand as other systems have them.
1391 ****************************************************************************/
1393 ssize_t sys_getxattr (const char *path, const char *name, void *value, size_t size)
1395 #if defined(HAVE_GETXATTR)
1396 #ifndef XATTR_ADD_OPT
1397 return getxattr(path, name, value, size);
1400 return getxattr(path, name, value, size, 0, options);
1402 #elif defined(HAVE_GETEA)
1403 return getea(path, name, value, size);
1404 #elif defined(HAVE_EXTATTR_GET_FILE)
1407 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1408 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1409 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1411 * The BSD implementation has a nasty habit of silently truncating
1412 * the returned value to the size of the buffer, so we have to check
1413 * that the buffer is large enough to fit the returned value.
1415 if((retval=extattr_get_file(path, attrnamespace, attrname, NULL, 0)) >= 0) {
1420 if((retval=extattr_get_file(path, attrnamespace, attrname, value, size)) >= 0)
1424 DEBUG(10,("sys_getxattr: extattr_get_file() failed with: %s\n", strerror(errno)));
1426 #elif defined(HAVE_ATTR_GET)
1427 int retval, flags = 0;
1428 int valuelength = (int)size;
1429 char *attrname = strchr(name,'.') + 1;
1431 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1433 retval = attr_get(path, attrname, (char *)value, &valuelength, flags);
1435 return retval ? retval : valuelength;
1436 #elif defined(HAVE_ATTROPEN)
1438 int attrfd = solaris_attropen(path, name, O_RDONLY, 0);
1440 ret = solaris_read_xattr(attrfd, value, size);
1450 ssize_t sys_lgetxattr (const char *path, const char *name, void *value, size_t size)
1452 #if defined(HAVE_LGETXATTR)
1453 return lgetxattr(path, name, value, size);
1454 #elif defined(HAVE_GETXATTR) && defined(XATTR_ADD_OPT)
1455 int options = XATTR_NOFOLLOW;
1456 return getxattr(path, name, value, size, 0, options);
1457 #elif defined(HAVE_LGETEA)
1458 return lgetea(path, name, value, size);
1459 #elif defined(HAVE_EXTATTR_GET_LINK)
1462 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1463 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1464 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1466 if((retval=extattr_get_link(path, attrnamespace, attrname, NULL, 0)) >= 0) {
1471 if((retval=extattr_get_link(path, attrnamespace, attrname, value, size)) >= 0)
1475 DEBUG(10,("sys_lgetxattr: extattr_get_link() failed with: %s\n", strerror(errno)));
1477 #elif defined(HAVE_ATTR_GET)
1478 int retval, flags = ATTR_DONTFOLLOW;
1479 int valuelength = (int)size;
1480 char *attrname = strchr(name,'.') + 1;
1482 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1484 retval = attr_get(path, attrname, (char *)value, &valuelength, flags);
1486 return retval ? retval : valuelength;
1487 #elif defined(HAVE_ATTROPEN)
1489 int attrfd = solaris_attropen(path, name, O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1491 ret = solaris_read_xattr(attrfd, value, size);
1501 ssize_t sys_fgetxattr (int filedes, const char *name, void *value, size_t size)
1503 #if defined(HAVE_FGETXATTR)
1504 #ifndef XATTR_ADD_OPT
1505 return fgetxattr(filedes, name, value, size);
1508 return fgetxattr(filedes, name, value, size, 0, options);
1510 #elif defined(HAVE_FGETEA)
1511 return fgetea(filedes, name, value, size);
1512 #elif defined(HAVE_EXTATTR_GET_FD)
1515 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1516 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1517 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1519 if((retval=extattr_get_fd(filedes, attrnamespace, attrname, NULL, 0)) >= 0) {
1524 if((retval=extattr_get_fd(filedes, attrnamespace, attrname, value, size)) >= 0)
1528 DEBUG(10,("sys_fgetxattr: extattr_get_fd() failed with: %s\n", strerror(errno)));
1530 #elif defined(HAVE_ATTR_GETF)
1531 int retval, flags = 0;
1532 int valuelength = (int)size;
1533 char *attrname = strchr(name,'.') + 1;
1535 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1537 retval = attr_getf(filedes, attrname, (char *)value, &valuelength, flags);
1539 return retval ? retval : valuelength;
1540 #elif defined(HAVE_ATTROPEN)
1542 int attrfd = solaris_openat(filedes, name, O_RDONLY|O_XATTR, 0);
1544 ret = solaris_read_xattr(attrfd, value, size);
1554 #if defined(HAVE_EXTATTR_LIST_FILE)
1556 #define EXTATTR_PREFIX(s) (s), (sizeof((s))-1)
1564 { EXTATTR_NAMESPACE_SYSTEM, EXTATTR_PREFIX("system.") },
1565 { EXTATTR_NAMESPACE_USER, EXTATTR_PREFIX("user.") },
1573 static ssize_t bsd_attr_list (int type, extattr_arg arg, char *list, size_t size)
1575 ssize_t list_size, total_size = 0;
1578 /* Iterate through extattr(2) namespaces */
1579 for(t = 0; t < ARRAY_SIZE(extattr); t++) {
1581 #if defined(HAVE_EXTATTR_LIST_FILE)
1583 list_size = extattr_list_file(arg.path, extattr[t].space, list, size);
1586 #if defined(HAVE_EXTATTR_LIST_LINK)
1588 list_size = extattr_list_link(arg.path, extattr[t].space, list, size);
1591 #if defined(HAVE_EXTATTR_LIST_FD)
1593 list_size = extattr_list_fd(arg.filedes, extattr[t].space, list, size);
1600 /* Some error happend. Errno should be set by the previous call */
1606 /* XXX: Call with an empty buffer may be used to calculate
1607 necessary buffer size. Unfortunately, we can't say, how
1608 many attributes were returned, so here is the potential
1609 problem with the emulation.
1612 /* Take the worse case of one char attribute names -
1613 two bytes per name plus one more for sanity.
1615 total_size += list_size + (list_size/2 + 1)*extattr[t].len;
1618 /* Count necessary offset to fit namespace prefixes */
1620 for(i = 0; i < list_size; i += list[i] + 1)
1621 len += extattr[t].len;
1623 total_size += list_size + len;
1624 /* Buffer is too small to fit the results */
1625 if(total_size > size) {
1629 /* Shift results back, so we can prepend prefixes */
1630 buf = (char *)memmove(list + len, list, list_size);
1632 for(i = 0; i < list_size; i += len + 1) {
1634 strncpy(list, extattr[t].name, extattr[t].len + 1);
1635 list += extattr[t].len;
1636 strncpy(list, buf + i + 1, len);
1647 #if defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1648 static char attr_buffer[ATTR_MAX_VALUELEN];
1650 static ssize_t irix_attr_list(const char *path, int filedes, char *list, size_t size, int flags)
1652 int retval = 0, index;
1653 attrlist_cursor_t *cursor = 0;
1655 attrlist_t * al = (attrlist_t *)attr_buffer;
1657 size_t ent_size, left = size;
1662 retval = attr_listf(filedes, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1664 retval = attr_list(path, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1666 for (index = 0; index < al->al_count; index++) {
1667 ae = ATTR_ENTRY(attr_buffer, index);
1668 ent_size = strlen(ae->a_name) + sizeof("user.");
1669 if (left >= ent_size) {
1670 strncpy(bp, "user.", sizeof("user."));
1671 strncat(bp, ae->a_name, ent_size - sizeof("user."));
1679 total_size += ent_size;
1681 if (al->al_more == 0) break;
1688 retval = attr_listf(filedes, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1690 retval = attr_list(path, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1692 for (index = 0; index < al->al_count; index++) {
1693 ae = ATTR_ENTRY(attr_buffer, index);
1694 ent_size = strlen(ae->a_name) + sizeof("system.");
1695 if (left >= ent_size) {
1696 strncpy(bp, "system.", sizeof("system."));
1697 strncat(bp, ae->a_name, ent_size - sizeof("system."));
1705 total_size += ent_size;
1707 if (al->al_more == 0) break;
1710 return (ssize_t)(retval ? retval : total_size);
1715 ssize_t sys_listxattr (const char *path, char *list, size_t size)
1717 #if defined(HAVE_LISTXATTR)
1718 #ifndef XATTR_ADD_OPT
1719 return listxattr(path, list, size);
1722 return listxattr(path, list, size, options);
1724 #elif defined(HAVE_LISTEA)
1725 return listea(path, list, size);
1726 #elif defined(HAVE_EXTATTR_LIST_FILE)
1729 return bsd_attr_list(0, arg, list, size);
1730 #elif defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1731 return irix_attr_list(path, 0, list, size, 0);
1732 #elif defined(HAVE_ATTROPEN)
1734 int attrdirfd = solaris_attropen(path, ".", O_RDONLY, 0);
1735 if (attrdirfd >= 0) {
1736 ret = solaris_list_xattr(attrdirfd, list, size);
1746 ssize_t sys_llistxattr (const char *path, char *list, size_t size)
1748 #if defined(HAVE_LLISTXATTR)
1749 return llistxattr(path, list, size);
1750 #elif defined(HAVE_LISTXATTR) && defined(XATTR_ADD_OPT)
1751 int options = XATTR_NOFOLLOW;
1752 return listxattr(path, list, size, options);
1753 #elif defined(HAVE_LLISTEA)
1754 return llistea(path, list, size);
1755 #elif defined(HAVE_EXTATTR_LIST_LINK)
1758 return bsd_attr_list(1, arg, list, size);
1759 #elif defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1760 return irix_attr_list(path, 0, list, size, ATTR_DONTFOLLOW);
1761 #elif defined(HAVE_ATTROPEN)
1763 int attrdirfd = solaris_attropen(path, ".", O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1764 if (attrdirfd >= 0) {
1765 ret = solaris_list_xattr(attrdirfd, list, size);
1775 ssize_t sys_flistxattr (int filedes, char *list, size_t size)
1777 #if defined(HAVE_FLISTXATTR)
1778 #ifndef XATTR_ADD_OPT
1779 return flistxattr(filedes, list, size);
1782 return flistxattr(filedes, list, size, options);
1784 #elif defined(HAVE_FLISTEA)
1785 return flistea(filedes, list, size);
1786 #elif defined(HAVE_EXTATTR_LIST_FD)
1788 arg.filedes = filedes;
1789 return bsd_attr_list(2, arg, list, size);
1790 #elif defined(HAVE_ATTR_LISTF)
1791 return irix_attr_list(NULL, filedes, list, size, 0);
1792 #elif defined(HAVE_ATTROPEN)
1794 int attrdirfd = solaris_openat(filedes, ".", O_RDONLY|O_XATTR, 0);
1795 if (attrdirfd >= 0) {
1796 ret = solaris_list_xattr(attrdirfd, list, size);
1806 int sys_removexattr (const char *path, const char *name)
1808 #if defined(HAVE_REMOVEXATTR)
1809 #ifndef XATTR_ADD_OPT
1810 return removexattr(path, name);
1813 return removexattr(path, name, options);
1815 #elif defined(HAVE_REMOVEEA)
1816 return removeea(path, name);
1817 #elif defined(HAVE_EXTATTR_DELETE_FILE)
1819 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1820 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1821 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1823 return extattr_delete_file(path, attrnamespace, attrname);
1824 #elif defined(HAVE_ATTR_REMOVE)
1826 char *attrname = strchr(name,'.') + 1;
1828 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1830 return attr_remove(path, attrname, flags);
1831 #elif defined(HAVE_ATTROPEN)
1833 int attrdirfd = solaris_attropen(path, ".", O_RDONLY, 0);
1834 if (attrdirfd >= 0) {
1835 ret = solaris_unlinkat(attrdirfd, name);
1845 int sys_lremovexattr (const char *path, const char *name)
1847 #if defined(HAVE_LREMOVEXATTR)
1848 return lremovexattr(path, name);
1849 #elif defined(HAVE_REMOVEXATTR) && defined(XATTR_ADD_OPT)
1850 int options = XATTR_NOFOLLOW;
1851 return removexattr(path, name, options);
1852 #elif defined(HAVE_LREMOVEEA)
1853 return lremoveea(path, name);
1854 #elif defined(HAVE_EXTATTR_DELETE_LINK)
1856 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1857 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1858 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1860 return extattr_delete_link(path, attrnamespace, attrname);
1861 #elif defined(HAVE_ATTR_REMOVE)
1862 int flags = ATTR_DONTFOLLOW;
1863 char *attrname = strchr(name,'.') + 1;
1865 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1867 return attr_remove(path, attrname, flags);
1868 #elif defined(HAVE_ATTROPEN)
1870 int attrdirfd = solaris_attropen(path, ".", O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1871 if (attrdirfd >= 0) {
1872 ret = solaris_unlinkat(attrdirfd, name);
1882 int sys_fremovexattr (int filedes, const char *name)
1884 #if defined(HAVE_FREMOVEXATTR)
1885 #ifndef XATTR_ADD_OPT
1886 return fremovexattr(filedes, name);
1889 return fremovexattr(filedes, name, options);
1891 #elif defined(HAVE_FREMOVEEA)
1892 return fremoveea(filedes, name);
1893 #elif defined(HAVE_EXTATTR_DELETE_FD)
1895 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1896 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1897 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1899 return extattr_delete_fd(filedes, attrnamespace, attrname);
1900 #elif defined(HAVE_ATTR_REMOVEF)
1902 char *attrname = strchr(name,'.') + 1;
1904 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1906 return attr_removef(filedes, attrname, flags);
1907 #elif defined(HAVE_ATTROPEN)
1909 int attrdirfd = solaris_openat(filedes, ".", O_RDONLY|O_XATTR, 0);
1910 if (attrdirfd >= 0) {
1911 ret = solaris_unlinkat(attrdirfd, name);
1921 int sys_setxattr (const char *path, const char *name, const void *value, size_t size, int flags)
1923 #if defined(HAVE_SETXATTR)
1924 #ifndef XATTR_ADD_OPT
1925 return setxattr(path, name, value, size, flags);
1928 return setxattr(path, name, value, size, 0, options);
1930 #elif defined(HAVE_SETEA)
1931 return setea(path, name, value, size, flags);
1932 #elif defined(HAVE_EXTATTR_SET_FILE)
1935 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1936 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1937 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1939 /* Check attribute existence */
1940 retval = extattr_get_file(path, attrnamespace, attrname, NULL, 0);
1942 /* REPLACE attribute, that doesn't exist */
1943 if (flags & XATTR_REPLACE && errno == ENOATTR) {
1947 /* Ignore other errors */
1950 /* CREATE attribute, that already exists */
1951 if (flags & XATTR_CREATE) {
1957 retval = extattr_set_file(path, attrnamespace, attrname, value, size);
1958 return (retval < 0) ? -1 : 0;
1959 #elif defined(HAVE_ATTR_SET)
1961 char *attrname = strchr(name,'.') + 1;
1963 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
1964 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
1965 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
1967 return attr_set(path, attrname, (const char *)value, size, myflags);
1968 #elif defined(HAVE_ATTROPEN)
1970 int myflags = O_RDWR;
1972 if (flags & XATTR_CREATE) myflags |= O_EXCL;
1973 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
1974 attrfd = solaris_attropen(path, name, myflags, (mode_t) SOLARIS_ATTRMODE);
1976 ret = solaris_write_xattr(attrfd, value, size);
1986 int sys_lsetxattr (const char *path, const char *name, const void *value, size_t size, int flags)
1988 #if defined(HAVE_LSETXATTR)
1989 return lsetxattr(path, name, value, size, flags);
1990 #elif defined(HAVE_SETXATTR) && defined(XATTR_ADD_OPT)
1991 int options = XATTR_NOFOLLOW;
1992 return setxattr(path, name, value, size, 0, options);
1993 #elif defined(LSETEA)
1994 return lsetea(path, name, value, size, flags);
1995 #elif defined(HAVE_EXTATTR_SET_LINK)
1998 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1999 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
2000 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
2002 /* Check attribute existence */
2003 retval = extattr_get_link(path, attrnamespace, attrname, NULL, 0);
2005 /* REPLACE attribute, that doesn't exist */
2006 if (flags & XATTR_REPLACE && errno == ENOATTR) {
2010 /* Ignore other errors */
2013 /* CREATE attribute, that already exists */
2014 if (flags & XATTR_CREATE) {
2021 retval = extattr_set_link(path, attrnamespace, attrname, value, size);
2022 return (retval < 0) ? -1 : 0;
2023 #elif defined(HAVE_ATTR_SET)
2024 int myflags = ATTR_DONTFOLLOW;
2025 char *attrname = strchr(name,'.') + 1;
2027 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
2028 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
2029 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
2031 return attr_set(path, attrname, (const char *)value, size, myflags);
2032 #elif defined(HAVE_ATTROPEN)
2034 int myflags = O_RDWR | AT_SYMLINK_NOFOLLOW;
2036 if (flags & XATTR_CREATE) myflags |= O_EXCL;
2037 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
2038 attrfd = solaris_attropen(path, name, myflags, (mode_t) SOLARIS_ATTRMODE);
2040 ret = solaris_write_xattr(attrfd, value, size);
2050 int sys_fsetxattr (int filedes, const char *name, const void *value, size_t size, int flags)
2052 #if defined(HAVE_FSETXATTR)
2053 #ifndef XATTR_ADD_OPT
2054 return fsetxattr(filedes, name, value, size, flags);
2057 return fsetxattr(filedes, name, value, size, 0, options);
2059 #elif defined(HAVE_FSETEA)
2060 return fsetea(filedes, name, value, size, flags);
2061 #elif defined(HAVE_EXTATTR_SET_FD)
2064 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
2065 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
2066 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
2068 /* Check attribute existence */
2069 retval = extattr_get_fd(filedes, attrnamespace, attrname, NULL, 0);
2071 /* REPLACE attribute, that doesn't exist */
2072 if (flags & XATTR_REPLACE && errno == ENOATTR) {
2076 /* Ignore other errors */
2079 /* CREATE attribute, that already exists */
2080 if (flags & XATTR_CREATE) {
2086 retval = extattr_set_fd(filedes, attrnamespace, attrname, value, size);
2087 return (retval < 0) ? -1 : 0;
2088 #elif defined(HAVE_ATTR_SETF)
2090 char *attrname = strchr(name,'.') + 1;
2092 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
2093 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
2094 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
2096 return attr_setf(filedes, attrname, (const char *)value, size, myflags);
2097 #elif defined(HAVE_ATTROPEN)
2099 int myflags = O_RDWR | O_XATTR;
2101 if (flags & XATTR_CREATE) myflags |= O_EXCL;
2102 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
2103 attrfd = solaris_openat(filedes, name, myflags, (mode_t) SOLARIS_ATTRMODE);
2105 ret = solaris_write_xattr(attrfd, value, size);
2115 /**************************************************************************
2116 helper functions for Solaris' EA support
2117 ****************************************************************************/
2118 #ifdef HAVE_ATTROPEN
2119 static ssize_t solaris_read_xattr(int attrfd, void *value, size_t size)
2123 if (fstat(attrfd, &sbuf) == -1) {
2128 /* This is to return the current size of the named extended attribute */
2130 return sbuf.st_size;
2133 /* check size and read xattr */
2134 if (sbuf.st_size > size) {
2139 return read(attrfd, value, sbuf.st_size);
2142 static ssize_t solaris_list_xattr(int attrdirfd, char *list, size_t size)
2147 int newfd = dup(attrdirfd);
2148 /* CAUTION: The originating file descriptor should not be
2149 used again following the call to fdopendir().
2150 For that reason we dup() the file descriptor
2151 here to make things more clear. */
2152 dirp = fdopendir(newfd);
2154 while ((de = readdir(dirp))) {
2155 size_t listlen = strlen(de->d_name) + 1;
2156 if (!strcmp(de->d_name, ".") || !strcmp(de->d_name, "..")) {
2157 /* we don't want "." and ".." here: */
2158 DEBUG(10,("skipped EA %s\n",de->d_name));
2163 /* return the current size of the list of extended attribute names*/
2166 /* check size and copy entrieѕ + nul into list. */
2167 if ((len + listlen) > size) {
2172 strlcpy(list + len, de->d_name, listlen);
2178 if (closedir(dirp) == -1) {
2179 DEBUG(0,("closedir dirp failed: %s\n",strerror(errno)));
2185 static int solaris_unlinkat(int attrdirfd, const char *name)
2187 if (unlinkat(attrdirfd, name, 0) == -1) {
2188 if (errno == ENOENT) {
2196 static int solaris_attropen(const char *path, const char *attrpath, int oflag, mode_t mode)
2198 int filedes = attropen(path, attrpath, oflag, mode);
2199 if (filedes == -1) {
2200 DEBUG(10,("attropen FAILED: path: %s, name: %s, errno: %s\n",path,attrpath,strerror(errno)));
2201 if (errno == EINVAL) {
2210 static int solaris_openat(int fildes, const char *path, int oflag, mode_t mode)
2212 int filedes = openat(fildes, path, oflag, mode);
2213 if (filedes == -1) {
2214 DEBUG(10,("openat FAILED: fd: %d, path: %s, errno: %s\n",filedes,path,strerror(errno)));
2215 if (errno == EINVAL) {
2224 static int solaris_write_xattr(int attrfd, const char *value, size_t size)
2226 if ((ftruncate(attrfd, 0) == 0) && (write(attrfd, value, size) == size)) {
2229 DEBUG(10,("solaris_write_xattr FAILED!\n"));
2233 #endif /*HAVE_ATTROPEN*/
2236 /****************************************************************************
2237 Return the major devicenumber for UNIX extensions.
2238 ****************************************************************************/
2240 uint32 unix_dev_major(SMB_DEV_T dev)
2242 #if defined(HAVE_DEVICE_MAJOR_FN)
2243 return (uint32)major(dev);
2245 return (uint32)(dev >> 8);
2249 /****************************************************************************
2250 Return the minor devicenumber for UNIX extensions.
2251 ****************************************************************************/
2253 uint32 unix_dev_minor(SMB_DEV_T dev)
2255 #if defined(HAVE_DEVICE_MINOR_FN)
2256 return (uint32)minor(dev);
2258 return (uint32)(dev & 0xff);
2263 /*******************************************************************
2264 Return the number of CPUs.
2265 ********************************************************************/
2267 int sys_get_number_of_cores(void)
2271 #if defined(HAVE_SYSCONF)
2272 #if defined(_SC_NPROCESSORS_ONLN)
2273 ret = (int)sysconf(_SC_NPROCESSORS_ONLN);
2275 #if defined(_SC_NPROCESSORS_CONF)
2277 ret = (int)sysconf(_SC_NPROCESSORS_CONF);
2280 #elif defined(HAVE_SYSCTL) && defined(CTL_HW)
2282 unsigned int len = sizeof(ret);
2285 #if defined(HW_AVAILCPU)
2286 name[1] = HW_AVAILCPU;
2288 if (sysctl(name, 2, &ret, &len, NULL, 0) == -1) {
2292 #if defined(HW_NCPU)
2296 if (sysctl(nm, 2, &count, &len, NULL, 0) == -1) {
2309 #if defined(WITH_AIO)
2311 /*******************************************************************
2312 An aio_read wrapper.
2313 ********************************************************************/
2315 int sys_aio_read(SMB_STRUCT_AIOCB *aiocb)
2317 #if defined(HAVE_AIO_READ)
2318 return aio_read(aiocb);
2325 /*******************************************************************
2326 An aio_write wrapper.
2327 ********************************************************************/
2329 int sys_aio_write(SMB_STRUCT_AIOCB *aiocb)
2331 #if defined(HAVE_AIO_WRITE)
2332 return aio_write(aiocb);
2339 /*******************************************************************
2340 An aio_return wrapper.
2341 ********************************************************************/
2343 ssize_t sys_aio_return(SMB_STRUCT_AIOCB *aiocb)
2345 #if defined(HAVE_AIO_RETURN)
2346 return aio_return(aiocb);
2353 /*******************************************************************
2354 An aio_cancel wrapper.
2355 ********************************************************************/
2357 int sys_aio_cancel(int fd, SMB_STRUCT_AIOCB *aiocb)
2359 #if defined(HAVE_AIO_CANCEL)
2360 return aio_cancel(fd, aiocb);
2367 /*******************************************************************
2368 An aio_error wrapper.
2369 ********************************************************************/
2371 int sys_aio_error(const SMB_STRUCT_AIOCB *aiocb)
2373 #if defined(HAVE_AIO_ERROR)
2374 return aio_error(aiocb);
2381 /*******************************************************************
2382 An aio_fsync wrapper.
2383 ********************************************************************/
2385 int sys_aio_fsync(int op, SMB_STRUCT_AIOCB *aiocb)
2387 #if defined(HAVE_AIO_FSYNC)
2388 return aio_fsync(op, aiocb);
2395 /*******************************************************************
2396 An aio_fsync wrapper.
2397 ********************************************************************/
2399 int sys_aio_suspend(const SMB_STRUCT_AIOCB * const cblist[], int n, const struct timespec *timeout)
2401 #if defined(HAVE_AIO_FSYNC)
2402 return aio_suspend(cblist, n, timeout);
2408 #else /* !WITH_AIO */
2410 int sys_aio_read(SMB_STRUCT_AIOCB *aiocb)
2416 int sys_aio_write(SMB_STRUCT_AIOCB *aiocb)
2422 ssize_t sys_aio_return(SMB_STRUCT_AIOCB *aiocb)
2428 int sys_aio_cancel(int fd, SMB_STRUCT_AIOCB *aiocb)
2434 int sys_aio_error(const SMB_STRUCT_AIOCB *aiocb)
2440 int sys_aio_fsync(int op, SMB_STRUCT_AIOCB *aiocb)
2446 int sys_aio_suspend(const SMB_STRUCT_AIOCB * const cblist[], int n, const struct timespec *timeout)
2451 #endif /* WITH_AIO */