2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Jeremy Allison 1998-2005
6 Copyright (C) Timur Bakeyev 2005
7 Copyright (C) Bjoern Jacke 2006-2007
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
25 #ifdef HAVE_SYS_PRCTL_H
26 #include <sys/prctl.h>
30 The idea is that this file will eventually have wrappers around all
31 important system calls in samba. The aims are:
33 - to enable easier porting by putting OS dependent stuff in here
35 - to allow for hooks into other "pseudo-filesystems"
37 - to allow easier integration of things like the japanese extensions
39 - to support the philosophy of Samba to expose the features of
40 the OS within the SMB model. In general whatever file/printer/variable
41 expansions/etc make sense to the OS should be acceptable to Samba.
46 /*******************************************************************
47 A wrapper for memalign
48 ********************************************************************/
50 void *sys_memalign( size_t align, size_t size )
52 #if defined(HAVE_POSIX_MEMALIGN)
54 int ret = posix_memalign( &p, align, size );
59 #elif defined(HAVE_MEMALIGN)
60 return memalign( align, size );
62 /* On *BSD systems memaligns doesn't exist, but memory will
63 * be aligned on allocations of > pagesize. */
64 #if defined(SYSCONF_SC_PAGESIZE)
65 size_t pagesize = (size_t)sysconf(_SC_PAGESIZE);
66 #elif defined(HAVE_GETPAGESIZE)
67 size_t pagesize = (size_t)getpagesize();
69 size_t pagesize = (size_t)-1;
71 if (pagesize == (size_t)-1) {
72 DEBUG(0,("memalign functionalaity not available on this platform!\n"));
75 if (size < pagesize) {
78 return SMB_MALLOC(size);
82 /*******************************************************************
83 A wrapper for usleep in case we don't have one.
84 ********************************************************************/
86 int sys_usleep(long usecs)
93 * We need this braindamage as the glibc usleep
94 * is not SPEC1170 complient... grumble... JRA.
97 if(usecs < 0 || usecs > 999999) {
105 #else /* HAVE_USLEEP */
107 * Fake it with select...
110 tval.tv_usec = usecs/1000;
111 select(0,NULL,NULL,NULL,&tval);
113 #endif /* HAVE_USLEEP */
116 /*******************************************************************
117 A read wrapper that will deal with EINTR.
118 ********************************************************************/
120 ssize_t sys_read(int fd, void *buf, size_t count)
125 ret = read(fd, buf, count);
126 } while (ret == -1 && errno == EINTR);
130 /*******************************************************************
131 A write wrapper that will deal with EINTR.
132 ********************************************************************/
134 ssize_t sys_write(int fd, const void *buf, size_t count)
139 ret = write(fd, buf, count);
140 } while (ret == -1 && errno == EINTR);
144 /*******************************************************************
145 A writev wrapper that will deal with EINTR.
146 ********************************************************************/
148 ssize_t sys_writev(int fd, const struct iovec *iov, int iovcnt)
153 /* Try to confuse write_data_iov a bit */
154 if ((random() % 5) == 0) {
155 return sys_write(fd, iov[0].iov_base, iov[0].iov_len);
157 if (iov[0].iov_len > 1) {
158 return sys_write(fd, iov[0].iov_base,
159 (random() % (iov[0].iov_len-1)) + 1);
164 ret = writev(fd, iov, iovcnt);
165 } while (ret == -1 && errno == EINTR);
169 /*******************************************************************
170 A pread wrapper that will deal with EINTR and 64-bit file offsets.
171 ********************************************************************/
173 #if defined(HAVE_PREAD) || defined(HAVE_PREAD64)
174 ssize_t sys_pread(int fd, void *buf, size_t count, SMB_OFF_T off)
179 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_PREAD64)
180 ret = pread64(fd, buf, count, off);
182 ret = pread(fd, buf, count, off);
184 } while (ret == -1 && errno == EINTR);
189 /*******************************************************************
190 A write wrapper that will deal with EINTR and 64-bit file offsets.
191 ********************************************************************/
193 #if defined(HAVE_PWRITE) || defined(HAVE_PWRITE64)
194 ssize_t sys_pwrite(int fd, const void *buf, size_t count, SMB_OFF_T off)
199 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_PWRITE64)
200 ret = pwrite64(fd, buf, count, off);
202 ret = pwrite(fd, buf, count, off);
204 } while (ret == -1 && errno == EINTR);
209 /*******************************************************************
210 A send wrapper that will deal with EINTR.
211 ********************************************************************/
213 ssize_t sys_send(int s, const void *msg, size_t len, int flags)
218 ret = send(s, msg, len, flags);
219 } while (ret == -1 && errno == EINTR);
223 /*******************************************************************
224 A sendto wrapper that will deal with EINTR.
225 ********************************************************************/
227 ssize_t sys_sendto(int s, const void *msg, size_t len, int flags, const struct sockaddr *to, socklen_t tolen)
232 ret = sendto(s, msg, len, flags, to, tolen);
233 } while (ret == -1 && errno == EINTR);
237 /*******************************************************************
238 A recv wrapper that will deal with EINTR.
239 ********************************************************************/
241 ssize_t sys_recv(int fd, void *buf, size_t count, int flags)
246 ret = recv(fd, buf, count, flags);
247 } while (ret == -1 && errno == EINTR);
251 /*******************************************************************
252 A recvfrom wrapper that will deal with EINTR.
253 ********************************************************************/
255 ssize_t sys_recvfrom(int s, void *buf, size_t len, int flags, struct sockaddr *from, socklen_t *fromlen)
260 ret = recvfrom(s, buf, len, flags, from, fromlen);
261 } while (ret == -1 && errno == EINTR);
265 /*******************************************************************
266 A fcntl wrapper that will deal with EINTR.
267 ********************************************************************/
269 int sys_fcntl_ptr(int fd, int cmd, void *arg)
274 ret = fcntl(fd, cmd, arg);
275 } while (ret == -1 && errno == EINTR);
279 /*******************************************************************
280 A fcntl wrapper that will deal with EINTR.
281 ********************************************************************/
283 int sys_fcntl_long(int fd, int cmd, long arg)
288 ret = fcntl(fd, cmd, arg);
289 } while (ret == -1 && errno == EINTR);
293 /****************************************************************************
294 Get/Set all the possible time fields from a stat struct as a timespec.
295 ****************************************************************************/
297 static struct timespec get_atimespec(const struct stat *pst)
299 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
302 /* Old system - no ns timestamp. */
303 ret.tv_sec = pst->st_atime;
307 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
309 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
311 ret.tv_sec = pst->st_atime;
312 ret.tv_nsec = pst->st_atimensec;
314 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
316 ret.tv_sec = pst->st_atime;
317 ret.tv_nsec = pst->st_atime_n;
319 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
321 ret.tv_sec = pst->st_atime;
322 ret.tv_nsec = pst->st_uatime * 1000;
324 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
325 return pst->st_atimespec;
327 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
332 static struct timespec get_mtimespec(const struct stat *pst)
334 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
337 /* Old system - no ns timestamp. */
338 ret.tv_sec = pst->st_mtime;
342 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
344 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
346 ret.tv_sec = pst->st_mtime;
347 ret.tv_nsec = pst->st_mtimensec;
349 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
351 ret.tv_sec = pst->st_mtime;
352 ret.tv_nsec = pst->st_mtime_n;
354 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
356 ret.tv_sec = pst->st_mtime;
357 ret.tv_nsec = pst->st_umtime * 1000;
359 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
360 return pst->st_mtimespec;
362 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
367 static struct timespec get_ctimespec(const struct stat *pst)
369 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
372 /* Old system - no ns timestamp. */
373 ret.tv_sec = pst->st_ctime;
377 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
379 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
381 ret.tv_sec = pst->st_ctime;
382 ret.tv_nsec = pst->st_ctimensec;
384 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
386 ret.tv_sec = pst->st_ctime;
387 ret.tv_nsec = pst->st_ctime_n;
389 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
391 ret.tv_sec = pst->st_ctime;
392 ret.tv_nsec = pst->st_uctime * 1000;
394 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
395 return pst->st_ctimespec;
397 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
402 /****************************************************************************
403 Return the best approximation to a 'create time' under UNIX from a stat
405 ****************************************************************************/
407 static struct timespec calc_create_time_stat(const struct stat *st)
409 struct timespec ret, ret1;
410 struct timespec c_time = get_ctimespec(st);
411 struct timespec m_time = get_mtimespec(st);
412 struct timespec a_time = get_atimespec(st);
414 ret = timespec_compare(&c_time, &m_time) < 0 ? c_time : m_time;
415 ret1 = timespec_compare(&ret, &a_time) < 0 ? ret : a_time;
417 if(!null_timespec(ret1)) {
422 * One of ctime, mtime or atime was zero (probably atime).
423 * Just return MIN(ctime, mtime).
428 /****************************************************************************
429 Return the best approximation to a 'create time' under UNIX from a stat_ex
431 ****************************************************************************/
433 static struct timespec calc_create_time_stat_ex(const struct stat_ex *st)
435 struct timespec ret, ret1;
436 struct timespec c_time = st->st_ex_ctime;
437 struct timespec m_time = st->st_ex_mtime;
438 struct timespec a_time = st->st_ex_atime;
440 ret = timespec_compare(&c_time, &m_time) < 0 ? c_time : m_time;
441 ret1 = timespec_compare(&ret, &a_time) < 0 ? ret : a_time;
443 if(!null_timespec(ret1)) {
448 * One of ctime, mtime or atime was zero (probably atime).
449 * Just return MIN(ctime, mtime).
454 /****************************************************************************
455 Return the 'create time' from a stat struct if it exists (birthtime) or else
456 use the best approximation.
457 ****************************************************************************/
459 static void make_create_timespec(const struct stat *pst, struct stat_ex *dst,
460 bool fake_dir_create_times)
462 if (S_ISDIR(pst->st_mode) && fake_dir_create_times) {
463 dst->st_ex_btime.tv_sec = 315493200L; /* 1/1/1980 */
464 dst->st_ex_btime.tv_nsec = 0;
467 dst->st_ex_calculated_birthtime = false;
469 #if defined(HAVE_STRUCT_STAT_ST_BIRTHTIMESPEC_TV_NSEC)
470 dst->st_ex_btime = pst->st_birthtimespec;
471 #elif defined(HAVE_STRUCT_STAT_ST_BIRTHTIMENSEC)
472 dst->st_ex_btime.tv_sec = pst->st_birthtime;
473 dst->st_ex_btime.tv_nsec = pst->st_birthtimenspec;
474 #elif defined(HAVE_STRUCT_STAT_ST_BIRTHTIME)
475 dst->st_ex_btime.tv_sec = pst->st_birthtime;
476 dst->st_ex_btime.tv_nsec = 0;
478 dst->st_ex_btime = calc_create_time_stat(pst);
479 dst->st_ex_calculated_birthtime = true;
482 /* Deal with systems that don't initialize birthtime correctly.
483 * Pointed out by SATOH Fumiyasu <fumiyas@osstech.jp>.
485 if (null_timespec(dst->st_ex_btime)) {
486 dst->st_ex_btime = calc_create_time_stat(pst);
487 dst->st_ex_calculated_birthtime = true;
491 /****************************************************************************
492 If we update a timestamp in a stat_ex struct we may have to recalculate
493 the birthtime. For now only implement this for write time, but we may
494 also need to do it for atime and ctime. JRA.
495 ****************************************************************************/
497 void update_stat_ex_mtime(struct stat_ex *dst,
498 struct timespec write_ts)
500 dst->st_ex_mtime = write_ts;
502 /* We may have to recalculate btime. */
503 if (dst->st_ex_calculated_birthtime) {
504 dst->st_ex_btime = calc_create_time_stat_ex(dst);
508 void update_stat_ex_create_time(struct stat_ex *dst,
509 struct timespec create_time)
511 dst->st_ex_btime = create_time;
512 dst->st_ex_calculated_birthtime = false;
515 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_STAT64)
516 static void init_stat_ex_from_stat (struct stat_ex *dst,
517 const struct stat64 *src,
518 bool fake_dir_create_times)
520 static void init_stat_ex_from_stat (struct stat_ex *dst,
521 const struct stat *src,
522 bool fake_dir_create_times)
525 dst->st_ex_dev = src->st_dev;
526 dst->st_ex_ino = src->st_ino;
527 dst->st_ex_mode = src->st_mode;
528 dst->st_ex_nlink = src->st_nlink;
529 dst->st_ex_uid = src->st_uid;
530 dst->st_ex_gid = src->st_gid;
531 dst->st_ex_rdev = src->st_rdev;
532 dst->st_ex_size = src->st_size;
533 dst->st_ex_atime = get_atimespec(src);
534 dst->st_ex_mtime = get_mtimespec(src);
535 dst->st_ex_ctime = get_ctimespec(src);
536 make_create_timespec(src, dst, fake_dir_create_times);
537 dst->st_ex_blksize = src->st_blksize;
538 dst->st_ex_blocks = src->st_blocks;
540 #ifdef HAVE_STAT_ST_FLAGS
541 dst->st_ex_flags = src->st_flags;
543 dst->st_ex_flags = 0;
547 /*******************************************************************
548 A stat() wrapper that will deal with 64 bit filesizes.
549 ********************************************************************/
551 int sys_stat(const char *fname, SMB_STRUCT_STAT *sbuf,
552 bool fake_dir_create_times)
555 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_STAT64)
556 struct stat64 statbuf;
557 ret = stat64(fname, &statbuf);
560 ret = stat(fname, &statbuf);
563 /* we always want directories to appear zero size */
564 if (S_ISDIR(statbuf.st_mode)) {
567 init_stat_ex_from_stat(sbuf, &statbuf, fake_dir_create_times);
572 /*******************************************************************
573 An fstat() wrapper that will deal with 64 bit filesizes.
574 ********************************************************************/
576 int sys_fstat(int fd, SMB_STRUCT_STAT *sbuf, bool fake_dir_create_times)
579 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_FSTAT64)
580 struct stat64 statbuf;
581 ret = fstat64(fd, &statbuf);
584 ret = fstat(fd, &statbuf);
587 /* we always want directories to appear zero size */
588 if (S_ISDIR(statbuf.st_mode)) {
591 init_stat_ex_from_stat(sbuf, &statbuf, fake_dir_create_times);
596 /*******************************************************************
597 An lstat() wrapper that will deal with 64 bit filesizes.
598 ********************************************************************/
600 int sys_lstat(const char *fname,SMB_STRUCT_STAT *sbuf,
601 bool fake_dir_create_times)
604 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_LSTAT64)
605 struct stat64 statbuf;
606 ret = lstat64(fname, &statbuf);
609 ret = lstat(fname, &statbuf);
612 /* we always want directories to appear zero size */
613 if (S_ISDIR(statbuf.st_mode)) {
616 init_stat_ex_from_stat(sbuf, &statbuf, fake_dir_create_times);
621 /*******************************************************************
622 An posix_fallocate() wrapper that will deal with 64 bit filesizes.
623 ********************************************************************/
624 int sys_posix_fallocate(int fd, SMB_OFF_T offset, SMB_OFF_T len)
626 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_POSIX_FALLOCATE64) && !defined(HAVE_BROKEN_POSIX_FALLOCATE)
627 return posix_fallocate64(fd, offset, len);
628 #elif defined(HAVE_POSIX_FALLOCATE) && !defined(HAVE_BROKEN_POSIX_FALLOCATE)
629 return posix_fallocate(fd, offset, len);
630 #elif defined(F_RESVSP64)
631 /* this handles XFS on IRIX */
633 SMB_OFF_T new_len = offset + len;
637 /* unlikely to get a too large file on a 64bit system but ... */
641 fl.l_whence = SEEK_SET;
645 ret=fcntl(fd, F_RESVSP64, &fl);
650 /* Make sure the file gets enlarged after we allocated space: */
652 if (new_len > sbuf.st_size)
653 ftruncate64(fd, new_len);
660 /*******************************************************************
661 An ftruncate() wrapper that will deal with 64 bit filesizes.
662 ********************************************************************/
664 int sys_ftruncate(int fd, SMB_OFF_T offset)
666 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_FTRUNCATE64)
667 return ftruncate64(fd, offset);
669 return ftruncate(fd, offset);
673 /*******************************************************************
674 An lseek() wrapper that will deal with 64 bit filesizes.
675 ********************************************************************/
677 SMB_OFF_T sys_lseek(int fd, SMB_OFF_T offset, int whence)
679 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_LSEEK64)
680 return lseek64(fd, offset, whence);
682 return lseek(fd, offset, whence);
686 /*******************************************************************
687 An fseek() wrapper that will deal with 64 bit filesizes.
688 ********************************************************************/
690 int sys_fseek(FILE *fp, SMB_OFF_T offset, int whence)
692 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(LARGE_SMB_OFF_T) && defined(HAVE_FSEEK64)
693 return fseek64(fp, offset, whence);
694 #elif defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(LARGE_SMB_OFF_T) && defined(HAVE_FSEEKO64)
695 return fseeko64(fp, offset, whence);
697 return fseek(fp, offset, whence);
701 /*******************************************************************
702 An ftell() wrapper that will deal with 64 bit filesizes.
703 ********************************************************************/
705 SMB_OFF_T sys_ftell(FILE *fp)
707 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(LARGE_SMB_OFF_T) && defined(HAVE_FTELL64)
708 return (SMB_OFF_T)ftell64(fp);
709 #elif defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(LARGE_SMB_OFF_T) && defined(HAVE_FTELLO64)
710 return (SMB_OFF_T)ftello64(fp);
712 return (SMB_OFF_T)ftell(fp);
716 /*******************************************************************
717 A creat() wrapper that will deal with 64 bit filesizes.
718 ********************************************************************/
720 int sys_creat(const char *path, mode_t mode)
722 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_CREAT64)
723 return creat64(path, mode);
726 * If creat64 isn't defined then ensure we call a potential open64.
729 return sys_open(path, O_WRONLY | O_CREAT | O_TRUNC, mode);
733 /*******************************************************************
734 An open() wrapper that will deal with 64 bit filesizes.
735 ********************************************************************/
737 int sys_open(const char *path, int oflag, mode_t mode)
739 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OPEN64)
740 return open64(path, oflag, mode);
742 return open(path, oflag, mode);
746 /*******************************************************************
747 An fopen() wrapper that will deal with 64 bit filesizes.
748 ********************************************************************/
750 FILE *sys_fopen(const char *path, const char *type)
752 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_FOPEN64)
753 return fopen64(path, type);
755 return fopen(path, type);
760 /*******************************************************************
761 A flock() wrapper that will perform the kernel flock.
762 ********************************************************************/
764 void kernel_flock(int fd, uint32 share_mode, uint32 access_mask)
766 #if HAVE_KERNEL_SHARE_MODES
768 if (share_mode == FILE_SHARE_WRITE) {
769 kernel_mode = LOCK_MAND|LOCK_WRITE;
770 } else if (share_mode == FILE_SHARE_READ) {
771 kernel_mode = LOCK_MAND|LOCK_READ;
772 } else if (share_mode == FILE_SHARE_NONE) {
773 kernel_mode = LOCK_MAND;
776 flock(fd, kernel_mode);
784 /*******************************************************************
785 An opendir wrapper that will deal with 64 bit filesizes.
786 ********************************************************************/
788 SMB_STRUCT_DIR *sys_opendir(const char *name)
790 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OPENDIR64)
791 return opendir64(name);
793 return opendir(name);
797 /*******************************************************************
798 A readdir wrapper that will deal with 64 bit filesizes.
799 ********************************************************************/
801 SMB_STRUCT_DIRENT *sys_readdir(SMB_STRUCT_DIR *dirp)
803 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_READDIR64)
804 return readdir64(dirp);
806 return readdir(dirp);
810 /*******************************************************************
811 A seekdir wrapper that will deal with 64 bit filesizes.
812 ********************************************************************/
814 void sys_seekdir(SMB_STRUCT_DIR *dirp, long offset)
816 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_SEEKDIR64)
817 seekdir64(dirp, offset);
819 seekdir(dirp, offset);
823 /*******************************************************************
824 A telldir wrapper that will deal with 64 bit filesizes.
825 ********************************************************************/
827 long sys_telldir(SMB_STRUCT_DIR *dirp)
829 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_TELLDIR64)
830 return (long)telldir64(dirp);
832 return (long)telldir(dirp);
836 /*******************************************************************
837 A rewinddir wrapper that will deal with 64 bit filesizes.
838 ********************************************************************/
840 void sys_rewinddir(SMB_STRUCT_DIR *dirp)
842 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_REWINDDIR64)
849 /*******************************************************************
850 A close wrapper that will deal with 64 bit filesizes.
851 ********************************************************************/
853 int sys_closedir(SMB_STRUCT_DIR *dirp)
855 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_CLOSEDIR64)
856 return closedir64(dirp);
858 return closedir(dirp);
862 /*******************************************************************
863 An mknod() wrapper that will deal with 64 bit filesizes.
864 ********************************************************************/
866 int sys_mknod(const char *path, mode_t mode, SMB_DEV_T dev)
868 #if defined(HAVE_MKNOD) || defined(HAVE_MKNOD64)
869 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_MKNOD64) && defined(HAVE_DEV64_T)
870 return mknod64(path, mode, dev);
872 return mknod(path, mode, dev);
875 /* No mknod system call. */
881 /*******************************************************************
882 The wait() calls vary between systems
883 ********************************************************************/
885 int sys_waitpid(pid_t pid,int *status,int options)
888 return waitpid(pid,status,options);
889 #else /* HAVE_WAITPID */
890 return wait4(pid, status, options, NULL);
891 #endif /* HAVE_WAITPID */
894 /*******************************************************************
895 System wrapper for getwd
896 ********************************************************************/
898 char *sys_getwd(char *s)
902 wd = (char *)getcwd(s, PATH_MAX);
904 wd = (char *)getwd(s);
909 #if defined(HAVE_POSIX_CAPABILITIES)
911 /* This define hasn't made it into the glibc capabilities header yet. */
912 #ifndef SECURE_NO_SETUID_FIXUP
913 #define SECURE_NO_SETUID_FIXUP 2
916 /**************************************************************************
917 Try and abstract process capabilities (for systems that have them).
918 ****************************************************************************/
920 /* Set the POSIX capabilities needed for the given purpose into the effective
921 * capability set of the current process. Make sure they are always removed
922 * from the inheritable set, because there is no circumstance in which our
923 * children should inherit our elevated privileges.
925 static bool set_process_capability(enum smbd_capability capability,
928 cap_value_t cap_vals[2] = {0};
929 int num_cap_vals = 0;
933 #if defined(HAVE_PRCTL) && defined(PR_GET_KEEPCAPS) && defined(PR_SET_KEEPCAPS)
934 /* On Linux, make sure that any capabilities we grab are sticky
935 * across UID changes. We expect that this would allow us to keep both
936 * the effective and permitted capability sets, but as of circa 2.6.16,
937 * only the permitted set is kept. It is a bug (which we work around)
938 * that the effective set is lost, but we still require the effective
941 if (!prctl(PR_GET_KEEPCAPS)) {
942 prctl(PR_SET_KEEPCAPS, 1);
946 #if defined(HAVE_PRCTL) && defined(PR_SET_SECUREBITS) && defined(SECURE_NO_SETUID_FIXUP)
947 /* New way of setting capabilities as "sticky". */
950 * Use PR_SET_SECUREBITS to prevent setresuid()
951 * atomically dropping effective capabilities on
952 * uid change. Only available in Linux kernels
956 * http://www.kernel.org/doc/man-pages/online/pages/man7/capabilities.7.html
959 * Specifically the CAP_KILL capability we need
960 * to allow Linux threads under different euids
961 * to send signals to each other.
964 if (prctl(PR_SET_SECUREBITS, 1 << SECURE_NO_SETUID_FIXUP)) {
965 DEBUG(0,("set_process_capability: "
966 "prctl PR_SET_SECUREBITS failed with error %s\n",
972 cap = cap_get_proc();
974 DEBUG(0,("set_process_capability: cap_get_proc failed: %s\n",
979 switch (capability) {
980 case KERNEL_OPLOCK_CAPABILITY:
981 #ifdef CAP_NETWORK_MGT
982 /* IRIX has CAP_NETWORK_MGT for oplocks. */
983 cap_vals[num_cap_vals++] = CAP_NETWORK_MGT;
986 case DMAPI_ACCESS_CAPABILITY:
987 #ifdef CAP_DEVICE_MGT
988 /* IRIX has CAP_DEVICE_MGT for DMAPI access. */
989 cap_vals[num_cap_vals++] = CAP_DEVICE_MGT;
991 /* Linux has CAP_MKNOD for DMAPI access. */
992 cap_vals[num_cap_vals++] = CAP_MKNOD;
995 case LEASE_CAPABILITY:
997 cap_vals[num_cap_vals++] = CAP_LEASE;
1000 case KILL_CAPABILITY:
1002 cap_vals[num_cap_vals++] = CAP_KILL;
1007 SMB_ASSERT(num_cap_vals <= ARRAY_SIZE(cap_vals));
1009 if (num_cap_vals == 0) {
1015 * Ensure the capability is effective. We assume that as a root
1016 * process it's always permitted.
1019 if (cap_set_flag(cap, CAP_EFFECTIVE, num_cap_vals, cap_vals,
1020 enable ? CAP_SET : CAP_CLEAR) == -1) {
1021 DEBUG(0, ("set_process_capability: cap_set_flag effective "
1022 "failed (%d): %s\n",
1029 /* We never want to pass capabilities down to our children, so make
1030 * sure they are not inherited.
1032 if (cap_set_flag(cap, CAP_INHERITABLE, num_cap_vals,
1033 cap_vals, CAP_CLEAR) == -1) {
1034 DEBUG(0, ("set_process_capability: cap_set_flag inheritable "
1035 "failed (%d): %s\n",
1042 if (cap_set_proc(cap) == -1) {
1043 DEBUG(0, ("set_process_capability: cap_set_flag (%d) failed: %s\n",
1054 #endif /* HAVE_POSIX_CAPABILITIES */
1056 /****************************************************************************
1057 Gain the oplock capability from the kernel if possible.
1058 ****************************************************************************/
1060 void set_effective_capability(enum smbd_capability capability)
1062 #if defined(HAVE_POSIX_CAPABILITIES)
1063 set_process_capability(capability, True);
1064 #endif /* HAVE_POSIX_CAPABILITIES */
1067 void drop_effective_capability(enum smbd_capability capability)
1069 #if defined(HAVE_POSIX_CAPABILITIES)
1070 set_process_capability(capability, False);
1071 #endif /* HAVE_POSIX_CAPABILITIES */
1074 /**************************************************************************
1075 Wrapper for random().
1076 ****************************************************************************/
1078 long sys_random(void)
1080 #if defined(HAVE_RANDOM)
1081 return (long)random();
1082 #elif defined(HAVE_RAND)
1083 return (long)rand();
1085 DEBUG(0,("Error - no random function available !\n"));
1090 /**************************************************************************
1091 Wrapper for srandom().
1092 ****************************************************************************/
1094 void sys_srandom(unsigned int seed)
1096 #if defined(HAVE_SRANDOM)
1098 #elif defined(HAVE_SRAND)
1101 DEBUG(0,("Error - no srandom function available !\n"));
1106 /**************************************************************************
1107 Returns equivalent to NGROUPS_MAX - using sysconf if needed.
1108 ****************************************************************************/
1110 int groups_max(void)
1112 #if defined(SYSCONF_SC_NGROUPS_MAX)
1113 int ret = sysconf(_SC_NGROUPS_MAX);
1114 return (ret == -1) ? NGROUPS_MAX : ret;
1120 /**************************************************************************
1121 Wrap setgroups and getgroups for systems that declare getgroups() as
1122 returning an array of gid_t, but actuall return an array of int.
1123 ****************************************************************************/
1125 #if defined(HAVE_BROKEN_GETGROUPS)
1126 static int sys_broken_getgroups(int setlen, gid_t *gidset)
1133 return getgroups(setlen, &gid);
1137 * Broken case. We need to allocate a
1138 * GID_T array of size setlen.
1147 setlen = groups_max();
1149 if((group_list = SMB_MALLOC_ARRAY(GID_T, setlen)) == NULL) {
1150 DEBUG(0,("sys_getgroups: Malloc fail.\n"));
1154 if((ngroups = getgroups(setlen, group_list)) < 0) {
1155 int saved_errno = errno;
1156 SAFE_FREE(group_list);
1157 errno = saved_errno;
1161 for(i = 0; i < ngroups; i++)
1162 gidset[i] = (gid_t)group_list[i];
1164 SAFE_FREE(group_list);
1168 static int sys_broken_setgroups(int setlen, gid_t *gidset)
1176 if (setlen < 0 || setlen > groups_max()) {
1182 * Broken case. We need to allocate a
1183 * GID_T array of size setlen.
1186 if((group_list = SMB_MALLOC_ARRAY(GID_T, setlen)) == NULL) {
1187 DEBUG(0,("sys_setgroups: Malloc fail.\n"));
1191 for(i = 0; i < setlen; i++)
1192 group_list[i] = (GID_T) gidset[i];
1194 if(setgroups(setlen, group_list) != 0) {
1195 int saved_errno = errno;
1196 SAFE_FREE(group_list);
1197 errno = saved_errno;
1201 SAFE_FREE(group_list);
1205 #endif /* HAVE_BROKEN_GETGROUPS */
1207 /* This is a list of systems that require the first GID passed to setgroups(2)
1208 * to be the effective GID. If your system is one of these, add it here.
1210 #if defined (FREEBSD) || defined (DARWINOS)
1211 #define USE_BSD_SETGROUPS
1214 #if defined(USE_BSD_SETGROUPS)
1215 /* Depending on the particular BSD implementation, the first GID that is
1216 * passed to setgroups(2) will either be ignored or will set the credential's
1217 * effective GID. In either case, the right thing to do is to guarantee that
1218 * gidset[0] is the effective GID.
1220 static int sys_bsd_setgroups(gid_t primary_gid, int setlen, const gid_t *gidset)
1222 gid_t *new_gidset = NULL;
1226 /* setgroups(2) will fail with EINVAL if we pass too many groups. */
1229 /* No group list, just make sure we are setting the efective GID. */
1231 return setgroups(1, &primary_gid);
1234 /* If the primary gid is not the first array element, grow the array
1235 * and insert it at the front.
1237 if (gidset[0] != primary_gid) {
1238 new_gidset = SMB_MALLOC_ARRAY(gid_t, setlen + 1);
1239 if (new_gidset == NULL) {
1243 memcpy(new_gidset + 1, gidset, (setlen * sizeof(gid_t)));
1244 new_gidset[0] = primary_gid;
1249 DEBUG(3, ("forced to truncate group list from %d to %d\n",
1254 #if defined(HAVE_BROKEN_GETGROUPS)
1255 ret = sys_broken_setgroups(setlen, new_gidset ? new_gidset : gidset);
1257 ret = setgroups(setlen, new_gidset ? new_gidset : gidset);
1262 SAFE_FREE(new_gidset);
1269 #endif /* USE_BSD_SETGROUPS */
1271 /**************************************************************************
1272 Wrapper for getgroups. Deals with broken (int) case.
1273 ****************************************************************************/
1275 int sys_getgroups(int setlen, gid_t *gidset)
1277 #if defined(HAVE_BROKEN_GETGROUPS)
1278 return sys_broken_getgroups(setlen, gidset);
1280 return getgroups(setlen, gidset);
1284 /**************************************************************************
1285 Wrapper for setgroups. Deals with broken (int) case and BSD case.
1286 ****************************************************************************/
1288 int sys_setgroups(gid_t UNUSED(primary_gid), int setlen, gid_t *gidset)
1290 #if !defined(HAVE_SETGROUPS)
1293 #endif /* HAVE_SETGROUPS */
1295 #if defined(USE_BSD_SETGROUPS)
1296 return sys_bsd_setgroups(primary_gid, setlen, gidset);
1297 #elif defined(HAVE_BROKEN_GETGROUPS)
1298 return sys_broken_setgroups(setlen, gidset);
1300 return setgroups(setlen, gidset);
1304 /**************************************************************************
1305 Wrappers for setpwent(), getpwent() and endpwent()
1306 ****************************************************************************/
1308 void sys_setpwent(void)
1313 struct passwd *sys_getpwent(void)
1318 void sys_endpwent(void)
1323 /**************************************************************************
1324 Wrappers for getpwnam(), getpwuid(), getgrnam(), getgrgid()
1325 ****************************************************************************/
1328 struct passwd *sys_getpwnam(const char *name)
1330 return getpwnam(name);
1333 struct passwd *sys_getpwuid(uid_t uid)
1335 return getpwuid(uid);
1338 struct group *sys_getgrnam(const char *name)
1340 return getgrnam(name);
1343 struct group *sys_getgrgid(gid_t gid)
1345 return getgrgid(gid);
1348 /**************************************************************************
1349 Extract a command into an arg list.
1350 ****************************************************************************/
1352 static char **extract_args(TALLOC_CTX *mem_ctx, const char *command)
1361 if (!(trunc_cmd = talloc_strdup(mem_ctx, command))) {
1362 DEBUG(0, ("talloc failed\n"));
1366 if(!(ptr = strtok_r(trunc_cmd, " \t", &saveptr))) {
1367 TALLOC_FREE(trunc_cmd);
1376 for( argcl = 1; ptr; ptr = strtok_r(NULL, " \t", &saveptr))
1379 TALLOC_FREE(trunc_cmd);
1381 if (!(argl = TALLOC_ARRAY(mem_ctx, char *, argcl + 1))) {
1386 * Now do the extraction.
1389 if (!(trunc_cmd = talloc_strdup(mem_ctx, command))) {
1393 ptr = strtok_r(trunc_cmd, " \t", &saveptr);
1396 if (!(argl[i++] = talloc_strdup(argl, ptr))) {
1400 while((ptr = strtok_r(NULL, " \t", &saveptr)) != NULL) {
1402 if (!(argl[i++] = talloc_strdup(argl, ptr))) {
1408 TALLOC_FREE(trunc_cmd);
1412 DEBUG(0, ("talloc failed\n"));
1413 TALLOC_FREE(trunc_cmd);
1419 /**************************************************************************
1420 Wrapper for popen. Safer as it doesn't search a path.
1421 Modified from the glibc sources.
1422 modified by tridge to return a file descriptor. We must kick our FILE* habit
1423 ****************************************************************************/
1425 typedef struct _popen_list
1429 struct _popen_list *next;
1432 static popen_list *popen_chain;
1434 int sys_popen(const char *command)
1436 int parent_end, child_end;
1438 popen_list *entry = NULL;
1441 if (pipe(pipe_fds) < 0)
1444 parent_end = pipe_fds[0];
1445 child_end = pipe_fds[1];
1452 if((entry = SMB_MALLOC_P(popen_list)) == NULL)
1455 ZERO_STRUCTP(entry);
1458 * Extract the command and args into a NULL terminated array.
1461 if(!(argl = extract_args(NULL, command)))
1464 entry->child_pid = sys_fork();
1466 if (entry->child_pid == -1) {
1470 if (entry->child_pid == 0) {
1476 int child_std_end = STDOUT_FILENO;
1480 if (child_end != child_std_end) {
1481 dup2 (child_end, child_std_end);
1486 * POSIX.2: "popen() shall ensure that any streams from previous
1487 * popen() calls that remain open in the parent process are closed
1488 * in the new child process."
1491 for (p = popen_chain; p; p = p->next)
1494 execv(argl[0], argl);
1505 /* Link into popen_chain. */
1506 entry->next = popen_chain;
1507 popen_chain = entry;
1508 entry->fd = parent_end;
1521 /**************************************************************************
1522 Wrapper for pclose. Modified from the glibc sources.
1523 ****************************************************************************/
1525 int sys_pclose(int fd)
1528 popen_list **ptr = &popen_chain;
1529 popen_list *entry = NULL;
1533 /* Unlink from popen_chain. */
1534 for ( ; *ptr != NULL; ptr = &(*ptr)->next) {
1535 if ((*ptr)->fd == fd) {
1537 *ptr = (*ptr)->next;
1543 if (status < 0 || close(entry->fd) < 0)
1547 * As Samba is catching and eating child process
1548 * exits we don't really care about the child exit
1549 * code, a -1 with errno = ECHILD will do fine for us.
1553 wait_pid = sys_waitpid (entry->child_pid, &wstatus, 0);
1554 } while (wait_pid == -1 && errno == EINTR);
1563 /**************************************************************************
1564 Wrapper for Admin Logs.
1565 ****************************************************************************/
1567 void sys_adminlog(int priority, const char *format_str, ...)
1571 char *msgbuf = NULL;
1573 va_start( ap, format_str );
1574 ret = vasprintf( &msgbuf, format_str, ap );
1580 #if defined(HAVE_SYSLOG)
1581 syslog( priority, "%s", msgbuf );
1583 DEBUG(0,("%s", msgbuf ));
1588 /******** Solaris EA helper function prototypes ********/
1589 #ifdef HAVE_ATTROPEN
1590 #define SOLARIS_ATTRMODE S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP
1591 static int solaris_write_xattr(int attrfd, const char *value, size_t size);
1592 static ssize_t solaris_read_xattr(int attrfd, void *value, size_t size);
1593 static ssize_t solaris_list_xattr(int attrdirfd, char *list, size_t size);
1594 static int solaris_unlinkat(int attrdirfd, const char *name);
1595 static int solaris_attropen(const char *path, const char *attrpath, int oflag, mode_t mode);
1596 static int solaris_openat(int fildes, const char *path, int oflag, mode_t mode);
1599 /**************************************************************************
1600 Wrappers for extented attribute calls. Based on the Linux package with
1601 support for IRIX and (Net|Free)BSD also. Expand as other systems have them.
1602 ****************************************************************************/
1604 ssize_t sys_getxattr (const char *path, const char *name, void *value, size_t size)
1606 #if defined(HAVE_GETXATTR)
1607 #ifndef XATTR_ADD_OPT
1608 return getxattr(path, name, value, size);
1611 return getxattr(path, name, value, size, 0, options);
1613 #elif defined(HAVE_GETEA)
1614 return getea(path, name, value, size);
1615 #elif defined(HAVE_EXTATTR_GET_FILE)
1618 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1619 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1620 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1622 * The BSD implementation has a nasty habit of silently truncating
1623 * the returned value to the size of the buffer, so we have to check
1624 * that the buffer is large enough to fit the returned value.
1626 if((retval=extattr_get_file(path, attrnamespace, attrname, NULL, 0)) >= 0) {
1631 if((retval=extattr_get_file(path, attrnamespace, attrname, value, size)) >= 0)
1635 DEBUG(10,("sys_getxattr: extattr_get_file() failed with: %s\n", strerror(errno)));
1637 #elif defined(HAVE_ATTR_GET)
1638 int retval, flags = 0;
1639 int valuelength = (int)size;
1640 char *attrname = strchr(name,'.') + 1;
1642 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1644 retval = attr_get(path, attrname, (char *)value, &valuelength, flags);
1646 return retval ? retval : valuelength;
1647 #elif defined(HAVE_ATTROPEN)
1649 int attrfd = solaris_attropen(path, name, O_RDONLY, 0);
1651 ret = solaris_read_xattr(attrfd, value, size);
1661 ssize_t sys_lgetxattr (const char *path, const char *name, void *value, size_t size)
1663 #if defined(HAVE_LGETXATTR)
1664 return lgetxattr(path, name, value, size);
1665 #elif defined(HAVE_GETXATTR) && defined(XATTR_ADD_OPT)
1666 int options = XATTR_NOFOLLOW;
1667 return getxattr(path, name, value, size, 0, options);
1668 #elif defined(HAVE_LGETEA)
1669 return lgetea(path, name, value, size);
1670 #elif defined(HAVE_EXTATTR_GET_LINK)
1673 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1674 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1675 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1677 if((retval=extattr_get_link(path, attrnamespace, attrname, NULL, 0)) >= 0) {
1682 if((retval=extattr_get_link(path, attrnamespace, attrname, value, size)) >= 0)
1686 DEBUG(10,("sys_lgetxattr: extattr_get_link() failed with: %s\n", strerror(errno)));
1688 #elif defined(HAVE_ATTR_GET)
1689 int retval, flags = ATTR_DONTFOLLOW;
1690 int valuelength = (int)size;
1691 char *attrname = strchr(name,'.') + 1;
1693 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1695 retval = attr_get(path, attrname, (char *)value, &valuelength, flags);
1697 return retval ? retval : valuelength;
1698 #elif defined(HAVE_ATTROPEN)
1700 int attrfd = solaris_attropen(path, name, O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1702 ret = solaris_read_xattr(attrfd, value, size);
1712 ssize_t sys_fgetxattr (int filedes, const char *name, void *value, size_t size)
1714 #if defined(HAVE_FGETXATTR)
1715 #ifndef XATTR_ADD_OPT
1716 return fgetxattr(filedes, name, value, size);
1719 return fgetxattr(filedes, name, value, size, 0, options);
1721 #elif defined(HAVE_FGETEA)
1722 return fgetea(filedes, name, value, size);
1723 #elif defined(HAVE_EXTATTR_GET_FD)
1726 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1727 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1728 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1730 if((retval=extattr_get_fd(filedes, attrnamespace, attrname, NULL, 0)) >= 0) {
1735 if((retval=extattr_get_fd(filedes, attrnamespace, attrname, value, size)) >= 0)
1739 DEBUG(10,("sys_fgetxattr: extattr_get_fd() failed with: %s\n", strerror(errno)));
1741 #elif defined(HAVE_ATTR_GETF)
1742 int retval, flags = 0;
1743 int valuelength = (int)size;
1744 char *attrname = strchr(name,'.') + 1;
1746 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1748 retval = attr_getf(filedes, attrname, (char *)value, &valuelength, flags);
1750 return retval ? retval : valuelength;
1751 #elif defined(HAVE_ATTROPEN)
1753 int attrfd = solaris_openat(filedes, name, O_RDONLY|O_XATTR, 0);
1755 ret = solaris_read_xattr(attrfd, value, size);
1765 #if defined(HAVE_EXTATTR_LIST_FILE)
1767 #define EXTATTR_PREFIX(s) (s), (sizeof((s))-1)
1775 { EXTATTR_NAMESPACE_SYSTEM, EXTATTR_PREFIX("system.") },
1776 { EXTATTR_NAMESPACE_USER, EXTATTR_PREFIX("user.") },
1784 static ssize_t bsd_attr_list (int type, extattr_arg arg, char *list, size_t size)
1786 ssize_t list_size, total_size = 0;
1789 /* Iterate through extattr(2) namespaces */
1790 for(t = 0; t < (sizeof(extattr)/sizeof(extattr[0])); t++) {
1792 #if defined(HAVE_EXTATTR_LIST_FILE)
1794 list_size = extattr_list_file(arg.path, extattr[t].space, list, size);
1797 #if defined(HAVE_EXTATTR_LIST_LINK)
1799 list_size = extattr_list_link(arg.path, extattr[t].space, list, size);
1802 #if defined(HAVE_EXTATTR_LIST_FD)
1804 list_size = extattr_list_fd(arg.filedes, extattr[t].space, list, size);
1811 /* Some error happend. Errno should be set by the previous call */
1817 /* XXX: Call with an empty buffer may be used to calculate
1818 necessary buffer size. Unfortunately, we can't say, how
1819 many attributes were returned, so here is the potential
1820 problem with the emulation.
1823 /* Take the worse case of one char attribute names -
1824 two bytes per name plus one more for sanity.
1826 total_size += list_size + (list_size/2 + 1)*extattr[t].len;
1829 /* Count necessary offset to fit namespace prefixes */
1831 for(i = 0; i < list_size; i += list[i] + 1)
1832 len += extattr[t].len;
1834 total_size += list_size + len;
1835 /* Buffer is too small to fit the results */
1836 if(total_size > size) {
1840 /* Shift results back, so we can prepend prefixes */
1841 buf = memmove(list + len, list, list_size);
1843 for(i = 0; i < list_size; i += len + 1) {
1845 strncpy(list, extattr[t].name, extattr[t].len + 1);
1846 list += extattr[t].len;
1847 strncpy(list, buf + i + 1, len);
1858 #if defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1859 static char attr_buffer[ATTR_MAX_VALUELEN];
1861 static ssize_t irix_attr_list(const char *path, int filedes, char *list, size_t size, int flags)
1863 int retval = 0, index;
1864 attrlist_cursor_t *cursor = 0;
1866 attrlist_t * al = (attrlist_t *)attr_buffer;
1868 size_t ent_size, left = size;
1873 retval = attr_listf(filedes, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1875 retval = attr_list(path, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1877 for (index = 0; index < al->al_count; index++) {
1878 ae = ATTR_ENTRY(attr_buffer, index);
1879 ent_size = strlen(ae->a_name) + sizeof("user.");
1880 if (left >= ent_size) {
1881 strncpy(bp, "user.", sizeof("user."));
1882 strncat(bp, ae->a_name, ent_size - sizeof("user."));
1890 total_size += ent_size;
1892 if (al->al_more == 0) break;
1899 retval = attr_listf(filedes, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1901 retval = attr_list(path, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1903 for (index = 0; index < al->al_count; index++) {
1904 ae = ATTR_ENTRY(attr_buffer, index);
1905 ent_size = strlen(ae->a_name) + sizeof("system.");
1906 if (left >= ent_size) {
1907 strncpy(bp, "system.", sizeof("system."));
1908 strncat(bp, ae->a_name, ent_size - sizeof("system."));
1916 total_size += ent_size;
1918 if (al->al_more == 0) break;
1921 return (ssize_t)(retval ? retval : total_size);
1926 ssize_t sys_listxattr (const char *path, char *list, size_t size)
1928 #if defined(HAVE_LISTXATTR)
1929 #ifndef XATTR_ADD_OPT
1930 return listxattr(path, list, size);
1933 return listxattr(path, list, size, options);
1935 #elif defined(HAVE_LISTEA)
1936 return listea(path, list, size);
1937 #elif defined(HAVE_EXTATTR_LIST_FILE)
1940 return bsd_attr_list(0, arg, list, size);
1941 #elif defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1942 return irix_attr_list(path, 0, list, size, 0);
1943 #elif defined(HAVE_ATTROPEN)
1945 int attrdirfd = solaris_attropen(path, ".", O_RDONLY, 0);
1946 if (attrdirfd >= 0) {
1947 ret = solaris_list_xattr(attrdirfd, list, size);
1957 ssize_t sys_llistxattr (const char *path, char *list, size_t size)
1959 #if defined(HAVE_LLISTXATTR)
1960 return llistxattr(path, list, size);
1961 #elif defined(HAVE_LISTXATTR) && defined(XATTR_ADD_OPT)
1962 int options = XATTR_NOFOLLOW;
1963 return listxattr(path, list, size, options);
1964 #elif defined(HAVE_LLISTEA)
1965 return llistea(path, list, size);
1966 #elif defined(HAVE_EXTATTR_LIST_LINK)
1969 return bsd_attr_list(1, arg, list, size);
1970 #elif defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1971 return irix_attr_list(path, 0, list, size, ATTR_DONTFOLLOW);
1972 #elif defined(HAVE_ATTROPEN)
1974 int attrdirfd = solaris_attropen(path, ".", O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1975 if (attrdirfd >= 0) {
1976 ret = solaris_list_xattr(attrdirfd, list, size);
1986 ssize_t sys_flistxattr (int filedes, char *list, size_t size)
1988 #if defined(HAVE_FLISTXATTR)
1989 #ifndef XATTR_ADD_OPT
1990 return flistxattr(filedes, list, size);
1993 return flistxattr(filedes, list, size, options);
1995 #elif defined(HAVE_FLISTEA)
1996 return flistea(filedes, list, size);
1997 #elif defined(HAVE_EXTATTR_LIST_FD)
1999 arg.filedes = filedes;
2000 return bsd_attr_list(2, arg, list, size);
2001 #elif defined(HAVE_ATTR_LISTF)
2002 return irix_attr_list(NULL, filedes, list, size, 0);
2003 #elif defined(HAVE_ATTROPEN)
2005 int attrdirfd = solaris_openat(filedes, ".", O_RDONLY|O_XATTR, 0);
2006 if (attrdirfd >= 0) {
2007 ret = solaris_list_xattr(attrdirfd, list, size);
2017 int sys_removexattr (const char *path, const char *name)
2019 #if defined(HAVE_REMOVEXATTR)
2020 #ifndef XATTR_ADD_OPT
2021 return removexattr(path, name);
2024 return removexattr(path, name, options);
2026 #elif defined(HAVE_REMOVEEA)
2027 return removeea(path, name);
2028 #elif defined(HAVE_EXTATTR_DELETE_FILE)
2030 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
2031 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
2032 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
2034 return extattr_delete_file(path, attrnamespace, attrname);
2035 #elif defined(HAVE_ATTR_REMOVE)
2037 char *attrname = strchr(name,'.') + 1;
2039 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
2041 return attr_remove(path, attrname, flags);
2042 #elif defined(HAVE_ATTROPEN)
2044 int attrdirfd = solaris_attropen(path, ".", O_RDONLY, 0);
2045 if (attrdirfd >= 0) {
2046 ret = solaris_unlinkat(attrdirfd, name);
2056 int sys_lremovexattr (const char *path, const char *name)
2058 #if defined(HAVE_LREMOVEXATTR)
2059 return lremovexattr(path, name);
2060 #elif defined(HAVE_REMOVEXATTR) && defined(XATTR_ADD_OPT)
2061 int options = XATTR_NOFOLLOW;
2062 return removexattr(path, name, options);
2063 #elif defined(HAVE_LREMOVEEA)
2064 return lremoveea(path, name);
2065 #elif defined(HAVE_EXTATTR_DELETE_LINK)
2067 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
2068 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
2069 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
2071 return extattr_delete_link(path, attrnamespace, attrname);
2072 #elif defined(HAVE_ATTR_REMOVE)
2073 int flags = ATTR_DONTFOLLOW;
2074 char *attrname = strchr(name,'.') + 1;
2076 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
2078 return attr_remove(path, attrname, flags);
2079 #elif defined(HAVE_ATTROPEN)
2081 int attrdirfd = solaris_attropen(path, ".", O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
2082 if (attrdirfd >= 0) {
2083 ret = solaris_unlinkat(attrdirfd, name);
2093 int sys_fremovexattr (int filedes, const char *name)
2095 #if defined(HAVE_FREMOVEXATTR)
2096 #ifndef XATTR_ADD_OPT
2097 return fremovexattr(filedes, name);
2100 return fremovexattr(filedes, name, options);
2102 #elif defined(HAVE_FREMOVEEA)
2103 return fremoveea(filedes, name);
2104 #elif defined(HAVE_EXTATTR_DELETE_FD)
2106 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
2107 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
2108 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
2110 return extattr_delete_fd(filedes, attrnamespace, attrname);
2111 #elif defined(HAVE_ATTR_REMOVEF)
2113 char *attrname = strchr(name,'.') + 1;
2115 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
2117 return attr_removef(filedes, attrname, flags);
2118 #elif defined(HAVE_ATTROPEN)
2120 int attrdirfd = solaris_openat(filedes, ".", O_RDONLY|O_XATTR, 0);
2121 if (attrdirfd >= 0) {
2122 ret = solaris_unlinkat(attrdirfd, name);
2132 int sys_setxattr (const char *path, const char *name, const void *value, size_t size, int flags)
2134 #if defined(HAVE_SETXATTR)
2135 #ifndef XATTR_ADD_OPT
2136 return setxattr(path, name, value, size, flags);
2139 return setxattr(path, name, value, size, 0, options);
2141 #elif defined(HAVE_SETEA)
2142 return setea(path, name, value, size, flags);
2143 #elif defined(HAVE_EXTATTR_SET_FILE)
2146 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
2147 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
2148 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
2150 /* Check attribute existence */
2151 retval = extattr_get_file(path, attrnamespace, attrname, NULL, 0);
2153 /* REPLACE attribute, that doesn't exist */
2154 if (flags & XATTR_REPLACE && errno == ENOATTR) {
2158 /* Ignore other errors */
2161 /* CREATE attribute, that already exists */
2162 if (flags & XATTR_CREATE) {
2168 retval = extattr_set_file(path, attrnamespace, attrname, value, size);
2169 return (retval < 0) ? -1 : 0;
2170 #elif defined(HAVE_ATTR_SET)
2172 char *attrname = strchr(name,'.') + 1;
2174 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
2175 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
2176 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
2178 return attr_set(path, attrname, (const char *)value, size, myflags);
2179 #elif defined(HAVE_ATTROPEN)
2181 int myflags = O_RDWR;
2183 if (flags & XATTR_CREATE) myflags |= O_EXCL;
2184 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
2185 attrfd = solaris_attropen(path, name, myflags, (mode_t) SOLARIS_ATTRMODE);
2187 ret = solaris_write_xattr(attrfd, value, size);
2197 int sys_lsetxattr (const char *path, const char *name, const void *value, size_t size, int flags)
2199 #if defined(HAVE_LSETXATTR)
2200 return lsetxattr(path, name, value, size, flags);
2201 #elif defined(HAVE_SETXATTR) && defined(XATTR_ADD_OPT)
2202 int options = XATTR_NOFOLLOW;
2203 return setxattr(path, name, value, size, 0, options);
2204 #elif defined(LSETEA)
2205 return lsetea(path, name, value, size, flags);
2206 #elif defined(HAVE_EXTATTR_SET_LINK)
2209 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
2210 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
2211 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
2213 /* Check attribute existence */
2214 retval = extattr_get_link(path, attrnamespace, attrname, NULL, 0);
2216 /* REPLACE attribute, that doesn't exist */
2217 if (flags & XATTR_REPLACE && errno == ENOATTR) {
2221 /* Ignore other errors */
2224 /* CREATE attribute, that already exists */
2225 if (flags & XATTR_CREATE) {
2232 retval = extattr_set_link(path, attrnamespace, attrname, value, size);
2233 return (retval < 0) ? -1 : 0;
2234 #elif defined(HAVE_ATTR_SET)
2235 int myflags = ATTR_DONTFOLLOW;
2236 char *attrname = strchr(name,'.') + 1;
2238 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
2239 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
2240 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
2242 return attr_set(path, attrname, (const char *)value, size, myflags);
2243 #elif defined(HAVE_ATTROPEN)
2245 int myflags = O_RDWR | AT_SYMLINK_NOFOLLOW;
2247 if (flags & XATTR_CREATE) myflags |= O_EXCL;
2248 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
2249 attrfd = solaris_attropen(path, name, myflags, (mode_t) SOLARIS_ATTRMODE);
2251 ret = solaris_write_xattr(attrfd, value, size);
2261 int sys_fsetxattr (int filedes, const char *name, const void *value, size_t size, int flags)
2263 #if defined(HAVE_FSETXATTR)
2264 #ifndef XATTR_ADD_OPT
2265 return fsetxattr(filedes, name, value, size, flags);
2268 return fsetxattr(filedes, name, value, size, 0, options);
2270 #elif defined(HAVE_FSETEA)
2271 return fsetea(filedes, name, value, size, flags);
2272 #elif defined(HAVE_EXTATTR_SET_FD)
2275 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
2276 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
2277 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
2279 /* Check attribute existence */
2280 retval = extattr_get_fd(filedes, attrnamespace, attrname, NULL, 0);
2282 /* REPLACE attribute, that doesn't exist */
2283 if (flags & XATTR_REPLACE && errno == ENOATTR) {
2287 /* Ignore other errors */
2290 /* CREATE attribute, that already exists */
2291 if (flags & XATTR_CREATE) {
2297 retval = extattr_set_fd(filedes, attrnamespace, attrname, value, size);
2298 return (retval < 0) ? -1 : 0;
2299 #elif defined(HAVE_ATTR_SETF)
2301 char *attrname = strchr(name,'.') + 1;
2303 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
2304 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
2305 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
2307 return attr_setf(filedes, attrname, (const char *)value, size, myflags);
2308 #elif defined(HAVE_ATTROPEN)
2310 int myflags = O_RDWR | O_XATTR;
2312 if (flags & XATTR_CREATE) myflags |= O_EXCL;
2313 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
2314 attrfd = solaris_openat(filedes, name, myflags, (mode_t) SOLARIS_ATTRMODE);
2316 ret = solaris_write_xattr(attrfd, value, size);
2326 /**************************************************************************
2327 helper functions for Solaris' EA support
2328 ****************************************************************************/
2329 #ifdef HAVE_ATTROPEN
2330 static ssize_t solaris_read_xattr(int attrfd, void *value, size_t size)
2334 if (fstat(attrfd, &sbuf) == -1) {
2339 /* This is to return the current size of the named extended attribute */
2341 return sbuf.st_size;
2344 /* check size and read xattr */
2345 if (sbuf.st_size > size) {
2350 return read(attrfd, value, sbuf.st_size);
2353 static ssize_t solaris_list_xattr(int attrdirfd, char *list, size_t size)
2358 int newfd = dup(attrdirfd);
2359 /* CAUTION: The originating file descriptor should not be
2360 used again following the call to fdopendir().
2361 For that reason we dup() the file descriptor
2362 here to make things more clear. */
2363 dirp = fdopendir(newfd);
2365 while ((de = readdir(dirp))) {
2366 size_t listlen = strlen(de->d_name);
2367 if (!strcmp(de->d_name, ".") || !strcmp(de->d_name, "..")) {
2368 /* we don't want "." and ".." here: */
2369 DEBUG(10,("skipped EA %s\n",de->d_name));
2374 /* return the current size of the list of extended attribute names*/
2377 /* check size and copy entrieѕ + nul into list. */
2378 if ((len + listlen + 1) > size) {
2383 safe_strcpy(list + len, de->d_name, listlen);
2391 if (closedir(dirp) == -1) {
2392 DEBUG(0,("closedir dirp failed: %s\n",strerror(errno)));
2398 static int solaris_unlinkat(int attrdirfd, const char *name)
2400 if (unlinkat(attrdirfd, name, 0) == -1) {
2401 if (errno == ENOENT) {
2409 static int solaris_attropen(const char *path, const char *attrpath, int oflag, mode_t mode)
2411 int filedes = attropen(path, attrpath, oflag, mode);
2412 if (filedes == -1) {
2413 DEBUG(10,("attropen FAILED: path: %s, name: %s, errno: %s\n",path,attrpath,strerror(errno)));
2414 if (errno == EINVAL) {
2423 static int solaris_openat(int fildes, const char *path, int oflag, mode_t mode)
2425 int filedes = openat(fildes, path, oflag, mode);
2426 if (filedes == -1) {
2427 DEBUG(10,("openat FAILED: fd: %d, path: %s, errno: %s\n",filedes,path,strerror(errno)));
2428 if (errno == EINVAL) {
2437 static int solaris_write_xattr(int attrfd, const char *value, size_t size)
2439 if ((ftruncate(attrfd, 0) == 0) && (write(attrfd, value, size) == size)) {
2442 DEBUG(10,("solaris_write_xattr FAILED!\n"));
2446 #endif /*HAVE_ATTROPEN*/
2449 /****************************************************************************
2450 Return the major devicenumber for UNIX extensions.
2451 ****************************************************************************/
2453 uint32 unix_dev_major(SMB_DEV_T dev)
2455 #if defined(HAVE_DEVICE_MAJOR_FN)
2456 return (uint32)major(dev);
2458 return (uint32)(dev >> 8);
2462 /****************************************************************************
2463 Return the minor devicenumber for UNIX extensions.
2464 ****************************************************************************/
2466 uint32 unix_dev_minor(SMB_DEV_T dev)
2468 #if defined(HAVE_DEVICE_MINOR_FN)
2469 return (uint32)minor(dev);
2471 return (uint32)(dev & 0xff);
2475 #if defined(WITH_AIO)
2477 /*******************************************************************
2478 An aio_read wrapper that will deal with 64-bit sizes.
2479 ********************************************************************/
2481 int sys_aio_read(SMB_STRUCT_AIOCB *aiocb)
2483 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_READ64)
2484 return aio_read64(aiocb);
2485 #elif defined(HAVE_AIO_READ)
2486 return aio_read(aiocb);
2493 /*******************************************************************
2494 An aio_write wrapper that will deal with 64-bit sizes.
2495 ********************************************************************/
2497 int sys_aio_write(SMB_STRUCT_AIOCB *aiocb)
2499 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_WRITE64)
2500 return aio_write64(aiocb);
2501 #elif defined(HAVE_AIO_WRITE)
2502 return aio_write(aiocb);
2509 /*******************************************************************
2510 An aio_return wrapper that will deal with 64-bit sizes.
2511 ********************************************************************/
2513 ssize_t sys_aio_return(SMB_STRUCT_AIOCB *aiocb)
2515 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_RETURN64)
2516 return aio_return64(aiocb);
2517 #elif defined(HAVE_AIO_RETURN)
2518 return aio_return(aiocb);
2525 /*******************************************************************
2526 An aio_cancel wrapper that will deal with 64-bit sizes.
2527 ********************************************************************/
2529 int sys_aio_cancel(int fd, SMB_STRUCT_AIOCB *aiocb)
2531 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_CANCEL64)
2532 return aio_cancel64(fd, aiocb);
2533 #elif defined(HAVE_AIO_CANCEL)
2534 return aio_cancel(fd, aiocb);
2541 /*******************************************************************
2542 An aio_error wrapper that will deal with 64-bit sizes.
2543 ********************************************************************/
2545 int sys_aio_error(const SMB_STRUCT_AIOCB *aiocb)
2547 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_ERROR64)
2548 return aio_error64(aiocb);
2549 #elif defined(HAVE_AIO_ERROR)
2550 return aio_error(aiocb);
2557 /*******************************************************************
2558 An aio_fsync wrapper that will deal with 64-bit sizes.
2559 ********************************************************************/
2561 int sys_aio_fsync(int op, SMB_STRUCT_AIOCB *aiocb)
2563 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_FSYNC64)
2564 return aio_fsync64(op, aiocb);
2565 #elif defined(HAVE_AIO_FSYNC)
2566 return aio_fsync(op, aiocb);
2573 /*******************************************************************
2574 An aio_fsync wrapper that will deal with 64-bit sizes.
2575 ********************************************************************/
2577 int sys_aio_suspend(const SMB_STRUCT_AIOCB * const cblist[], int n, const struct timespec *timeout)
2579 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_SUSPEND64)
2580 return aio_suspend64(cblist, n, timeout);
2581 #elif defined(HAVE_AIO_FSYNC)
2582 return aio_suspend(cblist, n, timeout);
2588 #else /* !WITH_AIO */
2590 int sys_aio_read(SMB_STRUCT_AIOCB *aiocb)
2596 int sys_aio_write(SMB_STRUCT_AIOCB *aiocb)
2602 ssize_t sys_aio_return(SMB_STRUCT_AIOCB *aiocb)
2608 int sys_aio_cancel(int fd, SMB_STRUCT_AIOCB *aiocb)
2614 int sys_aio_error(const SMB_STRUCT_AIOCB *aiocb)
2620 int sys_aio_fsync(int op, SMB_STRUCT_AIOCB *aiocb)
2626 int sys_aio_suspend(const SMB_STRUCT_AIOCB * const cblist[], int n, const struct timespec *timeout)
2631 #endif /* WITH_AIO */
2633 int sys_getpeereid( int s, uid_t *uid)
2635 #if defined(HAVE_PEERCRED)
2637 socklen_t cred_len = sizeof(struct ucred);
2640 ret = getsockopt(s, SOL_SOCKET, SO_PEERCRED, (void *)&cred, &cred_len);
2645 if (cred_len != sizeof(struct ucred)) {
2658 int sys_getnameinfo(const struct sockaddr *psa,
2667 * For Solaris we must make sure salen is the
2668 * correct length for the incoming sa_family.
2671 if (salen == sizeof(struct sockaddr_storage)) {
2672 salen = sizeof(struct sockaddr_in);
2673 #if defined(HAVE_IPV6)
2674 if (psa->sa_family == AF_INET6) {
2675 salen = sizeof(struct sockaddr_in6);
2679 return getnameinfo(psa, salen, host, hostlen, service, servlen, flags);
2682 int sys_connect(int fd, const struct sockaddr * addr)
2684 socklen_t salen = -1;
2686 if (addr->sa_family == AF_INET) {
2687 salen = sizeof(struct sockaddr_in);
2688 } else if (addr->sa_family == AF_UNIX) {
2689 salen = sizeof(struct sockaddr_un);
2691 #if defined(HAVE_IPV6)
2692 else if (addr->sa_family == AF_INET6) {
2693 salen = sizeof(struct sockaddr_in6);
2697 return connect(fd, addr, salen);