2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Jeremy Allison 1998-2005
6 Copyright (C) Timur Bakeyev 2005
7 Copyright (C) Bjoern Jacke 2006-2007
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "system/syslog.h"
25 #include "system/capability.h"
26 #include "system/passwd.h"
27 #include "system/filesys.h"
29 #ifdef HAVE_SYS_SYSCTL_H
30 #include <sys/sysctl.h>
33 #ifdef HAVE_SYS_PRCTL_H
34 #include <sys/prctl.h>
38 The idea is that this file will eventually have wrappers around all
39 important system calls in samba. The aims are:
41 - to enable easier porting by putting OS dependent stuff in here
43 - to allow for hooks into other "pseudo-filesystems"
45 - to allow easier integration of things like the japanese extensions
47 - to support the philosophy of Samba to expose the features of
48 the OS within the SMB model. In general whatever file/printer/variable
49 expansions/etc make sense to the OS should be acceptable to Samba.
54 /*******************************************************************
55 A read wrapper that will deal with EINTR.
56 ********************************************************************/
58 ssize_t sys_read(int fd, void *buf, size_t count)
63 ret = read(fd, buf, count);
64 #if defined(EWOULDBLOCK)
65 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
67 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
72 /*******************************************************************
73 A write wrapper that will deal with EINTR.
74 ********************************************************************/
76 ssize_t sys_write(int fd, const void *buf, size_t count)
81 ret = write(fd, buf, count);
82 #if defined(EWOULDBLOCK)
83 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
85 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
90 /*******************************************************************
91 A writev wrapper that will deal with EINTR.
92 ********************************************************************/
94 ssize_t sys_writev(int fd, const struct iovec *iov, int iovcnt)
99 /* Try to confuse write_data_iov a bit */
100 if ((random() % 5) == 0) {
101 return sys_write(fd, iov[0].iov_base, iov[0].iov_len);
103 if (iov[0].iov_len > 1) {
104 return sys_write(fd, iov[0].iov_base,
105 (random() % (iov[0].iov_len-1)) + 1);
110 ret = writev(fd, iov, iovcnt);
111 #if defined(EWOULDBLOCK)
112 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
114 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
119 /*******************************************************************
120 A pread wrapper that will deal with EINTR
121 ********************************************************************/
123 #if defined(HAVE_PREAD)
124 ssize_t sys_pread(int fd, void *buf, size_t count, SMB_OFF_T off)
129 ret = pread(fd, buf, count, off);
130 } while (ret == -1 && errno == EINTR);
135 /*******************************************************************
136 A write wrapper that will deal with EINTR
137 ********************************************************************/
139 #if defined(HAVE_PWRITE)
140 ssize_t sys_pwrite(int fd, const void *buf, size_t count, SMB_OFF_T off)
145 ret = pwrite(fd, buf, count, off);
146 } while (ret == -1 && errno == EINTR);
151 /*******************************************************************
152 A send wrapper that will deal with EINTR or EAGAIN or EWOULDBLOCK.
153 ********************************************************************/
155 ssize_t sys_send(int s, const void *msg, size_t len, int flags)
160 ret = send(s, msg, len, flags);
161 #if defined(EWOULDBLOCK)
162 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
164 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
169 /*******************************************************************
170 A recvfrom wrapper that will deal with EINTR.
171 ********************************************************************/
173 ssize_t sys_recvfrom(int s, void *buf, size_t len, int flags, struct sockaddr *from, socklen_t *fromlen)
178 ret = recvfrom(s, buf, len, flags, from, fromlen);
179 #if defined(EWOULDBLOCK)
180 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
182 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
187 /*******************************************************************
188 A fcntl wrapper that will deal with EINTR.
189 ********************************************************************/
191 int sys_fcntl_ptr(int fd, int cmd, void *arg)
196 ret = fcntl(fd, cmd, arg);
197 } while (ret == -1 && errno == EINTR);
201 /****************************************************************************
202 Get/Set all the possible time fields from a stat struct as a timespec.
203 ****************************************************************************/
205 static struct timespec get_atimespec(const struct stat *pst)
207 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
210 /* Old system - no ns timestamp. */
211 ret.tv_sec = pst->st_atime;
215 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
217 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
219 ret.tv_sec = pst->st_atime;
220 ret.tv_nsec = pst->st_atimensec;
222 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
224 ret.tv_sec = pst->st_atime;
225 ret.tv_nsec = pst->st_atime_n;
227 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
229 ret.tv_sec = pst->st_atime;
230 ret.tv_nsec = pst->st_uatime * 1000;
232 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
233 return pst->st_atimespec;
235 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
240 static struct timespec get_mtimespec(const struct stat *pst)
242 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
245 /* Old system - no ns timestamp. */
246 ret.tv_sec = pst->st_mtime;
250 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
252 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
254 ret.tv_sec = pst->st_mtime;
255 ret.tv_nsec = pst->st_mtimensec;
257 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
259 ret.tv_sec = pst->st_mtime;
260 ret.tv_nsec = pst->st_mtime_n;
262 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
264 ret.tv_sec = pst->st_mtime;
265 ret.tv_nsec = pst->st_umtime * 1000;
267 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
268 return pst->st_mtimespec;
270 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
275 static struct timespec get_ctimespec(const struct stat *pst)
277 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
280 /* Old system - no ns timestamp. */
281 ret.tv_sec = pst->st_ctime;
285 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
287 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
289 ret.tv_sec = pst->st_ctime;
290 ret.tv_nsec = pst->st_ctimensec;
292 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
294 ret.tv_sec = pst->st_ctime;
295 ret.tv_nsec = pst->st_ctime_n;
297 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
299 ret.tv_sec = pst->st_ctime;
300 ret.tv_nsec = pst->st_uctime * 1000;
302 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
303 return pst->st_ctimespec;
305 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
310 /****************************************************************************
311 Return the best approximation to a 'create time' under UNIX from a stat
313 ****************************************************************************/
315 static struct timespec calc_create_time_stat(const struct stat *st)
317 struct timespec ret, ret1;
318 struct timespec c_time = get_ctimespec(st);
319 struct timespec m_time = get_mtimespec(st);
320 struct timespec a_time = get_atimespec(st);
322 ret = timespec_compare(&c_time, &m_time) < 0 ? c_time : m_time;
323 ret1 = timespec_compare(&ret, &a_time) < 0 ? ret : a_time;
325 if(!null_timespec(ret1)) {
330 * One of ctime, mtime or atime was zero (probably atime).
331 * Just return MIN(ctime, mtime).
336 /****************************************************************************
337 Return the best approximation to a 'create time' under UNIX from a stat_ex
339 ****************************************************************************/
341 static struct timespec calc_create_time_stat_ex(const struct stat_ex *st)
343 struct timespec ret, ret1;
344 struct timespec c_time = st->st_ex_ctime;
345 struct timespec m_time = st->st_ex_mtime;
346 struct timespec a_time = st->st_ex_atime;
348 ret = timespec_compare(&c_time, &m_time) < 0 ? c_time : m_time;
349 ret1 = timespec_compare(&ret, &a_time) < 0 ? ret : a_time;
351 if(!null_timespec(ret1)) {
356 * One of ctime, mtime or atime was zero (probably atime).
357 * Just return MIN(ctime, mtime).
362 /****************************************************************************
363 Return the 'create time' from a stat struct if it exists (birthtime) or else
364 use the best approximation.
365 ****************************************************************************/
367 static void make_create_timespec(const struct stat *pst, struct stat_ex *dst,
368 bool fake_dir_create_times)
370 if (S_ISDIR(pst->st_mode) && fake_dir_create_times) {
371 dst->st_ex_btime.tv_sec = 315493200L; /* 1/1/1980 */
372 dst->st_ex_btime.tv_nsec = 0;
375 dst->st_ex_calculated_birthtime = false;
377 #if defined(HAVE_STRUCT_STAT_ST_BIRTHTIMESPEC_TV_NSEC)
378 dst->st_ex_btime = pst->st_birthtimespec;
379 #elif defined(HAVE_STRUCT_STAT_ST_BIRTHTIMENSEC)
380 dst->st_ex_btime.tv_sec = pst->st_birthtime;
381 dst->st_ex_btime.tv_nsec = pst->st_birthtimenspec;
382 #elif defined(HAVE_STRUCT_STAT_ST_BIRTHTIME)
383 dst->st_ex_btime.tv_sec = pst->st_birthtime;
384 dst->st_ex_btime.tv_nsec = 0;
386 dst->st_ex_btime = calc_create_time_stat(pst);
387 dst->st_ex_calculated_birthtime = true;
390 /* Deal with systems that don't initialize birthtime correctly.
391 * Pointed out by SATOH Fumiyasu <fumiyas@osstech.jp>.
393 if (null_timespec(dst->st_ex_btime)) {
394 dst->st_ex_btime = calc_create_time_stat(pst);
395 dst->st_ex_calculated_birthtime = true;
399 /****************************************************************************
400 If we update a timestamp in a stat_ex struct we may have to recalculate
401 the birthtime. For now only implement this for write time, but we may
402 also need to do it for atime and ctime. JRA.
403 ****************************************************************************/
405 void update_stat_ex_mtime(struct stat_ex *dst,
406 struct timespec write_ts)
408 dst->st_ex_mtime = write_ts;
410 /* We may have to recalculate btime. */
411 if (dst->st_ex_calculated_birthtime) {
412 dst->st_ex_btime = calc_create_time_stat_ex(dst);
416 void update_stat_ex_create_time(struct stat_ex *dst,
417 struct timespec create_time)
419 dst->st_ex_btime = create_time;
420 dst->st_ex_calculated_birthtime = false;
423 void init_stat_ex_from_stat (struct stat_ex *dst,
424 const struct stat *src,
425 bool fake_dir_create_times)
427 dst->st_ex_dev = src->st_dev;
428 dst->st_ex_ino = src->st_ino;
429 dst->st_ex_mode = src->st_mode;
430 dst->st_ex_nlink = src->st_nlink;
431 dst->st_ex_uid = src->st_uid;
432 dst->st_ex_gid = src->st_gid;
433 dst->st_ex_rdev = src->st_rdev;
434 dst->st_ex_size = src->st_size;
435 dst->st_ex_atime = get_atimespec(src);
436 dst->st_ex_mtime = get_mtimespec(src);
437 dst->st_ex_ctime = get_ctimespec(src);
438 make_create_timespec(src, dst, fake_dir_create_times);
439 #ifdef HAVE_STAT_ST_BLKSIZE
440 dst->st_ex_blksize = src->st_blksize;
442 dst->st_ex_blksize = STAT_ST_BLOCKSIZE;
445 #ifdef HAVE_STAT_ST_BLOCKS
446 dst->st_ex_blocks = src->st_blocks;
448 dst->st_ex_blocks = src->st_size / dst->st_ex_blksize + 1;
451 #ifdef HAVE_STAT_ST_FLAGS
452 dst->st_ex_flags = src->st_flags;
454 dst->st_ex_flags = 0;
458 /*******************************************************************
460 ********************************************************************/
462 int sys_stat(const char *fname, SMB_STRUCT_STAT *sbuf,
463 bool fake_dir_create_times)
467 ret = stat(fname, &statbuf);
469 /* we always want directories to appear zero size */
470 if (S_ISDIR(statbuf.st_mode)) {
473 init_stat_ex_from_stat(sbuf, &statbuf, fake_dir_create_times);
478 /*******************************************************************
480 ********************************************************************/
482 int sys_fstat(int fd, SMB_STRUCT_STAT *sbuf, bool fake_dir_create_times)
486 ret = fstat(fd, &statbuf);
488 /* we always want directories to appear zero size */
489 if (S_ISDIR(statbuf.st_mode)) {
492 init_stat_ex_from_stat(sbuf, &statbuf, fake_dir_create_times);
497 /*******************************************************************
499 ********************************************************************/
501 int sys_lstat(const char *fname,SMB_STRUCT_STAT *sbuf,
502 bool fake_dir_create_times)
506 ret = lstat(fname, &statbuf);
508 /* we always want directories to appear zero size */
509 if (S_ISDIR(statbuf.st_mode)) {
512 init_stat_ex_from_stat(sbuf, &statbuf, fake_dir_create_times);
517 /*******************************************************************
518 An posix_fallocate() wrapper.
519 ********************************************************************/
520 int sys_posix_fallocate(int fd, SMB_OFF_T offset, SMB_OFF_T len)
522 #if defined(HAVE_POSIX_FALLOCATE) && !defined(HAVE_BROKEN_POSIX_FALLOCATE)
523 return posix_fallocate(fd, offset, len);
524 #elif defined(F_RESVSP64)
525 /* this handles XFS on IRIX */
527 SMB_OFF_T new_len = offset + len;
531 /* unlikely to get a too large file on a 64bit system but ... */
535 fl.l_whence = SEEK_SET;
539 ret=fcntl(fd, F_RESVSP64, &fl);
544 /* Make sure the file gets enlarged after we allocated space: */
546 if (new_len > sbuf.st_size)
547 ftruncate64(fd, new_len);
554 /*******************************************************************
555 An fallocate() function that matches the semantics of the Linux one.
556 ********************************************************************/
558 #ifdef HAVE_LINUX_FALLOC_H
559 #include <linux/falloc.h>
562 int sys_fallocate(int fd, enum vfs_fallocate_mode mode, SMB_OFF_T offset, SMB_OFF_T len)
564 #if defined(HAVE_LINUX_FALLOCATE64) || defined(HAVE_LINUX_FALLOCATE)
567 case VFS_FALLOCATE_EXTEND_SIZE:
570 case VFS_FALLOCATE_KEEP_SIZE:
571 lmode = FALLOC_FL_KEEP_SIZE;
577 #if defined(HAVE_LINUX_FALLOCATE)
578 return fallocate(fd, lmode, offset, len);
581 /* TODO - plumb in fallocate from other filesysetms like VXFS etc. JRA. */
587 /*******************************************************************
589 ********************************************************************/
591 SMB_OFF_T sys_lseek(int fd, SMB_OFF_T offset, int whence)
593 return lseek(fd, offset, whence);
596 /*******************************************************************
598 ********************************************************************/
600 SMB_OFF_T sys_ftell(FILE *fp)
602 return (SMB_OFF_T)ftell(fp);
605 /*******************************************************************
607 ********************************************************************/
609 int sys_creat(const char *path, mode_t mode)
611 #if defined(HAVE_CREAT)
612 return creat(path, mode);
615 * If creat isn't defined then ensure we call open with the expected flags.
618 return sys_open(path, O_WRONLY | O_CREAT | O_TRUNC, mode);
622 /*******************************************************************
624 ********************************************************************/
626 int sys_open(const char *path, int oflag, mode_t mode)
628 return open(path, oflag, mode);
631 /*******************************************************************
633 ********************************************************************/
635 FILE *sys_fopen(const char *path, const char *type)
637 return fopen(path, type);
641 #if HAVE_KERNEL_SHARE_MODES
643 #define LOCK_MAND 32 /* This is a mandatory flock */
644 #define LOCK_READ 64 /* ... Which allows concurrent read operations */
645 #define LOCK_WRITE 128 /* ... Which allows concurrent write operations */
646 #define LOCK_RW 192 /* ... Which allows concurrent read & write ops */
650 /*******************************************************************
651 A flock() wrapper that will perform the kernel flock.
652 ********************************************************************/
654 void kernel_flock(int fd, uint32 share_mode, uint32 access_mask)
656 #if HAVE_KERNEL_SHARE_MODES
658 if (share_mode == FILE_SHARE_WRITE) {
659 kernel_mode = LOCK_MAND|LOCK_WRITE;
660 } else if (share_mode == FILE_SHARE_READ) {
661 kernel_mode = LOCK_MAND|LOCK_READ;
662 } else if (share_mode == FILE_SHARE_NONE) {
663 kernel_mode = LOCK_MAND;
666 flock(fd, kernel_mode);
674 /*******************************************************************
676 ********************************************************************/
678 SMB_STRUCT_DIR *sys_opendir(const char *name)
680 return opendir(name);
683 /*******************************************************************
684 An fdopendir wrapper.
685 Ugly hack - we need dirfd for this to work correctly in the
687 ********************************************************************/
689 SMB_STRUCT_DIR *sys_fdopendir(int fd)
691 #if defined(HAVE_FDOPENDIR) && defined(HAVE_DIRFD)
692 return fdopendir(fd);
699 /*******************************************************************
701 ********************************************************************/
703 SMB_STRUCT_DIRENT *sys_readdir(SMB_STRUCT_DIR *dirp)
705 return readdir(dirp);
708 /*******************************************************************
710 ********************************************************************/
712 void sys_seekdir(SMB_STRUCT_DIR *dirp, long offset)
714 seekdir(dirp, offset);
717 /*******************************************************************
719 ********************************************************************/
721 long sys_telldir(SMB_STRUCT_DIR *dirp)
723 return (long)telldir(dirp);
726 /*******************************************************************
728 ********************************************************************/
730 void sys_rewinddir(SMB_STRUCT_DIR *dirp)
735 /*******************************************************************
737 ********************************************************************/
739 int sys_closedir(SMB_STRUCT_DIR *dirp)
741 return closedir(dirp);
744 /*******************************************************************
746 ********************************************************************/
748 int sys_mknod(const char *path, mode_t mode, SMB_DEV_T dev)
750 #if defined(HAVE_MKNOD)
751 return mknod(path, mode, dev);
753 /* No mknod system call. */
759 /*******************************************************************
760 The wait() calls vary between systems
761 ********************************************************************/
763 int sys_waitpid(pid_t pid,int *status,int options)
766 return waitpid(pid,status,options);
767 #else /* HAVE_WAITPID */
768 return wait4(pid, status, options, NULL);
769 #endif /* HAVE_WAITPID */
772 /*******************************************************************
773 System wrapper for getwd. Always returns MALLOC'ed memory, or NULL
774 on error (malloc fail usually).
775 ********************************************************************/
777 char *sys_getwd(void)
779 #ifdef GETCWD_TAKES_NULL
780 return getcwd(NULL, 0);
782 char *wd = NULL, *s = NULL;
783 size_t allocated = PATH_MAX;
786 s = SMB_REALLOC_ARRAY(s, char, allocated);
790 wd = getcwd(s, allocated);
794 if (errno != ERANGE) {
799 if (allocated < PATH_MAX) {
806 char *s = SMB_MALLOC_ARRAY(char, PATH_MAX);
814 #if defined(HAVE_POSIX_CAPABILITIES)
816 /**************************************************************************
817 Try and abstract process capabilities (for systems that have them).
818 ****************************************************************************/
820 /* Set the POSIX capabilities needed for the given purpose into the effective
821 * capability set of the current process. Make sure they are always removed
822 * from the inheritable set, because there is no circumstance in which our
823 * children should inherit our elevated privileges.
825 static bool set_process_capability(enum smbd_capability capability,
828 cap_value_t cap_vals[2] = {0};
829 int num_cap_vals = 0;
833 #if defined(HAVE_PRCTL) && defined(PR_GET_KEEPCAPS) && defined(PR_SET_KEEPCAPS)
834 /* On Linux, make sure that any capabilities we grab are sticky
835 * across UID changes. We expect that this would allow us to keep both
836 * the effective and permitted capability sets, but as of circa 2.6.16,
837 * only the permitted set is kept. It is a bug (which we work around)
838 * that the effective set is lost, but we still require the effective
841 if (!prctl(PR_GET_KEEPCAPS)) {
842 prctl(PR_SET_KEEPCAPS, 1);
846 cap = cap_get_proc();
848 DEBUG(0,("set_process_capability: cap_get_proc failed: %s\n",
853 switch (capability) {
854 case KERNEL_OPLOCK_CAPABILITY:
855 #ifdef CAP_NETWORK_MGT
856 /* IRIX has CAP_NETWORK_MGT for oplocks. */
857 cap_vals[num_cap_vals++] = CAP_NETWORK_MGT;
860 case DMAPI_ACCESS_CAPABILITY:
861 #ifdef CAP_DEVICE_MGT
862 /* IRIX has CAP_DEVICE_MGT for DMAPI access. */
863 cap_vals[num_cap_vals++] = CAP_DEVICE_MGT;
865 /* Linux has CAP_MKNOD for DMAPI access. */
866 cap_vals[num_cap_vals++] = CAP_MKNOD;
869 case LEASE_CAPABILITY:
871 cap_vals[num_cap_vals++] = CAP_LEASE;
876 SMB_ASSERT(num_cap_vals <= ARRAY_SIZE(cap_vals));
878 if (num_cap_vals == 0) {
883 cap_set_flag(cap, CAP_EFFECTIVE, num_cap_vals, cap_vals,
884 enable ? CAP_SET : CAP_CLEAR);
886 /* We never want to pass capabilities down to our children, so make
887 * sure they are not inherited.
889 cap_set_flag(cap, CAP_INHERITABLE, num_cap_vals, cap_vals, CAP_CLEAR);
891 if (cap_set_proc(cap) == -1) {
892 DEBUG(0, ("set_process_capability: cap_set_proc failed: %s\n",
902 #endif /* HAVE_POSIX_CAPABILITIES */
904 /****************************************************************************
905 Gain the oplock capability from the kernel if possible.
906 ****************************************************************************/
908 void set_effective_capability(enum smbd_capability capability)
910 #if defined(HAVE_POSIX_CAPABILITIES)
911 set_process_capability(capability, True);
912 #endif /* HAVE_POSIX_CAPABILITIES */
915 void drop_effective_capability(enum smbd_capability capability)
917 #if defined(HAVE_POSIX_CAPABILITIES)
918 set_process_capability(capability, False);
919 #endif /* HAVE_POSIX_CAPABILITIES */
922 /**************************************************************************
923 Wrapper for random().
924 ****************************************************************************/
926 long sys_random(void)
928 #if defined(HAVE_RANDOM)
929 return (long)random();
930 #elif defined(HAVE_RAND)
933 DEBUG(0,("Error - no random function available !\n"));
938 /**************************************************************************
939 Wrapper for srandom().
940 ****************************************************************************/
942 void sys_srandom(unsigned int seed)
944 #if defined(HAVE_SRANDOM)
946 #elif defined(HAVE_SRAND)
949 DEBUG(0,("Error - no srandom function available !\n"));
955 #define NGROUPS_MAX 32 /* Guess... */
958 /**************************************************************************
959 Returns equivalent to NGROUPS_MAX - using sysconf if needed.
960 ****************************************************************************/
964 #if defined(SYSCONF_SC_NGROUPS_MAX)
965 int ret = sysconf(_SC_NGROUPS_MAX);
966 return (ret == -1) ? NGROUPS_MAX : ret;
972 /**************************************************************************
973 Wrap setgroups and getgroups for systems that declare getgroups() as
974 returning an array of gid_t, but actuall return an array of int.
975 ****************************************************************************/
977 #if defined(HAVE_BROKEN_GETGROUPS)
979 #ifdef HAVE_BROKEN_GETGROUPS
985 static int sys_broken_getgroups(int setlen, gid_t *gidset)
992 return getgroups(setlen, &gid);
996 * Broken case. We need to allocate a
997 * GID_T array of size setlen.
1006 setlen = groups_max();
1008 if((group_list = SMB_MALLOC_ARRAY(GID_T, setlen)) == NULL) {
1009 DEBUG(0,("sys_getgroups: Malloc fail.\n"));
1013 if((ngroups = getgroups(setlen, group_list)) < 0) {
1014 int saved_errno = errno;
1015 SAFE_FREE(group_list);
1016 errno = saved_errno;
1020 for(i = 0; i < ngroups; i++)
1021 gidset[i] = (gid_t)group_list[i];
1023 SAFE_FREE(group_list);
1027 static int sys_broken_setgroups(int setlen, gid_t *gidset)
1035 if (setlen < 0 || setlen > groups_max()) {
1041 * Broken case. We need to allocate a
1042 * GID_T array of size setlen.
1045 if((group_list = SMB_MALLOC_ARRAY(GID_T, setlen)) == NULL) {
1046 DEBUG(0,("sys_setgroups: Malloc fail.\n"));
1050 for(i = 0; i < setlen; i++)
1051 group_list[i] = (GID_T) gidset[i];
1053 if(setgroups(setlen, group_list) != 0) {
1054 int saved_errno = errno;
1055 SAFE_FREE(group_list);
1056 errno = saved_errno;
1060 SAFE_FREE(group_list);
1064 #endif /* HAVE_BROKEN_GETGROUPS */
1066 /* This is a list of systems that require the first GID passed to setgroups(2)
1067 * to be the effective GID. If your system is one of these, add it here.
1069 #if defined (FREEBSD) || defined (DARWINOS)
1070 #define USE_BSD_SETGROUPS
1073 #if defined(USE_BSD_SETGROUPS)
1074 /* Depending on the particular BSD implementation, the first GID that is
1075 * passed to setgroups(2) will either be ignored or will set the credential's
1076 * effective GID. In either case, the right thing to do is to guarantee that
1077 * gidset[0] is the effective GID.
1079 static int sys_bsd_setgroups(gid_t primary_gid, int setlen, const gid_t *gidset)
1081 gid_t *new_gidset = NULL;
1085 /* setgroups(2) will fail with EINVAL if we pass too many groups. */
1088 /* No group list, just make sure we are setting the efective GID. */
1090 return setgroups(1, &primary_gid);
1093 /* If the primary gid is not the first array element, grow the array
1094 * and insert it at the front.
1096 if (gidset[0] != primary_gid) {
1097 new_gidset = SMB_MALLOC_ARRAY(gid_t, setlen + 1);
1098 if (new_gidset == NULL) {
1102 memcpy(new_gidset + 1, gidset, (setlen * sizeof(gid_t)));
1103 new_gidset[0] = primary_gid;
1108 DEBUG(3, ("forced to truncate group list from %d to %d\n",
1113 #if defined(HAVE_BROKEN_GETGROUPS)
1114 ret = sys_broken_setgroups(setlen, new_gidset ? new_gidset : gidset);
1116 ret = setgroups(setlen, new_gidset ? new_gidset : gidset);
1121 SAFE_FREE(new_gidset);
1128 #endif /* USE_BSD_SETGROUPS */
1130 /**************************************************************************
1131 Wrapper for getgroups. Deals with broken (int) case.
1132 ****************************************************************************/
1134 int sys_getgroups(int setlen, gid_t *gidset)
1136 #if defined(HAVE_BROKEN_GETGROUPS)
1137 return sys_broken_getgroups(setlen, gidset);
1139 return getgroups(setlen, gidset);
1143 /**************************************************************************
1144 Wrapper for setgroups. Deals with broken (int) case and BSD case.
1145 ****************************************************************************/
1147 int sys_setgroups(gid_t UNUSED(primary_gid), int setlen, gid_t *gidset)
1149 #if !defined(HAVE_SETGROUPS)
1152 #endif /* HAVE_SETGROUPS */
1154 #if defined(USE_BSD_SETGROUPS)
1155 return sys_bsd_setgroups(primary_gid, setlen, gidset);
1156 #elif defined(HAVE_BROKEN_GETGROUPS)
1157 return sys_broken_setgroups(setlen, gidset);
1159 return setgroups(setlen, gidset);
1163 /**************************************************************************
1164 Extract a command into an arg list.
1165 ****************************************************************************/
1167 static char **extract_args(TALLOC_CTX *mem_ctx, const char *command)
1176 if (!(trunc_cmd = talloc_strdup(mem_ctx, command))) {
1177 DEBUG(0, ("talloc failed\n"));
1181 if(!(ptr = strtok_r(trunc_cmd, " \t", &saveptr))) {
1182 TALLOC_FREE(trunc_cmd);
1191 for( argcl = 1; ptr; ptr = strtok_r(NULL, " \t", &saveptr))
1194 TALLOC_FREE(trunc_cmd);
1196 if (!(argl = talloc_array(mem_ctx, char *, argcl + 1))) {
1201 * Now do the extraction.
1204 if (!(trunc_cmd = talloc_strdup(mem_ctx, command))) {
1208 ptr = strtok_r(trunc_cmd, " \t", &saveptr);
1211 if (!(argl[i++] = talloc_strdup(argl, ptr))) {
1215 while((ptr = strtok_r(NULL, " \t", &saveptr)) != NULL) {
1217 if (!(argl[i++] = talloc_strdup(argl, ptr))) {
1223 TALLOC_FREE(trunc_cmd);
1227 DEBUG(0, ("talloc failed\n"));
1228 TALLOC_FREE(trunc_cmd);
1234 /**************************************************************************
1235 Wrapper for popen. Safer as it doesn't search a path.
1236 Modified from the glibc sources.
1237 modified by tridge to return a file descriptor. We must kick our FILE* habit
1238 ****************************************************************************/
1240 typedef struct _popen_list
1244 struct _popen_list *next;
1247 static popen_list *popen_chain;
1249 int sys_popen(const char *command)
1251 int parent_end, child_end;
1253 popen_list *entry = NULL;
1256 if (pipe(pipe_fds) < 0)
1259 parent_end = pipe_fds[0];
1260 child_end = pipe_fds[1];
1267 if((entry = SMB_MALLOC_P(popen_list)) == NULL)
1270 ZERO_STRUCTP(entry);
1273 * Extract the command and args into a NULL terminated array.
1276 if(!(argl = extract_args(NULL, command)))
1279 entry->child_pid = fork();
1281 if (entry->child_pid == -1) {
1285 if (entry->child_pid == 0) {
1291 int child_std_end = STDOUT_FILENO;
1295 if (child_end != child_std_end) {
1296 dup2 (child_end, child_std_end);
1301 * POSIX.2: "popen() shall ensure that any streams from previous
1302 * popen() calls that remain open in the parent process are closed
1303 * in the new child process."
1306 for (p = popen_chain; p; p = p->next)
1309 execv(argl[0], argl);
1320 /* Link into popen_chain. */
1321 entry->next = popen_chain;
1322 popen_chain = entry;
1323 entry->fd = parent_end;
1336 /**************************************************************************
1337 Wrapper for pclose. Modified from the glibc sources.
1338 ****************************************************************************/
1340 int sys_pclose(int fd)
1343 popen_list **ptr = &popen_chain;
1344 popen_list *entry = NULL;
1348 /* Unlink from popen_chain. */
1349 for ( ; *ptr != NULL; ptr = &(*ptr)->next) {
1350 if ((*ptr)->fd == fd) {
1352 *ptr = (*ptr)->next;
1358 if (status < 0 || close(entry->fd) < 0)
1362 * As Samba is catching and eating child process
1363 * exits we don't really care about the child exit
1364 * code, a -1 with errno = ECHILD will do fine for us.
1368 wait_pid = sys_waitpid (entry->child_pid, &wstatus, 0);
1369 } while (wait_pid == -1 && errno == EINTR);
1378 /**************************************************************************
1379 Wrapper for Admin Logs.
1380 ****************************************************************************/
1382 void sys_adminlog(int priority, const char *format_str, ...)
1386 char *msgbuf = NULL;
1388 va_start( ap, format_str );
1389 ret = vasprintf( &msgbuf, format_str, ap );
1395 #if defined(HAVE_SYSLOG)
1396 syslog( priority, "%s", msgbuf );
1398 DEBUG(0,("%s", msgbuf ));
1403 /******** Solaris EA helper function prototypes ********/
1404 #ifdef HAVE_ATTROPEN
1405 #define SOLARIS_ATTRMODE S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP
1406 static int solaris_write_xattr(int attrfd, const char *value, size_t size);
1407 static ssize_t solaris_read_xattr(int attrfd, void *value, size_t size);
1408 static ssize_t solaris_list_xattr(int attrdirfd, char *list, size_t size);
1409 static int solaris_unlinkat(int attrdirfd, const char *name);
1410 static int solaris_attropen(const char *path, const char *attrpath, int oflag, mode_t mode);
1411 static int solaris_openat(int fildes, const char *path, int oflag, mode_t mode);
1414 /**************************************************************************
1415 Wrappers for extented attribute calls. Based on the Linux package with
1416 support for IRIX and (Net|Free)BSD also. Expand as other systems have them.
1417 ****************************************************************************/
1419 ssize_t sys_getxattr (const char *path, const char *name, void *value, size_t size)
1421 #if defined(HAVE_GETXATTR)
1422 #ifndef XATTR_ADD_OPT
1423 return getxattr(path, name, value, size);
1426 return getxattr(path, name, value, size, 0, options);
1428 #elif defined(HAVE_GETEA)
1429 return getea(path, name, value, size);
1430 #elif defined(HAVE_EXTATTR_GET_FILE)
1433 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1434 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1435 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1437 * The BSD implementation has a nasty habit of silently truncating
1438 * the returned value to the size of the buffer, so we have to check
1439 * that the buffer is large enough to fit the returned value.
1441 if((retval=extattr_get_file(path, attrnamespace, attrname, NULL, 0)) >= 0) {
1446 if((retval=extattr_get_file(path, attrnamespace, attrname, value, size)) >= 0)
1450 DEBUG(10,("sys_getxattr: extattr_get_file() failed with: %s\n", strerror(errno)));
1452 #elif defined(HAVE_ATTR_GET)
1453 int retval, flags = 0;
1454 int valuelength = (int)size;
1455 char *attrname = strchr(name,'.') + 1;
1457 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1459 retval = attr_get(path, attrname, (char *)value, &valuelength, flags);
1461 return retval ? retval : valuelength;
1462 #elif defined(HAVE_ATTROPEN)
1464 int attrfd = solaris_attropen(path, name, O_RDONLY, 0);
1466 ret = solaris_read_xattr(attrfd, value, size);
1476 ssize_t sys_lgetxattr (const char *path, const char *name, void *value, size_t size)
1478 #if defined(HAVE_LGETXATTR)
1479 return lgetxattr(path, name, value, size);
1480 #elif defined(HAVE_GETXATTR) && defined(XATTR_ADD_OPT)
1481 int options = XATTR_NOFOLLOW;
1482 return getxattr(path, name, value, size, 0, options);
1483 #elif defined(HAVE_LGETEA)
1484 return lgetea(path, name, value, size);
1485 #elif defined(HAVE_EXTATTR_GET_LINK)
1488 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1489 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1490 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1492 if((retval=extattr_get_link(path, attrnamespace, attrname, NULL, 0)) >= 0) {
1497 if((retval=extattr_get_link(path, attrnamespace, attrname, value, size)) >= 0)
1501 DEBUG(10,("sys_lgetxattr: extattr_get_link() failed with: %s\n", strerror(errno)));
1503 #elif defined(HAVE_ATTR_GET)
1504 int retval, flags = ATTR_DONTFOLLOW;
1505 int valuelength = (int)size;
1506 char *attrname = strchr(name,'.') + 1;
1508 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1510 retval = attr_get(path, attrname, (char *)value, &valuelength, flags);
1512 return retval ? retval : valuelength;
1513 #elif defined(HAVE_ATTROPEN)
1515 int attrfd = solaris_attropen(path, name, O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1517 ret = solaris_read_xattr(attrfd, value, size);
1527 ssize_t sys_fgetxattr (int filedes, const char *name, void *value, size_t size)
1529 #if defined(HAVE_FGETXATTR)
1530 #ifndef XATTR_ADD_OPT
1531 return fgetxattr(filedes, name, value, size);
1534 return fgetxattr(filedes, name, value, size, 0, options);
1536 #elif defined(HAVE_FGETEA)
1537 return fgetea(filedes, name, value, size);
1538 #elif defined(HAVE_EXTATTR_GET_FD)
1541 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1542 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1543 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1545 if((retval=extattr_get_fd(filedes, attrnamespace, attrname, NULL, 0)) >= 0) {
1550 if((retval=extattr_get_fd(filedes, attrnamespace, attrname, value, size)) >= 0)
1554 DEBUG(10,("sys_fgetxattr: extattr_get_fd() failed with: %s\n", strerror(errno)));
1556 #elif defined(HAVE_ATTR_GETF)
1557 int retval, flags = 0;
1558 int valuelength = (int)size;
1559 char *attrname = strchr(name,'.') + 1;
1561 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1563 retval = attr_getf(filedes, attrname, (char *)value, &valuelength, flags);
1565 return retval ? retval : valuelength;
1566 #elif defined(HAVE_ATTROPEN)
1568 int attrfd = solaris_openat(filedes, name, O_RDONLY|O_XATTR, 0);
1570 ret = solaris_read_xattr(attrfd, value, size);
1580 #if defined(HAVE_EXTATTR_LIST_FILE)
1582 #define EXTATTR_PREFIX(s) (s), (sizeof((s))-1)
1590 { EXTATTR_NAMESPACE_SYSTEM, EXTATTR_PREFIX("system.") },
1591 { EXTATTR_NAMESPACE_USER, EXTATTR_PREFIX("user.") },
1599 static ssize_t bsd_attr_list (int type, extattr_arg arg, char *list, size_t size)
1601 ssize_t list_size, total_size = 0;
1604 /* Iterate through extattr(2) namespaces */
1605 for(t = 0; t < ARRAY_SIZE(extattr); t++) {
1607 #if defined(HAVE_EXTATTR_LIST_FILE)
1609 list_size = extattr_list_file(arg.path, extattr[t].space, list, size);
1612 #if defined(HAVE_EXTATTR_LIST_LINK)
1614 list_size = extattr_list_link(arg.path, extattr[t].space, list, size);
1617 #if defined(HAVE_EXTATTR_LIST_FD)
1619 list_size = extattr_list_fd(arg.filedes, extattr[t].space, list, size);
1626 /* Some error happend. Errno should be set by the previous call */
1632 /* XXX: Call with an empty buffer may be used to calculate
1633 necessary buffer size. Unfortunately, we can't say, how
1634 many attributes were returned, so here is the potential
1635 problem with the emulation.
1638 /* Take the worse case of one char attribute names -
1639 two bytes per name plus one more for sanity.
1641 total_size += list_size + (list_size/2 + 1)*extattr[t].len;
1644 /* Count necessary offset to fit namespace prefixes */
1646 for(i = 0; i < list_size; i += list[i] + 1)
1647 len += extattr[t].len;
1649 total_size += list_size + len;
1650 /* Buffer is too small to fit the results */
1651 if(total_size > size) {
1655 /* Shift results back, so we can prepend prefixes */
1656 buf = (char *)memmove(list + len, list, list_size);
1658 for(i = 0; i < list_size; i += len + 1) {
1660 strncpy(list, extattr[t].name, extattr[t].len + 1);
1661 list += extattr[t].len;
1662 strncpy(list, buf + i + 1, len);
1673 #if defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1674 static char attr_buffer[ATTR_MAX_VALUELEN];
1676 static ssize_t irix_attr_list(const char *path, int filedes, char *list, size_t size, int flags)
1678 int retval = 0, index;
1679 attrlist_cursor_t *cursor = 0;
1681 attrlist_t * al = (attrlist_t *)attr_buffer;
1683 size_t ent_size, left = size;
1688 retval = attr_listf(filedes, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1690 retval = attr_list(path, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1692 for (index = 0; index < al->al_count; index++) {
1693 ae = ATTR_ENTRY(attr_buffer, index);
1694 ent_size = strlen(ae->a_name) + sizeof("user.");
1695 if (left >= ent_size) {
1696 strncpy(bp, "user.", sizeof("user."));
1697 strncat(bp, ae->a_name, ent_size - sizeof("user."));
1705 total_size += ent_size;
1707 if (al->al_more == 0) break;
1714 retval = attr_listf(filedes, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1716 retval = attr_list(path, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1718 for (index = 0; index < al->al_count; index++) {
1719 ae = ATTR_ENTRY(attr_buffer, index);
1720 ent_size = strlen(ae->a_name) + sizeof("system.");
1721 if (left >= ent_size) {
1722 strncpy(bp, "system.", sizeof("system."));
1723 strncat(bp, ae->a_name, ent_size - sizeof("system."));
1731 total_size += ent_size;
1733 if (al->al_more == 0) break;
1736 return (ssize_t)(retval ? retval : total_size);
1741 ssize_t sys_listxattr (const char *path, char *list, size_t size)
1743 #if defined(HAVE_LISTXATTR)
1744 #ifndef XATTR_ADD_OPT
1745 return listxattr(path, list, size);
1748 return listxattr(path, list, size, options);
1750 #elif defined(HAVE_LISTEA)
1751 return listea(path, list, size);
1752 #elif defined(HAVE_EXTATTR_LIST_FILE)
1755 return bsd_attr_list(0, arg, list, size);
1756 #elif defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1757 return irix_attr_list(path, 0, list, size, 0);
1758 #elif defined(HAVE_ATTROPEN)
1760 int attrdirfd = solaris_attropen(path, ".", O_RDONLY, 0);
1761 if (attrdirfd >= 0) {
1762 ret = solaris_list_xattr(attrdirfd, list, size);
1772 ssize_t sys_llistxattr (const char *path, char *list, size_t size)
1774 #if defined(HAVE_LLISTXATTR)
1775 return llistxattr(path, list, size);
1776 #elif defined(HAVE_LISTXATTR) && defined(XATTR_ADD_OPT)
1777 int options = XATTR_NOFOLLOW;
1778 return listxattr(path, list, size, options);
1779 #elif defined(HAVE_LLISTEA)
1780 return llistea(path, list, size);
1781 #elif defined(HAVE_EXTATTR_LIST_LINK)
1784 return bsd_attr_list(1, arg, list, size);
1785 #elif defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1786 return irix_attr_list(path, 0, list, size, ATTR_DONTFOLLOW);
1787 #elif defined(HAVE_ATTROPEN)
1789 int attrdirfd = solaris_attropen(path, ".", O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1790 if (attrdirfd >= 0) {
1791 ret = solaris_list_xattr(attrdirfd, list, size);
1801 ssize_t sys_flistxattr (int filedes, char *list, size_t size)
1803 #if defined(HAVE_FLISTXATTR)
1804 #ifndef XATTR_ADD_OPT
1805 return flistxattr(filedes, list, size);
1808 return flistxattr(filedes, list, size, options);
1810 #elif defined(HAVE_FLISTEA)
1811 return flistea(filedes, list, size);
1812 #elif defined(HAVE_EXTATTR_LIST_FD)
1814 arg.filedes = filedes;
1815 return bsd_attr_list(2, arg, list, size);
1816 #elif defined(HAVE_ATTR_LISTF)
1817 return irix_attr_list(NULL, filedes, list, size, 0);
1818 #elif defined(HAVE_ATTROPEN)
1820 int attrdirfd = solaris_openat(filedes, ".", O_RDONLY|O_XATTR, 0);
1821 if (attrdirfd >= 0) {
1822 ret = solaris_list_xattr(attrdirfd, list, size);
1832 int sys_removexattr (const char *path, const char *name)
1834 #if defined(HAVE_REMOVEXATTR)
1835 #ifndef XATTR_ADD_OPT
1836 return removexattr(path, name);
1839 return removexattr(path, name, options);
1841 #elif defined(HAVE_REMOVEEA)
1842 return removeea(path, name);
1843 #elif defined(HAVE_EXTATTR_DELETE_FILE)
1845 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1846 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1847 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1849 return extattr_delete_file(path, attrnamespace, attrname);
1850 #elif defined(HAVE_ATTR_REMOVE)
1852 char *attrname = strchr(name,'.') + 1;
1854 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1856 return attr_remove(path, attrname, flags);
1857 #elif defined(HAVE_ATTROPEN)
1859 int attrdirfd = solaris_attropen(path, ".", O_RDONLY, 0);
1860 if (attrdirfd >= 0) {
1861 ret = solaris_unlinkat(attrdirfd, name);
1871 int sys_lremovexattr (const char *path, const char *name)
1873 #if defined(HAVE_LREMOVEXATTR)
1874 return lremovexattr(path, name);
1875 #elif defined(HAVE_REMOVEXATTR) && defined(XATTR_ADD_OPT)
1876 int options = XATTR_NOFOLLOW;
1877 return removexattr(path, name, options);
1878 #elif defined(HAVE_LREMOVEEA)
1879 return lremoveea(path, name);
1880 #elif defined(HAVE_EXTATTR_DELETE_LINK)
1882 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1883 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1884 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1886 return extattr_delete_link(path, attrnamespace, attrname);
1887 #elif defined(HAVE_ATTR_REMOVE)
1888 int flags = ATTR_DONTFOLLOW;
1889 char *attrname = strchr(name,'.') + 1;
1891 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1893 return attr_remove(path, attrname, flags);
1894 #elif defined(HAVE_ATTROPEN)
1896 int attrdirfd = solaris_attropen(path, ".", O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1897 if (attrdirfd >= 0) {
1898 ret = solaris_unlinkat(attrdirfd, name);
1908 int sys_fremovexattr (int filedes, const char *name)
1910 #if defined(HAVE_FREMOVEXATTR)
1911 #ifndef XATTR_ADD_OPT
1912 return fremovexattr(filedes, name);
1915 return fremovexattr(filedes, name, options);
1917 #elif defined(HAVE_FREMOVEEA)
1918 return fremoveea(filedes, name);
1919 #elif defined(HAVE_EXTATTR_DELETE_FD)
1921 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1922 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1923 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1925 return extattr_delete_fd(filedes, attrnamespace, attrname);
1926 #elif defined(HAVE_ATTR_REMOVEF)
1928 char *attrname = strchr(name,'.') + 1;
1930 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1932 return attr_removef(filedes, attrname, flags);
1933 #elif defined(HAVE_ATTROPEN)
1935 int attrdirfd = solaris_openat(filedes, ".", O_RDONLY|O_XATTR, 0);
1936 if (attrdirfd >= 0) {
1937 ret = solaris_unlinkat(attrdirfd, name);
1947 int sys_setxattr (const char *path, const char *name, const void *value, size_t size, int flags)
1949 #if defined(HAVE_SETXATTR)
1950 #ifndef XATTR_ADD_OPT
1951 return setxattr(path, name, value, size, flags);
1954 return setxattr(path, name, value, size, 0, options);
1956 #elif defined(HAVE_SETEA)
1957 return setea(path, name, value, size, flags);
1958 #elif defined(HAVE_EXTATTR_SET_FILE)
1961 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1962 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1963 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1965 /* Check attribute existence */
1966 retval = extattr_get_file(path, attrnamespace, attrname, NULL, 0);
1968 /* REPLACE attribute, that doesn't exist */
1969 if (flags & XATTR_REPLACE && errno == ENOATTR) {
1973 /* Ignore other errors */
1976 /* CREATE attribute, that already exists */
1977 if (flags & XATTR_CREATE) {
1983 retval = extattr_set_file(path, attrnamespace, attrname, value, size);
1984 return (retval < 0) ? -1 : 0;
1985 #elif defined(HAVE_ATTR_SET)
1987 char *attrname = strchr(name,'.') + 1;
1989 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
1990 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
1991 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
1993 return attr_set(path, attrname, (const char *)value, size, myflags);
1994 #elif defined(HAVE_ATTROPEN)
1996 int myflags = O_RDWR;
1998 if (flags & XATTR_CREATE) myflags |= O_EXCL;
1999 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
2000 attrfd = solaris_attropen(path, name, myflags, (mode_t) SOLARIS_ATTRMODE);
2002 ret = solaris_write_xattr(attrfd, value, size);
2012 int sys_lsetxattr (const char *path, const char *name, const void *value, size_t size, int flags)
2014 #if defined(HAVE_LSETXATTR)
2015 return lsetxattr(path, name, value, size, flags);
2016 #elif defined(HAVE_SETXATTR) && defined(XATTR_ADD_OPT)
2017 int options = XATTR_NOFOLLOW;
2018 return setxattr(path, name, value, size, 0, options);
2019 #elif defined(LSETEA)
2020 return lsetea(path, name, value, size, flags);
2021 #elif defined(HAVE_EXTATTR_SET_LINK)
2024 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
2025 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
2026 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
2028 /* Check attribute existence */
2029 retval = extattr_get_link(path, attrnamespace, attrname, NULL, 0);
2031 /* REPLACE attribute, that doesn't exist */
2032 if (flags & XATTR_REPLACE && errno == ENOATTR) {
2036 /* Ignore other errors */
2039 /* CREATE attribute, that already exists */
2040 if (flags & XATTR_CREATE) {
2047 retval = extattr_set_link(path, attrnamespace, attrname, value, size);
2048 return (retval < 0) ? -1 : 0;
2049 #elif defined(HAVE_ATTR_SET)
2050 int myflags = ATTR_DONTFOLLOW;
2051 char *attrname = strchr(name,'.') + 1;
2053 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
2054 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
2055 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
2057 return attr_set(path, attrname, (const char *)value, size, myflags);
2058 #elif defined(HAVE_ATTROPEN)
2060 int myflags = O_RDWR | AT_SYMLINK_NOFOLLOW;
2062 if (flags & XATTR_CREATE) myflags |= O_EXCL;
2063 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
2064 attrfd = solaris_attropen(path, name, myflags, (mode_t) SOLARIS_ATTRMODE);
2066 ret = solaris_write_xattr(attrfd, value, size);
2076 int sys_fsetxattr (int filedes, const char *name, const void *value, size_t size, int flags)
2078 #if defined(HAVE_FSETXATTR)
2079 #ifndef XATTR_ADD_OPT
2080 return fsetxattr(filedes, name, value, size, flags);
2083 return fsetxattr(filedes, name, value, size, 0, options);
2085 #elif defined(HAVE_FSETEA)
2086 return fsetea(filedes, name, value, size, flags);
2087 #elif defined(HAVE_EXTATTR_SET_FD)
2090 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
2091 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
2092 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
2094 /* Check attribute existence */
2095 retval = extattr_get_fd(filedes, attrnamespace, attrname, NULL, 0);
2097 /* REPLACE attribute, that doesn't exist */
2098 if (flags & XATTR_REPLACE && errno == ENOATTR) {
2102 /* Ignore other errors */
2105 /* CREATE attribute, that already exists */
2106 if (flags & XATTR_CREATE) {
2112 retval = extattr_set_fd(filedes, attrnamespace, attrname, value, size);
2113 return (retval < 0) ? -1 : 0;
2114 #elif defined(HAVE_ATTR_SETF)
2116 char *attrname = strchr(name,'.') + 1;
2118 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
2119 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
2120 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
2122 return attr_setf(filedes, attrname, (const char *)value, size, myflags);
2123 #elif defined(HAVE_ATTROPEN)
2125 int myflags = O_RDWR | O_XATTR;
2127 if (flags & XATTR_CREATE) myflags |= O_EXCL;
2128 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
2129 attrfd = solaris_openat(filedes, name, myflags, (mode_t) SOLARIS_ATTRMODE);
2131 ret = solaris_write_xattr(attrfd, value, size);
2141 /**************************************************************************
2142 helper functions for Solaris' EA support
2143 ****************************************************************************/
2144 #ifdef HAVE_ATTROPEN
2145 static ssize_t solaris_read_xattr(int attrfd, void *value, size_t size)
2149 if (fstat(attrfd, &sbuf) == -1) {
2154 /* This is to return the current size of the named extended attribute */
2156 return sbuf.st_size;
2159 /* check size and read xattr */
2160 if (sbuf.st_size > size) {
2165 return read(attrfd, value, sbuf.st_size);
2168 static ssize_t solaris_list_xattr(int attrdirfd, char *list, size_t size)
2173 int newfd = dup(attrdirfd);
2174 /* CAUTION: The originating file descriptor should not be
2175 used again following the call to fdopendir().
2176 For that reason we dup() the file descriptor
2177 here to make things more clear. */
2178 dirp = fdopendir(newfd);
2180 while ((de = readdir(dirp))) {
2181 size_t listlen = strlen(de->d_name) + 1;
2182 if (!strcmp(de->d_name, ".") || !strcmp(de->d_name, "..")) {
2183 /* we don't want "." and ".." here: */
2184 DEBUG(10,("skipped EA %s\n",de->d_name));
2189 /* return the current size of the list of extended attribute names*/
2192 /* check size and copy entrieѕ + nul into list. */
2193 if ((len + listlen) > size) {
2198 strlcpy(list + len, de->d_name, listlen);
2204 if (closedir(dirp) == -1) {
2205 DEBUG(0,("closedir dirp failed: %s\n",strerror(errno)));
2211 static int solaris_unlinkat(int attrdirfd, const char *name)
2213 if (unlinkat(attrdirfd, name, 0) == -1) {
2214 if (errno == ENOENT) {
2222 static int solaris_attropen(const char *path, const char *attrpath, int oflag, mode_t mode)
2224 int filedes = attropen(path, attrpath, oflag, mode);
2225 if (filedes == -1) {
2226 DEBUG(10,("attropen FAILED: path: %s, name: %s, errno: %s\n",path,attrpath,strerror(errno)));
2227 if (errno == EINVAL) {
2236 static int solaris_openat(int fildes, const char *path, int oflag, mode_t mode)
2238 int filedes = openat(fildes, path, oflag, mode);
2239 if (filedes == -1) {
2240 DEBUG(10,("openat FAILED: fd: %d, path: %s, errno: %s\n",filedes,path,strerror(errno)));
2241 if (errno == EINVAL) {
2250 static int solaris_write_xattr(int attrfd, const char *value, size_t size)
2252 if ((ftruncate(attrfd, 0) == 0) && (write(attrfd, value, size) == size)) {
2255 DEBUG(10,("solaris_write_xattr FAILED!\n"));
2259 #endif /*HAVE_ATTROPEN*/
2262 /****************************************************************************
2263 Return the major devicenumber for UNIX extensions.
2264 ****************************************************************************/
2266 uint32 unix_dev_major(SMB_DEV_T dev)
2268 #if defined(HAVE_DEVICE_MAJOR_FN)
2269 return (uint32)major(dev);
2271 return (uint32)(dev >> 8);
2275 /****************************************************************************
2276 Return the minor devicenumber for UNIX extensions.
2277 ****************************************************************************/
2279 uint32 unix_dev_minor(SMB_DEV_T dev)
2281 #if defined(HAVE_DEVICE_MINOR_FN)
2282 return (uint32)minor(dev);
2284 return (uint32)(dev & 0xff);
2289 /*******************************************************************
2290 Return the number of CPUs.
2291 ********************************************************************/
2293 int sys_get_number_of_cores(void)
2297 #if defined(HAVE_SYSCONF)
2298 #if defined(_SC_NPROCESSORS_ONLN)
2299 ret = (int)sysconf(_SC_NPROCESSORS_ONLN);
2301 #if defined(_SC_NPROCESSORS_CONF)
2303 ret = (int)sysconf(_SC_NPROCESSORS_CONF);
2306 #elif defined(HAVE_SYSCTL) && defined(CTL_HW)
2308 unsigned int len = sizeof(ret);
2311 #if defined(HW_AVAILCPU)
2312 name[1] = HW_AVAILCPU;
2314 if (sysctl(name, 2, &ret, &len, NULL, 0) == -1) {
2318 #if defined(HW_NCPU)
2322 if (sysctl(nm, 2, &count, &len, NULL, 0) == -1) {
2335 #if defined(WITH_AIO)
2337 /*******************************************************************
2338 An aio_read wrapper.
2339 ********************************************************************/
2341 int sys_aio_read(SMB_STRUCT_AIOCB *aiocb)
2343 #if defined(HAVE_AIO_READ)
2344 return aio_read(aiocb);
2351 /*******************************************************************
2352 An aio_write wrapper.
2353 ********************************************************************/
2355 int sys_aio_write(SMB_STRUCT_AIOCB *aiocb)
2357 #if defined(HAVE_AIO_WRITE)
2358 return aio_write(aiocb);
2365 /*******************************************************************
2366 An aio_return wrapper.
2367 ********************************************************************/
2369 ssize_t sys_aio_return(SMB_STRUCT_AIOCB *aiocb)
2371 #if defined(HAVE_AIO_RETURN)
2372 return aio_return(aiocb);
2379 /*******************************************************************
2380 An aio_cancel wrapper.
2381 ********************************************************************/
2383 int sys_aio_cancel(int fd, SMB_STRUCT_AIOCB *aiocb)
2385 #if defined(HAVE_AIO_CANCEL)
2386 return aio_cancel(fd, aiocb);
2393 /*******************************************************************
2394 An aio_error wrapper.
2395 ********************************************************************/
2397 int sys_aio_error(const SMB_STRUCT_AIOCB *aiocb)
2399 #if defined(HAVE_AIO_ERROR)
2400 return aio_error(aiocb);
2407 /*******************************************************************
2408 An aio_fsync wrapper.
2409 ********************************************************************/
2411 int sys_aio_fsync(int op, SMB_STRUCT_AIOCB *aiocb)
2413 #if defined(HAVE_AIO_FSYNC)
2414 return aio_fsync(op, aiocb);
2421 /*******************************************************************
2422 An aio_fsync wrapper.
2423 ********************************************************************/
2425 int sys_aio_suspend(const SMB_STRUCT_AIOCB * const cblist[], int n, const struct timespec *timeout)
2427 #if defined(HAVE_AIO_FSYNC)
2428 return aio_suspend(cblist, n, timeout);
2434 #else /* !WITH_AIO */
2436 int sys_aio_read(SMB_STRUCT_AIOCB *aiocb)
2442 int sys_aio_write(SMB_STRUCT_AIOCB *aiocb)
2448 ssize_t sys_aio_return(SMB_STRUCT_AIOCB *aiocb)
2454 int sys_aio_cancel(int fd, SMB_STRUCT_AIOCB *aiocb)
2460 int sys_aio_error(const SMB_STRUCT_AIOCB *aiocb)
2466 int sys_aio_fsync(int op, SMB_STRUCT_AIOCB *aiocb)
2472 int sys_aio_suspend(const SMB_STRUCT_AIOCB * const cblist[], int n, const struct timespec *timeout)
2477 #endif /* WITH_AIO */