2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Jeremy Allison 1998-2005
6 Copyright (C) Timur Bakeyev 2005
7 Copyright (C) Bjoern Jacke 2006-2007
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "system/syslog.h"
25 #include "system/capability.h"
26 #include "system/passwd.h"
27 #include "system/filesys.h"
29 #ifdef HAVE_SYS_SYSCTL_H
30 #include <sys/sysctl.h>
33 #ifdef HAVE_SYS_PRCTL_H
34 #include <sys/prctl.h>
38 The idea is that this file will eventually have wrappers around all
39 important system calls in samba. The aims are:
41 - to enable easier porting by putting OS dependent stuff in here
43 - to allow for hooks into other "pseudo-filesystems"
45 - to allow easier integration of things like the japanese extensions
47 - to support the philosophy of Samba to expose the features of
48 the OS within the SMB model. In general whatever file/printer/variable
49 expansions/etc make sense to the OS should be acceptable to Samba.
54 /*******************************************************************
55 A read wrapper that will deal with EINTR.
56 ********************************************************************/
58 ssize_t sys_read(int fd, void *buf, size_t count)
63 ret = read(fd, buf, count);
64 #if defined(EWOULDBLOCK)
65 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
67 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
72 /*******************************************************************
73 A write wrapper that will deal with EINTR.
74 ********************************************************************/
76 ssize_t sys_write(int fd, const void *buf, size_t count)
81 ret = write(fd, buf, count);
82 #if defined(EWOULDBLOCK)
83 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
85 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
90 /*******************************************************************
91 A writev wrapper that will deal with EINTR.
92 ********************************************************************/
94 ssize_t sys_writev(int fd, const struct iovec *iov, int iovcnt)
99 /* Try to confuse write_data_iov a bit */
100 if ((random() % 5) == 0) {
101 return sys_write(fd, iov[0].iov_base, iov[0].iov_len);
103 if (iov[0].iov_len > 1) {
104 return sys_write(fd, iov[0].iov_base,
105 (random() % (iov[0].iov_len-1)) + 1);
110 ret = writev(fd, iov, iovcnt);
111 #if defined(EWOULDBLOCK)
112 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
114 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
119 /*******************************************************************
120 A pread wrapper that will deal with EINTR
121 ********************************************************************/
123 #if defined(HAVE_PREAD)
124 ssize_t sys_pread(int fd, void *buf, size_t count, SMB_OFF_T off)
129 ret = pread(fd, buf, count, off);
130 } while (ret == -1 && errno == EINTR);
135 /*******************************************************************
136 A write wrapper that will deal with EINTR
137 ********************************************************************/
139 #if defined(HAVE_PWRITE)
140 ssize_t sys_pwrite(int fd, const void *buf, size_t count, SMB_OFF_T off)
145 ret = pwrite(fd, buf, count, off);
146 } while (ret == -1 && errno == EINTR);
151 /*******************************************************************
152 A send wrapper that will deal with EINTR or EAGAIN or EWOULDBLOCK.
153 ********************************************************************/
155 ssize_t sys_send(int s, const void *msg, size_t len, int flags)
160 ret = send(s, msg, len, flags);
161 #if defined(EWOULDBLOCK)
162 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
164 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
169 /*******************************************************************
170 A recvfrom wrapper that will deal with EINTR.
171 ********************************************************************/
173 ssize_t sys_recvfrom(int s, void *buf, size_t len, int flags, struct sockaddr *from, socklen_t *fromlen)
178 ret = recvfrom(s, buf, len, flags, from, fromlen);
179 #if defined(EWOULDBLOCK)
180 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
182 } while (ret == -1 && (errno == EINTR || errno == EAGAIN));
187 /*******************************************************************
188 A fcntl wrapper that will deal with EINTR.
189 ********************************************************************/
191 int sys_fcntl_ptr(int fd, int cmd, void *arg)
196 ret = fcntl(fd, cmd, arg);
197 } while (ret == -1 && errno == EINTR);
201 /****************************************************************************
202 Get/Set all the possible time fields from a stat struct as a timespec.
203 ****************************************************************************/
205 static struct timespec get_atimespec(const struct stat *pst)
207 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
210 /* Old system - no ns timestamp. */
211 ret.tv_sec = pst->st_atime;
215 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
217 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
219 ret.tv_sec = pst->st_atime;
220 ret.tv_nsec = pst->st_atimensec;
222 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
224 ret.tv_sec = pst->st_atime;
225 ret.tv_nsec = pst->st_atime_n;
227 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
229 ret.tv_sec = pst->st_atime;
230 ret.tv_nsec = pst->st_uatime * 1000;
232 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
233 return pst->st_atimespec;
235 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
240 static struct timespec get_mtimespec(const struct stat *pst)
242 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
245 /* Old system - no ns timestamp. */
246 ret.tv_sec = pst->st_mtime;
250 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
252 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
254 ret.tv_sec = pst->st_mtime;
255 ret.tv_nsec = pst->st_mtimensec;
257 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
259 ret.tv_sec = pst->st_mtime;
260 ret.tv_nsec = pst->st_mtime_n;
262 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
264 ret.tv_sec = pst->st_mtime;
265 ret.tv_nsec = pst->st_umtime * 1000;
267 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
268 return pst->st_mtimespec;
270 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
275 static struct timespec get_ctimespec(const struct stat *pst)
277 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
280 /* Old system - no ns timestamp. */
281 ret.tv_sec = pst->st_ctime;
285 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
287 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
289 ret.tv_sec = pst->st_ctime;
290 ret.tv_nsec = pst->st_ctimensec;
292 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
294 ret.tv_sec = pst->st_ctime;
295 ret.tv_nsec = pst->st_ctime_n;
297 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
299 ret.tv_sec = pst->st_ctime;
300 ret.tv_nsec = pst->st_uctime * 1000;
302 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
303 return pst->st_ctimespec;
305 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
310 /****************************************************************************
311 Return the best approximation to a 'create time' under UNIX from a stat
313 ****************************************************************************/
315 static struct timespec calc_create_time_stat(const struct stat *st)
317 struct timespec ret, ret1;
318 struct timespec c_time = get_ctimespec(st);
319 struct timespec m_time = get_mtimespec(st);
320 struct timespec a_time = get_atimespec(st);
322 ret = timespec_compare(&c_time, &m_time) < 0 ? c_time : m_time;
323 ret1 = timespec_compare(&ret, &a_time) < 0 ? ret : a_time;
325 if(!null_timespec(ret1)) {
330 * One of ctime, mtime or atime was zero (probably atime).
331 * Just return MIN(ctime, mtime).
336 /****************************************************************************
337 Return the best approximation to a 'create time' under UNIX from a stat_ex
339 ****************************************************************************/
341 static struct timespec calc_create_time_stat_ex(const struct stat_ex *st)
343 struct timespec ret, ret1;
344 struct timespec c_time = st->st_ex_ctime;
345 struct timespec m_time = st->st_ex_mtime;
346 struct timespec a_time = st->st_ex_atime;
348 ret = timespec_compare(&c_time, &m_time) < 0 ? c_time : m_time;
349 ret1 = timespec_compare(&ret, &a_time) < 0 ? ret : a_time;
351 if(!null_timespec(ret1)) {
356 * One of ctime, mtime or atime was zero (probably atime).
357 * Just return MIN(ctime, mtime).
362 /****************************************************************************
363 Return the 'create time' from a stat struct if it exists (birthtime) or else
364 use the best approximation.
365 ****************************************************************************/
367 static void make_create_timespec(const struct stat *pst, struct stat_ex *dst,
368 bool fake_dir_create_times)
370 if (S_ISDIR(pst->st_mode) && fake_dir_create_times) {
371 dst->st_ex_btime.tv_sec = 315493200L; /* 1/1/1980 */
372 dst->st_ex_btime.tv_nsec = 0;
375 dst->st_ex_calculated_birthtime = false;
377 #if defined(HAVE_STRUCT_STAT_ST_BIRTHTIMESPEC_TV_NSEC)
378 dst->st_ex_btime = pst->st_birthtimespec;
379 #elif defined(HAVE_STRUCT_STAT_ST_BIRTHTIMENSEC)
380 dst->st_ex_btime.tv_sec = pst->st_birthtime;
381 dst->st_ex_btime.tv_nsec = pst->st_birthtimenspec;
382 #elif defined(HAVE_STRUCT_STAT_ST_BIRTHTIME)
383 dst->st_ex_btime.tv_sec = pst->st_birthtime;
384 dst->st_ex_btime.tv_nsec = 0;
386 dst->st_ex_btime = calc_create_time_stat(pst);
387 dst->st_ex_calculated_birthtime = true;
390 /* Deal with systems that don't initialize birthtime correctly.
391 * Pointed out by SATOH Fumiyasu <fumiyas@osstech.jp>.
393 if (null_timespec(dst->st_ex_btime)) {
394 dst->st_ex_btime = calc_create_time_stat(pst);
395 dst->st_ex_calculated_birthtime = true;
399 /****************************************************************************
400 If we update a timestamp in a stat_ex struct we may have to recalculate
401 the birthtime. For now only implement this for write time, but we may
402 also need to do it for atime and ctime. JRA.
403 ****************************************************************************/
405 void update_stat_ex_mtime(struct stat_ex *dst,
406 struct timespec write_ts)
408 dst->st_ex_mtime = write_ts;
410 /* We may have to recalculate btime. */
411 if (dst->st_ex_calculated_birthtime) {
412 dst->st_ex_btime = calc_create_time_stat_ex(dst);
416 void update_stat_ex_create_time(struct stat_ex *dst,
417 struct timespec create_time)
419 dst->st_ex_btime = create_time;
420 dst->st_ex_calculated_birthtime = false;
423 void init_stat_ex_from_stat (struct stat_ex *dst,
424 const struct stat *src,
425 bool fake_dir_create_times)
427 dst->st_ex_dev = src->st_dev;
428 dst->st_ex_ino = src->st_ino;
429 dst->st_ex_mode = src->st_mode;
430 dst->st_ex_nlink = src->st_nlink;
431 dst->st_ex_uid = src->st_uid;
432 dst->st_ex_gid = src->st_gid;
433 dst->st_ex_rdev = src->st_rdev;
434 dst->st_ex_size = src->st_size;
435 dst->st_ex_atime = get_atimespec(src);
436 dst->st_ex_mtime = get_mtimespec(src);
437 dst->st_ex_ctime = get_ctimespec(src);
438 make_create_timespec(src, dst, fake_dir_create_times);
439 #ifdef HAVE_STAT_ST_BLKSIZE
440 dst->st_ex_blksize = src->st_blksize;
442 dst->st_ex_blksize = STAT_ST_BLOCKSIZE;
445 #ifdef HAVE_STAT_ST_BLOCKS
446 dst->st_ex_blocks = src->st_blocks;
448 dst->st_ex_blocks = src->st_size / dst->st_ex_blksize + 1;
451 #ifdef HAVE_STAT_ST_FLAGS
452 dst->st_ex_flags = src->st_flags;
454 dst->st_ex_flags = 0;
458 /*******************************************************************
460 ********************************************************************/
462 int sys_stat(const char *fname, SMB_STRUCT_STAT *sbuf,
463 bool fake_dir_create_times)
467 ret = stat(fname, &statbuf);
469 /* we always want directories to appear zero size */
470 if (S_ISDIR(statbuf.st_mode)) {
473 init_stat_ex_from_stat(sbuf, &statbuf, fake_dir_create_times);
478 /*******************************************************************
480 ********************************************************************/
482 int sys_fstat(int fd, SMB_STRUCT_STAT *sbuf, bool fake_dir_create_times)
486 ret = fstat(fd, &statbuf);
488 /* we always want directories to appear zero size */
489 if (S_ISDIR(statbuf.st_mode)) {
492 init_stat_ex_from_stat(sbuf, &statbuf, fake_dir_create_times);
497 /*******************************************************************
499 ********************************************************************/
501 int sys_lstat(const char *fname,SMB_STRUCT_STAT *sbuf,
502 bool fake_dir_create_times)
506 ret = lstat(fname, &statbuf);
508 /* we always want directories to appear zero size */
509 if (S_ISDIR(statbuf.st_mode)) {
512 init_stat_ex_from_stat(sbuf, &statbuf, fake_dir_create_times);
517 /*******************************************************************
518 An posix_fallocate() wrapper.
519 ********************************************************************/
520 int sys_posix_fallocate(int fd, SMB_OFF_T offset, SMB_OFF_T len)
522 #if defined(HAVE_POSIX_FALLOCATE) && !defined(HAVE_BROKEN_POSIX_FALLOCATE)
523 return posix_fallocate(fd, offset, len);
524 #elif defined(F_RESVSP64)
525 /* this handles XFS on IRIX */
527 SMB_OFF_T new_len = offset + len;
531 /* unlikely to get a too large file on a 64bit system but ... */
535 fl.l_whence = SEEK_SET;
539 ret=fcntl(fd, F_RESVSP64, &fl);
544 /* Make sure the file gets enlarged after we allocated space: */
546 if (new_len > sbuf.st_size)
547 ftruncate64(fd, new_len);
554 /*******************************************************************
555 An fallocate() function that matches the semantics of the Linux one.
556 ********************************************************************/
558 #ifdef HAVE_LINUX_FALLOC_H
559 #include <linux/falloc.h>
562 int sys_fallocate(int fd, enum vfs_fallocate_mode mode, SMB_OFF_T offset, SMB_OFF_T len)
564 #if defined(HAVE_LINUX_FALLOCATE64) || defined(HAVE_LINUX_FALLOCATE)
567 case VFS_FALLOCATE_EXTEND_SIZE:
570 case VFS_FALLOCATE_KEEP_SIZE:
571 lmode = FALLOC_FL_KEEP_SIZE;
577 #if defined(HAVE_LINUX_FALLOCATE)
578 return fallocate(fd, lmode, offset, len);
581 /* TODO - plumb in fallocate from other filesysetms like VXFS etc. JRA. */
587 #if HAVE_KERNEL_SHARE_MODES
589 #define LOCK_MAND 32 /* This is a mandatory flock */
590 #define LOCK_READ 64 /* ... Which allows concurrent read operations */
591 #define LOCK_WRITE 128 /* ... Which allows concurrent write operations */
592 #define LOCK_RW 192 /* ... Which allows concurrent read & write ops */
596 /*******************************************************************
597 A flock() wrapper that will perform the kernel flock.
598 ********************************************************************/
600 void kernel_flock(int fd, uint32 share_mode, uint32 access_mask)
602 #if HAVE_KERNEL_SHARE_MODES
604 if (share_mode == FILE_SHARE_WRITE) {
605 kernel_mode = LOCK_MAND|LOCK_WRITE;
606 } else if (share_mode == FILE_SHARE_READ) {
607 kernel_mode = LOCK_MAND|LOCK_READ;
608 } else if (share_mode == FILE_SHARE_NONE) {
609 kernel_mode = LOCK_MAND;
612 flock(fd, kernel_mode);
620 /*******************************************************************
621 An fdopendir wrapper.
622 Ugly hack - we need dirfd for this to work correctly in the
624 ********************************************************************/
626 SMB_STRUCT_DIR *sys_fdopendir(int fd)
628 #if defined(HAVE_FDOPENDIR) && defined(HAVE_DIRFD)
629 return fdopendir(fd);
636 /*******************************************************************
638 ********************************************************************/
640 void sys_rewinddir(SMB_STRUCT_DIR *dirp)
646 ********************************************************************/
648 int sys_mknod(const char *path, mode_t mode, SMB_DEV_T dev)
650 #if defined(HAVE_MKNOD)
651 return mknod(path, mode, dev);
653 /* No mknod system call. */
659 /*******************************************************************
660 The wait() calls vary between systems
661 ********************************************************************/
663 int sys_waitpid(pid_t pid,int *status,int options)
666 return waitpid(pid,status,options);
667 #else /* HAVE_WAITPID */
668 return wait4(pid, status, options, NULL);
669 #endif /* HAVE_WAITPID */
672 /*******************************************************************
673 System wrapper for getwd. Always returns MALLOC'ed memory, or NULL
674 on error (malloc fail usually).
675 ********************************************************************/
677 char *sys_getwd(void)
679 #ifdef GETCWD_TAKES_NULL
680 return getcwd(NULL, 0);
682 char *wd = NULL, *s = NULL;
683 size_t allocated = PATH_MAX;
686 s = SMB_REALLOC_ARRAY(s, char, allocated);
690 wd = getcwd(s, allocated);
694 if (errno != ERANGE) {
699 if (allocated < PATH_MAX) {
706 char *s = SMB_MALLOC_ARRAY(char, PATH_MAX);
714 #if defined(HAVE_POSIX_CAPABILITIES)
716 /**************************************************************************
717 Try and abstract process capabilities (for systems that have them).
718 ****************************************************************************/
720 /* Set the POSIX capabilities needed for the given purpose into the effective
721 * capability set of the current process. Make sure they are always removed
722 * from the inheritable set, because there is no circumstance in which our
723 * children should inherit our elevated privileges.
725 static bool set_process_capability(enum smbd_capability capability,
728 cap_value_t cap_vals[2] = {0};
729 int num_cap_vals = 0;
733 #if defined(HAVE_PRCTL) && defined(PR_GET_KEEPCAPS) && defined(PR_SET_KEEPCAPS)
734 /* On Linux, make sure that any capabilities we grab are sticky
735 * across UID changes. We expect that this would allow us to keep both
736 * the effective and permitted capability sets, but as of circa 2.6.16,
737 * only the permitted set is kept. It is a bug (which we work around)
738 * that the effective set is lost, but we still require the effective
741 if (!prctl(PR_GET_KEEPCAPS)) {
742 prctl(PR_SET_KEEPCAPS, 1);
746 cap = cap_get_proc();
748 DEBUG(0,("set_process_capability: cap_get_proc failed: %s\n",
753 switch (capability) {
754 case KERNEL_OPLOCK_CAPABILITY:
755 #ifdef CAP_NETWORK_MGT
756 /* IRIX has CAP_NETWORK_MGT for oplocks. */
757 cap_vals[num_cap_vals++] = CAP_NETWORK_MGT;
760 case DMAPI_ACCESS_CAPABILITY:
761 #ifdef CAP_DEVICE_MGT
762 /* IRIX has CAP_DEVICE_MGT for DMAPI access. */
763 cap_vals[num_cap_vals++] = CAP_DEVICE_MGT;
765 /* Linux has CAP_MKNOD for DMAPI access. */
766 cap_vals[num_cap_vals++] = CAP_MKNOD;
769 case LEASE_CAPABILITY:
771 cap_vals[num_cap_vals++] = CAP_LEASE;
776 SMB_ASSERT(num_cap_vals <= ARRAY_SIZE(cap_vals));
778 if (num_cap_vals == 0) {
783 cap_set_flag(cap, CAP_EFFECTIVE, num_cap_vals, cap_vals,
784 enable ? CAP_SET : CAP_CLEAR);
786 /* We never want to pass capabilities down to our children, so make
787 * sure they are not inherited.
789 cap_set_flag(cap, CAP_INHERITABLE, num_cap_vals, cap_vals, CAP_CLEAR);
791 if (cap_set_proc(cap) == -1) {
792 DEBUG(0, ("set_process_capability: cap_set_proc failed: %s\n",
802 #endif /* HAVE_POSIX_CAPABILITIES */
804 /****************************************************************************
805 Gain the oplock capability from the kernel if possible.
806 ****************************************************************************/
808 void set_effective_capability(enum smbd_capability capability)
810 #if defined(HAVE_POSIX_CAPABILITIES)
811 set_process_capability(capability, True);
812 #endif /* HAVE_POSIX_CAPABILITIES */
815 void drop_effective_capability(enum smbd_capability capability)
817 #if defined(HAVE_POSIX_CAPABILITIES)
818 set_process_capability(capability, False);
819 #endif /* HAVE_POSIX_CAPABILITIES */
822 /**************************************************************************
823 Wrapper for random().
824 ****************************************************************************/
826 long sys_random(void)
828 #if defined(HAVE_RANDOM)
829 return (long)random();
830 #elif defined(HAVE_RAND)
833 DEBUG(0,("Error - no random function available !\n"));
838 /**************************************************************************
839 Wrapper for srandom().
840 ****************************************************************************/
842 void sys_srandom(unsigned int seed)
844 #if defined(HAVE_SRANDOM)
846 #elif defined(HAVE_SRAND)
849 DEBUG(0,("Error - no srandom function available !\n"));
855 #define NGROUPS_MAX 32 /* Guess... */
858 /**************************************************************************
859 Returns equivalent to NGROUPS_MAX - using sysconf if needed.
860 ****************************************************************************/
864 #if defined(SYSCONF_SC_NGROUPS_MAX)
865 int ret = sysconf(_SC_NGROUPS_MAX);
866 return (ret == -1) ? NGROUPS_MAX : ret;
872 /**************************************************************************
873 Wrap setgroups and getgroups for systems that declare getgroups() as
874 returning an array of gid_t, but actuall return an array of int.
875 ****************************************************************************/
877 #if defined(HAVE_BROKEN_GETGROUPS)
879 #ifdef HAVE_BROKEN_GETGROUPS
885 static int sys_broken_getgroups(int setlen, gid_t *gidset)
892 return getgroups(setlen, &gid);
896 * Broken case. We need to allocate a
897 * GID_T array of size setlen.
906 setlen = groups_max();
908 if((group_list = SMB_MALLOC_ARRAY(GID_T, setlen)) == NULL) {
909 DEBUG(0,("sys_getgroups: Malloc fail.\n"));
913 if((ngroups = getgroups(setlen, group_list)) < 0) {
914 int saved_errno = errno;
915 SAFE_FREE(group_list);
920 for(i = 0; i < ngroups; i++)
921 gidset[i] = (gid_t)group_list[i];
923 SAFE_FREE(group_list);
927 static int sys_broken_setgroups(int setlen, gid_t *gidset)
935 if (setlen < 0 || setlen > groups_max()) {
941 * Broken case. We need to allocate a
942 * GID_T array of size setlen.
945 if((group_list = SMB_MALLOC_ARRAY(GID_T, setlen)) == NULL) {
946 DEBUG(0,("sys_setgroups: Malloc fail.\n"));
950 for(i = 0; i < setlen; i++)
951 group_list[i] = (GID_T) gidset[i];
953 if(setgroups(setlen, group_list) != 0) {
954 int saved_errno = errno;
955 SAFE_FREE(group_list);
960 SAFE_FREE(group_list);
964 #endif /* HAVE_BROKEN_GETGROUPS */
966 /* This is a list of systems that require the first GID passed to setgroups(2)
967 * to be the effective GID. If your system is one of these, add it here.
969 #if defined (FREEBSD) || defined (DARWINOS)
970 #define USE_BSD_SETGROUPS
973 #if defined(USE_BSD_SETGROUPS)
974 /* Depending on the particular BSD implementation, the first GID that is
975 * passed to setgroups(2) will either be ignored or will set the credential's
976 * effective GID. In either case, the right thing to do is to guarantee that
977 * gidset[0] is the effective GID.
979 static int sys_bsd_setgroups(gid_t primary_gid, int setlen, const gid_t *gidset)
981 gid_t *new_gidset = NULL;
985 /* setgroups(2) will fail with EINVAL if we pass too many groups. */
988 /* No group list, just make sure we are setting the efective GID. */
990 return setgroups(1, &primary_gid);
993 /* If the primary gid is not the first array element, grow the array
994 * and insert it at the front.
996 if (gidset[0] != primary_gid) {
997 new_gidset = SMB_MALLOC_ARRAY(gid_t, setlen + 1);
998 if (new_gidset == NULL) {
1002 memcpy(new_gidset + 1, gidset, (setlen * sizeof(gid_t)));
1003 new_gidset[0] = primary_gid;
1008 DEBUG(3, ("forced to truncate group list from %d to %d\n",
1013 #if defined(HAVE_BROKEN_GETGROUPS)
1014 ret = sys_broken_setgroups(setlen, new_gidset ? new_gidset : gidset);
1016 ret = setgroups(setlen, new_gidset ? new_gidset : gidset);
1021 SAFE_FREE(new_gidset);
1028 #endif /* USE_BSD_SETGROUPS */
1030 /**************************************************************************
1031 Wrapper for getgroups. Deals with broken (int) case.
1032 ****************************************************************************/
1034 int sys_getgroups(int setlen, gid_t *gidset)
1036 #if defined(HAVE_BROKEN_GETGROUPS)
1037 return sys_broken_getgroups(setlen, gidset);
1039 return getgroups(setlen, gidset);
1043 /**************************************************************************
1044 Wrapper for setgroups. Deals with broken (int) case and BSD case.
1045 ****************************************************************************/
1047 int sys_setgroups(gid_t UNUSED(primary_gid), int setlen, gid_t *gidset)
1049 #if !defined(HAVE_SETGROUPS)
1052 #endif /* HAVE_SETGROUPS */
1054 #if defined(USE_BSD_SETGROUPS)
1055 return sys_bsd_setgroups(primary_gid, setlen, gidset);
1056 #elif defined(HAVE_BROKEN_GETGROUPS)
1057 return sys_broken_setgroups(setlen, gidset);
1059 return setgroups(setlen, gidset);
1063 /**************************************************************************
1064 Extract a command into an arg list.
1065 ****************************************************************************/
1067 static char **extract_args(TALLOC_CTX *mem_ctx, const char *command)
1076 if (!(trunc_cmd = talloc_strdup(mem_ctx, command))) {
1077 DEBUG(0, ("talloc failed\n"));
1081 if(!(ptr = strtok_r(trunc_cmd, " \t", &saveptr))) {
1082 TALLOC_FREE(trunc_cmd);
1091 for( argcl = 1; ptr; ptr = strtok_r(NULL, " \t", &saveptr))
1094 TALLOC_FREE(trunc_cmd);
1096 if (!(argl = talloc_array(mem_ctx, char *, argcl + 1))) {
1101 * Now do the extraction.
1104 if (!(trunc_cmd = talloc_strdup(mem_ctx, command))) {
1108 ptr = strtok_r(trunc_cmd, " \t", &saveptr);
1111 if (!(argl[i++] = talloc_strdup(argl, ptr))) {
1115 while((ptr = strtok_r(NULL, " \t", &saveptr)) != NULL) {
1117 if (!(argl[i++] = talloc_strdup(argl, ptr))) {
1123 TALLOC_FREE(trunc_cmd);
1127 DEBUG(0, ("talloc failed\n"));
1128 TALLOC_FREE(trunc_cmd);
1134 /**************************************************************************
1135 Wrapper for popen. Safer as it doesn't search a path.
1136 Modified from the glibc sources.
1137 modified by tridge to return a file descriptor. We must kick our FILE* habit
1138 ****************************************************************************/
1140 typedef struct _popen_list
1144 struct _popen_list *next;
1147 static popen_list *popen_chain;
1149 int sys_popen(const char *command)
1151 int parent_end, child_end;
1153 popen_list *entry = NULL;
1156 if (pipe(pipe_fds) < 0)
1159 parent_end = pipe_fds[0];
1160 child_end = pipe_fds[1];
1167 if((entry = SMB_MALLOC_P(popen_list)) == NULL)
1170 ZERO_STRUCTP(entry);
1173 * Extract the command and args into a NULL terminated array.
1176 if(!(argl = extract_args(NULL, command)))
1179 entry->child_pid = fork();
1181 if (entry->child_pid == -1) {
1185 if (entry->child_pid == 0) {
1191 int child_std_end = STDOUT_FILENO;
1195 if (child_end != child_std_end) {
1196 dup2 (child_end, child_std_end);
1201 * POSIX.2: "popen() shall ensure that any streams from previous
1202 * popen() calls that remain open in the parent process are closed
1203 * in the new child process."
1206 for (p = popen_chain; p; p = p->next)
1209 execv(argl[0], argl);
1220 /* Link into popen_chain. */
1221 entry->next = popen_chain;
1222 popen_chain = entry;
1223 entry->fd = parent_end;
1236 /**************************************************************************
1237 Wrapper for pclose. Modified from the glibc sources.
1238 ****************************************************************************/
1240 int sys_pclose(int fd)
1243 popen_list **ptr = &popen_chain;
1244 popen_list *entry = NULL;
1248 /* Unlink from popen_chain. */
1249 for ( ; *ptr != NULL; ptr = &(*ptr)->next) {
1250 if ((*ptr)->fd == fd) {
1252 *ptr = (*ptr)->next;
1258 if (status < 0 || close(entry->fd) < 0)
1262 * As Samba is catching and eating child process
1263 * exits we don't really care about the child exit
1264 * code, a -1 with errno = ECHILD will do fine for us.
1268 wait_pid = sys_waitpid (entry->child_pid, &wstatus, 0);
1269 } while (wait_pid == -1 && errno == EINTR);
1278 /**************************************************************************
1279 Wrapper for Admin Logs.
1280 ****************************************************************************/
1282 void sys_adminlog(int priority, const char *format_str, ...)
1286 char *msgbuf = NULL;
1288 va_start( ap, format_str );
1289 ret = vasprintf( &msgbuf, format_str, ap );
1295 #if defined(HAVE_SYSLOG)
1296 syslog( priority, "%s", msgbuf );
1298 DEBUG(0,("%s", msgbuf ));
1303 /******** Solaris EA helper function prototypes ********/
1304 #ifdef HAVE_ATTROPEN
1305 #define SOLARIS_ATTRMODE S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP
1306 static int solaris_write_xattr(int attrfd, const char *value, size_t size);
1307 static ssize_t solaris_read_xattr(int attrfd, void *value, size_t size);
1308 static ssize_t solaris_list_xattr(int attrdirfd, char *list, size_t size);
1309 static int solaris_unlinkat(int attrdirfd, const char *name);
1310 static int solaris_attropen(const char *path, const char *attrpath, int oflag, mode_t mode);
1311 static int solaris_openat(int fildes, const char *path, int oflag, mode_t mode);
1314 /**************************************************************************
1315 Wrappers for extented attribute calls. Based on the Linux package with
1316 support for IRIX and (Net|Free)BSD also. Expand as other systems have them.
1317 ****************************************************************************/
1319 ssize_t sys_getxattr (const char *path, const char *name, void *value, size_t size)
1321 #if defined(HAVE_GETXATTR)
1322 #ifndef XATTR_ADD_OPT
1323 return getxattr(path, name, value, size);
1326 return getxattr(path, name, value, size, 0, options);
1328 #elif defined(HAVE_GETEA)
1329 return getea(path, name, value, size);
1330 #elif defined(HAVE_EXTATTR_GET_FILE)
1333 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1334 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1335 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1337 * The BSD implementation has a nasty habit of silently truncating
1338 * the returned value to the size of the buffer, so we have to check
1339 * that the buffer is large enough to fit the returned value.
1341 if((retval=extattr_get_file(path, attrnamespace, attrname, NULL, 0)) >= 0) {
1346 if((retval=extattr_get_file(path, attrnamespace, attrname, value, size)) >= 0)
1350 DEBUG(10,("sys_getxattr: extattr_get_file() failed with: %s\n", strerror(errno)));
1352 #elif defined(HAVE_ATTR_GET)
1353 int retval, flags = 0;
1354 int valuelength = (int)size;
1355 char *attrname = strchr(name,'.') + 1;
1357 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1359 retval = attr_get(path, attrname, (char *)value, &valuelength, flags);
1361 return retval ? retval : valuelength;
1362 #elif defined(HAVE_ATTROPEN)
1364 int attrfd = solaris_attropen(path, name, O_RDONLY, 0);
1366 ret = solaris_read_xattr(attrfd, value, size);
1376 ssize_t sys_lgetxattr (const char *path, const char *name, void *value, size_t size)
1378 #if defined(HAVE_LGETXATTR)
1379 return lgetxattr(path, name, value, size);
1380 #elif defined(HAVE_GETXATTR) && defined(XATTR_ADD_OPT)
1381 int options = XATTR_NOFOLLOW;
1382 return getxattr(path, name, value, size, 0, options);
1383 #elif defined(HAVE_LGETEA)
1384 return lgetea(path, name, value, size);
1385 #elif defined(HAVE_EXTATTR_GET_LINK)
1388 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1389 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1390 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1392 if((retval=extattr_get_link(path, attrnamespace, attrname, NULL, 0)) >= 0) {
1397 if((retval=extattr_get_link(path, attrnamespace, attrname, value, size)) >= 0)
1401 DEBUG(10,("sys_lgetxattr: extattr_get_link() failed with: %s\n", strerror(errno)));
1403 #elif defined(HAVE_ATTR_GET)
1404 int retval, flags = ATTR_DONTFOLLOW;
1405 int valuelength = (int)size;
1406 char *attrname = strchr(name,'.') + 1;
1408 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1410 retval = attr_get(path, attrname, (char *)value, &valuelength, flags);
1412 return retval ? retval : valuelength;
1413 #elif defined(HAVE_ATTROPEN)
1415 int attrfd = solaris_attropen(path, name, O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1417 ret = solaris_read_xattr(attrfd, value, size);
1427 ssize_t sys_fgetxattr (int filedes, const char *name, void *value, size_t size)
1429 #if defined(HAVE_FGETXATTR)
1430 #ifndef XATTR_ADD_OPT
1431 return fgetxattr(filedes, name, value, size);
1434 return fgetxattr(filedes, name, value, size, 0, options);
1436 #elif defined(HAVE_FGETEA)
1437 return fgetea(filedes, name, value, size);
1438 #elif defined(HAVE_EXTATTR_GET_FD)
1441 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1442 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1443 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1445 if((retval=extattr_get_fd(filedes, attrnamespace, attrname, NULL, 0)) >= 0) {
1450 if((retval=extattr_get_fd(filedes, attrnamespace, attrname, value, size)) >= 0)
1454 DEBUG(10,("sys_fgetxattr: extattr_get_fd() failed with: %s\n", strerror(errno)));
1456 #elif defined(HAVE_ATTR_GETF)
1457 int retval, flags = 0;
1458 int valuelength = (int)size;
1459 char *attrname = strchr(name,'.') + 1;
1461 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1463 retval = attr_getf(filedes, attrname, (char *)value, &valuelength, flags);
1465 return retval ? retval : valuelength;
1466 #elif defined(HAVE_ATTROPEN)
1468 int attrfd = solaris_openat(filedes, name, O_RDONLY|O_XATTR, 0);
1470 ret = solaris_read_xattr(attrfd, value, size);
1480 #if defined(HAVE_EXTATTR_LIST_FILE)
1482 #define EXTATTR_PREFIX(s) (s), (sizeof((s))-1)
1490 { EXTATTR_NAMESPACE_SYSTEM, EXTATTR_PREFIX("system.") },
1491 { EXTATTR_NAMESPACE_USER, EXTATTR_PREFIX("user.") },
1499 static ssize_t bsd_attr_list (int type, extattr_arg arg, char *list, size_t size)
1501 ssize_t list_size, total_size = 0;
1504 /* Iterate through extattr(2) namespaces */
1505 for(t = 0; t < ARRAY_SIZE(extattr); t++) {
1507 #if defined(HAVE_EXTATTR_LIST_FILE)
1509 list_size = extattr_list_file(arg.path, extattr[t].space, list, size);
1512 #if defined(HAVE_EXTATTR_LIST_LINK)
1514 list_size = extattr_list_link(arg.path, extattr[t].space, list, size);
1517 #if defined(HAVE_EXTATTR_LIST_FD)
1519 list_size = extattr_list_fd(arg.filedes, extattr[t].space, list, size);
1526 /* Some error happend. Errno should be set by the previous call */
1532 /* XXX: Call with an empty buffer may be used to calculate
1533 necessary buffer size. Unfortunately, we can't say, how
1534 many attributes were returned, so here is the potential
1535 problem with the emulation.
1538 /* Take the worse case of one char attribute names -
1539 two bytes per name plus one more for sanity.
1541 total_size += list_size + (list_size/2 + 1)*extattr[t].len;
1544 /* Count necessary offset to fit namespace prefixes */
1546 for(i = 0; i < list_size; i += list[i] + 1)
1547 len += extattr[t].len;
1549 total_size += list_size + len;
1550 /* Buffer is too small to fit the results */
1551 if(total_size > size) {
1555 /* Shift results back, so we can prepend prefixes */
1556 buf = (char *)memmove(list + len, list, list_size);
1558 for(i = 0; i < list_size; i += len + 1) {
1560 strncpy(list, extattr[t].name, extattr[t].len + 1);
1561 list += extattr[t].len;
1562 strncpy(list, buf + i + 1, len);
1573 #if defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1574 static char attr_buffer[ATTR_MAX_VALUELEN];
1576 static ssize_t irix_attr_list(const char *path, int filedes, char *list, size_t size, int flags)
1578 int retval = 0, index;
1579 attrlist_cursor_t *cursor = 0;
1581 attrlist_t * al = (attrlist_t *)attr_buffer;
1583 size_t ent_size, left = size;
1588 retval = attr_listf(filedes, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1590 retval = attr_list(path, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1592 for (index = 0; index < al->al_count; index++) {
1593 ae = ATTR_ENTRY(attr_buffer, index);
1594 ent_size = strlen(ae->a_name) + sizeof("user.");
1595 if (left >= ent_size) {
1596 strncpy(bp, "user.", sizeof("user."));
1597 strncat(bp, ae->a_name, ent_size - sizeof("user."));
1605 total_size += ent_size;
1607 if (al->al_more == 0) break;
1614 retval = attr_listf(filedes, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1616 retval = attr_list(path, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1618 for (index = 0; index < al->al_count; index++) {
1619 ae = ATTR_ENTRY(attr_buffer, index);
1620 ent_size = strlen(ae->a_name) + sizeof("system.");
1621 if (left >= ent_size) {
1622 strncpy(bp, "system.", sizeof("system."));
1623 strncat(bp, ae->a_name, ent_size - sizeof("system."));
1631 total_size += ent_size;
1633 if (al->al_more == 0) break;
1636 return (ssize_t)(retval ? retval : total_size);
1641 ssize_t sys_listxattr (const char *path, char *list, size_t size)
1643 #if defined(HAVE_LISTXATTR)
1644 #ifndef XATTR_ADD_OPT
1645 return listxattr(path, list, size);
1648 return listxattr(path, list, size, options);
1650 #elif defined(HAVE_LISTEA)
1651 return listea(path, list, size);
1652 #elif defined(HAVE_EXTATTR_LIST_FILE)
1655 return bsd_attr_list(0, arg, list, size);
1656 #elif defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1657 return irix_attr_list(path, 0, list, size, 0);
1658 #elif defined(HAVE_ATTROPEN)
1660 int attrdirfd = solaris_attropen(path, ".", O_RDONLY, 0);
1661 if (attrdirfd >= 0) {
1662 ret = solaris_list_xattr(attrdirfd, list, size);
1672 ssize_t sys_llistxattr (const char *path, char *list, size_t size)
1674 #if defined(HAVE_LLISTXATTR)
1675 return llistxattr(path, list, size);
1676 #elif defined(HAVE_LISTXATTR) && defined(XATTR_ADD_OPT)
1677 int options = XATTR_NOFOLLOW;
1678 return listxattr(path, list, size, options);
1679 #elif defined(HAVE_LLISTEA)
1680 return llistea(path, list, size);
1681 #elif defined(HAVE_EXTATTR_LIST_LINK)
1684 return bsd_attr_list(1, arg, list, size);
1685 #elif defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1686 return irix_attr_list(path, 0, list, size, ATTR_DONTFOLLOW);
1687 #elif defined(HAVE_ATTROPEN)
1689 int attrdirfd = solaris_attropen(path, ".", O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1690 if (attrdirfd >= 0) {
1691 ret = solaris_list_xattr(attrdirfd, list, size);
1701 ssize_t sys_flistxattr (int filedes, char *list, size_t size)
1703 #if defined(HAVE_FLISTXATTR)
1704 #ifndef XATTR_ADD_OPT
1705 return flistxattr(filedes, list, size);
1708 return flistxattr(filedes, list, size, options);
1710 #elif defined(HAVE_FLISTEA)
1711 return flistea(filedes, list, size);
1712 #elif defined(HAVE_EXTATTR_LIST_FD)
1714 arg.filedes = filedes;
1715 return bsd_attr_list(2, arg, list, size);
1716 #elif defined(HAVE_ATTR_LISTF)
1717 return irix_attr_list(NULL, filedes, list, size, 0);
1718 #elif defined(HAVE_ATTROPEN)
1720 int attrdirfd = solaris_openat(filedes, ".", O_RDONLY|O_XATTR, 0);
1721 if (attrdirfd >= 0) {
1722 ret = solaris_list_xattr(attrdirfd, list, size);
1732 int sys_removexattr (const char *path, const char *name)
1734 #if defined(HAVE_REMOVEXATTR)
1735 #ifndef XATTR_ADD_OPT
1736 return removexattr(path, name);
1739 return removexattr(path, name, options);
1741 #elif defined(HAVE_REMOVEEA)
1742 return removeea(path, name);
1743 #elif defined(HAVE_EXTATTR_DELETE_FILE)
1745 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1746 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1747 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1749 return extattr_delete_file(path, attrnamespace, attrname);
1750 #elif defined(HAVE_ATTR_REMOVE)
1752 char *attrname = strchr(name,'.') + 1;
1754 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1756 return attr_remove(path, attrname, flags);
1757 #elif defined(HAVE_ATTROPEN)
1759 int attrdirfd = solaris_attropen(path, ".", O_RDONLY, 0);
1760 if (attrdirfd >= 0) {
1761 ret = solaris_unlinkat(attrdirfd, name);
1771 int sys_lremovexattr (const char *path, const char *name)
1773 #if defined(HAVE_LREMOVEXATTR)
1774 return lremovexattr(path, name);
1775 #elif defined(HAVE_REMOVEXATTR) && defined(XATTR_ADD_OPT)
1776 int options = XATTR_NOFOLLOW;
1777 return removexattr(path, name, options);
1778 #elif defined(HAVE_LREMOVEEA)
1779 return lremoveea(path, name);
1780 #elif defined(HAVE_EXTATTR_DELETE_LINK)
1782 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1783 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1784 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1786 return extattr_delete_link(path, attrnamespace, attrname);
1787 #elif defined(HAVE_ATTR_REMOVE)
1788 int flags = ATTR_DONTFOLLOW;
1789 char *attrname = strchr(name,'.') + 1;
1791 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1793 return attr_remove(path, attrname, flags);
1794 #elif defined(HAVE_ATTROPEN)
1796 int attrdirfd = solaris_attropen(path, ".", O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1797 if (attrdirfd >= 0) {
1798 ret = solaris_unlinkat(attrdirfd, name);
1808 int sys_fremovexattr (int filedes, const char *name)
1810 #if defined(HAVE_FREMOVEXATTR)
1811 #ifndef XATTR_ADD_OPT
1812 return fremovexattr(filedes, name);
1815 return fremovexattr(filedes, name, options);
1817 #elif defined(HAVE_FREMOVEEA)
1818 return fremoveea(filedes, name);
1819 #elif defined(HAVE_EXTATTR_DELETE_FD)
1821 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1822 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1823 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1825 return extattr_delete_fd(filedes, attrnamespace, attrname);
1826 #elif defined(HAVE_ATTR_REMOVEF)
1828 char *attrname = strchr(name,'.') + 1;
1830 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1832 return attr_removef(filedes, attrname, flags);
1833 #elif defined(HAVE_ATTROPEN)
1835 int attrdirfd = solaris_openat(filedes, ".", O_RDONLY|O_XATTR, 0);
1836 if (attrdirfd >= 0) {
1837 ret = solaris_unlinkat(attrdirfd, name);
1847 int sys_setxattr (const char *path, const char *name, const void *value, size_t size, int flags)
1849 #if defined(HAVE_SETXATTR)
1850 #ifndef XATTR_ADD_OPT
1851 return setxattr(path, name, value, size, flags);
1854 return setxattr(path, name, value, size, 0, options);
1856 #elif defined(HAVE_SETEA)
1857 return setea(path, name, value, size, flags);
1858 #elif defined(HAVE_EXTATTR_SET_FILE)
1861 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1862 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1863 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1865 /* Check attribute existence */
1866 retval = extattr_get_file(path, attrnamespace, attrname, NULL, 0);
1868 /* REPLACE attribute, that doesn't exist */
1869 if (flags & XATTR_REPLACE && errno == ENOATTR) {
1873 /* Ignore other errors */
1876 /* CREATE attribute, that already exists */
1877 if (flags & XATTR_CREATE) {
1883 retval = extattr_set_file(path, attrnamespace, attrname, value, size);
1884 return (retval < 0) ? -1 : 0;
1885 #elif defined(HAVE_ATTR_SET)
1887 char *attrname = strchr(name,'.') + 1;
1889 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
1890 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
1891 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
1893 return attr_set(path, attrname, (const char *)value, size, myflags);
1894 #elif defined(HAVE_ATTROPEN)
1896 int myflags = O_RDWR;
1898 if (flags & XATTR_CREATE) myflags |= O_EXCL;
1899 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
1900 attrfd = solaris_attropen(path, name, myflags, (mode_t) SOLARIS_ATTRMODE);
1902 ret = solaris_write_xattr(attrfd, value, size);
1912 int sys_lsetxattr (const char *path, const char *name, const void *value, size_t size, int flags)
1914 #if defined(HAVE_LSETXATTR)
1915 return lsetxattr(path, name, value, size, flags);
1916 #elif defined(HAVE_SETXATTR) && defined(XATTR_ADD_OPT)
1917 int options = XATTR_NOFOLLOW;
1918 return setxattr(path, name, value, size, 0, options);
1919 #elif defined(LSETEA)
1920 return lsetea(path, name, value, size, flags);
1921 #elif defined(HAVE_EXTATTR_SET_LINK)
1924 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1925 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1926 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1928 /* Check attribute existence */
1929 retval = extattr_get_link(path, attrnamespace, attrname, NULL, 0);
1931 /* REPLACE attribute, that doesn't exist */
1932 if (flags & XATTR_REPLACE && errno == ENOATTR) {
1936 /* Ignore other errors */
1939 /* CREATE attribute, that already exists */
1940 if (flags & XATTR_CREATE) {
1947 retval = extattr_set_link(path, attrnamespace, attrname, value, size);
1948 return (retval < 0) ? -1 : 0;
1949 #elif defined(HAVE_ATTR_SET)
1950 int myflags = ATTR_DONTFOLLOW;
1951 char *attrname = strchr(name,'.') + 1;
1953 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
1954 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
1955 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
1957 return attr_set(path, attrname, (const char *)value, size, myflags);
1958 #elif defined(HAVE_ATTROPEN)
1960 int myflags = O_RDWR | AT_SYMLINK_NOFOLLOW;
1962 if (flags & XATTR_CREATE) myflags |= O_EXCL;
1963 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
1964 attrfd = solaris_attropen(path, name, myflags, (mode_t) SOLARIS_ATTRMODE);
1966 ret = solaris_write_xattr(attrfd, value, size);
1976 int sys_fsetxattr (int filedes, const char *name, const void *value, size_t size, int flags)
1978 #if defined(HAVE_FSETXATTR)
1979 #ifndef XATTR_ADD_OPT
1980 return fsetxattr(filedes, name, value, size, flags);
1983 return fsetxattr(filedes, name, value, size, 0, options);
1985 #elif defined(HAVE_FSETEA)
1986 return fsetea(filedes, name, value, size, flags);
1987 #elif defined(HAVE_EXTATTR_SET_FD)
1990 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1991 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1992 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1994 /* Check attribute existence */
1995 retval = extattr_get_fd(filedes, attrnamespace, attrname, NULL, 0);
1997 /* REPLACE attribute, that doesn't exist */
1998 if (flags & XATTR_REPLACE && errno == ENOATTR) {
2002 /* Ignore other errors */
2005 /* CREATE attribute, that already exists */
2006 if (flags & XATTR_CREATE) {
2012 retval = extattr_set_fd(filedes, attrnamespace, attrname, value, size);
2013 return (retval < 0) ? -1 : 0;
2014 #elif defined(HAVE_ATTR_SETF)
2016 char *attrname = strchr(name,'.') + 1;
2018 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
2019 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
2020 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
2022 return attr_setf(filedes, attrname, (const char *)value, size, myflags);
2023 #elif defined(HAVE_ATTROPEN)
2025 int myflags = O_RDWR | O_XATTR;
2027 if (flags & XATTR_CREATE) myflags |= O_EXCL;
2028 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
2029 attrfd = solaris_openat(filedes, name, myflags, (mode_t) SOLARIS_ATTRMODE);
2031 ret = solaris_write_xattr(attrfd, value, size);
2041 /**************************************************************************
2042 helper functions for Solaris' EA support
2043 ****************************************************************************/
2044 #ifdef HAVE_ATTROPEN
2045 static ssize_t solaris_read_xattr(int attrfd, void *value, size_t size)
2049 if (fstat(attrfd, &sbuf) == -1) {
2054 /* This is to return the current size of the named extended attribute */
2056 return sbuf.st_size;
2059 /* check size and read xattr */
2060 if (sbuf.st_size > size) {
2065 return read(attrfd, value, sbuf.st_size);
2068 static ssize_t solaris_list_xattr(int attrdirfd, char *list, size_t size)
2073 int newfd = dup(attrdirfd);
2074 /* CAUTION: The originating file descriptor should not be
2075 used again following the call to fdopendir().
2076 For that reason we dup() the file descriptor
2077 here to make things more clear. */
2078 dirp = fdopendir(newfd);
2080 while ((de = readdir(dirp))) {
2081 size_t listlen = strlen(de->d_name) + 1;
2082 if (!strcmp(de->d_name, ".") || !strcmp(de->d_name, "..")) {
2083 /* we don't want "." and ".." here: */
2084 DEBUG(10,("skipped EA %s\n",de->d_name));
2089 /* return the current size of the list of extended attribute names*/
2092 /* check size and copy entrieѕ + nul into list. */
2093 if ((len + listlen) > size) {
2098 strlcpy(list + len, de->d_name, listlen);
2104 if (closedir(dirp) == -1) {
2105 DEBUG(0,("closedir dirp failed: %s\n",strerror(errno)));
2111 static int solaris_unlinkat(int attrdirfd, const char *name)
2113 if (unlinkat(attrdirfd, name, 0) == -1) {
2114 if (errno == ENOENT) {
2122 static int solaris_attropen(const char *path, const char *attrpath, int oflag, mode_t mode)
2124 int filedes = attropen(path, attrpath, oflag, mode);
2125 if (filedes == -1) {
2126 DEBUG(10,("attropen FAILED: path: %s, name: %s, errno: %s\n",path,attrpath,strerror(errno)));
2127 if (errno == EINVAL) {
2136 static int solaris_openat(int fildes, const char *path, int oflag, mode_t mode)
2138 int filedes = openat(fildes, path, oflag, mode);
2139 if (filedes == -1) {
2140 DEBUG(10,("openat FAILED: fd: %d, path: %s, errno: %s\n",filedes,path,strerror(errno)));
2141 if (errno == EINVAL) {
2150 static int solaris_write_xattr(int attrfd, const char *value, size_t size)
2152 if ((ftruncate(attrfd, 0) == 0) && (write(attrfd, value, size) == size)) {
2155 DEBUG(10,("solaris_write_xattr FAILED!\n"));
2159 #endif /*HAVE_ATTROPEN*/
2162 /****************************************************************************
2163 Return the major devicenumber for UNIX extensions.
2164 ****************************************************************************/
2166 uint32 unix_dev_major(SMB_DEV_T dev)
2168 #if defined(HAVE_DEVICE_MAJOR_FN)
2169 return (uint32)major(dev);
2171 return (uint32)(dev >> 8);
2175 /****************************************************************************
2176 Return the minor devicenumber for UNIX extensions.
2177 ****************************************************************************/
2179 uint32 unix_dev_minor(SMB_DEV_T dev)
2181 #if defined(HAVE_DEVICE_MINOR_FN)
2182 return (uint32)minor(dev);
2184 return (uint32)(dev & 0xff);
2189 /*******************************************************************
2190 Return the number of CPUs.
2191 ********************************************************************/
2193 int sys_get_number_of_cores(void)
2197 #if defined(HAVE_SYSCONF)
2198 #if defined(_SC_NPROCESSORS_ONLN)
2199 ret = (int)sysconf(_SC_NPROCESSORS_ONLN);
2201 #if defined(_SC_NPROCESSORS_CONF)
2203 ret = (int)sysconf(_SC_NPROCESSORS_CONF);
2206 #elif defined(HAVE_SYSCTL) && defined(CTL_HW)
2208 unsigned int len = sizeof(ret);
2211 #if defined(HW_AVAILCPU)
2212 name[1] = HW_AVAILCPU;
2214 if (sysctl(name, 2, &ret, &len, NULL, 0) == -1) {
2218 #if defined(HW_NCPU)
2222 if (sysctl(nm, 2, &count, &len, NULL, 0) == -1) {
2235 #if defined(WITH_AIO)
2237 /*******************************************************************
2238 An aio_read wrapper.
2239 ********************************************************************/
2241 int sys_aio_read(SMB_STRUCT_AIOCB *aiocb)
2243 #if defined(HAVE_AIO_READ)
2244 return aio_read(aiocb);
2251 /*******************************************************************
2252 An aio_write wrapper.
2253 ********************************************************************/
2255 int sys_aio_write(SMB_STRUCT_AIOCB *aiocb)
2257 #if defined(HAVE_AIO_WRITE)
2258 return aio_write(aiocb);
2265 /*******************************************************************
2266 An aio_return wrapper.
2267 ********************************************************************/
2269 ssize_t sys_aio_return(SMB_STRUCT_AIOCB *aiocb)
2271 #if defined(HAVE_AIO_RETURN)
2272 return aio_return(aiocb);
2279 /*******************************************************************
2280 An aio_cancel wrapper.
2281 ********************************************************************/
2283 int sys_aio_cancel(int fd, SMB_STRUCT_AIOCB *aiocb)
2285 #if defined(HAVE_AIO_CANCEL)
2286 return aio_cancel(fd, aiocb);
2293 /*******************************************************************
2294 An aio_error wrapper.
2295 ********************************************************************/
2297 int sys_aio_error(const SMB_STRUCT_AIOCB *aiocb)
2299 #if defined(HAVE_AIO_ERROR)
2300 return aio_error(aiocb);
2307 /*******************************************************************
2308 An aio_fsync wrapper.
2309 ********************************************************************/
2311 int sys_aio_fsync(int op, SMB_STRUCT_AIOCB *aiocb)
2313 #if defined(HAVE_AIO_FSYNC)
2314 return aio_fsync(op, aiocb);
2321 /*******************************************************************
2322 An aio_fsync wrapper.
2323 ********************************************************************/
2325 int sys_aio_suspend(const SMB_STRUCT_AIOCB * const cblist[], int n, const struct timespec *timeout)
2327 #if defined(HAVE_AIO_FSYNC)
2328 return aio_suspend(cblist, n, timeout);
2334 #else /* !WITH_AIO */
2336 int sys_aio_read(SMB_STRUCT_AIOCB *aiocb)
2342 int sys_aio_write(SMB_STRUCT_AIOCB *aiocb)
2348 ssize_t sys_aio_return(SMB_STRUCT_AIOCB *aiocb)
2354 int sys_aio_cancel(int fd, SMB_STRUCT_AIOCB *aiocb)
2360 int sys_aio_error(const SMB_STRUCT_AIOCB *aiocb)
2366 int sys_aio_fsync(int op, SMB_STRUCT_AIOCB *aiocb)
2372 int sys_aio_suspend(const SMB_STRUCT_AIOCB * const cblist[], int n, const struct timespec *timeout)
2377 #endif /* WITH_AIO */