2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Jeremy Allison 1998-2005
6 Copyright (C) Timur Bakeyev 2005
7 Copyright (C) Bjoern Jacke 2006-2007
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "system/syslog.h"
25 #include "system/capability.h"
26 #include "system/passwd.h"
27 #include "system/filesys.h"
28 #include "../lib/util/setid.h"
30 #ifdef HAVE_SYS_SYSCTL_H
31 #include <sys/sysctl.h>
34 #ifdef HAVE_SYS_PRCTL_H
35 #include <sys/prctl.h>
39 The idea is that this file will eventually have wrappers around all
40 important system calls in samba. The aims are:
42 - to enable easier porting by putting OS dependent stuff in here
44 - to allow for hooks into other "pseudo-filesystems"
46 - to allow easier integration of things like the japanese extensions
48 - to support the philosophy of Samba to expose the features of
49 the OS within the SMB model. In general whatever file/printer/variable
50 expansions/etc make sense to the OS should be acceptable to Samba.
53 /*******************************************************************
54 A send wrapper that will deal with EINTR or EAGAIN or EWOULDBLOCK.
55 ********************************************************************/
57 ssize_t sys_send(int s, const void *msg, size_t len, int flags)
62 ret = send(s, msg, len, flags);
63 } while (ret == -1 && (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK));
68 /*******************************************************************
69 A recvfrom wrapper that will deal with EINTR.
70 NB. As used with non-blocking sockets, return on EAGAIN/EWOULDBLOCK
71 ********************************************************************/
73 ssize_t sys_recvfrom(int s, void *buf, size_t len, int flags, struct sockaddr *from, socklen_t *fromlen)
78 ret = recvfrom(s, buf, len, flags, from, fromlen);
79 } while (ret == -1 && (errno == EINTR));
83 /*******************************************************************
84 A fcntl wrapper that will deal with EINTR.
85 ********************************************************************/
87 int sys_fcntl_ptr(int fd, int cmd, void *arg)
92 ret = fcntl(fd, cmd, arg);
93 } while (ret == -1 && errno == EINTR);
97 /*******************************************************************
98 A fcntl wrapper that will deal with EINTR.
99 ********************************************************************/
101 int sys_fcntl_long(int fd, int cmd, long arg)
106 ret = fcntl(fd, cmd, arg);
107 } while (ret == -1 && errno == EINTR);
111 /****************************************************************************
112 Get/Set all the possible time fields from a stat struct as a timespec.
113 ****************************************************************************/
115 static struct timespec get_atimespec(const struct stat *pst)
117 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
120 /* Old system - no ns timestamp. */
121 ret.tv_sec = pst->st_atime;
125 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
127 ret.tv_sec = pst->st_atim.tv_sec;
128 ret.tv_nsec = pst->st_atim.tv_nsec;
130 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
132 ret.tv_sec = pst->st_atime;
133 ret.tv_nsec = pst->st_atimensec;
135 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
137 ret.tv_sec = pst->st_atime;
138 ret.tv_nsec = pst->st_atime_n;
140 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
142 ret.tv_sec = pst->st_atime;
143 ret.tv_nsec = pst->st_uatime * 1000;
145 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
146 return pst->st_atimespec;
148 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
153 static struct timespec get_mtimespec(const struct stat *pst)
155 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
158 /* Old system - no ns timestamp. */
159 ret.tv_sec = pst->st_mtime;
163 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
165 ret.tv_sec = pst->st_mtim.tv_sec;
166 ret.tv_nsec = pst->st_mtim.tv_nsec;
168 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
170 ret.tv_sec = pst->st_mtime;
171 ret.tv_nsec = pst->st_mtimensec;
173 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
175 ret.tv_sec = pst->st_mtime;
176 ret.tv_nsec = pst->st_mtime_n;
178 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
180 ret.tv_sec = pst->st_mtime;
181 ret.tv_nsec = pst->st_umtime * 1000;
183 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
184 return pst->st_mtimespec;
186 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
191 static struct timespec get_ctimespec(const struct stat *pst)
193 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
196 /* Old system - no ns timestamp. */
197 ret.tv_sec = pst->st_ctime;
201 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
203 ret.tv_sec = pst->st_ctim.tv_sec;
204 ret.tv_nsec = pst->st_ctim.tv_nsec;
206 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
208 ret.tv_sec = pst->st_ctime;
209 ret.tv_nsec = pst->st_ctimensec;
211 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
213 ret.tv_sec = pst->st_ctime;
214 ret.tv_nsec = pst->st_ctime_n;
216 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
218 ret.tv_sec = pst->st_ctime;
219 ret.tv_nsec = pst->st_uctime * 1000;
221 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
222 return pst->st_ctimespec;
224 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
229 /****************************************************************************
230 Return the best approximation to a 'create time' under UNIX from a stat
232 ****************************************************************************/
234 static struct timespec calc_create_time_stat(const struct stat *st)
236 struct timespec ret, ret1;
237 struct timespec c_time = get_ctimespec(st);
238 struct timespec m_time = get_mtimespec(st);
239 struct timespec a_time = get_atimespec(st);
241 ret = timespec_compare(&c_time, &m_time) < 0 ? c_time : m_time;
242 ret1 = timespec_compare(&ret, &a_time) < 0 ? ret : a_time;
244 if(!null_timespec(ret1)) {
249 * One of ctime, mtime or atime was zero (probably atime).
250 * Just return MIN(ctime, mtime).
255 /****************************************************************************
256 Return the best approximation to a 'create time' under UNIX from a stat_ex
258 ****************************************************************************/
260 static struct timespec calc_create_time_stat_ex(const struct stat_ex *st)
262 struct timespec ret, ret1;
263 struct timespec c_time = st->st_ex_ctime;
264 struct timespec m_time = st->st_ex_mtime;
265 struct timespec a_time = st->st_ex_atime;
267 ret = timespec_compare(&c_time, &m_time) < 0 ? c_time : m_time;
268 ret1 = timespec_compare(&ret, &a_time) < 0 ? ret : a_time;
270 if(!null_timespec(ret1)) {
275 * One of ctime, mtime or atime was zero (probably atime).
276 * Just return MIN(ctime, mtime).
281 /****************************************************************************
282 Return the 'create time' from a stat struct if it exists (birthtime) or else
283 use the best approximation.
284 ****************************************************************************/
286 static void make_create_timespec(const struct stat *pst, struct stat_ex *dst,
287 bool fake_dir_create_times)
289 if (S_ISDIR(pst->st_mode) && fake_dir_create_times) {
290 dst->st_ex_btime.tv_sec = 315493200L; /* 1/1/1980 */
291 dst->st_ex_btime.tv_nsec = 0;
294 dst->st_ex_calculated_birthtime = false;
296 #if defined(HAVE_STRUCT_STAT_ST_BIRTHTIMESPEC_TV_NSEC)
297 dst->st_ex_btime = pst->st_birthtimespec;
298 #elif defined(HAVE_STRUCT_STAT_ST_BIRTHTIMENSEC)
299 dst->st_ex_btime.tv_sec = pst->st_birthtime;
300 dst->st_ex_btime.tv_nsec = pst->st_birthtimenspec;
301 #elif defined(HAVE_STRUCT_STAT_ST_BIRTHTIME)
302 dst->st_ex_btime.tv_sec = pst->st_birthtime;
303 dst->st_ex_btime.tv_nsec = 0;
305 dst->st_ex_btime = calc_create_time_stat(pst);
306 dst->st_ex_calculated_birthtime = true;
309 /* Deal with systems that don't initialize birthtime correctly.
310 * Pointed out by SATOH Fumiyasu <fumiyas@osstech.jp>.
312 if (null_timespec(dst->st_ex_btime)) {
313 dst->st_ex_btime = calc_create_time_stat(pst);
314 dst->st_ex_calculated_birthtime = true;
318 /****************************************************************************
319 If we update a timestamp in a stat_ex struct we may have to recalculate
320 the birthtime. For now only implement this for write time, but we may
321 also need to do it for atime and ctime. JRA.
322 ****************************************************************************/
324 void update_stat_ex_mtime(struct stat_ex *dst,
325 struct timespec write_ts)
327 dst->st_ex_mtime = write_ts;
329 /* We may have to recalculate btime. */
330 if (dst->st_ex_calculated_birthtime) {
331 dst->st_ex_btime = calc_create_time_stat_ex(dst);
335 void update_stat_ex_create_time(struct stat_ex *dst,
336 struct timespec create_time)
338 dst->st_ex_btime = create_time;
339 dst->st_ex_calculated_birthtime = false;
342 void init_stat_ex_from_stat (struct stat_ex *dst,
343 const struct stat *src,
344 bool fake_dir_create_times)
346 dst->st_ex_dev = src->st_dev;
347 dst->st_ex_ino = src->st_ino;
348 dst->st_ex_mode = src->st_mode;
349 dst->st_ex_nlink = src->st_nlink;
350 dst->st_ex_uid = src->st_uid;
351 dst->st_ex_gid = src->st_gid;
352 dst->st_ex_rdev = src->st_rdev;
353 dst->st_ex_size = src->st_size;
354 dst->st_ex_atime = get_atimespec(src);
355 dst->st_ex_mtime = get_mtimespec(src);
356 dst->st_ex_ctime = get_ctimespec(src);
357 make_create_timespec(src, dst, fake_dir_create_times);
358 #ifdef HAVE_STAT_ST_BLKSIZE
359 dst->st_ex_blksize = src->st_blksize;
361 dst->st_ex_blksize = STAT_ST_BLOCKSIZE;
364 #ifdef HAVE_STAT_ST_BLOCKS
365 dst->st_ex_blocks = src->st_blocks;
367 dst->st_ex_blocks = src->st_size / dst->st_ex_blksize + 1;
370 #ifdef HAVE_STAT_ST_FLAGS
371 dst->st_ex_flags = src->st_flags;
373 dst->st_ex_flags = 0;
377 /*******************************************************************
379 ********************************************************************/
381 int sys_stat(const char *fname, SMB_STRUCT_STAT *sbuf,
382 bool fake_dir_create_times)
386 ret = stat(fname, &statbuf);
388 /* we always want directories to appear zero size */
389 if (S_ISDIR(statbuf.st_mode)) {
392 init_stat_ex_from_stat(sbuf, &statbuf, fake_dir_create_times);
397 /*******************************************************************
399 ********************************************************************/
401 int sys_fstat(int fd, SMB_STRUCT_STAT *sbuf, bool fake_dir_create_times)
405 ret = fstat(fd, &statbuf);
407 /* we always want directories to appear zero size */
408 if (S_ISDIR(statbuf.st_mode)) {
411 init_stat_ex_from_stat(sbuf, &statbuf, fake_dir_create_times);
416 /*******************************************************************
418 ********************************************************************/
420 int sys_lstat(const char *fname,SMB_STRUCT_STAT *sbuf,
421 bool fake_dir_create_times)
425 ret = lstat(fname, &statbuf);
427 /* we always want directories to appear zero size */
428 if (S_ISDIR(statbuf.st_mode)) {
431 init_stat_ex_from_stat(sbuf, &statbuf, fake_dir_create_times);
436 /*******************************************************************
437 An posix_fallocate() wrapper.
438 ********************************************************************/
439 int sys_posix_fallocate(int fd, off_t offset, off_t len)
441 #if defined(HAVE_POSIX_FALLOCATE) && !defined(HAVE_BROKEN_POSIX_FALLOCATE)
442 return posix_fallocate(fd, offset, len);
443 #elif defined(F_RESVSP64)
444 /* this handles XFS on IRIX */
446 off_t new_len = offset + len;
450 /* unlikely to get a too large file on a 64bit system but ... */
454 fl.l_whence = SEEK_SET;
458 ret=fcntl(fd, F_RESVSP64, &fl);
463 /* Make sure the file gets enlarged after we allocated space: */
465 if (new_len > sbuf.st_size)
466 ftruncate64(fd, new_len);
473 /*******************************************************************
474 An fallocate() function that matches the semantics of the Linux one.
475 ********************************************************************/
477 #ifdef HAVE_LINUX_FALLOC_H
478 #include <linux/falloc.h>
481 int sys_fallocate(int fd, uint32_t mode, off_t offset, off_t len)
483 #if defined(HAVE_LINUX_FALLOCATE)
486 if (mode & VFS_FALLOCATE_FL_KEEP_SIZE) {
487 lmode |= FALLOC_FL_KEEP_SIZE;
488 mode &= ~VFS_FALLOCATE_FL_KEEP_SIZE;
492 DEBUG(2, ("unmapped fallocate flags: %lx\n",
493 (unsigned long)mode));
497 return fallocate(fd, lmode, offset, len);
499 /* TODO - plumb in fallocate from other filesysetms like VXFS etc. JRA. */
505 #if HAVE_KERNEL_SHARE_MODES
507 #define LOCK_MAND 32 /* This is a mandatory flock */
508 #define LOCK_READ 64 /* ... Which allows concurrent read operations */
509 #define LOCK_WRITE 128 /* ... Which allows concurrent write operations */
510 #define LOCK_RW 192 /* ... Which allows concurrent read & write ops */
514 /*******************************************************************
515 A flock() wrapper that will perform the kernel flock.
516 ********************************************************************/
518 void kernel_flock(int fd, uint32 share_mode, uint32 access_mask)
520 #if HAVE_KERNEL_SHARE_MODES
522 if (share_mode == FILE_SHARE_WRITE) {
523 kernel_mode = LOCK_MAND|LOCK_WRITE;
524 } else if (share_mode == FILE_SHARE_READ) {
525 kernel_mode = LOCK_MAND|LOCK_READ;
526 } else if (share_mode == FILE_SHARE_NONE) {
527 kernel_mode = LOCK_MAND;
530 flock(fd, kernel_mode);
538 /*******************************************************************
539 An fdopendir wrapper.
540 ********************************************************************/
542 DIR *sys_fdopendir(int fd)
544 #if defined(HAVE_FDOPENDIR)
545 return fdopendir(fd);
552 /*******************************************************************
554 ********************************************************************/
556 int sys_mknod(const char *path, mode_t mode, SMB_DEV_T dev)
558 #if defined(HAVE_MKNOD)
559 return mknod(path, mode, dev);
561 /* No mknod system call. */
567 /*******************************************************************
568 The wait() calls vary between systems
569 ********************************************************************/
571 int sys_waitpid(pid_t pid,int *status,int options)
574 return waitpid(pid,status,options);
575 #else /* HAVE_WAITPID */
576 return wait4(pid, status, options, NULL);
577 #endif /* HAVE_WAITPID */
580 /*******************************************************************
581 System wrapper for getwd. Always returns MALLOC'ed memory, or NULL
582 on error (malloc fail usually).
583 ********************************************************************/
585 char *sys_getwd(void)
587 #ifdef GETCWD_TAKES_NULL
588 return getcwd(NULL, 0);
590 char *wd = NULL, *s = NULL;
591 size_t allocated = PATH_MAX;
594 s = SMB_REALLOC_ARRAY(s, char, allocated);
598 wd = getcwd(s, allocated);
602 if (errno != ERANGE) {
607 if (allocated < PATH_MAX) {
614 char *s = SMB_MALLOC_ARRAY(char, PATH_MAX);
622 #if defined(HAVE_POSIX_CAPABILITIES)
624 /**************************************************************************
625 Try and abstract process capabilities (for systems that have them).
626 ****************************************************************************/
628 /* Set the POSIX capabilities needed for the given purpose into the effective
629 * capability set of the current process. Make sure they are always removed
630 * from the inheritable set, because there is no circumstance in which our
631 * children should inherit our elevated privileges.
633 static bool set_process_capability(enum smbd_capability capability,
636 cap_value_t cap_vals[2] = {0};
637 int num_cap_vals = 0;
641 #if defined(HAVE_PRCTL) && defined(PR_GET_KEEPCAPS) && defined(PR_SET_KEEPCAPS)
642 /* On Linux, make sure that any capabilities we grab are sticky
643 * across UID changes. We expect that this would allow us to keep both
644 * the effective and permitted capability sets, but as of circa 2.6.16,
645 * only the permitted set is kept. It is a bug (which we work around)
646 * that the effective set is lost, but we still require the effective
649 if (!prctl(PR_GET_KEEPCAPS)) {
650 prctl(PR_SET_KEEPCAPS, 1);
654 cap = cap_get_proc();
656 DEBUG(0,("set_process_capability: cap_get_proc failed: %s\n",
661 switch (capability) {
662 case KERNEL_OPLOCK_CAPABILITY:
663 #ifdef CAP_NETWORK_MGT
664 /* IRIX has CAP_NETWORK_MGT for oplocks. */
665 cap_vals[num_cap_vals++] = CAP_NETWORK_MGT;
668 case DMAPI_ACCESS_CAPABILITY:
669 #ifdef CAP_DEVICE_MGT
670 /* IRIX has CAP_DEVICE_MGT for DMAPI access. */
671 cap_vals[num_cap_vals++] = CAP_DEVICE_MGT;
673 /* Linux has CAP_MKNOD for DMAPI access. */
674 cap_vals[num_cap_vals++] = CAP_MKNOD;
677 case LEASE_CAPABILITY:
679 cap_vals[num_cap_vals++] = CAP_LEASE;
682 case DAC_OVERRIDE_CAPABILITY:
683 #ifdef CAP_DAC_OVERRIDE
684 cap_vals[num_cap_vals++] = CAP_DAC_OVERRIDE;
688 SMB_ASSERT(num_cap_vals <= ARRAY_SIZE(cap_vals));
690 if (num_cap_vals == 0) {
695 cap_set_flag(cap, CAP_EFFECTIVE, num_cap_vals, cap_vals,
696 enable ? CAP_SET : CAP_CLEAR);
698 /* We never want to pass capabilities down to our children, so make
699 * sure they are not inherited.
701 cap_set_flag(cap, CAP_INHERITABLE, num_cap_vals, cap_vals, CAP_CLEAR);
703 if (cap_set_proc(cap) == -1) {
704 DEBUG(0, ("set_process_capability: cap_set_proc failed: %s\n",
714 #endif /* HAVE_POSIX_CAPABILITIES */
716 /****************************************************************************
717 Gain the oplock capability from the kernel if possible.
718 ****************************************************************************/
720 void set_effective_capability(enum smbd_capability capability)
722 #if defined(HAVE_POSIX_CAPABILITIES)
723 set_process_capability(capability, True);
724 #endif /* HAVE_POSIX_CAPABILITIES */
727 void drop_effective_capability(enum smbd_capability capability)
729 #if defined(HAVE_POSIX_CAPABILITIES)
730 set_process_capability(capability, False);
731 #endif /* HAVE_POSIX_CAPABILITIES */
734 /**************************************************************************
735 Wrapper for random().
736 ****************************************************************************/
738 long sys_random(void)
740 #if defined(HAVE_RANDOM)
741 return (long)random();
742 #elif defined(HAVE_RAND)
745 DEBUG(0,("Error - no random function available !\n"));
750 /**************************************************************************
751 Wrapper for srandom().
752 ****************************************************************************/
754 void sys_srandom(unsigned int seed)
756 #if defined(HAVE_SRANDOM)
758 #elif defined(HAVE_SRAND)
761 DEBUG(0,("Error - no srandom function available !\n"));
767 #define NGROUPS_MAX 32 /* Guess... */
770 /**************************************************************************
771 Returns equivalent to NGROUPS_MAX - using sysconf if needed.
772 ****************************************************************************/
776 #if defined(SYSCONF_SC_NGROUPS_MAX)
777 int ret = sysconf(_SC_NGROUPS_MAX);
778 return (ret == -1) ? NGROUPS_MAX : ret;
784 /**************************************************************************
785 Wrap setgroups and getgroups for systems that declare getgroups() as
786 returning an array of gid_t, but actuall return an array of int.
787 ****************************************************************************/
789 #if defined(HAVE_BROKEN_GETGROUPS)
791 #ifdef HAVE_BROKEN_GETGROUPS
797 static int sys_broken_getgroups(int setlen, gid_t *gidset)
804 return getgroups(setlen, &gid);
808 * Broken case. We need to allocate a
809 * GID_T array of size setlen.
818 setlen = groups_max();
820 if((group_list = SMB_MALLOC_ARRAY(GID_T, setlen)) == NULL) {
821 DEBUG(0,("sys_getgroups: Malloc fail.\n"));
825 if((ngroups = getgroups(setlen, group_list)) < 0) {
826 int saved_errno = errno;
827 SAFE_FREE(group_list);
832 for(i = 0; i < ngroups; i++)
833 gidset[i] = (gid_t)group_list[i];
835 SAFE_FREE(group_list);
839 static int sys_broken_setgroups(int setlen, gid_t *gidset)
847 if (setlen < 0 || setlen > groups_max()) {
853 * Broken case. We need to allocate a
854 * GID_T array of size setlen.
857 if((group_list = SMB_MALLOC_ARRAY(GID_T, setlen)) == NULL) {
858 DEBUG(0,("sys_setgroups: Malloc fail.\n"));
862 for(i = 0; i < setlen; i++)
863 group_list[i] = (GID_T) gidset[i];
865 if(samba_setgroups(setlen, group_list) != 0) {
866 int saved_errno = errno;
867 SAFE_FREE(group_list);
872 SAFE_FREE(group_list);
876 #endif /* HAVE_BROKEN_GETGROUPS */
878 /* This is a list of systems that require the first GID passed to setgroups(2)
879 * to be the effective GID. If your system is one of these, add it here.
881 #if defined (FREEBSD) || defined (DARWINOS)
882 #define USE_BSD_SETGROUPS
885 #if defined(USE_BSD_SETGROUPS)
886 /* Depending on the particular BSD implementation, the first GID that is
887 * passed to setgroups(2) will either be ignored or will set the credential's
888 * effective GID. In either case, the right thing to do is to guarantee that
889 * gidset[0] is the effective GID.
891 static int sys_bsd_setgroups(gid_t primary_gid, int setlen, const gid_t *gidset)
893 gid_t *new_gidset = NULL;
897 /* setgroups(2) will fail with EINVAL if we pass too many groups. */
900 /* No group list, just make sure we are setting the efective GID. */
902 return samba_setgroups(1, &primary_gid);
905 /* If the primary gid is not the first array element, grow the array
906 * and insert it at the front.
908 if (gidset[0] != primary_gid) {
909 new_gidset = SMB_MALLOC_ARRAY(gid_t, setlen + 1);
910 if (new_gidset == NULL) {
914 memcpy(new_gidset + 1, gidset, (setlen * sizeof(gid_t)));
915 new_gidset[0] = primary_gid;
920 DEBUG(3, ("forced to truncate group list from %d to %d\n",
925 #if defined(HAVE_BROKEN_GETGROUPS)
926 ret = sys_broken_setgroups(setlen, new_gidset ? new_gidset : gidset);
928 ret = samba_setgroups(setlen, new_gidset ? new_gidset : gidset);
933 SAFE_FREE(new_gidset);
940 #endif /* USE_BSD_SETGROUPS */
942 /**************************************************************************
943 Wrapper for getgroups. Deals with broken (int) case.
944 ****************************************************************************/
946 int sys_getgroups(int setlen, gid_t *gidset)
948 #if defined(HAVE_BROKEN_GETGROUPS)
949 return sys_broken_getgroups(setlen, gidset);
951 return getgroups(setlen, gidset);
955 /**************************************************************************
956 Wrapper for setgroups. Deals with broken (int) case and BSD case.
957 ****************************************************************************/
959 int sys_setgroups(gid_t UNUSED(primary_gid), int setlen, gid_t *gidset)
961 #if !defined(HAVE_SETGROUPS)
964 #endif /* HAVE_SETGROUPS */
966 #if defined(USE_BSD_SETGROUPS)
967 return sys_bsd_setgroups(primary_gid, setlen, gidset);
968 #elif defined(HAVE_BROKEN_GETGROUPS)
969 return sys_broken_setgroups(setlen, gidset);
971 return samba_setgroups(setlen, gidset);
975 /**************************************************************************
976 Extract a command into an arg list.
977 ****************************************************************************/
979 static char **extract_args(TALLOC_CTX *mem_ctx, const char *command)
988 if (!(trunc_cmd = talloc_strdup(mem_ctx, command))) {
989 DEBUG(0, ("talloc failed\n"));
993 if(!(ptr = strtok_r(trunc_cmd, " \t", &saveptr))) {
994 TALLOC_FREE(trunc_cmd);
1003 for( argcl = 1; ptr; ptr = strtok_r(NULL, " \t", &saveptr))
1006 TALLOC_FREE(trunc_cmd);
1008 if (!(argl = talloc_array(mem_ctx, char *, argcl + 1))) {
1013 * Now do the extraction.
1016 if (!(trunc_cmd = talloc_strdup(mem_ctx, command))) {
1020 ptr = strtok_r(trunc_cmd, " \t", &saveptr);
1023 if (!(argl[i++] = talloc_strdup(argl, ptr))) {
1027 while((ptr = strtok_r(NULL, " \t", &saveptr)) != NULL) {
1029 if (!(argl[i++] = talloc_strdup(argl, ptr))) {
1035 TALLOC_FREE(trunc_cmd);
1039 DEBUG(0, ("talloc failed\n"));
1040 TALLOC_FREE(trunc_cmd);
1046 /**************************************************************************
1047 Wrapper for popen. Safer as it doesn't search a path.
1048 Modified from the glibc sources.
1049 modified by tridge to return a file descriptor. We must kick our FILE* habit
1050 ****************************************************************************/
1052 typedef struct _popen_list
1056 struct _popen_list *next;
1059 static popen_list *popen_chain;
1061 int sys_popen(const char *command)
1063 int parent_end, child_end;
1065 popen_list *entry = NULL;
1074 ret = pipe(pipe_fds);
1076 DEBUG(0, ("sys_popen: error opening pipe: %s\n",
1081 parent_end = pipe_fds[0];
1082 child_end = pipe_fds[1];
1084 entry = SMB_MALLOC_P(popen_list);
1085 if (entry == NULL) {
1086 DEBUG(0, ("sys_popen: malloc failed\n"));
1090 ZERO_STRUCTP(entry);
1093 * Extract the command and args into a NULL terminated array.
1096 argl = extract_args(NULL, command);
1098 DEBUG(0, ("sys_popen: extract_args() failed: %s\n", strerror(errno)));
1102 entry->child_pid = fork();
1104 if (entry->child_pid == -1) {
1105 DEBUG(0, ("sys_popen: fork failed: %s\n", strerror(errno)));
1109 if (entry->child_pid == 0) {
1115 int child_std_end = STDOUT_FILENO;
1119 if (child_end != child_std_end) {
1120 dup2 (child_end, child_std_end);
1125 * POSIX.2: "popen() shall ensure that any streams from previous
1126 * popen() calls that remain open in the parent process are closed
1127 * in the new child process."
1130 for (p = popen_chain; p; p = p->next)
1133 ret = execv(argl[0], argl);
1135 DEBUG(0, ("sys_popen: ERROR executing command "
1136 "'%s': %s\n", command, strerror(errno)));
1148 /* Link into popen_chain. */
1149 entry->next = popen_chain;
1150 popen_chain = entry;
1151 entry->fd = parent_end;
1164 /**************************************************************************
1165 Wrapper for pclose. Modified from the glibc sources.
1166 ****************************************************************************/
1168 int sys_pclose(int fd)
1171 popen_list **ptr = &popen_chain;
1172 popen_list *entry = NULL;
1176 /* Unlink from popen_chain. */
1177 for ( ; *ptr != NULL; ptr = &(*ptr)->next) {
1178 if ((*ptr)->fd == fd) {
1180 *ptr = (*ptr)->next;
1186 if (status < 0 || close(entry->fd) < 0)
1190 * As Samba is catching and eating child process
1191 * exits we don't really care about the child exit
1192 * code, a -1 with errno = ECHILD will do fine for us.
1196 wait_pid = sys_waitpid (entry->child_pid, &wstatus, 0);
1197 } while (wait_pid == -1 && errno == EINTR);
1206 /****************************************************************************
1207 Return the major devicenumber for UNIX extensions.
1208 ****************************************************************************/
1210 uint32 unix_dev_major(SMB_DEV_T dev)
1212 #if defined(HAVE_DEVICE_MAJOR_FN)
1213 return (uint32)major(dev);
1215 return (uint32)(dev >> 8);
1219 /****************************************************************************
1220 Return the minor devicenumber for UNIX extensions.
1221 ****************************************************************************/
1223 uint32 unix_dev_minor(SMB_DEV_T dev)
1225 #if defined(HAVE_DEVICE_MINOR_FN)
1226 return (uint32)minor(dev);
1228 return (uint32)(dev & 0xff);
1233 /*******************************************************************
1234 Return the number of CPUs.
1235 ********************************************************************/
1237 int sys_get_number_of_cores(void)
1241 #if defined(HAVE_SYSCONF)
1242 #if defined(_SC_NPROCESSORS_ONLN)
1243 ret = (int)sysconf(_SC_NPROCESSORS_ONLN);
1245 #if defined(_SC_NPROCESSORS_CONF)
1247 ret = (int)sysconf(_SC_NPROCESSORS_CONF);
1250 #elif defined(HAVE_SYSCTL) && defined(CTL_HW)
1252 unsigned int len = sizeof(ret);
1255 #if defined(HW_AVAILCPU)
1256 name[1] = HW_AVAILCPU;
1258 if (sysctl(name, 2, &ret, &len, NULL, 0) == -1) {
1262 #if defined(HW_NCPU)
1266 if (sysctl(nm, 2, &count, &len, NULL, 0) == -1) {