2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Jeremy Allison 1998-2005
6 Copyright (C) Timur Bakeyev 2005
7 Copyright (C) Bjoern Jacke 2006-2007
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
25 #ifdef HAVE_SYS_PRCTL_H
26 #include <sys/prctl.h>
30 The idea is that this file will eventually have wrappers around all
31 important system calls in samba. The aims are:
33 - to enable easier porting by putting OS dependent stuff in here
35 - to allow for hooks into other "pseudo-filesystems"
37 - to allow easier integration of things like the japanese extensions
39 - to support the philosophy of Samba to expose the features of
40 the OS within the SMB model. In general whatever file/printer/variable
41 expansions/etc make sense to the OS should be acceptable to Samba.
46 /*******************************************************************
47 A wrapper for memalign
48 ********************************************************************/
50 void *sys_memalign( size_t align, size_t size )
52 #if defined(HAVE_POSIX_MEMALIGN)
54 int ret = posix_memalign( &p, align, size );
59 #elif defined(HAVE_MEMALIGN)
60 return memalign( align, size );
62 /* On *BSD systems memaligns doesn't exist, but memory will
63 * be aligned on allocations of > pagesize. */
64 #if defined(SYSCONF_SC_PAGESIZE)
65 size_t pagesize = (size_t)sysconf(_SC_PAGESIZE);
66 #elif defined(HAVE_GETPAGESIZE)
67 size_t pagesize = (size_t)getpagesize();
69 size_t pagesize = (size_t)-1;
71 if (pagesize == (size_t)-1) {
72 DEBUG(0,("memalign functionalaity not available on this platform!\n"));
75 if (size < pagesize) {
78 return SMB_MALLOC(size);
82 /*******************************************************************
83 A wrapper for usleep in case we don't have one.
84 ********************************************************************/
86 int sys_usleep(long usecs)
93 * We need this braindamage as the glibc usleep
94 * is not SPEC1170 complient... grumble... JRA.
97 if(usecs < 0 || usecs > 1000000) {
105 #else /* HAVE_USLEEP */
107 * Fake it with select...
110 tval.tv_usec = usecs/1000;
111 select(0,NULL,NULL,NULL,&tval);
113 #endif /* HAVE_USLEEP */
116 /*******************************************************************
117 A read wrapper that will deal with EINTR.
118 ********************************************************************/
120 ssize_t sys_read(int fd, void *buf, size_t count)
125 ret = read(fd, buf, count);
126 } while (ret == -1 && errno == EINTR);
130 /*******************************************************************
131 A write wrapper that will deal with EINTR.
132 ********************************************************************/
134 ssize_t sys_write(int fd, const void *buf, size_t count)
139 ret = write(fd, buf, count);
140 } while (ret == -1 && errno == EINTR);
144 /*******************************************************************
145 A pread wrapper that will deal with EINTR and 64-bit file offsets.
146 ********************************************************************/
148 #if defined(HAVE_PREAD) || defined(HAVE_PREAD64)
149 ssize_t sys_pread(int fd, void *buf, size_t count, SMB_OFF_T off)
154 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_PREAD64)
155 ret = pread64(fd, buf, count, off);
157 ret = pread(fd, buf, count, off);
159 } while (ret == -1 && errno == EINTR);
164 /*******************************************************************
165 A write wrapper that will deal with EINTR and 64-bit file offsets.
166 ********************************************************************/
168 #if defined(HAVE_PWRITE) || defined(HAVE_PWRITE64)
169 ssize_t sys_pwrite(int fd, const void *buf, size_t count, SMB_OFF_T off)
174 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_PWRITE64)
175 ret = pwrite64(fd, buf, count, off);
177 ret = pwrite(fd, buf, count, off);
179 } while (ret == -1 && errno == EINTR);
184 /*******************************************************************
185 A send wrapper that will deal with EINTR.
186 ********************************************************************/
188 ssize_t sys_send(int s, const void *msg, size_t len, int flags)
193 ret = send(s, msg, len, flags);
194 } while (ret == -1 && errno == EINTR);
198 /*******************************************************************
199 A sendto wrapper that will deal with EINTR.
200 ********************************************************************/
202 ssize_t sys_sendto(int s, const void *msg, size_t len, int flags, const struct sockaddr *to, socklen_t tolen)
207 ret = sendto(s, msg, len, flags, to, tolen);
208 } while (ret == -1 && errno == EINTR);
212 /*******************************************************************
213 A recv wrapper that will deal with EINTR.
214 ********************************************************************/
216 ssize_t sys_recv(int fd, void *buf, size_t count, int flags)
221 ret = recv(fd, buf, count, flags);
222 } while (ret == -1 && errno == EINTR);
226 /*******************************************************************
227 A recvfrom wrapper that will deal with EINTR.
228 ********************************************************************/
230 ssize_t sys_recvfrom(int s, void *buf, size_t len, int flags, struct sockaddr *from, socklen_t *fromlen)
235 ret = recvfrom(s, buf, len, flags, from, fromlen);
236 } while (ret == -1 && errno == EINTR);
240 /*******************************************************************
241 A fcntl wrapper that will deal with EINTR.
242 ********************************************************************/
244 int sys_fcntl_ptr(int fd, int cmd, void *arg)
249 ret = fcntl(fd, cmd, arg);
250 } while (ret == -1 && errno == EINTR);
254 /*******************************************************************
255 A fcntl wrapper that will deal with EINTR.
256 ********************************************************************/
258 int sys_fcntl_long(int fd, int cmd, long arg)
263 ret = fcntl(fd, cmd, arg);
264 } while (ret == -1 && errno == EINTR);
268 /*******************************************************************
269 A stat() wrapper that will deal with 64 bit filesizes.
270 ********************************************************************/
272 int sys_stat(const char *fname,SMB_STRUCT_STAT *sbuf)
275 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_STAT64)
276 ret = stat64(fname, sbuf);
278 ret = stat(fname, sbuf);
280 /* we always want directories to appear zero size */
281 if (ret == 0 && S_ISDIR(sbuf->st_mode)) sbuf->st_size = 0;
285 /*******************************************************************
286 An fstat() wrapper that will deal with 64 bit filesizes.
287 ********************************************************************/
289 int sys_fstat(int fd,SMB_STRUCT_STAT *sbuf)
292 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_FSTAT64)
293 ret = fstat64(fd, sbuf);
295 ret = fstat(fd, sbuf);
297 /* we always want directories to appear zero size */
298 if (ret == 0 && S_ISDIR(sbuf->st_mode)) sbuf->st_size = 0;
302 /*******************************************************************
303 An lstat() wrapper that will deal with 64 bit filesizes.
304 ********************************************************************/
306 int sys_lstat(const char *fname,SMB_STRUCT_STAT *sbuf)
309 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_LSTAT64)
310 ret = lstat64(fname, sbuf);
312 ret = lstat(fname, sbuf);
314 /* we always want directories to appear zero size */
315 if (ret == 0 && S_ISDIR(sbuf->st_mode)) sbuf->st_size = 0;
319 /*******************************************************************
320 An ftruncate() wrapper that will deal with 64 bit filesizes.
321 ********************************************************************/
323 int sys_ftruncate(int fd, SMB_OFF_T offset)
325 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_FTRUNCATE64)
326 return ftruncate64(fd, offset);
328 return ftruncate(fd, offset);
332 /*******************************************************************
333 An lseek() wrapper that will deal with 64 bit filesizes.
334 ********************************************************************/
336 SMB_OFF_T sys_lseek(int fd, SMB_OFF_T offset, int whence)
338 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_LSEEK64)
339 return lseek64(fd, offset, whence);
341 return lseek(fd, offset, whence);
345 /*******************************************************************
346 An fseek() wrapper that will deal with 64 bit filesizes.
347 ********************************************************************/
349 int sys_fseek(FILE *fp, SMB_OFF_T offset, int whence)
351 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(LARGE_SMB_OFF_T) && defined(HAVE_FSEEK64)
352 return fseek64(fp, offset, whence);
353 #elif defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(LARGE_SMB_OFF_T) && defined(HAVE_FSEEKO64)
354 return fseeko64(fp, offset, whence);
356 return fseek(fp, offset, whence);
360 /*******************************************************************
361 An ftell() wrapper that will deal with 64 bit filesizes.
362 ********************************************************************/
364 SMB_OFF_T sys_ftell(FILE *fp)
366 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(LARGE_SMB_OFF_T) && defined(HAVE_FTELL64)
367 return (SMB_OFF_T)ftell64(fp);
368 #elif defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(LARGE_SMB_OFF_T) && defined(HAVE_FTELLO64)
369 return (SMB_OFF_T)ftello64(fp);
371 return (SMB_OFF_T)ftell(fp);
375 /*******************************************************************
376 A creat() wrapper that will deal with 64 bit filesizes.
377 ********************************************************************/
379 int sys_creat(const char *path, mode_t mode)
381 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_CREAT64)
382 return creat64(path, mode);
385 * If creat64 isn't defined then ensure we call a potential open64.
388 return sys_open(path, O_WRONLY | O_CREAT | O_TRUNC, mode);
392 /*******************************************************************
393 An open() wrapper that will deal with 64 bit filesizes.
394 ********************************************************************/
396 int sys_open(const char *path, int oflag, mode_t mode)
398 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OPEN64)
399 return open64(path, oflag, mode);
401 return open(path, oflag, mode);
405 /*******************************************************************
406 An fopen() wrapper that will deal with 64 bit filesizes.
407 ********************************************************************/
409 FILE *sys_fopen(const char *path, const char *type)
411 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_FOPEN64)
412 return fopen64(path, type);
414 return fopen(path, type);
419 /*******************************************************************
420 A flock() wrapper that will perform the kernel flock.
421 ********************************************************************/
423 void kernel_flock(int fd, uint32 share_mode)
425 #if HAVE_KERNEL_SHARE_MODES
427 if (share_mode == FILE_SHARE_WRITE) {
428 kernel_mode = LOCK_MAND|LOCK_WRITE;
429 } else if (share_mode == FILE_SHARE_READ) {
430 kernel_mode = LOCK_MAND|LOCK_READ;
431 } else if (share_mode == FILE_SHARE_NONE) {
432 kernel_mode = LOCK_MAND;
435 flock(fd, kernel_mode);
443 /*******************************************************************
444 An opendir wrapper that will deal with 64 bit filesizes.
445 ********************************************************************/
447 SMB_STRUCT_DIR *sys_opendir(const char *name)
449 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OPENDIR64)
450 return opendir64(name);
452 return opendir(name);
456 /*******************************************************************
457 A readdir wrapper that will deal with 64 bit filesizes.
458 ********************************************************************/
460 SMB_STRUCT_DIRENT *sys_readdir(SMB_STRUCT_DIR *dirp)
462 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_READDIR64)
463 return readdir64(dirp);
465 return readdir(dirp);
469 /*******************************************************************
470 A seekdir wrapper that will deal with 64 bit filesizes.
471 ********************************************************************/
473 void sys_seekdir(SMB_STRUCT_DIR *dirp, long offset)
475 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_SEEKDIR64)
476 seekdir64(dirp, offset);
478 seekdir(dirp, offset);
482 /*******************************************************************
483 A telldir wrapper that will deal with 64 bit filesizes.
484 ********************************************************************/
486 long sys_telldir(SMB_STRUCT_DIR *dirp)
488 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_TELLDIR64)
489 return (long)telldir64(dirp);
491 return (long)telldir(dirp);
495 /*******************************************************************
496 A rewinddir wrapper that will deal with 64 bit filesizes.
497 ********************************************************************/
499 void sys_rewinddir(SMB_STRUCT_DIR *dirp)
501 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_REWINDDIR64)
508 /*******************************************************************
509 A close wrapper that will deal with 64 bit filesizes.
510 ********************************************************************/
512 int sys_closedir(SMB_STRUCT_DIR *dirp)
514 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_CLOSEDIR64)
515 return closedir64(dirp);
517 return closedir(dirp);
521 /*******************************************************************
522 An mknod() wrapper that will deal with 64 bit filesizes.
523 ********************************************************************/
525 int sys_mknod(const char *path, mode_t mode, SMB_DEV_T dev)
527 #if defined(HAVE_MKNOD) || defined(HAVE_MKNOD64)
528 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_MKNOD64) && defined(HAVE_DEV64_T)
529 return mknod64(path, mode, dev);
531 return mknod(path, mode, dev);
534 /* No mknod system call. */
540 /*******************************************************************
541 Wrapper for realpath.
542 ********************************************************************/
544 char *sys_realpath(const char *path, char *resolved_path)
546 #if defined(HAVE_REALPATH)
547 return realpath(path, resolved_path);
549 /* As realpath is not a system call we can't return ENOSYS. */
555 /*******************************************************************
556 The wait() calls vary between systems
557 ********************************************************************/
559 int sys_waitpid(pid_t pid,int *status,int options)
562 return waitpid(pid,status,options);
563 #else /* HAVE_WAITPID */
564 return wait4(pid, status, options, NULL);
565 #endif /* HAVE_WAITPID */
568 /*******************************************************************
569 System wrapper for getwd
570 ********************************************************************/
572 char *sys_getwd(char *s)
577 wd = (char *)getcwd(s, PATH_MAX);
579 wd = (char *)getcwd(s, sizeof (pstring));
582 wd = (char *)getwd(s);
587 /*******************************************************************
588 system wrapper for symlink
589 ********************************************************************/
591 int sys_symlink(const char *oldpath, const char *newpath)
597 return symlink(oldpath, newpath);
601 /*******************************************************************
602 system wrapper for readlink
603 ********************************************************************/
605 int sys_readlink(const char *path, char *buf, size_t bufsiz)
607 #ifndef HAVE_READLINK
611 return readlink(path, buf, bufsiz);
615 /*******************************************************************
616 system wrapper for link
617 ********************************************************************/
619 int sys_link(const char *oldpath, const char *newpath)
625 return link(oldpath, newpath);
629 /*******************************************************************
630 chown isn't used much but OS/2 doesn't have it
631 ********************************************************************/
633 int sys_chown(const char *fname,uid_t uid,gid_t gid)
638 DEBUG(1,("WARNING: no chown!\n"));
644 return(chown(fname,uid,gid));
648 /*******************************************************************
650 ********************************************************************/
652 int sys_lchown(const char *fname,uid_t uid,gid_t gid)
657 DEBUG(1,("WARNING: no lchown!\n"));
663 return(lchown(fname,uid,gid));
667 /*******************************************************************
668 os/2 also doesn't have chroot
669 ********************************************************************/
670 int sys_chroot(const char *dname)
675 DEBUG(1,("WARNING: no chroot!\n"));
681 return(chroot(dname));
685 /**************************************************************************
686 A wrapper for gethostbyname() that tries avoids looking up hostnames
687 in the root domain, which can cause dial-on-demand links to come up for no
689 ****************************************************************************/
691 struct hostent *sys_gethostbyname(const char *name)
693 #ifdef REDUCE_ROOT_DNS_LOOKUPS
694 char query[256], hostname[256];
697 /* Does this name have any dots in it? If so, make no change */
699 if (strchr_m(name, '.'))
700 return(gethostbyname(name));
702 /* Get my hostname, which should have domain name
703 attached. If not, just do the gethostname on the
707 gethostname(hostname, sizeof(hostname) - 1);
708 hostname[sizeof(hostname) - 1] = 0;
709 if ((domain = strchr_m(hostname, '.')) == NULL)
710 return(gethostbyname(name));
712 /* Attach domain name to query and do modified query.
713 If names too large, just do gethostname on the
717 if((strlen(name) + strlen(domain)) >= sizeof(query))
718 return(gethostbyname(name));
720 slprintf(query, sizeof(query)-1, "%s%s", name, domain);
721 return(gethostbyname(query));
722 #else /* REDUCE_ROOT_DNS_LOOKUPS */
723 return(gethostbyname(name));
724 #endif /* REDUCE_ROOT_DNS_LOOKUPS */
728 #if defined(HAVE_POSIX_CAPABILITIES)
730 #ifdef HAVE_SYS_CAPABILITY_H
732 #if defined(BROKEN_REDHAT_7_SYSTEM_HEADERS) && !defined(_I386_STATFS_H) && !defined(_PPC_STATFS_H)
733 #define _I386_STATFS_H
734 #define _PPC_STATFS_H
735 #define BROKEN_REDHAT_7_STATFS_WORKAROUND
738 #include <sys/capability.h>
740 #ifdef BROKEN_REDHAT_7_STATFS_WORKAROUND
741 #undef _I386_STATFS_H
743 #undef BROKEN_REDHAT_7_STATFS_WORKAROUND
746 #endif /* HAVE_SYS_CAPABILITY_H */
748 /**************************************************************************
749 Try and abstract process capabilities (for systems that have them).
750 ****************************************************************************/
752 /* Set the POSIX capabilities needed for the given purpose into the effective
753 * capability set of the current process. Make sure they are always removed
754 * from the inheritable set, because there is no circumstance in which our
755 * children should inherit our elevated privileges.
757 static BOOL set_process_capability(enum smbd_capability capability,
760 cap_value_t cap_vals[2] = {0};
761 int num_cap_vals = 0;
765 #if defined(HAVE_PRCTL) && defined(PR_GET_KEEPCAPS) && defined(PR_SET_KEEPCAPS)
766 /* On Linux, make sure that any capabilities we grab are sticky
767 * across UID changes. We expect that this would allow us to keep both
768 * the effective and permitted capability sets, but as of circa 2.6.16,
769 * only the permitted set is kept. It is a bug (which we work around)
770 * that the effective set is lost, but we still require the effective
773 if (!prctl(PR_GET_KEEPCAPS)) {
774 prctl(PR_SET_KEEPCAPS, 1);
778 cap = cap_get_proc();
780 DEBUG(0,("set_process_capability: cap_get_proc failed: %s\n",
785 switch (capability) {
786 case KERNEL_OPLOCK_CAPABILITY:
787 #ifdef CAP_NETWORK_MGT
788 /* IRIX has CAP_NETWORK_MGT for oplocks. */
789 cap_vals[num_cap_vals++] = CAP_NETWORK_MGT;
792 case DMAPI_ACCESS_CAPABILITY:
793 #ifdef CAP_DEVICE_MGT
794 /* IRIX has CAP_DEVICE_MGT for DMAPI access. */
795 cap_vals[num_cap_vals++] = CAP_DEVICE_MGT;
797 /* Linux has CAP_MKNOD for DMAPI access. */
798 cap_vals[num_cap_vals++] = CAP_MKNOD;
803 SMB_ASSERT(num_cap_vals <= ARRAY_SIZE(cap_vals));
805 if (num_cap_vals == 0) {
810 cap_set_flag(cap, CAP_EFFECTIVE, num_cap_vals, cap_vals,
811 enable ? CAP_SET : CAP_CLEAR);
813 /* We never want to pass capabilities down to our children, so make
814 * sure they are not inherited.
816 cap_set_flag(cap, CAP_INHERITABLE, num_cap_vals, cap_vals, CAP_CLEAR);
818 if (cap_set_proc(cap) == -1) {
819 DEBUG(0, ("set_process_capability: cap_set_proc failed: %s\n",
829 #endif /* HAVE_POSIX_CAPABILITIES */
831 /****************************************************************************
832 Gain the oplock capability from the kernel if possible.
833 ****************************************************************************/
835 void set_effective_capability(enum smbd_capability capability)
837 #if defined(HAVE_POSIX_CAPABILITIES)
838 set_process_capability(capability, True);
839 #endif /* HAVE_POSIX_CAPABILITIES */
842 void drop_effective_capability(enum smbd_capability capability)
844 #if defined(HAVE_POSIX_CAPABILITIES)
845 set_process_capability(capability, False);
846 #endif /* HAVE_POSIX_CAPABILITIES */
849 /**************************************************************************
850 Wrapper for random().
851 ****************************************************************************/
853 long sys_random(void)
855 #if defined(HAVE_RANDOM)
856 return (long)random();
857 #elif defined(HAVE_RAND)
860 DEBUG(0,("Error - no random function available !\n"));
865 /**************************************************************************
866 Wrapper for srandom().
867 ****************************************************************************/
869 void sys_srandom(unsigned int seed)
871 #if defined(HAVE_SRANDOM)
873 #elif defined(HAVE_SRAND)
876 DEBUG(0,("Error - no srandom function available !\n"));
881 /**************************************************************************
882 Returns equivalent to NGROUPS_MAX - using sysconf if needed.
883 ****************************************************************************/
887 #if defined(SYSCONF_SC_NGROUPS_MAX)
888 int ret = sysconf(_SC_NGROUPS_MAX);
889 return (ret == -1) ? NGROUPS_MAX : ret;
895 /**************************************************************************
896 Wrap setgroups and getgroups for systems that declare getgroups() as
897 returning an array of gid_t, but actuall return an array of int.
898 ****************************************************************************/
900 #if defined(HAVE_BROKEN_GETGROUPS)
901 static int sys_broken_getgroups(int setlen, gid_t *gidset)
908 return getgroups(setlen, &gid);
912 * Broken case. We need to allocate a
913 * GID_T array of size setlen.
922 setlen = groups_max();
924 if((group_list = SMB_MALLOC_ARRAY(GID_T, setlen)) == NULL) {
925 DEBUG(0,("sys_getgroups: Malloc fail.\n"));
929 if((ngroups = getgroups(setlen, group_list)) < 0) {
930 int saved_errno = errno;
931 SAFE_FREE(group_list);
936 for(i = 0; i < ngroups; i++)
937 gidset[i] = (gid_t)group_list[i];
939 SAFE_FREE(group_list);
943 static int sys_broken_setgroups(int setlen, gid_t *gidset)
951 if (setlen < 0 || setlen > groups_max()) {
957 * Broken case. We need to allocate a
958 * GID_T array of size setlen.
961 if((group_list = SMB_MALLOC_ARRAY(GID_T, setlen)) == NULL) {
962 DEBUG(0,("sys_setgroups: Malloc fail.\n"));
966 for(i = 0; i < setlen; i++)
967 group_list[i] = (GID_T) gidset[i];
969 if(setgroups(setlen, group_list) != 0) {
970 int saved_errno = errno;
971 SAFE_FREE(group_list);
976 SAFE_FREE(group_list);
980 #endif /* HAVE_BROKEN_GETGROUPS */
982 /* This is a list of systems that require the first GID passed to setgroups(2)
983 * to be the effective GID. If your system is one of these, add it here.
985 #if defined (FREEBSD) || defined (DARWINOS)
986 #define USE_BSD_SETGROUPS
989 #if defined(USE_BSD_SETGROUPS)
990 /* Depending on the particular BSD implementation, the first GID that is
991 * passed to setgroups(2) will either be ignored or will set the credential's
992 * effective GID. In either case, the right thing to do is to guarantee that
993 * gidset[0] is the effective GID.
995 static int sys_bsd_setgroups(gid_t primary_gid, int setlen, const gid_t *gidset)
997 gid_t *new_gidset = NULL;
1001 /* setgroups(2) will fail with EINVAL if we pass too many groups. */
1004 /* No group list, just make sure we are setting the efective GID. */
1006 return setgroups(1, &primary_gid);
1009 /* If the primary gid is not the first array element, grow the array
1010 * and insert it at the front.
1012 if (gidset[0] != primary_gid) {
1013 new_gidset = SMB_MALLOC_ARRAY(gid_t, setlen + 1);
1014 if (new_gidset == NULL) {
1018 memcpy(new_gidset + 1, gidset, (setlen * sizeof(gid_t)));
1019 new_gidset[0] = primary_gid;
1024 DEBUG(3, ("forced to truncate group list from %d to %d\n",
1029 #if defined(HAVE_BROKEN_GETGROUPS)
1030 ret = sys_broken_setgroups(setlen, new_gidset ? new_gidset : gidset);
1032 ret = setgroups(setlen, new_gidset ? new_gidset : gidset);
1037 SAFE_FREE(new_gidset);
1044 #endif /* USE_BSD_SETGROUPS */
1046 /**************************************************************************
1047 Wrapper for getgroups. Deals with broken (int) case.
1048 ****************************************************************************/
1050 int sys_getgroups(int setlen, gid_t *gidset)
1052 #if defined(HAVE_BROKEN_GETGROUPS)
1053 return sys_broken_getgroups(setlen, gidset);
1055 return getgroups(setlen, gidset);
1059 /**************************************************************************
1060 Wrapper for setgroups. Deals with broken (int) case and BSD case.
1061 ****************************************************************************/
1063 int sys_setgroups(gid_t UNUSED(primary_gid), int setlen, gid_t *gidset)
1065 #if !defined(HAVE_SETGROUPS)
1068 #endif /* HAVE_SETGROUPS */
1070 #if defined(USE_BSD_SETGROUPS)
1071 return sys_bsd_setgroups(primary_gid, setlen, gidset);
1072 #elif defined(HAVE_BROKEN_GETGROUPS)
1073 return sys_broken_setgroups(setlen, gidset);
1075 return setgroups(setlen, gidset);
1079 /**************************************************************************
1080 Wrappers for setpwent(), getpwent() and endpwent()
1081 ****************************************************************************/
1083 void sys_setpwent(void)
1088 struct passwd *sys_getpwent(void)
1093 void sys_endpwent(void)
1098 /**************************************************************************
1099 Wrappers for getpwnam(), getpwuid(), getgrnam(), getgrgid()
1100 ****************************************************************************/
1102 #ifdef ENABLE_BUILD_FARM_HACKS
1105 * In the build farm we want to be able to join machines to the domain. As we
1106 * don't have root access, we need to bypass direct access to /etc/passwd
1107 * after a user has been created via samr. Fake those users.
1110 static struct passwd *fake_pwd;
1111 static int num_fake_pwd;
1113 struct passwd *sys_getpwnam(const char *name)
1117 for (i=0; i<num_fake_pwd; i++) {
1118 if (strcmp(fake_pwd[i].pw_name, name) == 0) {
1119 DEBUG(10, ("Returning fake user %s\n", name));
1120 return &fake_pwd[i];
1124 return getpwnam(name);
1127 struct passwd *sys_getpwuid(uid_t uid)
1131 for (i=0; i<num_fake_pwd; i++) {
1132 if (fake_pwd[i].pw_uid == uid) {
1133 DEBUG(10, ("Returning fake user %s\n",
1134 fake_pwd[i].pw_name));
1135 return &fake_pwd[i];
1139 return getpwuid(uid);
1142 void faked_create_user(const char *name)
1146 struct passwd new_pwd;
1148 for (i=0; i<10; i++) {
1149 generate_random_buffer((unsigned char *)&uid,
1151 if (getpwuid(uid) == NULL) {
1157 /* Weird. No free uid found... */
1161 new_pwd.pw_name = SMB_STRDUP(name);
1162 new_pwd.pw_passwd = SMB_STRDUP("x");
1163 new_pwd.pw_uid = uid;
1164 new_pwd.pw_gid = 100;
1165 new_pwd.pw_gecos = SMB_STRDUP("faked user");
1166 new_pwd.pw_dir = SMB_STRDUP("/nodir");
1167 new_pwd.pw_shell = SMB_STRDUP("/bin/false");
1169 ADD_TO_ARRAY(NULL, struct passwd, new_pwd, &fake_pwd,
1172 DEBUG(10, ("Added fake user %s, have %d fake users\n",
1173 name, num_fake_pwd));
1178 struct passwd *sys_getpwnam(const char *name)
1180 return getpwnam(name);
1183 struct passwd *sys_getpwuid(uid_t uid)
1185 return getpwuid(uid);
1190 struct group *sys_getgrnam(const char *name)
1192 return getgrnam(name);
1195 struct group *sys_getgrgid(gid_t gid)
1197 return getgrgid(gid);
1200 /**************************************************************************
1201 Extract a command into an arg list.
1202 ****************************************************************************/
1204 static char **extract_args(TALLOC_CTX *mem_ctx, const char *command)
1213 if (!(trunc_cmd = talloc_strdup(mem_ctx, command))) {
1214 DEBUG(0, ("talloc failed\n"));
1218 if(!(ptr = strtok_r(trunc_cmd, " \t", &saveptr))) {
1219 TALLOC_FREE(trunc_cmd);
1228 for( argcl = 1; ptr; ptr = strtok_r(NULL, " \t", &saveptr))
1231 TALLOC_FREE(trunc_cmd);
1233 if (!(argl = TALLOC_ARRAY(mem_ctx, char *, argcl + 1))) {
1238 * Now do the extraction.
1241 if (!(trunc_cmd = talloc_strdup(mem_ctx, command))) {
1245 ptr = strtok_r(trunc_cmd, " \t", &saveptr);
1248 if (!(argl[i++] = talloc_strdup(argl, ptr))) {
1252 while((ptr = strtok_r(NULL, " \t", &saveptr)) != NULL) {
1254 if (!(argl[i++] = talloc_strdup(argl, ptr))) {
1263 DEBUG(0, ("talloc failed\n"));
1264 TALLOC_FREE(trunc_cmd);
1270 /**************************************************************************
1271 Wrapper for fork. Ensures that mypid is reset. Used so we can write
1272 a sys_getpid() that only does a system call *once*.
1273 ****************************************************************************/
1275 static pid_t mypid = (pid_t)-1;
1277 pid_t sys_fork(void)
1279 pid_t forkret = fork();
1281 if (forkret == (pid_t)0) /* Child - reset mypid so sys_getpid does a system call. */
1287 /**************************************************************************
1288 Wrapper for getpid. Ensures we only do a system call *once*.
1289 ****************************************************************************/
1291 pid_t sys_getpid(void)
1293 if (mypid == (pid_t)-1)
1299 /**************************************************************************
1300 Wrapper for popen. Safer as it doesn't search a path.
1301 Modified from the glibc sources.
1302 modified by tridge to return a file descriptor. We must kick our FILE* habit
1303 ****************************************************************************/
1305 typedef struct _popen_list
1309 struct _popen_list *next;
1312 static popen_list *popen_chain;
1314 int sys_popen(const char *command)
1316 int parent_end, child_end;
1318 popen_list *entry = NULL;
1321 if (pipe(pipe_fds) < 0)
1324 parent_end = pipe_fds[0];
1325 child_end = pipe_fds[1];
1332 if((entry = SMB_MALLOC_P(popen_list)) == NULL)
1335 ZERO_STRUCTP(entry);
1338 * Extract the command and args into a NULL terminated array.
1341 if(!(argl = extract_args(NULL, command)))
1344 entry->child_pid = sys_fork();
1346 if (entry->child_pid == -1) {
1350 if (entry->child_pid == 0) {
1356 int child_std_end = STDOUT_FILENO;
1360 if (child_end != child_std_end) {
1361 dup2 (child_end, child_std_end);
1366 * POSIX.2: "popen() shall ensure that any streams from previous
1367 * popen() calls that remain open in the parent process are closed
1368 * in the new child process."
1371 for (p = popen_chain; p; p = p->next)
1374 execv(argl[0], argl);
1385 /* Link into popen_chain. */
1386 entry->next = popen_chain;
1387 popen_chain = entry;
1388 entry->fd = parent_end;
1401 /**************************************************************************
1402 Wrapper for pclose. Modified from the glibc sources.
1403 ****************************************************************************/
1405 int sys_pclose(int fd)
1408 popen_list **ptr = &popen_chain;
1409 popen_list *entry = NULL;
1413 /* Unlink from popen_chain. */
1414 for ( ; *ptr != NULL; ptr = &(*ptr)->next) {
1415 if ((*ptr)->fd == fd) {
1417 *ptr = (*ptr)->next;
1423 if (status < 0 || close(entry->fd) < 0)
1427 * As Samba is catching and eating child process
1428 * exits we don't really care about the child exit
1429 * code, a -1 with errno = ECHILD will do fine for us.
1433 wait_pid = sys_waitpid (entry->child_pid, &wstatus, 0);
1434 } while (wait_pid == -1 && errno == EINTR);
1443 /**************************************************************************
1444 Wrappers for dlopen, dlsym, dlclose.
1445 ****************************************************************************/
1447 void *sys_dlopen(const char *name, int flags)
1449 #if defined(HAVE_DLOPEN)
1450 return dlopen(name, flags);
1456 void *sys_dlsym(void *handle, const char *symbol)
1458 #if defined(HAVE_DLSYM)
1459 return dlsym(handle, symbol);
1465 int sys_dlclose (void *handle)
1467 #if defined(HAVE_DLCLOSE)
1468 return dlclose(handle);
1474 const char *sys_dlerror(void)
1476 #if defined(HAVE_DLERROR)
1483 int sys_dup2(int oldfd, int newfd)
1485 #if defined(HAVE_DUP2)
1486 return dup2(oldfd, newfd);
1493 /**************************************************************************
1494 Wrapper for Admin Logs.
1495 ****************************************************************************/
1497 void sys_adminlog(int priority, const char *format_str, ...)
1501 char *msgbuf = NULL;
1503 va_start( ap, format_str );
1504 ret = vasprintf( &msgbuf, format_str, ap );
1510 #if defined(HAVE_SYSLOG)
1511 syslog( priority, "%s", msgbuf );
1513 DEBUG(0,("%s", msgbuf ));
1518 /******** Solaris EA helper function prototypes ********/
1519 #ifdef HAVE_ATTROPEN
1520 #define SOLARIS_ATTRMODE S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP
1521 static int solaris_write_xattr(int attrfd, const char *value, size_t size);
1522 static ssize_t solaris_read_xattr(int attrfd, void *value, size_t size);
1523 static ssize_t solaris_list_xattr(int attrdirfd, char *list, size_t size);
1524 static int solaris_unlinkat(int attrdirfd, const char *name);
1525 static int solaris_attropen(const char *path, const char *attrpath, int oflag, mode_t mode);
1526 static int solaris_openat(int fildes, const char *path, int oflag, mode_t mode);
1529 /**************************************************************************
1530 Wrappers for extented attribute calls. Based on the Linux package with
1531 support for IRIX and (Net|Free)BSD also. Expand as other systems have them.
1532 ****************************************************************************/
1534 ssize_t sys_getxattr (const char *path, const char *name, void *value, size_t size)
1536 #if defined(HAVE_GETXATTR)
1537 #ifndef XATTR_ADD_OPT
1538 return getxattr(path, name, value, size);
1541 return getxattr(path, name, value, size, 0, options);
1543 #elif defined(HAVE_GETEA)
1544 return getea(path, name, value, size);
1545 #elif defined(HAVE_EXTATTR_GET_FILE)
1548 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1549 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1550 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1552 * The BSD implementation has a nasty habit of silently truncating
1553 * the returned value to the size of the buffer, so we have to check
1554 * that the buffer is large enough to fit the returned value.
1556 if((retval=extattr_get_file(path, attrnamespace, attrname, NULL, 0)) >= 0) {
1561 if((retval=extattr_get_file(path, attrnamespace, attrname, value, size)) >= 0)
1565 DEBUG(10,("sys_getxattr: extattr_get_file() failed with: %s\n", strerror(errno)));
1567 #elif defined(HAVE_ATTR_GET)
1568 int retval, flags = 0;
1569 int valuelength = (int)size;
1570 char *attrname = strchr(name,'.') + 1;
1572 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1574 retval = attr_get(path, attrname, (char *)value, &valuelength, flags);
1576 return retval ? retval : valuelength;
1577 #elif defined(HAVE_ATTROPEN)
1579 int attrfd = solaris_attropen(path, name, O_RDONLY, 0);
1581 ret = solaris_read_xattr(attrfd, value, size);
1591 ssize_t sys_lgetxattr (const char *path, const char *name, void *value, size_t size)
1593 #if defined(HAVE_LGETXATTR)
1594 return lgetxattr(path, name, value, size);
1595 #elif defined(HAVE_GETXATTR) && defined(XATTR_ADD_OPT)
1596 int options = XATTR_NOFOLLOW;
1597 return getxattr(path, name, value, size, 0, options);
1598 #elif defined(HAVE_LGETEA)
1599 return lgetea(path, name, value, size);
1600 #elif defined(HAVE_EXTATTR_GET_LINK)
1603 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1604 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1605 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1607 if((retval=extattr_get_link(path, attrnamespace, attrname, NULL, 0)) >= 0) {
1612 if((retval=extattr_get_link(path, attrnamespace, attrname, value, size)) >= 0)
1616 DEBUG(10,("sys_lgetxattr: extattr_get_link() failed with: %s\n", strerror(errno)));
1618 #elif defined(HAVE_ATTR_GET)
1619 int retval, flags = ATTR_DONTFOLLOW;
1620 int valuelength = (int)size;
1621 char *attrname = strchr(name,'.') + 1;
1623 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1625 retval = attr_get(path, attrname, (char *)value, &valuelength, flags);
1627 return retval ? retval : valuelength;
1628 #elif defined(HAVE_ATTROPEN)
1630 int attrfd = solaris_attropen(path, name, O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1632 ret = solaris_read_xattr(attrfd, value, size);
1642 ssize_t sys_fgetxattr (int filedes, const char *name, void *value, size_t size)
1644 #if defined(HAVE_FGETXATTR)
1645 #ifndef XATTR_ADD_OPT
1646 return fgetxattr(filedes, name, value, size);
1649 return fgetxattr(filedes, name, value, size, 0, options);
1651 #elif defined(HAVE_FGETEA)
1652 return fgetea(filedes, name, value, size);
1653 #elif defined(HAVE_EXTATTR_GET_FD)
1656 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1657 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1658 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1660 if((retval=extattr_get_fd(filedes, attrnamespace, attrname, NULL, 0)) >= 0) {
1665 if((retval=extattr_get_fd(filedes, attrnamespace, attrname, value, size)) >= 0)
1669 DEBUG(10,("sys_fgetxattr: extattr_get_fd() failed with: %s\n", strerror(errno)));
1671 #elif defined(HAVE_ATTR_GETF)
1672 int retval, flags = 0;
1673 int valuelength = (int)size;
1674 char *attrname = strchr(name,'.') + 1;
1676 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1678 retval = attr_getf(filedes, attrname, (char *)value, &valuelength, flags);
1680 return retval ? retval : valuelength;
1681 #elif defined(HAVE_ATTROPEN)
1683 int attrfd = solaris_openat(filedes, name, O_RDONLY|O_XATTR, 0);
1685 ret = solaris_read_xattr(attrfd, value, size);
1695 #if defined(HAVE_EXTATTR_LIST_FILE)
1697 #define EXTATTR_PREFIX(s) (s), (sizeof((s))-1)
1705 { EXTATTR_NAMESPACE_SYSTEM, EXTATTR_PREFIX("system.") },
1706 { EXTATTR_NAMESPACE_USER, EXTATTR_PREFIX("user.") },
1714 static ssize_t bsd_attr_list (int type, extattr_arg arg, char *list, size_t size)
1716 ssize_t list_size, total_size = 0;
1719 /* Iterate through extattr(2) namespaces */
1720 for(t = 0; t < (sizeof(extattr)/sizeof(extattr[0])); t++) {
1722 #if defined(HAVE_EXTATTR_LIST_FILE)
1724 list_size = extattr_list_file(arg.path, extattr[t].space, list, size);
1727 #if defined(HAVE_EXTATTR_LIST_LINK)
1729 list_size = extattr_list_link(arg.path, extattr[t].space, list, size);
1732 #if defined(HAVE_EXTATTR_LIST_FD)
1734 list_size = extattr_list_fd(arg.filedes, extattr[t].space, list, size);
1741 /* Some error happend. Errno should be set by the previous call */
1747 /* XXX: Call with an empty buffer may be used to calculate
1748 necessary buffer size. Unfortunately, we can't say, how
1749 many attributes were returned, so here is the potential
1750 problem with the emulation.
1753 /* Take the worse case of one char attribute names -
1754 two bytes per name plus one more for sanity.
1756 total_size += list_size + (list_size/2 + 1)*extattr[t].len;
1759 /* Count necessary offset to fit namespace prefixes */
1761 for(i = 0; i < list_size; i += list[i] + 1)
1762 len += extattr[t].len;
1764 total_size += list_size + len;
1765 /* Buffer is too small to fit the results */
1766 if(total_size > size) {
1770 /* Shift results back, so we can prepend prefixes */
1771 buf = memmove(list + len, list, list_size);
1773 for(i = 0; i < list_size; i += len + 1) {
1775 strncpy(list, extattr[t].name, extattr[t].len + 1);
1776 list += extattr[t].len;
1777 strncpy(list, buf + i + 1, len);
1788 #if defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1789 static char attr_buffer[ATTR_MAX_VALUELEN];
1791 static ssize_t irix_attr_list(const char *path, int filedes, char *list, size_t size, int flags)
1793 int retval = 0, index;
1794 attrlist_cursor_t *cursor = 0;
1796 attrlist_t * al = (attrlist_t *)attr_buffer;
1798 size_t ent_size, left = size;
1803 retval = attr_listf(filedes, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1805 retval = attr_list(path, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1807 for (index = 0; index < al->al_count; index++) {
1808 ae = ATTR_ENTRY(attr_buffer, index);
1809 ent_size = strlen(ae->a_name) + sizeof("user.");
1810 if (left >= ent_size) {
1811 strncpy(bp, "user.", sizeof("user."));
1812 strncat(bp, ae->a_name, ent_size - sizeof("user."));
1820 total_size += ent_size;
1822 if (al->al_more == 0) break;
1829 retval = attr_listf(filedes, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1831 retval = attr_list(path, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1833 for (index = 0; index < al->al_count; index++) {
1834 ae = ATTR_ENTRY(attr_buffer, index);
1835 ent_size = strlen(ae->a_name) + sizeof("system.");
1836 if (left >= ent_size) {
1837 strncpy(bp, "system.", sizeof("system."));
1838 strncat(bp, ae->a_name, ent_size - sizeof("system."));
1846 total_size += ent_size;
1848 if (al->al_more == 0) break;
1851 return (ssize_t)(retval ? retval : total_size);
1856 ssize_t sys_listxattr (const char *path, char *list, size_t size)
1858 #if defined(HAVE_LISTXATTR)
1859 #ifndef XATTR_ADD_OPT
1860 return listxattr(path, list, size);
1863 return listxattr(path, list, size, options);
1865 #elif defined(HAVE_LISTEA)
1866 return listea(path, list, size);
1867 #elif defined(HAVE_EXTATTR_LIST_FILE)
1870 return bsd_attr_list(0, arg, list, size);
1871 #elif defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1872 return irix_attr_list(path, 0, list, size, 0);
1873 #elif defined(HAVE_ATTROPEN)
1875 int attrdirfd = solaris_attropen(path, ".", O_RDONLY, 0);
1876 if (attrdirfd >= 0) {
1877 ret = solaris_list_xattr(attrdirfd, list, size);
1887 ssize_t sys_llistxattr (const char *path, char *list, size_t size)
1889 #if defined(HAVE_LLISTXATTR)
1890 return llistxattr(path, list, size);
1891 #elif defined(HAVE_LISTXATTR) && defined(XATTR_ADD_OPT)
1892 int options = XATTR_NOFOLLOW;
1893 return listxattr(path, list, size, options);
1894 #elif defined(HAVE_LLISTEA)
1895 return llistea(path, list, size);
1896 #elif defined(HAVE_EXTATTR_LIST_LINK)
1899 return bsd_attr_list(1, arg, list, size);
1900 #elif defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1901 return irix_attr_list(path, 0, list, size, ATTR_DONTFOLLOW);
1902 #elif defined(HAVE_ATTROPEN)
1904 int attrdirfd = solaris_attropen(path, ".", O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1905 if (attrdirfd >= 0) {
1906 ret = solaris_list_xattr(attrdirfd, list, size);
1916 ssize_t sys_flistxattr (int filedes, char *list, size_t size)
1918 #if defined(HAVE_FLISTXATTR)
1919 #ifndef XATTR_ADD_OPT
1920 return flistxattr(filedes, list, size);
1923 return flistxattr(filedes, list, size, options);
1925 #elif defined(HAVE_FLISTEA)
1926 return flistea(filedes, list, size);
1927 #elif defined(HAVE_EXTATTR_LIST_FD)
1929 arg.filedes = filedes;
1930 return bsd_attr_list(2, arg, list, size);
1931 #elif defined(HAVE_ATTR_LISTF)
1932 return irix_attr_list(NULL, filedes, list, size, 0);
1933 #elif defined(HAVE_ATTROPEN)
1935 int attrdirfd = solaris_openat(filedes, ".", O_RDONLY|O_XATTR, 0);
1936 if (attrdirfd >= 0) {
1937 ret = solaris_list_xattr(attrdirfd, list, size);
1947 int sys_removexattr (const char *path, const char *name)
1949 #if defined(HAVE_REMOVEXATTR)
1950 #ifndef XATTR_ADD_OPT
1951 return removexattr(path, name);
1954 return removexattr(path, name, options);
1956 #elif defined(HAVE_REMOVEEA)
1957 return removeea(path, name);
1958 #elif defined(HAVE_EXTATTR_DELETE_FILE)
1960 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1961 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1962 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1964 return extattr_delete_file(path, attrnamespace, attrname);
1965 #elif defined(HAVE_ATTR_REMOVE)
1967 char *attrname = strchr(name,'.') + 1;
1969 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1971 return attr_remove(path, attrname, flags);
1972 #elif defined(HAVE_ATTROPEN)
1974 int attrdirfd = solaris_attropen(path, ".", O_RDONLY, 0);
1975 if (attrdirfd >= 0) {
1976 ret = solaris_unlinkat(attrdirfd, name);
1986 int sys_lremovexattr (const char *path, const char *name)
1988 #if defined(HAVE_LREMOVEXATTR)
1989 return lremovexattr(path, name);
1990 #elif defined(HAVE_REMOVEXATTR) && defined(XATTR_ADD_OPT)
1991 int options = XATTR_NOFOLLOW;
1992 return removexattr(path, name, options);
1993 #elif defined(HAVE_LREMOVEEA)
1994 return lremoveea(path, name);
1995 #elif defined(HAVE_EXTATTR_DELETE_LINK)
1997 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1998 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1999 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
2001 return extattr_delete_link(path, attrnamespace, attrname);
2002 #elif defined(HAVE_ATTR_REMOVE)
2003 int flags = ATTR_DONTFOLLOW;
2004 char *attrname = strchr(name,'.') + 1;
2006 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
2008 return attr_remove(path, attrname, flags);
2009 #elif defined(HAVE_ATTROPEN)
2011 int attrdirfd = solaris_attropen(path, ".", O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
2012 if (attrdirfd >= 0) {
2013 ret = solaris_unlinkat(attrdirfd, name);
2023 int sys_fremovexattr (int filedes, const char *name)
2025 #if defined(HAVE_FREMOVEXATTR)
2026 #ifndef XATTR_ADD_OPT
2027 return fremovexattr(filedes, name);
2030 return fremovexattr(filedes, name, options);
2032 #elif defined(HAVE_FREMOVEEA)
2033 return fremoveea(filedes, name);
2034 #elif defined(HAVE_EXTATTR_DELETE_FD)
2036 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
2037 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
2038 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
2040 return extattr_delete_fd(filedes, attrnamespace, attrname);
2041 #elif defined(HAVE_ATTR_REMOVEF)
2043 char *attrname = strchr(name,'.') + 1;
2045 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
2047 return attr_removef(filedes, attrname, flags);
2048 #elif defined(HAVE_ATTROPEN)
2050 int attrdirfd = solaris_openat(filedes, ".", O_RDONLY|O_XATTR, 0);
2051 if (attrdirfd >= 0) {
2052 ret = solaris_unlinkat(attrdirfd, name);
2062 #if !defined(HAVE_SETXATTR)
2063 #define XATTR_CREATE 0x1 /* set value, fail if attr already exists */
2064 #define XATTR_REPLACE 0x2 /* set value, fail if attr does not exist */
2067 int sys_setxattr (const char *path, const char *name, const void *value, size_t size, int flags)
2069 #if defined(HAVE_SETXATTR)
2070 #ifndef XATTR_ADD_OPT
2071 return setxattr(path, name, value, size, flags);
2074 return setxattr(path, name, value, size, 0, options);
2076 #elif defined(HAVE_SETEA)
2077 return setea(path, name, value, size, flags);
2078 #elif defined(HAVE_EXTATTR_SET_FILE)
2081 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
2082 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
2083 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
2085 /* Check attribute existence */
2086 retval = extattr_get_file(path, attrnamespace, attrname, NULL, 0);
2088 /* REPLACE attribute, that doesn't exist */
2089 if (flags & XATTR_REPLACE && errno == ENOATTR) {
2093 /* Ignore other errors */
2096 /* CREATE attribute, that already exists */
2097 if (flags & XATTR_CREATE) {
2103 retval = extattr_set_file(path, attrnamespace, attrname, value, size);
2104 return (retval < 0) ? -1 : 0;
2105 #elif defined(HAVE_ATTR_SET)
2107 char *attrname = strchr(name,'.') + 1;
2109 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
2110 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
2111 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
2113 return attr_set(path, attrname, (const char *)value, size, myflags);
2114 #elif defined(HAVE_ATTROPEN)
2116 int myflags = O_RDWR;
2117 if (flags & XATTR_CREATE) myflags |= O_EXCL;
2118 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
2119 int attrfd = solaris_attropen(path, name, myflags, (mode_t) SOLARIS_ATTRMODE);
2121 ret = solaris_write_xattr(attrfd, value, size);
2131 int sys_lsetxattr (const char *path, const char *name, const void *value, size_t size, int flags)
2133 #if defined(HAVE_LSETXATTR)
2134 return lsetxattr(path, name, value, size, flags);
2135 #elif defined(HAVE_SETXATTR) && defined(XATTR_ADD_OPT)
2136 int options = XATTR_NOFOLLOW;
2137 return setxattr(path, name, value, size, 0, options);
2138 #elif defined(LSETEA)
2139 return lsetea(path, name, value, size, flags);
2140 #elif defined(HAVE_EXTATTR_SET_LINK)
2143 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
2144 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
2145 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
2147 /* Check attribute existence */
2148 retval = extattr_get_link(path, attrnamespace, attrname, NULL, 0);
2150 /* REPLACE attribute, that doesn't exist */
2151 if (flags & XATTR_REPLACE && errno == ENOATTR) {
2155 /* Ignore other errors */
2158 /* CREATE attribute, that already exists */
2159 if (flags & XATTR_CREATE) {
2166 retval = extattr_set_link(path, attrnamespace, attrname, value, size);
2167 return (retval < 0) ? -1 : 0;
2168 #elif defined(HAVE_ATTR_SET)
2169 int myflags = ATTR_DONTFOLLOW;
2170 char *attrname = strchr(name,'.') + 1;
2172 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
2173 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
2174 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
2176 return attr_set(path, attrname, (const char *)value, size, myflags);
2177 #elif defined(HAVE_ATTROPEN)
2179 int myflags = O_RDWR | AT_SYMLINK_NOFOLLOW;
2180 if (flags & XATTR_CREATE) myflags |= O_EXCL;
2181 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
2182 int attrfd = solaris_attropen(path, name, myflags, (mode_t) SOLARIS_ATTRMODE);
2184 ret = solaris_write_xattr(attrfd, value, size);
2194 int sys_fsetxattr (int filedes, const char *name, const void *value, size_t size, int flags)
2196 #if defined(HAVE_FSETXATTR)
2197 #ifndef XATTR_ADD_OPT
2198 return fsetxattr(filedes, name, value, size, flags);
2201 return fsetxattr(filedes, name, value, size, 0, options);
2203 #elif defined(HAVE_FSETEA)
2204 return fsetea(filedes, name, value, size, flags);
2205 #elif defined(HAVE_EXTATTR_SET_FD)
2208 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
2209 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
2210 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
2212 /* Check attribute existence */
2213 retval = extattr_get_fd(filedes, attrnamespace, attrname, NULL, 0);
2215 /* REPLACE attribute, that doesn't exist */
2216 if (flags & XATTR_REPLACE && errno == ENOATTR) {
2220 /* Ignore other errors */
2223 /* CREATE attribute, that already exists */
2224 if (flags & XATTR_CREATE) {
2230 retval = extattr_set_fd(filedes, attrnamespace, attrname, value, size);
2231 return (retval < 0) ? -1 : 0;
2232 #elif defined(HAVE_ATTR_SETF)
2234 char *attrname = strchr(name,'.') + 1;
2236 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
2237 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
2238 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
2240 return attr_setf(filedes, attrname, (const char *)value, size, myflags);
2241 #elif defined(HAVE_ATTROPEN)
2243 int myflags = O_RDWR | O_XATTR;
2244 if (flags & XATTR_CREATE) myflags |= O_EXCL;
2245 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
2246 int attrfd = solaris_openat(filedes, name, myflags, (mode_t) SOLARIS_ATTRMODE);
2248 ret = solaris_write_xattr(attrfd, value, size);
2258 /**************************************************************************
2259 helper functions for Solaris' EA support
2260 ****************************************************************************/
2261 #ifdef HAVE_ATTROPEN
2262 static ssize_t solaris_read_xattr(int attrfd, void *value, size_t size)
2266 if (fstat(attrfd, &sbuf) == -1) {
2271 /* This is to return the current size of the named extended attribute */
2273 return sbuf.st_size;
2276 /* check size and read xattr */
2277 if (sbuf.st_size > size) {
2282 return read(attrfd, value, sbuf.st_size);
2285 static ssize_t solaris_list_xattr(int attrdirfd, char *list, size_t size)
2291 int newfd = dup(attrdirfd);
2292 /* CAUTION: The originating file descriptor should not be
2293 used again following the call to fdopendir().
2294 For that reason we dup() the file descriptor
2295 here to make things more clear. */
2296 dirp = fdopendir(newfd);
2298 while ((de = readdir(dirp))) {
2299 size_t listlen = strlen(de->d_name);
2300 if (!strcmp(de->d_name, ".") || !strcmp(de->d_name, "..")) {
2301 /* we don't want "." and ".." here: */
2302 DEBUG(10,("skipped EA %s\n",de->d_name));
2307 /* return the current size of the list of extended attribute names*/
2310 /* check size and copy entrieѕ + nul into list. */
2311 if ((len + listlen + 1) > size) {
2316 safe_strcpy(list + len, de->d_name, listlen);
2317 pstrcpy(list + len, de->d_name);
2325 if (closedir(dirp) == -1) {
2326 DEBUG(0,("closedir dirp failed: %s\n",strerror(errno)));
2332 static int solaris_unlinkat(int attrdirfd, const char *name)
2334 if (unlinkat(attrdirfd, name, 0) == -1) {
2335 if (errno == ENOENT) {
2343 static int solaris_attropen(const char *path, const char *attrpath, int oflag, mode_t mode)
2345 int filedes = attropen(path, attrpath, oflag, mode);
2346 if (filedes == -1) {
2347 DEBUG(10,("attropen FAILED: path: %s, name: %s, errno: %s\n",path,attrpath,strerror(errno)));
2348 if (errno == EINVAL) {
2357 static int solaris_openat(int fildes, const char *path, int oflag, mode_t mode)
2359 int filedes = openat(fildes, path, oflag, mode);
2360 if (filedes == -1) {
2361 DEBUG(10,("openat FAILED: fd: %s, path: %s, errno: %s\n",filedes,path,strerror(errno)));
2362 if (errno == EINVAL) {
2371 static int solaris_write_xattr(int attrfd, const char *value, size_t size)
2373 if ((ftruncate(attrfd, 0) == 0) && (write(attrfd, value, size) == size)) {
2376 DEBUG(10,("solaris_write_xattr FAILED!\n"));
2380 #endif /*HAVE_ATTROPEN*/
2383 /****************************************************************************
2384 Return the major devicenumber for UNIX extensions.
2385 ****************************************************************************/
2387 uint32 unix_dev_major(SMB_DEV_T dev)
2389 #if defined(HAVE_DEVICE_MAJOR_FN)
2390 return (uint32)major(dev);
2392 return (uint32)(dev >> 8);
2396 /****************************************************************************
2397 Return the minor devicenumber for UNIX extensions.
2398 ****************************************************************************/
2400 uint32 unix_dev_minor(SMB_DEV_T dev)
2402 #if defined(HAVE_DEVICE_MINOR_FN)
2403 return (uint32)minor(dev);
2405 return (uint32)(dev & 0xff);
2409 #if defined(WITH_AIO)
2411 /*******************************************************************
2412 An aio_read wrapper that will deal with 64-bit sizes.
2413 ********************************************************************/
2415 int sys_aio_read(SMB_STRUCT_AIOCB *aiocb)
2417 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_READ64)
2418 return aio_read64(aiocb);
2419 #elif defined(HAVE_AIO_READ)
2420 return aio_read(aiocb);
2427 /*******************************************************************
2428 An aio_write wrapper that will deal with 64-bit sizes.
2429 ********************************************************************/
2431 int sys_aio_write(SMB_STRUCT_AIOCB *aiocb)
2433 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_WRITE64)
2434 return aio_write64(aiocb);
2435 #elif defined(HAVE_AIO_WRITE)
2436 return aio_write(aiocb);
2443 /*******************************************************************
2444 An aio_return wrapper that will deal with 64-bit sizes.
2445 ********************************************************************/
2447 ssize_t sys_aio_return(SMB_STRUCT_AIOCB *aiocb)
2449 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_RETURN64)
2450 return aio_return64(aiocb);
2451 #elif defined(HAVE_AIO_RETURN)
2452 return aio_return(aiocb);
2459 /*******************************************************************
2460 An aio_cancel wrapper that will deal with 64-bit sizes.
2461 ********************************************************************/
2463 int sys_aio_cancel(int fd, SMB_STRUCT_AIOCB *aiocb)
2465 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_CANCEL64)
2466 return aio_cancel64(fd, aiocb);
2467 #elif defined(HAVE_AIO_CANCEL)
2468 return aio_cancel(fd, aiocb);
2475 /*******************************************************************
2476 An aio_error wrapper that will deal with 64-bit sizes.
2477 ********************************************************************/
2479 int sys_aio_error(const SMB_STRUCT_AIOCB *aiocb)
2481 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_ERROR64)
2482 return aio_error64(aiocb);
2483 #elif defined(HAVE_AIO_ERROR)
2484 return aio_error(aiocb);
2491 /*******************************************************************
2492 An aio_fsync wrapper that will deal with 64-bit sizes.
2493 ********************************************************************/
2495 int sys_aio_fsync(int op, SMB_STRUCT_AIOCB *aiocb)
2497 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_FSYNC64)
2498 return aio_fsync64(op, aiocb);
2499 #elif defined(HAVE_AIO_FSYNC)
2500 return aio_fsync(op, aiocb);
2507 /*******************************************************************
2508 An aio_fsync wrapper that will deal with 64-bit sizes.
2509 ********************************************************************/
2511 int sys_aio_suspend(const SMB_STRUCT_AIOCB * const cblist[], int n, const struct timespec *timeout)
2513 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_SUSPEND64)
2514 return aio_suspend64(cblist, n, timeout);
2515 #elif defined(HAVE_AIO_FSYNC)
2516 return aio_suspend(cblist, n, timeout);
2522 #else /* !WITH_AIO */
2524 int sys_aio_read(SMB_STRUCT_AIOCB *aiocb)
2530 int sys_aio_write(SMB_STRUCT_AIOCB *aiocb)
2536 ssize_t sys_aio_return(SMB_STRUCT_AIOCB *aiocb)
2542 int sys_aio_cancel(int fd, SMB_STRUCT_AIOCB *aiocb)
2548 int sys_aio_error(const SMB_STRUCT_AIOCB *aiocb)
2554 int sys_aio_fsync(int op, SMB_STRUCT_AIOCB *aiocb)
2560 int sys_aio_suspend(const SMB_STRUCT_AIOCB * const cblist[], int n, const struct timespec *timeout)
2565 #endif /* WITH_AIO */
2567 int sys_getpeereid( int s, uid_t *uid)
2569 #if defined(HAVE_PEERCRED)
2571 socklen_t cred_len = sizeof(struct ucred);
2574 ret = getsockopt(s, SOL_SOCKET, SO_PEERCRED, (void *)&cred, &cred_len);
2579 if (cred_len != sizeof(struct ucred)) {