2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Jeremy Allison 1998-2005
6 Copyright (C) Timur Bakeyev 2005
7 Copyright (C) Bjoern Jacke 2006-2007
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
25 #ifdef HAVE_SYS_PRCTL_H
26 #include <sys/prctl.h>
30 The idea is that this file will eventually have wrappers around all
31 important system calls in samba. The aims are:
33 - to enable easier porting by putting OS dependent stuff in here
35 - to allow for hooks into other "pseudo-filesystems"
37 - to allow easier integration of things like the japanese extensions
39 - to support the philosophy of Samba to expose the features of
40 the OS within the SMB model. In general whatever file/printer/variable
41 expansions/etc make sense to the OS should be acceptable to Samba.
46 /*******************************************************************
47 A wrapper for memalign
48 ********************************************************************/
50 void *sys_memalign( size_t align, size_t size )
52 #if defined(HAVE_POSIX_MEMALIGN)
54 int ret = posix_memalign( &p, align, size );
59 #elif defined(HAVE_MEMALIGN)
60 return memalign( align, size );
62 /* On *BSD systems memaligns doesn't exist, but memory will
63 * be aligned on allocations of > pagesize. */
64 #if defined(SYSCONF_SC_PAGESIZE)
65 size_t pagesize = (size_t)sysconf(_SC_PAGESIZE);
66 #elif defined(HAVE_GETPAGESIZE)
67 size_t pagesize = (size_t)getpagesize();
69 size_t pagesize = (size_t)-1;
71 if (pagesize == (size_t)-1) {
72 DEBUG(0,("memalign functionalaity not available on this platform!\n"));
75 if (size < pagesize) {
78 return SMB_MALLOC(size);
82 /*******************************************************************
83 A wrapper for usleep in case we don't have one.
84 ********************************************************************/
86 int sys_usleep(long usecs)
93 * We need this braindamage as the glibc usleep
94 * is not SPEC1170 complient... grumble... JRA.
97 if(usecs < 0 || usecs > 1000000) {
105 #else /* HAVE_USLEEP */
107 * Fake it with select...
110 tval.tv_usec = usecs/1000;
111 select(0,NULL,NULL,NULL,&tval);
113 #endif /* HAVE_USLEEP */
116 /*******************************************************************
117 A read wrapper that will deal with EINTR.
118 ********************************************************************/
120 ssize_t sys_read(int fd, void *buf, size_t count)
125 ret = read(fd, buf, count);
126 } while (ret == -1 && errno == EINTR);
130 /*******************************************************************
131 A write wrapper that will deal with EINTR.
132 ********************************************************************/
134 ssize_t sys_write(int fd, const void *buf, size_t count)
139 ret = write(fd, buf, count);
140 } while (ret == -1 && errno == EINTR);
144 /*******************************************************************
145 A pread wrapper that will deal with EINTR and 64-bit file offsets.
146 ********************************************************************/
148 #if defined(HAVE_PREAD) || defined(HAVE_PREAD64)
149 ssize_t sys_pread(int fd, void *buf, size_t count, SMB_OFF_T off)
154 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_PREAD64)
155 ret = pread64(fd, buf, count, off);
157 ret = pread(fd, buf, count, off);
159 } while (ret == -1 && errno == EINTR);
164 /*******************************************************************
165 A write wrapper that will deal with EINTR and 64-bit file offsets.
166 ********************************************************************/
168 #if defined(HAVE_PWRITE) || defined(HAVE_PWRITE64)
169 ssize_t sys_pwrite(int fd, const void *buf, size_t count, SMB_OFF_T off)
174 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_PWRITE64)
175 ret = pwrite64(fd, buf, count, off);
177 ret = pwrite(fd, buf, count, off);
179 } while (ret == -1 && errno == EINTR);
184 /*******************************************************************
185 A send wrapper that will deal with EINTR.
186 ********************************************************************/
188 ssize_t sys_send(int s, const void *msg, size_t len, int flags)
193 ret = send(s, msg, len, flags);
194 } while (ret == -1 && errno == EINTR);
198 /*******************************************************************
199 A sendto wrapper that will deal with EINTR.
200 ********************************************************************/
202 ssize_t sys_sendto(int s, const void *msg, size_t len, int flags, const struct sockaddr *to, socklen_t tolen)
207 ret = sendto(s, msg, len, flags, to, tolen);
208 } while (ret == -1 && errno == EINTR);
212 /*******************************************************************
213 A recv wrapper that will deal with EINTR.
214 ********************************************************************/
216 ssize_t sys_recv(int fd, void *buf, size_t count, int flags)
221 ret = recv(fd, buf, count, flags);
222 } while (ret == -1 && errno == EINTR);
226 /*******************************************************************
227 A recvfrom wrapper that will deal with EINTR.
228 ********************************************************************/
230 ssize_t sys_recvfrom(int s, void *buf, size_t len, int flags, struct sockaddr *from, socklen_t *fromlen)
235 ret = recvfrom(s, buf, len, flags, from, fromlen);
236 } while (ret == -1 && errno == EINTR);
240 /*******************************************************************
241 A fcntl wrapper that will deal with EINTR.
242 ********************************************************************/
244 int sys_fcntl_ptr(int fd, int cmd, void *arg)
249 ret = fcntl(fd, cmd, arg);
250 } while (ret == -1 && errno == EINTR);
254 /*******************************************************************
255 A fcntl wrapper that will deal with EINTR.
256 ********************************************************************/
258 int sys_fcntl_long(int fd, int cmd, long arg)
263 ret = fcntl(fd, cmd, arg);
264 } while (ret == -1 && errno == EINTR);
268 /*******************************************************************
269 A stat() wrapper that will deal with 64 bit filesizes.
270 ********************************************************************/
272 int sys_stat(const char *fname,SMB_STRUCT_STAT *sbuf)
275 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_STAT64)
276 ret = stat64(fname, sbuf);
278 ret = stat(fname, sbuf);
280 /* we always want directories to appear zero size */
281 if (ret == 0 && S_ISDIR(sbuf->st_mode)) sbuf->st_size = 0;
285 /*******************************************************************
286 An fstat() wrapper that will deal with 64 bit filesizes.
287 ********************************************************************/
289 int sys_fstat(int fd,SMB_STRUCT_STAT *sbuf)
292 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_FSTAT64)
293 ret = fstat64(fd, sbuf);
295 ret = fstat(fd, sbuf);
297 /* we always want directories to appear zero size */
298 if (ret == 0 && S_ISDIR(sbuf->st_mode)) sbuf->st_size = 0;
302 /*******************************************************************
303 An lstat() wrapper that will deal with 64 bit filesizes.
304 ********************************************************************/
306 int sys_lstat(const char *fname,SMB_STRUCT_STAT *sbuf)
309 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_LSTAT64)
310 ret = lstat64(fname, sbuf);
312 ret = lstat(fname, sbuf);
314 /* we always want directories to appear zero size */
315 if (ret == 0 && S_ISDIR(sbuf->st_mode)) sbuf->st_size = 0;
319 /*******************************************************************
320 An ftruncate() wrapper that will deal with 64 bit filesizes.
321 ********************************************************************/
323 int sys_ftruncate(int fd, SMB_OFF_T offset)
325 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_FTRUNCATE64)
326 return ftruncate64(fd, offset);
328 return ftruncate(fd, offset);
332 /*******************************************************************
333 An lseek() wrapper that will deal with 64 bit filesizes.
334 ********************************************************************/
336 SMB_OFF_T sys_lseek(int fd, SMB_OFF_T offset, int whence)
338 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OFF64_T) && defined(HAVE_LSEEK64)
339 return lseek64(fd, offset, whence);
341 return lseek(fd, offset, whence);
345 /*******************************************************************
346 An fseek() wrapper that will deal with 64 bit filesizes.
347 ********************************************************************/
349 int sys_fseek(FILE *fp, SMB_OFF_T offset, int whence)
351 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(LARGE_SMB_OFF_T) && defined(HAVE_FSEEK64)
352 return fseek64(fp, offset, whence);
353 #elif defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(LARGE_SMB_OFF_T) && defined(HAVE_FSEEKO64)
354 return fseeko64(fp, offset, whence);
356 return fseek(fp, offset, whence);
360 /*******************************************************************
361 An ftell() wrapper that will deal with 64 bit filesizes.
362 ********************************************************************/
364 SMB_OFF_T sys_ftell(FILE *fp)
366 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(LARGE_SMB_OFF_T) && defined(HAVE_FTELL64)
367 return (SMB_OFF_T)ftell64(fp);
368 #elif defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(LARGE_SMB_OFF_T) && defined(HAVE_FTELLO64)
369 return (SMB_OFF_T)ftello64(fp);
371 return (SMB_OFF_T)ftell(fp);
375 /*******************************************************************
376 A creat() wrapper that will deal with 64 bit filesizes.
377 ********************************************************************/
379 int sys_creat(const char *path, mode_t mode)
381 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_CREAT64)
382 return creat64(path, mode);
385 * If creat64 isn't defined then ensure we call a potential open64.
388 return sys_open(path, O_WRONLY | O_CREAT | O_TRUNC, mode);
392 /*******************************************************************
393 An open() wrapper that will deal with 64 bit filesizes.
394 ********************************************************************/
396 int sys_open(const char *path, int oflag, mode_t mode)
398 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OPEN64)
399 return open64(path, oflag, mode);
401 return open(path, oflag, mode);
405 /*******************************************************************
406 An fopen() wrapper that will deal with 64 bit filesizes.
407 ********************************************************************/
409 FILE *sys_fopen(const char *path, const char *type)
411 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_FOPEN64)
412 return fopen64(path, type);
414 return fopen(path, type);
419 /*******************************************************************
420 A flock() wrapper that will perform the kernel flock.
421 ********************************************************************/
423 void kernel_flock(int fd, uint32 share_mode)
425 #if HAVE_KERNEL_SHARE_MODES
427 if (share_mode == FILE_SHARE_WRITE) {
428 kernel_mode = LOCK_MAND|LOCK_WRITE;
429 } else if (share_mode == FILE_SHARE_READ) {
430 kernel_mode = LOCK_MAND|LOCK_READ;
431 } else if (share_mode == FILE_SHARE_NONE) {
432 kernel_mode = LOCK_MAND;
435 flock(fd, kernel_mode);
443 /*******************************************************************
444 An opendir wrapper that will deal with 64 bit filesizes.
445 ********************************************************************/
447 SMB_STRUCT_DIR *sys_opendir(const char *name)
449 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_OPENDIR64)
450 return opendir64(name);
452 return opendir(name);
456 /*******************************************************************
457 A readdir wrapper that will deal with 64 bit filesizes.
458 ********************************************************************/
460 SMB_STRUCT_DIRENT *sys_readdir(SMB_STRUCT_DIR *dirp)
462 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_READDIR64)
463 return readdir64(dirp);
465 return readdir(dirp);
469 /*******************************************************************
470 A seekdir wrapper that will deal with 64 bit filesizes.
471 ********************************************************************/
473 void sys_seekdir(SMB_STRUCT_DIR *dirp, long offset)
475 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_SEEKDIR64)
476 seekdir64(dirp, offset);
478 seekdir(dirp, offset);
482 /*******************************************************************
483 A telldir wrapper that will deal with 64 bit filesizes.
484 ********************************************************************/
486 long sys_telldir(SMB_STRUCT_DIR *dirp)
488 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_TELLDIR64)
489 return (long)telldir64(dirp);
491 return (long)telldir(dirp);
495 /*******************************************************************
496 A rewinddir wrapper that will deal with 64 bit filesizes.
497 ********************************************************************/
499 void sys_rewinddir(SMB_STRUCT_DIR *dirp)
501 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_REWINDDIR64)
508 /*******************************************************************
509 A close wrapper that will deal with 64 bit filesizes.
510 ********************************************************************/
512 int sys_closedir(SMB_STRUCT_DIR *dirp)
514 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_CLOSEDIR64)
515 return closedir64(dirp);
517 return closedir(dirp);
521 /*******************************************************************
522 An mknod() wrapper that will deal with 64 bit filesizes.
523 ********************************************************************/
525 int sys_mknod(const char *path, mode_t mode, SMB_DEV_T dev)
527 #if defined(HAVE_MKNOD) || defined(HAVE_MKNOD64)
528 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_MKNOD64) && defined(HAVE_DEV64_T)
529 return mknod64(path, mode, dev);
531 return mknod(path, mode, dev);
534 /* No mknod system call. */
540 /*******************************************************************
541 Wrapper for realpath.
542 ********************************************************************/
544 char *sys_realpath(const char *path, char *resolved_path)
546 #if defined(HAVE_REALPATH)
547 return realpath(path, resolved_path);
549 /* As realpath is not a system call we can't return ENOSYS. */
555 /*******************************************************************
556 The wait() calls vary between systems
557 ********************************************************************/
559 int sys_waitpid(pid_t pid,int *status,int options)
562 return waitpid(pid,status,options);
563 #else /* HAVE_WAITPID */
564 return wait4(pid, status, options, NULL);
565 #endif /* HAVE_WAITPID */
568 /*******************************************************************
569 System wrapper for getwd
570 ********************************************************************/
572 char *sys_getwd(char *s)
576 wd = (char *)getcwd(s, PATH_MAX);
578 wd = (char *)getwd(s);
583 /*******************************************************************
584 system wrapper for symlink
585 ********************************************************************/
587 int sys_symlink(const char *oldpath, const char *newpath)
593 return symlink(oldpath, newpath);
597 /*******************************************************************
598 system wrapper for readlink
599 ********************************************************************/
601 int sys_readlink(const char *path, char *buf, size_t bufsiz)
603 #ifndef HAVE_READLINK
607 return readlink(path, buf, bufsiz);
611 /*******************************************************************
612 system wrapper for link
613 ********************************************************************/
615 int sys_link(const char *oldpath, const char *newpath)
621 return link(oldpath, newpath);
625 /*******************************************************************
627 ********************************************************************/
629 int sys_lchown(const char *fname,uid_t uid,gid_t gid)
634 DEBUG(1,("WARNING: no lchown!\n"));
640 return(lchown(fname,uid,gid));
644 /*******************************************************************
645 os/2 also doesn't have chroot
646 ********************************************************************/
647 int sys_chroot(const char *dname)
652 DEBUG(1,("WARNING: no chroot!\n"));
658 return(chroot(dname));
662 #if defined(HAVE_POSIX_CAPABILITIES)
664 /**************************************************************************
665 Try and abstract process capabilities (for systems that have them).
666 ****************************************************************************/
668 /* Set the POSIX capabilities needed for the given purpose into the effective
669 * capability set of the current process. Make sure they are always removed
670 * from the inheritable set, because there is no circumstance in which our
671 * children should inherit our elevated privileges.
673 static bool set_process_capability(enum smbd_capability capability,
676 cap_value_t cap_vals[2] = {0};
677 int num_cap_vals = 0;
681 #if defined(HAVE_PRCTL) && defined(PR_GET_KEEPCAPS) && defined(PR_SET_KEEPCAPS)
682 /* On Linux, make sure that any capabilities we grab are sticky
683 * across UID changes. We expect that this would allow us to keep both
684 * the effective and permitted capability sets, but as of circa 2.6.16,
685 * only the permitted set is kept. It is a bug (which we work around)
686 * that the effective set is lost, but we still require the effective
689 if (!prctl(PR_GET_KEEPCAPS)) {
690 prctl(PR_SET_KEEPCAPS, 1);
694 cap = cap_get_proc();
696 DEBUG(0,("set_process_capability: cap_get_proc failed: %s\n",
701 switch (capability) {
702 case KERNEL_OPLOCK_CAPABILITY:
703 #ifdef CAP_NETWORK_MGT
704 /* IRIX has CAP_NETWORK_MGT for oplocks. */
705 cap_vals[num_cap_vals++] = CAP_NETWORK_MGT;
708 case DMAPI_ACCESS_CAPABILITY:
709 #ifdef CAP_DEVICE_MGT
710 /* IRIX has CAP_DEVICE_MGT for DMAPI access. */
711 cap_vals[num_cap_vals++] = CAP_DEVICE_MGT;
713 /* Linux has CAP_MKNOD for DMAPI access. */
714 cap_vals[num_cap_vals++] = CAP_MKNOD;
717 case LEASE_CAPABILITY:
719 cap_vals[num_cap_vals++] = CAP_LEASE;
724 SMB_ASSERT(num_cap_vals <= ARRAY_SIZE(cap_vals));
726 if (num_cap_vals == 0) {
731 cap_set_flag(cap, CAP_EFFECTIVE, num_cap_vals, cap_vals,
732 enable ? CAP_SET : CAP_CLEAR);
734 /* We never want to pass capabilities down to our children, so make
735 * sure they are not inherited.
737 cap_set_flag(cap, CAP_INHERITABLE, num_cap_vals, cap_vals, CAP_CLEAR);
739 if (cap_set_proc(cap) == -1) {
740 DEBUG(0, ("set_process_capability: cap_set_proc failed: %s\n",
750 #endif /* HAVE_POSIX_CAPABILITIES */
752 /****************************************************************************
753 Gain the oplock capability from the kernel if possible.
754 ****************************************************************************/
756 void set_effective_capability(enum smbd_capability capability)
758 #if defined(HAVE_POSIX_CAPABILITIES)
759 set_process_capability(capability, True);
760 #endif /* HAVE_POSIX_CAPABILITIES */
763 void drop_effective_capability(enum smbd_capability capability)
765 #if defined(HAVE_POSIX_CAPABILITIES)
766 set_process_capability(capability, False);
767 #endif /* HAVE_POSIX_CAPABILITIES */
770 /**************************************************************************
771 Wrapper for random().
772 ****************************************************************************/
774 long sys_random(void)
776 #if defined(HAVE_RANDOM)
777 return (long)random();
778 #elif defined(HAVE_RAND)
781 DEBUG(0,("Error - no random function available !\n"));
786 /**************************************************************************
787 Wrapper for srandom().
788 ****************************************************************************/
790 void sys_srandom(unsigned int seed)
792 #if defined(HAVE_SRANDOM)
794 #elif defined(HAVE_SRAND)
797 DEBUG(0,("Error - no srandom function available !\n"));
802 /**************************************************************************
803 Returns equivalent to NGROUPS_MAX - using sysconf if needed.
804 ****************************************************************************/
808 #if defined(SYSCONF_SC_NGROUPS_MAX)
809 int ret = sysconf(_SC_NGROUPS_MAX);
810 return (ret == -1) ? NGROUPS_MAX : ret;
816 /**************************************************************************
817 Wrap setgroups and getgroups for systems that declare getgroups() as
818 returning an array of gid_t, but actuall return an array of int.
819 ****************************************************************************/
821 #if defined(HAVE_BROKEN_GETGROUPS)
822 static int sys_broken_getgroups(int setlen, gid_t *gidset)
829 return getgroups(setlen, &gid);
833 * Broken case. We need to allocate a
834 * GID_T array of size setlen.
843 setlen = groups_max();
845 if((group_list = SMB_MALLOC_ARRAY(GID_T, setlen)) == NULL) {
846 DEBUG(0,("sys_getgroups: Malloc fail.\n"));
850 if((ngroups = getgroups(setlen, group_list)) < 0) {
851 int saved_errno = errno;
852 SAFE_FREE(group_list);
857 for(i = 0; i < ngroups; i++)
858 gidset[i] = (gid_t)group_list[i];
860 SAFE_FREE(group_list);
864 static int sys_broken_setgroups(int setlen, gid_t *gidset)
872 if (setlen < 0 || setlen > groups_max()) {
878 * Broken case. We need to allocate a
879 * GID_T array of size setlen.
882 if((group_list = SMB_MALLOC_ARRAY(GID_T, setlen)) == NULL) {
883 DEBUG(0,("sys_setgroups: Malloc fail.\n"));
887 for(i = 0; i < setlen; i++)
888 group_list[i] = (GID_T) gidset[i];
890 if(setgroups(setlen, group_list) != 0) {
891 int saved_errno = errno;
892 SAFE_FREE(group_list);
897 SAFE_FREE(group_list);
901 #endif /* HAVE_BROKEN_GETGROUPS */
903 /* This is a list of systems that require the first GID passed to setgroups(2)
904 * to be the effective GID. If your system is one of these, add it here.
906 #if defined (FREEBSD) || defined (DARWINOS)
907 #define USE_BSD_SETGROUPS
910 #if defined(USE_BSD_SETGROUPS)
911 /* Depending on the particular BSD implementation, the first GID that is
912 * passed to setgroups(2) will either be ignored or will set the credential's
913 * effective GID. In either case, the right thing to do is to guarantee that
914 * gidset[0] is the effective GID.
916 static int sys_bsd_setgroups(gid_t primary_gid, int setlen, const gid_t *gidset)
918 gid_t *new_gidset = NULL;
922 /* setgroups(2) will fail with EINVAL if we pass too many groups. */
925 /* No group list, just make sure we are setting the efective GID. */
927 return setgroups(1, &primary_gid);
930 /* If the primary gid is not the first array element, grow the array
931 * and insert it at the front.
933 if (gidset[0] != primary_gid) {
934 new_gidset = SMB_MALLOC_ARRAY(gid_t, setlen + 1);
935 if (new_gidset == NULL) {
939 memcpy(new_gidset + 1, gidset, (setlen * sizeof(gid_t)));
940 new_gidset[0] = primary_gid;
945 DEBUG(3, ("forced to truncate group list from %d to %d\n",
950 #if defined(HAVE_BROKEN_GETGROUPS)
951 ret = sys_broken_setgroups(setlen, new_gidset ? new_gidset : gidset);
953 ret = setgroups(setlen, new_gidset ? new_gidset : gidset);
958 SAFE_FREE(new_gidset);
965 #endif /* USE_BSD_SETGROUPS */
967 /**************************************************************************
968 Wrapper for getgroups. Deals with broken (int) case.
969 ****************************************************************************/
971 int sys_getgroups(int setlen, gid_t *gidset)
973 #if defined(HAVE_BROKEN_GETGROUPS)
974 return sys_broken_getgroups(setlen, gidset);
976 return getgroups(setlen, gidset);
980 /**************************************************************************
981 Wrapper for setgroups. Deals with broken (int) case and BSD case.
982 ****************************************************************************/
984 int sys_setgroups(gid_t UNUSED(primary_gid), int setlen, gid_t *gidset)
986 #if !defined(HAVE_SETGROUPS)
989 #endif /* HAVE_SETGROUPS */
991 #if defined(USE_BSD_SETGROUPS)
992 return sys_bsd_setgroups(primary_gid, setlen, gidset);
993 #elif defined(HAVE_BROKEN_GETGROUPS)
994 return sys_broken_setgroups(setlen, gidset);
996 return setgroups(setlen, gidset);
1000 /**************************************************************************
1001 Wrappers for setpwent(), getpwent() and endpwent()
1002 ****************************************************************************/
1004 void sys_setpwent(void)
1009 struct passwd *sys_getpwent(void)
1014 void sys_endpwent(void)
1019 /**************************************************************************
1020 Wrappers for getpwnam(), getpwuid(), getgrnam(), getgrgid()
1021 ****************************************************************************/
1024 struct passwd *sys_getpwnam(const char *name)
1026 return getpwnam(name);
1029 struct passwd *sys_getpwuid(uid_t uid)
1031 return getpwuid(uid);
1034 struct group *sys_getgrnam(const char *name)
1036 return getgrnam(name);
1039 struct group *sys_getgrgid(gid_t gid)
1041 return getgrgid(gid);
1044 /**************************************************************************
1045 Extract a command into an arg list.
1046 ****************************************************************************/
1048 static char **extract_args(TALLOC_CTX *mem_ctx, const char *command)
1057 if (!(trunc_cmd = talloc_strdup(mem_ctx, command))) {
1058 DEBUG(0, ("talloc failed\n"));
1062 if(!(ptr = strtok_r(trunc_cmd, " \t", &saveptr))) {
1063 TALLOC_FREE(trunc_cmd);
1072 for( argcl = 1; ptr; ptr = strtok_r(NULL, " \t", &saveptr))
1075 TALLOC_FREE(trunc_cmd);
1077 if (!(argl = TALLOC_ARRAY(mem_ctx, char *, argcl + 1))) {
1082 * Now do the extraction.
1085 if (!(trunc_cmd = talloc_strdup(mem_ctx, command))) {
1089 ptr = strtok_r(trunc_cmd, " \t", &saveptr);
1092 if (!(argl[i++] = talloc_strdup(argl, ptr))) {
1096 while((ptr = strtok_r(NULL, " \t", &saveptr)) != NULL) {
1098 if (!(argl[i++] = talloc_strdup(argl, ptr))) {
1107 DEBUG(0, ("talloc failed\n"));
1108 TALLOC_FREE(trunc_cmd);
1114 /**************************************************************************
1115 Wrapper for fork. Ensures that mypid is reset. Used so we can write
1116 a sys_getpid() that only does a system call *once*.
1117 ****************************************************************************/
1119 static pid_t mypid = (pid_t)-1;
1121 pid_t sys_fork(void)
1123 pid_t forkret = fork();
1125 if (forkret == (pid_t)0) /* Child - reset mypid so sys_getpid does a system call. */
1131 /**************************************************************************
1132 Wrapper for getpid. Ensures we only do a system call *once*.
1133 ****************************************************************************/
1135 pid_t sys_getpid(void)
1137 if (mypid == (pid_t)-1)
1143 /**************************************************************************
1144 Wrapper for popen. Safer as it doesn't search a path.
1145 Modified from the glibc sources.
1146 modified by tridge to return a file descriptor. We must kick our FILE* habit
1147 ****************************************************************************/
1149 typedef struct _popen_list
1153 struct _popen_list *next;
1156 static popen_list *popen_chain;
1158 int sys_popen(const char *command)
1160 int parent_end, child_end;
1162 popen_list *entry = NULL;
1165 if (pipe(pipe_fds) < 0)
1168 parent_end = pipe_fds[0];
1169 child_end = pipe_fds[1];
1176 if((entry = SMB_MALLOC_P(popen_list)) == NULL)
1179 ZERO_STRUCTP(entry);
1182 * Extract the command and args into a NULL terminated array.
1185 if(!(argl = extract_args(NULL, command)))
1188 entry->child_pid = sys_fork();
1190 if (entry->child_pid == -1) {
1194 if (entry->child_pid == 0) {
1200 int child_std_end = STDOUT_FILENO;
1204 if (child_end != child_std_end) {
1205 dup2 (child_end, child_std_end);
1210 * POSIX.2: "popen() shall ensure that any streams from previous
1211 * popen() calls that remain open in the parent process are closed
1212 * in the new child process."
1215 for (p = popen_chain; p; p = p->next)
1218 execv(argl[0], argl);
1229 /* Link into popen_chain. */
1230 entry->next = popen_chain;
1231 popen_chain = entry;
1232 entry->fd = parent_end;
1245 /**************************************************************************
1246 Wrapper for pclose. Modified from the glibc sources.
1247 ****************************************************************************/
1249 int sys_pclose(int fd)
1252 popen_list **ptr = &popen_chain;
1253 popen_list *entry = NULL;
1257 /* Unlink from popen_chain. */
1258 for ( ; *ptr != NULL; ptr = &(*ptr)->next) {
1259 if ((*ptr)->fd == fd) {
1261 *ptr = (*ptr)->next;
1267 if (status < 0 || close(entry->fd) < 0)
1271 * As Samba is catching and eating child process
1272 * exits we don't really care about the child exit
1273 * code, a -1 with errno = ECHILD will do fine for us.
1277 wait_pid = sys_waitpid (entry->child_pid, &wstatus, 0);
1278 } while (wait_pid == -1 && errno == EINTR);
1287 /**************************************************************************
1288 Wrappers for dlopen, dlsym, dlclose.
1289 ****************************************************************************/
1291 void *sys_dlopen(const char *name, int flags)
1293 #if defined(HAVE_DLOPEN)
1294 return dlopen(name, flags);
1300 void *sys_dlsym(void *handle, const char *symbol)
1302 #if defined(HAVE_DLSYM)
1303 return dlsym(handle, symbol);
1309 int sys_dlclose (void *handle)
1311 #if defined(HAVE_DLCLOSE)
1312 return dlclose(handle);
1318 const char *sys_dlerror(void)
1320 #if defined(HAVE_DLERROR)
1327 int sys_dup2(int oldfd, int newfd)
1329 #if defined(HAVE_DUP2)
1330 return dup2(oldfd, newfd);
1337 /**************************************************************************
1338 Wrapper for Admin Logs.
1339 ****************************************************************************/
1341 void sys_adminlog(int priority, const char *format_str, ...)
1345 char *msgbuf = NULL;
1347 va_start( ap, format_str );
1348 ret = vasprintf( &msgbuf, format_str, ap );
1354 #if defined(HAVE_SYSLOG)
1355 syslog( priority, "%s", msgbuf );
1357 DEBUG(0,("%s", msgbuf ));
1362 /******** Solaris EA helper function prototypes ********/
1363 #ifdef HAVE_ATTROPEN
1364 #define SOLARIS_ATTRMODE S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP
1365 static int solaris_write_xattr(int attrfd, const char *value, size_t size);
1366 static ssize_t solaris_read_xattr(int attrfd, void *value, size_t size);
1367 static ssize_t solaris_list_xattr(int attrdirfd, char *list, size_t size);
1368 static int solaris_unlinkat(int attrdirfd, const char *name);
1369 static int solaris_attropen(const char *path, const char *attrpath, int oflag, mode_t mode);
1370 static int solaris_openat(int fildes, const char *path, int oflag, mode_t mode);
1373 /**************************************************************************
1374 Wrappers for extented attribute calls. Based on the Linux package with
1375 support for IRIX and (Net|Free)BSD also. Expand as other systems have them.
1376 ****************************************************************************/
1378 ssize_t sys_getxattr (const char *path, const char *name, void *value, size_t size)
1380 #if defined(HAVE_GETXATTR)
1381 #ifndef XATTR_ADD_OPT
1382 return getxattr(path, name, value, size);
1385 return getxattr(path, name, value, size, 0, options);
1387 #elif defined(HAVE_GETEA)
1388 return getea(path, name, value, size);
1389 #elif defined(HAVE_EXTATTR_GET_FILE)
1392 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1393 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1394 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1396 * The BSD implementation has a nasty habit of silently truncating
1397 * the returned value to the size of the buffer, so we have to check
1398 * that the buffer is large enough to fit the returned value.
1400 if((retval=extattr_get_file(path, attrnamespace, attrname, NULL, 0)) >= 0) {
1405 if((retval=extattr_get_file(path, attrnamespace, attrname, value, size)) >= 0)
1409 DEBUG(10,("sys_getxattr: extattr_get_file() failed with: %s\n", strerror(errno)));
1411 #elif defined(HAVE_ATTR_GET)
1412 int retval, flags = 0;
1413 int valuelength = (int)size;
1414 char *attrname = strchr(name,'.') + 1;
1416 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1418 retval = attr_get(path, attrname, (char *)value, &valuelength, flags);
1420 return retval ? retval : valuelength;
1421 #elif defined(HAVE_ATTROPEN)
1423 int attrfd = solaris_attropen(path, name, O_RDONLY, 0);
1425 ret = solaris_read_xattr(attrfd, value, size);
1435 ssize_t sys_lgetxattr (const char *path, const char *name, void *value, size_t size)
1437 #if defined(HAVE_LGETXATTR)
1438 return lgetxattr(path, name, value, size);
1439 #elif defined(HAVE_GETXATTR) && defined(XATTR_ADD_OPT)
1440 int options = XATTR_NOFOLLOW;
1441 return getxattr(path, name, value, size, 0, options);
1442 #elif defined(HAVE_LGETEA)
1443 return lgetea(path, name, value, size);
1444 #elif defined(HAVE_EXTATTR_GET_LINK)
1447 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1448 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1449 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1451 if((retval=extattr_get_link(path, attrnamespace, attrname, NULL, 0)) >= 0) {
1456 if((retval=extattr_get_link(path, attrnamespace, attrname, value, size)) >= 0)
1460 DEBUG(10,("sys_lgetxattr: extattr_get_link() failed with: %s\n", strerror(errno)));
1462 #elif defined(HAVE_ATTR_GET)
1463 int retval, flags = ATTR_DONTFOLLOW;
1464 int valuelength = (int)size;
1465 char *attrname = strchr(name,'.') + 1;
1467 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1469 retval = attr_get(path, attrname, (char *)value, &valuelength, flags);
1471 return retval ? retval : valuelength;
1472 #elif defined(HAVE_ATTROPEN)
1474 int attrfd = solaris_attropen(path, name, O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1476 ret = solaris_read_xattr(attrfd, value, size);
1486 ssize_t sys_fgetxattr (int filedes, const char *name, void *value, size_t size)
1488 #if defined(HAVE_FGETXATTR)
1489 #ifndef XATTR_ADD_OPT
1490 return fgetxattr(filedes, name, value, size);
1493 return fgetxattr(filedes, name, value, size, 0, options);
1495 #elif defined(HAVE_FGETEA)
1496 return fgetea(filedes, name, value, size);
1497 #elif defined(HAVE_EXTATTR_GET_FD)
1500 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1501 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1502 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1504 if((retval=extattr_get_fd(filedes, attrnamespace, attrname, NULL, 0)) >= 0) {
1509 if((retval=extattr_get_fd(filedes, attrnamespace, attrname, value, size)) >= 0)
1513 DEBUG(10,("sys_fgetxattr: extattr_get_fd() failed with: %s\n", strerror(errno)));
1515 #elif defined(HAVE_ATTR_GETF)
1516 int retval, flags = 0;
1517 int valuelength = (int)size;
1518 char *attrname = strchr(name,'.') + 1;
1520 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1522 retval = attr_getf(filedes, attrname, (char *)value, &valuelength, flags);
1524 return retval ? retval : valuelength;
1525 #elif defined(HAVE_ATTROPEN)
1527 int attrfd = solaris_openat(filedes, name, O_RDONLY|O_XATTR, 0);
1529 ret = solaris_read_xattr(attrfd, value, size);
1539 #if defined(HAVE_EXTATTR_LIST_FILE)
1541 #define EXTATTR_PREFIX(s) (s), (sizeof((s))-1)
1549 { EXTATTR_NAMESPACE_SYSTEM, EXTATTR_PREFIX("system.") },
1550 { EXTATTR_NAMESPACE_USER, EXTATTR_PREFIX("user.") },
1558 static ssize_t bsd_attr_list (int type, extattr_arg arg, char *list, size_t size)
1560 ssize_t list_size, total_size = 0;
1563 /* Iterate through extattr(2) namespaces */
1564 for(t = 0; t < (sizeof(extattr)/sizeof(extattr[0])); t++) {
1566 #if defined(HAVE_EXTATTR_LIST_FILE)
1568 list_size = extattr_list_file(arg.path, extattr[t].space, list, size);
1571 #if defined(HAVE_EXTATTR_LIST_LINK)
1573 list_size = extattr_list_link(arg.path, extattr[t].space, list, size);
1576 #if defined(HAVE_EXTATTR_LIST_FD)
1578 list_size = extattr_list_fd(arg.filedes, extattr[t].space, list, size);
1585 /* Some error happend. Errno should be set by the previous call */
1591 /* XXX: Call with an empty buffer may be used to calculate
1592 necessary buffer size. Unfortunately, we can't say, how
1593 many attributes were returned, so here is the potential
1594 problem with the emulation.
1597 /* Take the worse case of one char attribute names -
1598 two bytes per name plus one more for sanity.
1600 total_size += list_size + (list_size/2 + 1)*extattr[t].len;
1603 /* Count necessary offset to fit namespace prefixes */
1605 for(i = 0; i < list_size; i += list[i] + 1)
1606 len += extattr[t].len;
1608 total_size += list_size + len;
1609 /* Buffer is too small to fit the results */
1610 if(total_size > size) {
1614 /* Shift results back, so we can prepend prefixes */
1615 buf = memmove(list + len, list, list_size);
1617 for(i = 0; i < list_size; i += len + 1) {
1619 strncpy(list, extattr[t].name, extattr[t].len + 1);
1620 list += extattr[t].len;
1621 strncpy(list, buf + i + 1, len);
1632 #if defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1633 static char attr_buffer[ATTR_MAX_VALUELEN];
1635 static ssize_t irix_attr_list(const char *path, int filedes, char *list, size_t size, int flags)
1637 int retval = 0, index;
1638 attrlist_cursor_t *cursor = 0;
1640 attrlist_t * al = (attrlist_t *)attr_buffer;
1642 size_t ent_size, left = size;
1647 retval = attr_listf(filedes, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1649 retval = attr_list(path, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1651 for (index = 0; index < al->al_count; index++) {
1652 ae = ATTR_ENTRY(attr_buffer, index);
1653 ent_size = strlen(ae->a_name) + sizeof("user.");
1654 if (left >= ent_size) {
1655 strncpy(bp, "user.", sizeof("user."));
1656 strncat(bp, ae->a_name, ent_size - sizeof("user."));
1664 total_size += ent_size;
1666 if (al->al_more == 0) break;
1673 retval = attr_listf(filedes, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1675 retval = attr_list(path, attr_buffer, ATTR_MAX_VALUELEN, flags, cursor);
1677 for (index = 0; index < al->al_count; index++) {
1678 ae = ATTR_ENTRY(attr_buffer, index);
1679 ent_size = strlen(ae->a_name) + sizeof("system.");
1680 if (left >= ent_size) {
1681 strncpy(bp, "system.", sizeof("system."));
1682 strncat(bp, ae->a_name, ent_size - sizeof("system."));
1690 total_size += ent_size;
1692 if (al->al_more == 0) break;
1695 return (ssize_t)(retval ? retval : total_size);
1700 ssize_t sys_listxattr (const char *path, char *list, size_t size)
1702 #if defined(HAVE_LISTXATTR)
1703 #ifndef XATTR_ADD_OPT
1704 return listxattr(path, list, size);
1707 return listxattr(path, list, size, options);
1709 #elif defined(HAVE_LISTEA)
1710 return listea(path, list, size);
1711 #elif defined(HAVE_EXTATTR_LIST_FILE)
1714 return bsd_attr_list(0, arg, list, size);
1715 #elif defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1716 return irix_attr_list(path, 0, list, size, 0);
1717 #elif defined(HAVE_ATTROPEN)
1719 int attrdirfd = solaris_attropen(path, ".", O_RDONLY, 0);
1720 if (attrdirfd >= 0) {
1721 ret = solaris_list_xattr(attrdirfd, list, size);
1731 ssize_t sys_llistxattr (const char *path, char *list, size_t size)
1733 #if defined(HAVE_LLISTXATTR)
1734 return llistxattr(path, list, size);
1735 #elif defined(HAVE_LISTXATTR) && defined(XATTR_ADD_OPT)
1736 int options = XATTR_NOFOLLOW;
1737 return listxattr(path, list, size, options);
1738 #elif defined(HAVE_LLISTEA)
1739 return llistea(path, list, size);
1740 #elif defined(HAVE_EXTATTR_LIST_LINK)
1743 return bsd_attr_list(1, arg, list, size);
1744 #elif defined(HAVE_ATTR_LIST) && defined(HAVE_SYS_ATTRIBUTES_H)
1745 return irix_attr_list(path, 0, list, size, ATTR_DONTFOLLOW);
1746 #elif defined(HAVE_ATTROPEN)
1748 int attrdirfd = solaris_attropen(path, ".", O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1749 if (attrdirfd >= 0) {
1750 ret = solaris_list_xattr(attrdirfd, list, size);
1760 ssize_t sys_flistxattr (int filedes, char *list, size_t size)
1762 #if defined(HAVE_FLISTXATTR)
1763 #ifndef XATTR_ADD_OPT
1764 return flistxattr(filedes, list, size);
1767 return flistxattr(filedes, list, size, options);
1769 #elif defined(HAVE_FLISTEA)
1770 return flistea(filedes, list, size);
1771 #elif defined(HAVE_EXTATTR_LIST_FD)
1773 arg.filedes = filedes;
1774 return bsd_attr_list(2, arg, list, size);
1775 #elif defined(HAVE_ATTR_LISTF)
1776 return irix_attr_list(NULL, filedes, list, size, 0);
1777 #elif defined(HAVE_ATTROPEN)
1779 int attrdirfd = solaris_openat(filedes, ".", O_RDONLY|O_XATTR, 0);
1780 if (attrdirfd >= 0) {
1781 ret = solaris_list_xattr(attrdirfd, list, size);
1791 int sys_removexattr (const char *path, const char *name)
1793 #if defined(HAVE_REMOVEXATTR)
1794 #ifndef XATTR_ADD_OPT
1795 return removexattr(path, name);
1798 return removexattr(path, name, options);
1800 #elif defined(HAVE_REMOVEEA)
1801 return removeea(path, name);
1802 #elif defined(HAVE_EXTATTR_DELETE_FILE)
1804 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1805 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1806 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1808 return extattr_delete_file(path, attrnamespace, attrname);
1809 #elif defined(HAVE_ATTR_REMOVE)
1811 char *attrname = strchr(name,'.') + 1;
1813 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1815 return attr_remove(path, attrname, flags);
1816 #elif defined(HAVE_ATTROPEN)
1818 int attrdirfd = solaris_attropen(path, ".", O_RDONLY, 0);
1819 if (attrdirfd >= 0) {
1820 ret = solaris_unlinkat(attrdirfd, name);
1830 int sys_lremovexattr (const char *path, const char *name)
1832 #if defined(HAVE_LREMOVEXATTR)
1833 return lremovexattr(path, name);
1834 #elif defined(HAVE_REMOVEXATTR) && defined(XATTR_ADD_OPT)
1835 int options = XATTR_NOFOLLOW;
1836 return removexattr(path, name, options);
1837 #elif defined(HAVE_LREMOVEEA)
1838 return lremoveea(path, name);
1839 #elif defined(HAVE_EXTATTR_DELETE_LINK)
1841 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1842 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1843 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1845 return extattr_delete_link(path, attrnamespace, attrname);
1846 #elif defined(HAVE_ATTR_REMOVE)
1847 int flags = ATTR_DONTFOLLOW;
1848 char *attrname = strchr(name,'.') + 1;
1850 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1852 return attr_remove(path, attrname, flags);
1853 #elif defined(HAVE_ATTROPEN)
1855 int attrdirfd = solaris_attropen(path, ".", O_RDONLY|AT_SYMLINK_NOFOLLOW, 0);
1856 if (attrdirfd >= 0) {
1857 ret = solaris_unlinkat(attrdirfd, name);
1867 int sys_fremovexattr (int filedes, const char *name)
1869 #if defined(HAVE_FREMOVEXATTR)
1870 #ifndef XATTR_ADD_OPT
1871 return fremovexattr(filedes, name);
1874 return fremovexattr(filedes, name, options);
1876 #elif defined(HAVE_FREMOVEEA)
1877 return fremoveea(filedes, name);
1878 #elif defined(HAVE_EXTATTR_DELETE_FD)
1880 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1881 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1882 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1884 return extattr_delete_fd(filedes, attrnamespace, attrname);
1885 #elif defined(HAVE_ATTR_REMOVEF)
1887 char *attrname = strchr(name,'.') + 1;
1889 if (strncmp(name, "system", 6) == 0) flags |= ATTR_ROOT;
1891 return attr_removef(filedes, attrname, flags);
1892 #elif defined(HAVE_ATTROPEN)
1894 int attrdirfd = solaris_openat(filedes, ".", O_RDONLY|O_XATTR, 0);
1895 if (attrdirfd >= 0) {
1896 ret = solaris_unlinkat(attrdirfd, name);
1906 int sys_setxattr (const char *path, const char *name, const void *value, size_t size, int flags)
1908 #if defined(HAVE_SETXATTR)
1909 #ifndef XATTR_ADD_OPT
1910 return setxattr(path, name, value, size, flags);
1913 return setxattr(path, name, value, size, 0, options);
1915 #elif defined(HAVE_SETEA)
1916 return setea(path, name, value, size, flags);
1917 #elif defined(HAVE_EXTATTR_SET_FILE)
1920 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1921 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1922 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1924 /* Check attribute existence */
1925 retval = extattr_get_file(path, attrnamespace, attrname, NULL, 0);
1927 /* REPLACE attribute, that doesn't exist */
1928 if (flags & XATTR_REPLACE && errno == ENOATTR) {
1932 /* Ignore other errors */
1935 /* CREATE attribute, that already exists */
1936 if (flags & XATTR_CREATE) {
1942 retval = extattr_set_file(path, attrnamespace, attrname, value, size);
1943 return (retval < 0) ? -1 : 0;
1944 #elif defined(HAVE_ATTR_SET)
1946 char *attrname = strchr(name,'.') + 1;
1948 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
1949 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
1950 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
1952 return attr_set(path, attrname, (const char *)value, size, myflags);
1953 #elif defined(HAVE_ATTROPEN)
1955 int myflags = O_RDWR;
1957 if (flags & XATTR_CREATE) myflags |= O_EXCL;
1958 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
1959 attrfd = solaris_attropen(path, name, myflags, (mode_t) SOLARIS_ATTRMODE);
1961 ret = solaris_write_xattr(attrfd, value, size);
1971 int sys_lsetxattr (const char *path, const char *name, const void *value, size_t size, int flags)
1973 #if defined(HAVE_LSETXATTR)
1974 return lsetxattr(path, name, value, size, flags);
1975 #elif defined(HAVE_SETXATTR) && defined(XATTR_ADD_OPT)
1976 int options = XATTR_NOFOLLOW;
1977 return setxattr(path, name, value, size, 0, options);
1978 #elif defined(LSETEA)
1979 return lsetea(path, name, value, size, flags);
1980 #elif defined(HAVE_EXTATTR_SET_LINK)
1983 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
1984 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
1985 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
1987 /* Check attribute existence */
1988 retval = extattr_get_link(path, attrnamespace, attrname, NULL, 0);
1990 /* REPLACE attribute, that doesn't exist */
1991 if (flags & XATTR_REPLACE && errno == ENOATTR) {
1995 /* Ignore other errors */
1998 /* CREATE attribute, that already exists */
1999 if (flags & XATTR_CREATE) {
2006 retval = extattr_set_link(path, attrnamespace, attrname, value, size);
2007 return (retval < 0) ? -1 : 0;
2008 #elif defined(HAVE_ATTR_SET)
2009 int myflags = ATTR_DONTFOLLOW;
2010 char *attrname = strchr(name,'.') + 1;
2012 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
2013 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
2014 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
2016 return attr_set(path, attrname, (const char *)value, size, myflags);
2017 #elif defined(HAVE_ATTROPEN)
2019 int myflags = O_RDWR | AT_SYMLINK_NOFOLLOW;
2021 if (flags & XATTR_CREATE) myflags |= O_EXCL;
2022 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
2023 attrfd = solaris_attropen(path, name, myflags, (mode_t) SOLARIS_ATTRMODE);
2025 ret = solaris_write_xattr(attrfd, value, size);
2035 int sys_fsetxattr (int filedes, const char *name, const void *value, size_t size, int flags)
2037 #if defined(HAVE_FSETXATTR)
2038 #ifndef XATTR_ADD_OPT
2039 return fsetxattr(filedes, name, value, size, flags);
2042 return fsetxattr(filedes, name, value, size, 0, options);
2044 #elif defined(HAVE_FSETEA)
2045 return fsetea(filedes, name, value, size, flags);
2046 #elif defined(HAVE_EXTATTR_SET_FD)
2049 int attrnamespace = (strncmp(name, "system", 6) == 0) ?
2050 EXTATTR_NAMESPACE_SYSTEM : EXTATTR_NAMESPACE_USER;
2051 const char *attrname = ((s=strchr_m(name, '.')) == NULL) ? name : s + 1;
2053 /* Check attribute existence */
2054 retval = extattr_get_fd(filedes, attrnamespace, attrname, NULL, 0);
2056 /* REPLACE attribute, that doesn't exist */
2057 if (flags & XATTR_REPLACE && errno == ENOATTR) {
2061 /* Ignore other errors */
2064 /* CREATE attribute, that already exists */
2065 if (flags & XATTR_CREATE) {
2071 retval = extattr_set_fd(filedes, attrnamespace, attrname, value, size);
2072 return (retval < 0) ? -1 : 0;
2073 #elif defined(HAVE_ATTR_SETF)
2075 char *attrname = strchr(name,'.') + 1;
2077 if (strncmp(name, "system", 6) == 0) myflags |= ATTR_ROOT;
2078 if (flags & XATTR_CREATE) myflags |= ATTR_CREATE;
2079 if (flags & XATTR_REPLACE) myflags |= ATTR_REPLACE;
2081 return attr_setf(filedes, attrname, (const char *)value, size, myflags);
2082 #elif defined(HAVE_ATTROPEN)
2084 int myflags = O_RDWR | O_XATTR;
2086 if (flags & XATTR_CREATE) myflags |= O_EXCL;
2087 if (!(flags & XATTR_REPLACE)) myflags |= O_CREAT;
2088 attrfd = solaris_openat(filedes, name, myflags, (mode_t) SOLARIS_ATTRMODE);
2090 ret = solaris_write_xattr(attrfd, value, size);
2100 /**************************************************************************
2101 helper functions for Solaris' EA support
2102 ****************************************************************************/
2103 #ifdef HAVE_ATTROPEN
2104 static ssize_t solaris_read_xattr(int attrfd, void *value, size_t size)
2108 if (fstat(attrfd, &sbuf) == -1) {
2113 /* This is to return the current size of the named extended attribute */
2115 return sbuf.st_size;
2118 /* check size and read xattr */
2119 if (sbuf.st_size > size) {
2124 return read(attrfd, value, sbuf.st_size);
2127 static ssize_t solaris_list_xattr(int attrdirfd, char *list, size_t size)
2133 int newfd = dup(attrdirfd);
2134 /* CAUTION: The originating file descriptor should not be
2135 used again following the call to fdopendir().
2136 For that reason we dup() the file descriptor
2137 here to make things more clear. */
2138 dirp = fdopendir(newfd);
2140 while ((de = readdir(dirp))) {
2141 size_t listlen = strlen(de->d_name);
2142 if (!strcmp(de->d_name, ".") || !strcmp(de->d_name, "..")) {
2143 /* we don't want "." and ".." here: */
2144 DEBUG(10,("skipped EA %s\n",de->d_name));
2149 /* return the current size of the list of extended attribute names*/
2152 /* check size and copy entrieѕ + nul into list. */
2153 if ((len + listlen + 1) > size) {
2158 safe_strcpy(list + len, de->d_name, listlen);
2166 if (closedir(dirp) == -1) {
2167 DEBUG(0,("closedir dirp failed: %s\n",strerror(errno)));
2173 static int solaris_unlinkat(int attrdirfd, const char *name)
2175 if (unlinkat(attrdirfd, name, 0) == -1) {
2176 if (errno == ENOENT) {
2184 static int solaris_attropen(const char *path, const char *attrpath, int oflag, mode_t mode)
2186 int filedes = attropen(path, attrpath, oflag, mode);
2187 if (filedes == -1) {
2188 DEBUG(10,("attropen FAILED: path: %s, name: %s, errno: %s\n",path,attrpath,strerror(errno)));
2189 if (errno == EINVAL) {
2198 static int solaris_openat(int fildes, const char *path, int oflag, mode_t mode)
2200 int filedes = openat(fildes, path, oflag, mode);
2201 if (filedes == -1) {
2202 DEBUG(10,("openat FAILED: fd: %s, path: %s, errno: %s\n",filedes,path,strerror(errno)));
2203 if (errno == EINVAL) {
2212 static int solaris_write_xattr(int attrfd, const char *value, size_t size)
2214 if ((ftruncate(attrfd, 0) == 0) && (write(attrfd, value, size) == size)) {
2217 DEBUG(10,("solaris_write_xattr FAILED!\n"));
2221 #endif /*HAVE_ATTROPEN*/
2224 /****************************************************************************
2225 Return the major devicenumber for UNIX extensions.
2226 ****************************************************************************/
2228 uint32 unix_dev_major(SMB_DEV_T dev)
2230 #if defined(HAVE_DEVICE_MAJOR_FN)
2231 return (uint32)major(dev);
2233 return (uint32)(dev >> 8);
2237 /****************************************************************************
2238 Return the minor devicenumber for UNIX extensions.
2239 ****************************************************************************/
2241 uint32 unix_dev_minor(SMB_DEV_T dev)
2243 #if defined(HAVE_DEVICE_MINOR_FN)
2244 return (uint32)minor(dev);
2246 return (uint32)(dev & 0xff);
2250 #if defined(WITH_AIO)
2252 /*******************************************************************
2253 An aio_read wrapper that will deal with 64-bit sizes.
2254 ********************************************************************/
2256 int sys_aio_read(SMB_STRUCT_AIOCB *aiocb)
2258 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_READ64)
2259 return aio_read64(aiocb);
2260 #elif defined(HAVE_AIO_READ)
2261 return aio_read(aiocb);
2268 /*******************************************************************
2269 An aio_write wrapper that will deal with 64-bit sizes.
2270 ********************************************************************/
2272 int sys_aio_write(SMB_STRUCT_AIOCB *aiocb)
2274 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_WRITE64)
2275 return aio_write64(aiocb);
2276 #elif defined(HAVE_AIO_WRITE)
2277 return aio_write(aiocb);
2284 /*******************************************************************
2285 An aio_return wrapper that will deal with 64-bit sizes.
2286 ********************************************************************/
2288 ssize_t sys_aio_return(SMB_STRUCT_AIOCB *aiocb)
2290 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_RETURN64)
2291 return aio_return64(aiocb);
2292 #elif defined(HAVE_AIO_RETURN)
2293 return aio_return(aiocb);
2300 /*******************************************************************
2301 An aio_cancel wrapper that will deal with 64-bit sizes.
2302 ********************************************************************/
2304 int sys_aio_cancel(int fd, SMB_STRUCT_AIOCB *aiocb)
2306 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_CANCEL64)
2307 return aio_cancel64(fd, aiocb);
2308 #elif defined(HAVE_AIO_CANCEL)
2309 return aio_cancel(fd, aiocb);
2316 /*******************************************************************
2317 An aio_error wrapper that will deal with 64-bit sizes.
2318 ********************************************************************/
2320 int sys_aio_error(const SMB_STRUCT_AIOCB *aiocb)
2322 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_ERROR64)
2323 return aio_error64(aiocb);
2324 #elif defined(HAVE_AIO_ERROR)
2325 return aio_error(aiocb);
2332 /*******************************************************************
2333 An aio_fsync wrapper that will deal with 64-bit sizes.
2334 ********************************************************************/
2336 int sys_aio_fsync(int op, SMB_STRUCT_AIOCB *aiocb)
2338 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_FSYNC64)
2339 return aio_fsync64(op, aiocb);
2340 #elif defined(HAVE_AIO_FSYNC)
2341 return aio_fsync(op, aiocb);
2348 /*******************************************************************
2349 An aio_fsync wrapper that will deal with 64-bit sizes.
2350 ********************************************************************/
2352 int sys_aio_suspend(const SMB_STRUCT_AIOCB * const cblist[], int n, const struct timespec *timeout)
2354 #if defined(HAVE_EXPLICIT_LARGEFILE_SUPPORT) && defined(HAVE_AIOCB64) && defined(HAVE_AIO_SUSPEND64)
2355 return aio_suspend64(cblist, n, timeout);
2356 #elif defined(HAVE_AIO_FSYNC)
2357 return aio_suspend(cblist, n, timeout);
2363 #else /* !WITH_AIO */
2365 int sys_aio_read(SMB_STRUCT_AIOCB *aiocb)
2371 int sys_aio_write(SMB_STRUCT_AIOCB *aiocb)
2377 ssize_t sys_aio_return(SMB_STRUCT_AIOCB *aiocb)
2383 int sys_aio_cancel(int fd, SMB_STRUCT_AIOCB *aiocb)
2389 int sys_aio_error(const SMB_STRUCT_AIOCB *aiocb)
2395 int sys_aio_fsync(int op, SMB_STRUCT_AIOCB *aiocb)
2401 int sys_aio_suspend(const SMB_STRUCT_AIOCB * const cblist[], int n, const struct timespec *timeout)
2406 #endif /* WITH_AIO */
2408 int sys_getpeereid( int s, uid_t *uid)
2410 #if defined(HAVE_PEERCRED)
2412 socklen_t cred_len = sizeof(struct ucred);
2415 ret = getsockopt(s, SOL_SOCKET, SO_PEERCRED, (void *)&cred, &cred_len);
2420 if (cred_len != sizeof(struct ucred)) {
2433 int sys_getnameinfo(const struct sockaddr *psa,
2442 * For Solaris we must make sure salen is the
2443 * correct length for the incoming sa_family.
2446 if (salen == sizeof(struct sockaddr_storage)) {
2447 salen = sizeof(struct sockaddr_in);
2448 #if defined(HAVE_IPV6)
2449 if (psa->sa_family == AF_INET6) {
2450 salen = sizeof(struct sockaddr_in6);
2454 return getnameinfo(psa, salen, host, hostlen, service, servlen, flags);
2457 int sys_connect(int fd, const struct sockaddr * addr)
2459 socklen_t salen = -1;
2461 if (addr->sa_family == AF_INET) {
2462 salen = sizeof(struct sockaddr_in);
2463 } else if (addr->sa_family == AF_UNIX) {
2464 salen = sizeof(struct sockaddr_un);
2466 #if defined(HAVE_IPV6)
2467 else if (addr->sa_family == AF_INET6) {
2468 salen = sizeof(struct sockaddr_in6);
2472 return connect(fd, addr, salen);