2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Jeremy Allison 1998-2005
6 Copyright (C) Timur Bakeyev 2005
7 Copyright (C) Bjoern Jacke 2006-2007
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "system/syslog.h"
25 #include "system/capability.h"
26 #include "system/passwd.h"
27 #include "system/filesys.h"
28 #include "../lib/util/setid.h"
30 #ifdef HAVE_SYS_SYSCTL_H
31 #include <sys/sysctl.h>
34 #ifdef HAVE_SYS_PRCTL_H
35 #include <sys/prctl.h>
39 The idea is that this file will eventually have wrappers around all
40 important system calls in samba. The aims are:
42 - to enable easier porting by putting OS dependent stuff in here
44 - to allow for hooks into other "pseudo-filesystems"
46 - to allow easier integration of things like the japanese extensions
48 - to support the philosophy of Samba to expose the features of
49 the OS within the SMB model. In general whatever file/printer/variable
50 expansions/etc make sense to the OS should be acceptable to Samba.
55 /*******************************************************************
56 A read wrapper that will deal with EINTR.
57 ********************************************************************/
59 ssize_t
sys_read(int fd
, void *buf
, size_t count
)
64 ret
= read(fd
, buf
, count
);
65 #if defined(EWOULDBLOCK)
66 } while (ret
== -1 && (errno
== EINTR
|| errno
== EAGAIN
|| errno
== EWOULDBLOCK
));
68 } while (ret
== -1 && (errno
== EINTR
|| errno
== EAGAIN
));
73 /*******************************************************************
74 A write wrapper that will deal with EINTR.
75 ********************************************************************/
77 ssize_t
sys_write(int fd
, const void *buf
, size_t count
)
82 ret
= write(fd
, buf
, count
);
83 #if defined(EWOULDBLOCK)
84 } while (ret
== -1 && (errno
== EINTR
|| errno
== EAGAIN
|| errno
== EWOULDBLOCK
));
86 } while (ret
== -1 && (errno
== EINTR
|| errno
== EAGAIN
));
91 /*******************************************************************
92 A writev wrapper that will deal with EINTR.
93 ********************************************************************/
95 ssize_t
sys_writev(int fd
, const struct iovec
*iov
, int iovcnt
)
100 /* Try to confuse write_data_iov a bit */
101 if ((random() % 5) == 0) {
102 return sys_write(fd
, iov
[0].iov_base
, iov
[0].iov_len
);
104 if (iov
[0].iov_len
> 1) {
105 return sys_write(fd
, iov
[0].iov_base
,
106 (random() % (iov
[0].iov_len
-1)) + 1);
111 ret
= writev(fd
, iov
, iovcnt
);
112 #if defined(EWOULDBLOCK)
113 } while (ret
== -1 && (errno
== EINTR
|| errno
== EAGAIN
|| errno
== EWOULDBLOCK
));
115 } while (ret
== -1 && (errno
== EINTR
|| errno
== EAGAIN
));
120 /*******************************************************************
121 A pread wrapper that will deal with EINTR
122 ********************************************************************/
124 #if defined(HAVE_PREAD)
125 ssize_t
sys_pread(int fd
, void *buf
, size_t count
, off_t off
)
130 ret
= pread(fd
, buf
, count
, off
);
131 } while (ret
== -1 && errno
== EINTR
);
136 /*******************************************************************
137 A write wrapper that will deal with EINTR
138 ********************************************************************/
140 #if defined(HAVE_PWRITE)
141 ssize_t
sys_pwrite(int fd
, const void *buf
, size_t count
, off_t off
)
146 ret
= pwrite(fd
, buf
, count
, off
);
147 } while (ret
== -1 && errno
== EINTR
);
152 /*******************************************************************
153 A send wrapper that will deal with EINTR or EAGAIN or EWOULDBLOCK.
154 ********************************************************************/
156 ssize_t
sys_send(int s
, const void *msg
, size_t len
, int flags
)
161 ret
= send(s
, msg
, len
, flags
);
162 #if defined(EWOULDBLOCK)
163 } while (ret
== -1 && (errno
== EINTR
|| errno
== EAGAIN
|| errno
== EWOULDBLOCK
));
165 } while (ret
== -1 && (errno
== EINTR
|| errno
== EAGAIN
));
170 /*******************************************************************
171 A recvfrom wrapper that will deal with EINTR.
172 NB. As used with non-blocking sockets, return on EAGAIN/EWOULDBLOCK
173 ********************************************************************/
175 ssize_t
sys_recvfrom(int s
, void *buf
, size_t len
, int flags
, struct sockaddr
*from
, socklen_t
*fromlen
)
180 ret
= recvfrom(s
, buf
, len
, flags
, from
, fromlen
);
181 } while (ret
== -1 && (errno
== EINTR
));
185 /*******************************************************************
186 A fcntl wrapper that will deal with EINTR.
187 ********************************************************************/
189 int sys_fcntl_ptr(int fd
, int cmd
, void *arg
)
194 ret
= fcntl(fd
, cmd
, arg
);
195 } while (ret
== -1 && errno
== EINTR
);
199 /*******************************************************************
200 A fcntl wrapper that will deal with EINTR.
201 ********************************************************************/
203 int sys_fcntl_long(int fd
, int cmd
, long arg
)
208 ret
= fcntl(fd
, cmd
, arg
);
209 } while (ret
== -1 && errno
== EINTR
);
213 /****************************************************************************
214 Get/Set all the possible time fields from a stat struct as a timespec.
215 ****************************************************************************/
217 static struct timespec
get_atimespec(const struct stat
*pst
)
219 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
222 /* Old system - no ns timestamp. */
223 ret
.tv_sec
= pst
->st_atime
;
227 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
229 ret
.tv_sec
= pst
->st_atim
.tv_sec
;
230 ret
.tv_nsec
= pst
->st_atim
.tv_nsec
;
232 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
234 ret
.tv_sec
= pst
->st_atime
;
235 ret
.tv_nsec
= pst
->st_atimensec
;
237 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
239 ret
.tv_sec
= pst
->st_atime
;
240 ret
.tv_nsec
= pst
->st_atime_n
;
242 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
244 ret
.tv_sec
= pst
->st_atime
;
245 ret
.tv_nsec
= pst
->st_uatime
* 1000;
247 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
248 return pst
->st_atimespec
;
250 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
255 static struct timespec
get_mtimespec(const struct stat
*pst
)
257 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
260 /* Old system - no ns timestamp. */
261 ret
.tv_sec
= pst
->st_mtime
;
265 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
267 ret
.tv_sec
= pst
->st_mtim
.tv_sec
;
268 ret
.tv_nsec
= pst
->st_mtim
.tv_nsec
;
270 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
272 ret
.tv_sec
= pst
->st_mtime
;
273 ret
.tv_nsec
= pst
->st_mtimensec
;
275 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
277 ret
.tv_sec
= pst
->st_mtime
;
278 ret
.tv_nsec
= pst
->st_mtime_n
;
280 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
282 ret
.tv_sec
= pst
->st_mtime
;
283 ret
.tv_nsec
= pst
->st_umtime
* 1000;
285 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
286 return pst
->st_mtimespec
;
288 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
293 static struct timespec
get_ctimespec(const struct stat
*pst
)
295 #if !defined(HAVE_STAT_HIRES_TIMESTAMPS)
298 /* Old system - no ns timestamp. */
299 ret
.tv_sec
= pst
->st_ctime
;
303 #if defined(HAVE_STRUCT_STAT_ST_MTIM_TV_NSEC)
305 ret
.tv_sec
= pst
->st_ctim
.tv_sec
;
306 ret
.tv_nsec
= pst
->st_ctim
.tv_nsec
;
308 #elif defined(HAVE_STRUCT_STAT_ST_MTIMENSEC)
310 ret
.tv_sec
= pst
->st_ctime
;
311 ret
.tv_nsec
= pst
->st_ctimensec
;
313 #elif defined(HAVE_STRUCT_STAT_ST_MTIME_N)
315 ret
.tv_sec
= pst
->st_ctime
;
316 ret
.tv_nsec
= pst
->st_ctime_n
;
318 #elif defined(HAVE_STRUCT_STAT_ST_UMTIME)
320 ret
.tv_sec
= pst
->st_ctime
;
321 ret
.tv_nsec
= pst
->st_uctime
* 1000;
323 #elif defined(HAVE_STRUCT_STAT_ST_MTIMESPEC_TV_NSEC)
324 return pst
->st_ctimespec
;
326 #error CONFIGURE_ERROR_IN_DETECTING_TIMESPEC_IN_STAT
331 /****************************************************************************
332 Return the best approximation to a 'create time' under UNIX from a stat
334 ****************************************************************************/
336 static struct timespec
calc_create_time_stat(const struct stat
*st
)
338 struct timespec ret
, ret1
;
339 struct timespec c_time
= get_ctimespec(st
);
340 struct timespec m_time
= get_mtimespec(st
);
341 struct timespec a_time
= get_atimespec(st
);
343 ret
= timespec_compare(&c_time
, &m_time
) < 0 ? c_time
: m_time
;
344 ret1
= timespec_compare(&ret
, &a_time
) < 0 ? ret
: a_time
;
346 if(!null_timespec(ret1
)) {
351 * One of ctime, mtime or atime was zero (probably atime).
352 * Just return MIN(ctime, mtime).
357 /****************************************************************************
358 Return the best approximation to a 'create time' under UNIX from a stat_ex
360 ****************************************************************************/
362 static struct timespec
calc_create_time_stat_ex(const struct stat_ex
*st
)
364 struct timespec ret
, ret1
;
365 struct timespec c_time
= st
->st_ex_ctime
;
366 struct timespec m_time
= st
->st_ex_mtime
;
367 struct timespec a_time
= st
->st_ex_atime
;
369 ret
= timespec_compare(&c_time
, &m_time
) < 0 ? c_time
: m_time
;
370 ret1
= timespec_compare(&ret
, &a_time
) < 0 ? ret
: a_time
;
372 if(!null_timespec(ret1
)) {
377 * One of ctime, mtime or atime was zero (probably atime).
378 * Just return MIN(ctime, mtime).
383 /****************************************************************************
384 Return the 'create time' from a stat struct if it exists (birthtime) or else
385 use the best approximation.
386 ****************************************************************************/
388 static void make_create_timespec(const struct stat
*pst
, struct stat_ex
*dst
,
389 bool fake_dir_create_times
)
391 if (S_ISDIR(pst
->st_mode
) && fake_dir_create_times
) {
392 dst
->st_ex_btime
.tv_sec
= 315493200L; /* 1/1/1980 */
393 dst
->st_ex_btime
.tv_nsec
= 0;
396 dst
->st_ex_calculated_birthtime
= false;
398 #if defined(HAVE_STRUCT_STAT_ST_BIRTHTIMESPEC_TV_NSEC)
399 dst
->st_ex_btime
= pst
->st_birthtimespec
;
400 #elif defined(HAVE_STRUCT_STAT_ST_BIRTHTIMENSEC)
401 dst
->st_ex_btime
.tv_sec
= pst
->st_birthtime
;
402 dst
->st_ex_btime
.tv_nsec
= pst
->st_birthtimenspec
;
403 #elif defined(HAVE_STRUCT_STAT_ST_BIRTHTIME)
404 dst
->st_ex_btime
.tv_sec
= pst
->st_birthtime
;
405 dst
->st_ex_btime
.tv_nsec
= 0;
407 dst
->st_ex_btime
= calc_create_time_stat(pst
);
408 dst
->st_ex_calculated_birthtime
= true;
411 /* Deal with systems that don't initialize birthtime correctly.
412 * Pointed out by SATOH Fumiyasu <fumiyas@osstech.jp>.
414 if (null_timespec(dst
->st_ex_btime
)) {
415 dst
->st_ex_btime
= calc_create_time_stat(pst
);
416 dst
->st_ex_calculated_birthtime
= true;
420 /****************************************************************************
421 If we update a timestamp in a stat_ex struct we may have to recalculate
422 the birthtime. For now only implement this for write time, but we may
423 also need to do it for atime and ctime. JRA.
424 ****************************************************************************/
426 void update_stat_ex_mtime(struct stat_ex
*dst
,
427 struct timespec write_ts
)
429 dst
->st_ex_mtime
= write_ts
;
431 /* We may have to recalculate btime. */
432 if (dst
->st_ex_calculated_birthtime
) {
433 dst
->st_ex_btime
= calc_create_time_stat_ex(dst
);
437 void update_stat_ex_create_time(struct stat_ex
*dst
,
438 struct timespec create_time
)
440 dst
->st_ex_btime
= create_time
;
441 dst
->st_ex_calculated_birthtime
= false;
444 void init_stat_ex_from_stat (struct stat_ex
*dst
,
445 const struct stat
*src
,
446 bool fake_dir_create_times
)
448 dst
->st_ex_dev
= src
->st_dev
;
449 dst
->st_ex_ino
= src
->st_ino
;
450 dst
->st_ex_mode
= src
->st_mode
;
451 dst
->st_ex_nlink
= src
->st_nlink
;
452 dst
->st_ex_uid
= src
->st_uid
;
453 dst
->st_ex_gid
= src
->st_gid
;
454 dst
->st_ex_rdev
= src
->st_rdev
;
455 dst
->st_ex_size
= src
->st_size
;
456 dst
->st_ex_atime
= get_atimespec(src
);
457 dst
->st_ex_mtime
= get_mtimespec(src
);
458 dst
->st_ex_ctime
= get_ctimespec(src
);
459 make_create_timespec(src
, dst
, fake_dir_create_times
);
460 #ifdef HAVE_STAT_ST_BLKSIZE
461 dst
->st_ex_blksize
= src
->st_blksize
;
463 dst
->st_ex_blksize
= STAT_ST_BLOCKSIZE
;
466 #ifdef HAVE_STAT_ST_BLOCKS
467 dst
->st_ex_blocks
= src
->st_blocks
;
469 dst
->st_ex_blocks
= src
->st_size
/ dst
->st_ex_blksize
+ 1;
472 #ifdef HAVE_STAT_ST_FLAGS
473 dst
->st_ex_flags
= src
->st_flags
;
475 dst
->st_ex_flags
= 0;
479 /*******************************************************************
481 ********************************************************************/
483 int sys_stat(const char *fname
, SMB_STRUCT_STAT
*sbuf
,
484 bool fake_dir_create_times
)
488 ret
= stat(fname
, &statbuf
);
490 /* we always want directories to appear zero size */
491 if (S_ISDIR(statbuf
.st_mode
)) {
494 init_stat_ex_from_stat(sbuf
, &statbuf
, fake_dir_create_times
);
499 /*******************************************************************
501 ********************************************************************/
503 int sys_fstat(int fd
, SMB_STRUCT_STAT
*sbuf
, bool fake_dir_create_times
)
507 ret
= fstat(fd
, &statbuf
);
509 /* we always want directories to appear zero size */
510 if (S_ISDIR(statbuf
.st_mode
)) {
513 init_stat_ex_from_stat(sbuf
, &statbuf
, fake_dir_create_times
);
518 /*******************************************************************
520 ********************************************************************/
522 int sys_lstat(const char *fname
,SMB_STRUCT_STAT
*sbuf
,
523 bool fake_dir_create_times
)
527 ret
= lstat(fname
, &statbuf
);
529 /* we always want directories to appear zero size */
530 if (S_ISDIR(statbuf
.st_mode
)) {
533 init_stat_ex_from_stat(sbuf
, &statbuf
, fake_dir_create_times
);
538 /*******************************************************************
539 An posix_fallocate() wrapper.
540 ********************************************************************/
541 int sys_posix_fallocate(int fd
, off_t offset
, off_t len
)
543 #if defined(HAVE_POSIX_FALLOCATE) && !defined(HAVE_BROKEN_POSIX_FALLOCATE)
544 return posix_fallocate(fd
, offset
, len
);
545 #elif defined(F_RESVSP64)
546 /* this handles XFS on IRIX */
548 off_t new_len
= offset
+ len
;
552 /* unlikely to get a too large file on a 64bit system but ... */
556 fl
.l_whence
= SEEK_SET
;
560 ret
=fcntl(fd
, F_RESVSP64
, &fl
);
565 /* Make sure the file gets enlarged after we allocated space: */
567 if (new_len
> sbuf
.st_size
)
568 ftruncate64(fd
, new_len
);
575 /*******************************************************************
576 An fallocate() function that matches the semantics of the Linux one.
577 ********************************************************************/
579 #ifdef HAVE_LINUX_FALLOC_H
580 #include <linux/falloc.h>
583 int sys_fallocate(int fd
, enum vfs_fallocate_mode mode
, off_t offset
, off_t len
)
585 #if defined(HAVE_LINUX_FALLOCATE64) || defined(HAVE_LINUX_FALLOCATE)
588 case VFS_FALLOCATE_EXTEND_SIZE
:
591 case VFS_FALLOCATE_KEEP_SIZE
:
592 lmode
= FALLOC_FL_KEEP_SIZE
;
598 #if defined(HAVE_LINUX_FALLOCATE)
599 return fallocate(fd
, lmode
, offset
, len
);
602 /* TODO - plumb in fallocate from other filesysetms like VXFS etc. JRA. */
608 #if HAVE_KERNEL_SHARE_MODES
610 #define LOCK_MAND 32 /* This is a mandatory flock */
611 #define LOCK_READ 64 /* ... Which allows concurrent read operations */
612 #define LOCK_WRITE 128 /* ... Which allows concurrent write operations */
613 #define LOCK_RW 192 /* ... Which allows concurrent read & write ops */
617 /*******************************************************************
618 A flock() wrapper that will perform the kernel flock.
619 ********************************************************************/
621 void kernel_flock(int fd
, uint32 share_mode
, uint32 access_mask
)
623 #if HAVE_KERNEL_SHARE_MODES
625 if (share_mode
== FILE_SHARE_WRITE
) {
626 kernel_mode
= LOCK_MAND
|LOCK_WRITE
;
627 } else if (share_mode
== FILE_SHARE_READ
) {
628 kernel_mode
= LOCK_MAND
|LOCK_READ
;
629 } else if (share_mode
== FILE_SHARE_NONE
) {
630 kernel_mode
= LOCK_MAND
;
633 flock(fd
, kernel_mode
);
641 /*******************************************************************
642 An fdopendir wrapper.
643 ********************************************************************/
645 DIR *sys_fdopendir(int fd
)
647 #if defined(HAVE_FDOPENDIR)
648 return fdopendir(fd
);
655 /*******************************************************************
657 ********************************************************************/
659 int sys_mknod(const char *path
, mode_t mode
, SMB_DEV_T dev
)
661 #if defined(HAVE_MKNOD)
662 return mknod(path
, mode
, dev
);
664 /* No mknod system call. */
670 /*******************************************************************
671 The wait() calls vary between systems
672 ********************************************************************/
674 int sys_waitpid(pid_t pid
,int *status
,int options
)
677 return waitpid(pid
,status
,options
);
678 #else /* HAVE_WAITPID */
679 return wait4(pid
, status
, options
, NULL
);
680 #endif /* HAVE_WAITPID */
683 /*******************************************************************
684 System wrapper for getwd. Always returns MALLOC'ed memory, or NULL
685 on error (malloc fail usually).
686 ********************************************************************/
688 char *sys_getwd(void)
690 #ifdef GETCWD_TAKES_NULL
691 return getcwd(NULL
, 0);
693 char *wd
= NULL
, *s
= NULL
;
694 size_t allocated
= PATH_MAX
;
697 s
= SMB_REALLOC_ARRAY(s
, char, allocated
);
701 wd
= getcwd(s
, allocated
);
705 if (errno
!= ERANGE
) {
710 if (allocated
< PATH_MAX
) {
717 char *s
= SMB_MALLOC_ARRAY(char, PATH_MAX
);
725 #if defined(HAVE_POSIX_CAPABILITIES)
727 /**************************************************************************
728 Try and abstract process capabilities (for systems that have them).
729 ****************************************************************************/
731 /* Set the POSIX capabilities needed for the given purpose into the effective
732 * capability set of the current process. Make sure they are always removed
733 * from the inheritable set, because there is no circumstance in which our
734 * children should inherit our elevated privileges.
736 static bool set_process_capability(enum smbd_capability capability
,
739 cap_value_t cap_vals
[2] = {0};
740 int num_cap_vals
= 0;
744 #if defined(HAVE_PRCTL) && defined(PR_GET_KEEPCAPS) && defined(PR_SET_KEEPCAPS)
745 /* On Linux, make sure that any capabilities we grab are sticky
746 * across UID changes. We expect that this would allow us to keep both
747 * the effective and permitted capability sets, but as of circa 2.6.16,
748 * only the permitted set is kept. It is a bug (which we work around)
749 * that the effective set is lost, but we still require the effective
752 if (!prctl(PR_GET_KEEPCAPS
)) {
753 prctl(PR_SET_KEEPCAPS
, 1);
757 cap
= cap_get_proc();
759 DEBUG(0,("set_process_capability: cap_get_proc failed: %s\n",
764 switch (capability
) {
765 case KERNEL_OPLOCK_CAPABILITY
:
766 #ifdef CAP_NETWORK_MGT
767 /* IRIX has CAP_NETWORK_MGT for oplocks. */
768 cap_vals
[num_cap_vals
++] = CAP_NETWORK_MGT
;
771 case DMAPI_ACCESS_CAPABILITY
:
772 #ifdef CAP_DEVICE_MGT
773 /* IRIX has CAP_DEVICE_MGT for DMAPI access. */
774 cap_vals
[num_cap_vals
++] = CAP_DEVICE_MGT
;
776 /* Linux has CAP_MKNOD for DMAPI access. */
777 cap_vals
[num_cap_vals
++] = CAP_MKNOD
;
780 case LEASE_CAPABILITY
:
782 cap_vals
[num_cap_vals
++] = CAP_LEASE
;
787 SMB_ASSERT(num_cap_vals
<= ARRAY_SIZE(cap_vals
));
789 if (num_cap_vals
== 0) {
794 cap_set_flag(cap
, CAP_EFFECTIVE
, num_cap_vals
, cap_vals
,
795 enable
? CAP_SET
: CAP_CLEAR
);
797 /* We never want to pass capabilities down to our children, so make
798 * sure they are not inherited.
800 cap_set_flag(cap
, CAP_INHERITABLE
, num_cap_vals
, cap_vals
, CAP_CLEAR
);
802 if (cap_set_proc(cap
) == -1) {
803 DEBUG(0, ("set_process_capability: cap_set_proc failed: %s\n",
813 #endif /* HAVE_POSIX_CAPABILITIES */
815 /****************************************************************************
816 Gain the oplock capability from the kernel if possible.
817 ****************************************************************************/
819 void set_effective_capability(enum smbd_capability capability
)
821 #if defined(HAVE_POSIX_CAPABILITIES)
822 set_process_capability(capability
, True
);
823 #endif /* HAVE_POSIX_CAPABILITIES */
826 void drop_effective_capability(enum smbd_capability capability
)
828 #if defined(HAVE_POSIX_CAPABILITIES)
829 set_process_capability(capability
, False
);
830 #endif /* HAVE_POSIX_CAPABILITIES */
833 /**************************************************************************
834 Wrapper for random().
835 ****************************************************************************/
837 long sys_random(void)
839 #if defined(HAVE_RANDOM)
840 return (long)random();
841 #elif defined(HAVE_RAND)
844 DEBUG(0,("Error - no random function available !\n"));
849 /**************************************************************************
850 Wrapper for srandom().
851 ****************************************************************************/
853 void sys_srandom(unsigned int seed
)
855 #if defined(HAVE_SRANDOM)
857 #elif defined(HAVE_SRAND)
860 DEBUG(0,("Error - no srandom function available !\n"));
866 #define NGROUPS_MAX 32 /* Guess... */
869 /**************************************************************************
870 Returns equivalent to NGROUPS_MAX - using sysconf if needed.
871 ****************************************************************************/
875 #if defined(SYSCONF_SC_NGROUPS_MAX)
876 int ret
= sysconf(_SC_NGROUPS_MAX
);
877 return (ret
== -1) ? NGROUPS_MAX
: ret
;
883 /**************************************************************************
884 Wrap setgroups and getgroups for systems that declare getgroups() as
885 returning an array of gid_t, but actuall return an array of int.
886 ****************************************************************************/
888 #if defined(HAVE_BROKEN_GETGROUPS)
890 #ifdef HAVE_BROKEN_GETGROUPS
896 static int sys_broken_getgroups(int setlen
, gid_t
*gidset
)
903 return getgroups(setlen
, &gid
);
907 * Broken case. We need to allocate a
908 * GID_T array of size setlen.
917 setlen
= groups_max();
919 if((group_list
= SMB_MALLOC_ARRAY(GID_T
, setlen
)) == NULL
) {
920 DEBUG(0,("sys_getgroups: Malloc fail.\n"));
924 if((ngroups
= getgroups(setlen
, group_list
)) < 0) {
925 int saved_errno
= errno
;
926 SAFE_FREE(group_list
);
931 for(i
= 0; i
< ngroups
; i
++)
932 gidset
[i
] = (gid_t
)group_list
[i
];
934 SAFE_FREE(group_list
);
938 static int sys_broken_setgroups(int setlen
, gid_t
*gidset
)
946 if (setlen
< 0 || setlen
> groups_max()) {
952 * Broken case. We need to allocate a
953 * GID_T array of size setlen.
956 if((group_list
= SMB_MALLOC_ARRAY(GID_T
, setlen
)) == NULL
) {
957 DEBUG(0,("sys_setgroups: Malloc fail.\n"));
961 for(i
= 0; i
< setlen
; i
++)
962 group_list
[i
] = (GID_T
) gidset
[i
];
964 if(samba_setgroups(setlen
, group_list
) != 0) {
965 int saved_errno
= errno
;
966 SAFE_FREE(group_list
);
971 SAFE_FREE(group_list
);
975 #endif /* HAVE_BROKEN_GETGROUPS */
977 /* This is a list of systems that require the first GID passed to setgroups(2)
978 * to be the effective GID. If your system is one of these, add it here.
980 #if defined (FREEBSD) || defined (DARWINOS)
981 #define USE_BSD_SETGROUPS
984 #if defined(USE_BSD_SETGROUPS)
985 /* Depending on the particular BSD implementation, the first GID that is
986 * passed to setgroups(2) will either be ignored or will set the credential's
987 * effective GID. In either case, the right thing to do is to guarantee that
988 * gidset[0] is the effective GID.
990 static int sys_bsd_setgroups(gid_t primary_gid
, int setlen
, const gid_t
*gidset
)
992 gid_t
*new_gidset
= NULL
;
996 /* setgroups(2) will fail with EINVAL if we pass too many groups. */
999 /* No group list, just make sure we are setting the efective GID. */
1001 return samba_setgroups(1, &primary_gid
);
1004 /* If the primary gid is not the first array element, grow the array
1005 * and insert it at the front.
1007 if (gidset
[0] != primary_gid
) {
1008 new_gidset
= SMB_MALLOC_ARRAY(gid_t
, setlen
+ 1);
1009 if (new_gidset
== NULL
) {
1013 memcpy(new_gidset
+ 1, gidset
, (setlen
* sizeof(gid_t
)));
1014 new_gidset
[0] = primary_gid
;
1019 DEBUG(3, ("forced to truncate group list from %d to %d\n",
1024 #if defined(HAVE_BROKEN_GETGROUPS)
1025 ret
= sys_broken_setgroups(setlen
, new_gidset
? new_gidset
: gidset
);
1027 ret
= samba_setgroups(setlen
, new_gidset
? new_gidset
: gidset
);
1032 SAFE_FREE(new_gidset
);
1039 #endif /* USE_BSD_SETGROUPS */
1041 /**************************************************************************
1042 Wrapper for getgroups. Deals with broken (int) case.
1043 ****************************************************************************/
1045 int sys_getgroups(int setlen
, gid_t
*gidset
)
1047 #if defined(HAVE_BROKEN_GETGROUPS)
1048 return sys_broken_getgroups(setlen
, gidset
);
1050 return getgroups(setlen
, gidset
);
1054 /**************************************************************************
1055 Wrapper for setgroups. Deals with broken (int) case and BSD case.
1056 ****************************************************************************/
1058 int sys_setgroups(gid_t
UNUSED(primary_gid
), int setlen
, gid_t
*gidset
)
1060 #if !defined(HAVE_SETGROUPS)
1063 #endif /* HAVE_SETGROUPS */
1065 #if defined(USE_BSD_SETGROUPS)
1066 return sys_bsd_setgroups(primary_gid
, setlen
, gidset
);
1067 #elif defined(HAVE_BROKEN_GETGROUPS)
1068 return sys_broken_setgroups(setlen
, gidset
);
1070 return samba_setgroups(setlen
, gidset
);
1074 /**************************************************************************
1075 Extract a command into an arg list.
1076 ****************************************************************************/
1078 static char **extract_args(TALLOC_CTX
*mem_ctx
, const char *command
)
1087 if (!(trunc_cmd
= talloc_strdup(mem_ctx
, command
))) {
1088 DEBUG(0, ("talloc failed\n"));
1092 if(!(ptr
= strtok_r(trunc_cmd
, " \t", &saveptr
))) {
1093 TALLOC_FREE(trunc_cmd
);
1102 for( argcl
= 1; ptr
; ptr
= strtok_r(NULL
, " \t", &saveptr
))
1105 TALLOC_FREE(trunc_cmd
);
1107 if (!(argl
= talloc_array(mem_ctx
, char *, argcl
+ 1))) {
1112 * Now do the extraction.
1115 if (!(trunc_cmd
= talloc_strdup(mem_ctx
, command
))) {
1119 ptr
= strtok_r(trunc_cmd
, " \t", &saveptr
);
1122 if (!(argl
[i
++] = talloc_strdup(argl
, ptr
))) {
1126 while((ptr
= strtok_r(NULL
, " \t", &saveptr
)) != NULL
) {
1128 if (!(argl
[i
++] = talloc_strdup(argl
, ptr
))) {
1134 TALLOC_FREE(trunc_cmd
);
1138 DEBUG(0, ("talloc failed\n"));
1139 TALLOC_FREE(trunc_cmd
);
1145 /**************************************************************************
1146 Wrapper for popen. Safer as it doesn't search a path.
1147 Modified from the glibc sources.
1148 modified by tridge to return a file descriptor. We must kick our FILE* habit
1149 ****************************************************************************/
1151 typedef struct _popen_list
1155 struct _popen_list
*next
;
1158 static popen_list
*popen_chain
;
1160 int sys_popen(const char *command
)
1162 int parent_end
, child_end
;
1164 popen_list
*entry
= NULL
;
1173 ret
= pipe(pipe_fds
);
1175 DEBUG(0, ("sys_popen: error opening pipe: %s\n",
1180 parent_end
= pipe_fds
[0];
1181 child_end
= pipe_fds
[1];
1183 entry
= SMB_MALLOC_P(popen_list
);
1184 if (entry
== NULL
) {
1185 DEBUG(0, ("sys_popen: malloc failed\n"));
1189 ZERO_STRUCTP(entry
);
1192 * Extract the command and args into a NULL terminated array.
1195 argl
= extract_args(NULL
, command
);
1197 DEBUG(0, ("sys_popen: extract_args() failed: %s\n", strerror(errno
)));
1201 entry
->child_pid
= fork();
1203 if (entry
->child_pid
== -1) {
1204 DEBUG(0, ("sys_popen: fork failed: %s\n", strerror(errno
)));
1208 if (entry
->child_pid
== 0) {
1214 int child_std_end
= STDOUT_FILENO
;
1218 if (child_end
!= child_std_end
) {
1219 dup2 (child_end
, child_std_end
);
1224 * POSIX.2: "popen() shall ensure that any streams from previous
1225 * popen() calls that remain open in the parent process are closed
1226 * in the new child process."
1229 for (p
= popen_chain
; p
; p
= p
->next
)
1232 ret
= execv(argl
[0], argl
);
1234 DEBUG(0, ("sys_popen: ERROR executing command "
1235 "'%s': %s\n", command
, strerror(errno
)));
1247 /* Link into popen_chain. */
1248 entry
->next
= popen_chain
;
1249 popen_chain
= entry
;
1250 entry
->fd
= parent_end
;
1263 /**************************************************************************
1264 Wrapper for pclose. Modified from the glibc sources.
1265 ****************************************************************************/
1267 int sys_pclose(int fd
)
1270 popen_list
**ptr
= &popen_chain
;
1271 popen_list
*entry
= NULL
;
1275 /* Unlink from popen_chain. */
1276 for ( ; *ptr
!= NULL
; ptr
= &(*ptr
)->next
) {
1277 if ((*ptr
)->fd
== fd
) {
1279 *ptr
= (*ptr
)->next
;
1285 if (status
< 0 || close(entry
->fd
) < 0)
1289 * As Samba is catching and eating child process
1290 * exits we don't really care about the child exit
1291 * code, a -1 with errno = ECHILD will do fine for us.
1295 wait_pid
= sys_waitpid (entry
->child_pid
, &wstatus
, 0);
1296 } while (wait_pid
== -1 && errno
== EINTR
);
1305 /**************************************************************************
1306 Wrapper for Admin Logs.
1307 ****************************************************************************/
1309 void sys_adminlog(int priority
, const char *format_str
, ...)
1313 char *msgbuf
= NULL
;
1315 va_start( ap
, format_str
);
1316 ret
= vasprintf( &msgbuf
, format_str
, ap
);
1322 #if defined(HAVE_SYSLOG)
1323 syslog( priority
, "%s", msgbuf
);
1325 DEBUG(0,("%s", msgbuf
));
1330 /****************************************************************************
1331 Return the major devicenumber for UNIX extensions.
1332 ****************************************************************************/
1334 uint32
unix_dev_major(SMB_DEV_T dev
)
1336 #if defined(HAVE_DEVICE_MAJOR_FN)
1337 return (uint32
)major(dev
);
1339 return (uint32
)(dev
>> 8);
1343 /****************************************************************************
1344 Return the minor devicenumber for UNIX extensions.
1345 ****************************************************************************/
1347 uint32
unix_dev_minor(SMB_DEV_T dev
)
1349 #if defined(HAVE_DEVICE_MINOR_FN)
1350 return (uint32
)minor(dev
);
1352 return (uint32
)(dev
& 0xff);
1357 /*******************************************************************
1358 Return the number of CPUs.
1359 ********************************************************************/
1361 int sys_get_number_of_cores(void)
1365 #if defined(HAVE_SYSCONF)
1366 #if defined(_SC_NPROCESSORS_ONLN)
1367 ret
= (int)sysconf(_SC_NPROCESSORS_ONLN
);
1369 #if defined(_SC_NPROCESSORS_CONF)
1371 ret
= (int)sysconf(_SC_NPROCESSORS_CONF
);
1374 #elif defined(HAVE_SYSCTL) && defined(CTL_HW)
1376 unsigned int len
= sizeof(ret
);
1379 #if defined(HW_AVAILCPU)
1380 name
[1] = HW_AVAILCPU
;
1382 if (sysctl(name
, 2, &ret
, &len
, NULL
, 0) == -1) {
1386 #if defined(HW_NCPU)
1390 if (sysctl(nm
, 2, &count
, &len
, NULL
, 0) == -1) {