sysutil.c 60 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861
  1. /*
  2. * Part of Very Secure FTPd
  3. * Licence: GPL v2
  4. * Author: Chris Evans
  5. *
  6. * sysutil.c
  7. *
  8. * Routines to make the libc/syscall API more pleasant to use. Long term,
  9. * more libc/syscalls will go in here to reduce the number of .c files with
  10. * dependencies on libc or syscalls.
  11. */
  12. #define PRIVATE_HANDS_OFF_syscall_retval syscall_retval
  13. #define PRIVATE_HANDS_OFF_exit_status exit_status
  14. #include "sysutil.h"
  15. #include "utility.h"
  16. #include "tunables.h"
  17. #include "sysdeputil.h"
  18. /* Activate 64-bit file support on Linux/32bit plus others */
  19. #define _FILE_OFFSET_BITS 64
  20. #define _LARGEFILE_SOURCE 1
  21. #define _LARGEFILE64_SOURCE 1
  22. #define _LARGE_FILES 1
  23. /* For Linux, this adds nothing :-) */
  24. #include "port/porting_junk.h"
  25. #include <signal.h>
  26. #include <string.h>
  27. #include <stdlib.h>
  28. #include <unistd.h>
  29. #include <sys/types.h>
  30. #include <sys/socket.h>
  31. #include <sys/mman.h>
  32. #include <sys/stat.h>
  33. #include <fcntl.h>
  34. #include <netinet/in.h>
  35. #include <stdio.h>
  36. #include <dirent.h>
  37. #include <time.h>
  38. #include <arpa/inet.h>
  39. #include <errno.h>
  40. #include <pwd.h>
  41. #include <grp.h>
  42. #include <ctype.h>
  43. #include <sys/wait.h>
  44. #include <sys/time.h>
  45. /* Must be before netinet/ip.h. Found on FreeBSD, Solaris */
  46. #include <netinet/in_systm.h>
  47. #include <netinet/ip.h>
  48. #include <netinet/tcp.h>
  49. #include <limits.h>
  50. #include <syslog.h>
  51. #include <utime.h>
  52. #include <netdb.h>
  53. #include <sys/resource.h>
  54. /* Private variables to this file */
  55. /* Current umask() */
  56. static unsigned int s_current_umask;
  57. /* Cached time */
  58. static struct timeval s_current_time;
  59. /* Current pid */
  60. static int s_current_pid = -1;
  61. /* Exit function */
  62. static exitfunc_t s_exit_func;
  63. /* Difference in timezone from GMT in seconds */
  64. static long s_timezone;
  65. /* Our internal signal handling implementation details */
  66. static struct vsf_sysutil_sig_details
  67. {
  68. vsf_sighandle_t sync_sig_handler;
  69. void* p_private;
  70. volatile sig_atomic_t pending;
  71. int running;
  72. int use_alarm;
  73. } s_sig_details[NSIG];
  74. static vsf_context_io_t s_io_handler;
  75. static void* s_p_io_handler_private;
  76. static int s_io_handler_running;
  77. struct vsf_sysutil_sockaddr
  78. {
  79. union
  80. {
  81. struct sockaddr u_sockaddr;
  82. struct sockaddr_in u_sockaddr_in;
  83. struct sockaddr_in6 u_sockaddr_in6;
  84. } u;
  85. };
  86. /* File locals */
  87. static void vsf_sysutil_common_sighandler(int signum);
  88. static void vsf_sysutil_alrm_sighandler(int signum);
  89. static int vsf_sysutil_translate_sig(const enum EVSFSysUtilSignal sig);
  90. static void vsf_sysutil_set_sighandler(int sig, void (*p_handlefunc)(int));
  91. static int vsf_sysutil_translate_memprot(
  92. const enum EVSFSysUtilMapPermission perm);
  93. static int vsf_sysutil_translate_openmode(
  94. const enum EVSFSysUtilOpenMode mode);
  95. static void vsf_sysutil_alloc_statbuf(struct vsf_sysutil_statbuf** p_ptr);
  96. void vsf_sysutil_sockaddr_alloc(struct vsf_sysutil_sockaddr** p_sockptr);
  97. static int lock_internal(int fd, int lock_type);
  98. static void
  99. vsf_sysutil_alrm_sighandler(int signum)
  100. {
  101. (void) signum;
  102. alarm(1);
  103. }
  104. static void
  105. vsf_sysutil_common_sighandler(int signum)
  106. {
  107. if (signum < 0 || signum >= NSIG)
  108. {
  109. /* "cannot happen" */
  110. return;
  111. }
  112. if (s_sig_details[signum].sync_sig_handler)
  113. {
  114. s_sig_details[signum].pending = 1;
  115. /* Since this synchronous signal framework has a small race (signal coming
  116. * in just before we start a blocking call), there's the option to fire an
  117. * alarm repeatedly until the signal is handled.
  118. */
  119. if (s_sig_details[signum].use_alarm)
  120. {
  121. alarm(1);
  122. }
  123. }
  124. }
  125. /* Notes. This signal check is evaluated after potentially blocking system
  126. * calls, i.e. at highly defined points in the code. Since we only interrupt
  127. * at these definite locations, the signal handlers can be non-trivial
  128. * without us having to worry about re-entrancy.
  129. *
  130. * We guarantee that a handler for a given signal is not re-entrant. This
  131. * is taken care of by the "running" flag.
  132. *
  133. * This call itself can only be re-entered once we dereference the actual
  134. * hander function pointer, so we are safe with respect to races modifying
  135. * the "running" flag.
  136. */
  137. void
  138. vsf_sysutil_check_pending_actions(
  139. const enum EVSFSysUtilInterruptContext context, int retval, int fd)
  140. {
  141. unsigned int i;
  142. /* Check the i/o handler before the signal handlers */
  143. if (s_io_handler && !s_io_handler_running && context == kVSFSysUtilIO)
  144. {
  145. s_io_handler_running = 1;
  146. (*s_io_handler)(retval, fd, s_p_io_handler_private);
  147. s_io_handler_running = 0;
  148. }
  149. for (i=0; i < NSIG; ++i)
  150. {
  151. if (s_sig_details[i].pending && !s_sig_details[i].running)
  152. {
  153. s_sig_details[i].running = 1;
  154. if (s_sig_details[i].use_alarm)
  155. {
  156. alarm(0);
  157. }
  158. if (s_sig_details[i].sync_sig_handler)
  159. {
  160. s_sig_details[i].pending = 0;
  161. (*(s_sig_details[i].sync_sig_handler))(s_sig_details[i].p_private);
  162. }
  163. s_sig_details[i].running = 0;
  164. }
  165. }
  166. }
  167. static int
  168. vsf_sysutil_translate_sig(const enum EVSFSysUtilSignal sig)
  169. {
  170. int realsig = 0;
  171. switch (sig)
  172. {
  173. case kVSFSysUtilSigALRM:
  174. realsig = SIGALRM;
  175. break;
  176. case kVSFSysUtilSigTERM:
  177. realsig = SIGTERM;
  178. break;
  179. case kVSFSysUtilSigCHLD:
  180. realsig = SIGCHLD;
  181. break;
  182. case kVSFSysUtilSigPIPE:
  183. realsig = SIGPIPE;
  184. break;
  185. case kVSFSysUtilSigURG:
  186. realsig = SIGURG;
  187. break;
  188. case kVSFSysUtilSigHUP:
  189. realsig = SIGHUP;
  190. break;
  191. default:
  192. bug("unknown signal in sysutil_translate_sig");
  193. break;
  194. }
  195. if (realsig < 0 || realsig >= NSIG)
  196. {
  197. bug("signal out of range in sysutil_translate_sig");
  198. }
  199. return realsig;
  200. }
  201. void
  202. vsf_sysutil_install_sighandler(const enum EVSFSysUtilSignal sig,
  203. vsf_sighandle_t handler,
  204. void* p_private,
  205. int use_alarm)
  206. {
  207. int realsig = vsf_sysutil_translate_sig(sig);
  208. s_sig_details[realsig].p_private = p_private;
  209. s_sig_details[realsig].sync_sig_handler = handler;
  210. s_sig_details[realsig].use_alarm = use_alarm;
  211. vsf_sysutil_set_sighandler(realsig, vsf_sysutil_common_sighandler);
  212. if (use_alarm && realsig != SIGALRM)
  213. {
  214. vsf_sysutil_set_sighandler(SIGALRM, vsf_sysutil_alrm_sighandler);
  215. }
  216. }
  217. void
  218. vsf_sysutil_default_sig(const enum EVSFSysUtilSignal sig)
  219. {
  220. int realsig = vsf_sysutil_translate_sig(sig);
  221. vsf_sysutil_set_sighandler(realsig, SIG_DFL);
  222. s_sig_details[realsig].p_private = NULL;
  223. s_sig_details[realsig].sync_sig_handler = NULL;
  224. }
  225. void
  226. vsf_sysutil_install_null_sighandler(const enum EVSFSysUtilSignal sig)
  227. {
  228. int realsig = vsf_sysutil_translate_sig(sig);
  229. s_sig_details[realsig].p_private = NULL;
  230. s_sig_details[realsig].sync_sig_handler = NULL;
  231. vsf_sysutil_set_sighandler(realsig, vsf_sysutil_common_sighandler);
  232. }
  233. void
  234. vsf_sysutil_install_async_sighandler(const enum EVSFSysUtilSignal sig,
  235. vsf_async_sighandle_t handler)
  236. {
  237. int realsig = vsf_sysutil_translate_sig(sig);
  238. s_sig_details[realsig].p_private = NULL;
  239. s_sig_details[realsig].sync_sig_handler = NULL;
  240. vsf_sysutil_block_sig(sig);
  241. vsf_sysutil_set_sighandler(realsig, handler);
  242. }
  243. static void
  244. vsf_sysutil_set_sighandler(int sig, void (*p_handlefunc)(int))
  245. {
  246. int retval;
  247. struct sigaction sigact;
  248. vsf_sysutil_memclr(&sigact, sizeof(sigact));
  249. sigact.sa_handler = p_handlefunc;
  250. retval = sigfillset(&sigact.sa_mask);
  251. if (retval != 0)
  252. {
  253. die("sigfillset");
  254. }
  255. retval = sigaction(sig, &sigact, NULL);
  256. if (retval != 0)
  257. {
  258. die("sigaction");
  259. }
  260. }
  261. void
  262. vsf_sysutil_block_sig(const enum EVSFSysUtilSignal sig)
  263. {
  264. sigset_t sset;
  265. int retval;
  266. int realsig = vsf_sysutil_translate_sig(sig);
  267. retval = sigemptyset(&sset);
  268. if (retval != 0)
  269. {
  270. die("sigemptyset");
  271. }
  272. retval = sigaddset(&sset, realsig);
  273. if (retval != 0)
  274. {
  275. die("sigaddset");
  276. }
  277. retval = sigprocmask(SIG_BLOCK, &sset, NULL);
  278. if (retval != 0)
  279. {
  280. die("sigprocmask");
  281. }
  282. }
  283. void
  284. vsf_sysutil_unblock_sig(const enum EVSFSysUtilSignal sig)
  285. {
  286. sigset_t sset;
  287. int retval;
  288. int realsig = vsf_sysutil_translate_sig(sig);
  289. retval = sigemptyset(&sset);
  290. if (retval != 0)
  291. {
  292. die("sigemptyset");
  293. }
  294. retval = sigaddset(&sset, realsig);
  295. if (retval != 0)
  296. {
  297. die("sigaddset");
  298. }
  299. retval = sigprocmask(SIG_UNBLOCK, &sset, NULL);
  300. if (retval != 0)
  301. {
  302. die("sigprocmask");
  303. }
  304. }
  305. void
  306. vsf_sysutil_install_io_handler(vsf_context_io_t handler, void* p_private)
  307. {
  308. if (s_io_handler != NULL)
  309. {
  310. bug("double register of i/o handler");
  311. }
  312. s_io_handler = handler;
  313. s_p_io_handler_private = p_private;
  314. }
  315. void
  316. vsf_sysutil_uninstall_io_handler(void)
  317. {
  318. if (s_io_handler == NULL)
  319. {
  320. bug("no i/o handler to unregister!");
  321. }
  322. s_io_handler = NULL;
  323. s_p_io_handler_private = NULL;
  324. }
  325. void
  326. vsf_sysutil_set_alarm(const unsigned int trigger_seconds)
  327. {
  328. (void) alarm(trigger_seconds);
  329. }
  330. void
  331. vsf_sysutil_clear_alarm(void)
  332. {
  333. vsf_sysutil_set_alarm(0);
  334. }
  335. int
  336. vsf_sysutil_read(const int fd, void* p_buf, const unsigned int size)
  337. {
  338. while (1)
  339. {
  340. int retval = read(fd, p_buf, size);
  341. int saved_errno = errno;
  342. vsf_sysutil_check_pending_actions(kVSFSysUtilIO, retval, fd);
  343. if (retval < 0 && saved_errno == EINTR)
  344. {
  345. continue;
  346. }
  347. return retval;
  348. }
  349. }
  350. int
  351. vsf_sysutil_write(const int fd, const void* p_buf, const unsigned int size)
  352. {
  353. while (1)
  354. {
  355. int retval = write(fd, p_buf, size);
  356. int saved_errno = errno;
  357. vsf_sysutil_check_pending_actions(kVSFSysUtilIO, retval, fd);
  358. if (retval < 0 && saved_errno == EINTR)
  359. {
  360. continue;
  361. }
  362. return retval;
  363. }
  364. }
  365. int
  366. vsf_sysutil_read_loop(const int fd, void* p_buf, unsigned int size)
  367. {
  368. int retval;
  369. int num_read = 0;
  370. if (size > INT_MAX)
  371. {
  372. die("size too big in sysutil_read_loop");
  373. }
  374. while (1)
  375. {
  376. retval = vsf_sysutil_read(fd, (char*)p_buf + num_read, size);
  377. if (retval < 0)
  378. {
  379. return retval;
  380. }
  381. else if (retval == 0)
  382. {
  383. /* Read all we're going to read.. */
  384. return num_read;
  385. }
  386. if ((unsigned int) retval > size)
  387. {
  388. die("retval too big in vsf_sysutil_read_loop");
  389. }
  390. num_read += retval;
  391. size -= (unsigned int) retval;
  392. if (size == 0)
  393. {
  394. /* Hit the read target, cool. */
  395. return num_read;
  396. }
  397. }
  398. }
  399. int
  400. vsf_sysutil_write_loop(const int fd, const void* p_buf, unsigned int size)
  401. {
  402. int retval;
  403. int num_written = 0;
  404. if (size > INT_MAX)
  405. {
  406. die("size too big in sysutil_write_loop");
  407. }
  408. while (1)
  409. {
  410. retval = vsf_sysutil_write(fd, (const char*)p_buf + num_written, size);
  411. if (retval < 0)
  412. {
  413. /* Error */
  414. return retval;
  415. }
  416. else if (retval == 0)
  417. {
  418. /* Written all we're going to write.. */
  419. return num_written;
  420. }
  421. if ((unsigned int) retval > size)
  422. {
  423. die("retval too big in sysutil_write_loop");
  424. }
  425. num_written += retval;
  426. size -= (unsigned int) retval;
  427. if (size == 0)
  428. {
  429. /* Hit the write target, cool. */
  430. return num_written;
  431. }
  432. }
  433. }
  434. filesize_t
  435. vsf_sysutil_get_file_offset(const int file_fd)
  436. {
  437. filesize_t retval = lseek(file_fd, 0, SEEK_CUR);
  438. if (retval < 0)
  439. {
  440. die("lseek");
  441. }
  442. return retval;
  443. }
  444. void
  445. vsf_sysutil_lseek_to(const int fd, filesize_t seek_pos)
  446. {
  447. filesize_t retval;
  448. if (seek_pos < 0)
  449. {
  450. die("negative seek_pos in sysutil_lseek_to");
  451. }
  452. retval = lseek(fd, seek_pos, SEEK_SET);
  453. if (retval < 0)
  454. {
  455. die("lseek");
  456. }
  457. }
  458. void
  459. vsf_sysutil_lseek_end(const int fd)
  460. {
  461. filesize_t retval;
  462. retval = lseek(fd, 0, SEEK_END);
  463. if (retval < 0)
  464. {
  465. die("lseek");
  466. }
  467. }
  468. void*
  469. vsf_sysutil_malloc(unsigned int size)
  470. {
  471. void* p_ret;
  472. /* Paranoia - what if we got an integer overflow/underflow? */
  473. if (size == 0 || size > INT_MAX)
  474. {
  475. bug("zero or big size in sysutil_malloc");
  476. }
  477. p_ret = malloc(size);
  478. if (p_ret == NULL)
  479. {
  480. die("malloc");
  481. }
  482. return p_ret;
  483. }
  484. void*
  485. vsf_sysutil_realloc(void* p_ptr, unsigned int size)
  486. {
  487. void* p_ret;
  488. if (size == 0 || size > INT_MAX)
  489. {
  490. bug("zero or big size in sysutil_realloc");
  491. }
  492. p_ret = realloc(p_ptr, size);
  493. if (p_ret == NULL)
  494. {
  495. die("realloc");
  496. }
  497. return p_ret;
  498. }
  499. void
  500. vsf_sysutil_free(void* p_ptr)
  501. {
  502. if (p_ptr == NULL)
  503. {
  504. bug("sysutil_free got a null pointer");
  505. }
  506. free(p_ptr);
  507. }
  508. unsigned int
  509. vsf_sysutil_getpid(void)
  510. {
  511. if (s_current_pid == -1)
  512. {
  513. s_current_pid = vsf_sysutil_getpid_nocache();
  514. }
  515. return (unsigned int) s_current_pid;
  516. }
  517. int
  518. vsf_sysutil_fork(void)
  519. {
  520. int retval = vsf_sysutil_fork_failok();
  521. if (retval < 0)
  522. {
  523. die("fork");
  524. }
  525. return retval;
  526. }
  527. int
  528. vsf_sysutil_fork_failok(void)
  529. {
  530. int retval;
  531. retval = fork();
  532. if (retval == 0)
  533. {
  534. vsf_sysutil_post_fork();
  535. }
  536. return retval;
  537. }
  538. void
  539. vsf_sysutil_set_exit_func(exitfunc_t exitfunc)
  540. {
  541. s_exit_func = exitfunc;
  542. }
  543. void
  544. vsf_sysutil_exit(int exit_code)
  545. {
  546. if (s_exit_func)
  547. {
  548. exitfunc_t curr_func = s_exit_func;
  549. /* Prevent recursion */
  550. s_exit_func = 0;
  551. (*curr_func)();
  552. }
  553. _exit(exit_code);
  554. }
  555. struct vsf_sysutil_wait_retval
  556. vsf_sysutil_wait(void)
  557. {
  558. struct vsf_sysutil_wait_retval retval;
  559. vsf_sysutil_memclr(&retval, sizeof(retval));
  560. while (1)
  561. {
  562. int sys_ret = wait(&retval.exit_status);
  563. if (sys_ret < 0 && errno == EINTR)
  564. {
  565. vsf_sysutil_check_pending_actions(kVSFSysUtilUnknown, 0, 0);
  566. continue;
  567. }
  568. retval.syscall_retval = sys_ret;
  569. return retval;
  570. }
  571. }
  572. int
  573. vsf_sysutil_wait_reap_one(void)
  574. {
  575. int retval = waitpid(-1, NULL, WNOHANG);
  576. if (retval == 0 || (retval < 0 && errno == ECHILD))
  577. {
  578. /* No more children */
  579. return 0;
  580. }
  581. if (retval < 0)
  582. {
  583. die("waitpid");
  584. }
  585. /* Got one */
  586. return retval;
  587. }
  588. int
  589. vsf_sysutil_wait_get_retval(const struct vsf_sysutil_wait_retval* p_waitret)
  590. {
  591. return p_waitret->syscall_retval;
  592. }
  593. int
  594. vsf_sysutil_wait_exited_normally(
  595. const struct vsf_sysutil_wait_retval* p_waitret)
  596. {
  597. int status = ((struct vsf_sysutil_wait_retval*) p_waitret)->exit_status;
  598. return WIFEXITED(status);
  599. }
  600. int
  601. vsf_sysutil_wait_get_exitcode(const struct vsf_sysutil_wait_retval* p_waitret)
  602. {
  603. int status;
  604. if (!vsf_sysutil_wait_exited_normally(p_waitret))
  605. {
  606. bug("not a normal exit in sysutil_wait_get_exitcode");
  607. }
  608. status = ((struct vsf_sysutil_wait_retval*) p_waitret)->exit_status;
  609. return WEXITSTATUS(status);
  610. }
  611. void
  612. vsf_sysutil_activate_keepalive(int fd)
  613. {
  614. int keepalive = 1;
  615. int retval = setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &keepalive,
  616. sizeof(keepalive));
  617. if (retval != 0)
  618. {
  619. die("setsockopt: keepalive");
  620. }
  621. }
  622. void
  623. vsf_sysutil_activate_reuseaddr(int fd)
  624. {
  625. int reuseaddr = 1;
  626. int retval = setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &reuseaddr,
  627. sizeof(reuseaddr));
  628. if (retval != 0)
  629. {
  630. die("setsockopt: reuseaddr");
  631. }
  632. }
  633. void
  634. vsf_sysutil_set_nodelay(int fd)
  635. {
  636. int nodelay = 1;
  637. int retval = setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &nodelay,
  638. sizeof(nodelay));
  639. if (retval != 0)
  640. {
  641. die("setsockopt: nodelay");
  642. }
  643. }
  644. void
  645. vsf_sysutil_activate_sigurg(int fd)
  646. {
  647. int retval = fcntl(fd, F_SETOWN, vsf_sysutil_getpid());
  648. if (retval != 0)
  649. {
  650. die("fcntl");
  651. }
  652. }
  653. void
  654. vsf_sysutil_activate_oobinline(int fd)
  655. {
  656. int oob_inline = 1;
  657. int retval = setsockopt(fd, SOL_SOCKET, SO_OOBINLINE, &oob_inline,
  658. sizeof(oob_inline));
  659. if (retval != 0)
  660. {
  661. die("setsockopt: oobinline");
  662. }
  663. }
  664. void
  665. vsf_sysutil_set_iptos_throughput(int fd)
  666. {
  667. int tos = IPTOS_THROUGHPUT;
  668. /* Ignore failure to set (maybe this IP stack demands privilege for this) */
  669. (void) setsockopt(fd, IPPROTO_IP, IP_TOS, &tos, sizeof(tos));
  670. }
  671. void
  672. vsf_sysutil_activate_linger(int fd)
  673. {
  674. int retval;
  675. struct linger the_linger;
  676. vsf_sysutil_memclr(&the_linger, sizeof(the_linger));
  677. the_linger.l_onoff = 1;
  678. the_linger.l_linger = 60 * 10;
  679. retval = setsockopt(fd, SOL_SOCKET, SO_LINGER, &the_linger,
  680. sizeof(the_linger));
  681. if (retval != 0)
  682. {
  683. die("setsockopt: linger");
  684. }
  685. }
  686. void
  687. vsf_sysutil_deactivate_linger_failok(int fd)
  688. {
  689. struct linger the_linger;
  690. the_linger.l_onoff = 0;
  691. the_linger.l_linger = 0;
  692. (void) setsockopt(fd, SOL_SOCKET, SO_LINGER, &the_linger, sizeof(the_linger));
  693. }
  694. void
  695. vsf_sysutil_activate_noblock(int fd)
  696. {
  697. int retval;
  698. int curr_flags = fcntl(fd, F_GETFL);
  699. if (vsf_sysutil_retval_is_error(curr_flags))
  700. {
  701. die("fcntl");
  702. }
  703. curr_flags |= O_NONBLOCK;
  704. retval = fcntl(fd, F_SETFL, curr_flags);
  705. if (retval != 0)
  706. {
  707. die("fcntl");
  708. }
  709. }
  710. void
  711. vsf_sysutil_deactivate_noblock(int fd)
  712. {
  713. int retval;
  714. int curr_flags = fcntl(fd, F_GETFL);
  715. if (vsf_sysutil_retval_is_error(curr_flags))
  716. {
  717. die("fcntl");
  718. }
  719. curr_flags &= ~O_NONBLOCK;
  720. retval = fcntl(fd, F_SETFL, curr_flags);
  721. if (retval != 0)
  722. {
  723. die("fcntl");
  724. }
  725. }
  726. int
  727. vsf_sysutil_recv_peek(const int fd, void* p_buf, unsigned int len)
  728. {
  729. while (1)
  730. {
  731. int retval = recv(fd, p_buf, len, MSG_PEEK);
  732. int saved_errno = errno;
  733. vsf_sysutil_check_pending_actions(kVSFSysUtilIO, retval, fd);
  734. if (retval < 0 && saved_errno == EINTR)
  735. {
  736. continue;
  737. }
  738. return retval;
  739. }
  740. }
  741. int
  742. vsf_sysutil_atoi(const char* p_str)
  743. {
  744. return atoi(p_str);
  745. }
  746. filesize_t
  747. vsf_sysutil_a_to_filesize_t(const char* p_str)
  748. {
  749. /* atoll() is C99 standard - but even modern FreeBSD, OpenBSD don't have
  750. * it, so we'll supply our own
  751. */
  752. filesize_t result = 0;
  753. filesize_t mult = 1;
  754. unsigned int len = vsf_sysutil_strlen(p_str);
  755. unsigned int i;
  756. /* Bail if the number is excessively big (petabytes!) */
  757. if (len > 15)
  758. {
  759. return 0;
  760. }
  761. for (i=0; i<len; ++i)
  762. {
  763. char the_char = p_str[len-(i+1)];
  764. filesize_t val;
  765. if (the_char < '0' || the_char > '9')
  766. {
  767. return 0;
  768. }
  769. val = the_char - '0';
  770. val *= mult;
  771. result += val;
  772. mult *= 10;
  773. }
  774. return result;
  775. }
  776. const char*
  777. vsf_sysutil_ulong_to_str(unsigned long the_ulong)
  778. {
  779. static char ulong_buf[32];
  780. (void) snprintf(ulong_buf, sizeof(ulong_buf), "%lu", the_ulong);
  781. return ulong_buf;
  782. }
  783. const char*
  784. vsf_sysutil_filesize_t_to_str(filesize_t the_filesize)
  785. {
  786. static char filesize_buf[32];
  787. if (sizeof(long) == 8)
  788. {
  789. /* Avoid using non-standard %ll if we can */
  790. (void) snprintf(filesize_buf, sizeof(filesize_buf), "%ld",
  791. (long) the_filesize);
  792. }
  793. else
  794. {
  795. (void) snprintf(filesize_buf, sizeof(filesize_buf), "%lld", the_filesize);
  796. }
  797. return filesize_buf;
  798. }
  799. const char*
  800. vsf_sysutil_double_to_str(double the_double)
  801. {
  802. static char double_buf[32];
  803. (void) snprintf(double_buf, sizeof(double_buf), "%.2f", the_double);
  804. return double_buf;
  805. }
  806. const char*
  807. vsf_sysutil_uint_to_octal(unsigned int the_uint)
  808. {
  809. static char octal_buf[32];
  810. if (the_uint == 0)
  811. {
  812. octal_buf[0] = '0';
  813. octal_buf[1] = '\0';
  814. }
  815. else
  816. {
  817. (void) snprintf(octal_buf, sizeof(octal_buf), "0%o", the_uint);
  818. }
  819. return octal_buf;
  820. }
  821. unsigned int
  822. vsf_sysutil_octal_to_uint(const char* p_str)
  823. {
  824. /* NOTE - avoiding using sscanf() parser */
  825. unsigned int result = 0;
  826. int seen_non_zero_digit = 0;
  827. while (*p_str != '\0')
  828. {
  829. int digit = *p_str;
  830. if (!isdigit(digit) || digit > '7')
  831. {
  832. break;
  833. }
  834. if (digit != '0')
  835. {
  836. seen_non_zero_digit = 1;
  837. }
  838. if (seen_non_zero_digit)
  839. {
  840. result <<= 3;
  841. result += (digit - '0');
  842. }
  843. p_str++;
  844. }
  845. return result;
  846. }
  847. int
  848. vsf_sysutil_toupper(int the_char)
  849. {
  850. return toupper((unsigned char) the_char);
  851. }
  852. int
  853. vsf_sysutil_isspace(int the_char)
  854. {
  855. return isspace((unsigned char) the_char);
  856. }
  857. int
  858. vsf_sysutil_isprint(int the_char)
  859. {
  860. /* From Solar - we know better than some libc's! Don't let any potential
  861. * control chars through
  862. */
  863. unsigned char uc = (unsigned char) the_char;
  864. if (uc <= 31)
  865. {
  866. return 0;
  867. }
  868. if (uc == 177)
  869. {
  870. return 0;
  871. }
  872. if (uc >= 128 && uc <= 159)
  873. {
  874. return 0;
  875. }
  876. return isprint(the_char);
  877. }
  878. int
  879. vsf_sysutil_isalnum(int the_char)
  880. {
  881. return isalnum((unsigned char) the_char);
  882. }
  883. int
  884. vsf_sysutil_isdigit(int the_char)
  885. {
  886. return isdigit((unsigned char) the_char);
  887. }
  888. char*
  889. vsf_sysutil_getcwd(char* p_dest, const unsigned int buf_size)
  890. {
  891. char* p_retval;
  892. if (buf_size == 0) {
  893. return p_dest;
  894. }
  895. p_retval = getcwd(p_dest, buf_size);
  896. p_dest[buf_size - 1] = '\0';
  897. return p_retval;
  898. }
  899. int
  900. vsf_sysutil_mkdir(const char* p_dirname, const unsigned int mode)
  901. {
  902. return mkdir(p_dirname, mode);
  903. }
  904. int
  905. vsf_sysutil_rmdir(const char* p_dirname)
  906. {
  907. return rmdir(p_dirname);
  908. }
  909. int
  910. vsf_sysutil_chdir(const char* p_dirname)
  911. {
  912. return chdir(p_dirname);
  913. }
  914. int
  915. vsf_sysutil_rename(const char* p_from, const char* p_to)
  916. {
  917. return rename(p_from, p_to);
  918. }
  919. struct vsf_sysutil_dir*
  920. vsf_sysutil_opendir(const char* p_dirname)
  921. {
  922. return (struct vsf_sysutil_dir*) opendir(p_dirname);
  923. }
  924. void
  925. vsf_sysutil_closedir(struct vsf_sysutil_dir* p_dir)
  926. {
  927. DIR* p_real_dir = (DIR*) p_dir;
  928. int retval = closedir(p_real_dir);
  929. if (retval != 0)
  930. {
  931. die("closedir");
  932. }
  933. }
  934. const char*
  935. vsf_sysutil_next_dirent(struct vsf_sysutil_dir* p_dir)
  936. {
  937. DIR* p_real_dir = (DIR*) p_dir;
  938. struct dirent* p_dirent = readdir(p_real_dir);
  939. if (p_dirent == NULL)
  940. {
  941. return NULL;
  942. }
  943. return p_dirent->d_name;
  944. }
  945. unsigned int
  946. vsf_sysutil_strlen(const char* p_text)
  947. {
  948. size_t ret = strlen(p_text);
  949. /* A defense in depth measure. */
  950. if (ret > INT_MAX / 8)
  951. {
  952. die("string suspiciously long");
  953. }
  954. return (unsigned int) ret;
  955. }
  956. char*
  957. vsf_sysutil_strdup(const char* p_str)
  958. {
  959. return strdup(p_str);
  960. }
  961. void
  962. vsf_sysutil_memclr(void* p_dest, unsigned int size)
  963. {
  964. /* Safety */
  965. if (size == 0)
  966. {
  967. return;
  968. }
  969. memset(p_dest, '\0', size);
  970. }
  971. void
  972. vsf_sysutil_memcpy(void* p_dest, const void* p_src, const unsigned int size)
  973. {
  974. /* Safety */
  975. if (size == 0)
  976. {
  977. return;
  978. }
  979. /* Defense in depth */
  980. if (size > INT_MAX)
  981. {
  982. die("possible negative value to memcpy?");
  983. }
  984. memcpy(p_dest, p_src, size);
  985. }
  986. void
  987. vsf_sysutil_strcpy(char* p_dest, const char* p_src, unsigned int maxsize)
  988. {
  989. if (maxsize == 0)
  990. {
  991. return;
  992. }
  993. strncpy(p_dest, p_src, maxsize);
  994. p_dest[maxsize - 1] = '\0';
  995. }
  996. int
  997. vsf_sysutil_memcmp(const void* p_src1, const void* p_src2, unsigned int size)
  998. {
  999. /* Safety */
  1000. if (size == 0)
  1001. {
  1002. return 0;
  1003. }
  1004. return memcmp(p_src1, p_src2, size);
  1005. }
  1006. int
  1007. vsf_sysutil_strcmp(const char* p_src1, const char* p_src2)
  1008. {
  1009. return strcmp(p_src1, p_src2);
  1010. }
  1011. unsigned int
  1012. vsf_sysutil_getpagesize(void)
  1013. {
  1014. static unsigned int s_page_size;
  1015. if (s_page_size == 0)
  1016. {
  1017. s_page_size = getpagesize();
  1018. if (s_page_size == 0)
  1019. {
  1020. die("getpagesize");
  1021. }
  1022. }
  1023. return s_page_size;
  1024. }
  1025. static int
  1026. vsf_sysutil_translate_memprot(const enum EVSFSysUtilMapPermission perm)
  1027. {
  1028. int retval = 0;
  1029. switch (perm)
  1030. {
  1031. case kVSFSysUtilMapProtReadOnly:
  1032. retval = PROT_READ;
  1033. break;
  1034. case kVSFSysUtilMapProtNone:
  1035. retval = PROT_NONE;
  1036. break;
  1037. default:
  1038. bug("bad value in sysutil_translate_memprot");
  1039. break;
  1040. }
  1041. return retval;
  1042. }
  1043. void
  1044. vsf_sysutil_memprotect(void* p_addr, unsigned int len,
  1045. const enum EVSFSysUtilMapPermission perm)
  1046. {
  1047. int prot = vsf_sysutil_translate_memprot(perm);
  1048. int retval = mprotect(p_addr, len, prot);
  1049. if (retval != 0)
  1050. {
  1051. die("mprotect");
  1052. }
  1053. }
  1054. void
  1055. vsf_sysutil_memunmap(void* p_start, unsigned int length)
  1056. {
  1057. int retval = munmap(p_start, length);
  1058. if (retval != 0)
  1059. {
  1060. die("munmap");
  1061. }
  1062. }
  1063. static int
  1064. vsf_sysutil_translate_openmode(const enum EVSFSysUtilOpenMode mode)
  1065. {
  1066. int retval = 0;
  1067. switch (mode)
  1068. {
  1069. case kVSFSysUtilOpenReadOnly:
  1070. retval = O_RDONLY;
  1071. break;
  1072. case kVSFSysUtilOpenWriteOnly:
  1073. retval = O_WRONLY;
  1074. break;
  1075. case kVSFSysUtilOpenReadWrite:
  1076. retval = O_RDWR;
  1077. break;
  1078. default:
  1079. bug("bad mode in sysutil_translate_openmode");
  1080. break;
  1081. }
  1082. return retval;
  1083. }
  1084. int
  1085. vsf_sysutil_open_file(const char* p_filename,
  1086. const enum EVSFSysUtilOpenMode mode)
  1087. {
  1088. return open(p_filename, vsf_sysutil_translate_openmode(mode) | O_NONBLOCK);
  1089. }
  1090. int
  1091. vsf_sysutil_create_file_exclusive(const char* p_filename)
  1092. {
  1093. /* umask() also contributes to end mode */
  1094. return open(p_filename, O_CREAT | O_EXCL | O_WRONLY | O_APPEND,
  1095. tunable_file_open_mode);
  1096. }
  1097. int
  1098. vsf_sysutil_create_or_open_file(const char* p_filename, unsigned int mode)
  1099. {
  1100. return open(p_filename, O_CREAT | O_WRONLY | O_NONBLOCK, mode);
  1101. }
  1102. int
  1103. vsf_sysutil_create_or_open_file_append(const char* p_filename,
  1104. unsigned int mode)
  1105. {
  1106. return open(p_filename, O_CREAT | O_WRONLY | O_NONBLOCK | O_APPEND, mode);
  1107. }
  1108. void
  1109. vsf_sysutil_dupfd2(int old_fd, int new_fd)
  1110. {
  1111. int retval;
  1112. if (old_fd == new_fd)
  1113. {
  1114. return;
  1115. }
  1116. retval = dup2(old_fd, new_fd);
  1117. if (retval != new_fd)
  1118. {
  1119. die("dup2");
  1120. }
  1121. }
  1122. void
  1123. vsf_sysutil_close(int fd)
  1124. {
  1125. while (1)
  1126. {
  1127. int retval = close(fd);
  1128. if (retval != 0)
  1129. {
  1130. if (errno == EINTR)
  1131. {
  1132. vsf_sysutil_check_pending_actions(kVSFSysUtilUnknown, 0, 0);
  1133. continue;
  1134. }
  1135. die("close");
  1136. }
  1137. return;
  1138. }
  1139. }
  1140. int
  1141. vsf_sysutil_close_failok(int fd)
  1142. {
  1143. return close(fd);
  1144. }
  1145. int
  1146. vsf_sysutil_unlink(const char* p_dead)
  1147. {
  1148. return unlink(p_dead);
  1149. }
  1150. int
  1151. vsf_sysutil_write_access(const char* p_filename)
  1152. {
  1153. int retval = access(p_filename, W_OK);
  1154. return (retval == 0);
  1155. }
  1156. static void
  1157. vsf_sysutil_alloc_statbuf(struct vsf_sysutil_statbuf** p_ptr)
  1158. {
  1159. if (*p_ptr == NULL)
  1160. {
  1161. *p_ptr = vsf_sysutil_malloc(sizeof(struct stat));
  1162. }
  1163. }
  1164. void
  1165. vsf_sysutil_fstat(int fd, struct vsf_sysutil_statbuf** p_ptr)
  1166. {
  1167. int retval;
  1168. vsf_sysutil_alloc_statbuf(p_ptr);
  1169. retval = fstat(fd, (struct stat*) (*p_ptr));
  1170. if (retval != 0)
  1171. {
  1172. die("fstat");
  1173. }
  1174. }
  1175. int
  1176. vsf_sysutil_stat(const char* p_name, struct vsf_sysutil_statbuf** p_ptr)
  1177. {
  1178. vsf_sysutil_alloc_statbuf(p_ptr);
  1179. return stat(p_name, (struct stat*) (*p_ptr));
  1180. }
  1181. int
  1182. vsf_sysutil_lstat(const char* p_name, struct vsf_sysutil_statbuf** p_ptr)
  1183. {
  1184. vsf_sysutil_alloc_statbuf(p_ptr);
  1185. return lstat(p_name, (struct stat*) (*p_ptr));
  1186. }
  1187. void
  1188. vsf_sysutil_dir_stat(const struct vsf_sysutil_dir* p_dir,
  1189. struct vsf_sysutil_statbuf** p_ptr)
  1190. {
  1191. int fd = dirfd((DIR*) p_dir);
  1192. vsf_sysutil_fstat(fd, p_ptr);
  1193. }
  1194. int
  1195. vsf_sysutil_statbuf_is_regfile(const struct vsf_sysutil_statbuf* p_stat)
  1196. {
  1197. const struct stat* p_realstat = (const struct stat*) p_stat;
  1198. return S_ISREG(p_realstat->st_mode);
  1199. }
  1200. int
  1201. vsf_sysutil_statbuf_is_symlink(const struct vsf_sysutil_statbuf* p_stat)
  1202. {
  1203. const struct stat* p_realstat = (const struct stat*) p_stat;
  1204. return S_ISLNK(p_realstat->st_mode);
  1205. }
  1206. int
  1207. vsf_sysutil_statbuf_is_socket(const struct vsf_sysutil_statbuf* p_stat)
  1208. {
  1209. const struct stat* p_realstat = (const struct stat*) p_stat;
  1210. return S_ISSOCK(p_realstat->st_mode);
  1211. }
  1212. int
  1213. vsf_sysutil_statbuf_is_dir(const struct vsf_sysutil_statbuf* p_stat)
  1214. {
  1215. const struct stat* p_realstat = (const struct stat*) p_stat;
  1216. return S_ISDIR(p_realstat->st_mode);
  1217. }
  1218. const char*
  1219. vsf_sysutil_statbuf_get_perms(const struct vsf_sysutil_statbuf* p_statbuf)
  1220. {
  1221. static char perms[11];
  1222. int i;
  1223. const struct stat* p_stat = (const struct stat*) p_statbuf;
  1224. for (i=0; i<10; i++)
  1225. {
  1226. perms[i] = '-';
  1227. }
  1228. perms[0] = '?';
  1229. switch (p_stat->st_mode & S_IFMT)
  1230. {
  1231. case S_IFREG: perms[0] = '-'; break;
  1232. case S_IFDIR: perms[0] = 'd'; break;
  1233. case S_IFLNK: perms[0] = 'l'; break;
  1234. case S_IFIFO: perms[0] = 'p'; break;
  1235. case S_IFSOCK: perms[0] = 's'; break;
  1236. case S_IFCHR: perms[0] = 'c'; break;
  1237. case S_IFBLK: perms[0] = 'b'; break;
  1238. default: break;
  1239. }
  1240. if (p_stat->st_mode & S_IRUSR) perms[1] = 'r';
  1241. if (p_stat->st_mode & S_IWUSR) perms[2] = 'w';
  1242. if (p_stat->st_mode & S_IXUSR) perms[3] = 'x';
  1243. if (p_stat->st_mode & S_IRGRP) perms[4] = 'r';
  1244. if (p_stat->st_mode & S_IWGRP) perms[5] = 'w';
  1245. if (p_stat->st_mode & S_IXGRP) perms[6] = 'x';
  1246. if (p_stat->st_mode & S_IROTH) perms[7] = 'r';
  1247. if (p_stat->st_mode & S_IWOTH) perms[8] = 'w';
  1248. if (p_stat->st_mode & S_IXOTH) perms[9] = 'x';
  1249. if (p_stat->st_mode & S_ISUID) perms[3] = (perms[3] == 'x') ? 's' : 'S';
  1250. if (p_stat->st_mode & S_ISGID) perms[6] = (perms[6] == 'x') ? 's' : 'S';
  1251. if (p_stat->st_mode & S_ISVTX) perms[9] = (perms[9] == 'x') ? 't' : 'T';
  1252. perms[10] = '\0';
  1253. return perms;
  1254. }
  1255. const char*
  1256. vsf_sysutil_statbuf_get_date(const struct vsf_sysutil_statbuf* p_statbuf,
  1257. int use_localtime, long curr_time)
  1258. {
  1259. static char datebuf[64];
  1260. int retval;
  1261. struct tm* p_tm;
  1262. const struct stat* p_stat = (const struct stat*) p_statbuf;
  1263. const char* p_date_format = "%b %d %H:%M";
  1264. if (!use_localtime)
  1265. {
  1266. p_tm = gmtime(&p_stat->st_mtime);
  1267. }
  1268. else
  1269. {
  1270. p_tm = localtime(&p_stat->st_mtime);
  1271. }
  1272. /* Is this a future or 6 months old date? If so, we drop to year format */
  1273. if (p_stat->st_mtime > curr_time ||
  1274. (curr_time - p_stat->st_mtime) > 60*60*24*182)
  1275. {
  1276. p_date_format = "%b %d %Y";
  1277. }
  1278. retval = strftime(datebuf, sizeof(datebuf), p_date_format, p_tm);
  1279. datebuf[sizeof(datebuf)-1] = '\0';
  1280. if (retval == 0)
  1281. {
  1282. die("strftime");
  1283. }
  1284. return datebuf;
  1285. }
  1286. const char*
  1287. vsf_sysutil_statbuf_get_numeric_date(
  1288. const struct vsf_sysutil_statbuf* p_statbuf,
  1289. int use_localtime)
  1290. {
  1291. static char datebuf[15];
  1292. const struct stat* p_stat = (const struct stat*) p_statbuf;
  1293. struct tm* p_tm;
  1294. int retval;
  1295. if (!use_localtime)
  1296. {
  1297. p_tm = gmtime(&p_stat->st_mtime);
  1298. }
  1299. else
  1300. {
  1301. p_tm = localtime(&p_stat->st_mtime);
  1302. }
  1303. retval = strftime(datebuf, sizeof(datebuf), "%Y%m%d%H%M%S", p_tm);
  1304. if (retval == 0)
  1305. {
  1306. die("strftime");
  1307. }
  1308. return datebuf;
  1309. }
  1310. filesize_t
  1311. vsf_sysutil_statbuf_get_size(const struct vsf_sysutil_statbuf* p_statbuf)
  1312. {
  1313. const struct stat* p_stat = (const struct stat*) p_statbuf;
  1314. if (p_stat->st_size < 0)
  1315. {
  1316. die("invalid inode size in vsf_sysutil_statbuf_get_size");
  1317. }
  1318. return p_stat->st_size;
  1319. }
  1320. int
  1321. vsf_sysutil_statbuf_get_uid(const struct vsf_sysutil_statbuf* p_statbuf)
  1322. {
  1323. const struct stat* p_stat = (const struct stat*) p_statbuf;
  1324. return p_stat->st_uid;
  1325. }
  1326. int
  1327. vsf_sysutil_statbuf_get_gid(const struct vsf_sysutil_statbuf* p_statbuf)
  1328. {
  1329. const struct stat* p_stat = (const struct stat*) p_statbuf;
  1330. return p_stat->st_gid;
  1331. }
  1332. unsigned int
  1333. vsf_sysutil_statbuf_get_links(const struct vsf_sysutil_statbuf* p_statbuf)
  1334. {
  1335. const struct stat* p_stat = (const struct stat*) p_statbuf;
  1336. return p_stat->st_nlink;
  1337. }
  1338. int
  1339. vsf_sysutil_statbuf_is_readable_other(
  1340. const struct vsf_sysutil_statbuf* p_statbuf)
  1341. {
  1342. const struct stat* p_stat = (const struct stat*) p_statbuf;
  1343. if (p_stat->st_mode & S_IROTH)
  1344. {
  1345. return 1;
  1346. }
  1347. return 0;
  1348. }
  1349. const char*
  1350. vsf_sysutil_statbuf_get_sortkey_mtime(
  1351. const struct vsf_sysutil_statbuf* p_statbuf)
  1352. {
  1353. static char intbuf[32];
  1354. const struct stat* p_stat = (const struct stat*) p_statbuf;
  1355. /* This slight hack function must return a character date format such that
  1356. * more recent dates appear later in the alphabet! Most notably, we must
  1357. * make sure we pad to the same length with 0's
  1358. */
  1359. snprintf(intbuf, sizeof(intbuf), "%030ld", (long) p_stat->st_mtime);
  1360. return intbuf;
  1361. }
  1362. void
  1363. vsf_sysutil_fchown(const int fd, const int uid, const int gid)
  1364. {
  1365. if (fchown(fd, uid, gid) != 0)
  1366. {
  1367. die("fchown");
  1368. }
  1369. }
  1370. void
  1371. vsf_sysutil_fchmod(const int fd, unsigned int mode)
  1372. {
  1373. mode = mode & 0777;
  1374. if (fchmod(fd, mode))
  1375. {
  1376. die("fchmod");
  1377. }
  1378. }
  1379. int
  1380. vsf_sysutil_chmod(const char* p_filename, unsigned int mode)
  1381. {
  1382. /* Safety: mask "mode" to just access permissions, e.g. no suid setting! */
  1383. mode = mode & 0777;
  1384. return chmod(p_filename, mode);
  1385. }
  1386. int
  1387. vsf_sysutil_lock_file_write(int fd)
  1388. {
  1389. return lock_internal(fd, F_WRLCK);
  1390. }
  1391. int
  1392. vsf_sysutil_lock_file_read(int fd)
  1393. {
  1394. return lock_internal(fd, F_RDLCK);
  1395. }
  1396. static int
  1397. lock_internal(int fd, int lock_type)
  1398. {
  1399. struct flock the_lock;
  1400. int retval;
  1401. int saved_errno;
  1402. vsf_sysutil_memclr(&the_lock, sizeof(the_lock));
  1403. the_lock.l_type = lock_type;
  1404. the_lock.l_whence = SEEK_SET;
  1405. the_lock.l_start = 0;
  1406. the_lock.l_len = 0;
  1407. do
  1408. {
  1409. retval = fcntl(fd, F_SETLKW, &the_lock);
  1410. saved_errno = errno;
  1411. vsf_sysutil_check_pending_actions(kVSFSysUtilUnknown, 0, 0);
  1412. }
  1413. while (retval < 0 && saved_errno == EINTR);
  1414. return retval;
  1415. }
  1416. void
  1417. vsf_sysutil_unlock_file(int fd)
  1418. {
  1419. int retval;
  1420. struct flock the_lock;
  1421. vsf_sysutil_memclr(&the_lock, sizeof(the_lock));
  1422. the_lock.l_type = F_UNLCK;
  1423. the_lock.l_whence = SEEK_SET;
  1424. the_lock.l_start = 0;
  1425. the_lock.l_len = 0;
  1426. retval = fcntl(fd, F_SETLK, &the_lock);
  1427. if (retval != 0)
  1428. {
  1429. die("fcntl");
  1430. }
  1431. }
  1432. int
  1433. vsf_sysutil_readlink(const char* p_filename, char* p_dest, unsigned int bufsiz)
  1434. {
  1435. int retval;
  1436. if (bufsiz == 0) {
  1437. return -1;
  1438. }
  1439. retval = readlink(p_filename, p_dest, bufsiz - 1);
  1440. if (retval < 0)
  1441. {
  1442. return retval;
  1443. }
  1444. /* Ensure buffer is NULL terminated; readlink(2) doesn't do that */
  1445. p_dest[retval] = '\0';
  1446. return retval;
  1447. }
  1448. int
  1449. vsf_sysutil_retval_is_error(int retval)
  1450. {
  1451. if (retval < 0)
  1452. {
  1453. return 1;
  1454. }
  1455. return 0;
  1456. }
  1457. enum EVSFSysUtilError
  1458. vsf_sysutil_get_error(void)
  1459. {
  1460. enum EVSFSysUtilError retval = kVSFSysUtilErrUnknown;
  1461. switch (errno)
  1462. {
  1463. case EADDRINUSE:
  1464. retval = kVSFSysUtilErrADDRINUSE;
  1465. break;
  1466. case ENOSYS:
  1467. retval = kVSFSysUtilErrNOSYS;
  1468. break;
  1469. case EINTR:
  1470. retval = kVSFSysUtilErrINTR;
  1471. break;
  1472. case EINVAL:
  1473. retval = kVSFSysUtilErrINVAL;
  1474. break;
  1475. case EOPNOTSUPP:
  1476. retval = kVSFSysUtilErrOPNOTSUPP;
  1477. break;
  1478. case EACCES:
  1479. retval = kVSFSysUtilErrACCES;
  1480. break;
  1481. case ENOENT:
  1482. retval = kVSFSysUtilErrNOENT;
  1483. break;
  1484. default:
  1485. break;
  1486. }
  1487. return retval;
  1488. }
  1489. int
  1490. vsf_sysutil_get_ipv4_sock(void)
  1491. {
  1492. int retval = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP);
  1493. if (retval < 0)
  1494. {
  1495. die("socket");
  1496. }
  1497. return retval;
  1498. }
  1499. int
  1500. vsf_sysutil_get_ipv6_sock(void)
  1501. {
  1502. int retval = socket(PF_INET6, SOCK_STREAM, IPPROTO_TCP);
  1503. if (retval < 0)
  1504. {
  1505. die("socket");
  1506. }
  1507. return retval;
  1508. }
  1509. struct vsf_sysutil_socketpair_retval
  1510. vsf_sysutil_unix_stream_socketpair(void)
  1511. {
  1512. struct vsf_sysutil_socketpair_retval retval;
  1513. int the_sockets[2];
  1514. int sys_retval = socketpair(PF_UNIX, SOCK_STREAM, 0, the_sockets);
  1515. if (sys_retval != 0)
  1516. {
  1517. die("socketpair");
  1518. }
  1519. retval.socket_one = the_sockets[0];
  1520. retval.socket_two = the_sockets[1];
  1521. return retval;
  1522. }
  1523. int
  1524. vsf_sysutil_bind(int fd, const struct vsf_sysutil_sockaddr* p_sockptr)
  1525. {
  1526. const struct sockaddr* p_sockaddr = &p_sockptr->u.u_sockaddr;
  1527. int len = 0;
  1528. if (p_sockaddr->sa_family == AF_INET)
  1529. {
  1530. len = sizeof(struct sockaddr_in);
  1531. }
  1532. else if (p_sockaddr->sa_family == AF_INET6)
  1533. {
  1534. len = sizeof(struct sockaddr_in6);
  1535. }
  1536. else
  1537. {
  1538. die("can only support ipv4 and ipv6 currently");
  1539. }
  1540. return bind(fd, p_sockaddr, len);
  1541. }
  1542. int
  1543. vsf_sysutil_listen(int fd, const unsigned int backlog)
  1544. {
  1545. int retval = listen(fd, backlog);
  1546. if (vsf_sysutil_retval_is_error(retval) &&
  1547. vsf_sysutil_get_error() != kVSFSysUtilErrADDRINUSE)
  1548. {
  1549. die("listen");
  1550. }
  1551. return retval;
  1552. }
  1553. /* Warning: callers of this function assume it does NOT make use of any
  1554. * non re-entrant calls such as malloc().
  1555. */
  1556. int
  1557. vsf_sysutil_accept_timeout(int fd, struct vsf_sysutil_sockaddr* p_sockaddr,
  1558. unsigned int wait_seconds)
  1559. {
  1560. struct vsf_sysutil_sockaddr remote_addr;
  1561. int retval;
  1562. int saved_errno;
  1563. fd_set accept_fdset;
  1564. struct timeval timeout;
  1565. socklen_t socklen = sizeof(remote_addr);
  1566. if (p_sockaddr)
  1567. {
  1568. vsf_sysutil_memclr(p_sockaddr, sizeof(*p_sockaddr));
  1569. }
  1570. if (wait_seconds > 0)
  1571. {
  1572. FD_ZERO(&accept_fdset);
  1573. FD_SET(fd, &accept_fdset);
  1574. timeout.tv_sec = wait_seconds;
  1575. timeout.tv_usec = 0;
  1576. do
  1577. {
  1578. retval = select(fd + 1, &accept_fdset, NULL, NULL, &timeout);
  1579. saved_errno = errno;
  1580. vsf_sysutil_check_pending_actions(kVSFSysUtilUnknown, 0, 0);
  1581. }
  1582. while (retval < 0 && saved_errno == EINTR);
  1583. if (retval <= 0)
  1584. {
  1585. if (retval == 0)
  1586. {
  1587. errno = EAGAIN;
  1588. }
  1589. return -1;
  1590. }
  1591. }
  1592. retval = accept(fd, &remote_addr.u.u_sockaddr, &socklen);
  1593. vsf_sysutil_check_pending_actions(kVSFSysUtilUnknown, 0, 0);
  1594. if (retval < 0)
  1595. {
  1596. return retval;
  1597. }
  1598. /* FreeBSD bug / paranoia: ai32@drexel.edu */
  1599. if (socklen == 0)
  1600. {
  1601. return -1;
  1602. }
  1603. if (remote_addr.u.u_sockaddr.sa_family != AF_INET &&
  1604. remote_addr.u.u_sockaddr.sa_family != AF_INET6)
  1605. {
  1606. die("can only support ipv4 and ipv6 currently");
  1607. }
  1608. if (p_sockaddr)
  1609. {
  1610. if (remote_addr.u.u_sockaddr.sa_family == AF_INET)
  1611. {
  1612. vsf_sysutil_memclr(&remote_addr.u.u_sockaddr_in.sin_zero,
  1613. sizeof(remote_addr.u.u_sockaddr_in.sin_zero));
  1614. vsf_sysutil_memcpy(p_sockaddr, &remote_addr.u.u_sockaddr_in,
  1615. sizeof(remote_addr.u.u_sockaddr_in));
  1616. }
  1617. else
  1618. {
  1619. vsf_sysutil_memcpy(p_sockaddr, &remote_addr.u.u_sockaddr_in6,
  1620. sizeof(remote_addr.u.u_sockaddr_in6));
  1621. }
  1622. }
  1623. return retval;
  1624. }
  1625. int
  1626. vsf_sysutil_connect_timeout(int fd, const struct vsf_sysutil_sockaddr* p_addr,
  1627. unsigned int wait_seconds)
  1628. {
  1629. const struct sockaddr* p_sockaddr = &p_addr->u.u_sockaddr;
  1630. unsigned int addrlen = 0;
  1631. int retval;
  1632. int saved_errno;
  1633. if (p_sockaddr->sa_family == AF_INET)
  1634. {
  1635. addrlen = sizeof(p_addr->u.u_sockaddr_in);
  1636. }
  1637. else if (p_sockaddr->sa_family == AF_INET6)
  1638. {
  1639. addrlen = sizeof(p_addr->u.u_sockaddr_in6);
  1640. }
  1641. else
  1642. {
  1643. die("can only support ipv4 and ipv6 currently");
  1644. }
  1645. if (wait_seconds > 0)
  1646. {
  1647. vsf_sysutil_activate_noblock(fd);
  1648. }
  1649. retval = connect(fd, p_sockaddr, addrlen);
  1650. if (retval < 0 && errno == EINPROGRESS)
  1651. {
  1652. fd_set connect_fdset;
  1653. struct timeval timeout;
  1654. FD_ZERO(&connect_fdset);
  1655. FD_SET(fd, &connect_fdset);
  1656. timeout.tv_sec = wait_seconds;
  1657. timeout.tv_usec = 0;
  1658. do
  1659. {
  1660. retval = select(fd + 1, NULL, &connect_fdset, NULL, &timeout);
  1661. saved_errno = errno;
  1662. vsf_sysutil_check_pending_actions(kVSFSysUtilUnknown, 0, 0);
  1663. }
  1664. while (retval < 0 && saved_errno == EINTR);
  1665. if (retval <= 0)
  1666. {
  1667. if (retval == 0)
  1668. {
  1669. errno = EAGAIN;
  1670. }
  1671. retval = -1;
  1672. }
  1673. else
  1674. {
  1675. socklen_t socklen = sizeof(retval);
  1676. int sockoptret = getsockopt(fd, SOL_SOCKET, SO_ERROR, &retval, &socklen);
  1677. if (sockoptret != 0)
  1678. {
  1679. die("getsockopt");
  1680. }
  1681. if (retval != 0)
  1682. {
  1683. errno = retval;
  1684. retval = -1;
  1685. }
  1686. }
  1687. }
  1688. if (wait_seconds > 0)
  1689. {
  1690. vsf_sysutil_deactivate_noblock(fd);
  1691. }
  1692. return retval;
  1693. }
  1694. void
  1695. vsf_sysutil_getsockname(int fd, struct vsf_sysutil_sockaddr** p_sockptr)
  1696. {
  1697. struct vsf_sysutil_sockaddr the_addr;
  1698. int retval;
  1699. socklen_t socklen = sizeof(the_addr);
  1700. vsf_sysutil_sockaddr_clear(p_sockptr);
  1701. retval = getsockname(fd, &the_addr.u.u_sockaddr, &socklen);
  1702. if (retval != 0)
  1703. {
  1704. die("getsockname");
  1705. }
  1706. if (the_addr.u.u_sockaddr.sa_family != AF_INET &&
  1707. the_addr.u.u_sockaddr.sa_family != AF_INET6)
  1708. {
  1709. die("can only support ipv4 and ipv6 currently");
  1710. }
  1711. vsf_sysutil_sockaddr_alloc(p_sockptr);
  1712. if (socklen > sizeof(the_addr))
  1713. {
  1714. socklen = sizeof(the_addr);
  1715. }
  1716. vsf_sysutil_memcpy(*p_sockptr, &the_addr, socklen);
  1717. }
  1718. void
  1719. vsf_sysutil_getpeername(int fd, struct vsf_sysutil_sockaddr** p_sockptr)
  1720. {
  1721. struct vsf_sysutil_sockaddr the_addr;
  1722. int retval;
  1723. socklen_t socklen = sizeof(the_addr);
  1724. vsf_sysutil_sockaddr_clear(p_sockptr);
  1725. retval = getpeername(fd, &the_addr.u.u_sockaddr, &socklen);
  1726. if (retval != 0)
  1727. {
  1728. die("getpeername");
  1729. }
  1730. if (the_addr.u.u_sockaddr.sa_family != AF_INET &&
  1731. the_addr.u.u_sockaddr.sa_family != AF_INET6)
  1732. {
  1733. die("can only support ipv4 and ipv6 currently");
  1734. }
  1735. vsf_sysutil_sockaddr_alloc(p_sockptr);
  1736. if (socklen > sizeof(the_addr))
  1737. {
  1738. socklen = sizeof(the_addr);
  1739. }
  1740. vsf_sysutil_memcpy(*p_sockptr, &the_addr, socklen);
  1741. }
  1742. void
  1743. vsf_sysutil_shutdown_failok(int fd)
  1744. {
  1745. /* SHUT_RDWR is a relatively new addition */
  1746. #ifndef SHUT_RDWR
  1747. #define SHUT_RDWR 2
  1748. #endif
  1749. (void) shutdown(fd, SHUT_RDWR);
  1750. }
  1751. void
  1752. vsf_sysutil_shutdown_read_failok(int fd)
  1753. {
  1754. /* SHUT_RD is a relatively new addition */
  1755. #ifndef SHUT_RD
  1756. #define SHUT_RD 0
  1757. #endif
  1758. (void) shutdown(fd, SHUT_RD);
  1759. }
  1760. void
  1761. vsf_sysutil_sockaddr_clear(struct vsf_sysutil_sockaddr** p_sockptr)
  1762. {
  1763. if (*p_sockptr != NULL)
  1764. {
  1765. vsf_sysutil_free(*p_sockptr);
  1766. *p_sockptr = NULL;
  1767. }
  1768. }
  1769. void
  1770. vsf_sysutil_sockaddr_alloc(struct vsf_sysutil_sockaddr** p_sockptr)
  1771. {
  1772. vsf_sysutil_sockaddr_clear(p_sockptr);
  1773. *p_sockptr = vsf_sysutil_malloc(sizeof(**p_sockptr));
  1774. vsf_sysutil_memclr(*p_sockptr, sizeof(**p_sockptr));
  1775. }
  1776. void
  1777. vsf_sysutil_sockaddr_alloc_ipv4(struct vsf_sysutil_sockaddr** p_sockptr)
  1778. {
  1779. vsf_sysutil_sockaddr_alloc(p_sockptr);
  1780. (*p_sockptr)->u.u_sockaddr.sa_family = AF_INET;
  1781. }
  1782. void
  1783. vsf_sysutil_sockaddr_alloc_ipv6(struct vsf_sysutil_sockaddr** p_sockptr)
  1784. {
  1785. vsf_sysutil_sockaddr_alloc(p_sockptr);
  1786. (*p_sockptr)->u.u_sockaddr.sa_family = AF_INET6;
  1787. }
  1788. void
  1789. vsf_sysutil_sockaddr_clone(struct vsf_sysutil_sockaddr** p_sockptr,
  1790. const struct vsf_sysutil_sockaddr* p_src)
  1791. {
  1792. struct vsf_sysutil_sockaddr* p_sockaddr = 0;
  1793. vsf_sysutil_sockaddr_alloc(p_sockptr);
  1794. p_sockaddr = *p_sockptr;
  1795. if (p_src->u.u_sockaddr.sa_family == AF_INET)
  1796. {
  1797. p_sockaddr->u.u_sockaddr.sa_family = AF_INET;
  1798. vsf_sysutil_memcpy(&p_sockaddr->u.u_sockaddr_in.sin_addr,
  1799. &p_src->u.u_sockaddr_in.sin_addr,
  1800. sizeof(p_sockaddr->u.u_sockaddr_in.sin_addr));
  1801. }
  1802. else if (p_src->u.u_sockaddr.sa_family == AF_INET6)
  1803. {
  1804. p_sockaddr->u.u_sockaddr.sa_family = AF_INET6;
  1805. vsf_sysutil_memcpy(&p_sockaddr->u.u_sockaddr_in6.sin6_addr,
  1806. &p_src->u.u_sockaddr_in6.sin6_addr,
  1807. sizeof(p_sockaddr->u.u_sockaddr_in6.sin6_addr));
  1808. p_sockaddr->u.u_sockaddr_in6.sin6_scope_id =
  1809. p_src->u.u_sockaddr_in6.sin6_scope_id;
  1810. }
  1811. else
  1812. {
  1813. die("can only support ipv4 and ipv6 currently");
  1814. }
  1815. }
  1816. int
  1817. vsf_sysutil_sockaddr_addr_equal(const struct vsf_sysutil_sockaddr* p1,
  1818. const struct vsf_sysutil_sockaddr* p2)
  1819. {
  1820. int family1 = p1->u.u_sockaddr.sa_family;
  1821. int family2 = p2->u.u_sockaddr.sa_family;
  1822. if (family1 != family2)
  1823. {
  1824. if (family1 == AF_INET && family2 == AF_INET6)
  1825. {
  1826. const void* p_ipv4_addr = vsf_sysutil_sockaddr_ipv6_v4(p2);
  1827. if (p_ipv4_addr &&
  1828. !vsf_sysutil_memcmp(p_ipv4_addr, &p1->u.u_sockaddr_in.sin_addr,
  1829. sizeof(p1->u.u_sockaddr_in.sin_addr)))
  1830. {
  1831. return 1;
  1832. }
  1833. }
  1834. else if (family1 == AF_INET6 && family2 == AF_INET)
  1835. {
  1836. const void* p_ipv4_addr = vsf_sysutil_sockaddr_ipv6_v4(p1);
  1837. if (p_ipv4_addr &&
  1838. !vsf_sysutil_memcmp(p_ipv4_addr, &p2->u.u_sockaddr_in.sin_addr,
  1839. sizeof(p2->u.u_sockaddr_in.sin_addr)))
  1840. {
  1841. return 1;
  1842. }
  1843. }
  1844. return 0;
  1845. }
  1846. if (family1 == AF_INET)
  1847. {
  1848. if (vsf_sysutil_memcmp(&p1->u.u_sockaddr_in.sin_addr,
  1849. &p2->u.u_sockaddr_in.sin_addr,
  1850. sizeof(p1->u.u_sockaddr_in.sin_addr)) == 0)
  1851. {
  1852. return 1;
  1853. }
  1854. }
  1855. else if (family1 == AF_INET6)
  1856. {
  1857. if (vsf_sysutil_memcmp(&p1->u.u_sockaddr_in6.sin6_addr,
  1858. &p2->u.u_sockaddr_in6.sin6_addr,
  1859. sizeof(p1->u.u_sockaddr_in6.sin6_addr)) == 0)
  1860. {
  1861. return 1;
  1862. }
  1863. }
  1864. return 0;
  1865. }
  1866. int
  1867. vsf_sysutil_sockaddr_is_ipv6(const struct vsf_sysutil_sockaddr* p_sockaddr)
  1868. {
  1869. if (p_sockaddr->u.u_sockaddr.sa_family == AF_INET6)
  1870. {
  1871. return 1;
  1872. }
  1873. return 0;
  1874. }
  1875. void
  1876. vsf_sysutil_sockaddr_set_ipv4addr(struct vsf_sysutil_sockaddr* p_sockptr,
  1877. const unsigned char* p_raw)
  1878. {
  1879. if (p_sockptr->u.u_sockaddr.sa_family == AF_INET)
  1880. {
  1881. vsf_sysutil_memcpy(&p_sockptr->u.u_sockaddr_in.sin_addr, p_raw,
  1882. sizeof(p_sockptr->u.u_sockaddr_in.sin_addr));
  1883. }
  1884. else if (p_sockptr->u.u_sockaddr.sa_family == AF_INET6)
  1885. {
  1886. static struct vsf_sysutil_sockaddr* s_p_sockaddr;
  1887. vsf_sysutil_sockaddr_alloc_ipv4(&s_p_sockaddr);
  1888. vsf_sysutil_memcpy(&s_p_sockaddr->u.u_sockaddr_in.sin_addr, p_raw,
  1889. sizeof(s_p_sockaddr->u.u_sockaddr_in.sin_addr));
  1890. vsf_sysutil_memcpy(&p_sockptr->u.u_sockaddr_in6.sin6_addr,
  1891. vsf_sysutil_sockaddr_ipv4_v6(s_p_sockaddr),
  1892. sizeof(p_sockptr->u.u_sockaddr_in6.sin6_addr));
  1893. }
  1894. else
  1895. {
  1896. bug("bad family");
  1897. }
  1898. }
  1899. void
  1900. vsf_sysutil_sockaddr_set_ipv6addr(struct vsf_sysutil_sockaddr* p_sockptr,
  1901. const unsigned char* p_raw)
  1902. {
  1903. if (p_sockptr->u.u_sockaddr.sa_family == AF_INET6)
  1904. {
  1905. vsf_sysutil_memcpy(&p_sockptr->u.u_sockaddr_in6.sin6_addr, p_raw,
  1906. sizeof(p_sockptr->u.u_sockaddr_in6.sin6_addr));
  1907. }
  1908. else
  1909. {
  1910. bug("bad family");
  1911. }
  1912. }
  1913. const void*
  1914. vsf_sysutil_sockaddr_ipv6_v4(const struct vsf_sysutil_sockaddr* p_addr)
  1915. {
  1916. static unsigned char pattern[12] =
  1917. { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF };
  1918. const unsigned char* p_addr_start;
  1919. if (p_addr->u.u_sockaddr.sa_family != AF_INET6)
  1920. {
  1921. return 0;
  1922. }
  1923. if (vsf_sysutil_memcmp(pattern, &p_addr->u.u_sockaddr_in6.sin6_addr, 12))
  1924. {
  1925. return 0;
  1926. }
  1927. p_addr_start = (const unsigned char*)&p_addr->u.u_sockaddr_in6.sin6_addr;
  1928. return &p_addr_start[12];
  1929. }
  1930. const void*
  1931. vsf_sysutil_sockaddr_ipv4_v6(const struct vsf_sysutil_sockaddr* p_addr)
  1932. {
  1933. static unsigned char ret[16] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF };
  1934. if (p_addr->u.u_sockaddr.sa_family != AF_INET)
  1935. {
  1936. return 0;
  1937. }
  1938. vsf_sysutil_memcpy(&ret[12], &p_addr->u.u_sockaddr_in.sin_addr, 4);
  1939. return ret;
  1940. }
  1941. void*
  1942. vsf_sysutil_sockaddr_get_raw_addr(struct vsf_sysutil_sockaddr* p_sockptr)
  1943. {
  1944. if (p_sockptr->u.u_sockaddr.sa_family == AF_INET)
  1945. {
  1946. return &p_sockptr->u.u_sockaddr_in.sin_addr;
  1947. }
  1948. else if (p_sockptr->u.u_sockaddr.sa_family == AF_INET6)
  1949. {
  1950. return &p_sockptr->u.u_sockaddr_in6.sin6_addr;
  1951. }
  1952. else
  1953. {
  1954. bug("bad family");
  1955. }
  1956. return 0;
  1957. }
  1958. unsigned int
  1959. vsf_sysutil_get_ipaddr_size(void)
  1960. {
  1961. struct vsf_sysutil_sockaddr addr;
  1962. unsigned int size = sizeof(addr.u.u_sockaddr_in.sin_addr);
  1963. unsigned int size2 = sizeof(addr.u.u_sockaddr_in6.sin6_addr);
  1964. if (size2 > size)
  1965. {
  1966. size = size2;
  1967. }
  1968. return size;
  1969. }
  1970. int
  1971. vsf_sysutil_get_ipsock(const struct vsf_sysutil_sockaddr* p_addr)
  1972. {
  1973. if (p_addr->u.u_sockaddr.sa_family == AF_INET)
  1974. {
  1975. return vsf_sysutil_get_ipv4_sock();
  1976. }
  1977. else if (p_addr->u.u_sockaddr.sa_family == AF_INET6)
  1978. {
  1979. return vsf_sysutil_get_ipv6_sock();
  1980. }
  1981. else
  1982. {
  1983. bug("bad family");
  1984. }
  1985. return -1;
  1986. }
  1987. void
  1988. vsf_sysutil_sockaddr_set_any(struct vsf_sysutil_sockaddr* p_sockaddr)
  1989. {
  1990. if (p_sockaddr->u.u_sockaddr.sa_family == AF_INET)
  1991. {
  1992. vsf_sysutil_memclr(&p_sockaddr->u.u_sockaddr_in.sin_addr,
  1993. sizeof(p_sockaddr->u.u_sockaddr_in.sin_addr));
  1994. }
  1995. else if (p_sockaddr->u.u_sockaddr.sa_family == AF_INET6)
  1996. {
  1997. vsf_sysutil_memclr(&p_sockaddr->u.u_sockaddr_in6.sin6_addr,
  1998. sizeof(p_sockaddr->u.u_sockaddr_in6.sin6_addr));
  1999. }
  2000. else
  2001. {
  2002. bug("bad family");
  2003. }
  2004. }
  2005. unsigned short
  2006. vsf_sysutil_sockaddr_get_port(const struct vsf_sysutil_sockaddr* p_sockptr)
  2007. {
  2008. if (p_sockptr->u.u_sockaddr.sa_family == AF_INET)
  2009. {
  2010. return ntohs(p_sockptr->u.u_sockaddr_in.sin_port);
  2011. }
  2012. else if (p_sockptr->u.u_sockaddr.sa_family == AF_INET6)
  2013. {
  2014. return ntohs(p_sockptr->u.u_sockaddr_in6.sin6_port);
  2015. }
  2016. else
  2017. {
  2018. bug("bad family");
  2019. }
  2020. /* NOTREACHED */
  2021. return 0;
  2022. }
  2023. void
  2024. vsf_sysutil_sockaddr_set_port(struct vsf_sysutil_sockaddr* p_sockptr,
  2025. unsigned short the_port)
  2026. {
  2027. if (p_sockptr->u.u_sockaddr.sa_family == AF_INET)
  2028. {
  2029. p_sockptr->u.u_sockaddr_in.sin_port = htons(the_port);
  2030. }
  2031. else if (p_sockptr->u.u_sockaddr.sa_family == AF_INET6)
  2032. {
  2033. p_sockptr->u.u_sockaddr_in6.sin6_port = htons(the_port);
  2034. }
  2035. else
  2036. {
  2037. bug("bad family");
  2038. }
  2039. }
  2040. int
  2041. vsf_sysutil_is_port_reserved(unsigned short the_port)
  2042. {
  2043. if (the_port < IPPORT_RESERVED)
  2044. {
  2045. return 1;
  2046. }
  2047. return 0;
  2048. }
  2049. const char*
  2050. vsf_sysutil_inet_ntop(const struct vsf_sysutil_sockaddr* p_sockptr)
  2051. {
  2052. const struct sockaddr* p_sockaddr = &p_sockptr->u.u_sockaddr;
  2053. if (p_sockaddr->sa_family == AF_INET)
  2054. {
  2055. return inet_ntoa(p_sockptr->u.u_sockaddr_in.sin_addr);
  2056. }
  2057. else if (p_sockaddr->sa_family == AF_INET6)
  2058. {
  2059. static char inaddr_buf[64];
  2060. const char* p_ret = inet_ntop(AF_INET6,
  2061. &p_sockptr->u.u_sockaddr_in6.sin6_addr,
  2062. inaddr_buf, sizeof(inaddr_buf));
  2063. inaddr_buf[sizeof(inaddr_buf) - 1] = '\0';
  2064. if (p_ret == NULL)
  2065. {
  2066. inaddr_buf[0] = '\0';
  2067. }
  2068. return inaddr_buf;
  2069. }
  2070. else
  2071. {
  2072. die("can only support ipv4 and ipv6 currently");
  2073. return 0;
  2074. }
  2075. }
  2076. const char*
  2077. vsf_sysutil_inet_ntoa(const void* p_raw_addr)
  2078. {
  2079. return inet_ntoa(*((struct in_addr*)p_raw_addr));
  2080. }
  2081. int
  2082. vsf_sysutil_inet_aton(const char* p_text, struct vsf_sysutil_sockaddr* p_addr)
  2083. {
  2084. struct in_addr sin_addr;
  2085. if (p_addr->u.u_sockaddr.sa_family != AF_INET)
  2086. {
  2087. bug("bad family");
  2088. }
  2089. if (inet_aton(p_text, &sin_addr))
  2090. {
  2091. vsf_sysutil_memcpy(&p_addr->u.u_sockaddr_in.sin_addr,
  2092. &sin_addr, sizeof(p_addr->u.u_sockaddr_in.sin_addr));
  2093. return 1;
  2094. }
  2095. else
  2096. {
  2097. return 0;
  2098. }
  2099. }
  2100. void
  2101. vsf_sysutil_dns_resolve(struct vsf_sysutil_sockaddr** p_sockptr,
  2102. const char* p_name)
  2103. {
  2104. struct hostent* hent = gethostbyname(p_name);
  2105. if (hent == NULL)
  2106. {
  2107. die2("cannot resolve host:", p_name);
  2108. }
  2109. vsf_sysutil_sockaddr_clear(p_sockptr);
  2110. if (hent->h_addrtype == AF_INET)
  2111. {
  2112. unsigned int len = hent->h_length;
  2113. if (len > sizeof((*p_sockptr)->u.u_sockaddr_in.sin_addr))
  2114. {
  2115. len = sizeof((*p_sockptr)->u.u_sockaddr_in.sin_addr);
  2116. }
  2117. vsf_sysutil_sockaddr_alloc_ipv4(p_sockptr);
  2118. vsf_sysutil_memcpy(&(*p_sockptr)->u.u_sockaddr_in.sin_addr,
  2119. hent->h_addr_list[0], len);
  2120. }
  2121. else if (hent->h_addrtype == AF_INET6)
  2122. {
  2123. unsigned int len = hent->h_length;
  2124. if (len > sizeof((*p_sockptr)->u.u_sockaddr_in6.sin6_addr))
  2125. {
  2126. len = sizeof((*p_sockptr)->u.u_sockaddr_in6.sin6_addr);
  2127. }
  2128. vsf_sysutil_sockaddr_alloc_ipv6(p_sockptr);
  2129. vsf_sysutil_memcpy(&(*p_sockptr)->u.u_sockaddr_in6.sin6_addr,
  2130. hent->h_addr_list[0], len);
  2131. }
  2132. else
  2133. {
  2134. die("gethostbyname(): neither IPv4 nor IPv6");
  2135. }
  2136. }
  2137. struct vsf_sysutil_user*
  2138. vsf_sysutil_getpwuid(const int uid)
  2139. {
  2140. if (uid < 0)
  2141. {
  2142. bug("negative uid in vsf_sysutil_getpwuid");
  2143. }
  2144. return (struct vsf_sysutil_user*) getpwuid((unsigned int) uid);
  2145. }
  2146. struct vsf_sysutil_user*
  2147. vsf_sysutil_getpwnam(const char* p_user)
  2148. {
  2149. return (struct vsf_sysutil_user*) getpwnam(p_user);
  2150. }
  2151. const char*
  2152. vsf_sysutil_user_getname(const struct vsf_sysutil_user* p_user)
  2153. {
  2154. const struct passwd* p_passwd = (const struct passwd*) p_user;
  2155. return p_passwd->pw_name;
  2156. }
  2157. const char*
  2158. vsf_sysutil_user_get_homedir(const struct vsf_sysutil_user* p_user)
  2159. {
  2160. const struct passwd* p_passwd = (const struct passwd*) p_user;
  2161. return p_passwd->pw_dir;
  2162. }
  2163. int
  2164. vsf_sysutil_user_getuid(const struct vsf_sysutil_user* p_user)
  2165. {
  2166. const struct passwd* p_passwd = (const struct passwd*) p_user;
  2167. return p_passwd->pw_uid;
  2168. }
  2169. int
  2170. vsf_sysutil_user_getgid(const struct vsf_sysutil_user* p_user)
  2171. {
  2172. const struct passwd* p_passwd = (const struct passwd*) p_user;
  2173. return p_passwd->pw_gid;
  2174. }
  2175. struct vsf_sysutil_group*
  2176. vsf_sysutil_getgrgid(const int gid)
  2177. {
  2178. if (gid < 0)
  2179. {
  2180. die("negative gid in vsf_sysutil_getgrgid");
  2181. }
  2182. return (struct vsf_sysutil_group*) getgrgid((unsigned int) gid);
  2183. }
  2184. const char*
  2185. vsf_sysutil_group_getname(const struct vsf_sysutil_group* p_group)
  2186. {
  2187. const struct group* p_grp = (const struct group*) p_group;
  2188. return p_grp->gr_name;
  2189. }
  2190. unsigned char
  2191. vsf_sysutil_get_random_byte(void)
  2192. {
  2193. static int seeded;
  2194. unsigned int uint_res;
  2195. unsigned char c1, c2, c3, c4;
  2196. if (!seeded)
  2197. {
  2198. struct timeval tv;
  2199. int retval = gettimeofday(&tv, NULL);
  2200. if (retval != 0)
  2201. {
  2202. die("gettimeofday");
  2203. }
  2204. srand((unsigned)tv.tv_usec);
  2205. seeded = 1;
  2206. }
  2207. uint_res = rand();
  2208. c1 = uint_res & 0x000000ff;
  2209. c2 = (uint_res >> 8) & 0x000000ff;
  2210. c3 = (uint_res >> 16) & 0x000000ff;
  2211. c4 = (uint_res >> 24) & 0x000000ff;
  2212. return c1 ^ c2 ^ c3 ^ c4;
  2213. }
  2214. int
  2215. vsf_sysutil_running_as_root(void)
  2216. {
  2217. return (getuid() == 0);
  2218. }
  2219. void
  2220. vsf_sysutil_setuid(const struct vsf_sysutil_user* p_user)
  2221. {
  2222. const struct passwd* p_passwd = (const struct passwd*) p_user;
  2223. vsf_sysutil_setuid_numeric(p_passwd->pw_uid);
  2224. }
  2225. void
  2226. vsf_sysutil_setuid_numeric(int uid)
  2227. {
  2228. int retval = setuid(uid);
  2229. if (retval != 0)
  2230. {
  2231. die("setuid");
  2232. }
  2233. }
  2234. void
  2235. vsf_sysutil_setgid(const struct vsf_sysutil_user* p_user)
  2236. {
  2237. const struct passwd* p_passwd = (const struct passwd*) p_user;
  2238. vsf_sysutil_setgid_numeric(p_passwd->pw_gid);
  2239. }
  2240. void
  2241. vsf_sysutil_setgid_numeric(int gid)
  2242. {
  2243. int retval = setgid(gid);
  2244. if (retval != 0)
  2245. {
  2246. die("setgid");
  2247. }
  2248. }
  2249. int
  2250. vsf_sysutil_geteuid(void)
  2251. {
  2252. int retval = geteuid();
  2253. if (retval < 0)
  2254. {
  2255. die("geteuid");
  2256. }
  2257. return retval;
  2258. }
  2259. int
  2260. vsf_sysutil_getegid(void)
  2261. {
  2262. int retval = getegid();
  2263. if (retval < 0)
  2264. {
  2265. die("getegid");
  2266. }
  2267. return retval;
  2268. }
  2269. void
  2270. vsf_sysutil_seteuid(const struct vsf_sysutil_user* p_user)
  2271. {
  2272. const struct passwd* p_passwd = (const struct passwd*) p_user;
  2273. vsf_sysutil_seteuid_numeric(p_passwd->pw_uid);
  2274. }
  2275. void
  2276. vsf_sysutil_setegid(const struct vsf_sysutil_user* p_user)
  2277. {
  2278. const struct passwd* p_passwd = (const struct passwd*) p_user;
  2279. vsf_sysutil_setegid_numeric(p_passwd->pw_gid);
  2280. }
  2281. void
  2282. vsf_sysutil_seteuid_numeric(int uid)
  2283. {
  2284. /* setreuid() would seem to be more portable than seteuid() */
  2285. int retval = setreuid(-1, uid);
  2286. if (retval != 0)
  2287. {
  2288. die("seteuid");
  2289. }
  2290. }
  2291. void
  2292. vsf_sysutil_setegid_numeric(int gid)
  2293. {
  2294. /* setregid() would seem to be more portable than setegid() */
  2295. int retval = setregid(-1, gid);
  2296. if (retval != 0)
  2297. {
  2298. die("setegid");
  2299. }
  2300. }
  2301. void
  2302. vsf_sysutil_clear_supp_groups(void)
  2303. {
  2304. int retval = setgroups(0, NULL);
  2305. if (retval != 0)
  2306. {
  2307. die("setgroups");
  2308. }
  2309. }
  2310. void
  2311. vsf_sysutil_initgroups(const struct vsf_sysutil_user* p_user)
  2312. {
  2313. const struct passwd* p_passwd = (const struct passwd*) p_user;
  2314. int retval = initgroups(p_passwd->pw_name, p_passwd->pw_gid);
  2315. if (retval != 0)
  2316. {
  2317. die("initgroups");
  2318. }
  2319. }
  2320. void
  2321. vsf_sysutil_chroot(const char* p_root_path)
  2322. {
  2323. int retval = chroot(p_root_path);
  2324. if (retval != 0)
  2325. {
  2326. die("chroot");
  2327. }
  2328. }
  2329. unsigned int
  2330. vsf_sysutil_get_umask(void)
  2331. {
  2332. return s_current_umask;
  2333. }
  2334. void
  2335. vsf_sysutil_set_umask(unsigned int new_umask)
  2336. {
  2337. s_current_umask = (new_umask & 0777);
  2338. (void) umask(s_current_umask);
  2339. }
  2340. void
  2341. vsf_sysutil_make_session_leader(void)
  2342. {
  2343. /* This makes us the leader if we are not already */
  2344. (void) setsid();
  2345. /* Check we're the leader */
  2346. if ((int) vsf_sysutil_getpid() != getpgrp())
  2347. {
  2348. die("not session leader");
  2349. }
  2350. }
  2351. void
  2352. vsf_sysutil_reopen_standard_fds(void)
  2353. {
  2354. /* This reopens STDIN, STDOUT and STDERR to /dev/null */
  2355. int fd;
  2356. if ((fd = open("/dev/null", O_RDWR, 0)) < 0)
  2357. {
  2358. goto error;
  2359. }
  2360. vsf_sysutil_dupfd2(fd, STDIN_FILENO);
  2361. vsf_sysutil_dupfd2(fd, STDOUT_FILENO);
  2362. vsf_sysutil_dupfd2(fd, STDERR_FILENO);
  2363. if ( fd > 2 )
  2364. {
  2365. vsf_sysutil_close(fd);
  2366. }
  2367. return;
  2368. error:
  2369. die("reopening standard file descriptors to /dev/null failed");
  2370. }
  2371. void
  2372. vsf_sysutil_tzset(void)
  2373. {
  2374. int retval;
  2375. char tzbuf[sizeof("+HHMM!")];
  2376. time_t the_time = time(NULL);
  2377. struct tm* p_tm;
  2378. tzset();
  2379. p_tm = localtime(&the_time);
  2380. if (p_tm == NULL)
  2381. {
  2382. die("localtime");
  2383. }
  2384. /* Set our timezone in the TZ environment variable to cater for the fact
  2385. * that modern glibc does not cache /etc/localtime (which becomes inaccessible
  2386. * when we chroot().
  2387. */
  2388. retval = strftime(tzbuf, sizeof(tzbuf), "%z", p_tm);
  2389. tzbuf[sizeof(tzbuf) - 1] = '\0';
  2390. if (retval == 5)
  2391. {
  2392. /* Static because putenv() does not copy the string. */
  2393. static char envtz[sizeof("TZ=UTC-hh:mm")];
  2394. /* Insert a colon so we have e.g. -05:00 instead of -0500 */
  2395. tzbuf[5] = tzbuf[4];
  2396. tzbuf[4] = tzbuf[3];
  2397. tzbuf[3] = ':';
  2398. /* Invert the sign - we just got the offset _from_ UTC but for TZ, we need
  2399. * the offset _to_ UTC.
  2400. */
  2401. if (tzbuf[0] == '+')
  2402. {
  2403. tzbuf[0] = '-';
  2404. }
  2405. else
  2406. {
  2407. tzbuf[0] = '+';
  2408. }
  2409. snprintf(envtz, sizeof(envtz), "TZ=UTC%s", tzbuf);
  2410. putenv(envtz);
  2411. s_timezone = ((tzbuf[1] - '0') * 10 + (tzbuf[2] - '0')) * 60 * 60;
  2412. s_timezone += ((tzbuf[4] - '0') * 10 + (tzbuf[5] - '0')) * 60;
  2413. if (tzbuf[0] == '-')
  2414. {
  2415. s_timezone *= -1;
  2416. }
  2417. }
  2418. /* Call in to the time subsystem again now that TZ is set, trying to force
  2419. * caching of the actual zoneinfo for the timezone.
  2420. */
  2421. p_tm = localtime(&the_time);
  2422. if (p_tm == NULL)
  2423. {
  2424. die("localtime #2");
  2425. }
  2426. p_tm = gmtime(&the_time);
  2427. if (p_tm == NULL)
  2428. {
  2429. die("gmtime");
  2430. }
  2431. }
  2432. const char*
  2433. vsf_sysutil_get_current_date(void)
  2434. {
  2435. static char datebuf[64];
  2436. time_t curr_time;
  2437. const struct tm* p_tm;
  2438. int i = 0;
  2439. curr_time = vsf_sysutil_get_time_sec();
  2440. p_tm = localtime(&curr_time);
  2441. if (strftime(datebuf, sizeof(datebuf), "%a %b!%d %H:%M:%S %Y", p_tm) == 0)
  2442. {
  2443. die("strftime");
  2444. }
  2445. datebuf[sizeof(datebuf) - 1] = '\0';
  2446. /* This hack is because %e in strftime() isn't so portable */
  2447. while (datebuf[i] != '!' && datebuf[i] != '\0')
  2448. {
  2449. ++i;
  2450. }
  2451. if (datebuf[i] == '!')
  2452. {
  2453. datebuf[i] = ' ';
  2454. if (datebuf[i+1] == '0')
  2455. {
  2456. datebuf[i+1] = ' ';
  2457. }
  2458. }
  2459. return datebuf;
  2460. }
  2461. long
  2462. vsf_sysutil_get_time_sec(void)
  2463. {
  2464. if (gettimeofday(&s_current_time, NULL) != 0)
  2465. {
  2466. die("gettimeofday");
  2467. }
  2468. return s_current_time.tv_sec;
  2469. }
  2470. long
  2471. vsf_sysutil_get_time_usec(void)
  2472. {
  2473. return s_current_time.tv_usec;
  2474. }
  2475. void
  2476. vsf_sysutil_qsort(void* p_base, unsigned int num_elem, unsigned int elem_size,
  2477. int (*p_compar)(const void *, const void *))
  2478. {
  2479. qsort(p_base, num_elem, elem_size, p_compar);
  2480. }
  2481. void
  2482. vsf_sysutil_sleep(double seconds)
  2483. {
  2484. int retval;
  2485. int saved_errno;
  2486. double fractional;
  2487. time_t secs;
  2488. struct timespec ts;
  2489. secs = (time_t) seconds;
  2490. fractional = seconds - (double) secs;
  2491. ts.tv_sec = secs;
  2492. ts.tv_nsec = (long) (fractional * (double) 1000000000);
  2493. do
  2494. {
  2495. retval = nanosleep(&ts, &ts);
  2496. saved_errno = errno;
  2497. vsf_sysutil_check_pending_actions(kVSFSysUtilUnknown, 0, 0);
  2498. } while (retval == -1 && saved_errno == EINTR);
  2499. }
  2500. char*
  2501. vsf_sysutil_getenv(const char* p_var)
  2502. {
  2503. return getenv(p_var);
  2504. }
  2505. void
  2506. vsf_sysutil_openlog(int force)
  2507. {
  2508. int facility = LOG_DAEMON;
  2509. int option = LOG_PID;
  2510. if (!force)
  2511. {
  2512. option |= LOG_NDELAY;
  2513. }
  2514. #ifdef LOG_FTP
  2515. facility = LOG_FTP;
  2516. #endif
  2517. openlog("ftpc", option, facility);
  2518. }
  2519. void
  2520. vsf_sysutil_closelog(void)
  2521. {
  2522. closelog();
  2523. }
  2524. void
  2525. vsf_sysutil_syslog(const char* p_text, int severe)
  2526. {
  2527. int prio = LOG_INFO;
  2528. if (severe)
  2529. {
  2530. prio = LOG_WARNING;
  2531. }
  2532. syslog(prio, "%s", p_text);
  2533. }
  2534. long
  2535. vsf_sysutil_parse_time(const char* p_text)
  2536. {
  2537. struct tm the_time;
  2538. unsigned int len = vsf_sysutil_strlen(p_text);
  2539. vsf_sysutil_memclr(&the_time, sizeof(the_time));
  2540. if (len >= 8)
  2541. {
  2542. char yr[5];
  2543. char mon[3];
  2544. char day[3];
  2545. vsf_sysutil_strcpy(yr, p_text, 5);
  2546. vsf_sysutil_strcpy(mon, p_text + 4, 3);
  2547. vsf_sysutil_strcpy(day, p_text + 6, 3);
  2548. the_time.tm_year = vsf_sysutil_atoi(yr) - 1900;
  2549. the_time.tm_mon = vsf_sysutil_atoi(mon) - 1;
  2550. the_time.tm_mday = vsf_sysutil_atoi(day);
  2551. }
  2552. if (len >= 14)
  2553. {
  2554. char hr[3];
  2555. char mins[3];
  2556. char sec[3];
  2557. vsf_sysutil_strcpy(hr, p_text + 8, 3);
  2558. vsf_sysutil_strcpy(mins, p_text + 10, 3);
  2559. vsf_sysutil_strcpy(sec, p_text + 12, 3);
  2560. the_time.tm_hour = vsf_sysutil_atoi(hr);
  2561. the_time.tm_min = vsf_sysutil_atoi(mins);
  2562. the_time.tm_sec = vsf_sysutil_atoi(sec);
  2563. }
  2564. return mktime(&the_time);
  2565. }
  2566. int
  2567. vsf_sysutil_setmodtime(const char* p_file, long the_time, int is_localtime)
  2568. {
  2569. struct utimbuf new_times;
  2570. if (!is_localtime)
  2571. {
  2572. the_time -= s_timezone;
  2573. }
  2574. vsf_sysutil_memclr(&new_times, sizeof(new_times));
  2575. new_times.actime = the_time;
  2576. new_times.modtime = the_time;
  2577. return utime(p_file, &new_times);
  2578. }
  2579. void
  2580. vsf_sysutil_ftruncate(int fd)
  2581. {
  2582. int ret = ftruncate(fd, 0);
  2583. if (ret != 0)
  2584. {
  2585. die("ftruncate");
  2586. }
  2587. }
  2588. int
  2589. vsf_sysutil_getuid(void)
  2590. {
  2591. return getuid();
  2592. }
  2593. void
  2594. vsf_sysutil_set_address_space_limit(unsigned long bytes)
  2595. {
  2596. /* Unfortunately, OpenBSD is missing RLIMIT_AS. */
  2597. #ifdef RLIMIT_AS
  2598. int ret;
  2599. struct rlimit rlim;
  2600. rlim.rlim_cur = bytes;
  2601. rlim.rlim_max = bytes;
  2602. ret = setrlimit(RLIMIT_AS, &rlim);
  2603. /* Permit EPERM as this could indicate that the shell launching vsftpd already
  2604. * has a lower limit.
  2605. */
  2606. if (ret != 0 && errno != EPERM)
  2607. {
  2608. die("setrlimit");
  2609. }
  2610. #endif /* RLIMIT_AS */
  2611. (void) bytes;
  2612. }
  2613. void
  2614. vsf_sysutil_set_no_fds()
  2615. {
  2616. int ret;
  2617. struct rlimit rlim;
  2618. rlim.rlim_cur = 0;
  2619. rlim.rlim_max = 0;
  2620. ret = setrlimit(RLIMIT_NOFILE, &rlim);
  2621. if (ret != 0)
  2622. {
  2623. die("setrlimit NOFILE");
  2624. }
  2625. }
  2626. void
  2627. vsf_sysutil_set_no_procs()
  2628. {
  2629. #ifdef RLIMIT_NPROC
  2630. int ret;
  2631. struct rlimit rlim;
  2632. rlim.rlim_cur = 0;
  2633. rlim.rlim_max = 0;
  2634. ret = setrlimit(RLIMIT_NPROC, &rlim);
  2635. if (ret != 0)
  2636. {
  2637. die("setrlimit NPROC");
  2638. }
  2639. #endif
  2640. }
  2641. void
  2642. vsf_sysutil_post_fork()
  2643. {
  2644. int i;
  2645. /* Don't inherit any exit function. */
  2646. s_exit_func = NULL;
  2647. /* Uncached the current PID. */
  2648. s_current_pid = -1;
  2649. /* Don't inherit anything relating to the synchronous signal system */
  2650. s_io_handler = NULL;
  2651. for (i=0; i < NSIG; ++i)
  2652. {
  2653. s_sig_details[i].sync_sig_handler = NULL;
  2654. }
  2655. for (i=0; i < NSIG; ++i)
  2656. {
  2657. s_sig_details[i].pending = 0;
  2658. }
  2659. }