12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861 |
- /*
- * Part of Very Secure FTPd
- * Licence: GPL v2
- * Author: Chris Evans
- *
- * sysutil.c
- *
- * Routines to make the libc/syscall API more pleasant to use. Long term,
- * more libc/syscalls will go in here to reduce the number of .c files with
- * dependencies on libc or syscalls.
- */
- #define PRIVATE_HANDS_OFF_syscall_retval syscall_retval
- #define PRIVATE_HANDS_OFF_exit_status exit_status
- #include "sysutil.h"
- #include "utility.h"
- #include "tunables.h"
- #include "sysdeputil.h"
- /* Activate 64-bit file support on Linux/32bit plus others */
- #define _FILE_OFFSET_BITS 64
- #define _LARGEFILE_SOURCE 1
- #define _LARGEFILE64_SOURCE 1
- #define _LARGE_FILES 1
- /* For Linux, this adds nothing :-) */
- #include "port/porting_junk.h"
- #include <signal.h>
- #include <string.h>
- #include <stdlib.h>
- #include <unistd.h>
- #include <sys/types.h>
- #include <sys/socket.h>
- #include <sys/mman.h>
- #include <sys/stat.h>
- #include <fcntl.h>
- #include <netinet/in.h>
- #include <stdio.h>
- #include <dirent.h>
- #include <time.h>
- #include <arpa/inet.h>
- #include <errno.h>
- #include <pwd.h>
- #include <grp.h>
- #include <ctype.h>
- #include <sys/wait.h>
- #include <sys/time.h>
- /* Must be before netinet/ip.h. Found on FreeBSD, Solaris */
- #include <netinet/in_systm.h>
- #include <netinet/ip.h>
- #include <netinet/tcp.h>
- #include <limits.h>
- #include <syslog.h>
- #include <utime.h>
- #include <netdb.h>
- #include <sys/resource.h>
- /* Private variables to this file */
- /* Current umask() */
- static unsigned int s_current_umask;
- /* Cached time */
- static struct timeval s_current_time;
- /* Current pid */
- static int s_current_pid = -1;
- /* Exit function */
- static exitfunc_t s_exit_func;
- /* Difference in timezone from GMT in seconds */
- static long s_timezone;
- /* Our internal signal handling implementation details */
- static struct vsf_sysutil_sig_details
- {
- vsf_sighandle_t sync_sig_handler;
- void* p_private;
- volatile sig_atomic_t pending;
- int running;
- int use_alarm;
- } s_sig_details[NSIG];
- static vsf_context_io_t s_io_handler;
- static void* s_p_io_handler_private;
- static int s_io_handler_running;
- struct vsf_sysutil_sockaddr
- {
- union
- {
- struct sockaddr u_sockaddr;
- struct sockaddr_in u_sockaddr_in;
- struct sockaddr_in6 u_sockaddr_in6;
- } u;
- };
- /* File locals */
- static void vsf_sysutil_common_sighandler(int signum);
- static void vsf_sysutil_alrm_sighandler(int signum);
- static int vsf_sysutil_translate_sig(const enum EVSFSysUtilSignal sig);
- static void vsf_sysutil_set_sighandler(int sig, void (*p_handlefunc)(int));
- static int vsf_sysutil_translate_memprot(
- const enum EVSFSysUtilMapPermission perm);
- static int vsf_sysutil_translate_openmode(
- const enum EVSFSysUtilOpenMode mode);
- static void vsf_sysutil_alloc_statbuf(struct vsf_sysutil_statbuf** p_ptr);
- void vsf_sysutil_sockaddr_alloc(struct vsf_sysutil_sockaddr** p_sockptr);
- static int lock_internal(int fd, int lock_type);
- static void
- vsf_sysutil_alrm_sighandler(int signum)
- {
- (void) signum;
- alarm(1);
- }
- static void
- vsf_sysutil_common_sighandler(int signum)
- {
- if (signum < 0 || signum >= NSIG)
- {
- /* "cannot happen" */
- return;
- }
- if (s_sig_details[signum].sync_sig_handler)
- {
- s_sig_details[signum].pending = 1;
- /* Since this synchronous signal framework has a small race (signal coming
- * in just before we start a blocking call), there's the option to fire an
- * alarm repeatedly until the signal is handled.
- */
- if (s_sig_details[signum].use_alarm)
- {
- alarm(1);
- }
- }
- }
- /* Notes. This signal check is evaluated after potentially blocking system
- * calls, i.e. at highly defined points in the code. Since we only interrupt
- * at these definite locations, the signal handlers can be non-trivial
- * without us having to worry about re-entrancy.
- *
- * We guarantee that a handler for a given signal is not re-entrant. This
- * is taken care of by the "running" flag.
- *
- * This call itself can only be re-entered once we dereference the actual
- * hander function pointer, so we are safe with respect to races modifying
- * the "running" flag.
- */
- void
- vsf_sysutil_check_pending_actions(
- const enum EVSFSysUtilInterruptContext context, int retval, int fd)
- {
- unsigned int i;
- /* Check the i/o handler before the signal handlers */
- if (s_io_handler && !s_io_handler_running && context == kVSFSysUtilIO)
- {
- s_io_handler_running = 1;
- (*s_io_handler)(retval, fd, s_p_io_handler_private);
- s_io_handler_running = 0;
- }
- for (i=0; i < NSIG; ++i)
- {
- if (s_sig_details[i].pending && !s_sig_details[i].running)
- {
- s_sig_details[i].running = 1;
- if (s_sig_details[i].use_alarm)
- {
- alarm(0);
- }
- if (s_sig_details[i].sync_sig_handler)
- {
- s_sig_details[i].pending = 0;
- (*(s_sig_details[i].sync_sig_handler))(s_sig_details[i].p_private);
- }
- s_sig_details[i].running = 0;
- }
- }
- }
- static int
- vsf_sysutil_translate_sig(const enum EVSFSysUtilSignal sig)
- {
- int realsig = 0;
- switch (sig)
- {
- case kVSFSysUtilSigALRM:
- realsig = SIGALRM;
- break;
- case kVSFSysUtilSigTERM:
- realsig = SIGTERM;
- break;
- case kVSFSysUtilSigCHLD:
- realsig = SIGCHLD;
- break;
- case kVSFSysUtilSigPIPE:
- realsig = SIGPIPE;
- break;
- case kVSFSysUtilSigURG:
- realsig = SIGURG;
- break;
- case kVSFSysUtilSigHUP:
- realsig = SIGHUP;
- break;
- default:
- bug("unknown signal in sysutil_translate_sig");
- break;
- }
- if (realsig < 0 || realsig >= NSIG)
- {
- bug("signal out of range in sysutil_translate_sig");
- }
- return realsig;
- }
- void
- vsf_sysutil_install_sighandler(const enum EVSFSysUtilSignal sig,
- vsf_sighandle_t handler,
- void* p_private,
- int use_alarm)
- {
- int realsig = vsf_sysutil_translate_sig(sig);
- s_sig_details[realsig].p_private = p_private;
- s_sig_details[realsig].sync_sig_handler = handler;
- s_sig_details[realsig].use_alarm = use_alarm;
- vsf_sysutil_set_sighandler(realsig, vsf_sysutil_common_sighandler);
- if (use_alarm && realsig != SIGALRM)
- {
- vsf_sysutil_set_sighandler(SIGALRM, vsf_sysutil_alrm_sighandler);
- }
- }
- void
- vsf_sysutil_default_sig(const enum EVSFSysUtilSignal sig)
- {
- int realsig = vsf_sysutil_translate_sig(sig);
- vsf_sysutil_set_sighandler(realsig, SIG_DFL);
- s_sig_details[realsig].p_private = NULL;
- s_sig_details[realsig].sync_sig_handler = NULL;
- }
- void
- vsf_sysutil_install_null_sighandler(const enum EVSFSysUtilSignal sig)
- {
- int realsig = vsf_sysutil_translate_sig(sig);
- s_sig_details[realsig].p_private = NULL;
- s_sig_details[realsig].sync_sig_handler = NULL;
- vsf_sysutil_set_sighandler(realsig, vsf_sysutil_common_sighandler);
- }
- void
- vsf_sysutil_install_async_sighandler(const enum EVSFSysUtilSignal sig,
- vsf_async_sighandle_t handler)
- {
- int realsig = vsf_sysutil_translate_sig(sig);
- s_sig_details[realsig].p_private = NULL;
- s_sig_details[realsig].sync_sig_handler = NULL;
- vsf_sysutil_block_sig(sig);
- vsf_sysutil_set_sighandler(realsig, handler);
- }
- static void
- vsf_sysutil_set_sighandler(int sig, void (*p_handlefunc)(int))
- {
- int retval;
- struct sigaction sigact;
- vsf_sysutil_memclr(&sigact, sizeof(sigact));
- sigact.sa_handler = p_handlefunc;
- retval = sigfillset(&sigact.sa_mask);
- if (retval != 0)
- {
- die("sigfillset");
- }
- retval = sigaction(sig, &sigact, NULL);
- if (retval != 0)
- {
- die("sigaction");
- }
- }
- void
- vsf_sysutil_block_sig(const enum EVSFSysUtilSignal sig)
- {
- sigset_t sset;
- int retval;
- int realsig = vsf_sysutil_translate_sig(sig);
- retval = sigemptyset(&sset);
- if (retval != 0)
- {
- die("sigemptyset");
- }
- retval = sigaddset(&sset, realsig);
- if (retval != 0)
- {
- die("sigaddset");
- }
- retval = sigprocmask(SIG_BLOCK, &sset, NULL);
- if (retval != 0)
- {
- die("sigprocmask");
- }
- }
- void
- vsf_sysutil_unblock_sig(const enum EVSFSysUtilSignal sig)
- {
- sigset_t sset;
- int retval;
- int realsig = vsf_sysutil_translate_sig(sig);
- retval = sigemptyset(&sset);
- if (retval != 0)
- {
- die("sigemptyset");
- }
- retval = sigaddset(&sset, realsig);
- if (retval != 0)
- {
- die("sigaddset");
- }
- retval = sigprocmask(SIG_UNBLOCK, &sset, NULL);
- if (retval != 0)
- {
- die("sigprocmask");
- }
- }
- void
- vsf_sysutil_install_io_handler(vsf_context_io_t handler, void* p_private)
- {
- if (s_io_handler != NULL)
- {
- bug("double register of i/o handler");
- }
- s_io_handler = handler;
- s_p_io_handler_private = p_private;
- }
- void
- vsf_sysutil_uninstall_io_handler(void)
- {
- if (s_io_handler == NULL)
- {
- bug("no i/o handler to unregister!");
- }
- s_io_handler = NULL;
- s_p_io_handler_private = NULL;
- }
- void
- vsf_sysutil_set_alarm(const unsigned int trigger_seconds)
- {
- (void) alarm(trigger_seconds);
- }
- void
- vsf_sysutil_clear_alarm(void)
- {
- vsf_sysutil_set_alarm(0);
- }
- int
- vsf_sysutil_read(const int fd, void* p_buf, const unsigned int size)
- {
- while (1)
- {
- int retval = read(fd, p_buf, size);
- int saved_errno = errno;
- vsf_sysutil_check_pending_actions(kVSFSysUtilIO, retval, fd);
- if (retval < 0 && saved_errno == EINTR)
- {
- continue;
- }
- return retval;
- }
- }
- int
- vsf_sysutil_write(const int fd, const void* p_buf, const unsigned int size)
- {
- while (1)
- {
- int retval = write(fd, p_buf, size);
- int saved_errno = errno;
- vsf_sysutil_check_pending_actions(kVSFSysUtilIO, retval, fd);
- if (retval < 0 && saved_errno == EINTR)
- {
- continue;
- }
- return retval;
- }
- }
- int
- vsf_sysutil_read_loop(const int fd, void* p_buf, unsigned int size)
- {
- int retval;
- int num_read = 0;
- if (size > INT_MAX)
- {
- die("size too big in sysutil_read_loop");
- }
- while (1)
- {
- retval = vsf_sysutil_read(fd, (char*)p_buf + num_read, size);
- if (retval < 0)
- {
- return retval;
- }
- else if (retval == 0)
- {
- /* Read all we're going to read.. */
- return num_read;
- }
- if ((unsigned int) retval > size)
- {
- die("retval too big in vsf_sysutil_read_loop");
- }
- num_read += retval;
- size -= (unsigned int) retval;
- if (size == 0)
- {
- /* Hit the read target, cool. */
- return num_read;
- }
- }
- }
- int
- vsf_sysutil_write_loop(const int fd, const void* p_buf, unsigned int size)
- {
- int retval;
- int num_written = 0;
- if (size > INT_MAX)
- {
- die("size too big in sysutil_write_loop");
- }
- while (1)
- {
- retval = vsf_sysutil_write(fd, (const char*)p_buf + num_written, size);
- if (retval < 0)
- {
- /* Error */
- return retval;
- }
- else if (retval == 0)
- {
- /* Written all we're going to write.. */
- return num_written;
- }
- if ((unsigned int) retval > size)
- {
- die("retval too big in sysutil_write_loop");
- }
- num_written += retval;
- size -= (unsigned int) retval;
- if (size == 0)
- {
- /* Hit the write target, cool. */
- return num_written;
- }
- }
- }
- filesize_t
- vsf_sysutil_get_file_offset(const int file_fd)
- {
- filesize_t retval = lseek(file_fd, 0, SEEK_CUR);
- if (retval < 0)
- {
- die("lseek");
- }
- return retval;
- }
- void
- vsf_sysutil_lseek_to(const int fd, filesize_t seek_pos)
- {
- filesize_t retval;
- if (seek_pos < 0)
- {
- die("negative seek_pos in sysutil_lseek_to");
- }
- retval = lseek(fd, seek_pos, SEEK_SET);
- if (retval < 0)
- {
- die("lseek");
- }
- }
- void
- vsf_sysutil_lseek_end(const int fd)
- {
- filesize_t retval;
- retval = lseek(fd, 0, SEEK_END);
- if (retval < 0)
- {
- die("lseek");
- }
- }
- void*
- vsf_sysutil_malloc(unsigned int size)
- {
- void* p_ret;
- /* Paranoia - what if we got an integer overflow/underflow? */
- if (size == 0 || size > INT_MAX)
- {
- bug("zero or big size in sysutil_malloc");
- }
- p_ret = malloc(size);
- if (p_ret == NULL)
- {
- die("malloc");
- }
- return p_ret;
- }
- void*
- vsf_sysutil_realloc(void* p_ptr, unsigned int size)
- {
- void* p_ret;
- if (size == 0 || size > INT_MAX)
- {
- bug("zero or big size in sysutil_realloc");
- }
- p_ret = realloc(p_ptr, size);
- if (p_ret == NULL)
- {
- die("realloc");
- }
- return p_ret;
- }
- void
- vsf_sysutil_free(void* p_ptr)
- {
- if (p_ptr == NULL)
- {
- bug("sysutil_free got a null pointer");
- }
- free(p_ptr);
- }
- unsigned int
- vsf_sysutil_getpid(void)
- {
- if (s_current_pid == -1)
- {
- s_current_pid = vsf_sysutil_getpid_nocache();
- }
- return (unsigned int) s_current_pid;
- }
- int
- vsf_sysutil_fork(void)
- {
- int retval = vsf_sysutil_fork_failok();
- if (retval < 0)
- {
- die("fork");
- }
- return retval;
- }
- int
- vsf_sysutil_fork_failok(void)
- {
- int retval;
- retval = fork();
- if (retval == 0)
- {
- vsf_sysutil_post_fork();
- }
- return retval;
- }
- void
- vsf_sysutil_set_exit_func(exitfunc_t exitfunc)
- {
- s_exit_func = exitfunc;
- }
- void
- vsf_sysutil_exit(int exit_code)
- {
- if (s_exit_func)
- {
- exitfunc_t curr_func = s_exit_func;
- /* Prevent recursion */
- s_exit_func = 0;
- (*curr_func)();
- }
- _exit(exit_code);
- }
- struct vsf_sysutil_wait_retval
- vsf_sysutil_wait(void)
- {
- struct vsf_sysutil_wait_retval retval;
- vsf_sysutil_memclr(&retval, sizeof(retval));
- while (1)
- {
- int sys_ret = wait(&retval.exit_status);
- if (sys_ret < 0 && errno == EINTR)
- {
- vsf_sysutil_check_pending_actions(kVSFSysUtilUnknown, 0, 0);
- continue;
- }
- retval.syscall_retval = sys_ret;
- return retval;
- }
- }
- int
- vsf_sysutil_wait_reap_one(void)
- {
- int retval = waitpid(-1, NULL, WNOHANG);
- if (retval == 0 || (retval < 0 && errno == ECHILD))
- {
- /* No more children */
- return 0;
- }
- if (retval < 0)
- {
- die("waitpid");
- }
- /* Got one */
- return retval;
- }
- int
- vsf_sysutil_wait_get_retval(const struct vsf_sysutil_wait_retval* p_waitret)
- {
- return p_waitret->syscall_retval;
- }
- int
- vsf_sysutil_wait_exited_normally(
- const struct vsf_sysutil_wait_retval* p_waitret)
- {
- int status = ((struct vsf_sysutil_wait_retval*) p_waitret)->exit_status;
- return WIFEXITED(status);
- }
- int
- vsf_sysutil_wait_get_exitcode(const struct vsf_sysutil_wait_retval* p_waitret)
- {
- int status;
- if (!vsf_sysutil_wait_exited_normally(p_waitret))
- {
- bug("not a normal exit in sysutil_wait_get_exitcode");
- }
- status = ((struct vsf_sysutil_wait_retval*) p_waitret)->exit_status;
- return WEXITSTATUS(status);
- }
- void
- vsf_sysutil_activate_keepalive(int fd)
- {
- int keepalive = 1;
- int retval = setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &keepalive,
- sizeof(keepalive));
- if (retval != 0)
- {
- die("setsockopt: keepalive");
- }
- }
- void
- vsf_sysutil_activate_reuseaddr(int fd)
- {
- int reuseaddr = 1;
- int retval = setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &reuseaddr,
- sizeof(reuseaddr));
- if (retval != 0)
- {
- die("setsockopt: reuseaddr");
- }
- }
- void
- vsf_sysutil_set_nodelay(int fd)
- {
- int nodelay = 1;
- int retval = setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &nodelay,
- sizeof(nodelay));
- if (retval != 0)
- {
- die("setsockopt: nodelay");
- }
- }
- void
- vsf_sysutil_activate_sigurg(int fd)
- {
- int retval = fcntl(fd, F_SETOWN, vsf_sysutil_getpid());
- if (retval != 0)
- {
- die("fcntl");
- }
- }
- void
- vsf_sysutil_activate_oobinline(int fd)
- {
- int oob_inline = 1;
- int retval = setsockopt(fd, SOL_SOCKET, SO_OOBINLINE, &oob_inline,
- sizeof(oob_inline));
- if (retval != 0)
- {
- die("setsockopt: oobinline");
- }
- }
- void
- vsf_sysutil_set_iptos_throughput(int fd)
- {
- int tos = IPTOS_THROUGHPUT;
- /* Ignore failure to set (maybe this IP stack demands privilege for this) */
- (void) setsockopt(fd, IPPROTO_IP, IP_TOS, &tos, sizeof(tos));
- }
- void
- vsf_sysutil_activate_linger(int fd)
- {
- int retval;
- struct linger the_linger;
- vsf_sysutil_memclr(&the_linger, sizeof(the_linger));
- the_linger.l_onoff = 1;
- the_linger.l_linger = 60 * 10;
- retval = setsockopt(fd, SOL_SOCKET, SO_LINGER, &the_linger,
- sizeof(the_linger));
- if (retval != 0)
- {
- die("setsockopt: linger");
- }
- }
- void
- vsf_sysutil_deactivate_linger_failok(int fd)
- {
- struct linger the_linger;
- the_linger.l_onoff = 0;
- the_linger.l_linger = 0;
- (void) setsockopt(fd, SOL_SOCKET, SO_LINGER, &the_linger, sizeof(the_linger));
- }
- void
- vsf_sysutil_activate_noblock(int fd)
- {
- int retval;
- int curr_flags = fcntl(fd, F_GETFL);
- if (vsf_sysutil_retval_is_error(curr_flags))
- {
- die("fcntl");
- }
- curr_flags |= O_NONBLOCK;
- retval = fcntl(fd, F_SETFL, curr_flags);
- if (retval != 0)
- {
- die("fcntl");
- }
- }
- void
- vsf_sysutil_deactivate_noblock(int fd)
- {
- int retval;
- int curr_flags = fcntl(fd, F_GETFL);
- if (vsf_sysutil_retval_is_error(curr_flags))
- {
- die("fcntl");
- }
- curr_flags &= ~O_NONBLOCK;
- retval = fcntl(fd, F_SETFL, curr_flags);
- if (retval != 0)
- {
- die("fcntl");
- }
- }
- int
- vsf_sysutil_recv_peek(const int fd, void* p_buf, unsigned int len)
- {
- while (1)
- {
- int retval = recv(fd, p_buf, len, MSG_PEEK);
- int saved_errno = errno;
- vsf_sysutil_check_pending_actions(kVSFSysUtilIO, retval, fd);
- if (retval < 0 && saved_errno == EINTR)
- {
- continue;
- }
- return retval;
- }
- }
- int
- vsf_sysutil_atoi(const char* p_str)
- {
- return atoi(p_str);
- }
- filesize_t
- vsf_sysutil_a_to_filesize_t(const char* p_str)
- {
- /* atoll() is C99 standard - but even modern FreeBSD, OpenBSD don't have
- * it, so we'll supply our own
- */
- filesize_t result = 0;
- filesize_t mult = 1;
- unsigned int len = vsf_sysutil_strlen(p_str);
- unsigned int i;
- /* Bail if the number is excessively big (petabytes!) */
- if (len > 15)
- {
- return 0;
- }
- for (i=0; i<len; ++i)
- {
- char the_char = p_str[len-(i+1)];
- filesize_t val;
- if (the_char < '0' || the_char > '9')
- {
- return 0;
- }
- val = the_char - '0';
- val *= mult;
- result += val;
- mult *= 10;
- }
- return result;
- }
- const char*
- vsf_sysutil_ulong_to_str(unsigned long the_ulong)
- {
- static char ulong_buf[32];
- (void) snprintf(ulong_buf, sizeof(ulong_buf), "%lu", the_ulong);
- return ulong_buf;
- }
- const char*
- vsf_sysutil_filesize_t_to_str(filesize_t the_filesize)
- {
- static char filesize_buf[32];
- if (sizeof(long) == 8)
- {
- /* Avoid using non-standard %ll if we can */
- (void) snprintf(filesize_buf, sizeof(filesize_buf), "%ld",
- (long) the_filesize);
- }
- else
- {
- (void) snprintf(filesize_buf, sizeof(filesize_buf), "%lld", the_filesize);
- }
- return filesize_buf;
- }
- const char*
- vsf_sysutil_double_to_str(double the_double)
- {
- static char double_buf[32];
- (void) snprintf(double_buf, sizeof(double_buf), "%.2f", the_double);
- return double_buf;
- }
- const char*
- vsf_sysutil_uint_to_octal(unsigned int the_uint)
- {
- static char octal_buf[32];
- if (the_uint == 0)
- {
- octal_buf[0] = '0';
- octal_buf[1] = '\0';
- }
- else
- {
- (void) snprintf(octal_buf, sizeof(octal_buf), "0%o", the_uint);
- }
- return octal_buf;
- }
- unsigned int
- vsf_sysutil_octal_to_uint(const char* p_str)
- {
- /* NOTE - avoiding using sscanf() parser */
- unsigned int result = 0;
- int seen_non_zero_digit = 0;
- while (*p_str != '\0')
- {
- int digit = *p_str;
- if (!isdigit(digit) || digit > '7')
- {
- break;
- }
- if (digit != '0')
- {
- seen_non_zero_digit = 1;
- }
- if (seen_non_zero_digit)
- {
- result <<= 3;
- result += (digit - '0');
- }
- p_str++;
- }
- return result;
- }
- int
- vsf_sysutil_toupper(int the_char)
- {
- return toupper((unsigned char) the_char);
- }
- int
- vsf_sysutil_isspace(int the_char)
- {
- return isspace((unsigned char) the_char);
- }
- int
- vsf_sysutil_isprint(int the_char)
- {
- /* From Solar - we know better than some libc's! Don't let any potential
- * control chars through
- */
- unsigned char uc = (unsigned char) the_char;
- if (uc <= 31)
- {
- return 0;
- }
- if (uc == 177)
- {
- return 0;
- }
- if (uc >= 128 && uc <= 159)
- {
- return 0;
- }
- return isprint(the_char);
- }
- int
- vsf_sysutil_isalnum(int the_char)
- {
- return isalnum((unsigned char) the_char);
- }
- int
- vsf_sysutil_isdigit(int the_char)
- {
- return isdigit((unsigned char) the_char);
- }
- char*
- vsf_sysutil_getcwd(char* p_dest, const unsigned int buf_size)
- {
- char* p_retval;
- if (buf_size == 0) {
- return p_dest;
- }
- p_retval = getcwd(p_dest, buf_size);
- p_dest[buf_size - 1] = '\0';
- return p_retval;
- }
- int
- vsf_sysutil_mkdir(const char* p_dirname, const unsigned int mode)
- {
- return mkdir(p_dirname, mode);
- }
- int
- vsf_sysutil_rmdir(const char* p_dirname)
- {
- return rmdir(p_dirname);
- }
- int
- vsf_sysutil_chdir(const char* p_dirname)
- {
- return chdir(p_dirname);
- }
- int
- vsf_sysutil_rename(const char* p_from, const char* p_to)
- {
- return rename(p_from, p_to);
- }
- struct vsf_sysutil_dir*
- vsf_sysutil_opendir(const char* p_dirname)
- {
- return (struct vsf_sysutil_dir*) opendir(p_dirname);
- }
- void
- vsf_sysutil_closedir(struct vsf_sysutil_dir* p_dir)
- {
- DIR* p_real_dir = (DIR*) p_dir;
- int retval = closedir(p_real_dir);
- if (retval != 0)
- {
- die("closedir");
- }
- }
- const char*
- vsf_sysutil_next_dirent(struct vsf_sysutil_dir* p_dir)
- {
- DIR* p_real_dir = (DIR*) p_dir;
- struct dirent* p_dirent = readdir(p_real_dir);
- if (p_dirent == NULL)
- {
- return NULL;
- }
- return p_dirent->d_name;
- }
- unsigned int
- vsf_sysutil_strlen(const char* p_text)
- {
- size_t ret = strlen(p_text);
- /* A defense in depth measure. */
- if (ret > INT_MAX / 8)
- {
- die("string suspiciously long");
- }
- return (unsigned int) ret;
- }
- char*
- vsf_sysutil_strdup(const char* p_str)
- {
- return strdup(p_str);
- }
- void
- vsf_sysutil_memclr(void* p_dest, unsigned int size)
- {
- /* Safety */
- if (size == 0)
- {
- return;
- }
- memset(p_dest, '\0', size);
- }
- void
- vsf_sysutil_memcpy(void* p_dest, const void* p_src, const unsigned int size)
- {
- /* Safety */
- if (size == 0)
- {
- return;
- }
- /* Defense in depth */
- if (size > INT_MAX)
- {
- die("possible negative value to memcpy?");
- }
- memcpy(p_dest, p_src, size);
- }
- void
- vsf_sysutil_strcpy(char* p_dest, const char* p_src, unsigned int maxsize)
- {
- if (maxsize == 0)
- {
- return;
- }
- strncpy(p_dest, p_src, maxsize);
- p_dest[maxsize - 1] = '\0';
- }
- int
- vsf_sysutil_memcmp(const void* p_src1, const void* p_src2, unsigned int size)
- {
- /* Safety */
- if (size == 0)
- {
- return 0;
- }
- return memcmp(p_src1, p_src2, size);
- }
- int
- vsf_sysutil_strcmp(const char* p_src1, const char* p_src2)
- {
- return strcmp(p_src1, p_src2);
- }
- unsigned int
- vsf_sysutil_getpagesize(void)
- {
- static unsigned int s_page_size;
- if (s_page_size == 0)
- {
- s_page_size = getpagesize();
- if (s_page_size == 0)
- {
- die("getpagesize");
- }
- }
- return s_page_size;
- }
- static int
- vsf_sysutil_translate_memprot(const enum EVSFSysUtilMapPermission perm)
- {
- int retval = 0;
- switch (perm)
- {
- case kVSFSysUtilMapProtReadOnly:
- retval = PROT_READ;
- break;
- case kVSFSysUtilMapProtNone:
- retval = PROT_NONE;
- break;
- default:
- bug("bad value in sysutil_translate_memprot");
- break;
- }
- return retval;
- }
- void
- vsf_sysutil_memprotect(void* p_addr, unsigned int len,
- const enum EVSFSysUtilMapPermission perm)
- {
- int prot = vsf_sysutil_translate_memprot(perm);
- int retval = mprotect(p_addr, len, prot);
- if (retval != 0)
- {
- die("mprotect");
- }
- }
- void
- vsf_sysutil_memunmap(void* p_start, unsigned int length)
- {
- int retval = munmap(p_start, length);
- if (retval != 0)
- {
- die("munmap");
- }
- }
- static int
- vsf_sysutil_translate_openmode(const enum EVSFSysUtilOpenMode mode)
- {
- int retval = 0;
- switch (mode)
- {
- case kVSFSysUtilOpenReadOnly:
- retval = O_RDONLY;
- break;
- case kVSFSysUtilOpenWriteOnly:
- retval = O_WRONLY;
- break;
- case kVSFSysUtilOpenReadWrite:
- retval = O_RDWR;
- break;
- default:
- bug("bad mode in sysutil_translate_openmode");
- break;
- }
- return retval;
- }
- int
- vsf_sysutil_open_file(const char* p_filename,
- const enum EVSFSysUtilOpenMode mode)
- {
- return open(p_filename, vsf_sysutil_translate_openmode(mode) | O_NONBLOCK);
- }
- int
- vsf_sysutil_create_file_exclusive(const char* p_filename)
- {
- /* umask() also contributes to end mode */
- return open(p_filename, O_CREAT | O_EXCL | O_WRONLY | O_APPEND,
- tunable_file_open_mode);
- }
- int
- vsf_sysutil_create_or_open_file(const char* p_filename, unsigned int mode)
- {
- return open(p_filename, O_CREAT | O_WRONLY | O_NONBLOCK, mode);
- }
- int
- vsf_sysutil_create_or_open_file_append(const char* p_filename,
- unsigned int mode)
- {
- return open(p_filename, O_CREAT | O_WRONLY | O_NONBLOCK | O_APPEND, mode);
- }
- void
- vsf_sysutil_dupfd2(int old_fd, int new_fd)
- {
- int retval;
- if (old_fd == new_fd)
- {
- return;
- }
- retval = dup2(old_fd, new_fd);
- if (retval != new_fd)
- {
- die("dup2");
- }
- }
- void
- vsf_sysutil_close(int fd)
- {
- while (1)
- {
- int retval = close(fd);
- if (retval != 0)
- {
- if (errno == EINTR)
- {
- vsf_sysutil_check_pending_actions(kVSFSysUtilUnknown, 0, 0);
- continue;
- }
- die("close");
- }
- return;
- }
- }
- int
- vsf_sysutil_close_failok(int fd)
- {
- return close(fd);
- }
- int
- vsf_sysutil_unlink(const char* p_dead)
- {
- return unlink(p_dead);
- }
- int
- vsf_sysutil_write_access(const char* p_filename)
- {
- int retval = access(p_filename, W_OK);
- return (retval == 0);
- }
- static void
- vsf_sysutil_alloc_statbuf(struct vsf_sysutil_statbuf** p_ptr)
- {
- if (*p_ptr == NULL)
- {
- *p_ptr = vsf_sysutil_malloc(sizeof(struct stat));
- }
- }
- void
- vsf_sysutil_fstat(int fd, struct vsf_sysutil_statbuf** p_ptr)
- {
- int retval;
- vsf_sysutil_alloc_statbuf(p_ptr);
- retval = fstat(fd, (struct stat*) (*p_ptr));
- if (retval != 0)
- {
- die("fstat");
- }
- }
- int
- vsf_sysutil_stat(const char* p_name, struct vsf_sysutil_statbuf** p_ptr)
- {
- vsf_sysutil_alloc_statbuf(p_ptr);
- return stat(p_name, (struct stat*) (*p_ptr));
- }
- int
- vsf_sysutil_lstat(const char* p_name, struct vsf_sysutil_statbuf** p_ptr)
- {
- vsf_sysutil_alloc_statbuf(p_ptr);
- return lstat(p_name, (struct stat*) (*p_ptr));
- }
- void
- vsf_sysutil_dir_stat(const struct vsf_sysutil_dir* p_dir,
- struct vsf_sysutil_statbuf** p_ptr)
- {
- int fd = dirfd((DIR*) p_dir);
- vsf_sysutil_fstat(fd, p_ptr);
- }
- int
- vsf_sysutil_statbuf_is_regfile(const struct vsf_sysutil_statbuf* p_stat)
- {
- const struct stat* p_realstat = (const struct stat*) p_stat;
- return S_ISREG(p_realstat->st_mode);
- }
- int
- vsf_sysutil_statbuf_is_symlink(const struct vsf_sysutil_statbuf* p_stat)
- {
- const struct stat* p_realstat = (const struct stat*) p_stat;
- return S_ISLNK(p_realstat->st_mode);
- }
- int
- vsf_sysutil_statbuf_is_socket(const struct vsf_sysutil_statbuf* p_stat)
- {
- const struct stat* p_realstat = (const struct stat*) p_stat;
- return S_ISSOCK(p_realstat->st_mode);
- }
- int
- vsf_sysutil_statbuf_is_dir(const struct vsf_sysutil_statbuf* p_stat)
- {
- const struct stat* p_realstat = (const struct stat*) p_stat;
- return S_ISDIR(p_realstat->st_mode);
- }
- const char*
- vsf_sysutil_statbuf_get_perms(const struct vsf_sysutil_statbuf* p_statbuf)
- {
- static char perms[11];
- int i;
- const struct stat* p_stat = (const struct stat*) p_statbuf;
- for (i=0; i<10; i++)
- {
- perms[i] = '-';
- }
- perms[0] = '?';
- switch (p_stat->st_mode & S_IFMT)
- {
- case S_IFREG: perms[0] = '-'; break;
- case S_IFDIR: perms[0] = 'd'; break;
- case S_IFLNK: perms[0] = 'l'; break;
- case S_IFIFO: perms[0] = 'p'; break;
- case S_IFSOCK: perms[0] = 's'; break;
- case S_IFCHR: perms[0] = 'c'; break;
- case S_IFBLK: perms[0] = 'b'; break;
- default: break;
- }
- if (p_stat->st_mode & S_IRUSR) perms[1] = 'r';
- if (p_stat->st_mode & S_IWUSR) perms[2] = 'w';
- if (p_stat->st_mode & S_IXUSR) perms[3] = 'x';
- if (p_stat->st_mode & S_IRGRP) perms[4] = 'r';
- if (p_stat->st_mode & S_IWGRP) perms[5] = 'w';
- if (p_stat->st_mode & S_IXGRP) perms[6] = 'x';
- if (p_stat->st_mode & S_IROTH) perms[7] = 'r';
- if (p_stat->st_mode & S_IWOTH) perms[8] = 'w';
- if (p_stat->st_mode & S_IXOTH) perms[9] = 'x';
- if (p_stat->st_mode & S_ISUID) perms[3] = (perms[3] == 'x') ? 's' : 'S';
- if (p_stat->st_mode & S_ISGID) perms[6] = (perms[6] == 'x') ? 's' : 'S';
- if (p_stat->st_mode & S_ISVTX) perms[9] = (perms[9] == 'x') ? 't' : 'T';
- perms[10] = '\0';
- return perms;
- }
- const char*
- vsf_sysutil_statbuf_get_date(const struct vsf_sysutil_statbuf* p_statbuf,
- int use_localtime, long curr_time)
- {
- static char datebuf[64];
- int retval;
- struct tm* p_tm;
- const struct stat* p_stat = (const struct stat*) p_statbuf;
- const char* p_date_format = "%b %d %H:%M";
- if (!use_localtime)
- {
- p_tm = gmtime(&p_stat->st_mtime);
- }
- else
- {
- p_tm = localtime(&p_stat->st_mtime);
- }
- /* Is this a future or 6 months old date? If so, we drop to year format */
- if (p_stat->st_mtime > curr_time ||
- (curr_time - p_stat->st_mtime) > 60*60*24*182)
- {
- p_date_format = "%b %d %Y";
- }
- retval = strftime(datebuf, sizeof(datebuf), p_date_format, p_tm);
- datebuf[sizeof(datebuf)-1] = '\0';
- if (retval == 0)
- {
- die("strftime");
- }
- return datebuf;
- }
- const char*
- vsf_sysutil_statbuf_get_numeric_date(
- const struct vsf_sysutil_statbuf* p_statbuf,
- int use_localtime)
- {
- static char datebuf[15];
- const struct stat* p_stat = (const struct stat*) p_statbuf;
- struct tm* p_tm;
- int retval;
- if (!use_localtime)
- {
- p_tm = gmtime(&p_stat->st_mtime);
- }
- else
- {
- p_tm = localtime(&p_stat->st_mtime);
- }
- retval = strftime(datebuf, sizeof(datebuf), "%Y%m%d%H%M%S", p_tm);
- if (retval == 0)
- {
- die("strftime");
- }
- return datebuf;
- }
- filesize_t
- vsf_sysutil_statbuf_get_size(const struct vsf_sysutil_statbuf* p_statbuf)
- {
- const struct stat* p_stat = (const struct stat*) p_statbuf;
- if (p_stat->st_size < 0)
- {
- die("invalid inode size in vsf_sysutil_statbuf_get_size");
- }
- return p_stat->st_size;
- }
- int
- vsf_sysutil_statbuf_get_uid(const struct vsf_sysutil_statbuf* p_statbuf)
- {
- const struct stat* p_stat = (const struct stat*) p_statbuf;
- return p_stat->st_uid;
- }
- int
- vsf_sysutil_statbuf_get_gid(const struct vsf_sysutil_statbuf* p_statbuf)
- {
- const struct stat* p_stat = (const struct stat*) p_statbuf;
- return p_stat->st_gid;
- }
- unsigned int
- vsf_sysutil_statbuf_get_links(const struct vsf_sysutil_statbuf* p_statbuf)
- {
- const struct stat* p_stat = (const struct stat*) p_statbuf;
- return p_stat->st_nlink;
- }
- int
- vsf_sysutil_statbuf_is_readable_other(
- const struct vsf_sysutil_statbuf* p_statbuf)
- {
- const struct stat* p_stat = (const struct stat*) p_statbuf;
- if (p_stat->st_mode & S_IROTH)
- {
- return 1;
- }
- return 0;
- }
- const char*
- vsf_sysutil_statbuf_get_sortkey_mtime(
- const struct vsf_sysutil_statbuf* p_statbuf)
- {
- static char intbuf[32];
- const struct stat* p_stat = (const struct stat*) p_statbuf;
- /* This slight hack function must return a character date format such that
- * more recent dates appear later in the alphabet! Most notably, we must
- * make sure we pad to the same length with 0's
- */
- snprintf(intbuf, sizeof(intbuf), "%030ld", (long) p_stat->st_mtime);
- return intbuf;
- }
- void
- vsf_sysutil_fchown(const int fd, const int uid, const int gid)
- {
- if (fchown(fd, uid, gid) != 0)
- {
- die("fchown");
- }
- }
- void
- vsf_sysutil_fchmod(const int fd, unsigned int mode)
- {
- mode = mode & 0777;
- if (fchmod(fd, mode))
- {
- die("fchmod");
- }
- }
- int
- vsf_sysutil_chmod(const char* p_filename, unsigned int mode)
- {
- /* Safety: mask "mode" to just access permissions, e.g. no suid setting! */
- mode = mode & 0777;
- return chmod(p_filename, mode);
- }
- int
- vsf_sysutil_lock_file_write(int fd)
- {
- return lock_internal(fd, F_WRLCK);
- }
- int
- vsf_sysutil_lock_file_read(int fd)
- {
- return lock_internal(fd, F_RDLCK);
- }
- static int
- lock_internal(int fd, int lock_type)
- {
- struct flock the_lock;
- int retval;
- int saved_errno;
- vsf_sysutil_memclr(&the_lock, sizeof(the_lock));
- the_lock.l_type = lock_type;
- the_lock.l_whence = SEEK_SET;
- the_lock.l_start = 0;
- the_lock.l_len = 0;
- do
- {
- retval = fcntl(fd, F_SETLKW, &the_lock);
- saved_errno = errno;
- vsf_sysutil_check_pending_actions(kVSFSysUtilUnknown, 0, 0);
- }
- while (retval < 0 && saved_errno == EINTR);
- return retval;
- }
- void
- vsf_sysutil_unlock_file(int fd)
- {
- int retval;
- struct flock the_lock;
- vsf_sysutil_memclr(&the_lock, sizeof(the_lock));
- the_lock.l_type = F_UNLCK;
- the_lock.l_whence = SEEK_SET;
- the_lock.l_start = 0;
- the_lock.l_len = 0;
- retval = fcntl(fd, F_SETLK, &the_lock);
- if (retval != 0)
- {
- die("fcntl");
- }
- }
- int
- vsf_sysutil_readlink(const char* p_filename, char* p_dest, unsigned int bufsiz)
- {
- int retval;
- if (bufsiz == 0) {
- return -1;
- }
- retval = readlink(p_filename, p_dest, bufsiz - 1);
- if (retval < 0)
- {
- return retval;
- }
- /* Ensure buffer is NULL terminated; readlink(2) doesn't do that */
- p_dest[retval] = '\0';
- return retval;
- }
- int
- vsf_sysutil_retval_is_error(int retval)
- {
- if (retval < 0)
- {
- return 1;
- }
- return 0;
- }
- enum EVSFSysUtilError
- vsf_sysutil_get_error(void)
- {
- enum EVSFSysUtilError retval = kVSFSysUtilErrUnknown;
- switch (errno)
- {
- case EADDRINUSE:
- retval = kVSFSysUtilErrADDRINUSE;
- break;
- case ENOSYS:
- retval = kVSFSysUtilErrNOSYS;
- break;
- case EINTR:
- retval = kVSFSysUtilErrINTR;
- break;
- case EINVAL:
- retval = kVSFSysUtilErrINVAL;
- break;
- case EOPNOTSUPP:
- retval = kVSFSysUtilErrOPNOTSUPP;
- break;
- case EACCES:
- retval = kVSFSysUtilErrACCES;
- break;
- case ENOENT:
- retval = kVSFSysUtilErrNOENT;
- break;
- default:
- break;
- }
- return retval;
- }
- int
- vsf_sysutil_get_ipv4_sock(void)
- {
- int retval = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP);
- if (retval < 0)
- {
- die("socket");
- }
- return retval;
- }
- int
- vsf_sysutil_get_ipv6_sock(void)
- {
- int retval = socket(PF_INET6, SOCK_STREAM, IPPROTO_TCP);
- if (retval < 0)
- {
- die("socket");
- }
- return retval;
- }
- struct vsf_sysutil_socketpair_retval
- vsf_sysutil_unix_stream_socketpair(void)
- {
- struct vsf_sysutil_socketpair_retval retval;
- int the_sockets[2];
- int sys_retval = socketpair(PF_UNIX, SOCK_STREAM, 0, the_sockets);
- if (sys_retval != 0)
- {
- die("socketpair");
- }
- retval.socket_one = the_sockets[0];
- retval.socket_two = the_sockets[1];
- return retval;
- }
- int
- vsf_sysutil_bind(int fd, const struct vsf_sysutil_sockaddr* p_sockptr)
- {
- const struct sockaddr* p_sockaddr = &p_sockptr->u.u_sockaddr;
- int len = 0;
- if (p_sockaddr->sa_family == AF_INET)
- {
- len = sizeof(struct sockaddr_in);
- }
- else if (p_sockaddr->sa_family == AF_INET6)
- {
- len = sizeof(struct sockaddr_in6);
- }
- else
- {
- die("can only support ipv4 and ipv6 currently");
- }
- return bind(fd, p_sockaddr, len);
- }
- int
- vsf_sysutil_listen(int fd, const unsigned int backlog)
- {
- int retval = listen(fd, backlog);
- if (vsf_sysutil_retval_is_error(retval) &&
- vsf_sysutil_get_error() != kVSFSysUtilErrADDRINUSE)
- {
- die("listen");
- }
- return retval;
- }
- /* Warning: callers of this function assume it does NOT make use of any
- * non re-entrant calls such as malloc().
- */
- int
- vsf_sysutil_accept_timeout(int fd, struct vsf_sysutil_sockaddr* p_sockaddr,
- unsigned int wait_seconds)
- {
- struct vsf_sysutil_sockaddr remote_addr;
- int retval;
- int saved_errno;
- fd_set accept_fdset;
- struct timeval timeout;
- socklen_t socklen = sizeof(remote_addr);
- if (p_sockaddr)
- {
- vsf_sysutil_memclr(p_sockaddr, sizeof(*p_sockaddr));
- }
- if (wait_seconds > 0)
- {
- FD_ZERO(&accept_fdset);
- FD_SET(fd, &accept_fdset);
- timeout.tv_sec = wait_seconds;
- timeout.tv_usec = 0;
- do
- {
- retval = select(fd + 1, &accept_fdset, NULL, NULL, &timeout);
- saved_errno = errno;
- vsf_sysutil_check_pending_actions(kVSFSysUtilUnknown, 0, 0);
- }
- while (retval < 0 && saved_errno == EINTR);
- if (retval <= 0)
- {
- if (retval == 0)
- {
- errno = EAGAIN;
- }
- return -1;
- }
- }
- retval = accept(fd, &remote_addr.u.u_sockaddr, &socklen);
- vsf_sysutil_check_pending_actions(kVSFSysUtilUnknown, 0, 0);
- if (retval < 0)
- {
- return retval;
- }
- /* FreeBSD bug / paranoia: ai32@drexel.edu */
- if (socklen == 0)
- {
- return -1;
- }
- if (remote_addr.u.u_sockaddr.sa_family != AF_INET &&
- remote_addr.u.u_sockaddr.sa_family != AF_INET6)
- {
- die("can only support ipv4 and ipv6 currently");
- }
- if (p_sockaddr)
- {
- if (remote_addr.u.u_sockaddr.sa_family == AF_INET)
- {
- vsf_sysutil_memclr(&remote_addr.u.u_sockaddr_in.sin_zero,
- sizeof(remote_addr.u.u_sockaddr_in.sin_zero));
- vsf_sysutil_memcpy(p_sockaddr, &remote_addr.u.u_sockaddr_in,
- sizeof(remote_addr.u.u_sockaddr_in));
- }
- else
- {
- vsf_sysutil_memcpy(p_sockaddr, &remote_addr.u.u_sockaddr_in6,
- sizeof(remote_addr.u.u_sockaddr_in6));
- }
- }
- return retval;
- }
- int
- vsf_sysutil_connect_timeout(int fd, const struct vsf_sysutil_sockaddr* p_addr,
- unsigned int wait_seconds)
- {
- const struct sockaddr* p_sockaddr = &p_addr->u.u_sockaddr;
- unsigned int addrlen = 0;
- int retval;
- int saved_errno;
- if (p_sockaddr->sa_family == AF_INET)
- {
- addrlen = sizeof(p_addr->u.u_sockaddr_in);
- }
- else if (p_sockaddr->sa_family == AF_INET6)
- {
- addrlen = sizeof(p_addr->u.u_sockaddr_in6);
- }
- else
- {
- die("can only support ipv4 and ipv6 currently");
- }
- if (wait_seconds > 0)
- {
- vsf_sysutil_activate_noblock(fd);
- }
- retval = connect(fd, p_sockaddr, addrlen);
- if (retval < 0 && errno == EINPROGRESS)
- {
- fd_set connect_fdset;
- struct timeval timeout;
- FD_ZERO(&connect_fdset);
- FD_SET(fd, &connect_fdset);
- timeout.tv_sec = wait_seconds;
- timeout.tv_usec = 0;
- do
- {
- retval = select(fd + 1, NULL, &connect_fdset, NULL, &timeout);
- saved_errno = errno;
- vsf_sysutil_check_pending_actions(kVSFSysUtilUnknown, 0, 0);
- }
- while (retval < 0 && saved_errno == EINTR);
- if (retval <= 0)
- {
- if (retval == 0)
- {
- errno = EAGAIN;
- }
- retval = -1;
- }
- else
- {
- socklen_t socklen = sizeof(retval);
- int sockoptret = getsockopt(fd, SOL_SOCKET, SO_ERROR, &retval, &socklen);
- if (sockoptret != 0)
- {
- die("getsockopt");
- }
- if (retval != 0)
- {
- errno = retval;
- retval = -1;
- }
- }
- }
- if (wait_seconds > 0)
- {
- vsf_sysutil_deactivate_noblock(fd);
- }
- return retval;
- }
- void
- vsf_sysutil_getsockname(int fd, struct vsf_sysutil_sockaddr** p_sockptr)
- {
- struct vsf_sysutil_sockaddr the_addr;
- int retval;
- socklen_t socklen = sizeof(the_addr);
- vsf_sysutil_sockaddr_clear(p_sockptr);
- retval = getsockname(fd, &the_addr.u.u_sockaddr, &socklen);
- if (retval != 0)
- {
- die("getsockname");
- }
- if (the_addr.u.u_sockaddr.sa_family != AF_INET &&
- the_addr.u.u_sockaddr.sa_family != AF_INET6)
- {
- die("can only support ipv4 and ipv6 currently");
- }
- vsf_sysutil_sockaddr_alloc(p_sockptr);
- if (socklen > sizeof(the_addr))
- {
- socklen = sizeof(the_addr);
- }
- vsf_sysutil_memcpy(*p_sockptr, &the_addr, socklen);
- }
- void
- vsf_sysutil_getpeername(int fd, struct vsf_sysutil_sockaddr** p_sockptr)
- {
- struct vsf_sysutil_sockaddr the_addr;
- int retval;
- socklen_t socklen = sizeof(the_addr);
- vsf_sysutil_sockaddr_clear(p_sockptr);
- retval = getpeername(fd, &the_addr.u.u_sockaddr, &socklen);
- if (retval != 0)
- {
- die("getpeername");
- }
- if (the_addr.u.u_sockaddr.sa_family != AF_INET &&
- the_addr.u.u_sockaddr.sa_family != AF_INET6)
- {
- die("can only support ipv4 and ipv6 currently");
- }
- vsf_sysutil_sockaddr_alloc(p_sockptr);
- if (socklen > sizeof(the_addr))
- {
- socklen = sizeof(the_addr);
- }
- vsf_sysutil_memcpy(*p_sockptr, &the_addr, socklen);
- }
- void
- vsf_sysutil_shutdown_failok(int fd)
- {
- /* SHUT_RDWR is a relatively new addition */
- #ifndef SHUT_RDWR
- #define SHUT_RDWR 2
- #endif
- (void) shutdown(fd, SHUT_RDWR);
- }
- void
- vsf_sysutil_shutdown_read_failok(int fd)
- {
- /* SHUT_RD is a relatively new addition */
- #ifndef SHUT_RD
- #define SHUT_RD 0
- #endif
- (void) shutdown(fd, SHUT_RD);
- }
- void
- vsf_sysutil_sockaddr_clear(struct vsf_sysutil_sockaddr** p_sockptr)
- {
- if (*p_sockptr != NULL)
- {
- vsf_sysutil_free(*p_sockptr);
- *p_sockptr = NULL;
- }
- }
- void
- vsf_sysutil_sockaddr_alloc(struct vsf_sysutil_sockaddr** p_sockptr)
- {
- vsf_sysutil_sockaddr_clear(p_sockptr);
- *p_sockptr = vsf_sysutil_malloc(sizeof(**p_sockptr));
- vsf_sysutil_memclr(*p_sockptr, sizeof(**p_sockptr));
- }
- void
- vsf_sysutil_sockaddr_alloc_ipv4(struct vsf_sysutil_sockaddr** p_sockptr)
- {
- vsf_sysutil_sockaddr_alloc(p_sockptr);
- (*p_sockptr)->u.u_sockaddr.sa_family = AF_INET;
- }
- void
- vsf_sysutil_sockaddr_alloc_ipv6(struct vsf_sysutil_sockaddr** p_sockptr)
- {
- vsf_sysutil_sockaddr_alloc(p_sockptr);
- (*p_sockptr)->u.u_sockaddr.sa_family = AF_INET6;
- }
- void
- vsf_sysutil_sockaddr_clone(struct vsf_sysutil_sockaddr** p_sockptr,
- const struct vsf_sysutil_sockaddr* p_src)
- {
- struct vsf_sysutil_sockaddr* p_sockaddr = 0;
- vsf_sysutil_sockaddr_alloc(p_sockptr);
- p_sockaddr = *p_sockptr;
- if (p_src->u.u_sockaddr.sa_family == AF_INET)
- {
- p_sockaddr->u.u_sockaddr.sa_family = AF_INET;
- vsf_sysutil_memcpy(&p_sockaddr->u.u_sockaddr_in.sin_addr,
- &p_src->u.u_sockaddr_in.sin_addr,
- sizeof(p_sockaddr->u.u_sockaddr_in.sin_addr));
- }
- else if (p_src->u.u_sockaddr.sa_family == AF_INET6)
- {
- p_sockaddr->u.u_sockaddr.sa_family = AF_INET6;
- vsf_sysutil_memcpy(&p_sockaddr->u.u_sockaddr_in6.sin6_addr,
- &p_src->u.u_sockaddr_in6.sin6_addr,
- sizeof(p_sockaddr->u.u_sockaddr_in6.sin6_addr));
- p_sockaddr->u.u_sockaddr_in6.sin6_scope_id =
- p_src->u.u_sockaddr_in6.sin6_scope_id;
- }
- else
- {
- die("can only support ipv4 and ipv6 currently");
- }
- }
- int
- vsf_sysutil_sockaddr_addr_equal(const struct vsf_sysutil_sockaddr* p1,
- const struct vsf_sysutil_sockaddr* p2)
- {
- int family1 = p1->u.u_sockaddr.sa_family;
- int family2 = p2->u.u_sockaddr.sa_family;
- if (family1 != family2)
- {
- if (family1 == AF_INET && family2 == AF_INET6)
- {
- const void* p_ipv4_addr = vsf_sysutil_sockaddr_ipv6_v4(p2);
- if (p_ipv4_addr &&
- !vsf_sysutil_memcmp(p_ipv4_addr, &p1->u.u_sockaddr_in.sin_addr,
- sizeof(p1->u.u_sockaddr_in.sin_addr)))
- {
- return 1;
- }
- }
- else if (family1 == AF_INET6 && family2 == AF_INET)
- {
- const void* p_ipv4_addr = vsf_sysutil_sockaddr_ipv6_v4(p1);
- if (p_ipv4_addr &&
- !vsf_sysutil_memcmp(p_ipv4_addr, &p2->u.u_sockaddr_in.sin_addr,
- sizeof(p2->u.u_sockaddr_in.sin_addr)))
- {
- return 1;
- }
- }
- return 0;
- }
- if (family1 == AF_INET)
- {
- if (vsf_sysutil_memcmp(&p1->u.u_sockaddr_in.sin_addr,
- &p2->u.u_sockaddr_in.sin_addr,
- sizeof(p1->u.u_sockaddr_in.sin_addr)) == 0)
- {
- return 1;
- }
- }
- else if (family1 == AF_INET6)
- {
- if (vsf_sysutil_memcmp(&p1->u.u_sockaddr_in6.sin6_addr,
- &p2->u.u_sockaddr_in6.sin6_addr,
- sizeof(p1->u.u_sockaddr_in6.sin6_addr)) == 0)
- {
- return 1;
- }
- }
- return 0;
- }
- int
- vsf_sysutil_sockaddr_is_ipv6(const struct vsf_sysutil_sockaddr* p_sockaddr)
- {
- if (p_sockaddr->u.u_sockaddr.sa_family == AF_INET6)
- {
- return 1;
- }
- return 0;
- }
- void
- vsf_sysutil_sockaddr_set_ipv4addr(struct vsf_sysutil_sockaddr* p_sockptr,
- const unsigned char* p_raw)
- {
- if (p_sockptr->u.u_sockaddr.sa_family == AF_INET)
- {
- vsf_sysutil_memcpy(&p_sockptr->u.u_sockaddr_in.sin_addr, p_raw,
- sizeof(p_sockptr->u.u_sockaddr_in.sin_addr));
- }
- else if (p_sockptr->u.u_sockaddr.sa_family == AF_INET6)
- {
- static struct vsf_sysutil_sockaddr* s_p_sockaddr;
- vsf_sysutil_sockaddr_alloc_ipv4(&s_p_sockaddr);
- vsf_sysutil_memcpy(&s_p_sockaddr->u.u_sockaddr_in.sin_addr, p_raw,
- sizeof(s_p_sockaddr->u.u_sockaddr_in.sin_addr));
- vsf_sysutil_memcpy(&p_sockptr->u.u_sockaddr_in6.sin6_addr,
- vsf_sysutil_sockaddr_ipv4_v6(s_p_sockaddr),
- sizeof(p_sockptr->u.u_sockaddr_in6.sin6_addr));
- }
- else
- {
- bug("bad family");
- }
- }
- void
- vsf_sysutil_sockaddr_set_ipv6addr(struct vsf_sysutil_sockaddr* p_sockptr,
- const unsigned char* p_raw)
- {
- if (p_sockptr->u.u_sockaddr.sa_family == AF_INET6)
- {
- vsf_sysutil_memcpy(&p_sockptr->u.u_sockaddr_in6.sin6_addr, p_raw,
- sizeof(p_sockptr->u.u_sockaddr_in6.sin6_addr));
- }
- else
- {
- bug("bad family");
- }
- }
- const void*
- vsf_sysutil_sockaddr_ipv6_v4(const struct vsf_sysutil_sockaddr* p_addr)
- {
- static unsigned char pattern[12] =
- { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF };
- const unsigned char* p_addr_start;
- if (p_addr->u.u_sockaddr.sa_family != AF_INET6)
- {
- return 0;
- }
- if (vsf_sysutil_memcmp(pattern, &p_addr->u.u_sockaddr_in6.sin6_addr, 12))
- {
- return 0;
- }
- p_addr_start = (const unsigned char*)&p_addr->u.u_sockaddr_in6.sin6_addr;
- return &p_addr_start[12];
- }
- const void*
- vsf_sysutil_sockaddr_ipv4_v6(const struct vsf_sysutil_sockaddr* p_addr)
- {
- static unsigned char ret[16] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF };
- if (p_addr->u.u_sockaddr.sa_family != AF_INET)
- {
- return 0;
- }
- vsf_sysutil_memcpy(&ret[12], &p_addr->u.u_sockaddr_in.sin_addr, 4);
- return ret;
- }
- void*
- vsf_sysutil_sockaddr_get_raw_addr(struct vsf_sysutil_sockaddr* p_sockptr)
- {
- if (p_sockptr->u.u_sockaddr.sa_family == AF_INET)
- {
- return &p_sockptr->u.u_sockaddr_in.sin_addr;
- }
- else if (p_sockptr->u.u_sockaddr.sa_family == AF_INET6)
- {
- return &p_sockptr->u.u_sockaddr_in6.sin6_addr;
- }
- else
- {
- bug("bad family");
- }
- return 0;
- }
- unsigned int
- vsf_sysutil_get_ipaddr_size(void)
- {
- struct vsf_sysutil_sockaddr addr;
- unsigned int size = sizeof(addr.u.u_sockaddr_in.sin_addr);
- unsigned int size2 = sizeof(addr.u.u_sockaddr_in6.sin6_addr);
- if (size2 > size)
- {
- size = size2;
- }
- return size;
- }
- int
- vsf_sysutil_get_ipsock(const struct vsf_sysutil_sockaddr* p_addr)
- {
- if (p_addr->u.u_sockaddr.sa_family == AF_INET)
- {
- return vsf_sysutil_get_ipv4_sock();
- }
- else if (p_addr->u.u_sockaddr.sa_family == AF_INET6)
- {
- return vsf_sysutil_get_ipv6_sock();
- }
- else
- {
- bug("bad family");
- }
- return -1;
- }
- void
- vsf_sysutil_sockaddr_set_any(struct vsf_sysutil_sockaddr* p_sockaddr)
- {
- if (p_sockaddr->u.u_sockaddr.sa_family == AF_INET)
- {
- vsf_sysutil_memclr(&p_sockaddr->u.u_sockaddr_in.sin_addr,
- sizeof(p_sockaddr->u.u_sockaddr_in.sin_addr));
- }
- else if (p_sockaddr->u.u_sockaddr.sa_family == AF_INET6)
- {
- vsf_sysutil_memclr(&p_sockaddr->u.u_sockaddr_in6.sin6_addr,
- sizeof(p_sockaddr->u.u_sockaddr_in6.sin6_addr));
- }
- else
- {
- bug("bad family");
- }
- }
- unsigned short
- vsf_sysutil_sockaddr_get_port(const struct vsf_sysutil_sockaddr* p_sockptr)
- {
- if (p_sockptr->u.u_sockaddr.sa_family == AF_INET)
- {
- return ntohs(p_sockptr->u.u_sockaddr_in.sin_port);
- }
- else if (p_sockptr->u.u_sockaddr.sa_family == AF_INET6)
- {
- return ntohs(p_sockptr->u.u_sockaddr_in6.sin6_port);
- }
- else
- {
- bug("bad family");
- }
- /* NOTREACHED */
- return 0;
- }
- void
- vsf_sysutil_sockaddr_set_port(struct vsf_sysutil_sockaddr* p_sockptr,
- unsigned short the_port)
- {
- if (p_sockptr->u.u_sockaddr.sa_family == AF_INET)
- {
- p_sockptr->u.u_sockaddr_in.sin_port = htons(the_port);
- }
- else if (p_sockptr->u.u_sockaddr.sa_family == AF_INET6)
- {
- p_sockptr->u.u_sockaddr_in6.sin6_port = htons(the_port);
- }
- else
- {
- bug("bad family");
- }
- }
- int
- vsf_sysutil_is_port_reserved(unsigned short the_port)
- {
- if (the_port < IPPORT_RESERVED)
- {
- return 1;
- }
- return 0;
- }
- const char*
- vsf_sysutil_inet_ntop(const struct vsf_sysutil_sockaddr* p_sockptr)
- {
- const struct sockaddr* p_sockaddr = &p_sockptr->u.u_sockaddr;
- if (p_sockaddr->sa_family == AF_INET)
- {
- return inet_ntoa(p_sockptr->u.u_sockaddr_in.sin_addr);
- }
- else if (p_sockaddr->sa_family == AF_INET6)
- {
- static char inaddr_buf[64];
- const char* p_ret = inet_ntop(AF_INET6,
- &p_sockptr->u.u_sockaddr_in6.sin6_addr,
- inaddr_buf, sizeof(inaddr_buf));
- inaddr_buf[sizeof(inaddr_buf) - 1] = '\0';
- if (p_ret == NULL)
- {
- inaddr_buf[0] = '\0';
- }
- return inaddr_buf;
- }
- else
- {
- die("can only support ipv4 and ipv6 currently");
- return 0;
- }
- }
- const char*
- vsf_sysutil_inet_ntoa(const void* p_raw_addr)
- {
- return inet_ntoa(*((struct in_addr*)p_raw_addr));
- }
- int
- vsf_sysutil_inet_aton(const char* p_text, struct vsf_sysutil_sockaddr* p_addr)
- {
- struct in_addr sin_addr;
- if (p_addr->u.u_sockaddr.sa_family != AF_INET)
- {
- bug("bad family");
- }
- if (inet_aton(p_text, &sin_addr))
- {
- vsf_sysutil_memcpy(&p_addr->u.u_sockaddr_in.sin_addr,
- &sin_addr, sizeof(p_addr->u.u_sockaddr_in.sin_addr));
- return 1;
- }
- else
- {
- return 0;
- }
- }
- void
- vsf_sysutil_dns_resolve(struct vsf_sysutil_sockaddr** p_sockptr,
- const char* p_name)
- {
- struct hostent* hent = gethostbyname(p_name);
- if (hent == NULL)
- {
- die2("cannot resolve host:", p_name);
- }
- vsf_sysutil_sockaddr_clear(p_sockptr);
- if (hent->h_addrtype == AF_INET)
- {
- unsigned int len = hent->h_length;
- if (len > sizeof((*p_sockptr)->u.u_sockaddr_in.sin_addr))
- {
- len = sizeof((*p_sockptr)->u.u_sockaddr_in.sin_addr);
- }
- vsf_sysutil_sockaddr_alloc_ipv4(p_sockptr);
- vsf_sysutil_memcpy(&(*p_sockptr)->u.u_sockaddr_in.sin_addr,
- hent->h_addr_list[0], len);
- }
- else if (hent->h_addrtype == AF_INET6)
- {
- unsigned int len = hent->h_length;
- if (len > sizeof((*p_sockptr)->u.u_sockaddr_in6.sin6_addr))
- {
- len = sizeof((*p_sockptr)->u.u_sockaddr_in6.sin6_addr);
- }
- vsf_sysutil_sockaddr_alloc_ipv6(p_sockptr);
- vsf_sysutil_memcpy(&(*p_sockptr)->u.u_sockaddr_in6.sin6_addr,
- hent->h_addr_list[0], len);
- }
- else
- {
- die("gethostbyname(): neither IPv4 nor IPv6");
- }
- }
- struct vsf_sysutil_user*
- vsf_sysutil_getpwuid(const int uid)
- {
- if (uid < 0)
- {
- bug("negative uid in vsf_sysutil_getpwuid");
- }
- return (struct vsf_sysutil_user*) getpwuid((unsigned int) uid);
- }
- struct vsf_sysutil_user*
- vsf_sysutil_getpwnam(const char* p_user)
- {
- return (struct vsf_sysutil_user*) getpwnam(p_user);
- }
- const char*
- vsf_sysutil_user_getname(const struct vsf_sysutil_user* p_user)
- {
- const struct passwd* p_passwd = (const struct passwd*) p_user;
- return p_passwd->pw_name;
- }
- const char*
- vsf_sysutil_user_get_homedir(const struct vsf_sysutil_user* p_user)
- {
- const struct passwd* p_passwd = (const struct passwd*) p_user;
- return p_passwd->pw_dir;
- }
- int
- vsf_sysutil_user_getuid(const struct vsf_sysutil_user* p_user)
- {
- const struct passwd* p_passwd = (const struct passwd*) p_user;
- return p_passwd->pw_uid;
- }
- int
- vsf_sysutil_user_getgid(const struct vsf_sysutil_user* p_user)
- {
- const struct passwd* p_passwd = (const struct passwd*) p_user;
- return p_passwd->pw_gid;
- }
- struct vsf_sysutil_group*
- vsf_sysutil_getgrgid(const int gid)
- {
- if (gid < 0)
- {
- die("negative gid in vsf_sysutil_getgrgid");
- }
- return (struct vsf_sysutil_group*) getgrgid((unsigned int) gid);
- }
- const char*
- vsf_sysutil_group_getname(const struct vsf_sysutil_group* p_group)
- {
- const struct group* p_grp = (const struct group*) p_group;
- return p_grp->gr_name;
- }
- unsigned char
- vsf_sysutil_get_random_byte(void)
- {
- static int seeded;
- unsigned int uint_res;
- unsigned char c1, c2, c3, c4;
- if (!seeded)
- {
- struct timeval tv;
- int retval = gettimeofday(&tv, NULL);
- if (retval != 0)
- {
- die("gettimeofday");
- }
- srand((unsigned)tv.tv_usec);
- seeded = 1;
- }
- uint_res = rand();
- c1 = uint_res & 0x000000ff;
- c2 = (uint_res >> 8) & 0x000000ff;
- c3 = (uint_res >> 16) & 0x000000ff;
- c4 = (uint_res >> 24) & 0x000000ff;
- return c1 ^ c2 ^ c3 ^ c4;
- }
- int
- vsf_sysutil_running_as_root(void)
- {
- return (getuid() == 0);
- }
- void
- vsf_sysutil_setuid(const struct vsf_sysutil_user* p_user)
- {
- const struct passwd* p_passwd = (const struct passwd*) p_user;
- vsf_sysutil_setuid_numeric(p_passwd->pw_uid);
- }
- void
- vsf_sysutil_setuid_numeric(int uid)
- {
- int retval = setuid(uid);
- if (retval != 0)
- {
- die("setuid");
- }
- }
- void
- vsf_sysutil_setgid(const struct vsf_sysutil_user* p_user)
- {
- const struct passwd* p_passwd = (const struct passwd*) p_user;
- vsf_sysutil_setgid_numeric(p_passwd->pw_gid);
- }
- void
- vsf_sysutil_setgid_numeric(int gid)
- {
- int retval = setgid(gid);
- if (retval != 0)
- {
- die("setgid");
- }
- }
- int
- vsf_sysutil_geteuid(void)
- {
- int retval = geteuid();
- if (retval < 0)
- {
- die("geteuid");
- }
- return retval;
- }
- int
- vsf_sysutil_getegid(void)
- {
- int retval = getegid();
- if (retval < 0)
- {
- die("getegid");
- }
- return retval;
- }
- void
- vsf_sysutil_seteuid(const struct vsf_sysutil_user* p_user)
- {
- const struct passwd* p_passwd = (const struct passwd*) p_user;
- vsf_sysutil_seteuid_numeric(p_passwd->pw_uid);
- }
- void
- vsf_sysutil_setegid(const struct vsf_sysutil_user* p_user)
- {
- const struct passwd* p_passwd = (const struct passwd*) p_user;
- vsf_sysutil_setegid_numeric(p_passwd->pw_gid);
- }
- void
- vsf_sysutil_seteuid_numeric(int uid)
- {
- /* setreuid() would seem to be more portable than seteuid() */
- int retval = setreuid(-1, uid);
- if (retval != 0)
- {
- die("seteuid");
- }
- }
- void
- vsf_sysutil_setegid_numeric(int gid)
- {
- /* setregid() would seem to be more portable than setegid() */
- int retval = setregid(-1, gid);
- if (retval != 0)
- {
- die("setegid");
- }
- }
- void
- vsf_sysutil_clear_supp_groups(void)
- {
- int retval = setgroups(0, NULL);
- if (retval != 0)
- {
- die("setgroups");
- }
- }
- void
- vsf_sysutil_initgroups(const struct vsf_sysutil_user* p_user)
- {
- const struct passwd* p_passwd = (const struct passwd*) p_user;
- int retval = initgroups(p_passwd->pw_name, p_passwd->pw_gid);
- if (retval != 0)
- {
- die("initgroups");
- }
- }
- void
- vsf_sysutil_chroot(const char* p_root_path)
- {
- int retval = chroot(p_root_path);
- if (retval != 0)
- {
- die("chroot");
- }
- }
- unsigned int
- vsf_sysutil_get_umask(void)
- {
- return s_current_umask;
- }
- void
- vsf_sysutil_set_umask(unsigned int new_umask)
- {
- s_current_umask = (new_umask & 0777);
- (void) umask(s_current_umask);
- }
- void
- vsf_sysutil_make_session_leader(void)
- {
- /* This makes us the leader if we are not already */
- (void) setsid();
- /* Check we're the leader */
- if ((int) vsf_sysutil_getpid() != getpgrp())
- {
- die("not session leader");
- }
- }
- void
- vsf_sysutil_reopen_standard_fds(void)
- {
- /* This reopens STDIN, STDOUT and STDERR to /dev/null */
- int fd;
- if ((fd = open("/dev/null", O_RDWR, 0)) < 0)
- {
- goto error;
- }
- vsf_sysutil_dupfd2(fd, STDIN_FILENO);
- vsf_sysutil_dupfd2(fd, STDOUT_FILENO);
- vsf_sysutil_dupfd2(fd, STDERR_FILENO);
- if ( fd > 2 )
- {
- vsf_sysutil_close(fd);
- }
- return;
- error:
- die("reopening standard file descriptors to /dev/null failed");
- }
- void
- vsf_sysutil_tzset(void)
- {
- int retval;
- char tzbuf[sizeof("+HHMM!")];
- time_t the_time = time(NULL);
- struct tm* p_tm;
- tzset();
- p_tm = localtime(&the_time);
- if (p_tm == NULL)
- {
- die("localtime");
- }
- /* Set our timezone in the TZ environment variable to cater for the fact
- * that modern glibc does not cache /etc/localtime (which becomes inaccessible
- * when we chroot().
- */
- retval = strftime(tzbuf, sizeof(tzbuf), "%z", p_tm);
- tzbuf[sizeof(tzbuf) - 1] = '\0';
- if (retval == 5)
- {
- /* Static because putenv() does not copy the string. */
- static char envtz[sizeof("TZ=UTC-hh:mm")];
- /* Insert a colon so we have e.g. -05:00 instead of -0500 */
- tzbuf[5] = tzbuf[4];
- tzbuf[4] = tzbuf[3];
- tzbuf[3] = ':';
- /* Invert the sign - we just got the offset _from_ UTC but for TZ, we need
- * the offset _to_ UTC.
- */
- if (tzbuf[0] == '+')
- {
- tzbuf[0] = '-';
- }
- else
- {
- tzbuf[0] = '+';
- }
- snprintf(envtz, sizeof(envtz), "TZ=UTC%s", tzbuf);
- putenv(envtz);
- s_timezone = ((tzbuf[1] - '0') * 10 + (tzbuf[2] - '0')) * 60 * 60;
- s_timezone += ((tzbuf[4] - '0') * 10 + (tzbuf[5] - '0')) * 60;
- if (tzbuf[0] == '-')
- {
- s_timezone *= -1;
- }
- }
- /* Call in to the time subsystem again now that TZ is set, trying to force
- * caching of the actual zoneinfo for the timezone.
- */
- p_tm = localtime(&the_time);
- if (p_tm == NULL)
- {
- die("localtime #2");
- }
- p_tm = gmtime(&the_time);
- if (p_tm == NULL)
- {
- die("gmtime");
- }
- }
- const char*
- vsf_sysutil_get_current_date(void)
- {
- static char datebuf[64];
- time_t curr_time;
- const struct tm* p_tm;
- int i = 0;
- curr_time = vsf_sysutil_get_time_sec();
- p_tm = localtime(&curr_time);
- if (strftime(datebuf, sizeof(datebuf), "%a %b!%d %H:%M:%S %Y", p_tm) == 0)
- {
- die("strftime");
- }
- datebuf[sizeof(datebuf) - 1] = '\0';
- /* This hack is because %e in strftime() isn't so portable */
- while (datebuf[i] != '!' && datebuf[i] != '\0')
- {
- ++i;
- }
- if (datebuf[i] == '!')
- {
- datebuf[i] = ' ';
- if (datebuf[i+1] == '0')
- {
- datebuf[i+1] = ' ';
- }
- }
- return datebuf;
- }
- long
- vsf_sysutil_get_time_sec(void)
- {
- if (gettimeofday(&s_current_time, NULL) != 0)
- {
- die("gettimeofday");
- }
- return s_current_time.tv_sec;
- }
- long
- vsf_sysutil_get_time_usec(void)
- {
- return s_current_time.tv_usec;
- }
- void
- vsf_sysutil_qsort(void* p_base, unsigned int num_elem, unsigned int elem_size,
- int (*p_compar)(const void *, const void *))
- {
- qsort(p_base, num_elem, elem_size, p_compar);
- }
- void
- vsf_sysutil_sleep(double seconds)
- {
- int retval;
- int saved_errno;
- double fractional;
- time_t secs;
- struct timespec ts;
- secs = (time_t) seconds;
- fractional = seconds - (double) secs;
- ts.tv_sec = secs;
- ts.tv_nsec = (long) (fractional * (double) 1000000000);
- do
- {
- retval = nanosleep(&ts, &ts);
- saved_errno = errno;
- vsf_sysutil_check_pending_actions(kVSFSysUtilUnknown, 0, 0);
- } while (retval == -1 && saved_errno == EINTR);
- }
- char*
- vsf_sysutil_getenv(const char* p_var)
- {
- return getenv(p_var);
- }
- void
- vsf_sysutil_openlog(int force)
- {
- int facility = LOG_DAEMON;
- int option = LOG_PID;
- if (!force)
- {
- option |= LOG_NDELAY;
- }
- #ifdef LOG_FTP
- facility = LOG_FTP;
- #endif
- openlog("ftpc", option, facility);
- }
- void
- vsf_sysutil_closelog(void)
- {
- closelog();
- }
- void
- vsf_sysutil_syslog(const char* p_text, int severe)
- {
- int prio = LOG_INFO;
- if (severe)
- {
- prio = LOG_WARNING;
- }
- syslog(prio, "%s", p_text);
- }
- long
- vsf_sysutil_parse_time(const char* p_text)
- {
- struct tm the_time;
- unsigned int len = vsf_sysutil_strlen(p_text);
- vsf_sysutil_memclr(&the_time, sizeof(the_time));
- if (len >= 8)
- {
- char yr[5];
- char mon[3];
- char day[3];
- vsf_sysutil_strcpy(yr, p_text, 5);
- vsf_sysutil_strcpy(mon, p_text + 4, 3);
- vsf_sysutil_strcpy(day, p_text + 6, 3);
- the_time.tm_year = vsf_sysutil_atoi(yr) - 1900;
- the_time.tm_mon = vsf_sysutil_atoi(mon) - 1;
- the_time.tm_mday = vsf_sysutil_atoi(day);
- }
- if (len >= 14)
- {
- char hr[3];
- char mins[3];
- char sec[3];
- vsf_sysutil_strcpy(hr, p_text + 8, 3);
- vsf_sysutil_strcpy(mins, p_text + 10, 3);
- vsf_sysutil_strcpy(sec, p_text + 12, 3);
- the_time.tm_hour = vsf_sysutil_atoi(hr);
- the_time.tm_min = vsf_sysutil_atoi(mins);
- the_time.tm_sec = vsf_sysutil_atoi(sec);
- }
- return mktime(&the_time);
- }
- int
- vsf_sysutil_setmodtime(const char* p_file, long the_time, int is_localtime)
- {
- struct utimbuf new_times;
- if (!is_localtime)
- {
- the_time -= s_timezone;
- }
- vsf_sysutil_memclr(&new_times, sizeof(new_times));
- new_times.actime = the_time;
- new_times.modtime = the_time;
- return utime(p_file, &new_times);
- }
- void
- vsf_sysutil_ftruncate(int fd)
- {
- int ret = ftruncate(fd, 0);
- if (ret != 0)
- {
- die("ftruncate");
- }
- }
- int
- vsf_sysutil_getuid(void)
- {
- return getuid();
- }
- void
- vsf_sysutil_set_address_space_limit(unsigned long bytes)
- {
- /* Unfortunately, OpenBSD is missing RLIMIT_AS. */
- #ifdef RLIMIT_AS
- int ret;
- struct rlimit rlim;
- rlim.rlim_cur = bytes;
- rlim.rlim_max = bytes;
- ret = setrlimit(RLIMIT_AS, &rlim);
- /* Permit EPERM as this could indicate that the shell launching vsftpd already
- * has a lower limit.
- */
- if (ret != 0 && errno != EPERM)
- {
- die("setrlimit");
- }
- #endif /* RLIMIT_AS */
- (void) bytes;
- }
- void
- vsf_sysutil_set_no_fds()
- {
- int ret;
- struct rlimit rlim;
- rlim.rlim_cur = 0;
- rlim.rlim_max = 0;
- ret = setrlimit(RLIMIT_NOFILE, &rlim);
- if (ret != 0)
- {
- die("setrlimit NOFILE");
- }
- }
- void
- vsf_sysutil_set_no_procs()
- {
- #ifdef RLIMIT_NPROC
- int ret;
- struct rlimit rlim;
- rlim.rlim_cur = 0;
- rlim.rlim_max = 0;
- ret = setrlimit(RLIMIT_NPROC, &rlim);
- if (ret != 0)
- {
- die("setrlimit NPROC");
- }
- #endif
- }
- void
- vsf_sysutil_post_fork()
- {
- int i;
- /* Don't inherit any exit function. */
- s_exit_func = NULL;
- /* Uncached the current PID. */
- s_current_pid = -1;
- /* Don't inherit anything relating to the synchronous signal system */
- s_io_handler = NULL;
- for (i=0; i < NSIG; ++i)
- {
- s_sig_details[i].sync_sig_handler = NULL;
- }
- for (i=0; i < NSIG; ++i)
- {
- s_sig_details[i].pending = 0;
- }
- }
|