The protect filter automatically added with --backup is not perishable
[rsync/rsync.git] / util.c
CommitLineData
0f78b815
WD
1/*
2 * Utility routines used in rsync.
5cb37436 3 *
0f78b815
WD
4 * Copyright (C) 1996-2000 Andrew Tridgell
5 * Copyright (C) 1996 Paul Mackerras
6 * Copyright (C) 2001, 2002 Martin Pool <mbp@samba.org>
d3d07a5e 7 * Copyright (C) 2003-2008 Wayne Davison
5cb37436 8 *
0ecfbf27 9 * This program is free software; you can redistribute it and/or modify
8e41b68e
WD
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 3 of the License, or
12 * (at your option) any later version.
5cb37436 13 *
0ecfbf27
MP
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
5cb37436 18 *
e7c67065 19 * You should have received a copy of the GNU General Public License along
4fd842f9 20 * with this program; if not, visit the http://fsf.org website.
0ecfbf27 21 */
c627d613 22
c627d613 23#include "rsync.h"
1b42f628 24#include "ifuncs.h"
5dd14f0c
WD
25#include "itypes.h"
26#include "inums.h"
c627d613 27
bc6ebcd2
WD
28extern int dry_run;
29extern int module_id;
30extern int modify_window;
7e43da81 31extern int relative_paths;
e9489cd6 32extern int preserve_xattrs;
7c73536c 33extern char *module_dir;
a8167c66 34extern unsigned int module_dirlen;
e9357a2d 35extern mode_t orig_umask;
a7260c40 36extern char *partial_dir;
819bfe45 37extern struct filter_list_struct daemon_filter_list;
c7c11a0d 38
0ecfbf27
MP
39int sanitize_paths = 0;
40
a8167c66
WD
41char curr_dir[MAXPATHLEN];
42unsigned int curr_dir_len;
43int curr_dir_depth; /* This is only set for a sanitizing daemon. */
44
0f78b815 45/* Set a fd into nonblocking mode. */
f0359dd0
AT
46void set_nonblocking(int fd)
47{
48 int val;
49
ff530f04 50 if ((val = fcntl(fd, F_GETFL)) == -1)
f0359dd0
AT
51 return;
52 if (!(val & NONBLOCK_FLAG)) {
53 val |= NONBLOCK_FLAG;
54 fcntl(fd, F_SETFL, val);
55 }
56}
57
0f78b815 58/* Set a fd into blocking mode. */
36349ea0
AT
59void set_blocking(int fd)
60{
61 int val;
62
ff530f04 63 if ((val = fcntl(fd, F_GETFL)) == -1)
36349ea0
AT
64 return;
65 if (val & NONBLOCK_FLAG) {
66 val &= ~NONBLOCK_FLAG;
67 fcntl(fd, F_SETFL, val);
68 }
69}
70
ac13ad10 71/**
0ecfbf27
MP
72 * Create a file descriptor pair - like pipe() but use socketpair if
73 * possible (because of blocking issues on pipes).
5cb37436 74 *
0ecfbf27 75 * Always set non-blocking.
f0359dd0 76 */
08f15335
AT
77int fd_pair(int fd[2])
78{
f0359dd0
AT
79 int ret;
80
4f5b0756 81#ifdef HAVE_SOCKETPAIR
f0359dd0 82 ret = socketpair(AF_UNIX, SOCK_STREAM, 0, fd);
08f15335 83#else
f0359dd0 84 ret = pipe(fd);
08f15335 85#endif
f0359dd0
AT
86
87 if (ret == 0) {
88 set_nonblocking(fd[0]);
89 set_nonblocking(fd[1]);
90 }
0ecfbf27 91
f0359dd0 92 return ret;
08f15335
AT
93}
94
0b515981 95void print_child_argv(const char *prefix, char **cmd)
5ad0e46f 96{
0b515981 97 rprintf(FCLIENT, "%s ", prefix);
5ad0e46f
MP
98 for (; *cmd; cmd++) {
99 /* Look for characters that ought to be quoted. This
100 * is not a great quoting algorithm, but it's
101 * sufficient for a log message. */
102 if (strspn(*cmd, "abcdefghijklmnopqrstuvwxyz"
103 "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
104 "0123456789"
105 ",.-_=+@/") != strlen(*cmd)) {
a3f6dbdf 106 rprintf(FCLIENT, "\"%s\" ", *cmd);
5ad0e46f 107 } else {
a3f6dbdf 108 rprintf(FCLIENT, "%s ", *cmd);
5ad0e46f
MP
109 }
110 }
a3f6dbdf 111 rprintf(FCLIENT, "\n");
5ad0e46f
MP
112}
113
4a19c3b2 114NORETURN void out_of_memory(const char *str)
c627d613 115{
2cd421d8 116 rprintf(FERROR, "ERROR: out of memory in %s [%s]\n", str, who_am_i());
c284f34a 117 exit_cleanup(RERR_MALLOC);
575f2fca
AT
118}
119
4a19c3b2 120NORETURN void overflow_exit(const char *str)
575f2fca 121{
2cd421d8 122 rprintf(FERROR, "ERROR: buffer overflow in %s [%s]\n", str, who_am_i());
c284f34a 123 exit_cleanup(RERR_MALLOC);
c627d613
AT
124}
125
4a19c3b2 126int set_modtime(const char *fname, time_t modtime, mode_t mode)
c627d613 127{
25007999
WD
128#if !defined HAVE_LUTIMES || !defined HAVE_UTIMES
129 if (S_ISLNK(mode))
130 return 1;
131#endif
132
951e826b 133 if (DEBUG_GTE(TIME, 1)) {
404e813c 134 rprintf(FINFO, "set modtime of %s to (%ld) %s",
785abd48 135 fname, (long)modtime,
404e813c
MP
136 asctime(localtime(&modtime)));
137 }
5cb37436 138
15778afb
WD
139 if (dry_run)
140 return 0;
141
31e12522 142 {
25007999
WD
143#ifdef HAVE_UTIMES
144 struct timeval t[2];
145 t[0].tv_sec = time(NULL);
146 t[0].tv_usec = 0;
147 t[1].tv_sec = modtime;
148 t[1].tv_usec = 0;
149# ifdef HAVE_LUTIMES
149a78e3 150 if (S_ISLNK(mode)) {
a5bb0902
WD
151 if (lutimes(fname, t) < 0)
152 return errno == ENOSYS ? 1 : -1;
77d4c400 153 return 0;
149a78e3 154 }
25007999
WD
155# endif
156 return utimes(fname, t);
4f9b139a 157#elif defined HAVE_STRUCT_UTIMBUF
5cb37436 158 struct utimbuf tbuf;
31e12522
AT
159 tbuf.actime = time(NULL);
160 tbuf.modtime = modtime;
161 return utime(fname,&tbuf);
4f5b0756 162#elif defined HAVE_UTIME
31e12522
AT
163 time_t t[2];
164 t[0] = time(NULL);
165 t[1] = modtime;
166 return utime(fname,t);
c627d613 167#else
25007999 168#error No file-time-modification routine found!
c627d613 169#endif
31e12522 170 }
c627d613 171}
94481d91 172
e9357a2d
WD
173/* This creates a new directory with default permissions. Since there
174 * might be some directory-default permissions affecting this, we can't
175 * force the permissions directly using the original umask and mkdir(). */
176int mkdir_defmode(char *fname)
177{
178 int ret;
179
180 umask(orig_umask);
181 ret = do_mkdir(fname, ACCESSPERMS);
182 umask(0);
183
184 return ret;
185}
186
85c41757
WD
187/* Create any necessary directories in fname. Any missing directories are
188 * created with default permissions. */
e9357a2d 189int create_directory_path(char *fname)
6574b4f7 190{
6574b4f7 191 char *p;
85c41757 192 int ret = 0;
6574b4f7 193
c284f34a
WD
194 while (*fname == '/')
195 fname++;
196 while (strncmp(fname, "./", 2) == 0)
197 fname += 2;
6574b4f7 198
85c41757 199 umask(orig_umask);
6574b4f7 200 p = fname;
c284f34a 201 while ((p = strchr(p,'/')) != NULL) {
85c41757
WD
202 *p = '\0';
203 if (do_mkdir(fname, ACCESSPERMS) < 0 && errno != EEXIST)
204 ret = -1;
205 *p++ = '/';
6574b4f7 206 }
85c41757
WD
207 umask(0);
208
209 return ret;
6574b4f7 210}
950ab32d 211
ac13ad10
MP
212/**
213 * Write @p len bytes at @p ptr to descriptor @p desc, retrying if
214 * interrupted.
215 *
216 * @retval len upon success
217 *
218 * @retval <0 write's (negative) error code
219 *
220 * Derived from GNU C's cccp.c.
221 */
4a19c3b2 222int full_write(int desc, const char *ptr, size_t len)
950ab32d
AT
223{
224 int total_written;
5cb37436 225
950ab32d
AT
226 total_written = 0;
227 while (len > 0) {
5c1b7bfd 228 int written = write(desc, ptr, len);
950ab32d 229 if (written < 0) {
950ab32d
AT
230 if (errno == EINTR)
231 continue;
950ab32d
AT
232 return written;
233 }
234 total_written += written;
235 ptr += written;
236 len -= written;
237 }
238 return total_written;
239}
240
ac13ad10
MP
241/**
242 * Read @p len bytes at @p ptr from descriptor @p desc, retrying if
243 * interrupted.
244 *
245 * @retval >0 the actual number of bytes read
246 *
247 * @retval 0 for EOF
248 *
249 * @retval <0 for an error.
250 *
251 * Derived from GNU C's cccp.c. */
9dd891bb 252static int safe_read(int desc, char *ptr, size_t len)
950ab32d
AT
253{
254 int n_chars;
5cb37436 255
9dd891bb 256 if (len == 0)
950ab32d 257 return len;
5cb37436 258
950ab32d
AT
259 do {
260 n_chars = read(desc, ptr, len);
261 } while (n_chars < 0 && errno == EINTR);
5cb37436 262
950ab32d
AT
263 return n_chars;
264}
265
2cce7545
WD
266/* Copy a file. If ofd < 0, copy_file unlinks and opens the "dest" file.
267 * Otherwise, it just writes to and closes the provided file descriptor.
e9489cd6
WD
268 * In either case, if --xattrs are being preserved, the dest file will
269 * have its xattrs set from the source file.
ac13ad10 270 *
3e13004b
WD
271 * This is used in conjunction with the --temp-dir, --backup, and
272 * --copy-dest options. */
2cce7545
WD
273int copy_file(const char *source, const char *dest, int ofd,
274 mode_t mode, int create_bak_dir)
950ab32d
AT
275{
276 int ifd;
950ab32d
AT
277 char buf[1024 * 8];
278 int len; /* Number of bytes read into `buf'. */
279
f5b532b1 280 if ((ifd = do_open(source, O_RDONLY, 0)) < 0) {
f1ca7c44 281 int save_errno = errno;
3f0211b6 282 rsyserr(FERROR_XFER, errno, "open %s", full_fname(source));
f1ca7c44 283 errno = save_errno;
950ab32d
AT
284 return -1;
285 }
286
2cce7545
WD
287 if (ofd < 0) {
288 if (robust_unlink(dest) && errno != ENOENT) {
f1ca7c44 289 int save_errno = errno;
3f0211b6 290 rsyserr(FERROR_XFER, errno, "unlink %s", full_fname(dest));
f1ca7c44 291 errno = save_errno;
2cce7545
WD
292 return -1;
293 }
950ab32d 294
f1ca7c44
WD
295 if ((ofd = do_open(dest, O_WRONLY | O_CREAT | O_TRUNC | O_EXCL, mode)) < 0) {
296 int save_errno = errno ? errno : EINVAL; /* 0 paranoia */
297 if (create_bak_dir && errno == ENOENT && make_bak_dir(dest) == 0) {
298 if ((ofd = do_open(dest, O_WRONLY | O_CREAT | O_TRUNC | O_EXCL, mode)) < 0)
299 save_errno = errno ? errno : save_errno;
300 else
301 save_errno = 0;
302 }
303 if (save_errno) {
304 rsyserr(FERROR_XFER, save_errno, "open %s", full_fname(dest));
305 close(ifd);
306 errno = save_errno;
307 return -1;
308 }
2cce7545 309 }
950ab32d
AT
310 }
311
5cb37436 312 while ((len = safe_read(ifd, buf, sizeof buf)) > 0) {
950ab32d 313 if (full_write(ofd, buf, len) < 0) {
f1ca7c44 314 int save_errno = errno;
3f0211b6 315 rsyserr(FERROR_XFER, errno, "write %s", full_fname(dest));
950ab32d
AT
316 close(ifd);
317 close(ofd);
f1ca7c44 318 errno = save_errno;
950ab32d
AT
319 return -1;
320 }
321 }
322
8b602edd 323 if (len < 0) {
f1ca7c44 324 int save_errno = errno;
3f0211b6 325 rsyserr(FERROR_XFER, errno, "read %s", full_fname(source));
8b602edd
WD
326 close(ifd);
327 close(ofd);
f1ca7c44 328 errno = save_errno;
8b602edd
WD
329 return -1;
330 }
331
9f27cd8c 332 if (close(ifd) < 0) {
3f0211b6 333 rsyserr(FWARNING, errno, "close failed on %s",
d62bcc17 334 full_fname(source));
9f27cd8c
WD
335 }
336
337 if (close(ofd) < 0) {
f1ca7c44 338 int save_errno = errno;
3f0211b6 339 rsyserr(FERROR_XFER, errno, "close failed on %s",
d62bcc17 340 full_fname(dest));
f1ca7c44 341 errno = save_errno;
9f27cd8c
WD
342 return -1;
343 }
950ab32d 344
e9489cd6
WD
345#ifdef SUPPORT_XATTRS
346 if (preserve_xattrs)
347 copy_xattrs(source, dest);
348#endif
349
950ab32d
AT
350 return 0;
351}
feaa89c4 352
c7c11a0d
DD
353/* MAX_RENAMES should be 10**MAX_RENAMES_DIGITS */
354#define MAX_RENAMES_DIGITS 3
355#define MAX_RENAMES 1000
356
ac13ad10 357/**
b4235b31
MP
358 * Robust unlink: some OS'es (HPUX) refuse to unlink busy files, so
359 * rename to <path>/.rsyncNNN instead.
360 *
361 * Note that successive rsync runs will shuffle the filenames around a
362 * bit as long as the file is still busy; this is because this function
363 * does not know if the unlink call is due to a new file coming in, or
364 * --delete trying to remove old .rsyncNNN files, hence it renames it
365 * each time.
366 **/
63cf5ae7 367int robust_unlink(const char *fname)
c7c11a0d
DD
368{
369#ifndef ETXTBSY
370 return do_unlink(fname);
371#else
372 static int counter = 1;
373 int rc, pos, start;
374 char path[MAXPATHLEN];
375
376 rc = do_unlink(fname);
c284f34a 377 if (rc == 0 || errno != ETXTBSY)
c7c11a0d
DD
378 return rc;
379
c284f34a
WD
380 if ((pos = strlcpy(path, fname, MAXPATHLEN)) >= MAXPATHLEN)
381 pos = MAXPATHLEN - 1;
c7c11a0d 382
c284f34a
WD
383 while (pos > 0 && path[pos-1] != '/')
384 pos--;
5cb37436 385 pos += strlcpy(path+pos, ".rsync", MAXPATHLEN-pos);
c7c11a0d
DD
386
387 if (pos > (MAXPATHLEN-MAX_RENAMES_DIGITS-1)) {
388 errno = ETXTBSY;
389 return -1;
390 }
391
392 /* start where the last one left off to reduce chance of clashes */
393 start = counter;
394 do {
434c4098 395 snprintf(&path[pos], MAX_RENAMES_DIGITS+1, "%03d", counter);
c7c11a0d
DD
396 if (++counter >= MAX_RENAMES)
397 counter = 1;
c284f34a 398 } while ((rc = access(path, 0)) == 0 && counter != start);
c7c11a0d 399
951e826b 400 if (INFO_GTE(MISC, 1)) {
3f0211b6 401 rprintf(FWARNING, "renaming %s to %s because of text busy\n",
785abd48 402 fname, path);
4791825d 403 }
c7c11a0d
DD
404
405 /* maybe we should return rename()'s exit status? Nah. */
406 if (do_rename(fname, path) != 0) {
407 errno = ETXTBSY;
408 return -1;
409 }
410 return 0;
411#endif
412}
413
630f548f 414/* Returns 0 on successful rename, 1 if we successfully copied the file
3ed8eafc
WD
415 * across filesystems, -2 if copy_file() failed, and -1 on other errors.
416 * If partialptr is not NULL and we need to do a copy, copy the file into
417 * the active partial-dir instead of over the destination file. */
4a19c3b2 418int robust_rename(const char *from, const char *to, const char *partialptr,
3ed8eafc 419 int mode)
c7c11a0d 420{
62c9e6b3
WD
421 int tries = 4;
422
423 while (tries--) {
424 if (do_rename(from, to) == 0)
425 return 0;
426
427 switch (errno) {
428#ifdef ETXTBSY
429 case ETXTBSY:
f1ca7c44
WD
430 if (robust_unlink(to) != 0) {
431 errno = ETXTBSY;
62c9e6b3 432 return -1;
f1ca7c44
WD
433 }
434 errno = ETXTBSY;
62c9e6b3 435 break;
c7c11a0d 436#endif
62c9e6b3 437 case EXDEV:
3ed8eafc
WD
438 if (partialptr) {
439 if (!handle_partial_dir(partialptr,PDIR_CREATE))
0479eb76 440 return -2;
3ed8eafc
WD
441 to = partialptr;
442 }
2cce7545 443 if (copy_file(from, to, -1, mode, 0) != 0)
62c9e6b3
WD
444 return -2;
445 do_unlink(from);
630f548f 446 return 1;
62c9e6b3
WD
447 default:
448 return -1;
449 }
450 }
451 return -1;
feaa89c4 452}
3ba62a83 453
3ba62a83
AT
454static pid_t all_pids[10];
455static int num_pids;
456
4cf64834 457/** Fork and record the pid of the child. **/
3ba62a83
AT
458pid_t do_fork(void)
459{
460 pid_t newpid = fork();
5cb37436 461
4cf64834 462 if (newpid != 0 && newpid != -1) {
3ba62a83
AT
463 all_pids[num_pids++] = newpid;
464 }
465 return newpid;
466}
467
4cf64834
MP
468/**
469 * Kill all children.
470 *
471 * @todo It would be kind of nice to make sure that they are actually
472 * all our children before we kill them, because their pids may have
473 * been recycled by some other process. Perhaps when we wait for a
474 * child, we should remove it from this array. Alternatively we could
475 * perhaps use process groups, but I think that would not work on
476 * ancient Unix versions that don't support them.
477 **/
3ba62a83
AT
478void kill_all(int sig)
479{
480 int i;
4cf64834
MP
481
482 for (i = 0; i < num_pids; i++) {
483 /* Let's just be a little careful where we
484 * point that gun, hey? See kill(2) for the
485 * magic caused by negative values. */
486 pid_t p = all_pids[i];
487
488 if (p == getpid())
489 continue;
490 if (p <= 0)
491 continue;
492
493 kill(p, sig);
3ba62a83
AT
494 }
495}
9486289c 496
ac13ad10 497/** Turn a user name into a uid */
7210dbfd 498int name_to_uid(const char *name, uid_t *uid_p)
8ef4ffd6
AT
499{
500 struct passwd *pass;
b5bd5542
WD
501 if (!name || !*name)
502 return 0;
7210dbfd
WD
503 if (!(pass = getpwnam(name)))
504 return 0;
505 *uid_p = pass->pw_uid;
506 return 1;
8ef4ffd6
AT
507}
508
ac13ad10 509/** Turn a group name into a gid */
7210dbfd 510int name_to_gid(const char *name, gid_t *gid_p)
8ef4ffd6
AT
511{
512 struct group *grp;
b5bd5542
WD
513 if (!name || !*name)
514 return 0;
7210dbfd
WD
515 if (!(grp = getgrnam(name)))
516 return 0;
517 *gid_p = grp->gr_gid;
518 return 1;
8ef4ffd6
AT
519}
520
ac13ad10 521/** Lock a byte range in a open file */
31593dd6 522int lock_range(int fd, int offset, int len)
0c515f17 523{
31593dd6 524 struct flock lock;
0c515f17 525
31593dd6
AT
526 lock.l_type = F_WRLCK;
527 lock.l_whence = SEEK_SET;
528 lock.l_start = offset;
529 lock.l_len = len;
530 lock.l_pid = 0;
5cb37436 531
31593dd6 532 return fcntl(fd,F_SETLK,&lock) == 0;
0c515f17 533}
874895d5 534
4d30f176 535#define ENSURE_MEMSPACE(buf, type, sz, req) \
bc267e0f
WD
536 if ((req) > sz && !(buf = realloc_array(buf, type, sz = MAX(sz * 2, req)))) \
537 out_of_memory("glob_expand")
4d30f176
WD
538
539static inline void call_glob_match(const char *name, int len, int from_glob,
540 char *arg, int abpos, int fbpos);
541
987a5467
WD
542static struct glob_data {
543 char *arg_buf, *filt_buf, **argv;
544 int absize, fbsize, maxargs, argc;
545} glob;
4d30f176
WD
546
547static void glob_match(char *arg, int abpos, int fbpos)
4791825d 548{
4d30f176
WD
549 int len;
550 char *slash;
551
552 while (*arg == '.' && arg[1] == '/') {
553 if (fbpos < 0) {
bc267e0f 554 ENSURE_MEMSPACE(glob.filt_buf, char, glob.fbsize, glob.absize);
987a5467 555 memcpy(glob.filt_buf, glob.arg_buf, abpos + 1);
4d30f176 556 fbpos = abpos;
4791825d 557 }
bc267e0f 558 ENSURE_MEMSPACE(glob.arg_buf, char, glob.absize, abpos + 3);
987a5467
WD
559 glob.arg_buf[abpos++] = *arg++;
560 glob.arg_buf[abpos++] = *arg++;
561 glob.arg_buf[abpos] = '\0';
4791825d 562 }
4d30f176
WD
563 if ((slash = strchr(arg, '/')) != NULL) {
564 *slash = '\0';
565 len = slash - arg;
566 } else
567 len = strlen(arg);
568 if (strpbrk(arg, "*?[")) {
569 struct dirent *di;
570 DIR *d;
571
987a5467 572 if (!(d = opendir(abpos ? glob.arg_buf : ".")))
4d30f176
WD
573 return;
574 while ((di = readdir(d)) != NULL) {
575 char *dname = d_name(di);
576 if (dname[0] == '.' && (dname[1] == '\0'
577 || (dname[1] == '.' && dname[2] == '\0')))
578 continue;
579 if (!wildmatch(arg, dname))
580 continue;
581 call_glob_match(dname, strlen(dname), 1,
582 slash ? arg + len + 1 : NULL,
583 abpos, fbpos);
584 }
585 closedir(d);
586 } else {
587 call_glob_match(arg, len, 0,
588 slash ? arg + len + 1 : NULL,
589 abpos, fbpos);
590 }
591 if (slash)
592 *slash = '/';
4791825d 593}
874895d5 594
4d30f176
WD
595static inline void call_glob_match(const char *name, int len, int from_glob,
596 char *arg, int abpos, int fbpos)
874895d5 597{
4d30f176
WD
598 char *use_buf;
599
987a5467
WD
600 ENSURE_MEMSPACE(glob.arg_buf, char, glob.absize, abpos + len + 2);
601 memcpy(glob.arg_buf + abpos, name, len);
4d30f176 602 abpos += len;
987a5467 603 glob.arg_buf[abpos] = '\0';
4d30f176
WD
604
605 if (fbpos >= 0) {
987a5467
WD
606 ENSURE_MEMSPACE(glob.filt_buf, char, glob.fbsize, fbpos + len + 2);
607 memcpy(glob.filt_buf + fbpos, name, len);
4d30f176 608 fbpos += len;
987a5467
WD
609 glob.filt_buf[fbpos] = '\0';
610 use_buf = glob.filt_buf;
4d30f176 611 } else
987a5467 612 use_buf = glob.arg_buf;
4d30f176 613
6db1db54 614 if (from_glob || (arg && len)) {
4d30f176
WD
615 STRUCT_STAT st;
616 int is_dir;
617
b5daf530
WD
618 if (do_stat(glob.arg_buf, &st) != 0)
619 return;
620 is_dir = S_ISDIR(st.st_mode) != 0;
621 if (arg && !is_dir)
622 return;
4d30f176
WD
623
624 if (daemon_filter_list.head
1df02d13 625 && check_filter(&daemon_filter_list, FLOG, use_buf, is_dir) < 0)
b5daf530 626 return;
b7061c82 627 }
874895d5 628
4d30f176 629 if (arg) {
987a5467
WD
630 glob.arg_buf[abpos++] = '/';
631 glob.arg_buf[abpos] = '\0';
4d30f176 632 if (fbpos >= 0) {
987a5467
WD
633 glob.filt_buf[fbpos++] = '/';
634 glob.filt_buf[fbpos] = '\0';
4d30f176
WD
635 }
636 glob_match(arg, abpos, fbpos);
637 } else {
987a5467
WD
638 ENSURE_MEMSPACE(glob.argv, char *, glob.maxargs, glob.argc + 1);
639 if (!(glob.argv[glob.argc++] = strdup(glob.arg_buf)))
4d30f176
WD
640 out_of_memory("glob_match");
641 }
642}
643
644/* This routine performs wild-card expansion of the pathname in "arg". Any
91f625ce
WD
645 * daemon-excluded files/dirs will not be matched by the wildcards. Returns 0
646 * if a wild-card string is the only returned item (due to matching nothing). */
647int glob_expand(const char *arg, char ***argv_p, int *argc_p, int *maxargs_p)
4d30f176 648{
91f625ce 649 int ret, save_argc;
4d30f176 650 char *s;
987a5467
WD
651
652 if (!arg) {
653 if (glob.filt_buf)
654 free(glob.filt_buf);
655 free(glob.arg_buf);
656 memset(&glob, 0, sizeof glob);
91f625ce 657 return -1;
987a5467 658 }
e42c9458 659
4135d091 660 if (sanitize_paths)
4d30f176 661 s = sanitize_path(NULL, arg, "", 0, SP_KEEP_DOT_DIRS);
d48810ba 662 else {
4d30f176 663 s = strdup(arg);
d48810ba
WD
664 if (!s)
665 out_of_memory("glob_expand");
666 clean_fname(s, CFN_KEEP_DOT_DIRS
667 | CFN_KEEP_TRAILING_SLASH
668 | CFN_COLLAPSE_DOT_DOT_DIRS);
669 }
087bf010 670
bc267e0f 671 ENSURE_MEMSPACE(glob.arg_buf, char, glob.absize, MAXPATHLEN);
987a5467 672 *glob.arg_buf = '\0';
4d30f176 673
987a5467
WD
674 glob.argc = save_argc = *argc_p;
675 glob.argv = *argv_p;
676 glob.maxargs = *maxargs_p;
4d30f176 677
bc267e0f 678 ENSURE_MEMSPACE(glob.argv, char *, glob.maxargs, 100);
4d30f176
WD
679
680 glob_match(s, 0, -1);
681
682 /* The arg didn't match anything, so add the failed arg to the list. */
987a5467
WD
683 if (glob.argc == save_argc) {
684 ENSURE_MEMSPACE(glob.argv, char *, glob.maxargs, glob.argc + 1);
685 glob.argv[glob.argc++] = s;
91f625ce
WD
686 ret = 0;
687 } else {
4d30f176 688 free(s);
91f625ce
WD
689 ret = 1;
690 }
4d30f176 691
987a5467
WD
692 *maxargs_p = glob.maxargs;
693 *argv_p = glob.argv;
694 *argc_p = glob.argc;
91f625ce
WD
695
696 return ret;
874895d5 697}
5a96ee05 698
4791825d 699/* This routine is only used in daemon mode. */
4d30f176 700void glob_expand_module(char *base1, char *arg, char ***argv_p, int *argc_p, int *maxargs_p)
087bf010 701{
044dc293 702 char *p, *s;
ba5e128d 703 char *base = base1;
4791825d 704 int base_len = strlen(base);
087bf010 705
044dc293 706 if (!arg || !*arg)
b5bd5542 707 return;
087bf010 708
044dc293
WD
709 if (strncmp(arg, base, base_len) == 0)
710 arg += base_len;
e42c9458 711
044dc293
WD
712 if (!(arg = strdup(arg)))
713 out_of_memory("glob_expand_module");
087bf010 714
b5bd5542 715 if (asprintf(&base," %s/", base1) <= 0)
044dc293 716 out_of_memory("glob_expand_module");
4791825d 717 base_len++;
ba5e128d 718
044dc293
WD
719 for (s = arg; *s; s = p + base_len) {
720 if ((p = strstr(s, base)) != NULL)
b5bd5542 721 *p = '\0'; /* split it at this point */
4d30f176 722 glob_expand(s, argv_p, argc_p, maxargs_p);
b5bd5542
WD
723 if (!p)
724 break;
087bf010
AT
725 }
726
044dc293 727 free(arg);
ba5e128d 728 free(base);
087bf010 729}
5a96ee05 730
ac13ad10
MP
731/**
732 * Convert a string to lower case
733 **/
5a96ee05
AT
734void strlower(char *s)
735{
736 while (*s) {
2dc7b8bd
WD
737 if (isUpper(s))
738 *s = toLower(s);
5a96ee05
AT
739 s++;
740 }
741}
e42c9458 742
368ad70e
WD
743/* Join strings p1 & p2 into "dest" with a guaranteed '/' between them. (If
744 * p1 ends with a '/', no extra '/' is inserted.) Returns the length of both
a8f7e4b8
WD
745 * strings + 1 (if '/' was inserted), regardless of whether the null-terminated
746 * string fits into destsize. */
368ad70e
WD
747size_t pathjoin(char *dest, size_t destsize, const char *p1, const char *p2)
748{
749 size_t len = strlcpy(dest, p1, destsize);
750 if (len < destsize - 1) {
751 if (!len || dest[len-1] != '/')
752 dest[len++] = '/';
753 if (len < destsize - 1)
754 len += strlcpy(dest + len, p2, destsize - len);
755 else {
756 dest[len] = '\0';
757 len += strlen(p2);
758 }
759 }
760 else
761 len += strlen(p2) + 1; /* Assume we'd insert a '/'. */
762 return len;
763}
764
765/* Join any number of strings together, putting them in "dest". The return
a8f7e4b8
WD
766 * value is the length of all the strings, regardless of whether the null-
767 * terminated whole fits in destsize. Your list of string pointers must end
768 * with a NULL to indicate the end of the list. */
368ad70e
WD
769size_t stringjoin(char *dest, size_t destsize, ...)
770{
5cb37436 771 va_list ap;
368ad70e
WD
772 size_t len, ret = 0;
773 const char *src;
774
775 va_start(ap, destsize);
776 while (1) {
777 if (!(src = va_arg(ap, const char *)))
778 break;
779 len = strlen(src);
780 ret += len;
781 if (destsize > 1) {
782 if (len >= destsize)
783 len = destsize - 1;
784 memcpy(dest, src, len);
785 destsize -= len;
786 dest += len;
787 }
788 }
789 *dest = '\0';
790 va_end(ap);
791
792 return ret;
793}
794
1d6b8f9a
WD
795int count_dir_elements(const char *p)
796{
797 int cnt = 0, new_component = 1;
798 while (*p) {
799 if (*p++ == '/')
a8167c66 800 new_component = (*p != '.' || (p[1] != '/' && p[1] != '\0'));
1d6b8f9a
WD
801 else if (new_component) {
802 new_component = 0;
803 cnt++;
804 }
805 }
806 return cnt;
807}
808
d48810ba
WD
809/* Turns multiple adjacent slashes into a single slash, drops all leading or
810 * interior "." elements unless CFN_KEEP_DOT_DIRS is flagged. Will also drop
811 * a trailing '.' after a '/' if CFN_DROP_TRAILING_DOT_DIR is flagged, removes
812 * a trailing slash (perhaps after removing the aforementioned dot) unless
813 * CFN_KEEP_TRAILING_SLASH is flagged, and will also collapse ".." elements
814 * (except at the start) if CFN_COLLAPSE_DOT_DOT_DIRS is flagged. If the
815 * resulting name would be empty, returns ".". */
6bb82fe0 816unsigned int clean_fname(char *name, int flags)
5243c216 817{
e012b94f 818 char *limit = name - 1, *t = name, *f = name;
ebdd24d6 819 int anchored;
5243c216 820
b5bd5542 821 if (!name)
3104620c 822 return 0;
5243c216 823
ebdd24d6
WD
824 if ((anchored = *f == '/') != 0)
825 *t++ = *f++;
d48810ba 826 else if (flags & CFN_KEEP_DOT_DIRS && *f == '.' && f[1] == '/') {
6bb82fe0
WD
827 *t++ = *f++;
828 *t++ = *f++;
829 }
ebdd24d6
WD
830 while (*f) {
831 /* discard extra slashes */
832 if (*f == '/') {
833 f++;
834 continue;
5243c216 835 }
ebdd24d6 836 if (*f == '.') {
6bb82fe0 837 /* discard interior "." dirs */
d48810ba 838 if (f[1] == '/' && !(flags & CFN_KEEP_DOT_DIRS)) {
e012b94f 839 f += 2;
ebdd24d6
WD
840 continue;
841 }
6bb82fe0
WD
842 if (f[1] == '\0' && flags & CFN_DROP_TRAILING_DOT_DIR)
843 break;
ebdd24d6 844 /* collapse ".." dirs */
6bb82fe0
WD
845 if (flags & CFN_COLLAPSE_DOT_DOT_DIRS
846 && f[1] == '.' && (f[2] == '/' || !f[2])) {
ebdd24d6
WD
847 char *s = t - 1;
848 if (s == name && anchored) {
849 f += 2;
850 continue;
851 }
852 while (s > limit && *--s != '/') {}
e012b94f 853 if (s != t - 1 && (s < name || *s == '/')) {
ebdd24d6
WD
854 t = s + 1;
855 f += 2;
856 continue;
857 }
f55c2dfc 858 limit = t + 2;
5243c216
AT
859 }
860 }
ebdd24d6 861 while (*f && (*t++ = *f++) != '/') {}
5243c216 862 }
ebdd24d6 863
6bb82fe0 864 if (t > name+anchored && t[-1] == '/' && !(flags & CFN_KEEP_TRAILING_SLASH))
ebdd24d6
WD
865 t--;
866 if (t == name)
867 *t++ = '.';
868 *t = '\0';
3104620c
WD
869
870 return t - name;
5243c216
AT
871}
872
84a63795
WD
873/* Make path appear as if a chroot had occurred. This handles a leading
874 * "/" (either removing it or expanding it) and any leading or embedded
875 * ".." components that attempt to escape past the module's top dir.
b4235b31 876 *
1d6b8f9a
WD
877 * If dest is NULL, a buffer is allocated to hold the result. It is legal
878 * to call with the dest and the path (p) pointing to the same buffer, but
879 * rootdir will be ignored to avoid expansion of the string.
b4235b31 880 *
1d6b8f9a 881 * The rootdir string contains a value to use in place of a leading slash.
7c73536c 882 * Specify NULL to get the default of "module_dir".
ac13ad10 883 *
a8167c66 884 * The depth var is a count of how many '..'s to allow at the start of the
29bca53f 885 * path.
ac13ad10 886 *
b92693da 887 * We also clean the path in a manner similar to clean_fname() but with a
0f78b815 888 * few differences:
b92693da
WD
889 *
890 * Turns multiple adjacent slashes into a single slash, gets rid of "." dir
891 * elements (INCLUDING a trailing dot dir), PRESERVES a trailing slash, and
892 * ALWAYS collapses ".." elements (except for those at the start of the
893 * string up to "depth" deep). If the resulting name would be empty,
894 * change it into a ".". */
d48810ba
WD
895char *sanitize_path(char *dest, const char *p, const char *rootdir, int depth,
896 int flags)
1b8e662a 897{
29bca53f 898 char *start, *sanp;
d48810ba 899 int rlen = 0, drop_dot_dirs = !relative_paths || !(flags & SP_KEEP_DOT_DIRS);
84a63795
WD
900
901 if (dest != p) {
902 int plen = strlen(p);
1d6b8f9a
WD
903 if (*p == '/') {
904 if (!rootdir)
7c73536c 905 rootdir = module_dir;
1d6b8f9a
WD
906 rlen = strlen(rootdir);
907 depth = 0;
84a63795
WD
908 p++;
909 }
910 if (dest) {
911 if (rlen + plen + 1 >= MAXPATHLEN)
912 return NULL;
913 } else if (!(dest = new_array(char, rlen + plen + 1)))
914 out_of_memory("sanitize_path");
915 if (rlen) {
1d6b8f9a 916 memcpy(dest, rootdir, rlen);
84a63795
WD
917 if (rlen > 1)
918 dest[rlen++] = '/';
919 }
920 }
cb13abfe 921
d48810ba
WD
922 if (drop_dot_dirs) {
923 while (*p == '.' && p[1] == '/')
924 p += 2;
925 }
926
84a63795 927 start = sanp = dest + rlen;
d2f6e192
WD
928 /* This loop iterates once per filename component in p, pointing at
929 * the start of the name (past any prior slash) for each iteration. */
29bca53f 930 while (*p) {
2d41264e
WD
931 /* discard leading or extra slashes */
932 if (*p == '/') {
933 p++;
934 continue;
935 }
d48810ba
WD
936 if (drop_dot_dirs) {
937 if (*p == '.' && (p[1] == '/' || p[1] == '\0')) {
7e43da81
WD
938 /* skip "." component */
939 p++;
940 continue;
941 }
cb13abfe 942 }
c284f34a 943 if (*p == '.' && p[1] == '.' && (p[2] == '/' || p[2] == '\0')) {
cb13abfe 944 /* ".." component followed by slash or end */
8e5f029e
WD
945 if (depth <= 0 || sanp != start) {
946 p += 2;
947 if (sanp != start) {
948 /* back up sanp one level */
949 --sanp; /* now pointing at slash */
d48810ba 950 while (sanp > start && sanp[-1] != '/')
8e5f029e 951 sanp--;
b5f9e67d 952 }
8e5f029e 953 continue;
1b8e662a 954 }
8e5f029e
WD
955 /* allow depth levels of .. at the beginning */
956 depth--;
957 /* move the virtual beginning to leave the .. alone */
958 start = sanp + 3;
1b8e662a 959 }
2d41264e
WD
960 /* copy one component through next slash */
961 while (*p && (*sanp++ = *p++) != '/') {}
1b8e662a 962 }
84a63795 963 if (sanp == dest) {
b5f9e67d 964 /* ended up with nothing, so put in "." component */
44e2e578 965 *sanp++ = '.';
b5f9e67d 966 }
44e2e578 967 *sanp = '\0';
1b8e662a 968
84a63795 969 return dest;
14b61c63 970}
5243c216 971
a8167c66 972/* Like chdir(), but it keeps track of the current directory (in the
a16d8f2b 973 * global "curr_dir"), and ensures that the path size doesn't overflow.
a8167c66 974 * Also cleans the path using the clean_fname() function. */
29a89172 975int change_dir(const char *dir, int set_path_only)
5243c216 976{
5243c216 977 static int initialised;
4af8fe4e 978 unsigned int len;
5243c216
AT
979
980 if (!initialised) {
981 initialised = 1;
5cb37436 982 getcwd(curr_dir, sizeof curr_dir - 1);
4af8fe4e 983 curr_dir_len = strlen(curr_dir);
5243c216
AT
984 }
985
4af8fe4e
WD
986 if (!dir) /* this call was probably just to initialize */
987 return 0;
c226b7c2 988
4af8fe4e
WD
989 len = strlen(dir);
990 if (len == 1 && *dir == '.')
991 return 1;
5243c216 992
5243c216 993 if (*dir == '/') {
29a89172
WD
994 if (len >= sizeof curr_dir) {
995 errno = ENAMETOOLONG;
996 return 0;
997 }
998 if (!set_path_only && chdir(dir))
999 return 0;
4af8fe4e 1000 memcpy(curr_dir, dir, len + 1);
4af8fe4e 1001 } else {
29a89172
WD
1002 if (curr_dir_len + 1 + len >= sizeof curr_dir) {
1003 errno = ENAMETOOLONG;
1004 return 0;
1005 }
1006 curr_dir[curr_dir_len] = '/';
1007 memcpy(curr_dir + curr_dir_len + 1, dir, len + 1);
1008
1009 if (!set_path_only && chdir(curr_dir)) {
1010 curr_dir[curr_dir_len] = '\0';
1011 return 0;
1012 }
5243c216
AT
1013 }
1014
6bb82fe0 1015 curr_dir_len = clean_fname(curr_dir, CFN_COLLAPSE_DOT_DOT_DIRS);
a8167c66
WD
1016 if (sanitize_paths) {
1017 if (module_dirlen > curr_dir_len)
1018 module_dirlen = curr_dir_len;
1019 curr_dir_depth = count_dir_elements(curr_dir + module_dirlen);
1020 }
5243c216 1021
951e826b 1022 if (DEBUG_GTE(CHDIR, 1) && !set_path_only)
29a89172 1023 rprintf(FINFO, "[%s] change_dir(%s)\n", who_am_i(), curr_dir);
beef86d0 1024
4af8fe4e 1025 return 1;
5243c216 1026}
aa9b77a5 1027
26e21efc
WD
1028/* This will make a relative path absolute and clean it up via clean_fname().
1029 * Returns the string, which might be newly allocated, or NULL on error. */
1030char *normalize_path(char *path, BOOL force_newbuf, unsigned int *len_ptr)
1031{
1032 unsigned int len;
1033
1034 if (*path != '/') { /* Make path absolute. */
1035 int len = strlen(path);
1036 if (curr_dir_len + 1 + len >= sizeof curr_dir)
1037 return NULL;
1038 curr_dir[curr_dir_len] = '/';
1039 memcpy(curr_dir + curr_dir_len + 1, path, len + 1);
1040 if (!(path = strdup(curr_dir)))
1041 out_of_memory("normalize_path");
1042 curr_dir[curr_dir_len] = '\0';
1043 } else if (force_newbuf) {
1044 if (!(path = strdup(path)))
1045 out_of_memory("normalize_path");
1046 }
1047
1048 len = clean_fname(path, CFN_COLLAPSE_DOT_DOT_DIRS | CFN_DROP_TRAILING_DOT_DIR);
1049
1050 if (len_ptr)
1051 *len_ptr = len;
1052
1053 return path;
1054}
1055
eb61be19
WD
1056/**
1057 * Return a quoted string with the full pathname of the indicated filename.
1058 * The string " (in MODNAME)" may also be appended. The returned pointer
1059 * remains valid until the next time full_fname() is called.
1060 **/
9a5ade18 1061char *full_fname(const char *fn)
eb61be19 1062{
eb61be19
WD
1063 static char *result = NULL;
1064 char *m1, *m2, *m3;
1065 char *p1, *p2;
1066
1067 if (result)
1068 free(result);
1069
1070 if (*fn == '/')
1071 p1 = p2 = "";
1072 else {
4cff5fa4 1073 p1 = curr_dir + module_dirlen;
bc83274a
WD
1074 for (p2 = p1; *p2 == '/'; p2++) {}
1075 if (*p2)
1076 p2 = "/";
eb61be19
WD
1077 }
1078 if (module_id >= 0) {
1079 m1 = " (in ";
1080 m2 = lp_name(module_id);
1081 m3 = ")";
eb61be19
WD
1082 } else
1083 m1 = m2 = m3 = "";
1084
c98ad3df
WD
1085 if (asprintf(&result, "\"%s%s%s\"%s%s%s", p1, p2, fn, m1, m2, m3) <= 0)
1086 out_of_memory("full_fname");
eb61be19
WD
1087
1088 return result;
1089}
1090
a7260c40
WD
1091static char partial_fname[MAXPATHLEN];
1092
1093char *partial_dir_fname(const char *fname)
1094{
1095 char *t = partial_fname;
1096 int sz = sizeof partial_fname;
1097 const char *fn;
1098
1099 if ((fn = strrchr(fname, '/')) != NULL) {
1100 fn++;
1101 if (*partial_dir != '/') {
1102 int len = fn - fname;
1103 strncpy(t, fname, len); /* safe */
1104 t += len;
1105 sz -= len;
1106 }
1107 } else
1108 fn = fname;
1109 if ((int)pathjoin(t, sz, partial_dir, fn) >= sz)
1110 return NULL;
819bfe45 1111 if (daemon_filter_list.head) {
89363676
WD
1112 t = strrchr(partial_fname, '/');
1113 *t = '\0';
1df02d13 1114 if (check_filter(&daemon_filter_list, FLOG, partial_fname, 1) < 0)
5aa7b20a 1115 return NULL;
89363676 1116 *t = '/';
1df02d13 1117 if (check_filter(&daemon_filter_list, FLOG, partial_fname, 0) < 0)
5aa7b20a
WD
1118 return NULL;
1119 }
a7260c40
WD
1120
1121 return partial_fname;
1122}
1123
1124/* If no --partial-dir option was specified, we don't need to do anything
1125 * (the partial-dir is essentially '.'), so just return success. */
1126int handle_partial_dir(const char *fname, int create)
1127{
1128 char *fn, *dir;
1129
1130 if (fname != partial_fname)
1131 return 1;
1132 if (!create && *partial_dir == '/')
1133 return 1;
1134 if (!(fn = strrchr(partial_fname, '/')))
1135 return 1;
1136
1137 *fn = '\0';
1138 dir = partial_fname;
1139 if (create) {
1140 STRUCT_STAT st;
a7260c40 1141 int statret = do_lstat(dir, &st);
a7260c40 1142 if (statret == 0 && !S_ISDIR(st.st_mode)) {
0479eb76
WD
1143 if (do_unlink(dir) < 0) {
1144 *fn = '/';
a7260c40 1145 return 0;
0479eb76 1146 }
a7260c40
WD
1147 statret = -1;
1148 }
0479eb76
WD
1149 if (statret < 0 && do_mkdir(dir, 0700) < 0) {
1150 *fn = '/';
a7260c40 1151 return 0;
0479eb76 1152 }
a7260c40
WD
1153 } else
1154 do_rmdir(dir);
1155 *fn = '/';
1156
1157 return 1;
1158}
1159
ac13ad10
MP
1160/**
1161 * Determine if a symlink points outside the current directory tree.
036e70b0
MP
1162 * This is considered "unsafe" because e.g. when mirroring somebody
1163 * else's machine it might allow them to establish a symlink to
1164 * /etc/passwd, and then read it through a web server.
1165 *
4e5db0ad
MP
1166 * Null symlinks and absolute symlinks are always unsafe.
1167 *
1168 * Basically here we are concerned with symlinks whose target contains
1169 * "..", because this might cause us to walk back up out of the
1170 * transferred directory. We are not allowed to go back up and
1171 * reenter.
1172 *
036e70b0
MP
1173 * @param dest Target of the symlink in question.
1174 *
25d34a5c 1175 * @param src Top source directory currently applicable. Basically this
036e70b0 1176 * is the first parameter to rsync in a simple invocation, but it's
25d34a5c 1177 * modified by flist.c in slightly complex ways.
036e70b0
MP
1178 *
1179 * @retval True if unsafe
1180 * @retval False is unsafe
4e5db0ad
MP
1181 *
1182 * @sa t_unsafe.c
ac13ad10 1183 **/
7afa3a4a 1184int unsafe_symlink(const char *dest, const char *src)
4b957c22 1185{
7afa3a4a 1186 const char *name, *slash;
4b957c22
AT
1187 int depth = 0;
1188
1189 /* all absolute and null symlinks are unsafe */
b5bd5542
WD
1190 if (!dest || !*dest || *dest == '/')
1191 return 1;
4b957c22
AT
1192
1193 /* find out what our safety margin is */
7afa3a4a
WD
1194 for (name = src; (slash = strchr(name, '/')) != 0; name = slash+1) {
1195 if (strncmp(name, "../", 3) == 0) {
c284f34a 1196 depth = 0;
7afa3a4a 1197 } else if (strncmp(name, "./", 2) == 0) {
4b957c22
AT
1198 /* nothing */
1199 } else {
1200 depth++;
1201 }
1202 }
7afa3a4a
WD
1203 if (strcmp(name, "..") == 0)
1204 depth = 0;
4b957c22 1205
7afa3a4a
WD
1206 for (name = dest; (slash = strchr(name, '/')) != 0; name = slash+1) {
1207 if (strncmp(name, "../", 3) == 0) {
1208 /* if at any point we go outside the current directory
1209 then stop - it is unsafe */
1210 if (--depth < 0)
1211 return 1;
1212 } else if (strncmp(name, "./", 2) == 0) {
4b957c22
AT
1213 /* nothing */
1214 } else {
1215 depth++;
1216 }
4b957c22 1217 }
7afa3a4a
WD
1218 if (strcmp(name, "..") == 0)
1219 depth--;
4b957c22 1220
4b957c22
AT
1221 return (depth < 0);
1222}
375a4556 1223
4a19c3b2 1224/* Return the date and time as a string. Some callers tweak returned buf. */
f7632fc6
AT
1225char *timestring(time_t t)
1226{
1227 static char TimeBuf[200];
1228 struct tm *tm = localtime(&t);
afa73c75 1229 char *p;
f7632fc6 1230
4f5b0756 1231#ifdef HAVE_STRFTIME
5cb37436 1232 strftime(TimeBuf, sizeof TimeBuf - 1, "%Y/%m/%d %H:%M:%S", tm);
f7632fc6 1233#else
5cb37436 1234 strlcpy(TimeBuf, asctime(tm), sizeof TimeBuf);
f7632fc6
AT
1235#endif
1236
afa73c75
WD
1237 if ((p = strchr(TimeBuf, '\n')) != NULL)
1238 *p = '\0';
f7632fc6 1239
afa73c75 1240 return TimeBuf;
f7632fc6
AT
1241}
1242
e1bd49d6
MP
1243/**
1244 * Sleep for a specified number of milliseconds.
1245 *
1246 * Always returns TRUE. (In the future it might return FALSE if
1247 * interrupted.)
1248 **/
1249int msleep(int t)
9ec16c83 1250{
c284f34a
WD
1251 int tdiff = 0;
1252 struct timeval tval, t1, t2;
9ec16c83
AT
1253
1254 gettimeofday(&t1, NULL);
5cb37436 1255
9ec16c83
AT
1256 while (tdiff < t) {
1257 tval.tv_sec = (t-tdiff)/1000;
1258 tval.tv_usec = 1000*((t-tdiff)%1000);
5cb37436 1259
9ec16c83
AT
1260 errno = 0;
1261 select(0,NULL,NULL, NULL, &tval);
1262
1263 gettimeofday(&t2, NULL);
5cb37436 1264 tdiff = (t2.tv_sec - t1.tv_sec)*1000 +
9ec16c83
AT
1265 (t2.tv_usec - t1.tv_usec)/1000;
1266 }
e1bd49d6
MP
1267
1268 return True;
9ec16c83
AT
1269}
1270
c2b54076
WD
1271/* Determine if two time_t values are equivalent (either exact, or in
1272 * the modification timestamp window established by --modify-window).
ac13ad10
MP
1273 *
1274 * @retval 0 if the times should be treated as the same
1275 *
1276 * @retval +1 if the first is later
1277 *
1278 * @retval -1 if the 2nd is later
1279 **/
c2b54076 1280int cmp_time(time_t file1, time_t file2)
5b56cc19 1281{
5b56cc19 1282 if (file2 > file1) {
bc6ebcd2
WD
1283 if (file2 - file1 <= modify_window)
1284 return 0;
5b56cc19
AT
1285 return -1;
1286 }
bc6ebcd2
WD
1287 if (file1 - file2 <= modify_window)
1288 return 0;
5b56cc19
AT
1289 return 1;
1290}
1291
1292
1293#ifdef __INSURE__XX
0f8f98c8
AT
1294#include <dlfcn.h>
1295
ac13ad10
MP
1296/**
1297 This routine is a trick to immediately catch errors when debugging
1298 with insure. A xterm with a gdb is popped up when insure catches
1299 a error. It is Linux specific.
1300**/
0f8f98c8
AT
1301int _Insure_trap_error(int a1, int a2, int a3, int a4, int a5, int a6)
1302{
1303 static int (*fn)();
1304 int ret;
8950ac03 1305 char *cmd;
0f8f98c8 1306
5cb37436 1307 asprintf(&cmd, "/usr/X11R6/bin/xterm -display :0 -T Panic -n Panic -e /bin/sh -c 'cat /tmp/ierrs.*.%d ; gdb /proc/%d/exe %d'",
0f8f98c8
AT
1308 getpid(), getpid(), getpid());
1309
1310 if (!fn) {
1311 static void *h;
1312 h = dlopen("/usr/local/parasoft/insure++lite/lib.linux2/libinsure.so", RTLD_LAZY);
1313 fn = dlsym(h, "_Insure_trap_error");
1314 }
1315
1316 ret = fn(a1, a2, a3, a4, a5, a6);
1317
1318 system(cmd);
1319
8950ac03
AT
1320 free(cmd);
1321
0f8f98c8
AT
1322 return ret;
1323}
1324#endif
58cadc86 1325
58cadc86
WD
1326#define MALLOC_MAX 0x40000000
1327
a2dc4d68 1328void *_new_array(unsigned long num, unsigned int size, int use_calloc)
58cadc86
WD
1329{
1330 if (num >= MALLOC_MAX/size)
1331 return NULL;
a2dc4d68 1332 return use_calloc ? calloc(num, size) : malloc(num * size);
58cadc86
WD
1333}
1334
1fe2a353 1335void *_realloc_array(void *ptr, unsigned int size, size_t num)
58cadc86
WD
1336{
1337 if (num >= MALLOC_MAX/size)
1338 return NULL;
58cadc86
WD
1339 if (!ptr)
1340 return malloc(size * num);
1341 return realloc(ptr, size * num);
1342}
e64ae6d7
WD
1343
1344/* Take a filename and filename length and return the most significant
1345 * filename suffix we can find. This ignores suffixes such as "~",
1346 * ".bak", ".orig", ".~1~", etc. */
1347const char *find_filename_suffix(const char *fn, int fn_len, int *len_ptr)
1348{
1349 const char *suf, *s;
1350 BOOL had_tilde;
1351 int s_len;
1352
1353 /* One or more dots at the start aren't a suffix. */
1354 while (fn_len && *fn == '.') fn++, fn_len--;
1355
1356 /* Ignore the ~ in a "foo~" filename. */
1357 if (fn_len > 1 && fn[fn_len-1] == '~')
1358 fn_len--, had_tilde = True;
1359 else
1360 had_tilde = False;
1361
1362 /* Assume we don't find an suffix. */
1363 suf = "";
1364 *len_ptr = 0;
1365
1366 /* Find the last significant suffix. */
1367 for (s = fn + fn_len; fn_len > 1; ) {
1368 while (*--s != '.' && s != fn) {}
1369 if (s == fn)
1370 break;
1371 s_len = fn_len - (s - fn);
1372 fn_len = s - fn;
6012eaa1 1373 if (s_len == 4) {
e64ae6d7
WD
1374 if (strcmp(s+1, "bak") == 0
1375 || strcmp(s+1, "old") == 0)
1376 continue;
6012eaa1 1377 } else if (s_len == 5) {
e64ae6d7
WD
1378 if (strcmp(s+1, "orig") == 0)
1379 continue;
1380 } else if (s_len > 2 && had_tilde
2dc7b8bd 1381 && s[1] == '~' && isDigit(s + 2))
e64ae6d7
WD
1382 continue;
1383 *len_ptr = s_len;
1384 suf = s;
1385 if (s_len == 1)
1386 break;
1387 /* Determine if the suffix is all digits. */
1388 for (s++, s_len--; s_len > 0; s++, s_len--) {
2dc7b8bd 1389 if (!isDigit(s))
e64ae6d7
WD
1390 return suf;
1391 }
1392 /* An all-digit suffix may not be that signficant. */
1393 s = suf;
1394 }
1395
1396 return suf;
1397}
1398
1399/* This is an implementation of the Levenshtein distance algorithm. It
1400 * was implemented to avoid needing a two-dimensional matrix (to save
1401 * memory). It was also tweaked to try to factor in the ASCII distance
1402 * between changed characters as a minor distance quantity. The normal
1403 * Levenshtein units of distance (each signifying a single change between
1404 * the two strings) are defined as a "UNIT". */
1405
1406#define UNIT (1 << 16)
1407
1408uint32 fuzzy_distance(const char *s1, int len1, const char *s2, int len2)
1409{
1410 uint32 a[MAXPATHLEN], diag, above, left, diag_inc, above_inc, left_inc;
1411 int32 cost;
1412 int i1, i2;
1413
1414 if (!len1 || !len2) {
1415 if (!len1) {
1416 s1 = s2;
1417 len1 = len2;
1418 }
1419 for (i1 = 0, cost = 0; i1 < len1; i1++)
1420 cost += s1[i1];
1421 return (int32)len1 * UNIT + cost;
1422 }
1423
1424 for (i2 = 0; i2 < len2; i2++)
1425 a[i2] = (i2+1) * UNIT;
1426
1427 for (i1 = 0; i1 < len1; i1++) {
1428 diag = i1 * UNIT;
1429 above = (i1+1) * UNIT;
1430 for (i2 = 0; i2 < len2; i2++) {
1431 left = a[i2];
1432 if ((cost = *((uchar*)s1+i1) - *((uchar*)s2+i2)) != 0) {
1433 if (cost < 0)
1434 cost = UNIT - cost;
1435 else
1436 cost = UNIT + cost;
1437 }
1438 diag_inc = diag + cost;
1439 left_inc = left + UNIT + *((uchar*)s1+i1);
1440 above_inc = above + UNIT + *((uchar*)s2+i2);
1441 a[i2] = above = left < above
1442 ? (left_inc < diag_inc ? left_inc : diag_inc)
1443 : (above_inc < diag_inc ? above_inc : diag_inc);
1444 diag = left;
1445 }
1446 }
1447
1448 return a[len2-1];
1449}
c2b54076
WD
1450
1451#define BB_SLOT_SIZE (16*1024) /* Desired size in bytes */
1452#define BB_PER_SLOT_BITS (BB_SLOT_SIZE * 8) /* Number of bits per slot */
1453#define BB_PER_SLOT_INTS (BB_SLOT_SIZE / 4) /* Number of int32s per slot */
1454
1455struct bitbag {
1456 uint32 **bits;
1457 int slot_cnt;
1458};
1459
1460struct bitbag *bitbag_create(int max_ndx)
1461{
1462 struct bitbag *bb = new(struct bitbag);
1463 bb->slot_cnt = (max_ndx + BB_PER_SLOT_BITS - 1) / BB_PER_SLOT_BITS;
1464
1465 if (!(bb->bits = (uint32**)calloc(bb->slot_cnt, sizeof (uint32*))))
1466 out_of_memory("bitbag_create");
1467
1468 return bb;
1469}
1470
1471void bitbag_set_bit(struct bitbag *bb, int ndx)
1472{
1473 int slot = ndx / BB_PER_SLOT_BITS;
1474 ndx %= BB_PER_SLOT_BITS;
1475
1476 if (!bb->bits[slot]) {
1477 if (!(bb->bits[slot] = (uint32*)calloc(BB_PER_SLOT_INTS, 4)))
1478 out_of_memory("bitbag_set_bit");
1479 }
1480
1481 bb->bits[slot][ndx/32] |= 1u << (ndx % 32);
1482}
1483
1484#if 0 /* not needed yet */
1485void bitbag_clear_bit(struct bitbag *bb, int ndx)
1486{
1487 int slot = ndx / BB_PER_SLOT_BITS;
1488 ndx %= BB_PER_SLOT_BITS;
1489
1490 if (!bb->bits[slot])
1491 return;
1492
1493 bb->bits[slot][ndx/32] &= ~(1u << (ndx % 32));
1494}
1495
1496int bitbag_check_bit(struct bitbag *bb, int ndx)
1497{
1498 int slot = ndx / BB_PER_SLOT_BITS;
1499 ndx %= BB_PER_SLOT_BITS;
1500
1501 if (!bb->bits[slot])
1502 return 0;
1503
1504 return bb->bits[slot][ndx/32] & (1u << (ndx % 32)) ? 1 : 0;
1505}
1506#endif
1507
1508/* Call this with -1 to start checking from 0. Returns -1 at the end. */
1509int bitbag_next_bit(struct bitbag *bb, int after)
1510{
1511 uint32 bits, mask;
1512 int i, ndx = after + 1;
1513 int slot = ndx / BB_PER_SLOT_BITS;
1514 ndx %= BB_PER_SLOT_BITS;
1515
1516 mask = (1u << (ndx % 32)) - 1;
1517 for (i = ndx / 32; slot < bb->slot_cnt; slot++, i = mask = 0) {
1518 if (!bb->bits[slot])
1519 continue;
1520 for ( ; i < BB_PER_SLOT_INTS; i++, mask = 0) {
1521 if (!(bits = bb->bits[slot][i] & ~mask))
1522 continue;
1523 /* The xor magic figures out the lowest enabled bit in
1524 * bits, and the switch quickly computes log2(bit). */
1525 switch (bits ^ (bits & (bits-1))) {
1526#define LOG2(n) case 1u << n: return slot*BB_PER_SLOT_BITS + i*32 + n
1527 LOG2(0); LOG2(1); LOG2(2); LOG2(3);
1528 LOG2(4); LOG2(5); LOG2(6); LOG2(7);
1529 LOG2(8); LOG2(9); LOG2(10); LOG2(11);
1530 LOG2(12); LOG2(13); LOG2(14); LOG2(15);
1531 LOG2(16); LOG2(17); LOG2(18); LOG2(19);
1532 LOG2(20); LOG2(21); LOG2(22); LOG2(23);
1533 LOG2(24); LOG2(25); LOG2(26); LOG2(27);
1534 LOG2(28); LOG2(29); LOG2(30); LOG2(31);
1535 }
1536 return -1; /* impossible... */
1537 }
1538 }
1539
1540 return -1;
1541}
1c3344a1 1542
e0c572c5
WD
1543void flist_ndx_push(flist_ndx_list *lp, int ndx)
1544{
1545 struct flist_ndx_item *item;
1546
1547 if (!(item = new(struct flist_ndx_item)))
1548 out_of_memory("flist_ndx_push");
1549 item->next = NULL;
1550 item->ndx = ndx;
1551 if (lp->tail)
1552 lp->tail->next = item;
1553 else
1554 lp->head = item;
1555 lp->tail = item;
1556}
1557
1558int flist_ndx_pop(flist_ndx_list *lp)
1559{
1560 struct flist_ndx_item *next;
1561 int ndx;
1562
1563 if (!lp->head)
1564 return -1;
1565
1566 ndx = lp->head->ndx;
1567 next = lp->head->next;
1568 free(lp->head);
1569 lp->head = next;
1570 if (!next)
1571 lp->tail = NULL;
1572
1573 return ndx;
1574}
1575
1c3344a1
WD
1576void *expand_item_list(item_list *lp, size_t item_size,
1577 const char *desc, int incr)
1578{
1579 /* First time through, 0 <= 0, so list is expanded. */
1580 if (lp->malloced <= lp->count) {
1581 void *new_ptr;
1582 size_t new_size = lp->malloced;
1583 if (incr < 0)
0b515981 1584 new_size += -incr; /* increase slowly */
1c3344a1
WD
1585 else if (new_size < (size_t)incr)
1586 new_size += incr;
1587 else
1588 new_size *= 2;
1fe2a353
WD
1589 if (new_size < lp->malloced)
1590 overflow_exit("expand_item_list");
1591 /* Using _realloc_array() lets us pass the size, not a type. */
1592 new_ptr = _realloc_array(lp->items, item_size, new_size);
951e826b 1593 if (DEBUG_GTE(FLIST, 3)) {
6d56efa6 1594 rprintf(FINFO, "[%s] expand %s to %s bytes, did%s move\n",
adc2476f 1595 who_am_i(), desc, big_num(new_size * item_size),
1c3344a1
WD
1596 new_ptr == lp->items ? " not" : "");
1597 }
1598 if (!new_ptr)
1599 out_of_memory("expand_item_list");
1600
1601 lp->items = new_ptr;
1602 lp->malloced = new_size;
1603 }
1604 return (char*)lp->items + (lp->count++ * item_size);
1605}