Configure check for -Wno-unused-parameter now tries to link too.
[rsync/rsync.git] / util.c
CommitLineData
0f78b815
WD
1/*
2 * Utility routines used in rsync.
5cb37436 3 *
0f78b815
WD
4 * Copyright (C) 1996-2000 Andrew Tridgell
5 * Copyright (C) 1996 Paul Mackerras
6 * Copyright (C) 2001, 2002 Martin Pool <mbp@samba.org>
b3bf9b9d 7 * Copyright (C) 2003-2009 Wayne Davison
5cb37436 8 *
0ecfbf27 9 * This program is free software; you can redistribute it and/or modify
8e41b68e
WD
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 3 of the License, or
12 * (at your option) any later version.
5cb37436 13 *
0ecfbf27
MP
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
5cb37436 18 *
e7c67065 19 * You should have received a copy of the GNU General Public License along
4fd842f9 20 * with this program; if not, visit the http://fsf.org website.
0ecfbf27 21 */
c627d613 22
c627d613 23#include "rsync.h"
1b42f628 24#include "ifuncs.h"
5dd14f0c
WD
25#include "itypes.h"
26#include "inums.h"
c627d613 27
bc6ebcd2
WD
28extern int dry_run;
29extern int module_id;
30extern int modify_window;
7e43da81 31extern int relative_paths;
e9489cd6 32extern int preserve_xattrs;
7c73536c 33extern char *module_dir;
a8167c66 34extern unsigned int module_dirlen;
e9357a2d 35extern mode_t orig_umask;
a7260c40 36extern char *partial_dir;
7b6c5c77 37extern filter_rule_list daemon_filter_list;
c7c11a0d 38
0ecfbf27
MP
39int sanitize_paths = 0;
40
a8167c66
WD
41char curr_dir[MAXPATHLEN];
42unsigned int curr_dir_len;
43int curr_dir_depth; /* This is only set for a sanitizing daemon. */
44
0f78b815 45/* Set a fd into nonblocking mode. */
f0359dd0
AT
46void set_nonblocking(int fd)
47{
48 int val;
49
ff530f04 50 if ((val = fcntl(fd, F_GETFL)) == -1)
f0359dd0
AT
51 return;
52 if (!(val & NONBLOCK_FLAG)) {
53 val |= NONBLOCK_FLAG;
54 fcntl(fd, F_SETFL, val);
55 }
56}
57
0f78b815 58/* Set a fd into blocking mode. */
36349ea0
AT
59void set_blocking(int fd)
60{
61 int val;
62
ff530f04 63 if ((val = fcntl(fd, F_GETFL)) == -1)
36349ea0
AT
64 return;
65 if (val & NONBLOCK_FLAG) {
66 val &= ~NONBLOCK_FLAG;
67 fcntl(fd, F_SETFL, val);
68 }
69}
70
ac13ad10 71/**
0ecfbf27
MP
72 * Create a file descriptor pair - like pipe() but use socketpair if
73 * possible (because of blocking issues on pipes).
5cb37436 74 *
0ecfbf27 75 * Always set non-blocking.
f0359dd0 76 */
08f15335
AT
77int fd_pair(int fd[2])
78{
f0359dd0
AT
79 int ret;
80
4f5b0756 81#ifdef HAVE_SOCKETPAIR
f0359dd0 82 ret = socketpair(AF_UNIX, SOCK_STREAM, 0, fd);
08f15335 83#else
f0359dd0 84 ret = pipe(fd);
08f15335 85#endif
f0359dd0
AT
86
87 if (ret == 0) {
88 set_nonblocking(fd[0]);
89 set_nonblocking(fd[1]);
90 }
0ecfbf27 91
f0359dd0 92 return ret;
08f15335
AT
93}
94
0b515981 95void print_child_argv(const char *prefix, char **cmd)
5ad0e46f 96{
0b515981 97 rprintf(FCLIENT, "%s ", prefix);
5ad0e46f
MP
98 for (; *cmd; cmd++) {
99 /* Look for characters that ought to be quoted. This
100 * is not a great quoting algorithm, but it's
101 * sufficient for a log message. */
102 if (strspn(*cmd, "abcdefghijklmnopqrstuvwxyz"
103 "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
104 "0123456789"
105 ",.-_=+@/") != strlen(*cmd)) {
a3f6dbdf 106 rprintf(FCLIENT, "\"%s\" ", *cmd);
5ad0e46f 107 } else {
a3f6dbdf 108 rprintf(FCLIENT, "%s ", *cmd);
5ad0e46f
MP
109 }
110 }
a3f6dbdf 111 rprintf(FCLIENT, "\n");
5ad0e46f
MP
112}
113
4a19c3b2 114NORETURN void out_of_memory(const char *str)
c627d613 115{
2cd421d8 116 rprintf(FERROR, "ERROR: out of memory in %s [%s]\n", str, who_am_i());
c284f34a 117 exit_cleanup(RERR_MALLOC);
575f2fca
AT
118}
119
4a19c3b2 120NORETURN void overflow_exit(const char *str)
575f2fca 121{
2cd421d8 122 rprintf(FERROR, "ERROR: buffer overflow in %s [%s]\n", str, who_am_i());
c284f34a 123 exit_cleanup(RERR_MALLOC);
c627d613
AT
124}
125
1a2e41af 126int set_modtime(const char *fname, time_t modtime, uint32 mod_nsec, mode_t mode)
c627d613 127{
accc091f 128#ifndef CAN_SET_SYMLINK_TIMES
25007999
WD
129 if (S_ISLNK(mode))
130 return 1;
131#endif
132
951e826b 133 if (DEBUG_GTE(TIME, 1)) {
404e813c 134 rprintf(FINFO, "set modtime of %s to (%ld) %s",
785abd48 135 fname, (long)modtime,
404e813c
MP
136 asctime(localtime(&modtime)));
137 }
5cb37436 138
15778afb
WD
139 if (dry_run)
140 return 0;
141
31e12522 142 {
1a2e41af
WD
143#ifdef HAVE_UTIMENSAT
144 struct timespec t[2];
145 t[0].tv_sec = 0;
146 t[0].tv_nsec = UTIME_NOW;
147 t[1].tv_sec = modtime;
148 t[1].tv_nsec = mod_nsec;
149 if (utimensat(AT_FDCWD, fname, t, AT_SYMLINK_NOFOLLOW) < 0)
150 return S_ISLNK(mode) && errno == ENOSYS ? 1 : -1;
151 return 0;
152#elif defined HAVE_UTIMES || defined HAVE_LUTIMES
25007999
WD
153 struct timeval t[2];
154 t[0].tv_sec = time(NULL);
155 t[0].tv_usec = 0;
156 t[1].tv_sec = modtime;
1a2e41af 157 t[1].tv_usec = mod_nsec / 1000;
25007999 158# ifdef HAVE_LUTIMES
accc091f
WD
159 if (lutimes(fname, t) < 0)
160 return S_ISLNK(mode) && errno == ENOSYS ? 1 : -1;
161 return 0;
162# else
25007999 163 return utimes(fname, t);
accc091f 164# endif
4f9b139a 165#elif defined HAVE_STRUCT_UTIMBUF
5cb37436 166 struct utimbuf tbuf;
31e12522
AT
167 tbuf.actime = time(NULL);
168 tbuf.modtime = modtime;
169 return utime(fname,&tbuf);
4f5b0756 170#elif defined HAVE_UTIME
31e12522
AT
171 time_t t[2];
172 t[0] = time(NULL);
173 t[1] = modtime;
174 return utime(fname,t);
c627d613 175#else
25007999 176#error No file-time-modification routine found!
c627d613 177#endif
31e12522 178 }
c627d613 179}
94481d91 180
e9357a2d
WD
181/* This creates a new directory with default permissions. Since there
182 * might be some directory-default permissions affecting this, we can't
183 * force the permissions directly using the original umask and mkdir(). */
184int mkdir_defmode(char *fname)
185{
186 int ret;
187
188 umask(orig_umask);
189 ret = do_mkdir(fname, ACCESSPERMS);
190 umask(0);
191
192 return ret;
193}
194
85c41757 195/* Create any necessary directories in fname. Any missing directories are
3696674b
WD
196 * created with default permissions. Returns < 0 on error, or the number
197 * of directories created. */
198int make_path(char *fname, int flags)
6574b4f7 199{
3696674b 200 char *end, *p;
85c41757 201 int ret = 0;
6574b4f7 202
3696674b
WD
203 if (flags & MKP_SKIP_SLASH) {
204 while (*fname == '/')
205 fname++;
206 }
207
208 while (*fname == '.' && fname[1] == '/')
c284f34a 209 fname += 2;
6574b4f7 210
3696674b
WD
211 if (flags & MKP_DROP_NAME) {
212 end = strrchr(fname, '/');
213 if (!end)
214 return 0;
215 *end = '\0';
216 } else
217 end = fname + strlen(fname);
218
219 umask(orig_umask); /* NOTE: don't return before setting this back to 0! */
220
221 /* Try to find an existing dir, starting from the deepest dir. */
222 for (p = end; ; ) {
223 if (do_mkdir(fname, ACCESSPERMS) == 0) {
224 ret++;
225 break;
226 }
227 if (errno != ENOENT) {
228 if (errno != EEXIST)
229 ret = -ret - 1;
230 break;
231 }
232 while (1) {
233 if (p == fname) {
234 ret = -ret - 1;
235 goto double_break;
236 }
237 if (*--p == '/') {
238 if (p == fname) {
239 ret = -ret - 1; /* impossible... */
240 goto double_break;
241 }
242 *p = '\0';
243 break;
244 }
245 }
246 }
247 double_break:
248
249 /* Make all the dirs that we didn't find on the way here. */
250 while (p != end) {
251 *p = '/';
252 p += strlen(p);
253 if (ret < 0) /* Skip mkdir on error, but keep restoring the path. */
254 continue;
255 if (do_mkdir(fname, ACCESSPERMS) < 0)
256 ret = -ret - 1;
257 else
258 ret++;
6574b4f7 259 }
3696674b 260
85c41757
WD
261 umask(0);
262
3696674b
WD
263 if (flags & MKP_DROP_NAME)
264 *end = '/';
265
85c41757 266 return ret;
6574b4f7 267}
950ab32d 268
ac13ad10
MP
269/**
270 * Write @p len bytes at @p ptr to descriptor @p desc, retrying if
271 * interrupted.
272 *
273 * @retval len upon success
274 *
275 * @retval <0 write's (negative) error code
276 *
277 * Derived from GNU C's cccp.c.
278 */
4a19c3b2 279int full_write(int desc, const char *ptr, size_t len)
950ab32d
AT
280{
281 int total_written;
5cb37436 282
950ab32d
AT
283 total_written = 0;
284 while (len > 0) {
5c1b7bfd 285 int written = write(desc, ptr, len);
950ab32d 286 if (written < 0) {
950ab32d
AT
287 if (errno == EINTR)
288 continue;
950ab32d
AT
289 return written;
290 }
291 total_written += written;
292 ptr += written;
293 len -= written;
294 }
295 return total_written;
296}
297
ac13ad10
MP
298/**
299 * Read @p len bytes at @p ptr from descriptor @p desc, retrying if
300 * interrupted.
301 *
302 * @retval >0 the actual number of bytes read
303 *
304 * @retval 0 for EOF
305 *
306 * @retval <0 for an error.
307 *
308 * Derived from GNU C's cccp.c. */
9dd891bb 309static int safe_read(int desc, char *ptr, size_t len)
950ab32d
AT
310{
311 int n_chars;
5cb37436 312
9dd891bb 313 if (len == 0)
950ab32d 314 return len;
5cb37436 315
950ab32d
AT
316 do {
317 n_chars = read(desc, ptr, len);
318 } while (n_chars < 0 && errno == EINTR);
5cb37436 319
950ab32d
AT
320 return n_chars;
321}
322
2cce7545
WD
323/* Copy a file. If ofd < 0, copy_file unlinks and opens the "dest" file.
324 * Otherwise, it just writes to and closes the provided file descriptor.
e9489cd6
WD
325 * In either case, if --xattrs are being preserved, the dest file will
326 * have its xattrs set from the source file.
ac13ad10 327 *
3e13004b
WD
328 * This is used in conjunction with the --temp-dir, --backup, and
329 * --copy-dest options. */
3696674b 330int copy_file(const char *source, const char *dest, int ofd, mode_t mode)
950ab32d
AT
331{
332 int ifd;
950ab32d
AT
333 char buf[1024 * 8];
334 int len; /* Number of bytes read into `buf'. */
335
f5b532b1 336 if ((ifd = do_open(source, O_RDONLY, 0)) < 0) {
f1ca7c44 337 int save_errno = errno;
3f0211b6 338 rsyserr(FERROR_XFER, errno, "open %s", full_fname(source));
f1ca7c44 339 errno = save_errno;
950ab32d
AT
340 return -1;
341 }
342
2cce7545
WD
343 if (ofd < 0) {
344 if (robust_unlink(dest) && errno != ENOENT) {
f1ca7c44 345 int save_errno = errno;
3f0211b6 346 rsyserr(FERROR_XFER, errno, "unlink %s", full_fname(dest));
f1ca7c44 347 errno = save_errno;
2cce7545
WD
348 return -1;
349 }
950ab32d 350
f1ca7c44 351 if ((ofd = do_open(dest, O_WRONLY | O_CREAT | O_TRUNC | O_EXCL, mode)) < 0) {
3696674b
WD
352 int save_errno = errno;
353 rsyserr(FERROR_XFER, save_errno, "open %s", full_fname(dest));
354 close(ifd);
355 errno = save_errno;
356 return -1;
2cce7545 357 }
950ab32d
AT
358 }
359
5cb37436 360 while ((len = safe_read(ifd, buf, sizeof buf)) > 0) {
950ab32d 361 if (full_write(ofd, buf, len) < 0) {
f1ca7c44 362 int save_errno = errno;
3f0211b6 363 rsyserr(FERROR_XFER, errno, "write %s", full_fname(dest));
950ab32d
AT
364 close(ifd);
365 close(ofd);
f1ca7c44 366 errno = save_errno;
950ab32d
AT
367 return -1;
368 }
369 }
370
8b602edd 371 if (len < 0) {
f1ca7c44 372 int save_errno = errno;
3f0211b6 373 rsyserr(FERROR_XFER, errno, "read %s", full_fname(source));
8b602edd
WD
374 close(ifd);
375 close(ofd);
f1ca7c44 376 errno = save_errno;
8b602edd
WD
377 return -1;
378 }
379
9f27cd8c 380 if (close(ifd) < 0) {
3f0211b6 381 rsyserr(FWARNING, errno, "close failed on %s",
d62bcc17 382 full_fname(source));
9f27cd8c
WD
383 }
384
385 if (close(ofd) < 0) {
f1ca7c44 386 int save_errno = errno;
3f0211b6 387 rsyserr(FERROR_XFER, errno, "close failed on %s",
d62bcc17 388 full_fname(dest));
f1ca7c44 389 errno = save_errno;
9f27cd8c
WD
390 return -1;
391 }
950ab32d 392
e9489cd6
WD
393#ifdef SUPPORT_XATTRS
394 if (preserve_xattrs)
395 copy_xattrs(source, dest);
396#endif
397
950ab32d
AT
398 return 0;
399}
feaa89c4 400
c7c11a0d
DD
401/* MAX_RENAMES should be 10**MAX_RENAMES_DIGITS */
402#define MAX_RENAMES_DIGITS 3
403#define MAX_RENAMES 1000
404
ac13ad10 405/**
b4235b31
MP
406 * Robust unlink: some OS'es (HPUX) refuse to unlink busy files, so
407 * rename to <path>/.rsyncNNN instead.
408 *
409 * Note that successive rsync runs will shuffle the filenames around a
410 * bit as long as the file is still busy; this is because this function
411 * does not know if the unlink call is due to a new file coming in, or
412 * --delete trying to remove old .rsyncNNN files, hence it renames it
413 * each time.
414 **/
63cf5ae7 415int robust_unlink(const char *fname)
c7c11a0d
DD
416{
417#ifndef ETXTBSY
418 return do_unlink(fname);
419#else
420 static int counter = 1;
421 int rc, pos, start;
422 char path[MAXPATHLEN];
423
424 rc = do_unlink(fname);
c284f34a 425 if (rc == 0 || errno != ETXTBSY)
c7c11a0d
DD
426 return rc;
427
c284f34a
WD
428 if ((pos = strlcpy(path, fname, MAXPATHLEN)) >= MAXPATHLEN)
429 pos = MAXPATHLEN - 1;
c7c11a0d 430
c284f34a
WD
431 while (pos > 0 && path[pos-1] != '/')
432 pos--;
5cb37436 433 pos += strlcpy(path+pos, ".rsync", MAXPATHLEN-pos);
c7c11a0d
DD
434
435 if (pos > (MAXPATHLEN-MAX_RENAMES_DIGITS-1)) {
436 errno = ETXTBSY;
437 return -1;
438 }
439
440 /* start where the last one left off to reduce chance of clashes */
441 start = counter;
442 do {
434c4098 443 snprintf(&path[pos], MAX_RENAMES_DIGITS+1, "%03d", counter);
c7c11a0d
DD
444 if (++counter >= MAX_RENAMES)
445 counter = 1;
c284f34a 446 } while ((rc = access(path, 0)) == 0 && counter != start);
c7c11a0d 447
951e826b 448 if (INFO_GTE(MISC, 1)) {
3f0211b6 449 rprintf(FWARNING, "renaming %s to %s because of text busy\n",
785abd48 450 fname, path);
4791825d 451 }
c7c11a0d
DD
452
453 /* maybe we should return rename()'s exit status? Nah. */
454 if (do_rename(fname, path) != 0) {
455 errno = ETXTBSY;
456 return -1;
457 }
458 return 0;
459#endif
460}
461
630f548f 462/* Returns 0 on successful rename, 1 if we successfully copied the file
3ed8eafc
WD
463 * across filesystems, -2 if copy_file() failed, and -1 on other errors.
464 * If partialptr is not NULL and we need to do a copy, copy the file into
465 * the active partial-dir instead of over the destination file. */
4a19c3b2 466int robust_rename(const char *from, const char *to, const char *partialptr,
3ed8eafc 467 int mode)
c7c11a0d 468{
62c9e6b3
WD
469 int tries = 4;
470
471 while (tries--) {
472 if (do_rename(from, to) == 0)
473 return 0;
474
475 switch (errno) {
476#ifdef ETXTBSY
477 case ETXTBSY:
f1ca7c44
WD
478 if (robust_unlink(to) != 0) {
479 errno = ETXTBSY;
62c9e6b3 480 return -1;
f1ca7c44
WD
481 }
482 errno = ETXTBSY;
62c9e6b3 483 break;
c7c11a0d 484#endif
62c9e6b3 485 case EXDEV:
3ed8eafc
WD
486 if (partialptr) {
487 if (!handle_partial_dir(partialptr,PDIR_CREATE))
0479eb76 488 return -2;
3ed8eafc
WD
489 to = partialptr;
490 }
3696674b 491 if (copy_file(from, to, -1, mode) != 0)
62c9e6b3
WD
492 return -2;
493 do_unlink(from);
630f548f 494 return 1;
62c9e6b3
WD
495 default:
496 return -1;
497 }
498 }
499 return -1;
feaa89c4 500}
3ba62a83 501
3ba62a83
AT
502static pid_t all_pids[10];
503static int num_pids;
504
4cf64834 505/** Fork and record the pid of the child. **/
3ba62a83
AT
506pid_t do_fork(void)
507{
508 pid_t newpid = fork();
5cb37436 509
4cf64834 510 if (newpid != 0 && newpid != -1) {
3ba62a83
AT
511 all_pids[num_pids++] = newpid;
512 }
513 return newpid;
514}
515
4cf64834
MP
516/**
517 * Kill all children.
518 *
519 * @todo It would be kind of nice to make sure that they are actually
520 * all our children before we kill them, because their pids may have
521 * been recycled by some other process. Perhaps when we wait for a
522 * child, we should remove it from this array. Alternatively we could
523 * perhaps use process groups, but I think that would not work on
524 * ancient Unix versions that don't support them.
525 **/
3ba62a83
AT
526void kill_all(int sig)
527{
528 int i;
4cf64834
MP
529
530 for (i = 0; i < num_pids; i++) {
531 /* Let's just be a little careful where we
532 * point that gun, hey? See kill(2) for the
533 * magic caused by negative values. */
534 pid_t p = all_pids[i];
535
536 if (p == getpid())
537 continue;
538 if (p <= 0)
539 continue;
540
541 kill(p, sig);
3ba62a83
AT
542 }
543}
9486289c 544
ac13ad10 545/** Lock a byte range in a open file */
31593dd6 546int lock_range(int fd, int offset, int len)
0c515f17 547{
31593dd6 548 struct flock lock;
0c515f17 549
31593dd6
AT
550 lock.l_type = F_WRLCK;
551 lock.l_whence = SEEK_SET;
552 lock.l_start = offset;
553 lock.l_len = len;
554 lock.l_pid = 0;
5cb37436 555
31593dd6 556 return fcntl(fd,F_SETLK,&lock) == 0;
0c515f17 557}
874895d5 558
4d30f176 559#define ENSURE_MEMSPACE(buf, type, sz, req) \
bc267e0f
WD
560 if ((req) > sz && !(buf = realloc_array(buf, type, sz = MAX(sz * 2, req)))) \
561 out_of_memory("glob_expand")
4d30f176
WD
562
563static inline void call_glob_match(const char *name, int len, int from_glob,
564 char *arg, int abpos, int fbpos);
565
987a5467
WD
566static struct glob_data {
567 char *arg_buf, *filt_buf, **argv;
568 int absize, fbsize, maxargs, argc;
569} glob;
4d30f176
WD
570
571static void glob_match(char *arg, int abpos, int fbpos)
4791825d 572{
4d30f176
WD
573 int len;
574 char *slash;
575
576 while (*arg == '.' && arg[1] == '/') {
577 if (fbpos < 0) {
bc267e0f 578 ENSURE_MEMSPACE(glob.filt_buf, char, glob.fbsize, glob.absize);
987a5467 579 memcpy(glob.filt_buf, glob.arg_buf, abpos + 1);
4d30f176 580 fbpos = abpos;
4791825d 581 }
bc267e0f 582 ENSURE_MEMSPACE(glob.arg_buf, char, glob.absize, abpos + 3);
987a5467
WD
583 glob.arg_buf[abpos++] = *arg++;
584 glob.arg_buf[abpos++] = *arg++;
585 glob.arg_buf[abpos] = '\0';
4791825d 586 }
4d30f176
WD
587 if ((slash = strchr(arg, '/')) != NULL) {
588 *slash = '\0';
589 len = slash - arg;
590 } else
591 len = strlen(arg);
592 if (strpbrk(arg, "*?[")) {
593 struct dirent *di;
594 DIR *d;
595
987a5467 596 if (!(d = opendir(abpos ? glob.arg_buf : ".")))
4d30f176
WD
597 return;
598 while ((di = readdir(d)) != NULL) {
599 char *dname = d_name(di);
600 if (dname[0] == '.' && (dname[1] == '\0'
601 || (dname[1] == '.' && dname[2] == '\0')))
602 continue;
603 if (!wildmatch(arg, dname))
604 continue;
605 call_glob_match(dname, strlen(dname), 1,
606 slash ? arg + len + 1 : NULL,
607 abpos, fbpos);
608 }
609 closedir(d);
610 } else {
611 call_glob_match(arg, len, 0,
612 slash ? arg + len + 1 : NULL,
613 abpos, fbpos);
614 }
615 if (slash)
616 *slash = '/';
4791825d 617}
874895d5 618
4d30f176
WD
619static inline void call_glob_match(const char *name, int len, int from_glob,
620 char *arg, int abpos, int fbpos)
874895d5 621{
4d30f176
WD
622 char *use_buf;
623
987a5467
WD
624 ENSURE_MEMSPACE(glob.arg_buf, char, glob.absize, abpos + len + 2);
625 memcpy(glob.arg_buf + abpos, name, len);
4d30f176 626 abpos += len;
987a5467 627 glob.arg_buf[abpos] = '\0';
4d30f176
WD
628
629 if (fbpos >= 0) {
987a5467
WD
630 ENSURE_MEMSPACE(glob.filt_buf, char, glob.fbsize, fbpos + len + 2);
631 memcpy(glob.filt_buf + fbpos, name, len);
4d30f176 632 fbpos += len;
987a5467
WD
633 glob.filt_buf[fbpos] = '\0';
634 use_buf = glob.filt_buf;
4d30f176 635 } else
987a5467 636 use_buf = glob.arg_buf;
4d30f176 637
6db1db54 638 if (from_glob || (arg && len)) {
4d30f176
WD
639 STRUCT_STAT st;
640 int is_dir;
641
b5daf530
WD
642 if (do_stat(glob.arg_buf, &st) != 0)
643 return;
644 is_dir = S_ISDIR(st.st_mode) != 0;
645 if (arg && !is_dir)
646 return;
4d30f176
WD
647
648 if (daemon_filter_list.head
1df02d13 649 && check_filter(&daemon_filter_list, FLOG, use_buf, is_dir) < 0)
b5daf530 650 return;
b7061c82 651 }
874895d5 652
4d30f176 653 if (arg) {
987a5467
WD
654 glob.arg_buf[abpos++] = '/';
655 glob.arg_buf[abpos] = '\0';
4d30f176 656 if (fbpos >= 0) {
987a5467
WD
657 glob.filt_buf[fbpos++] = '/';
658 glob.filt_buf[fbpos] = '\0';
4d30f176
WD
659 }
660 glob_match(arg, abpos, fbpos);
661 } else {
987a5467
WD
662 ENSURE_MEMSPACE(glob.argv, char *, glob.maxargs, glob.argc + 1);
663 if (!(glob.argv[glob.argc++] = strdup(glob.arg_buf)))
4d30f176
WD
664 out_of_memory("glob_match");
665 }
666}
667
668/* This routine performs wild-card expansion of the pathname in "arg". Any
91f625ce
WD
669 * daemon-excluded files/dirs will not be matched by the wildcards. Returns 0
670 * if a wild-card string is the only returned item (due to matching nothing). */
671int glob_expand(const char *arg, char ***argv_p, int *argc_p, int *maxargs_p)
4d30f176 672{
91f625ce 673 int ret, save_argc;
4d30f176 674 char *s;
987a5467
WD
675
676 if (!arg) {
677 if (glob.filt_buf)
678 free(glob.filt_buf);
679 free(glob.arg_buf);
680 memset(&glob, 0, sizeof glob);
91f625ce 681 return -1;
987a5467 682 }
e42c9458 683
4135d091 684 if (sanitize_paths)
4d30f176 685 s = sanitize_path(NULL, arg, "", 0, SP_KEEP_DOT_DIRS);
d48810ba 686 else {
4d30f176 687 s = strdup(arg);
d48810ba
WD
688 if (!s)
689 out_of_memory("glob_expand");
690 clean_fname(s, CFN_KEEP_DOT_DIRS
691 | CFN_KEEP_TRAILING_SLASH
692 | CFN_COLLAPSE_DOT_DOT_DIRS);
693 }
087bf010 694
bc267e0f 695 ENSURE_MEMSPACE(glob.arg_buf, char, glob.absize, MAXPATHLEN);
987a5467 696 *glob.arg_buf = '\0';
4d30f176 697
987a5467
WD
698 glob.argc = save_argc = *argc_p;
699 glob.argv = *argv_p;
700 glob.maxargs = *maxargs_p;
4d30f176 701
bc267e0f 702 ENSURE_MEMSPACE(glob.argv, char *, glob.maxargs, 100);
4d30f176
WD
703
704 glob_match(s, 0, -1);
705
706 /* The arg didn't match anything, so add the failed arg to the list. */
987a5467
WD
707 if (glob.argc == save_argc) {
708 ENSURE_MEMSPACE(glob.argv, char *, glob.maxargs, glob.argc + 1);
709 glob.argv[glob.argc++] = s;
91f625ce
WD
710 ret = 0;
711 } else {
4d30f176 712 free(s);
91f625ce
WD
713 ret = 1;
714 }
4d30f176 715
987a5467
WD
716 *maxargs_p = glob.maxargs;
717 *argv_p = glob.argv;
718 *argc_p = glob.argc;
91f625ce
WD
719
720 return ret;
874895d5 721}
5a96ee05 722
4791825d 723/* This routine is only used in daemon mode. */
4d30f176 724void glob_expand_module(char *base1, char *arg, char ***argv_p, int *argc_p, int *maxargs_p)
087bf010 725{
044dc293 726 char *p, *s;
ba5e128d 727 char *base = base1;
4791825d 728 int base_len = strlen(base);
087bf010 729
044dc293 730 if (!arg || !*arg)
b5bd5542 731 return;
087bf010 732
044dc293
WD
733 if (strncmp(arg, base, base_len) == 0)
734 arg += base_len;
e42c9458 735
044dc293
WD
736 if (!(arg = strdup(arg)))
737 out_of_memory("glob_expand_module");
087bf010 738
b5bd5542 739 if (asprintf(&base," %s/", base1) <= 0)
044dc293 740 out_of_memory("glob_expand_module");
4791825d 741 base_len++;
ba5e128d 742
044dc293
WD
743 for (s = arg; *s; s = p + base_len) {
744 if ((p = strstr(s, base)) != NULL)
b5bd5542 745 *p = '\0'; /* split it at this point */
4d30f176 746 glob_expand(s, argv_p, argc_p, maxargs_p);
b5bd5542
WD
747 if (!p)
748 break;
087bf010
AT
749 }
750
044dc293 751 free(arg);
ba5e128d 752 free(base);
087bf010 753}
5a96ee05 754
ac13ad10
MP
755/**
756 * Convert a string to lower case
757 **/
5a96ee05
AT
758void strlower(char *s)
759{
760 while (*s) {
2dc7b8bd
WD
761 if (isUpper(s))
762 *s = toLower(s);
5a96ee05
AT
763 s++;
764 }
765}
e42c9458 766
368ad70e
WD
767/* Join strings p1 & p2 into "dest" with a guaranteed '/' between them. (If
768 * p1 ends with a '/', no extra '/' is inserted.) Returns the length of both
a8f7e4b8
WD
769 * strings + 1 (if '/' was inserted), regardless of whether the null-terminated
770 * string fits into destsize. */
368ad70e
WD
771size_t pathjoin(char *dest, size_t destsize, const char *p1, const char *p2)
772{
773 size_t len = strlcpy(dest, p1, destsize);
774 if (len < destsize - 1) {
775 if (!len || dest[len-1] != '/')
776 dest[len++] = '/';
777 if (len < destsize - 1)
778 len += strlcpy(dest + len, p2, destsize - len);
779 else {
780 dest[len] = '\0';
781 len += strlen(p2);
782 }
783 }
784 else
785 len += strlen(p2) + 1; /* Assume we'd insert a '/'. */
786 return len;
787}
788
789/* Join any number of strings together, putting them in "dest". The return
a8f7e4b8
WD
790 * value is the length of all the strings, regardless of whether the null-
791 * terminated whole fits in destsize. Your list of string pointers must end
792 * with a NULL to indicate the end of the list. */
368ad70e
WD
793size_t stringjoin(char *dest, size_t destsize, ...)
794{
5cb37436 795 va_list ap;
368ad70e
WD
796 size_t len, ret = 0;
797 const char *src;
798
799 va_start(ap, destsize);
800 while (1) {
801 if (!(src = va_arg(ap, const char *)))
802 break;
803 len = strlen(src);
804 ret += len;
805 if (destsize > 1) {
806 if (len >= destsize)
807 len = destsize - 1;
808 memcpy(dest, src, len);
809 destsize -= len;
810 dest += len;
811 }
812 }
813 *dest = '\0';
814 va_end(ap);
815
816 return ret;
817}
818
1d6b8f9a
WD
819int count_dir_elements(const char *p)
820{
821 int cnt = 0, new_component = 1;
822 while (*p) {
823 if (*p++ == '/')
a8167c66 824 new_component = (*p != '.' || (p[1] != '/' && p[1] != '\0'));
1d6b8f9a
WD
825 else if (new_component) {
826 new_component = 0;
827 cnt++;
828 }
829 }
830 return cnt;
831}
832
3795dafd
WD
833/* Turns multiple adjacent slashes into a single slash (possible exception:
834 * the preserving of two leading slashes at the start), drops all leading or
d48810ba
WD
835 * interior "." elements unless CFN_KEEP_DOT_DIRS is flagged. Will also drop
836 * a trailing '.' after a '/' if CFN_DROP_TRAILING_DOT_DIR is flagged, removes
837 * a trailing slash (perhaps after removing the aforementioned dot) unless
838 * CFN_KEEP_TRAILING_SLASH is flagged, and will also collapse ".." elements
839 * (except at the start) if CFN_COLLAPSE_DOT_DOT_DIRS is flagged. If the
840 * resulting name would be empty, returns ".". */
6bb82fe0 841unsigned int clean_fname(char *name, int flags)
5243c216 842{
e012b94f 843 char *limit = name - 1, *t = name, *f = name;
ebdd24d6 844 int anchored;
5243c216 845
b5bd5542 846 if (!name)
3104620c 847 return 0;
5243c216 848
3795dafd 849 if ((anchored = *f == '/') != 0) {
ebdd24d6 850 *t++ = *f++;
3795dafd
WD
851#ifdef __CYGWIN__
852 /* If there are exactly 2 slashes at the start, preserve
853 * them. Would break daemon excludes unless the paths are
854 * really treated differently, so used this sparingly. */
855 if (*f == '/' && f[1] != '/')
856 *t++ = *f++;
857#endif
858 } else if (flags & CFN_KEEP_DOT_DIRS && *f == '.' && f[1] == '/') {
6bb82fe0
WD
859 *t++ = *f++;
860 *t++ = *f++;
861 }
ebdd24d6
WD
862 while (*f) {
863 /* discard extra slashes */
864 if (*f == '/') {
865 f++;
866 continue;
5243c216 867 }
ebdd24d6 868 if (*f == '.') {
6bb82fe0 869 /* discard interior "." dirs */
d48810ba 870 if (f[1] == '/' && !(flags & CFN_KEEP_DOT_DIRS)) {
e012b94f 871 f += 2;
ebdd24d6
WD
872 continue;
873 }
6bb82fe0
WD
874 if (f[1] == '\0' && flags & CFN_DROP_TRAILING_DOT_DIR)
875 break;
ebdd24d6 876 /* collapse ".." dirs */
6bb82fe0
WD
877 if (flags & CFN_COLLAPSE_DOT_DOT_DIRS
878 && f[1] == '.' && (f[2] == '/' || !f[2])) {
ebdd24d6
WD
879 char *s = t - 1;
880 if (s == name && anchored) {
881 f += 2;
882 continue;
883 }
884 while (s > limit && *--s != '/') {}
e012b94f 885 if (s != t - 1 && (s < name || *s == '/')) {
ebdd24d6
WD
886 t = s + 1;
887 f += 2;
888 continue;
889 }
f55c2dfc 890 limit = t + 2;
5243c216
AT
891 }
892 }
ebdd24d6 893 while (*f && (*t++ = *f++) != '/') {}
5243c216 894 }
ebdd24d6 895
6bb82fe0 896 if (t > name+anchored && t[-1] == '/' && !(flags & CFN_KEEP_TRAILING_SLASH))
ebdd24d6
WD
897 t--;
898 if (t == name)
899 *t++ = '.';
900 *t = '\0';
3104620c
WD
901
902 return t - name;
5243c216
AT
903}
904
84a63795
WD
905/* Make path appear as if a chroot had occurred. This handles a leading
906 * "/" (either removing it or expanding it) and any leading or embedded
907 * ".." components that attempt to escape past the module's top dir.
b4235b31 908 *
1d6b8f9a
WD
909 * If dest is NULL, a buffer is allocated to hold the result. It is legal
910 * to call with the dest and the path (p) pointing to the same buffer, but
911 * rootdir will be ignored to avoid expansion of the string.
b4235b31 912 *
1d6b8f9a 913 * The rootdir string contains a value to use in place of a leading slash.
7c73536c 914 * Specify NULL to get the default of "module_dir".
ac13ad10 915 *
a8167c66 916 * The depth var is a count of how many '..'s to allow at the start of the
29bca53f 917 * path.
ac13ad10 918 *
b92693da 919 * We also clean the path in a manner similar to clean_fname() but with a
0f78b815 920 * few differences:
b92693da
WD
921 *
922 * Turns multiple adjacent slashes into a single slash, gets rid of "." dir
923 * elements (INCLUDING a trailing dot dir), PRESERVES a trailing slash, and
924 * ALWAYS collapses ".." elements (except for those at the start of the
925 * string up to "depth" deep). If the resulting name would be empty,
926 * change it into a ".". */
d48810ba
WD
927char *sanitize_path(char *dest, const char *p, const char *rootdir, int depth,
928 int flags)
1b8e662a 929{
29bca53f 930 char *start, *sanp;
d48810ba 931 int rlen = 0, drop_dot_dirs = !relative_paths || !(flags & SP_KEEP_DOT_DIRS);
84a63795
WD
932
933 if (dest != p) {
934 int plen = strlen(p);
1d6b8f9a
WD
935 if (*p == '/') {
936 if (!rootdir)
7c73536c 937 rootdir = module_dir;
1d6b8f9a
WD
938 rlen = strlen(rootdir);
939 depth = 0;
84a63795
WD
940 p++;
941 }
942 if (dest) {
943 if (rlen + plen + 1 >= MAXPATHLEN)
944 return NULL;
945 } else if (!(dest = new_array(char, rlen + plen + 1)))
946 out_of_memory("sanitize_path");
947 if (rlen) {
1d6b8f9a 948 memcpy(dest, rootdir, rlen);
84a63795
WD
949 if (rlen > 1)
950 dest[rlen++] = '/';
951 }
952 }
cb13abfe 953
d48810ba
WD
954 if (drop_dot_dirs) {
955 while (*p == '.' && p[1] == '/')
956 p += 2;
957 }
958
84a63795 959 start = sanp = dest + rlen;
d2f6e192
WD
960 /* This loop iterates once per filename component in p, pointing at
961 * the start of the name (past any prior slash) for each iteration. */
29bca53f 962 while (*p) {
2d41264e
WD
963 /* discard leading or extra slashes */
964 if (*p == '/') {
965 p++;
966 continue;
967 }
d48810ba
WD
968 if (drop_dot_dirs) {
969 if (*p == '.' && (p[1] == '/' || p[1] == '\0')) {
7e43da81
WD
970 /* skip "." component */
971 p++;
972 continue;
973 }
cb13abfe 974 }
c284f34a 975 if (*p == '.' && p[1] == '.' && (p[2] == '/' || p[2] == '\0')) {
cb13abfe 976 /* ".." component followed by slash or end */
8e5f029e
WD
977 if (depth <= 0 || sanp != start) {
978 p += 2;
979 if (sanp != start) {
980 /* back up sanp one level */
981 --sanp; /* now pointing at slash */
d48810ba 982 while (sanp > start && sanp[-1] != '/')
8e5f029e 983 sanp--;
b5f9e67d 984 }
8e5f029e 985 continue;
1b8e662a 986 }
8e5f029e
WD
987 /* allow depth levels of .. at the beginning */
988 depth--;
989 /* move the virtual beginning to leave the .. alone */
990 start = sanp + 3;
1b8e662a 991 }
2d41264e
WD
992 /* copy one component through next slash */
993 while (*p && (*sanp++ = *p++) != '/') {}
1b8e662a 994 }
84a63795 995 if (sanp == dest) {
b5f9e67d 996 /* ended up with nothing, so put in "." component */
44e2e578 997 *sanp++ = '.';
b5f9e67d 998 }
44e2e578 999 *sanp = '\0';
1b8e662a 1000
84a63795 1001 return dest;
14b61c63 1002}
5243c216 1003
a8167c66 1004/* Like chdir(), but it keeps track of the current directory (in the
a16d8f2b 1005 * global "curr_dir"), and ensures that the path size doesn't overflow.
a8167c66 1006 * Also cleans the path using the clean_fname() function. */
29a89172 1007int change_dir(const char *dir, int set_path_only)
5243c216 1008{
5243c216 1009 static int initialised;
4af8fe4e 1010 unsigned int len;
5243c216
AT
1011
1012 if (!initialised) {
1013 initialised = 1;
94112924
WD
1014 if (getcwd(curr_dir, sizeof curr_dir - 1) == NULL) {
1015 rsyserr(FERROR, errno, "getcwd()");
1016 exit_cleanup(RERR_FILESELECT);
1017 }
4af8fe4e 1018 curr_dir_len = strlen(curr_dir);
5243c216
AT
1019 }
1020
4af8fe4e
WD
1021 if (!dir) /* this call was probably just to initialize */
1022 return 0;
c226b7c2 1023
4af8fe4e
WD
1024 len = strlen(dir);
1025 if (len == 1 && *dir == '.')
1026 return 1;
5243c216 1027
5243c216 1028 if (*dir == '/') {
29a89172
WD
1029 if (len >= sizeof curr_dir) {
1030 errno = ENAMETOOLONG;
1031 return 0;
1032 }
1033 if (!set_path_only && chdir(dir))
1034 return 0;
4af8fe4e 1035 memcpy(curr_dir, dir, len + 1);
4af8fe4e 1036 } else {
29a89172
WD
1037 if (curr_dir_len + 1 + len >= sizeof curr_dir) {
1038 errno = ENAMETOOLONG;
1039 return 0;
1040 }
1041 curr_dir[curr_dir_len] = '/';
1042 memcpy(curr_dir + curr_dir_len + 1, dir, len + 1);
1043
1044 if (!set_path_only && chdir(curr_dir)) {
1045 curr_dir[curr_dir_len] = '\0';
1046 return 0;
1047 }
5243c216
AT
1048 }
1049
6bb82fe0 1050 curr_dir_len = clean_fname(curr_dir, CFN_COLLAPSE_DOT_DOT_DIRS);
a8167c66
WD
1051 if (sanitize_paths) {
1052 if (module_dirlen > curr_dir_len)
1053 module_dirlen = curr_dir_len;
1054 curr_dir_depth = count_dir_elements(curr_dir + module_dirlen);
1055 }
5243c216 1056
951e826b 1057 if (DEBUG_GTE(CHDIR, 1) && !set_path_only)
29a89172 1058 rprintf(FINFO, "[%s] change_dir(%s)\n", who_am_i(), curr_dir);
beef86d0 1059
4af8fe4e 1060 return 1;
5243c216 1061}
aa9b77a5 1062
26e21efc
WD
1063/* This will make a relative path absolute and clean it up via clean_fname().
1064 * Returns the string, which might be newly allocated, or NULL on error. */
1065char *normalize_path(char *path, BOOL force_newbuf, unsigned int *len_ptr)
1066{
1067 unsigned int len;
1068
1069 if (*path != '/') { /* Make path absolute. */
1070 int len = strlen(path);
1071 if (curr_dir_len + 1 + len >= sizeof curr_dir)
1072 return NULL;
1073 curr_dir[curr_dir_len] = '/';
1074 memcpy(curr_dir + curr_dir_len + 1, path, len + 1);
1075 if (!(path = strdup(curr_dir)))
1076 out_of_memory("normalize_path");
1077 curr_dir[curr_dir_len] = '\0';
1078 } else if (force_newbuf) {
1079 if (!(path = strdup(path)))
1080 out_of_memory("normalize_path");
1081 }
1082
1083 len = clean_fname(path, CFN_COLLAPSE_DOT_DOT_DIRS | CFN_DROP_TRAILING_DOT_DIR);
1084
1085 if (len_ptr)
1086 *len_ptr = len;
1087
1088 return path;
1089}
1090
eb61be19
WD
1091/**
1092 * Return a quoted string with the full pathname of the indicated filename.
1093 * The string " (in MODNAME)" may also be appended. The returned pointer
1094 * remains valid until the next time full_fname() is called.
1095 **/
9a5ade18 1096char *full_fname(const char *fn)
eb61be19 1097{
eb61be19
WD
1098 static char *result = NULL;
1099 char *m1, *m2, *m3;
1100 char *p1, *p2;
1101
1102 if (result)
1103 free(result);
1104
1105 if (*fn == '/')
1106 p1 = p2 = "";
1107 else {
4cff5fa4 1108 p1 = curr_dir + module_dirlen;
bc83274a
WD
1109 for (p2 = p1; *p2 == '/'; p2++) {}
1110 if (*p2)
1111 p2 = "/";
eb61be19
WD
1112 }
1113 if (module_id >= 0) {
1114 m1 = " (in ";
1115 m2 = lp_name(module_id);
1116 m3 = ")";
eb61be19
WD
1117 } else
1118 m1 = m2 = m3 = "";
1119
c98ad3df
WD
1120 if (asprintf(&result, "\"%s%s%s\"%s%s%s", p1, p2, fn, m1, m2, m3) <= 0)
1121 out_of_memory("full_fname");
eb61be19
WD
1122
1123 return result;
1124}
1125
a7260c40
WD
1126static char partial_fname[MAXPATHLEN];
1127
1128char *partial_dir_fname(const char *fname)
1129{
1130 char *t = partial_fname;
1131 int sz = sizeof partial_fname;
1132 const char *fn;
1133
1134 if ((fn = strrchr(fname, '/')) != NULL) {
1135 fn++;
1136 if (*partial_dir != '/') {
1137 int len = fn - fname;
1138 strncpy(t, fname, len); /* safe */
1139 t += len;
1140 sz -= len;
1141 }
1142 } else
1143 fn = fname;
1144 if ((int)pathjoin(t, sz, partial_dir, fn) >= sz)
1145 return NULL;
819bfe45 1146 if (daemon_filter_list.head) {
89363676
WD
1147 t = strrchr(partial_fname, '/');
1148 *t = '\0';
1df02d13 1149 if (check_filter(&daemon_filter_list, FLOG, partial_fname, 1) < 0)
5aa7b20a 1150 return NULL;
89363676 1151 *t = '/';
1df02d13 1152 if (check_filter(&daemon_filter_list, FLOG, partial_fname, 0) < 0)
5aa7b20a
WD
1153 return NULL;
1154 }
a7260c40
WD
1155
1156 return partial_fname;
1157}
1158
1159/* If no --partial-dir option was specified, we don't need to do anything
1160 * (the partial-dir is essentially '.'), so just return success. */
1161int handle_partial_dir(const char *fname, int create)
1162{
1163 char *fn, *dir;
1164
1165 if (fname != partial_fname)
1166 return 1;
1167 if (!create && *partial_dir == '/')
1168 return 1;
1169 if (!(fn = strrchr(partial_fname, '/')))
1170 return 1;
1171
1172 *fn = '\0';
1173 dir = partial_fname;
1174 if (create) {
1175 STRUCT_STAT st;
a7260c40 1176 int statret = do_lstat(dir, &st);
a7260c40 1177 if (statret == 0 && !S_ISDIR(st.st_mode)) {
0479eb76
WD
1178 if (do_unlink(dir) < 0) {
1179 *fn = '/';
a7260c40 1180 return 0;
0479eb76 1181 }
a7260c40
WD
1182 statret = -1;
1183 }
0479eb76
WD
1184 if (statret < 0 && do_mkdir(dir, 0700) < 0) {
1185 *fn = '/';
a7260c40 1186 return 0;
0479eb76 1187 }
a7260c40
WD
1188 } else
1189 do_rmdir(dir);
1190 *fn = '/';
1191
1192 return 1;
1193}
1194
b4d30300 1195/* Determine if a symlink points outside the current directory tree.
036e70b0
MP
1196 * This is considered "unsafe" because e.g. when mirroring somebody
1197 * else's machine it might allow them to establish a symlink to
1198 * /etc/passwd, and then read it through a web server.
1199 *
b4d30300
WD
1200 * Returns 1 if unsafe, 0 if safe.
1201 *
4e5db0ad
MP
1202 * Null symlinks and absolute symlinks are always unsafe.
1203 *
1204 * Basically here we are concerned with symlinks whose target contains
1205 * "..", because this might cause us to walk back up out of the
1206 * transferred directory. We are not allowed to go back up and
1207 * reenter.
1208 *
b4d30300 1209 * "dest" is the target of the symlink in question.
036e70b0 1210 *
b4d30300
WD
1211 * "src" is the top source directory currently applicable at the level
1212 * of the referenced symlink. This is usually the symlink's full path
1213 * (including its name), as referenced from the root of the transfer. */
7afa3a4a 1214int unsafe_symlink(const char *dest, const char *src)
4b957c22 1215{
7afa3a4a 1216 const char *name, *slash;
4b957c22
AT
1217 int depth = 0;
1218
1219 /* all absolute and null symlinks are unsafe */
b5bd5542
WD
1220 if (!dest || !*dest || *dest == '/')
1221 return 1;
4b957c22
AT
1222
1223 /* find out what our safety margin is */
7afa3a4a 1224 for (name = src; (slash = strchr(name, '/')) != 0; name = slash+1) {
b4d30300
WD
1225 /* ".." segment starts the count over. "." segment is ignored. */
1226 if (*name == '.' && (name[1] == '/' || (name[1] == '.' && name[2] == '/'))) {
1227 if (name[1] == '.')
1228 depth = 0;
1229 } else
4b957c22 1230 depth++;
b4d30300 1231 while (slash[1] == '/') slash++; /* just in case src isn't clean */
4b957c22 1232 }
b4d30300 1233 if (*name == '.' && name[1] == '.' && name[2] == '\0')
7afa3a4a 1234 depth = 0;
4b957c22 1235
7afa3a4a 1236 for (name = dest; (slash = strchr(name, '/')) != 0; name = slash+1) {
b4d30300
WD
1237 if (*name == '.' && (name[1] == '/' || (name[1] == '.' && name[2] == '/'))) {
1238 if (name[1] == '.') {
1239 /* if at any point we go outside the current directory
1240 then stop - it is unsafe */
1241 if (--depth < 0)
1242 return 1;
1243 }
1244 } else
4b957c22 1245 depth++;
b4d30300 1246 while (slash[1] == '/') slash++;
4b957c22 1247 }
b4d30300 1248 if (*name == '.' && name[1] == '.' && name[2] == '\0')
7afa3a4a 1249 depth--;
4b957c22 1250
b4d30300 1251 return depth < 0;
4b957c22 1252}
375a4556 1253
4a19c3b2 1254/* Return the date and time as a string. Some callers tweak returned buf. */
f7632fc6
AT
1255char *timestring(time_t t)
1256{
1257 static char TimeBuf[200];
1258 struct tm *tm = localtime(&t);
afa73c75 1259 char *p;
f7632fc6 1260
4f5b0756 1261#ifdef HAVE_STRFTIME
5cb37436 1262 strftime(TimeBuf, sizeof TimeBuf - 1, "%Y/%m/%d %H:%M:%S", tm);
f7632fc6 1263#else
5cb37436 1264 strlcpy(TimeBuf, asctime(tm), sizeof TimeBuf);
f7632fc6
AT
1265#endif
1266
afa73c75
WD
1267 if ((p = strchr(TimeBuf, '\n')) != NULL)
1268 *p = '\0';
f7632fc6 1269
afa73c75 1270 return TimeBuf;
f7632fc6
AT
1271}
1272
e1bd49d6
MP
1273/**
1274 * Sleep for a specified number of milliseconds.
1275 *
1276 * Always returns TRUE. (In the future it might return FALSE if
1277 * interrupted.)
1278 **/
1279int msleep(int t)
9ec16c83 1280{
c284f34a
WD
1281 int tdiff = 0;
1282 struct timeval tval, t1, t2;
9ec16c83
AT
1283
1284 gettimeofday(&t1, NULL);
5cb37436 1285
9ec16c83
AT
1286 while (tdiff < t) {
1287 tval.tv_sec = (t-tdiff)/1000;
1288 tval.tv_usec = 1000*((t-tdiff)%1000);
5cb37436 1289
9ec16c83
AT
1290 errno = 0;
1291 select(0,NULL,NULL, NULL, &tval);
1292
1293 gettimeofday(&t2, NULL);
5cb37436 1294 tdiff = (t2.tv_sec - t1.tv_sec)*1000 +
9ec16c83
AT
1295 (t2.tv_usec - t1.tv_usec)/1000;
1296 }
e1bd49d6
MP
1297
1298 return True;
9ec16c83
AT
1299}
1300
c2b54076
WD
1301/* Determine if two time_t values are equivalent (either exact, or in
1302 * the modification timestamp window established by --modify-window).
ac13ad10
MP
1303 *
1304 * @retval 0 if the times should be treated as the same
1305 *
1306 * @retval +1 if the first is later
1307 *
1308 * @retval -1 if the 2nd is later
1309 **/
c2b54076 1310int cmp_time(time_t file1, time_t file2)
5b56cc19 1311{
5b56cc19 1312 if (file2 > file1) {
bc6ebcd2
WD
1313 if (file2 - file1 <= modify_window)
1314 return 0;
5b56cc19
AT
1315 return -1;
1316 }
bc6ebcd2
WD
1317 if (file1 - file2 <= modify_window)
1318 return 0;
5b56cc19
AT
1319 return 1;
1320}
1321
1322
1323#ifdef __INSURE__XX
0f8f98c8
AT
1324#include <dlfcn.h>
1325
ac13ad10
MP
1326/**
1327 This routine is a trick to immediately catch errors when debugging
1328 with insure. A xterm with a gdb is popped up when insure catches
1329 a error. It is Linux specific.
1330**/
0f8f98c8
AT
1331int _Insure_trap_error(int a1, int a2, int a3, int a4, int a5, int a6)
1332{
1333 static int (*fn)();
1334 int ret;
8950ac03 1335 char *cmd;
0f8f98c8 1336
5cb37436 1337 asprintf(&cmd, "/usr/X11R6/bin/xterm -display :0 -T Panic -n Panic -e /bin/sh -c 'cat /tmp/ierrs.*.%d ; gdb /proc/%d/exe %d'",
0f8f98c8
AT
1338 getpid(), getpid(), getpid());
1339
1340 if (!fn) {
1341 static void *h;
1342 h = dlopen("/usr/local/parasoft/insure++lite/lib.linux2/libinsure.so", RTLD_LAZY);
1343 fn = dlsym(h, "_Insure_trap_error");
1344 }
1345
1346 ret = fn(a1, a2, a3, a4, a5, a6);
1347
1348 system(cmd);
1349
8950ac03
AT
1350 free(cmd);
1351
0f8f98c8
AT
1352 return ret;
1353}
1354#endif
58cadc86 1355
58cadc86
WD
1356#define MALLOC_MAX 0x40000000
1357
a2dc4d68 1358void *_new_array(unsigned long num, unsigned int size, int use_calloc)
58cadc86
WD
1359{
1360 if (num >= MALLOC_MAX/size)
1361 return NULL;
a2dc4d68 1362 return use_calloc ? calloc(num, size) : malloc(num * size);
58cadc86
WD
1363}
1364
1fe2a353 1365void *_realloc_array(void *ptr, unsigned int size, size_t num)
58cadc86
WD
1366{
1367 if (num >= MALLOC_MAX/size)
1368 return NULL;
58cadc86
WD
1369 if (!ptr)
1370 return malloc(size * num);
1371 return realloc(ptr, size * num);
1372}
e64ae6d7
WD
1373
1374/* Take a filename and filename length and return the most significant
1375 * filename suffix we can find. This ignores suffixes such as "~",
1376 * ".bak", ".orig", ".~1~", etc. */
1377const char *find_filename_suffix(const char *fn, int fn_len, int *len_ptr)
1378{
1379 const char *suf, *s;
1380 BOOL had_tilde;
1381 int s_len;
1382
1383 /* One or more dots at the start aren't a suffix. */
1384 while (fn_len && *fn == '.') fn++, fn_len--;
1385
1386 /* Ignore the ~ in a "foo~" filename. */
1387 if (fn_len > 1 && fn[fn_len-1] == '~')
1388 fn_len--, had_tilde = True;
1389 else
1390 had_tilde = False;
1391
1392 /* Assume we don't find an suffix. */
1393 suf = "";
1394 *len_ptr = 0;
1395
1396 /* Find the last significant suffix. */
1397 for (s = fn + fn_len; fn_len > 1; ) {
1398 while (*--s != '.' && s != fn) {}
1399 if (s == fn)
1400 break;
1401 s_len = fn_len - (s - fn);
1402 fn_len = s - fn;
6012eaa1 1403 if (s_len == 4) {
e64ae6d7
WD
1404 if (strcmp(s+1, "bak") == 0
1405 || strcmp(s+1, "old") == 0)
1406 continue;
6012eaa1 1407 } else if (s_len == 5) {
e64ae6d7
WD
1408 if (strcmp(s+1, "orig") == 0)
1409 continue;
1410 } else if (s_len > 2 && had_tilde
2dc7b8bd 1411 && s[1] == '~' && isDigit(s + 2))
e64ae6d7
WD
1412 continue;
1413 *len_ptr = s_len;
1414 suf = s;
1415 if (s_len == 1)
1416 break;
1417 /* Determine if the suffix is all digits. */
1418 for (s++, s_len--; s_len > 0; s++, s_len--) {
2dc7b8bd 1419 if (!isDigit(s))
e64ae6d7
WD
1420 return suf;
1421 }
1422 /* An all-digit suffix may not be that signficant. */
1423 s = suf;
1424 }
1425
1426 return suf;
1427}
1428
1429/* This is an implementation of the Levenshtein distance algorithm. It
1430 * was implemented to avoid needing a two-dimensional matrix (to save
1431 * memory). It was also tweaked to try to factor in the ASCII distance
1432 * between changed characters as a minor distance quantity. The normal
1433 * Levenshtein units of distance (each signifying a single change between
1434 * the two strings) are defined as a "UNIT". */
1435
1436#define UNIT (1 << 16)
1437
870cf552 1438uint32 fuzzy_distance(const char *s1, unsigned len1, const char *s2, unsigned len2)
e64ae6d7
WD
1439{
1440 uint32 a[MAXPATHLEN], diag, above, left, diag_inc, above_inc, left_inc;
1441 int32 cost;
870cf552 1442 unsigned i1, i2;
e64ae6d7
WD
1443
1444 if (!len1 || !len2) {
1445 if (!len1) {
1446 s1 = s2;
1447 len1 = len2;
1448 }
1449 for (i1 = 0, cost = 0; i1 < len1; i1++)
1450 cost += s1[i1];
1451 return (int32)len1 * UNIT + cost;
1452 }
1453
1454 for (i2 = 0; i2 < len2; i2++)
1455 a[i2] = (i2+1) * UNIT;
1456
1457 for (i1 = 0; i1 < len1; i1++) {
1458 diag = i1 * UNIT;
1459 above = (i1+1) * UNIT;
1460 for (i2 = 0; i2 < len2; i2++) {
1461 left = a[i2];
1462 if ((cost = *((uchar*)s1+i1) - *((uchar*)s2+i2)) != 0) {
1463 if (cost < 0)
1464 cost = UNIT - cost;
1465 else
1466 cost = UNIT + cost;
1467 }
1468 diag_inc = diag + cost;
1469 left_inc = left + UNIT + *((uchar*)s1+i1);
1470 above_inc = above + UNIT + *((uchar*)s2+i2);
1471 a[i2] = above = left < above
1472 ? (left_inc < diag_inc ? left_inc : diag_inc)
1473 : (above_inc < diag_inc ? above_inc : diag_inc);
1474 diag = left;
1475 }
1476 }
1477
1478 return a[len2-1];
1479}
c2b54076
WD
1480
1481#define BB_SLOT_SIZE (16*1024) /* Desired size in bytes */
1482#define BB_PER_SLOT_BITS (BB_SLOT_SIZE * 8) /* Number of bits per slot */
1483#define BB_PER_SLOT_INTS (BB_SLOT_SIZE / 4) /* Number of int32s per slot */
1484
1485struct bitbag {
1486 uint32 **bits;
1487 int slot_cnt;
1488};
1489
1490struct bitbag *bitbag_create(int max_ndx)
1491{
1492 struct bitbag *bb = new(struct bitbag);
1493 bb->slot_cnt = (max_ndx + BB_PER_SLOT_BITS - 1) / BB_PER_SLOT_BITS;
1494
1495 if (!(bb->bits = (uint32**)calloc(bb->slot_cnt, sizeof (uint32*))))
1496 out_of_memory("bitbag_create");
1497
1498 return bb;
1499}
1500
1501void bitbag_set_bit(struct bitbag *bb, int ndx)
1502{
1503 int slot = ndx / BB_PER_SLOT_BITS;
1504 ndx %= BB_PER_SLOT_BITS;
1505
1506 if (!bb->bits[slot]) {
1507 if (!(bb->bits[slot] = (uint32*)calloc(BB_PER_SLOT_INTS, 4)))
1508 out_of_memory("bitbag_set_bit");
1509 }
1510
1511 bb->bits[slot][ndx/32] |= 1u << (ndx % 32);
1512}
1513
1514#if 0 /* not needed yet */
1515void bitbag_clear_bit(struct bitbag *bb, int ndx)
1516{
1517 int slot = ndx / BB_PER_SLOT_BITS;
1518 ndx %= BB_PER_SLOT_BITS;
1519
1520 if (!bb->bits[slot])
1521 return;
1522
1523 bb->bits[slot][ndx/32] &= ~(1u << (ndx % 32));
1524}
1525
1526int bitbag_check_bit(struct bitbag *bb, int ndx)
1527{
1528 int slot = ndx / BB_PER_SLOT_BITS;
1529 ndx %= BB_PER_SLOT_BITS;
1530
1531 if (!bb->bits[slot])
1532 return 0;
1533
1534 return bb->bits[slot][ndx/32] & (1u << (ndx % 32)) ? 1 : 0;
1535}
1536#endif
1537
1538/* Call this with -1 to start checking from 0. Returns -1 at the end. */
1539int bitbag_next_bit(struct bitbag *bb, int after)
1540{
1541 uint32 bits, mask;
1542 int i, ndx = after + 1;
1543 int slot = ndx / BB_PER_SLOT_BITS;
1544 ndx %= BB_PER_SLOT_BITS;
1545
1546 mask = (1u << (ndx % 32)) - 1;
1547 for (i = ndx / 32; slot < bb->slot_cnt; slot++, i = mask = 0) {
1548 if (!bb->bits[slot])
1549 continue;
1550 for ( ; i < BB_PER_SLOT_INTS; i++, mask = 0) {
1551 if (!(bits = bb->bits[slot][i] & ~mask))
1552 continue;
1553 /* The xor magic figures out the lowest enabled bit in
1554 * bits, and the switch quickly computes log2(bit). */
1555 switch (bits ^ (bits & (bits-1))) {
1556#define LOG2(n) case 1u << n: return slot*BB_PER_SLOT_BITS + i*32 + n
1557 LOG2(0); LOG2(1); LOG2(2); LOG2(3);
1558 LOG2(4); LOG2(5); LOG2(6); LOG2(7);
1559 LOG2(8); LOG2(9); LOG2(10); LOG2(11);
1560 LOG2(12); LOG2(13); LOG2(14); LOG2(15);
1561 LOG2(16); LOG2(17); LOG2(18); LOG2(19);
1562 LOG2(20); LOG2(21); LOG2(22); LOG2(23);
1563 LOG2(24); LOG2(25); LOG2(26); LOG2(27);
1564 LOG2(28); LOG2(29); LOG2(30); LOG2(31);
1565 }
1566 return -1; /* impossible... */
1567 }
1568 }
1569
1570 return -1;
1571}
1c3344a1 1572
e0c572c5
WD
1573void flist_ndx_push(flist_ndx_list *lp, int ndx)
1574{
1575 struct flist_ndx_item *item;
1576
1577 if (!(item = new(struct flist_ndx_item)))
1578 out_of_memory("flist_ndx_push");
1579 item->next = NULL;
1580 item->ndx = ndx;
1581 if (lp->tail)
1582 lp->tail->next = item;
1583 else
1584 lp->head = item;
1585 lp->tail = item;
1586}
1587
1588int flist_ndx_pop(flist_ndx_list *lp)
1589{
1590 struct flist_ndx_item *next;
1591 int ndx;
1592
1593 if (!lp->head)
1594 return -1;
1595
1596 ndx = lp->head->ndx;
1597 next = lp->head->next;
1598 free(lp->head);
1599 lp->head = next;
1600 if (!next)
1601 lp->tail = NULL;
1602
1603 return ndx;
1604}
1605
1c3344a1
WD
1606void *expand_item_list(item_list *lp, size_t item_size,
1607 const char *desc, int incr)
1608{
1609 /* First time through, 0 <= 0, so list is expanded. */
1610 if (lp->malloced <= lp->count) {
1611 void *new_ptr;
1612 size_t new_size = lp->malloced;
1613 if (incr < 0)
0b515981 1614 new_size += -incr; /* increase slowly */
1c3344a1
WD
1615 else if (new_size < (size_t)incr)
1616 new_size += incr;
1617 else
1618 new_size *= 2;
1fe2a353
WD
1619 if (new_size < lp->malloced)
1620 overflow_exit("expand_item_list");
1621 /* Using _realloc_array() lets us pass the size, not a type. */
1622 new_ptr = _realloc_array(lp->items, item_size, new_size);
951e826b 1623 if (DEBUG_GTE(FLIST, 3)) {
6d56efa6 1624 rprintf(FINFO, "[%s] expand %s to %s bytes, did%s move\n",
adc2476f 1625 who_am_i(), desc, big_num(new_size * item_size),
1c3344a1
WD
1626 new_ptr == lp->items ? " not" : "");
1627 }
1628 if (!new_ptr)
1629 out_of_memory("expand_item_list");
1630
1631 lp->items = new_ptr;
1632 lp->malloced = new_size;
1633 }
1634 return (char*)lp->items + (lp->count++ * item_size);
1635}