X-Git-Url: https://mattmccutchen.net/rsync/rsync.git/blobdiff_plain/3420c8e6e06f316e0e7f99eba3f5c957cd0d3106..8e41b68e8f975c02a5d9281be780ba5d1a385107:/syscall.c diff --git a/syscall.c b/syscall.c index d5b567f6..faa75c28 100644 --- a/syscall.c +++ b/syscall.c @@ -1,52 +1,66 @@ -/* - Copyright (C) Andrew Tridgell 1998 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - /* - syscall wrappers to ensure that nothing gets done in dry_run mode - */ + * Syscall wrappers to ensure that nothing gets done in dry_run mode + * and to handle system peculiarities. + * + * Copyright (C) 1998 Andrew Tridgell + * Copyright (C) 2002 Martin Pool + * Copyright (C) 2003-2007 Wayne Davison + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License along + * with this program; if not, visit the http://fsf.org website. + */ #include "rsync.h" +#if !defined MKNOD_CREATES_SOCKETS && defined HAVE_SYS_UN_H +#include +#endif + extern int dry_run; +extern int am_root; extern int read_only; extern int list_only; +extern int preserve_perms; -#define CHECK_RO if (read_only || list_only) {errno = EROFS; return -1;} +#define RETURN_ERROR_IF(x,e) \ + do { \ + if (x) { \ + errno = (e); \ + return -1; \ + } \ + } while (0) -int do_unlink(char *fname) +#define RETURN_ERROR_IF_RO_OR_LO RETURN_ERROR_IF(read_only || list_only, EROFS) + +int do_unlink(const char *fname) { if (dry_run) return 0; - CHECK_RO + RETURN_ERROR_IF_RO_OR_LO; return unlink(fname); } -int do_symlink(char *fname1, char *fname2) +int do_symlink(const char *fname1, const char *fname2) { if (dry_run) return 0; - CHECK_RO + RETURN_ERROR_IF_RO_OR_LO; return symlink(fname1, fname2); } -#if HAVE_LINK -int do_link(char *fname1, char *fname2) +#ifdef HAVE_LINK +int do_link(const char *fname1, const char *fname2) { if (dry_run) return 0; - CHECK_RO + RETURN_ERROR_IF_RO_OR_LO; return link(fname1, fname2); } #endif @@ -54,92 +68,188 @@ int do_link(char *fname1, char *fname2) int do_lchown(const char *path, uid_t owner, gid_t group) { if (dry_run) return 0; - CHECK_RO + RETURN_ERROR_IF_RO_OR_LO; +#ifndef HAVE_LCHOWN +#define lchown chown +#endif return lchown(path, owner, group); } -#if HAVE_MKNOD -int do_mknod(char *pathname, mode_t mode, dev_t dev) +int do_mknod(const char *pathname, mode_t mode, dev_t dev) { if (dry_run) return 0; - CHECK_RO + RETURN_ERROR_IF_RO_OR_LO; + + /* For --fake-super, we create a normal file with mode 0600. */ + if (am_root < 0) { + int fd = open(pathname, O_WRONLY|O_CREAT|O_TRUNC, S_IWUSR|S_IRUSR); + if (fd < 0 || close(fd) < 0) + return -1; + return 0; + } + +#if !defined MKNOD_CREATES_FIFOS && defined HAVE_MKFIFO + if (S_ISFIFO(mode)) + return mkfifo(pathname, mode); +#endif +#if !defined MKNOD_CREATES_SOCKETS && defined HAVE_SYS_UN_H + if (S_ISSOCK(mode)) { + int sock; + struct sockaddr_un saddr; +#ifdef HAVE_SOCKADDR_UN_LEN + unsigned int len = +#endif + strlcpy(saddr.sun_path, pathname, sizeof saddr.sun_path); +#ifdef HAVE_SOCKADDR_UN_LEN + saddr.sun_len = len >= sizeof saddr.sun_path + ? sizeof saddr.sun_path : len + 1; +#endif + saddr.sun_family = AF_UNIX; + + if ((sock = socket(PF_UNIX, SOCK_STREAM, 0)) < 0 + || (unlink(pathname) < 0 && errno != ENOENT) + || (bind(sock, (struct sockaddr*)&saddr, sizeof saddr)) < 0) + return -1; + close(sock); +#ifdef HAVE_CHMOD + return do_chmod(pathname, mode); +#else + return 0; +#endif + } +#endif +#ifdef HAVE_MKNOD return mknod(pathname, mode, dev); -} +#else + return -1; #endif +} -int do_rmdir(char *pathname) +int do_rmdir(const char *pathname) { if (dry_run) return 0; - CHECK_RO + RETURN_ERROR_IF_RO_OR_LO; return rmdir(pathname); } -int do_open(char *pathname, int flags, mode_t mode) +int do_open(const char *pathname, int flags, mode_t mode) { if (flags != O_RDONLY) { - if (dry_run) return -1; - CHECK_RO + RETURN_ERROR_IF(dry_run, 0); + RETURN_ERROR_IF_RO_OR_LO; } -#ifdef O_BINARY - /* for Windows */ - flags |= O_BINARY; -#endif - return open(pathname, flags, mode); + + return open(pathname, flags | O_BINARY, mode); } -#if HAVE_CHMOD +#ifdef HAVE_CHMOD int do_chmod(const char *path, mode_t mode) { + int code; if (dry_run) return 0; - CHECK_RO - return chmod(path, mode); + RETURN_ERROR_IF_RO_OR_LO; + if (S_ISLNK(mode)) { +#ifdef HAVE_LCHMOD + code = lchmod(path, mode & CHMOD_BITS); +#else + code = 1; +#endif + } else + code = chmod(path, mode & CHMOD_BITS); + if (code != 0 && preserve_perms) + return code; + return 0; } #endif -int do_rename(char *fname1, char *fname2) +int do_rename(const char *fname1, const char *fname2) { if (dry_run) return 0; - CHECK_RO + RETURN_ERROR_IF_RO_OR_LO; return rename(fname1, fname2); } +void trim_trailing_slashes(char *name) +{ + int l; + /* Some BSD systems cannot make a directory if the name + * contains a trailing slash. + * */ + + /* Don't change empty string; and also we can't improve on + * "/" */ + + l = strlen(name); + while (l > 1) { + if (name[--l] != '/') + break; + name[l] = '\0'; + } +} + int do_mkdir(char *fname, mode_t mode) { if (dry_run) return 0; - CHECK_RO + RETURN_ERROR_IF_RO_OR_LO; + trim_trailing_slashes(fname); return mkdir(fname, mode); } -char *do_mktemp(char *template) +/* like mkstemp but forces permissions */ +int do_mkstemp(char *template, mode_t perms) { - if (dry_run) return NULL; - if (read_only) {errno = EROFS; return NULL;} - return mktemp(template); + RETURN_ERROR_IF(dry_run, 0); + RETURN_ERROR_IF(read_only, EROFS); + +#if defined HAVE_SECURE_MKSTEMP && defined HAVE_FCHMOD && (!defined HAVE_OPEN64 || defined HAVE_MKSTEMP64) + { + int fd = mkstemp(template); + if (fd == -1) + return -1; + if (fchmod(fd, perms) != 0 && preserve_perms) { + int errno_save = errno; + close(fd); + unlink(template); + errno = errno_save; + return -1; + } +#if defined HAVE_SETMODE && O_BINARY + setmode(fd, O_BINARY); +#endif + return fd; + } +#else + if (!mktemp(template)) + return -1; + return do_open(template, O_RDWR|O_EXCL|O_CREAT, perms); +#endif } int do_stat(const char *fname, STRUCT_STAT *st) { -#if HAVE_OFF64_T +#ifdef USE_STAT64_FUNCS return stat64(fname, st); #else return stat(fname, st); #endif } -#if SUPPORT_LINKS int do_lstat(const char *fname, STRUCT_STAT *st) { -#if HAVE_OFF64_T +#ifdef SUPPORT_LINKS +# ifdef USE_STAT64_FUNCS return lstat64(fname, st); -#else +# else return lstat(fname, st); +# endif +#else + return do_stat(fname, st); #endif } -#endif int do_fstat(int fd, STRUCT_STAT *st) { -#if HAVE_OFF64_T +#ifdef USE_STAT64_FUNCS return fstat64(fd, st); #else return fstat(fd, st); @@ -148,28 +258,21 @@ int do_fstat(int fd, STRUCT_STAT *st) OFF_T do_lseek(int fd, OFF_T offset, int whence) { -#if HAVE_OFF64_T +#ifdef HAVE_LSEEK64 +#if !SIZEOF_OFF64_T + OFF_T lseek64(); +#else off64_t lseek64(); +#endif return lseek64(fd, offset, whence); #else return lseek(fd, offset, whence); #endif } -#ifdef USE_MMAP -void *do_mmap(void *start, int len, int prot, int flags, int fd, OFF_T offset) -{ -#if HAVE_OFF64_T - return mmap64(start, len, prot, flags, fd, offset); -#else - return mmap(start, len, prot, flags, fd, offset); -#endif -} -#endif - char *d_name(struct dirent *di) { -#if HAVE_BROKEN_READDIR +#ifdef HAVE_BROKEN_READDIR return (di->d_name - 2); #else return di->d_name;