1 /* -*- c-file-style: "linux" -*-
3 * Copyright (C) 1996-2000 by Andrew Tridgell
4 * Copyright (C) Paul Mackerras 1996
5 * Copyright (C) 2001, 2002 by Martin Pool <mbp@samba.org>
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
25 * Utilities used in rsync
33 extern int modify_window
;
34 extern char *partial_dir
;
35 extern struct filter_list_struct server_filter_list
;
37 int sanitize_paths
= 0;
42 * Set a fd into nonblocking mode
44 void set_nonblocking(int fd
)
48 if ((val
= fcntl(fd
, F_GETFL
, 0)) == -1)
50 if (!(val
& NONBLOCK_FLAG
)) {
52 fcntl(fd
, F_SETFL
, val
);
57 * Set a fd into blocking mode
59 void set_blocking(int fd
)
63 if ((val
= fcntl(fd
, F_GETFL
, 0)) == -1)
65 if (val
& NONBLOCK_FLAG
) {
66 val
&= ~NONBLOCK_FLAG
;
67 fcntl(fd
, F_SETFL
, val
);
73 * Create a file descriptor pair - like pipe() but use socketpair if
74 * possible (because of blocking issues on pipes).
76 * Always set non-blocking.
78 int fd_pair(int fd
[2])
82 #ifdef HAVE_SOCKETPAIR
83 ret
= socketpair(AF_UNIX
, SOCK_STREAM
, 0, fd
);
89 set_nonblocking(fd
[0]);
90 set_nonblocking(fd
[1]);
97 void print_child_argv(char **cmd
)
99 rprintf(FINFO
, "opening connection using ");
100 for (; *cmd
; cmd
++) {
101 /* Look for characters that ought to be quoted. This
102 * is not a great quoting algorithm, but it's
103 * sufficient for a log message. */
104 if (strspn(*cmd
, "abcdefghijklmnopqrstuvwxyz"
105 "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
107 ",.-_=+@/") != strlen(*cmd
)) {
108 rprintf(FINFO
, "\"%s\" ", safe_fname(*cmd
));
110 rprintf(FINFO
, "%s ", safe_fname(*cmd
));
113 rprintf(FINFO
, "\n");
117 void out_of_memory(char *str
)
119 rprintf(FERROR
, "ERROR: out of memory in %s\n", str
);
120 exit_cleanup(RERR_MALLOC
);
123 void overflow(char *str
)
125 rprintf(FERROR
, "ERROR: buffer overflow in %s\n", str
);
126 exit_cleanup(RERR_MALLOC
);
131 int set_modtime(char *fname
, time_t modtime
)
134 rprintf(FINFO
, "set modtime of %s to (%ld) %s",
135 safe_fname(fname
), (long)modtime
,
136 asctime(localtime(&modtime
)));
145 tbuf
.actime
= time(NULL
);
146 tbuf
.modtime
= modtime
;
147 return utime(fname
,&tbuf
);
148 #elif defined HAVE_UTIME
152 return utime(fname
,t
);
155 t
[0].tv_sec
= time(NULL
);
157 t
[1].tv_sec
= modtime
;
159 return utimes(fname
,t
);
166 Create any necessary directories in fname. Unfortunately we don't know
167 what perms to give the directory when this is called so we need to rely
170 int create_directory_path(char *fname
, int base_umask
)
174 while (*fname
== '/')
176 while (strncmp(fname
, "./", 2) == 0)
180 while ((p
= strchr(p
,'/')) != NULL
) {
182 do_mkdir(fname
, 0777 & ~base_umask
);
191 * Write @p len bytes at @p ptr to descriptor @p desc, retrying if
194 * @retval len upon success
196 * @retval <0 write's (negative) error code
198 * Derived from GNU C's cccp.c.
200 int full_write(int desc
, char *ptr
, size_t len
)
206 int written
= write(desc
, ptr
, len
);
212 total_written
+= written
;
216 return total_written
;
221 * Read @p len bytes at @p ptr from descriptor @p desc, retrying if
224 * @retval >0 the actual number of bytes read
228 * @retval <0 for an error.
230 * Derived from GNU C's cccp.c. */
231 static int safe_read(int desc
, char *ptr
, size_t len
)
239 n_chars
= read(desc
, ptr
, len
);
240 } while (n_chars
< 0 && errno
== EINTR
);
248 * This is used in conjunction with the --temp-dir, --backup, and
249 * --copy-dest options. */
250 int copy_file(char *source
, char *dest
, mode_t mode
)
255 int len
; /* Number of bytes read into `buf'. */
257 ifd
= do_open(source
, O_RDONLY
, 0);
259 rsyserr(FERROR
, errno
, "open %s", full_fname(source
));
263 if (robust_unlink(dest
) && errno
!= ENOENT
) {
264 rsyserr(FERROR
, errno
, "unlink %s", full_fname(dest
));
268 ofd
= do_open(dest
, O_WRONLY
| O_CREAT
| O_TRUNC
| O_EXCL
, mode
);
270 rsyserr(FERROR
, errno
, "open %s", full_fname(dest
));
275 while ((len
= safe_read(ifd
, buf
, sizeof buf
)) > 0) {
276 if (full_write(ofd
, buf
, len
) < 0) {
277 rsyserr(FERROR
, errno
, "write %s", full_fname(dest
));
285 rsyserr(FERROR
, errno
, "read %s", full_fname(source
));
291 if (close(ifd
) < 0) {
292 rsyserr(FINFO
, errno
, "close failed on %s",
296 if (close(ofd
) < 0) {
297 rsyserr(FERROR
, errno
, "close failed on %s",
305 /* MAX_RENAMES should be 10**MAX_RENAMES_DIGITS */
306 #define MAX_RENAMES_DIGITS 3
307 #define MAX_RENAMES 1000
310 * Robust unlink: some OS'es (HPUX) refuse to unlink busy files, so
311 * rename to <path>/.rsyncNNN instead.
313 * Note that successive rsync runs will shuffle the filenames around a
314 * bit as long as the file is still busy; this is because this function
315 * does not know if the unlink call is due to a new file coming in, or
316 * --delete trying to remove old .rsyncNNN files, hence it renames it
319 int robust_unlink(char *fname
)
322 return do_unlink(fname
);
324 static int counter
= 1;
326 char path
[MAXPATHLEN
];
328 rc
= do_unlink(fname
);
329 if (rc
== 0 || errno
!= ETXTBSY
)
332 if ((pos
= strlcpy(path
, fname
, MAXPATHLEN
)) >= MAXPATHLEN
)
333 pos
= MAXPATHLEN
- 1;
335 while (pos
> 0 && path
[pos
-1] != '/')
337 pos
+= strlcpy(path
+pos
, ".rsync", MAXPATHLEN
-pos
);
339 if (pos
> (MAXPATHLEN
-MAX_RENAMES_DIGITS
-1)) {
344 /* start where the last one left off to reduce chance of clashes */
347 sprintf(&path
[pos
], "%03d", counter
);
348 if (++counter
>= MAX_RENAMES
)
350 } while ((rc
= access(path
, 0)) == 0 && counter
!= start
);
353 rprintf(FINFO
,"renaming %s to %s because of text busy\n",
354 safe_fname(fname
), safe_fname(path
));
357 /* maybe we should return rename()'s exit status? Nah. */
358 if (do_rename(fname
, path
) != 0) {
366 /* Returns 0 on successful rename, 1 if we successfully copied the file
367 * across filesystems, -2 if copy_file() failed, and -1 on other errors. */
368 int robust_rename(char *from
, char *to
, int mode
)
373 if (do_rename(from
, to
) == 0)
379 if (robust_unlink(to
) != 0)
384 if (copy_file(from
, to
, mode
) != 0)
396 static pid_t all_pids
[10];
399 /** Fork and record the pid of the child. **/
402 pid_t newpid
= fork();
404 if (newpid
!= 0 && newpid
!= -1) {
405 all_pids
[num_pids
++] = newpid
;
413 * @todo It would be kind of nice to make sure that they are actually
414 * all our children before we kill them, because their pids may have
415 * been recycled by some other process. Perhaps when we wait for a
416 * child, we should remove it from this array. Alternatively we could
417 * perhaps use process groups, but I think that would not work on
418 * ancient Unix versions that don't support them.
420 void kill_all(int sig
)
424 for (i
= 0; i
< num_pids
; i
++) {
425 /* Let's just be a little careful where we
426 * point that gun, hey? See kill(2) for the
427 * magic caused by negative values. */
428 pid_t p
= all_pids
[i
];
440 /** Turn a user name into a uid */
441 int name_to_uid(char *name
, uid_t
*uid
)
446 pass
= getpwnam(name
);
454 /** Turn a group name into a gid */
455 int name_to_gid(char *name
, gid_t
*gid
)
460 grp
= getgrnam(name
);
469 /** Lock a byte range in a open file */
470 int lock_range(int fd
, int offset
, int len
)
474 lock
.l_type
= F_WRLCK
;
475 lock
.l_whence
= SEEK_SET
;
476 lock
.l_start
= offset
;
480 return fcntl(fd
,F_SETLK
,&lock
) == 0;
483 static int filter_server_path(char *arg
)
487 if (server_filter_list
.head
) {
488 for (s
= arg
; (s
= strchr(s
, '/')) != NULL
; ) {
490 if (check_filter(&server_filter_list
, arg
, 1) < 0) {
491 /* We must leave arg truncated! */
500 static void glob_expand_one(char *s
, char ***argv_ptr
, int *argc_ptr
,
503 char **argv
= *argv_ptr
;
504 int argc
= *argc_ptr
;
505 int maxargs
= *maxargs_ptr
;
506 #if !defined HAVE_GLOB || !defined HAVE_GLOB_H
507 if (argc
== maxargs
) {
509 if (!(argv
= realloc_array(argv
, char *, maxargs
)))
510 out_of_memory("glob_expand_one");
512 *maxargs_ptr
= maxargs
;
516 s
= argv
[argc
++] = strdup(s
);
517 filter_server_path(s
);
528 s
= sanitize_path(NULL
, s
, "", 0);
532 memset(&globbuf
, 0, sizeof globbuf
);
533 if (!filter_server_path(s
))
534 glob(s
, 0, NULL
, &globbuf
);
535 if (MAX((int)globbuf
.gl_pathc
, 1) > maxargs
- argc
) {
536 maxargs
+= globbuf
.gl_pathc
+ MAX_ARGS
;
537 if (!(argv
= realloc_array(argv
, char *, maxargs
)))
538 out_of_memory("glob_expand_one");
540 *maxargs_ptr
= maxargs
;
542 if (globbuf
.gl_pathc
== 0)
545 int j
= globbuf
.gl_pathc
;
547 for (i
= 0; i
< j
; i
++) {
548 if (!(argv
[argc
++] = strdup(globbuf
.gl_pathv
[i
])))
549 out_of_memory("glob_expand_one");
557 /* This routine is only used in daemon mode. */
558 void glob_expand(char *base1
, char ***argv_ptr
, int *argc_ptr
, int *maxargs_ptr
)
560 char *s
= (*argv_ptr
)[*argc_ptr
];
563 int base_len
= strlen(base
);
568 if (strncmp(s
, base
, base_len
) == 0)
571 if (!(s
= strdup(s
)))
572 out_of_memory("glob_expand");
574 if (asprintf(&base
," %s/", base1
) <= 0)
575 out_of_memory("glob_expand");
578 for (q
= s
; *q
; q
= p
+ base_len
) {
579 if ((p
= strstr(q
, base
)) != NULL
)
580 *p
= '\0'; /* split it at this point */
581 glob_expand_one(q
, argv_ptr
, argc_ptr
, maxargs_ptr
);
591 * Convert a string to lower case
593 void strlower(char *s
)
596 if (isupper(*(unsigned char *)s
))
597 *s
= tolower(*(unsigned char *)s
);
602 /* Join strings p1 & p2 into "dest" with a guaranteed '/' between them. (If
603 * p1 ends with a '/', no extra '/' is inserted.) Returns the length of both
604 * strings + 1 (if '/' was inserted), regardless of whether the null-terminated
605 * string fits into destsize. */
606 size_t pathjoin(char *dest
, size_t destsize
, const char *p1
, const char *p2
)
608 size_t len
= strlcpy(dest
, p1
, destsize
);
609 if (len
< destsize
- 1) {
610 if (!len
|| dest
[len
-1] != '/')
612 if (len
< destsize
- 1)
613 len
+= strlcpy(dest
+ len
, p2
, destsize
- len
);
620 len
+= strlen(p2
) + 1; /* Assume we'd insert a '/'. */
624 /* Join any number of strings together, putting them in "dest". The return
625 * value is the length of all the strings, regardless of whether the null-
626 * terminated whole fits in destsize. Your list of string pointers must end
627 * with a NULL to indicate the end of the list. */
628 size_t stringjoin(char *dest
, size_t destsize
, ...)
634 va_start(ap
, destsize
);
636 if (!(src
= va_arg(ap
, const char *)))
643 memcpy(dest
, src
, len
);
654 int count_dir_elements(const char *p
)
656 int cnt
= 0, new_component
= 1;
660 else if (new_component
) {
668 /* Turns multiple adjacent slashes into a single slash, gets rid of "./"
669 * elements (but not a trailing dot dir), removes a trailing slash, and
670 * optionally collapses ".." elements (except for those at the start of the
671 * string). If the resulting name would be empty, change it into a ".". */
672 unsigned int clean_fname(char *name
, BOOL collapse_dot_dot
)
674 char *limit
= name
- 1, *t
= name
, *f
= name
;
680 if ((anchored
= *f
== '/') != 0)
683 /* discard extra slashes */
689 /* discard "." dirs (but NOT a trailing '.'!) */
694 /* collapse ".." dirs */
696 && f
[1] == '.' && (f
[2] == '/' || !f
[2])) {
698 if (s
== name
&& anchored
) {
702 while (s
> limit
&& *--s
!= '/') {}
703 if (s
!= t
- 1 && (s
< name
|| *s
== '/')) {
711 while (*f
&& (*t
++ = *f
++) != '/') {}
714 if (t
> name
+anchored
&& t
[-1] == '/')
723 /* Make path appear as if a chroot had occurred. This handles a leading
724 * "/" (either removing it or expanding it) and any leading or embedded
725 * ".." components that attempt to escape past the module's top dir.
727 * If dest is NULL, a buffer is allocated to hold the result. It is legal
728 * to call with the dest and the path (p) pointing to the same buffer, but
729 * rootdir will be ignored to avoid expansion of the string.
731 * The rootdir string contains a value to use in place of a leading slash.
732 * Specify NULL to get the default of lp_path(module_id).
734 * If depth is >= 0, it is a count of how many '..'s to allow at the start
735 * of the path. Use -1 to allow unlimited depth.
737 * We also clean the path in a manner similar to clean_fname() but with a
740 * Turns multiple adjacent slashes into a single slash, gets rid of "." dir
741 * elements (INCLUDING a trailing dot dir), PRESERVES a trailing slash, and
742 * ALWAYS collapses ".." elements (except for those at the start of the
743 * string up to "depth" deep). If the resulting name would be empty,
744 * change it into a ".". */
745 char *sanitize_path(char *dest
, const char *p
, const char *rootdir
, int depth
)
751 int plen
= strlen(p
);
754 rootdir
= lp_path(module_id
);
755 rlen
= strlen(rootdir
);
760 if (rlen
+ plen
+ 1 >= MAXPATHLEN
)
762 } else if (!(dest
= new_array(char, rlen
+ plen
+ 1)))
763 out_of_memory("sanitize_path");
765 memcpy(dest
, rootdir
, rlen
);
771 start
= sanp
= dest
+ rlen
;
773 /* discard leading or extra slashes */
778 /* this loop iterates once per filename component in p.
779 * both p (and sanp if the original had a slash) should
780 * always be left pointing after a slash
782 if (*p
== '.' && (p
[1] == '/' || p
[1] == '\0')) {
783 /* skip "." component */
787 if (*p
== '.' && p
[1] == '.' && (p
[2] == '/' || p
[2] == '\0')) {
788 /* ".." component followed by slash or end */
789 if (depth
<= 0 || sanp
!= start
) {
792 /* back up sanp one level */
793 --sanp
; /* now pointing at slash */
794 while (sanp
> start
&& sanp
[-1] != '/') {
795 /* skip back up to slash */
801 /* allow depth levels of .. at the beginning */
803 /* move the virtual beginning to leave the .. alone */
806 /* copy one component through next slash */
807 while (*p
&& (*sanp
++ = *p
++) != '/') {}
810 /* ended up with nothing, so put in "." component */
818 char curr_dir
[MAXPATHLEN
];
819 unsigned int curr_dir_len
;
822 * Like chdir(), but it keeps track of the current directory (in the
823 * global "curr_dir"), and ensures that the path size doesn't overflow.
824 * Also cleans the path using the clean_fname() function.
826 int push_dir(char *dir
)
828 static int initialised
;
833 getcwd(curr_dir
, sizeof curr_dir
- 1);
834 curr_dir_len
= strlen(curr_dir
);
837 if (!dir
) /* this call was probably just to initialize */
841 if (len
== 1 && *dir
== '.')
844 if ((*dir
== '/' ? len
: curr_dir_len
+ 1 + len
) >= sizeof curr_dir
)
851 memcpy(curr_dir
, dir
, len
+ 1);
854 curr_dir
[curr_dir_len
++] = '/';
855 memcpy(curr_dir
+ curr_dir_len
, dir
, len
+ 1);
859 curr_dir_len
= clean_fname(curr_dir
, 1);
865 * Reverse a push_dir() call. You must pass in an absolute path
866 * that was copied from a prior value of "curr_dir".
868 int pop_dir(char *dir
)
873 curr_dir_len
= strlcpy(curr_dir
, dir
, sizeof curr_dir
);
874 if (curr_dir_len
>= sizeof curr_dir
)
875 curr_dir_len
= sizeof curr_dir
- 1;
880 /* Return the filename, turning any non-printable characters into '?'s.
881 * This ensures that outputting it on a line of its own cannot generate an
882 * empty line. This function can return only MAX_SAFE_NAMES values at a
883 * time! The returned value can be longer than MAXPATHLEN (because we
884 * may be trying to output an error about a too-long filename)! */
885 const char *safe_fname(const char *fname
)
887 #define MAX_SAFE_NAMES 4
888 static char fbuf
[MAX_SAFE_NAMES
][MAXPATHLEN
*2];
890 int limit
= sizeof fbuf
/ MAX_SAFE_NAMES
- 1;
893 ndx
= (ndx
+ 1) % MAX_SAFE_NAMES
;
894 for (t
= fbuf
[ndx
]; *fname
; fname
++) {
895 if (!isprint(*(uchar
*)fname
))
908 * Return a quoted string with the full pathname of the indicated filename.
909 * The string " (in MODNAME)" may also be appended. The returned pointer
910 * remains valid until the next time full_fname() is called.
912 char *full_fname(const char *fn
)
914 static char *result
= NULL
;
926 for (p2
= p1
; *p2
== '/'; p2
++) {}
930 if (module_id
>= 0) {
932 m2
= lp_name(module_id
);
934 if (p1
== curr_dir
) {
935 if (!lp_use_chroot(module_id
)) {
936 char *p
= lp_path(module_id
);
937 if (*p
!= '/' || p
[1])
944 asprintf(&result
, "\"%s%s%s\"%s%s%s", p1
, p2
, fn
, m1
, m2
, m3
);
949 static char partial_fname
[MAXPATHLEN
];
951 char *partial_dir_fname(const char *fname
)
953 char *t
= partial_fname
;
954 int sz
= sizeof partial_fname
;
957 if ((fn
= strrchr(fname
, '/')) != NULL
) {
959 if (*partial_dir
!= '/') {
960 int len
= fn
- fname
;
961 strncpy(t
, fname
, len
); /* safe */
967 if ((int)pathjoin(t
, sz
, partial_dir
, fn
) >= sz
)
969 if (server_filter_list
.head
) {
972 len
= strlen(partial_dir
);
974 if (check_filter(&server_filter_list
, partial_fname
, 1) < 0)
977 if (check_filter(&server_filter_list
, partial_fname
, 0) < 0)
981 return partial_fname
;
984 /* If no --partial-dir option was specified, we don't need to do anything
985 * (the partial-dir is essentially '.'), so just return success. */
986 int handle_partial_dir(const char *fname
, int create
)
990 if (fname
!= partial_fname
)
992 if (!create
&& *partial_dir
== '/')
994 if (!(fn
= strrchr(partial_fname
, '/')))
1001 int statret
= do_lstat(dir
, &st
);
1002 if (statret
== 0 && !S_ISDIR(st
.st_mode
)) {
1003 if (do_unlink(dir
) < 0)
1007 if (statret
< 0 && do_mkdir(dir
, 0700) < 0)
1016 /** We need to supply our own strcmp function for file list comparisons
1017 to ensure that signed/unsigned usage is consistent between machines. */
1018 int u_strcmp(const char *cs1
, const char *cs2
)
1020 const uchar
*s1
= (const uchar
*)cs1
;
1021 const uchar
*s2
= (const uchar
*)cs2
;
1023 while (*s1
&& *s2
&& (*s1
== *s2
)) {
1027 return (int)*s1
- (int)*s2
;
1033 * Determine if a symlink points outside the current directory tree.
1034 * This is considered "unsafe" because e.g. when mirroring somebody
1035 * else's machine it might allow them to establish a symlink to
1036 * /etc/passwd, and then read it through a web server.
1038 * Null symlinks and absolute symlinks are always unsafe.
1040 * Basically here we are concerned with symlinks whose target contains
1041 * "..", because this might cause us to walk back up out of the
1042 * transferred directory. We are not allowed to go back up and
1045 * @param dest Target of the symlink in question.
1047 * @param src Top source directory currently applicable. Basically this
1048 * is the first parameter to rsync in a simple invocation, but it's
1049 * modified by flist.c in slightly complex ways.
1051 * @retval True if unsafe
1052 * @retval False is unsafe
1056 int unsafe_symlink(const char *dest
, const char *src
)
1058 const char *name
, *slash
;
1061 /* all absolute and null symlinks are unsafe */
1062 if (!dest
|| !*dest
|| *dest
== '/')
1065 /* find out what our safety margin is */
1066 for (name
= src
; (slash
= strchr(name
, '/')) != 0; name
= slash
+1) {
1067 if (strncmp(name
, "../", 3) == 0) {
1069 } else if (strncmp(name
, "./", 2) == 0) {
1075 if (strcmp(name
, "..") == 0)
1078 for (name
= dest
; (slash
= strchr(name
, '/')) != 0; name
= slash
+1) {
1079 if (strncmp(name
, "../", 3) == 0) {
1080 /* if at any point we go outside the current directory
1081 then stop - it is unsafe */
1084 } else if (strncmp(name
, "./", 2) == 0) {
1090 if (strcmp(name
, "..") == 0)
1098 * Return the date and time as a string
1100 char *timestring(time_t t
)
1102 static char TimeBuf
[200];
1103 struct tm
*tm
= localtime(&t
);
1105 #ifdef HAVE_STRFTIME
1106 strftime(TimeBuf
, sizeof TimeBuf
- 1, "%Y/%m/%d %H:%M:%S", tm
);
1108 strlcpy(TimeBuf
, asctime(tm
), sizeof TimeBuf
);
1111 if (TimeBuf
[strlen(TimeBuf
)-1] == '\n') {
1112 TimeBuf
[strlen(TimeBuf
)-1] = 0;
1120 * Sleep for a specified number of milliseconds.
1122 * Always returns TRUE. (In the future it might return FALSE if
1128 struct timeval tval
, t1
, t2
;
1130 gettimeofday(&t1
, NULL
);
1133 tval
.tv_sec
= (t
-tdiff
)/1000;
1134 tval
.tv_usec
= 1000*((t
-tdiff
)%1000);
1137 select(0,NULL
,NULL
, NULL
, &tval
);
1139 gettimeofday(&t2
, NULL
);
1140 tdiff
= (t2
.tv_sec
- t1
.tv_sec
)*1000 +
1141 (t2
.tv_usec
- t1
.tv_usec
)/1000;
1149 * Determine if two file modification times are equivalent (either
1150 * exact or in the modification timestamp window established by
1153 * @retval 0 if the times should be treated as the same
1155 * @retval +1 if the first is later
1157 * @retval -1 if the 2nd is later
1159 int cmp_modtime(time_t file1
, time_t file2
)
1161 if (file2
> file1
) {
1162 if (file2
- file1
<= modify_window
)
1166 if (file1
- file2
<= modify_window
)
1176 This routine is a trick to immediately catch errors when debugging
1177 with insure. A xterm with a gdb is popped up when insure catches
1178 a error. It is Linux specific.
1180 int _Insure_trap_error(int a1
, int a2
, int a3
, int a4
, int a5
, int a6
)
1186 asprintf(&cmd
, "/usr/X11R6/bin/xterm -display :0 -T Panic -n Panic -e /bin/sh -c 'cat /tmp/ierrs.*.%d ; gdb /proc/%d/exe %d'",
1187 getpid(), getpid(), getpid());
1191 h
= dlopen("/usr/local/parasoft/insure++lite/lib.linux2/libinsure.so", RTLD_LAZY
);
1192 fn
= dlsym(h
, "_Insure_trap_error");
1195 ret
= fn(a1
, a2
, a3
, a4
, a5
, a6
);
1206 #define MALLOC_MAX 0x40000000
1208 void *_new_array(unsigned int size
, unsigned long num
)
1210 if (num
>= MALLOC_MAX
/size
)
1212 return malloc(size
* num
);
1215 void *_realloc_array(void *ptr
, unsigned int size
, unsigned long num
)
1217 if (num
>= MALLOC_MAX
/size
)
1219 /* No realloc should need this, but just in case... */
1221 return malloc(size
* num
);
1222 return realloc(ptr
, size
* num
);
1225 /* Take a filename and filename length and return the most significant
1226 * filename suffix we can find. This ignores suffixes such as "~",
1227 * ".bak", ".orig", ".~1~", etc. */
1228 const char *find_filename_suffix(const char *fn
, int fn_len
, int *len_ptr
)
1230 const char *suf
, *s
;
1234 /* One or more dots at the start aren't a suffix. */
1235 while (fn_len
&& *fn
== '.') fn
++, fn_len
--;
1237 /* Ignore the ~ in a "foo~" filename. */
1238 if (fn_len
> 1 && fn
[fn_len
-1] == '~')
1239 fn_len
--, had_tilde
= True
;
1243 /* Assume we don't find an suffix. */
1247 /* Find the last significant suffix. */
1248 for (s
= fn
+ fn_len
; fn_len
> 1; ) {
1249 while (*--s
!= '.' && s
!= fn
) {}
1252 s_len
= fn_len
- (s
- fn
);
1255 if (strcmp(s
+1, "bak") == 0
1256 || strcmp(s
+1, "old") == 0)
1258 } else if (s_len
== 4) {
1259 if (strcmp(s
+1, "orig") == 0)
1261 } else if (s_len
> 2 && had_tilde
1262 && s
[1] == '~' && isdigit(*(uchar
*)(s
+2)))
1268 /* Determine if the suffix is all digits. */
1269 for (s
++, s_len
--; s_len
> 0; s
++, s_len
--) {
1270 if (!isdigit(*(uchar
*)s
))
1273 /* An all-digit suffix may not be that signficant. */
1280 /* This is an implementation of the Levenshtein distance algorithm. It
1281 * was implemented to avoid needing a two-dimensional matrix (to save
1282 * memory). It was also tweaked to try to factor in the ASCII distance
1283 * between changed characters as a minor distance quantity. The normal
1284 * Levenshtein units of distance (each signifying a single change between
1285 * the two strings) are defined as a "UNIT". */
1287 #define UNIT (1 << 16)
1289 uint32
fuzzy_distance(const char *s1
, int len1
, const char *s2
, int len2
)
1291 uint32 a
[MAXPATHLEN
], diag
, above
, left
, diag_inc
, above_inc
, left_inc
;
1295 if (!len1
|| !len2
) {
1300 for (i1
= 0, cost
= 0; i1
< len1
; i1
++)
1302 return (int32
)len1
* UNIT
+ cost
;
1305 for (i2
= 0; i2
< len2
; i2
++)
1306 a
[i2
] = (i2
+1) * UNIT
;
1308 for (i1
= 0; i1
< len1
; i1
++) {
1310 above
= (i1
+1) * UNIT
;
1311 for (i2
= 0; i2
< len2
; i2
++) {
1313 if ((cost
= *((uchar
*)s1
+i1
) - *((uchar
*)s2
+i2
)) != 0) {
1319 diag_inc
= diag
+ cost
;
1320 left_inc
= left
+ UNIT
+ *((uchar
*)s1
+i1
);
1321 above_inc
= above
+ UNIT
+ *((uchar
*)s2
+i2
);
1322 a
[i2
] = above
= left
< above
1323 ? (left_inc
< diag_inc
? left_inc
: diag_inc
)
1324 : (above_inc
< diag_inc
? above_inc
: diag_inc
);