1 /* 2 * OS specific functions for UNIX/POSIX systems 3 * Copyright (c) 2005-2009, Jouni Malinen <j (at) w1.fi> 4 * 5 * This software may be distributed under the terms of the BSD license. 6 * See README for more details. 7 */ 8 9 #include "includes.h" 10 11 #include <time.h> 12 13 #ifdef ANDROID 14 #include <sys/capability.h> 15 #include <linux/prctl.h> 16 #include <private/android_filesystem_config.h> 17 #endif /* ANDROID */ 18 19 #include "os.h" 20 21 #ifdef WPA_TRACE 22 23 #include "common.h" 24 #include "wpa_debug.h" 25 #include "trace.h" 26 #include "list.h" 27 28 static struct dl_list alloc_list; 29 30 #define ALLOC_MAGIC 0xa84ef1b2 31 #define FREED_MAGIC 0x67fd487a 32 33 struct os_alloc_trace { 34 unsigned int magic; 35 struct dl_list list; 36 size_t len; 37 WPA_TRACE_INFO 38 }; 39 40 #endif /* WPA_TRACE */ 41 42 43 void os_sleep(os_time_t sec, os_time_t usec) 44 { 45 if (sec) 46 sleep(sec); 47 if (usec) 48 usleep(usec); 49 } 50 51 52 int os_get_time(struct os_time *t) 53 { 54 int res; 55 struct timeval tv; 56 res = gettimeofday(&tv, NULL); 57 t->sec = tv.tv_sec; 58 t->usec = tv.tv_usec; 59 return res; 60 } 61 62 63 int os_mktime(int year, int month, int day, int hour, int min, int sec, 64 os_time_t *t) 65 { 66 struct tm tm, *tm1; 67 time_t t_local, t1, t2; 68 os_time_t tz_offset; 69 70 if (year < 1970 || month < 1 || month > 12 || day < 1 || day > 31 || 71 hour < 0 || hour > 23 || min < 0 || min > 59 || sec < 0 || 72 sec > 60) 73 return -1; 74 75 memset(&tm, 0, sizeof(tm)); 76 tm.tm_year = year - 1900; 77 tm.tm_mon = month - 1; 78 tm.tm_mday = day; 79 tm.tm_hour = hour; 80 tm.tm_min = min; 81 tm.tm_sec = sec; 82 83 t_local = mktime(&tm); 84 85 /* figure out offset to UTC */ 86 tm1 = localtime(&t_local); 87 if (tm1) { 88 t1 = mktime(tm1); 89 tm1 = gmtime(&t_local); 90 if (tm1) { 91 t2 = mktime(tm1); 92 tz_offset = t2 - t1; 93 } else 94 tz_offset = 0; 95 } else 96 tz_offset = 0; 97 98 *t = (os_time_t) t_local - tz_offset; 99 return 0; 100 } 101 102 103 int os_gmtime(os_time_t t, struct os_tm *tm) 104 { 105 struct tm *tm2; 106 time_t t2 = t; 107 108 tm2 = gmtime(&t2); 109 if (tm2 == NULL) 110 return -1; 111 tm->sec = tm2->tm_sec; 112 tm->min = tm2->tm_min; 113 tm->hour = tm2->tm_hour; 114 tm->day = tm2->tm_mday; 115 tm->month = tm2->tm_mon + 1; 116 tm->year = tm2->tm_year + 1900; 117 return 0; 118 } 119 120 121 #ifdef __APPLE__ 122 #include <fcntl.h> 123 static int os_daemon(int nochdir, int noclose) 124 { 125 int devnull; 126 127 if (chdir("/") < 0) 128 return -1; 129 130 devnull = open("/dev/null", O_RDWR); 131 if (devnull < 0) 132 return -1; 133 134 if (dup2(devnull, STDIN_FILENO) < 0) { 135 close(devnull); 136 return -1; 137 } 138 139 if (dup2(devnull, STDOUT_FILENO) < 0) { 140 close(devnull); 141 return -1; 142 } 143 144 if (dup2(devnull, STDERR_FILENO) < 0) { 145 close(devnull); 146 return -1; 147 } 148 149 return 0; 150 } 151 #else /* __APPLE__ */ 152 #define os_daemon daemon 153 #endif /* __APPLE__ */ 154 155 156 int os_daemonize(const char *pid_file) 157 { 158 #if defined(__uClinux__) || defined(__sun__) 159 return -1; 160 #else /* defined(__uClinux__) || defined(__sun__) */ 161 if (os_daemon(0, 0)) { 162 perror("daemon"); 163 return -1; 164 } 165 166 if (pid_file) { 167 FILE *f = fopen(pid_file, "w"); 168 if (f) { 169 fprintf(f, "%u\n", getpid()); 170 fclose(f); 171 } 172 } 173 174 return -0; 175 #endif /* defined(__uClinux__) || defined(__sun__) */ 176 } 177 178 179 void os_daemonize_terminate(const char *pid_file) 180 { 181 if (pid_file) 182 unlink(pid_file); 183 } 184 185 186 int os_get_random(unsigned char *buf, size_t len) 187 { 188 FILE *f; 189 size_t rc; 190 191 f = fopen("/dev/urandom", "rb"); 192 if (f == NULL) { 193 printf("Could not open /dev/urandom.\n"); 194 return -1; 195 } 196 197 rc = fread(buf, 1, len, f); 198 fclose(f); 199 200 return rc != len ? -1 : 0; 201 } 202 203 204 unsigned long os_random(void) 205 { 206 return random(); 207 } 208 209 210 char * os_rel2abs_path(const char *rel_path) 211 { 212 char *buf = NULL, *cwd, *ret; 213 size_t len = 128, cwd_len, rel_len, ret_len; 214 int last_errno; 215 216 if (!rel_path) 217 return NULL; 218 219 if (rel_path[0] == '/') 220 return os_strdup(rel_path); 221 222 for (;;) { 223 buf = os_malloc(len); 224 if (buf == NULL) 225 return NULL; 226 cwd = getcwd(buf, len); 227 if (cwd == NULL) { 228 last_errno = errno; 229 os_free(buf); 230 if (last_errno != ERANGE) 231 return NULL; 232 len *= 2; 233 if (len > 2000) 234 return NULL; 235 } else { 236 buf[len - 1] = '\0'; 237 break; 238 } 239 } 240 241 cwd_len = os_strlen(cwd); 242 rel_len = os_strlen(rel_path); 243 ret_len = cwd_len + 1 + rel_len + 1; 244 ret = os_malloc(ret_len); 245 if (ret) { 246 os_memcpy(ret, cwd, cwd_len); 247 ret[cwd_len] = '/'; 248 os_memcpy(ret + cwd_len + 1, rel_path, rel_len); 249 ret[ret_len - 1] = '\0'; 250 } 251 os_free(buf); 252 return ret; 253 } 254 255 256 int os_program_init(void) 257 { 258 #ifdef ANDROID 259 /* 260 * We ignore errors here since errors are normal if we 261 * are already running as non-root. 262 */ 263 #ifdef ANDROID_SETGROUPS_OVERRIDE 264 gid_t groups[] = { ANDROID_SETGROUPS_OVERRIDE }; 265 #else /* ANDROID_SETGROUPS_OVERRIDE */ 266 gid_t groups[] = { AID_INET, AID_WIFI, AID_KEYSTORE }; 267 #endif /* ANDROID_SETGROUPS_OVERRIDE */ 268 struct __user_cap_header_struct header; 269 struct __user_cap_data_struct cap; 270 271 setgroups(sizeof(groups)/sizeof(groups[0]), groups); 272 273 prctl(PR_SET_KEEPCAPS, 1, 0, 0, 0); 274 275 setgid(AID_WIFI); 276 setuid(AID_WIFI); 277 278 header.version = _LINUX_CAPABILITY_VERSION; 279 header.pid = 0; 280 cap.effective = cap.permitted = 281 (1 << CAP_NET_ADMIN) | (1 << CAP_NET_RAW); 282 cap.inheritable = 0; 283 capset(&header, &cap); 284 #endif /* ANDROID */ 285 286 #ifdef WPA_TRACE 287 dl_list_init(&alloc_list); 288 #endif /* WPA_TRACE */ 289 return 0; 290 } 291 292 293 void os_program_deinit(void) 294 { 295 #ifdef WPA_TRACE 296 struct os_alloc_trace *a; 297 unsigned long total = 0; 298 dl_list_for_each(a, &alloc_list, struct os_alloc_trace, list) { 299 total += a->len; 300 if (a->magic != ALLOC_MAGIC) { 301 wpa_printf(MSG_INFO, "MEMLEAK[%p]: invalid magic 0x%x " 302 "len %lu", 303 a, a->magic, (unsigned long) a->len); 304 continue; 305 } 306 wpa_printf(MSG_INFO, "MEMLEAK[%p]: len %lu", 307 a, (unsigned long) a->len); 308 wpa_trace_dump("memleak", a); 309 } 310 if (total) 311 wpa_printf(MSG_INFO, "MEMLEAK: total %lu bytes", 312 (unsigned long) total); 313 #endif /* WPA_TRACE */ 314 } 315 316 317 int os_setenv(const char *name, const char *value, int overwrite) 318 { 319 return setenv(name, value, overwrite); 320 } 321 322 323 int os_unsetenv(const char *name) 324 { 325 #if defined(__FreeBSD__) || defined(__NetBSD__) || defined(__APPLE__) || \ 326 defined(__OpenBSD__) 327 unsetenv(name); 328 return 0; 329 #else 330 return unsetenv(name); 331 #endif 332 } 333 334 335 char * os_readfile(const char *name, size_t *len) 336 { 337 FILE *f; 338 char *buf; 339 long pos; 340 341 f = fopen(name, "rb"); 342 if (f == NULL) 343 return NULL; 344 345 if (fseek(f, 0, SEEK_END) < 0 || (pos = ftell(f)) < 0) { 346 fclose(f); 347 return NULL; 348 } 349 *len = pos; 350 if (fseek(f, 0, SEEK_SET) < 0) { 351 fclose(f); 352 return NULL; 353 } 354 355 buf = os_malloc(*len); 356 if (buf == NULL) { 357 fclose(f); 358 return NULL; 359 } 360 361 if (fread(buf, 1, *len, f) != *len) { 362 fclose(f); 363 os_free(buf); 364 return NULL; 365 } 366 367 fclose(f); 368 369 return buf; 370 } 371 372 373 #ifndef WPA_TRACE 374 void * os_zalloc(size_t size) 375 { 376 return calloc(1, size); 377 } 378 #endif /* WPA_TRACE */ 379 380 381 size_t os_strlcpy(char *dest, const char *src, size_t siz) 382 { 383 const char *s = src; 384 size_t left = siz; 385 386 if (left) { 387 /* Copy string up to the maximum size of the dest buffer */ 388 while (--left != 0) { 389 if ((*dest++ = *s++) == '\0') 390 break; 391 } 392 } 393 394 if (left == 0) { 395 /* Not enough room for the string; force NUL-termination */ 396 if (siz != 0) 397 *dest = '\0'; 398 while (*s++) 399 ; /* determine total src string length */ 400 } 401 402 return s - src - 1; 403 } 404 405 406 #ifdef WPA_TRACE 407 408 void * os_malloc(size_t size) 409 { 410 struct os_alloc_trace *a; 411 a = malloc(sizeof(*a) + size); 412 if (a == NULL) 413 return NULL; 414 a->magic = ALLOC_MAGIC; 415 dl_list_add(&alloc_list, &a->list); 416 a->len = size; 417 wpa_trace_record(a); 418 return a + 1; 419 } 420 421 422 void * os_realloc(void *ptr, size_t size) 423 { 424 struct os_alloc_trace *a; 425 size_t copy_len; 426 void *n; 427 428 if (ptr == NULL) 429 return os_malloc(size); 430 431 a = (struct os_alloc_trace *) ptr - 1; 432 if (a->magic != ALLOC_MAGIC) { 433 wpa_printf(MSG_INFO, "REALLOC[%p]: invalid magic 0x%x%s", 434 a, a->magic, 435 a->magic == FREED_MAGIC ? " (already freed)" : ""); 436 wpa_trace_show("Invalid os_realloc() call"); 437 abort(); 438 } 439 n = os_malloc(size); 440 if (n == NULL) 441 return NULL; 442 copy_len = a->len; 443 if (copy_len > size) 444 copy_len = size; 445 os_memcpy(n, a + 1, copy_len); 446 os_free(ptr); 447 return n; 448 } 449 450 451 void os_free(void *ptr) 452 { 453 struct os_alloc_trace *a; 454 455 if (ptr == NULL) 456 return; 457 a = (struct os_alloc_trace *) ptr - 1; 458 if (a->magic != ALLOC_MAGIC) { 459 wpa_printf(MSG_INFO, "FREE[%p]: invalid magic 0x%x%s", 460 a, a->magic, 461 a->magic == FREED_MAGIC ? " (already freed)" : ""); 462 wpa_trace_show("Invalid os_free() call"); 463 abort(); 464 } 465 dl_list_del(&a->list); 466 a->magic = FREED_MAGIC; 467 468 wpa_trace_check_ref(ptr); 469 free(a); 470 } 471 472 473 void * os_zalloc(size_t size) 474 { 475 void *ptr = os_malloc(size); 476 if (ptr) 477 os_memset(ptr, 0, size); 478 return ptr; 479 } 480 481 482 char * os_strdup(const char *s) 483 { 484 size_t len; 485 char *d; 486 len = os_strlen(s); 487 d = os_malloc(len + 1); 488 if (d == NULL) 489 return NULL; 490 os_memcpy(d, s, len); 491 d[len] = '\0'; 492 return d; 493 } 494 495 #endif /* WPA_TRACE */ 496