2000-02-18 03:38:33 +08:00
|
|
|
/* path.cc: path support.
|
|
|
|
|
2003-01-10 20:32:49 +08:00
|
|
|
Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003 Red Hat, Inc.
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
This file is part of Cygwin.
|
|
|
|
|
|
|
|
This software is a copyrighted work licensed under the terms of the
|
|
|
|
Cygwin license. Please consult the file "CYGWIN_LICENSE" for
|
|
|
|
details. */
|
|
|
|
|
|
|
|
/* This module's job is to
|
|
|
|
- convert between POSIX and Win32 style filenames,
|
|
|
|
- support the `mount' functionality,
|
|
|
|
- support symlinks for files and directories
|
|
|
|
|
|
|
|
Pathnames are handled as follows:
|
|
|
|
|
2000-09-05 11:16:28 +08:00
|
|
|
- A \ or : in a path denotes a pure windows spec.
|
2000-02-18 03:38:33 +08:00
|
|
|
- Paths beginning with // (or \\) are not translated (i.e. looked
|
|
|
|
up in the mount table) and are assumed to be UNC path names.
|
|
|
|
|
|
|
|
The goal in the above set of rules is to allow both POSIX and Win32
|
|
|
|
flavors of pathnames without either interfering. The rules are
|
|
|
|
intended to be as close to a superset of both as possible.
|
|
|
|
|
|
|
|
Note that you can have more than one path to a file. The mount
|
|
|
|
table is always prefered when translating Win32 paths to POSIX
|
|
|
|
paths. Win32 paths in mount table entries may be UNC paths or
|
|
|
|
standard Win32 paths starting with <drive-letter>:
|
|
|
|
|
|
|
|
Text vs Binary issues are not considered here in path style
|
2000-09-05 11:16:28 +08:00
|
|
|
decisions, although the appropriate flags are retrieved and
|
|
|
|
stored in various structures.
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
Removing mounted filesystem support would simplify things greatly,
|
|
|
|
but having it gives us a mechanism of treating disk that lives on a
|
|
|
|
UNIX machine as having UNIX semantics [it allows one to edit a text
|
|
|
|
file on that disk and not have cr's magically appear and perhaps
|
|
|
|
break apps running on UNIX boxes]. It also useful to be able to
|
|
|
|
layout a hierarchy without changing the underlying directories.
|
|
|
|
|
|
|
|
The semantics of mounting file systems is not intended to precisely
|
|
|
|
follow normal UNIX systems.
|
|
|
|
|
|
|
|
Each DOS drive is defined to have a current directory. Supporting
|
|
|
|
this would complicate things so for now things are defined so that
|
2000-09-05 11:16:28 +08:00
|
|
|
c: means c:\. FIXME: Is this still true?
|
2000-02-18 03:38:33 +08:00
|
|
|
*/
|
|
|
|
|
2000-08-03 00:28:18 +08:00
|
|
|
#include "winsup.h"
|
2000-02-18 03:38:33 +08:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <sys/mount.h>
|
|
|
|
#include <mntent.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <ctype.h>
|
2000-06-08 21:24:52 +08:00
|
|
|
#include <winioctl.h>
|
2001-02-22 05:49:37 +08:00
|
|
|
#include <wingdi.h>
|
|
|
|
#include <winuser.h>
|
|
|
|
#include <winnls.h>
|
|
|
|
#include <winnetwk.h>
|
2000-09-08 10:56:55 +08:00
|
|
|
#include <sys/cygwin.h>
|
|
|
|
#include <cygwin/version.h>
|
2000-08-22 11:58:47 +08:00
|
|
|
#include "cygerrno.h"
|
2001-07-27 03:22:24 +08:00
|
|
|
#include "security.h"
|
2000-08-22 13:10:20 +08:00
|
|
|
#include "fhandler.h"
|
|
|
|
#include "path.h"
|
|
|
|
#include "sync.h"
|
|
|
|
#include "sigproc.h"
|
|
|
|
#include "pinfo.h"
|
2001-04-19 05:10:15 +08:00
|
|
|
#include "dtable.h"
|
2000-09-03 12:16:35 +08:00
|
|
|
#include "cygheap.h"
|
2000-09-08 00:23:51 +08:00
|
|
|
#include "shared_info.h"
|
2000-09-08 10:56:55 +08:00
|
|
|
#include "registry.h"
|
2000-10-13 06:15:47 +08:00
|
|
|
#include <assert.h>
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-04-01 11:06:02 +08:00
|
|
|
#ifdef _MT_SAFE
|
|
|
|
#define iteration _reent_winsup ()->_iteration
|
|
|
|
#define available_drives _reent_winsup ()->available_drives
|
|
|
|
#else
|
|
|
|
static int iteration;
|
|
|
|
static DWORD available_drives;
|
|
|
|
#endif
|
|
|
|
|
2000-09-05 11:16:28 +08:00
|
|
|
static int normalize_win32_path (const char *src, char *dst);
|
2000-02-18 03:38:33 +08:00
|
|
|
static void slashify (const char *src, char *dst, int trailing_slash_p);
|
|
|
|
static void backslashify (const char *src, char *dst, int trailing_slash_p);
|
|
|
|
|
2000-04-14 06:43:48 +08:00
|
|
|
struct symlink_info
|
|
|
|
{
|
2001-04-29 07:48:28 +08:00
|
|
|
char contents[MAX_PATH + 4];
|
2000-04-14 06:43:48 +08:00
|
|
|
char *ext_here;
|
2001-04-12 03:09:53 +08:00
|
|
|
int extn;
|
2000-04-14 06:43:48 +08:00
|
|
|
unsigned pflags;
|
|
|
|
DWORD fileattr;
|
|
|
|
int is_symlink;
|
2001-04-12 03:09:53 +08:00
|
|
|
bool ext_tacked_on;
|
2000-08-22 11:58:47 +08:00
|
|
|
int error;
|
2001-12-07 13:03:32 +08:00
|
|
|
bool case_clash;
|
2001-04-30 09:46:31 +08:00
|
|
|
int check (char *path, const suffix_info *suffixes, unsigned opt);
|
|
|
|
BOOL case_check (char *path);
|
2000-04-14 06:43:48 +08:00
|
|
|
};
|
|
|
|
|
2001-04-13 05:21:37 +08:00
|
|
|
int pcheck_case = PCHECK_RELAXED; /* Determines the case check behaviour. */
|
|
|
|
|
2002-09-04 21:11:29 +08:00
|
|
|
static char shortcut_header[SHORTCUT_HDR_SIZE];
|
|
|
|
static BOOL shortcut_initalized;
|
|
|
|
|
|
|
|
static void
|
|
|
|
create_shortcut_header (void)
|
|
|
|
{
|
|
|
|
if (!shortcut_initalized)
|
|
|
|
{
|
|
|
|
shortcut_header[0] = 'L';
|
|
|
|
shortcut_header[4] = '\001';
|
|
|
|
shortcut_header[5] = '\024';
|
|
|
|
shortcut_header[6] = '\002';
|
|
|
|
shortcut_header[12] = '\300';
|
|
|
|
shortcut_header[19] = 'F';
|
|
|
|
shortcut_header[20] = '\f';
|
|
|
|
shortcut_header[60] = '\001';
|
|
|
|
shortcut_initalized = TRUE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2001-10-25 05:56:54 +08:00
|
|
|
#define CYGWIN_REGNAME (cygheap->cygwin_regname ?: CYGWIN_INFO_CYGWIN_REGISTRY_NAME)
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Determine if path prefix matches current cygdrive */
|
|
|
|
#define iscygdrive(path) \
|
2001-01-28 13:51:15 +08:00
|
|
|
(path_prefix_p (mount_table->cygdrive, (path), mount_table->cygdrive_len))
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
#define iscygdrive_device(path) \
|
2002-09-22 11:38:57 +08:00
|
|
|
(isalpha (path[mount_table->cygdrive_len]) && \
|
2003-01-09 16:22:05 +08:00
|
|
|
(path[mount_table->cygdrive_len + 1] == '/' || \
|
2001-01-28 13:51:15 +08:00
|
|
|
!path[mount_table->cygdrive_len + 1]))
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2002-05-02 12:13:48 +08:00
|
|
|
#define isproc(path) \
|
|
|
|
(path_prefix_p (proc, (path), proc_len))
|
|
|
|
|
|
|
|
#define isvirtual_dev(devn) \
|
|
|
|
(devn == FH_CYGDRIVE || devn == FH_PROC || devn == FH_REGISTRY || devn == FH_PROCESS)
|
|
|
|
|
2000-09-05 11:16:28 +08:00
|
|
|
/* Return non-zero if PATH1 is a prefix of PATH2.
|
|
|
|
Both are assumed to be of the same path style and / vs \ usage.
|
|
|
|
Neither may be "".
|
|
|
|
LEN1 = strlen (PATH1). It's passed because often it's already known.
|
|
|
|
|
|
|
|
Examples:
|
|
|
|
/foo/ is a prefix of /foo <-- may seem odd, but desired
|
|
|
|
/foo is a prefix of /foo/
|
|
|
|
/ is a prefix of /foo/bar
|
|
|
|
/ is not a prefix of foo/bar
|
|
|
|
foo/ is a prefix foo/bar
|
|
|
|
/foo is not a prefix of /foobar
|
|
|
|
*/
|
|
|
|
|
2001-06-03 10:31:16 +08:00
|
|
|
int
|
|
|
|
path_prefix_p (const char *path1, const char *path2, int len1)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
/* Handle case where PATH1 has trailing '/' and when it doesn't. */
|
2003-01-09 16:22:05 +08:00
|
|
|
if (len1 > 0 && isdirsep (path1[len1 - 1]))
|
2000-02-18 03:38:33 +08:00
|
|
|
len1--;
|
|
|
|
|
|
|
|
if (len1 == 0)
|
2003-01-09 16:22:05 +08:00
|
|
|
return isdirsep (path2[0]) && !isdirsep (path2[1]);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-04-13 05:21:37 +08:00
|
|
|
if (!pathnmatch (path1, path2, len1))
|
2000-02-18 03:38:33 +08:00
|
|
|
return 0;
|
|
|
|
|
2003-01-09 16:22:05 +08:00
|
|
|
return isdirsep (path2[len1]) || path2[len1] == 0 || path1[len1 - 1] == ':';
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2001-04-13 05:21:37 +08:00
|
|
|
/* Return non-zero if paths match in first len chars.
|
|
|
|
Check is dependent of the case sensitivity setting. */
|
|
|
|
int
|
|
|
|
pathnmatch (const char *path1, const char *path2, int len)
|
|
|
|
{
|
|
|
|
return pcheck_case == PCHECK_STRICT ? !strncmp (path1, path2, len)
|
2001-06-11 11:38:32 +08:00
|
|
|
: strncasematch (path1, path2, len);
|
2001-04-13 05:21:37 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Return non-zero if paths match. Check is dependent of the case
|
|
|
|
sensitivity setting. */
|
|
|
|
int
|
|
|
|
pathmatch (const char *path1, const char *path2)
|
|
|
|
{
|
|
|
|
return pcheck_case == PCHECK_STRICT ? !strcmp (path1, path2)
|
2001-06-11 11:38:32 +08:00
|
|
|
: strcasematch (path1, path2);
|
2001-04-13 05:21:37 +08:00
|
|
|
}
|
|
|
|
|
2001-04-29 07:48:28 +08:00
|
|
|
/* Normalize a POSIX path.
|
|
|
|
\'s are converted to /'s in the process.
|
|
|
|
All duplicate /'s, except for 2 leading /'s, are deleted.
|
|
|
|
The result is 0 for success, or an errno error value. */
|
|
|
|
|
|
|
|
#define isslash(c) ((c) == '/')
|
|
|
|
|
2002-05-02 12:13:48 +08:00
|
|
|
static int
|
2001-04-29 07:48:28 +08:00
|
|
|
normalize_posix_path (const char *src, char *dst)
|
|
|
|
{
|
|
|
|
const char *src_start = src;
|
|
|
|
char *dst_start = dst;
|
|
|
|
|
|
|
|
syscall_printf ("src %s", src);
|
2003-01-09 16:22:05 +08:00
|
|
|
|
2001-04-29 07:48:28 +08:00
|
|
|
if (isdrive (src) || strpbrk (src, "\\:"))
|
2003-01-16 09:49:14 +08:00
|
|
|
{
|
|
|
|
int err = normalize_win32_path (src, dst);
|
|
|
|
if (!err && isdrive (dst))
|
|
|
|
for (char *p = dst; (p = strchr (p, '\\')); p++)
|
|
|
|
*p = '/';
|
|
|
|
return err;
|
|
|
|
}
|
2003-01-09 16:22:05 +08:00
|
|
|
|
2001-04-29 07:48:28 +08:00
|
|
|
if (!isslash (src[0]))
|
|
|
|
{
|
|
|
|
if (!cygheap->cwd.get (dst))
|
|
|
|
return get_errno ();
|
|
|
|
dst = strchr (dst, '\0');
|
|
|
|
if (*src == '.')
|
|
|
|
{
|
|
|
|
if (dst == dst_start + 1 && *dst_start == '/')
|
|
|
|
--dst;
|
|
|
|
goto sawdot;
|
|
|
|
}
|
|
|
|
if (dst > dst_start && !isslash (dst[-1]))
|
|
|
|
*dst++ = '/';
|
|
|
|
}
|
|
|
|
/* Two leading /'s? If so, preserve them. */
|
|
|
|
else if (isslash (src[1]))
|
|
|
|
{
|
|
|
|
*dst++ = '/';
|
|
|
|
*dst++ = '/';
|
|
|
|
src += 2;
|
|
|
|
if (isslash (*src))
|
|
|
|
{ /* Starts with three or more slashes - reset. */
|
|
|
|
dst = dst_start;
|
|
|
|
*dst++ = '/';
|
|
|
|
src = src_start + 1;
|
|
|
|
}
|
2001-10-08 05:16:36 +08:00
|
|
|
else if (src[0] == '.' && isslash (src[1]))
|
|
|
|
{
|
|
|
|
*dst++ = '.';
|
|
|
|
*dst++ = '/';
|
|
|
|
src += 2;
|
|
|
|
}
|
2001-04-29 07:48:28 +08:00
|
|
|
}
|
|
|
|
else
|
|
|
|
*dst = '\0';
|
|
|
|
|
|
|
|
while (*src)
|
|
|
|
{
|
|
|
|
/* Strip runs of /'s. */
|
|
|
|
if (!isslash (*src))
|
|
|
|
*dst++ = *src++;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
while (*++src)
|
|
|
|
{
|
|
|
|
if (isslash (*src))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (*src != '.')
|
|
|
|
break;
|
|
|
|
|
|
|
|
sawdot:
|
|
|
|
if (src[1] != '.')
|
|
|
|
{
|
|
|
|
if (!src[1])
|
|
|
|
{
|
|
|
|
if (dst == dst_start)
|
|
|
|
*dst++ = '/';
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
if (!isslash (src[1]))
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
else if (src[2] && !isslash (src[2]))
|
2002-03-07 09:31:08 +08:00
|
|
|
{
|
|
|
|
if (src[2] == '.')
|
|
|
|
return ENOENT;
|
|
|
|
break;
|
|
|
|
}
|
2001-06-11 11:38:32 +08:00
|
|
|
else
|
2001-06-04 09:28:09 +08:00
|
|
|
{
|
|
|
|
while (dst > dst_start && !isslash (*--dst))
|
|
|
|
continue;
|
|
|
|
src++;
|
|
|
|
}
|
2001-04-29 07:48:28 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
*dst++ = '/';
|
|
|
|
}
|
|
|
|
if ((dst - dst_start) >= MAX_PATH)
|
|
|
|
{
|
|
|
|
debug_printf ("ENAMETOOLONG = normalize_posix_path (%s)", src);
|
|
|
|
return ENAMETOOLONG;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
*dst = '\0';
|
|
|
|
if (--dst > dst_start && isslash (*dst))
|
|
|
|
*dst = '\0';
|
|
|
|
|
|
|
|
debug_printf ("%s = normalize_posix_path (%s)", dst_start, src_start);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2001-04-15 22:00:45 +08:00
|
|
|
inline void
|
2001-04-18 07:12:11 +08:00
|
|
|
path_conv::add_ext_from_sym (symlink_info &sym)
|
2001-04-15 22:00:45 +08:00
|
|
|
{
|
|
|
|
if (sym.ext_here && *sym.ext_here)
|
|
|
|
{
|
|
|
|
known_suffix = path + sym.extn;
|
|
|
|
if (sym.ext_tacked_on)
|
2001-06-04 09:28:09 +08:00
|
|
|
strcpy (known_suffix, sym.ext_here);
|
2001-04-15 22:00:45 +08:00
|
|
|
}
|
|
|
|
}
|
2001-04-13 15:54:20 +08:00
|
|
|
|
2001-05-01 10:03:10 +08:00
|
|
|
static void __stdcall mkrelpath (char *dst) __attribute__ ((regparm (2)));
|
|
|
|
static void __stdcall
|
|
|
|
mkrelpath (char *path)
|
|
|
|
{
|
|
|
|
char cwd_win32[MAX_PATH];
|
|
|
|
if (!cygheap->cwd.get (cwd_win32, 0))
|
|
|
|
return;
|
|
|
|
|
|
|
|
unsigned cwdlen = strlen (cwd_win32);
|
|
|
|
if (!path_prefix_p (cwd_win32, path, cwdlen))
|
|
|
|
return;
|
|
|
|
|
|
|
|
size_t n = strlen (path);
|
|
|
|
if (n < cwdlen)
|
|
|
|
return;
|
|
|
|
|
|
|
|
char *tail = path;
|
|
|
|
if (n == cwdlen)
|
|
|
|
tail += cwdlen;
|
|
|
|
else
|
|
|
|
tail += isdirsep (cwd_win32[cwdlen - 1]) ? cwdlen : cwdlen + 1;
|
|
|
|
|
|
|
|
memmove (path, tail, strlen (tail) + 1);
|
|
|
|
if (!*path)
|
|
|
|
strcpy (path, ".");
|
|
|
|
}
|
|
|
|
|
2002-05-12 11:08:59 +08:00
|
|
|
bool
|
|
|
|
fs_info::update (const char *win32_path)
|
2001-06-05 18:45:52 +08:00
|
|
|
{
|
|
|
|
char tmp_buf [MAX_PATH];
|
|
|
|
strncpy (tmp_buf, win32_path, MAX_PATH);
|
|
|
|
|
2001-06-11 11:38:32 +08:00
|
|
|
if (!rootdir (tmp_buf))
|
2001-06-05 18:45:52 +08:00
|
|
|
{
|
|
|
|
debug_printf ("Cannot get root component of path %s", win32_path);
|
2002-05-12 11:08:59 +08:00
|
|
|
name [0] = '\0';
|
|
|
|
sym_opt = flags = serial = 0;
|
|
|
|
return false;
|
2001-06-05 18:45:52 +08:00
|
|
|
}
|
|
|
|
|
2002-05-12 11:08:59 +08:00
|
|
|
if (strcmp (tmp_buf, root_dir) == 0)
|
|
|
|
return 1;
|
2001-06-05 18:45:52 +08:00
|
|
|
|
2002-05-12 11:08:59 +08:00
|
|
|
strncpy (root_dir, tmp_buf, MAX_PATH);
|
|
|
|
drive_type = GetDriveType (root_dir);
|
|
|
|
if (drive_type == DRIVE_REMOTE || (drive_type == DRIVE_UNKNOWN && (root_dir[0] == '\\' && root_dir[1] == '\\')))
|
|
|
|
is_remote_drive = 1;
|
|
|
|
else
|
|
|
|
is_remote_drive = 0;
|
|
|
|
|
|
|
|
if (!GetVolumeInformation (root_dir, NULL, 0, &serial, NULL, &flags,
|
|
|
|
name, sizeof (name)))
|
|
|
|
{
|
|
|
|
debug_printf ("Cannot get volume information (%s), %E", root_dir);
|
|
|
|
name [0] = '\0';
|
|
|
|
sym_opt = flags = serial = 0;
|
|
|
|
return false;
|
2001-06-05 18:45:52 +08:00
|
|
|
}
|
2002-05-12 11:08:59 +08:00
|
|
|
/* FIXME: Samba by default returns "NTFS" in file system name, but
|
|
|
|
* doesn't support Extended Attributes. If there's some fast way to
|
|
|
|
* distinguish between samba and real ntfs, it should be implemented
|
|
|
|
* here.
|
|
|
|
*/
|
|
|
|
sym_opt = (!is_remote_drive && strcmp (name, "NTFS") == 0) ? PC_CHECK_EA : 0;
|
|
|
|
|
|
|
|
return true;
|
2001-06-05 18:45:52 +08:00
|
|
|
}
|
|
|
|
|
2002-05-24 13:44:10 +08:00
|
|
|
char *
|
|
|
|
path_conv::return_and_clear_normalized_path ()
|
2002-05-02 12:13:48 +08:00
|
|
|
{
|
2002-05-24 13:44:10 +08:00
|
|
|
char *s = normalized_path;
|
|
|
|
normalized_path = NULL;
|
|
|
|
return s;
|
2002-05-02 12:13:48 +08:00
|
|
|
}
|
|
|
|
|
2002-05-28 09:55:40 +08:00
|
|
|
void
|
|
|
|
path_conv::fillin (HANDLE h)
|
|
|
|
{
|
|
|
|
BY_HANDLE_FILE_INFORMATION local;
|
|
|
|
if (!GetFileInformationByHandle (h, &local))
|
|
|
|
{
|
|
|
|
fileattr = INVALID_FILE_ATTRIBUTES;
|
|
|
|
fs.serial = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
fileattr = local.dwFileAttributes;
|
|
|
|
fs.serial = local.dwVolumeSerialNumber;
|
|
|
|
}
|
|
|
|
fs.drive_type = DRIVE_UNKNOWN;
|
2002-09-06 12:39:49 +08:00
|
|
|
}
|
2002-05-28 09:55:40 +08:00
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Convert an arbitrary path SRC to a pure Win32 path, suitable for
|
|
|
|
passing to Win32 API routines.
|
|
|
|
|
|
|
|
If an error occurs, `error' is set to the errno value.
|
|
|
|
Otherwise it is set to 0.
|
|
|
|
|
|
|
|
follow_mode values:
|
|
|
|
SYMLINK_FOLLOW - convert to PATH symlink points to
|
|
|
|
SYMLINK_NOFOLLOW - convert to PATH of symlink itself
|
|
|
|
SYMLINK_IGNORE - do not check PATH for symlinks
|
|
|
|
SYMLINK_CONTENTS - just return symlink contents
|
|
|
|
*/
|
|
|
|
|
2000-04-26 13:13:32 +08:00
|
|
|
void
|
2000-07-18 03:18:21 +08:00
|
|
|
path_conv::check (const char *src, unsigned opt,
|
|
|
|
const suffix_info *suffixes)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
/* This array is used when expanding symlinks. It is MAX_PATH * 2
|
|
|
|
in length so that we can hold the expanded symlink plus a
|
|
|
|
trailer. */
|
2001-04-29 07:48:28 +08:00
|
|
|
char path_copy[MAX_PATH + 3];
|
|
|
|
char tmp_buf[2 * MAX_PATH + 3];
|
2000-04-14 06:43:48 +08:00
|
|
|
symlink_info sym;
|
2000-10-07 03:11:14 +08:00
|
|
|
bool need_directory = 0;
|
2001-01-27 23:34:38 +08:00
|
|
|
bool saw_symlinks = 0;
|
2001-05-01 10:03:10 +08:00
|
|
|
int is_relpath;
|
2002-05-24 04:01:46 +08:00
|
|
|
char *tail;
|
2001-06-28 10:19:57 +08:00
|
|
|
sigframe thisframe (mainthread);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2000-10-23 11:35:50 +08:00
|
|
|
#if 0
|
|
|
|
static path_conv last_path_conv;
|
|
|
|
static char last_src[MAX_PATH + 1];
|
|
|
|
|
|
|
|
if (*last_src && strcmp (last_src, src) == 0)
|
|
|
|
{
|
|
|
|
*this = last_path_conv;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2001-04-21 00:40:04 +08:00
|
|
|
int loop = 0;
|
|
|
|
path_flags = 0;
|
|
|
|
known_suffix = NULL;
|
2002-01-15 04:39:59 +08:00
|
|
|
fileattr = INVALID_FILE_ATTRIBUTES;
|
2001-12-07 13:03:32 +08:00
|
|
|
case_clash = false;
|
2001-04-21 00:40:04 +08:00
|
|
|
devn = unit = 0;
|
2002-05-12 11:08:59 +08:00
|
|
|
fs.root_dir[0] = '\0';
|
|
|
|
fs.name[0] = '\0';
|
|
|
|
fs.flags = fs.serial = 0;
|
|
|
|
fs.sym_opt = 0;
|
|
|
|
fs.drive_type = 0;
|
|
|
|
fs.is_remote_drive = 0;
|
2002-05-02 12:13:48 +08:00
|
|
|
normalized_path = NULL;
|
2001-04-21 00:40:04 +08:00
|
|
|
|
2000-07-18 03:18:21 +08:00
|
|
|
if (!(opt & PC_NULLEMPTY))
|
|
|
|
error = 0;
|
2001-06-28 10:19:57 +08:00
|
|
|
else if ((error = check_null_empty_str (src)))
|
2000-02-18 03:38:33 +08:00
|
|
|
return;
|
|
|
|
/* This loop handles symlink expansion. */
|
|
|
|
for (;;)
|
|
|
|
{
|
|
|
|
MALLOC_CHECK;
|
2000-10-13 06:15:47 +08:00
|
|
|
assert (src);
|
2001-06-16 04:35:51 +08:00
|
|
|
|
|
|
|
char *p = strrchr (src, '\0');
|
2001-05-08 23:16:49 +08:00
|
|
|
/* Detect if the user was looking for a directory. We have to strip the
|
|
|
|
trailing slash initially and add it back on at the end due to Windows
|
|
|
|
brain damage. */
|
2001-06-16 04:35:51 +08:00
|
|
|
if (--p > src)
|
2000-09-19 11:22:45 +08:00
|
|
|
{
|
2001-06-16 04:35:51 +08:00
|
|
|
if (isdirsep (*p))
|
|
|
|
need_directory = 1;
|
|
|
|
else if (--p > src && p[1] == '.' && isdirsep (*p))
|
2000-10-07 03:11:14 +08:00
|
|
|
need_directory = 1;
|
2000-09-19 11:22:45 +08:00
|
|
|
}
|
2001-04-29 07:48:28 +08:00
|
|
|
|
2001-05-01 10:03:10 +08:00
|
|
|
is_relpath = !isabspath (src);
|
2001-04-29 07:48:28 +08:00
|
|
|
error = normalize_posix_path (src, path_copy);
|
2000-08-22 11:58:47 +08:00
|
|
|
if (error)
|
2000-02-18 03:38:33 +08:00
|
|
|
return;
|
|
|
|
|
2002-05-24 04:01:46 +08:00
|
|
|
tail = strchr (path_copy, '\0'); // Point to end of copy
|
2001-04-29 07:48:28 +08:00
|
|
|
char *path_end = tail;
|
|
|
|
tail[1] = '\0';
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
/* Scan path_copy from right to left looking either for a symlink
|
|
|
|
or an actual existing file. If an existing file is found, just
|
|
|
|
return. If a symlink is found exit the for loop.
|
|
|
|
Also: be careful to preserve the errno returned from
|
2000-04-14 06:43:48 +08:00
|
|
|
symlink.check as the caller may need it. */
|
2000-02-18 03:38:33 +08:00
|
|
|
/* FIXME: Do we have to worry about multiple \'s here? */
|
|
|
|
int component = 0; // Number of translated components
|
2000-04-14 06:43:48 +08:00
|
|
|
sym.contents[0] = '\0';
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
for (;;)
|
|
|
|
{
|
|
|
|
const suffix_info *suff;
|
2001-04-29 07:48:28 +08:00
|
|
|
char pathbuf[MAX_PATH];
|
2001-05-01 10:03:10 +08:00
|
|
|
char *full_path;
|
2000-08-22 11:58:47 +08:00
|
|
|
|
2000-04-14 06:43:48 +08:00
|
|
|
/* Don't allow symlink.check to set anything in the path_conv
|
2000-02-18 03:38:33 +08:00
|
|
|
class if we're working on an inner component of the path */
|
|
|
|
if (component)
|
|
|
|
{
|
2001-02-22 22:51:16 +08:00
|
|
|
suff = NULL;
|
2000-04-14 06:43:48 +08:00
|
|
|
sym.pflags = 0;
|
2001-05-01 10:03:10 +08:00
|
|
|
full_path = pathbuf;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
suff = suffixes;
|
2000-10-09 10:53:44 +08:00
|
|
|
sym.pflags = path_flags;
|
2001-05-01 10:03:10 +08:00
|
|
|
full_path = this->path;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2001-05-08 23:16:49 +08:00
|
|
|
/* Convert to native path spec sans symbolic link info. */
|
2001-05-01 10:03:10 +08:00
|
|
|
error = mount_table->conv_to_win32_path (path_copy, full_path, devn,
|
2001-06-03 10:31:16 +08:00
|
|
|
unit, &sym.pflags, 1);
|
|
|
|
|
|
|
|
if (error)
|
|
|
|
return;
|
2001-04-30 09:46:31 +08:00
|
|
|
|
2001-12-07 13:03:32 +08:00
|
|
|
if (devn == FH_CYGDRIVE)
|
|
|
|
{
|
2001-12-08 09:27:10 +08:00
|
|
|
if (!component)
|
|
|
|
fileattr = FILE_ATTRIBUTE_DIRECTORY;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
devn = FH_BAD;
|
|
|
|
fileattr = GetFileAttributes (this->path);
|
|
|
|
}
|
2001-12-07 13:03:32 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2002-05-28 09:55:40 +08:00
|
|
|
else if (isvirtual_dev (devn))
|
|
|
|
{
|
2002-05-12 09:41:17 +08:00
|
|
|
/* FIXME: Calling build_fhandler here is not the right way to handle this. */
|
2002-05-28 09:55:40 +08:00
|
|
|
fhandler_virtual *fh =
|
|
|
|
(fhandler_virtual *) cygheap->fdtab.build_fhandler (-1, devn, (const char *) path_copy, NULL, unit);
|
|
|
|
int file_type = fh->exists ();
|
|
|
|
switch (file_type)
|
|
|
|
{
|
|
|
|
case 1:
|
|
|
|
case 2:
|
|
|
|
fileattr = FILE_ATTRIBUTE_DIRECTORY;
|
2002-05-02 12:13:48 +08:00
|
|
|
break;
|
2002-05-28 09:55:40 +08:00
|
|
|
case -1:
|
|
|
|
fileattr = 0;
|
2002-05-31 11:11:21 +08:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
fileattr = INVALID_FILE_ATTRIBUTES;
|
|
|
|
break;
|
2002-05-28 09:55:40 +08:00
|
|
|
}
|
|
|
|
delete fh;
|
2002-05-02 12:13:48 +08:00
|
|
|
goto out;
|
2002-05-28 09:55:40 +08:00
|
|
|
}
|
2001-05-08 23:16:49 +08:00
|
|
|
/* devn should not be a device. If it is, then stop parsing now. */
|
2001-12-07 13:03:32 +08:00
|
|
|
else if (devn != FH_BAD)
|
2001-04-30 09:46:31 +08:00
|
|
|
{
|
2001-12-07 13:03:32 +08:00
|
|
|
fileattr = 0;
|
2002-07-04 02:02:54 +08:00
|
|
|
path_flags = sym.pflags;
|
2001-12-07 13:03:32 +08:00
|
|
|
if (component)
|
2001-10-05 08:52:41 +08:00
|
|
|
{
|
2001-12-07 13:03:32 +08:00
|
|
|
error = ENOTDIR;
|
|
|
|
return;
|
2001-10-05 08:52:41 +08:00
|
|
|
}
|
2001-04-30 09:46:31 +08:00
|
|
|
goto out; /* Found a device. Stop parsing. */
|
|
|
|
}
|
|
|
|
|
2002-05-12 11:08:59 +08:00
|
|
|
if (!fs.update (full_path))
|
|
|
|
fs.root_dir[0] = '\0';
|
2001-10-05 08:17:57 +08:00
|
|
|
|
2001-04-30 09:46:31 +08:00
|
|
|
/* Eat trailing slashes */
|
2001-05-01 10:03:10 +08:00
|
|
|
char *dostail = strchr (full_path, '\0');
|
2001-04-30 09:46:31 +08:00
|
|
|
|
2001-12-07 13:03:32 +08:00
|
|
|
/* If path is only a drivename, Windows interprets it as the
|
|
|
|
current working directory on this drive instead of the root
|
|
|
|
dir which is what we want. So we need the trailing backslash
|
|
|
|
in this case. */
|
2001-05-01 10:03:10 +08:00
|
|
|
while (dostail > full_path + 3 && (*--dostail == '\\'))
|
2001-04-30 09:46:31 +08:00
|
|
|
*tail = '\0';
|
|
|
|
|
2001-05-01 10:03:10 +08:00
|
|
|
if (full_path[0] && full_path[1] == ':' && full_path[2] == '\0')
|
2001-05-08 23:16:49 +08:00
|
|
|
{
|
|
|
|
full_path[2] = '\\';
|
|
|
|
full_path[3] = '\0';
|
|
|
|
}
|
2001-04-30 09:46:31 +08:00
|
|
|
|
|
|
|
if ((opt & PC_SYM_IGNORE) && pcheck_case == PCHECK_RELAXED)
|
|
|
|
{
|
2001-12-08 09:27:10 +08:00
|
|
|
fileattr = GetFileAttributes (this->path);
|
2001-04-30 09:46:31 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2002-05-12 11:08:59 +08:00
|
|
|
int len = sym.check (full_path, suff, opt | fs.sym_opt);
|
2000-04-14 06:43:48 +08:00
|
|
|
|
2001-04-13 05:21:37 +08:00
|
|
|
if (sym.case_clash)
|
|
|
|
{
|
2001-04-17 19:47:37 +08:00
|
|
|
if (pcheck_case == PCHECK_STRICT)
|
2001-06-04 09:28:09 +08:00
|
|
|
{
|
2001-04-17 19:47:37 +08:00
|
|
|
case_clash = TRUE;
|
|
|
|
error = ENOENT;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
/* If pcheck_case==PCHECK_ADJUST the case_clash is remembered
|
2001-06-04 09:28:09 +08:00
|
|
|
if the last component is concerned. This allows functions
|
2001-04-17 19:47:37 +08:00
|
|
|
which shall create files to avoid overriding already existing
|
|
|
|
files with another case. */
|
|
|
|
if (!component)
|
2001-06-04 09:28:09 +08:00
|
|
|
case_clash = TRUE;
|
2001-04-13 05:21:37 +08:00
|
|
|
}
|
|
|
|
if (!(opt & PC_SYM_IGNORE))
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-04-13 05:21:37 +08:00
|
|
|
if (!component)
|
2002-07-24 13:37:47 +08:00
|
|
|
{
|
|
|
|
fileattr = sym.fileattr;
|
|
|
|
path_flags = sym.pflags;
|
|
|
|
}
|
2001-04-13 05:21:37 +08:00
|
|
|
|
|
|
|
/* If symlink.check found an existing non-symlink file, then
|
|
|
|
it sets the appropriate flag. It also sets any suffix found
|
|
|
|
into `ext_here'. */
|
2002-01-15 04:39:59 +08:00
|
|
|
if (!sym.is_symlink && sym.fileattr != INVALID_FILE_ATTRIBUTES)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-04-13 05:21:37 +08:00
|
|
|
error = sym.error;
|
|
|
|
if (component == 0)
|
2002-07-24 13:37:47 +08:00
|
|
|
add_ext_from_sym (sym);
|
2001-04-13 05:21:37 +08:00
|
|
|
if (pcheck_case == PCHECK_RELAXED)
|
|
|
|
goto out; // file found
|
|
|
|
/* Avoid further symlink evaluation. Only case checks are
|
|
|
|
done now. */
|
|
|
|
opt |= PC_SYM_IGNORE;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2001-04-13 05:21:37 +08:00
|
|
|
/* Found a symlink if len > 0. If component == 0, then the
|
|
|
|
src path itself was a symlink. If !follow_mode then
|
|
|
|
we're done. Otherwise we have to insert the path found
|
|
|
|
into the full path that we are building and perform all of
|
|
|
|
these operations again on the newly derived path. */
|
|
|
|
else if (len > 0)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-04-13 05:21:37 +08:00
|
|
|
saw_symlinks = 1;
|
|
|
|
if (component == 0 && !need_directory && !(opt & PC_SYM_FOLLOW))
|
|
|
|
{
|
|
|
|
set_symlink (); // last component of path is a symlink.
|
|
|
|
if (opt & PC_SYM_CONTENTS)
|
2001-06-04 09:28:09 +08:00
|
|
|
{
|
2001-04-13 05:21:37 +08:00
|
|
|
strcpy (path, sym.contents);
|
|
|
|
goto out;
|
|
|
|
}
|
2001-04-13 15:54:20 +08:00
|
|
|
add_ext_from_sym (sym);
|
2001-04-13 05:21:37 +08:00
|
|
|
if (pcheck_case == PCHECK_RELAXED)
|
2001-06-04 09:28:09 +08:00
|
|
|
goto out;
|
2001-04-13 05:21:37 +08:00
|
|
|
/* Avoid further symlink evaluation. Only case checks are
|
2001-06-04 09:28:09 +08:00
|
|
|
done now. */
|
2001-04-13 05:21:37 +08:00
|
|
|
opt |= PC_SYM_IGNORE;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
break;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2001-04-13 05:21:37 +08:00
|
|
|
/* No existing file found. */
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-05-08 23:16:49 +08:00
|
|
|
/* Find the "tail" of the path, e.g. in '/for/bar/baz',
|
|
|
|
/baz is the tail. */
|
2001-04-29 07:48:28 +08:00
|
|
|
char *newtail = strrchr (path_copy, '/');
|
|
|
|
if (tail != path_end)
|
|
|
|
*tail = '/';
|
|
|
|
|
2001-05-08 23:16:49 +08:00
|
|
|
/* Exit loop if there is no tail or we are at the
|
|
|
|
beginning of a UNC path */
|
2001-05-01 00:52:53 +08:00
|
|
|
if (!newtail || newtail == path_copy || (newtail == path_copy + 1 && newtail[-1] == '/'))
|
2000-08-22 11:58:47 +08:00
|
|
|
goto out; // all done
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-04-29 07:48:28 +08:00
|
|
|
tail = newtail;
|
|
|
|
|
2001-01-27 23:34:38 +08:00
|
|
|
/* Haven't found an existing pathname component yet.
|
2000-02-18 03:38:33 +08:00
|
|
|
Pinch off the tail and try again. */
|
|
|
|
*tail = '\0';
|
|
|
|
component++;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Arrive here if above loop detected a symlink. */
|
|
|
|
if (++loop > MAX_LINK_DEPTH)
|
|
|
|
{
|
|
|
|
error = ELOOP; // Eep.
|
|
|
|
return;
|
|
|
|
}
|
2001-04-29 07:48:28 +08:00
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
MALLOC_CHECK;
|
|
|
|
|
2001-05-08 23:16:49 +08:00
|
|
|
/* The tail is pointing at a null pointer. Increment it and get the length.
|
|
|
|
If the tail was empty then this increment will end up pointing to the extra
|
|
|
|
\0 added to path_copy above. */
|
2001-05-01 00:52:53 +08:00
|
|
|
int taillen = strlen (++tail);
|
2000-04-14 06:43:48 +08:00
|
|
|
int buflen = strlen (sym.contents);
|
2000-02-18 03:38:33 +08:00
|
|
|
if (buflen + taillen > MAX_PATH)
|
|
|
|
{
|
|
|
|
error = ENAMETOOLONG;
|
|
|
|
strcpy (path, "::ENAMETOOLONG::");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2001-05-08 23:16:49 +08:00
|
|
|
/* Strip off current directory component since this is the part that refers
|
|
|
|
to the symbolic link. */
|
2001-04-29 07:48:28 +08:00
|
|
|
if ((p = strrchr (path_copy, '/')) == NULL)
|
|
|
|
p = path_copy;
|
2001-08-29 12:43:19 +08:00
|
|
|
else if (p == path_copy)
|
|
|
|
p++;
|
2000-02-18 03:38:33 +08:00
|
|
|
*p = '\0';
|
|
|
|
|
2001-04-29 07:48:28 +08:00
|
|
|
char *headptr;
|
2000-04-14 06:43:48 +08:00
|
|
|
if (isabspath (sym.contents))
|
2001-05-08 23:16:49 +08:00
|
|
|
headptr = tmp_buf; /* absolute path */
|
2000-02-18 03:38:33 +08:00
|
|
|
else
|
|
|
|
{
|
2001-05-08 23:16:49 +08:00
|
|
|
/* Copy the first part of the path and point to the end. */
|
2001-04-29 07:48:28 +08:00
|
|
|
strcpy (tmp_buf, path_copy);
|
|
|
|
headptr = strchr (tmp_buf, '\0');
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2001-04-29 07:48:28 +08:00
|
|
|
|
2001-05-08 23:16:49 +08:00
|
|
|
/* See if we need to separate first part + symlink contents with a / */
|
2001-04-29 07:48:28 +08:00
|
|
|
if (headptr > tmp_buf && headptr[-1] != '/')
|
|
|
|
*headptr++ = '/';
|
2001-06-11 11:38:32 +08:00
|
|
|
|
2001-05-08 23:16:49 +08:00
|
|
|
/* Copy the symlink contents to the end of tmp_buf.
|
|
|
|
Convert slashes. FIXME? */
|
2001-04-29 07:48:28 +08:00
|
|
|
for (p = sym.contents; *p; p++)
|
|
|
|
*headptr++ = *p == '\\' ? '/' : *p;
|
2001-05-08 23:16:49 +08:00
|
|
|
|
|
|
|
/* Copy any tail component */
|
2001-05-01 00:52:53 +08:00
|
|
|
if (tail >= path_end)
|
2001-04-29 07:48:28 +08:00
|
|
|
*headptr = '\0';
|
|
|
|
else
|
|
|
|
{
|
|
|
|
*headptr++ = '/';
|
|
|
|
strcpy (headptr, tail);
|
|
|
|
}
|
|
|
|
|
2001-05-08 23:16:49 +08:00
|
|
|
/* Now evaluate everything all over again. */
|
2001-04-29 07:48:28 +08:00
|
|
|
src = tmp_buf;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2000-04-13 06:50:08 +08:00
|
|
|
|
2001-04-13 15:54:20 +08:00
|
|
|
if (!(opt & PC_SYM_CONTENTS))
|
|
|
|
add_ext_from_sym (sym);
|
2000-04-13 06:50:08 +08:00
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
out:
|
2002-05-02 12:13:48 +08:00
|
|
|
if (opt & PC_POSIX)
|
2002-05-23 06:09:58 +08:00
|
|
|
{
|
2002-05-24 04:01:46 +08:00
|
|
|
if (tail[1] != '\0')
|
|
|
|
*tail = '/';
|
2002-05-23 06:09:58 +08:00
|
|
|
normalized_path = cstrdup (path_copy);
|
|
|
|
}
|
2000-10-07 03:11:14 +08:00
|
|
|
/* Deal with Windows stupidity which considers filename\. to be valid
|
|
|
|
even when "filename" is not a directory. */
|
|
|
|
if (!need_directory || error)
|
|
|
|
/* nothing to do */;
|
|
|
|
else if (fileattr & FILE_ATTRIBUTE_DIRECTORY)
|
|
|
|
path_flags &= ~PATH_SYMLINK;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
debug_printf ("%s is a non-directory", path);
|
|
|
|
error = ENOTDIR;
|
|
|
|
return;
|
|
|
|
}
|
2001-04-13 05:21:37 +08:00
|
|
|
|
2001-10-05 08:17:57 +08:00
|
|
|
if (devn == FH_BAD)
|
2000-03-17 03:35:18 +08:00
|
|
|
{
|
2002-05-12 11:08:59 +08:00
|
|
|
if (!fs.update (path))
|
2001-10-05 08:17:57 +08:00
|
|
|
{
|
2002-05-12 11:08:59 +08:00
|
|
|
fs.root_dir[0] = '\0';
|
2001-12-07 13:03:32 +08:00
|
|
|
set_has_acls (false);
|
|
|
|
set_has_buggy_open (false);
|
2001-10-05 08:17:57 +08:00
|
|
|
}
|
2000-12-20 03:52:57 +08:00
|
|
|
else
|
2001-10-05 08:17:57 +08:00
|
|
|
{
|
|
|
|
set_isdisk ();
|
|
|
|
debug_printf ("root_dir(%s), this->path(%s), set_has_acls(%d)",
|
2002-05-12 11:08:59 +08:00
|
|
|
fs.root_dir, this->path, fs.flags & FS_PERSISTENT_ACLS);
|
|
|
|
if (!allow_smbntsec && fs.is_remote_drive)
|
2001-12-07 13:03:32 +08:00
|
|
|
set_has_acls (false);
|
2001-10-05 08:17:57 +08:00
|
|
|
else
|
2002-05-12 11:08:59 +08:00
|
|
|
set_has_acls (fs.flags & FS_PERSISTENT_ACLS);
|
2001-10-05 08:17:57 +08:00
|
|
|
/* Known file systems with buggy open calls. Further explanation
|
|
|
|
in fhandler.cc (fhandler_disk_file::open). */
|
2002-05-12 11:08:59 +08:00
|
|
|
set_has_buggy_open (strcmp (fs.name, "SUNWNFS") == 0);
|
2001-10-05 08:17:57 +08:00
|
|
|
}
|
2000-03-17 03:35:18 +08:00
|
|
|
}
|
2001-10-14 01:23:35 +08:00
|
|
|
#if 0
|
|
|
|
if (issocket ())
|
|
|
|
devn = FH_SOCKET;
|
|
|
|
#endif
|
2000-10-23 11:35:50 +08:00
|
|
|
|
2001-05-01 10:03:10 +08:00
|
|
|
if (!(opt & PC_FULL))
|
|
|
|
{
|
|
|
|
if (is_relpath)
|
|
|
|
mkrelpath (this->path);
|
|
|
|
if (need_directory)
|
|
|
|
{
|
2002-09-30 10:51:22 +08:00
|
|
|
size_t n = strlen (this->path);
|
2001-05-01 10:03:10 +08:00
|
|
|
/* Do not add trailing \ to UNC device names like \\.\a: */
|
|
|
|
if (this->path[n - 1] != '\\' &&
|
|
|
|
(strncmp (this->path, "\\\\.\\", 4) != 0 ||
|
|
|
|
!strncasematch (this->path + 4, "unc\\", 4)))
|
|
|
|
{
|
|
|
|
this->path[n] = '\\';
|
|
|
|
this->path[n + 1] = '\0';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2001-01-27 23:34:38 +08:00
|
|
|
if (saw_symlinks)
|
|
|
|
set_has_symlinks ();
|
|
|
|
|
2002-06-05 09:42:28 +08:00
|
|
|
if (!error && !isdir () && !(path_flags & PATH_ALL_EXEC))
|
2001-03-05 14:28:25 +08:00
|
|
|
{
|
|
|
|
const char *p = strchr (path, '\0') - 4;
|
|
|
|
if (p >= path &&
|
|
|
|
(strcasematch (".exe", p) ||
|
|
|
|
strcasematch (".bat", p) ||
|
|
|
|
strcasematch (".com", p)))
|
|
|
|
path_flags |= PATH_EXEC;
|
|
|
|
}
|
|
|
|
|
2000-10-23 11:35:50 +08:00
|
|
|
#if 0
|
|
|
|
if (!error)
|
|
|
|
{
|
|
|
|
last_path_conv = *this;
|
|
|
|
strcpy (last_src, src);
|
|
|
|
}
|
|
|
|
#endif
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static __inline int
|
|
|
|
digits (const char *name)
|
|
|
|
{
|
|
|
|
char *p;
|
2002-09-22 11:38:57 +08:00
|
|
|
int n = strtol (name, &p, 10);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
return p > name && !*p ? n : -1;
|
|
|
|
}
|
|
|
|
|
2001-09-06 13:17:22 +08:00
|
|
|
const char *windows_device_names[] NO_COPY =
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
NULL,
|
|
|
|
"\\dev\\console",
|
|
|
|
"conin",
|
|
|
|
"conout",
|
|
|
|
"\\dev\\ttym",
|
|
|
|
"\\dev\\tty%d",
|
|
|
|
"\\dev\\ptym",
|
|
|
|
"\\\\.\\com%d",
|
|
|
|
"\\dev\\pipe",
|
|
|
|
"\\dev\\piper",
|
|
|
|
"\\dev\\pipew",
|
|
|
|
"\\dev\\socket",
|
|
|
|
"\\dev\\windows",
|
2001-06-11 11:38:32 +08:00
|
|
|
|
2001-04-18 00:52:09 +08:00
|
|
|
NULL, NULL, NULL,
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
"\\dev\\disk",
|
|
|
|
"\\dev\\fd%d",
|
|
|
|
"\\dev\\st%d",
|
|
|
|
"nul",
|
|
|
|
"\\dev\\zero",
|
2000-05-03 23:39:10 +08:00
|
|
|
"\\dev\\%srandom",
|
2000-10-01 09:02:40 +08:00
|
|
|
"\\dev\\mem",
|
2000-10-17 09:46:26 +08:00
|
|
|
"\\dev\\clipboard",
|
2001-04-18 00:16:27 +08:00
|
|
|
"\\dev\\dsp"
|
2000-02-18 03:38:33 +08:00
|
|
|
};
|
|
|
|
|
2001-10-04 10:34:20 +08:00
|
|
|
#define deveq(s) (strcasematch (name, (s)))
|
|
|
|
#define deveqn(s, n) (strncasematch (name, (s), (n)))
|
|
|
|
#define wdeveq(s) (strcasematch (w32_path, (s)))
|
|
|
|
#define wdeveqn(s, n) (strncasematch (w32_path, (s), (n)))
|
|
|
|
#define udeveq(s) (strcasematch (unix_path, (s)))
|
|
|
|
#define udeveqn(s, n) (strncasematch (unix_path, (s), (n)))
|
|
|
|
|
|
|
|
static int __stdcall
|
|
|
|
get_devn (const char *name, int &unit)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-10-04 10:34:20 +08:00
|
|
|
int devn = FH_BAD;
|
|
|
|
name += 5;
|
|
|
|
if (deveq ("tty"))
|
|
|
|
{
|
|
|
|
if (real_tty_attached (myself))
|
|
|
|
{
|
|
|
|
unit = myself->ctty;
|
|
|
|
devn = FH_TTYS;
|
|
|
|
}
|
|
|
|
else if (myself->ctty > 0)
|
|
|
|
devn = FH_CONSOLE;
|
|
|
|
}
|
|
|
|
else if (deveqn ("tty", 3) && (unit = digits (name + 3)) >= 0)
|
|
|
|
devn = FH_TTYS;
|
|
|
|
else if (deveq ("ttym"))
|
|
|
|
devn = FH_TTYM;
|
|
|
|
else if (deveq ("ptmx"))
|
|
|
|
devn = FH_PTYM;
|
|
|
|
else if (deveq ("windows"))
|
|
|
|
devn = FH_WINDOWS;
|
|
|
|
else if (deveq ("dsp"))
|
|
|
|
devn = FH_OSS_DSP;
|
|
|
|
else if (deveq ("conin"))
|
|
|
|
devn = FH_CONIN;
|
|
|
|
else if (deveq ("conout"))
|
|
|
|
devn = FH_CONOUT;
|
|
|
|
else if (deveq ("null"))
|
|
|
|
devn = FH_NULL;
|
|
|
|
else if (deveq ("zero"))
|
|
|
|
devn = FH_ZERO;
|
|
|
|
else if (deveq ("random") || deveq ("urandom"))
|
|
|
|
{
|
|
|
|
devn = FH_RANDOM;
|
|
|
|
unit = 8 + (deveqn ("u", 1) ? 1 : 0); /* Keep unit Linux conformant */
|
|
|
|
}
|
|
|
|
else if (deveq ("mem"))
|
|
|
|
{
|
|
|
|
devn = FH_MEM;
|
|
|
|
unit = 1;
|
|
|
|
}
|
|
|
|
else if (deveq ("clipboard"))
|
|
|
|
devn = FH_CLIPBOARD;
|
|
|
|
else if (deveq ("port"))
|
|
|
|
{
|
|
|
|
devn = FH_MEM;
|
|
|
|
unit = 4;
|
|
|
|
}
|
2002-06-06 08:09:55 +08:00
|
|
|
else if (deveqn ("com", 3) && (unit = digits (name + 3)) >= 0 && unit < 100)
|
2001-10-04 10:34:20 +08:00
|
|
|
devn = FH_SERIAL;
|
|
|
|
else if (deveqn ("ttyS", 4) && (unit = digits (name + 4)) >= 0)
|
2001-10-29 13:28:24 +08:00
|
|
|
{
|
|
|
|
devn = FH_SERIAL;
|
|
|
|
unit++;
|
|
|
|
}
|
2001-11-24 11:11:39 +08:00
|
|
|
else if (deveq ("pipe"))
|
2001-10-04 10:34:20 +08:00
|
|
|
devn = FH_PIPE;
|
2001-11-24 11:11:39 +08:00
|
|
|
else if (deveq ("piper"))
|
|
|
|
devn = FH_PIPER;
|
|
|
|
else if (deveq ("pipew"))
|
|
|
|
devn = FH_PIPEW;
|
2001-10-04 10:34:20 +08:00
|
|
|
else if (deveq ("tcp") || deveq ("udp") || deveq ("streamsocket")
|
|
|
|
|| deveq ("dgsocket"))
|
|
|
|
devn = FH_SOCKET;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-10-04 10:34:20 +08:00
|
|
|
return devn;
|
|
|
|
}
|
|
|
|
|
2001-10-16 22:53:26 +08:00
|
|
|
/*
|
|
|
|
major minor POSIX filename NT filename
|
2001-11-05 14:09:15 +08:00
|
|
|
----- ----- -------------- -------------------------
|
2001-10-16 22:53:26 +08:00
|
|
|
FH_TAPE 0 /dev/st0 \device\tape0
|
|
|
|
FH_TAPE 1 /dev/st1 \device\tape1
|
|
|
|
...
|
|
|
|
FH_TAPE 128 /dev/nst0 \device\tape0
|
|
|
|
FH_TAPE 129 /dev/nst1 \device\tape1
|
|
|
|
...
|
|
|
|
|
|
|
|
FH_FLOPPY 0 /dev/fd0 \device\floppy0
|
|
|
|
FH_FLOPPY 1 /dev/fd1 \device\floppy1
|
|
|
|
...
|
|
|
|
|
|
|
|
FH_FLOPPY 16 /dev/scd0 \device\cdrom0
|
|
|
|
FH_FLOPPY 17 /dev/scd0 \device\cdrom1
|
|
|
|
...
|
|
|
|
|
|
|
|
FH_FLOPPY 32 /dev/sda \device\harddisk0\partition0
|
|
|
|
FH_FLOPPY 33 /dev/sda1 \device\harddisk0\partition1
|
|
|
|
...
|
|
|
|
FH_FLOPPY 47 /dev/sda15 \device\harddisk0\partition15
|
|
|
|
|
|
|
|
FH_FLOPPY 48 /dev/sdb \device\harddisk1\partition0
|
|
|
|
FH_FLOPPY 33 /dev/sdb1 \device\harddisk1\partition1
|
|
|
|
...
|
|
|
|
FH_FLOPPY 208 /dev/sdl \device\harddisk11\partition0
|
|
|
|
...
|
|
|
|
FH_FLOPPY 223 /dev/sdl15 \device\harddisk11\partition15
|
|
|
|
|
|
|
|
The following are needed to maintain backward compatibility with
|
|
|
|
the old Win32 partitioning scheme on W2K/XP.
|
|
|
|
|
|
|
|
FH_FLOPPY 224 from mount tab \\.\A:
|
|
|
|
...
|
|
|
|
FH_FLOPPY 250 from mount tab \\.\Z:
|
|
|
|
*/
|
2001-10-04 10:34:20 +08:00
|
|
|
static int
|
2001-10-16 22:53:26 +08:00
|
|
|
get_raw_device_number (const char *name, const char *w32_path, int &unit)
|
2001-10-04 10:34:20 +08:00
|
|
|
{
|
2001-10-16 22:53:26 +08:00
|
|
|
DWORD devn = FH_BAD;
|
|
|
|
|
|
|
|
if (!w32_path) /* New approach using fixed device names. */
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-10-16 22:53:26 +08:00
|
|
|
if (deveqn ("st", 2))
|
|
|
|
{
|
|
|
|
unit = digits (name + 2);
|
|
|
|
if (unit >= 0 && unit < 128)
|
|
|
|
devn = FH_TAPE;
|
|
|
|
}
|
|
|
|
else if (deveqn ("nst", 3))
|
|
|
|
{
|
|
|
|
unit = digits (name + 3) + 128;
|
|
|
|
if (unit >= 128 && unit < 256)
|
|
|
|
devn = FH_TAPE;
|
|
|
|
}
|
|
|
|
else if (deveqn ("fd", 2))
|
|
|
|
{
|
|
|
|
unit = digits (name + 2);
|
|
|
|
if (unit >= 0 && unit < 16)
|
|
|
|
devn = FH_FLOPPY;
|
|
|
|
}
|
|
|
|
else if (deveqn ("scd", 3))
|
|
|
|
{
|
|
|
|
unit = digits (name + 3) + 16;
|
|
|
|
if (unit >= 16 && unit < 32)
|
|
|
|
devn = FH_FLOPPY;
|
|
|
|
}
|
|
|
|
else if (deveqn ("sd", 2) && isalpha (name[2]))
|
|
|
|
{
|
|
|
|
unit = (cyg_tolower (name[2]) - 'a') * 16 + 32;
|
|
|
|
if (unit >= 32 && unit < 224)
|
|
|
|
if (!name[3])
|
|
|
|
devn = FH_FLOPPY;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
int d = digits (name + 3);
|
|
|
|
if (d >= 1 && d < 16)
|
|
|
|
{
|
|
|
|
unit += d;
|
|
|
|
devn = FH_FLOPPY;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2001-10-16 22:53:26 +08:00
|
|
|
else /* Backward compatible checking of mount table device mapping. */
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-10-16 22:53:26 +08:00
|
|
|
if (wdeveqn ("tape", 4))
|
2001-11-05 14:09:15 +08:00
|
|
|
{
|
2001-10-16 22:53:26 +08:00
|
|
|
unit = digits (w32_path + 4);
|
|
|
|
/* Norewind tape devices have leading n in name. */
|
|
|
|
if (deveqn ("n", 1))
|
|
|
|
unit += 128;
|
|
|
|
devn = FH_TAPE;
|
|
|
|
}
|
|
|
|
else if (wdeveqn ("physicaldrive", 13))
|
2001-11-05 14:09:15 +08:00
|
|
|
{
|
2001-10-16 22:53:26 +08:00
|
|
|
unit = digits (w32_path + 13) * 16 + 32;
|
|
|
|
devn = FH_FLOPPY;
|
|
|
|
}
|
|
|
|
else if (isdrive (w32_path))
|
2001-11-05 14:09:15 +08:00
|
|
|
{
|
2001-10-16 22:53:26 +08:00
|
|
|
unit = cyg_tolower (w32_path[0]) - 'a' + 224;
|
|
|
|
devn = FH_FLOPPY;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
return devn;
|
|
|
|
}
|
|
|
|
|
2001-10-04 10:34:20 +08:00
|
|
|
static int __stdcall get_device_number (const char *unix_path,
|
2001-11-05 14:09:15 +08:00
|
|
|
const char *w32_path, int &unit)
|
2001-10-04 10:34:20 +08:00
|
|
|
__attribute__ ((regparm(3)));
|
|
|
|
static int __stdcall
|
|
|
|
get_device_number (const char *unix_path, const char *w32_path, int &unit)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
DWORD devn = FH_BAD;
|
|
|
|
unit = 0;
|
|
|
|
|
2001-10-04 10:34:20 +08:00
|
|
|
if (*unix_path == '/' && udeveqn ("/dev/", 5))
|
2001-10-16 22:53:26 +08:00
|
|
|
{
|
|
|
|
devn = get_devn (unix_path, unit);
|
|
|
|
if (devn == FH_BAD && *w32_path == '\\' && wdeveqn ("\\dev\\", 5))
|
|
|
|
devn = get_devn (w32_path, unit);
|
|
|
|
if (devn == FH_BAD && wdeveqn ("\\\\.\\", 4))
|
|
|
|
devn = get_raw_device_number (unix_path + 5, w32_path + 4, unit);
|
|
|
|
if (devn == FH_BAD)
|
|
|
|
devn = get_raw_device_number (unix_path + 5, NULL, unit);
|
|
|
|
}
|
2001-10-29 13:28:24 +08:00
|
|
|
else
|
|
|
|
{
|
|
|
|
char *p = strrchr (unix_path, '/');
|
|
|
|
if (p)
|
|
|
|
unix_path = p + 1;
|
|
|
|
if (udeveqn ("com", 3)
|
2002-06-06 08:09:55 +08:00
|
|
|
&& (unit = digits (unix_path + 3)) >= 0 && unit < 100)
|
2001-10-29 13:28:24 +08:00
|
|
|
devn = FH_SERIAL;
|
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
return devn;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Return TRUE if src_path is a Win32 device name, filling out the device
|
|
|
|
name in win32_path */
|
|
|
|
|
|
|
|
static BOOL
|
|
|
|
win32_device_name (const char *src_path, char *win32_path,
|
|
|
|
DWORD &devn, int &unit)
|
|
|
|
{
|
|
|
|
const char *devfmt;
|
|
|
|
|
2001-10-16 22:53:26 +08:00
|
|
|
devn = get_device_number (src_path, win32_path, unit);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
if (devn == FH_BAD)
|
2001-12-07 13:03:32 +08:00
|
|
|
return false;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
if ((devfmt = windows_device_names[FHDEVN (devn)]) == NULL)
|
2001-12-07 13:03:32 +08:00
|
|
|
return false;
|
2001-10-16 22:53:26 +08:00
|
|
|
switch (devn)
|
|
|
|
{
|
|
|
|
case FH_RANDOM:
|
|
|
|
__small_sprintf (win32_path, devfmt, unit == 8 ? "" : "u");
|
2001-11-05 14:09:15 +08:00
|
|
|
break;
|
2001-10-16 22:53:26 +08:00
|
|
|
case FH_TAPE:
|
2001-11-05 14:09:15 +08:00
|
|
|
__small_sprintf (win32_path, "\\Device\\Tape%d", unit % 128);
|
|
|
|
break;
|
2001-10-16 22:53:26 +08:00
|
|
|
case FH_FLOPPY:
|
2001-11-05 14:09:15 +08:00
|
|
|
if (unit < 16)
|
2001-10-17 04:17:23 +08:00
|
|
|
__small_sprintf (win32_path, "\\Device\\Floppy%d", unit);
|
2001-10-16 22:53:26 +08:00
|
|
|
else if (unit < 32)
|
2001-10-17 04:17:23 +08:00
|
|
|
__small_sprintf (win32_path, "\\Device\\CdRom%d", unit - 16);
|
2001-10-16 22:53:26 +08:00
|
|
|
else if (unit < 224)
|
2001-10-17 04:17:23 +08:00
|
|
|
__small_sprintf (win32_path, "\\Device\\Harddisk%d\\Partition%d",
|
2001-10-16 22:53:26 +08:00
|
|
|
(unit - 32) / 16, unit % 16);
|
|
|
|
else
|
2001-10-17 04:17:23 +08:00
|
|
|
__small_sprintf (win32_path, "\\DosDevices\\%c:", unit - 224 + 'A');
|
2001-11-05 14:09:15 +08:00
|
|
|
break;
|
2001-10-16 22:53:26 +08:00
|
|
|
default:
|
|
|
|
__small_sprintf (win32_path, devfmt, unit);
|
2001-11-05 14:09:15 +08:00
|
|
|
break;
|
2001-10-16 22:53:26 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Normalize a Win32 path.
|
|
|
|
/'s are converted to \'s in the process.
|
|
|
|
All duplicate \'s, except for 2 leading \'s, are deleted.
|
|
|
|
|
|
|
|
The result is 0 for success, or an errno error value.
|
|
|
|
FIXME: A lot of this should be mergeable with the POSIX critter. */
|
|
|
|
static int
|
2000-09-05 11:16:28 +08:00
|
|
|
normalize_win32_path (const char *src, char *dst)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
const char *src_start = src;
|
|
|
|
char *dst_start = dst;
|
2000-07-20 04:14:24 +08:00
|
|
|
char *dst_root_start = dst;
|
2000-12-10 05:31:49 +08:00
|
|
|
bool beg_src_slash = isdirsep (src[0]);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2000-12-10 05:31:49 +08:00
|
|
|
if (beg_src_slash && isdirsep (src[1]))
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
*dst++ = '\\';
|
2001-10-08 05:16:36 +08:00
|
|
|
src++;
|
|
|
|
if (src[1] == '.' && isdirsep (src[2]))
|
|
|
|
{
|
|
|
|
*dst++ = '\\';
|
|
|
|
*dst++ = '.';
|
|
|
|
src += 2;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2000-12-10 05:31:49 +08:00
|
|
|
else if (strchr (src, ':') == NULL && *src != '/')
|
2000-12-09 11:29:33 +08:00
|
|
|
{
|
2001-04-17 11:52:08 +08:00
|
|
|
if (!cygheap->cwd.get (dst, 0))
|
2000-12-09 11:29:33 +08:00
|
|
|
return get_errno ();
|
|
|
|
if (beg_src_slash)
|
|
|
|
{
|
|
|
|
if (dst[1] == ':')
|
|
|
|
dst[2] = '\0';
|
|
|
|
else if (slash_unc_prefix_p (dst))
|
|
|
|
{
|
|
|
|
char *p = strpbrk (dst + 2, "\\/");
|
|
|
|
if (p && (p = strpbrk (p + 1, "\\/")))
|
|
|
|
*p = '\0';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (strlen (dst) + 1 + strlen (src) >= MAX_PATH)
|
|
|
|
{
|
|
|
|
debug_printf ("ENAMETOOLONG = normalize_win32_path (%s)", src);
|
|
|
|
return ENAMETOOLONG;
|
|
|
|
}
|
|
|
|
dst += strlen (dst);
|
|
|
|
if (!beg_src_slash)
|
|
|
|
*dst++ = '\\';
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
while (*src)
|
|
|
|
{
|
|
|
|
/* Strip duplicate /'s. */
|
2003-01-09 16:22:05 +08:00
|
|
|
if (isdirsep (src[0]) && isdirsep (src[1]))
|
2000-02-18 03:38:33 +08:00
|
|
|
src++;
|
|
|
|
/* Ignore "./". */
|
2003-01-09 16:22:05 +08:00
|
|
|
else if (src[0] == '.' && isdirsep (src[1])
|
|
|
|
&& (src == src_start || isdirsep (src[-1])))
|
2000-12-16 06:25:51 +08:00
|
|
|
src += 2;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
/* Backup if "..". */
|
|
|
|
else if (src[0] == '.' && src[1] == '.'
|
|
|
|
/* dst must be greater than dst_start */
|
|
|
|
&& dst[-1] == '\\'
|
2003-01-09 16:22:05 +08:00
|
|
|
&& (isdirsep (src[2]) || src[2] == 0))
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
/* Back up over /, but not if it's the first one. */
|
2000-07-20 04:14:24 +08:00
|
|
|
if (dst > dst_root_start + 1)
|
2000-02-18 03:38:33 +08:00
|
|
|
dst--;
|
|
|
|
/* Now back up to the next /. */
|
2000-07-20 04:14:24 +08:00
|
|
|
while (dst > dst_root_start + 1 && dst[-1] != '\\' && dst[-2] != ':')
|
2000-02-18 03:38:33 +08:00
|
|
|
dst--;
|
|
|
|
src += 2;
|
2003-01-09 16:22:05 +08:00
|
|
|
if (isdirsep (*src))
|
2000-02-18 03:38:33 +08:00
|
|
|
src++;
|
|
|
|
}
|
|
|
|
/* Otherwise, add char to result. */
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (*src == '/')
|
|
|
|
*dst++ = '\\';
|
|
|
|
else
|
|
|
|
*dst++ = *src;
|
|
|
|
++src;
|
|
|
|
}
|
2000-12-16 06:25:51 +08:00
|
|
|
if ((dst - dst_start) >= MAX_PATH)
|
|
|
|
return ENAMETOOLONG;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
*dst = 0;
|
|
|
|
debug_printf ("%s = normalize_win32_path (%s)", dst_start, src_start);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Various utilities. */
|
|
|
|
|
|
|
|
/* slashify: Convert all back slashes in src path to forward slashes
|
|
|
|
in dst path. Add a trailing slash to dst when trailing_slash_p arg
|
|
|
|
is set to 1. */
|
|
|
|
|
|
|
|
static void
|
|
|
|
slashify (const char *src, char *dst, int trailing_slash_p)
|
|
|
|
{
|
|
|
|
const char *start = src;
|
|
|
|
|
|
|
|
while (*src)
|
|
|
|
{
|
|
|
|
if (*src == '\\')
|
|
|
|
*dst++ = '/';
|
|
|
|
else
|
|
|
|
*dst++ = *src;
|
|
|
|
++src;
|
|
|
|
}
|
|
|
|
if (trailing_slash_p
|
|
|
|
&& src > start
|
|
|
|
&& !isdirsep (src[-1]))
|
|
|
|
*dst++ = '/';
|
|
|
|
*dst++ = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* backslashify: Convert all forward slashes in src path to back slashes
|
|
|
|
in dst path. Add a trailing slash to dst when trailing_slash_p arg
|
|
|
|
is set to 1. */
|
|
|
|
|
|
|
|
static void
|
|
|
|
backslashify (const char *src, char *dst, int trailing_slash_p)
|
|
|
|
{
|
|
|
|
const char *start = src;
|
|
|
|
|
|
|
|
while (*src)
|
|
|
|
{
|
|
|
|
if (*src == '/')
|
|
|
|
*dst++ = '\\';
|
|
|
|
else
|
|
|
|
*dst++ = *src;
|
|
|
|
++src;
|
|
|
|
}
|
|
|
|
if (trailing_slash_p
|
|
|
|
&& src > start
|
|
|
|
&& !isdirsep (src[-1]))
|
|
|
|
*dst++ = '\\';
|
|
|
|
*dst++ = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* nofinalslash: Remove trailing / and \ from SRC (except for the
|
|
|
|
first one). It is ok for src == dst. */
|
|
|
|
|
|
|
|
void __stdcall
|
|
|
|
nofinalslash (const char *src, char *dst)
|
|
|
|
{
|
|
|
|
int len = strlen (src);
|
|
|
|
if (src != dst)
|
|
|
|
memcpy (dst, src, len + 1);
|
2003-01-09 16:22:05 +08:00
|
|
|
while (len > 1 && isdirsep (dst[--len]))
|
2000-02-18 03:38:33 +08:00
|
|
|
dst[len] = '\0';
|
|
|
|
}
|
|
|
|
|
|
|
|
/* slash_unc_prefix_p: Return non-zero if PATH begins with //UNC/SHARE */
|
|
|
|
|
|
|
|
int __stdcall
|
|
|
|
slash_unc_prefix_p (const char *path)
|
|
|
|
{
|
|
|
|
char *p = NULL;
|
|
|
|
int ret = (isdirsep (path[0])
|
|
|
|
&& isdirsep (path[1])
|
|
|
|
&& isalpha (path[2])
|
|
|
|
&& path[3] != 0
|
|
|
|
&& !isdirsep (path[3])
|
2002-09-23 08:31:31 +08:00
|
|
|
&& ((p = strpbrk (path + 3, "\\/")) != NULL));
|
2000-02-18 03:38:33 +08:00
|
|
|
if (!ret || p == NULL)
|
|
|
|
return ret;
|
|
|
|
return ret && isalnum (p[1]);
|
|
|
|
}
|
|
|
|
|
2002-06-12 07:30:48 +08:00
|
|
|
/* conv_path_list: Convert a list of path names to/from Win32/POSIX. */
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
static void
|
|
|
|
conv_path_list (const char *src, char *dst, int to_posix_p)
|
|
|
|
{
|
|
|
|
char *s;
|
|
|
|
char *d = dst;
|
|
|
|
char src_delim = to_posix_p ? ';' : ':';
|
|
|
|
char dst_delim = to_posix_p ? ':' : ';';
|
|
|
|
int (*conv_fn) (const char *, char *) = (to_posix_p
|
|
|
|
? cygwin_conv_to_posix_path
|
|
|
|
: cygwin_conv_to_win32_path);
|
2001-11-21 14:47:57 +08:00
|
|
|
|
|
|
|
char *srcbuf = (char *) alloca (strlen (src) + 1);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-11-22 13:59:07 +08:00
|
|
|
for (;;)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-11-21 14:47:57 +08:00
|
|
|
s = strccpy (srcbuf, &src, src_delim);
|
|
|
|
int len = s - srcbuf;
|
|
|
|
if (len >= MAX_PATH)
|
|
|
|
srcbuf[MAX_PATH - 1] = '\0';
|
|
|
|
(*conv_fn) (len ? srcbuf : ".", d);
|
2001-11-22 13:59:07 +08:00
|
|
|
if (!*src++)
|
|
|
|
break;
|
|
|
|
d = strchr (d, '\0');
|
|
|
|
*d++ = dst_delim;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* init: Initialize the mount table. */
|
|
|
|
|
|
|
|
void
|
|
|
|
mount_info::init ()
|
|
|
|
{
|
|
|
|
nmounts = 0;
|
|
|
|
|
|
|
|
/* Fetch the mount table and cygdrive-related information from
|
|
|
|
the registry. */
|
|
|
|
from_registry ();
|
|
|
|
}
|
|
|
|
|
2002-06-05 09:42:28 +08:00
|
|
|
static void
|
|
|
|
set_flags (unsigned *flags, unsigned val)
|
|
|
|
{
|
|
|
|
*flags = val;
|
|
|
|
if (!(*flags & PATH_BINARY))
|
2002-07-02 03:03:26 +08:00
|
|
|
{
|
|
|
|
*flags |= PATH_TEXT;
|
|
|
|
debug_printf ("flags: text (%p)", *flags & (PATH_TEXT | PATH_BINARY));
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
*flags |= PATH_BINARY;
|
|
|
|
debug_printf ("flags: binary (%p)", *flags & (PATH_TEXT | PATH_BINARY));
|
|
|
|
}
|
2002-06-05 09:42:28 +08:00
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* conv_to_win32_path: Ensure src_path is a pure Win32 path and store
|
|
|
|
the result in win32_path.
|
|
|
|
|
|
|
|
If win32_path != NULL, the relative path, if possible to keep, is
|
|
|
|
stored in win32_path. If the relative path isn't possible to keep,
|
|
|
|
the full path is stored.
|
|
|
|
|
|
|
|
If full_win32_path != NULL, the full path is stored there.
|
|
|
|
|
|
|
|
The result is zero for success, or an errno value.
|
|
|
|
|
|
|
|
{,full_}win32_path must have sufficient space (i.e. MAX_PATH bytes). */
|
|
|
|
|
|
|
|
int
|
2001-05-01 10:03:10 +08:00
|
|
|
mount_info::conv_to_win32_path (const char *src_path, char *dst,
|
2001-06-03 10:31:16 +08:00
|
|
|
DWORD &devn, int &unit, unsigned *flags,
|
|
|
|
bool no_normalize)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-01-28 14:23:42 +08:00
|
|
|
while (sys_mount_table_counter < cygwin_shared->sys_mount_table_counter)
|
|
|
|
{
|
|
|
|
init ();
|
|
|
|
sys_mount_table_counter++;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
int src_path_len = strlen (src_path);
|
|
|
|
MALLOC_CHECK;
|
|
|
|
unsigned dummy_flags;
|
2001-06-03 10:31:16 +08:00
|
|
|
int chroot_ok = !cygheap->root.exists ();
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
devn = FH_BAD;
|
|
|
|
unit = 0;
|
|
|
|
|
|
|
|
if (!flags)
|
|
|
|
flags = &dummy_flags;
|
|
|
|
|
|
|
|
*flags = 0;
|
|
|
|
debug_printf ("conv_to_win32_path (%s)", src_path);
|
|
|
|
|
|
|
|
if (src_path_len >= MAX_PATH)
|
|
|
|
{
|
|
|
|
debug_printf ("ENAMETOOLONG = conv_to_win32_path (%s)", src_path);
|
|
|
|
return ENAMETOOLONG;
|
|
|
|
}
|
|
|
|
|
|
|
|
int i, rc;
|
|
|
|
mount_item *mi = NULL; /* initialized to avoid compiler warning */
|
|
|
|
char pathbuf[MAX_PATH];
|
|
|
|
|
2000-04-27 11:26:23 +08:00
|
|
|
if (dst == NULL)
|
|
|
|
goto out; /* Sanity check. */
|
|
|
|
|
|
|
|
/* An MS-DOS spec has either a : or a \. If this is found, short
|
|
|
|
circuit most of the rest of this function. */
|
2001-05-10 02:59:10 +08:00
|
|
|
if (strpbrk (src_path, ":\\") != NULL || slash_unc_prefix_p (src_path))
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
debug_printf ("%s already win32", src_path);
|
2000-09-05 11:16:28 +08:00
|
|
|
rc = normalize_win32_path (src_path, dst);
|
2000-02-18 03:38:33 +08:00
|
|
|
if (rc)
|
2000-04-27 11:26:23 +08:00
|
|
|
{
|
|
|
|
debug_printf ("normalize_win32_path failed, rc %d", rc);
|
|
|
|
return rc;
|
|
|
|
}
|
2001-05-01 10:03:10 +08:00
|
|
|
|
2002-06-05 09:42:28 +08:00
|
|
|
set_flags (flags, (unsigned) set_flags_from_win32_path (dst));
|
2001-05-01 10:03:10 +08:00
|
|
|
goto out;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Normalize the path, taking out ../../ stuff, we need to do this
|
|
|
|
so that we can move from one mounted directory to another with relative
|
|
|
|
stuff.
|
|
|
|
|
|
|
|
eg mounting c:/foo /foo
|
|
|
|
d:/bar /bar
|
|
|
|
|
|
|
|
cd /bar
|
|
|
|
ls ../foo
|
|
|
|
|
|
|
|
should look in c:/foo, not d:/foo.
|
|
|
|
|
|
|
|
We do this by first getting an absolute UNIX-style path and then
|
|
|
|
converting it to a DOS-style path, looking up the appropriate drive
|
|
|
|
in the mount table. */
|
|
|
|
|
2001-06-03 10:31:16 +08:00
|
|
|
if (no_normalize)
|
|
|
|
strcpy (pathbuf, src_path);
|
|
|
|
else
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-06-03 10:31:16 +08:00
|
|
|
rc = normalize_posix_path (src_path, pathbuf);
|
|
|
|
|
|
|
|
if (rc)
|
|
|
|
{
|
|
|
|
debug_printf ("%d = conv_to_win32_path (%s)", rc, src_path);
|
|
|
|
return rc;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* See if this is a cygwin "device" */
|
|
|
|
if (win32_device_name (pathbuf, dst, devn, unit))
|
|
|
|
{
|
|
|
|
*flags = MOUNT_BINARY; /* FIXME: Is this a sensible default for devices? */
|
2001-06-03 10:31:16 +08:00
|
|
|
rc = 0;
|
|
|
|
goto out_no_chroot_check;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if the cygdrive prefix was specified. If so, just strip
|
|
|
|
off the prefix and transform it into an MS-DOS path. */
|
|
|
|
MALLOC_CHECK;
|
2002-05-03 10:43:45 +08:00
|
|
|
if (isproc (pathbuf))
|
|
|
|
{
|
|
|
|
devn = fhandler_proc::get_proc_fhandler (pathbuf);
|
|
|
|
if (devn == FH_BAD)
|
2002-05-28 09:55:40 +08:00
|
|
|
return ENOENT;
|
2002-05-03 10:43:45 +08:00
|
|
|
}
|
|
|
|
else if (iscygdrive (pathbuf))
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-11-22 13:59:07 +08:00
|
|
|
int n = mount_table->cygdrive_len - 1;
|
|
|
|
if (!pathbuf[n] ||
|
|
|
|
(pathbuf[n] == '/' && pathbuf[n + 1] == '.' && !pathbuf[n + 2]))
|
|
|
|
{
|
|
|
|
unit = 0;
|
|
|
|
dst[0] = '\0';
|
2001-11-25 04:57:19 +08:00
|
|
|
if (mount_table->cygdrive_len > 1)
|
|
|
|
devn = FH_CYGDRIVE;
|
2001-11-22 13:59:07 +08:00
|
|
|
}
|
2001-12-04 00:47:18 +08:00
|
|
|
else if (cygdrive_win32_path (pathbuf, dst, unit))
|
|
|
|
{
|
2002-06-05 09:42:28 +08:00
|
|
|
set_flags (flags, (unsigned) cygdrive_flags);
|
2001-12-04 00:47:18 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
else if (mount_table->cygdrive_len > 1)
|
2000-02-18 03:38:33 +08:00
|
|
|
return ENOENT;
|
|
|
|
}
|
|
|
|
|
2001-06-03 10:31:16 +08:00
|
|
|
int chrooted_path_len;
|
|
|
|
chrooted_path_len = 0;
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Check the mount table for prefix matches. */
|
|
|
|
for (i = 0; i < nmounts; i++)
|
|
|
|
{
|
2001-06-03 10:31:16 +08:00
|
|
|
const char *path;
|
|
|
|
int len;
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
mi = mount + posix_sorted[i];
|
2001-06-03 10:31:16 +08:00
|
|
|
if (!cygheap->root.exists ()
|
|
|
|
|| (mi->posix_pathlen == 1 && mi->posix_path[0] == '/'))
|
|
|
|
{
|
|
|
|
path = mi->posix_path;
|
|
|
|
len = mi->posix_pathlen;
|
|
|
|
}
|
|
|
|
else if (cygheap->root.posix_ok (mi->posix_path))
|
|
|
|
{
|
|
|
|
path = cygheap->root.unchroot (mi->posix_path);
|
|
|
|
chrooted_path_len = len = strlen (path);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
chrooted_path_len = 0;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (path_prefix_p (path, pathbuf, len))
|
2000-02-18 03:38:33 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (i >= nmounts)
|
2002-06-05 12:01:43 +08:00
|
|
|
{
|
|
|
|
backslashify (pathbuf, dst, 0); /* just convert */
|
|
|
|
set_flags (flags, PATH_BINARY);
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
else
|
|
|
|
{
|
2001-06-03 10:31:16 +08:00
|
|
|
int n;
|
|
|
|
const char *native_path;
|
|
|
|
int posix_pathlen;
|
|
|
|
if (chroot_ok || chrooted_path_len || mi->posix_pathlen != 1
|
|
|
|
|| mi->posix_path[0] != '/')
|
|
|
|
{
|
|
|
|
n = mi->native_pathlen;
|
|
|
|
native_path = mi->native_path;
|
|
|
|
posix_pathlen = chrooted_path_len ?: mi->posix_pathlen;
|
|
|
|
chroot_ok = 1;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
n = cygheap->root.native_length ();
|
|
|
|
native_path = cygheap->root.native_path ();
|
|
|
|
posix_pathlen = mi->posix_pathlen;
|
|
|
|
chroot_ok = 1;
|
|
|
|
}
|
|
|
|
memcpy (dst, native_path, n + 1);
|
|
|
|
const char *p = pathbuf + posix_pathlen;
|
2001-05-12 05:01:44 +08:00
|
|
|
if (*p == '/')
|
|
|
|
/* nothing */;
|
|
|
|
else if ((isdrive (dst) && !dst[2]) || *p)
|
2001-05-01 10:03:10 +08:00
|
|
|
dst[n++] = '\\';
|
|
|
|
strcpy (dst + n, p);
|
|
|
|
backslashify (dst, dst, 0);
|
2002-06-05 09:42:28 +08:00
|
|
|
set_flags (flags, (unsigned) mi->flags);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2002-05-02 12:13:48 +08:00
|
|
|
if (!isvirtual_dev (devn))
|
2001-12-07 06:36:08 +08:00
|
|
|
win32_device_name (src_path, dst, devn, unit);
|
2001-10-04 10:34:20 +08:00
|
|
|
|
2001-06-03 10:31:16 +08:00
|
|
|
out:
|
2000-02-18 03:38:33 +08:00
|
|
|
MALLOC_CHECK;
|
2001-06-03 10:31:16 +08:00
|
|
|
if (chroot_ok || cygheap->root.ischroot_native (dst))
|
|
|
|
rc = 0;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
debug_printf ("attempt to access outside of chroot '%s = %s'",
|
|
|
|
cygheap->root.posix_path (), cygheap->root.native_path ());
|
|
|
|
rc = ENOENT;
|
|
|
|
}
|
|
|
|
|
|
|
|
out_no_chroot_check:
|
|
|
|
debug_printf ("src_path %s, dst %s, flags %p, rc %d", src_path, dst, *flags, rc);
|
|
|
|
return rc;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* cygdrive_posix_path: Build POSIX path used as the
|
|
|
|
mount point for cygdrives created when there is no other way to
|
|
|
|
obtain a POSIX path from a Win32 one. */
|
|
|
|
|
|
|
|
void
|
|
|
|
mount_info::cygdrive_posix_path (const char *src, char *dst, int trailing_slash_p)
|
|
|
|
{
|
|
|
|
int len = cygdrive_len;
|
|
|
|
|
|
|
|
memcpy (dst, cygdrive, len + 1);
|
|
|
|
|
|
|
|
/* Now finish the path off with the drive letter to be used.
|
|
|
|
The cygdrive prefix always ends with a trailing slash so
|
|
|
|
the drive letter is added after the path. */
|
2000-10-19 11:12:44 +08:00
|
|
|
dst[len++] = cyg_tolower (src[0]);
|
2003-01-09 16:22:05 +08:00
|
|
|
if (!src[2] || (isdirsep (src[2]) && !src[3]))
|
2000-02-18 03:38:33 +08:00
|
|
|
dst[len++] = '\000';
|
|
|
|
else
|
|
|
|
{
|
2000-10-10 02:10:53 +08:00
|
|
|
int n;
|
2000-02-18 03:38:33 +08:00
|
|
|
dst[len++] = '/';
|
2003-01-09 16:22:05 +08:00
|
|
|
if (isdirsep (src[2]))
|
2000-10-10 02:10:53 +08:00
|
|
|
n = 3;
|
|
|
|
else
|
|
|
|
n = 2;
|
|
|
|
strcpy (dst + len, src + n);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
slashify (dst, dst, trailing_slash_p);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2001-11-22 13:59:07 +08:00
|
|
|
mount_info::cygdrive_win32_path (const char *src, char *dst, int& unit)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-11-22 13:59:07 +08:00
|
|
|
int res;
|
2000-02-18 03:38:33 +08:00
|
|
|
const char *p = src + cygdrive_len;
|
|
|
|
if (!isalpha (*p) || (!isdirsep (p[1]) && p[1]))
|
2001-11-22 13:59:07 +08:00
|
|
|
{
|
2001-12-04 00:47:18 +08:00
|
|
|
unit = -1;
|
2001-11-22 13:59:07 +08:00
|
|
|
dst[0] = '\0';
|
2001-12-04 00:47:18 +08:00
|
|
|
res = 0;
|
2001-11-22 13:59:07 +08:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
dst[0] = cyg_tolower (*p);
|
|
|
|
dst[1] = ':';
|
|
|
|
strcpy (dst + 2, p + 1);
|
|
|
|
backslashify (dst, dst, !dst[2]);
|
|
|
|
unit = dst[0];
|
2001-12-04 00:47:18 +08:00
|
|
|
res = 1;
|
2001-11-22 13:59:07 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
debug_printf ("src '%s', dst '%s'", src, dst);
|
2001-12-04 00:47:18 +08:00
|
|
|
return res;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* conv_to_posix_path: Ensure src_path is a POSIX path.
|
|
|
|
|
|
|
|
The result is zero for success, or an errno value.
|
|
|
|
posix_path must have sufficient space (i.e. MAX_PATH bytes).
|
|
|
|
If keep_rel_p is non-zero, relative paths stay that way. */
|
|
|
|
|
|
|
|
int
|
|
|
|
mount_info::conv_to_posix_path (const char *src_path, char *posix_path,
|
|
|
|
int keep_rel_p)
|
|
|
|
{
|
|
|
|
int src_path_len = strlen (src_path);
|
2000-05-17 13:49:51 +08:00
|
|
|
int relative_path_p = !isabspath (src_path);
|
|
|
|
int trailing_slash_p;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2000-05-17 13:49:51 +08:00
|
|
|
if (src_path_len <= 1)
|
|
|
|
trailing_slash_p = 0;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
const char *lastchar = src_path + src_path_len - 1;
|
2003-01-09 16:22:05 +08:00
|
|
|
trailing_slash_p = isdirsep (*lastchar) && lastchar[-1] != ':';
|
2000-05-17 13:49:51 +08:00
|
|
|
}
|
2000-08-22 11:58:47 +08:00
|
|
|
|
2000-05-23 22:08:52 +08:00
|
|
|
debug_printf ("conv_to_posix_path (%s, %s, %s)", src_path,
|
|
|
|
keep_rel_p ? "keep-rel" : "no-keep-rel",
|
|
|
|
trailing_slash_p ? "add-slash" : "no-add-slash");
|
2000-02-18 03:38:33 +08:00
|
|
|
MALLOC_CHECK;
|
|
|
|
|
|
|
|
if (src_path_len >= MAX_PATH)
|
|
|
|
{
|
|
|
|
debug_printf ("ENAMETOOLONG");
|
|
|
|
return ENAMETOOLONG;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* FIXME: For now, if the path is relative and it's supposed to stay
|
|
|
|
that way, skip mount table processing. */
|
2000-04-21 13:32:19 +08:00
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
if (keep_rel_p && relative_path_p)
|
|
|
|
{
|
|
|
|
slashify (src_path, posix_path, 0);
|
|
|
|
debug_printf ("%s = conv_to_posix_path (%s)", posix_path, src_path);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
char pathbuf[MAX_PATH];
|
2000-09-05 11:16:28 +08:00
|
|
|
int rc = normalize_win32_path (src_path, pathbuf);
|
2000-02-18 03:38:33 +08:00
|
|
|
if (rc != 0)
|
|
|
|
{
|
|
|
|
debug_printf ("%d = conv_to_posix_path (%s)", rc, src_path);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
int pathbuflen = strlen (pathbuf);
|
|
|
|
for (int i = 0; i < nmounts; ++i)
|
|
|
|
{
|
|
|
|
mount_item &mi = mount[native_sorted[i]];
|
2001-03-05 14:28:25 +08:00
|
|
|
if (!path_prefix_p (mi.native_path, pathbuf, mi.native_pathlen))
|
2000-02-18 03:38:33 +08:00
|
|
|
continue;
|
|
|
|
|
2001-06-03 10:31:16 +08:00
|
|
|
if (cygheap->root.exists () && !cygheap->root.posix_ok (mi.posix_path))
|
|
|
|
continue;
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* SRC_PATH is in the mount table. */
|
|
|
|
int nextchar;
|
2000-05-23 22:08:52 +08:00
|
|
|
const char *p = pathbuf + mi.native_pathlen;
|
|
|
|
|
|
|
|
if (!*p || !p[1])
|
2000-02-18 03:38:33 +08:00
|
|
|
nextchar = 0;
|
2003-01-11 04:25:47 +08:00
|
|
|
else if (isdirsep (*p))
|
2000-02-18 03:38:33 +08:00
|
|
|
nextchar = -1;
|
|
|
|
else
|
|
|
|
nextchar = 1;
|
|
|
|
|
|
|
|
int addslash = nextchar > 0 ? 1 : 0;
|
|
|
|
if ((mi.posix_pathlen + (pathbuflen - mi.native_pathlen) + addslash) >= MAX_PATH)
|
|
|
|
return ENAMETOOLONG;
|
|
|
|
strcpy (posix_path, mi.posix_path);
|
|
|
|
if (addslash)
|
|
|
|
strcat (posix_path, "/");
|
|
|
|
if (nextchar)
|
2000-05-23 22:08:52 +08:00
|
|
|
slashify (p,
|
2000-02-18 03:38:33 +08:00
|
|
|
posix_path + addslash + (mi.posix_pathlen == 1 ? 0 : mi.posix_pathlen),
|
2000-05-23 22:08:52 +08:00
|
|
|
trailing_slash_p);
|
2001-06-03 10:31:16 +08:00
|
|
|
|
|
|
|
if (cygheap->root.exists ())
|
|
|
|
{
|
|
|
|
const char *p = cygheap->root.unchroot (posix_path);
|
|
|
|
memmove (posix_path, p, strlen (p) + 1);
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2001-06-03 10:31:16 +08:00
|
|
|
if (!cygheap->root.exists ())
|
|
|
|
/* nothing */;
|
|
|
|
else if (cygheap->root.ischroot_native (pathbuf))
|
|
|
|
{
|
|
|
|
const char *p = pathbuf + cygheap->root.native_length ();
|
|
|
|
if (*p)
|
|
|
|
slashify (p, posix_path, trailing_slash_p);
|
|
|
|
else
|
|
|
|
{
|
|
|
|
posix_path[0] = '/';
|
|
|
|
posix_path[1] = '\0';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
return ENOENT;
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Not in the database. This should [theoretically] only happen if either
|
|
|
|
the path begins with //, or / isn't mounted, or the path has a drive
|
|
|
|
letter not covered by the mount table. If it's a relative path then the
|
|
|
|
caller must want an absolute path (otherwise we would have returned
|
|
|
|
above). So we always return an absolute path at this point. */
|
2000-05-30 08:38:51 +08:00
|
|
|
if (isdrive (pathbuf))
|
2000-05-17 13:49:51 +08:00
|
|
|
cygdrive_posix_path (pathbuf, posix_path, trailing_slash_p);
|
2000-02-18 03:38:33 +08:00
|
|
|
else
|
|
|
|
{
|
|
|
|
/* The use of src_path and not pathbuf here is intentional.
|
|
|
|
We couldn't translate the path, so just ensure no \'s are present. */
|
2003-01-11 04:25:47 +08:00
|
|
|
slashify (src_path, posix_path, trailing_slash_p);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
debug_printf ("%s = conv_to_posix_path (%s)", posix_path, src_path);
|
|
|
|
MALLOC_CHECK;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Return flags associated with a mount point given the win32 path. */
|
|
|
|
|
|
|
|
unsigned
|
|
|
|
mount_info::set_flags_from_win32_path (const char *p)
|
|
|
|
{
|
|
|
|
for (int i = 0; i < nmounts; i++)
|
|
|
|
{
|
|
|
|
mount_item &mi = mount[native_sorted[i]];
|
|
|
|
if (path_prefix_p (mi.native_path, p, mi.native_pathlen))
|
|
|
|
return mi.flags;
|
|
|
|
}
|
2002-06-05 12:01:43 +08:00
|
|
|
return PATH_BINARY;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* read_mounts: Given a specific regkey, read mounts from under its
|
|
|
|
key. */
|
|
|
|
|
|
|
|
void
|
|
|
|
mount_info::read_mounts (reg_key& r)
|
|
|
|
{
|
|
|
|
char posix_path[MAX_PATH];
|
|
|
|
HKEY key = r.get_key ();
|
|
|
|
DWORD i, posix_path_size;
|
2000-09-19 00:42:28 +08:00
|
|
|
int res;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
/* Loop through subkeys */
|
|
|
|
/* FIXME: we would like to not check MAX_MOUNTS but the heap in the
|
|
|
|
shared area is currently statically allocated so we can't have an
|
|
|
|
arbitrarily large number of mounts. */
|
2000-09-19 00:42:28 +08:00
|
|
|
for (i = 0; ; i++)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
char native_path[MAX_PATH];
|
|
|
|
int mount_flags;
|
|
|
|
|
|
|
|
posix_path_size = MAX_PATH;
|
|
|
|
/* FIXME: if maximum posix_path_size is 256, we're going to
|
|
|
|
run into problems if we ever try to store a mount point that's
|
2001-03-05 14:28:25 +08:00
|
|
|
over 256 but is under MAX_PATH. */
|
2000-09-19 00:42:28 +08:00
|
|
|
res = RegEnumKeyEx (key, i, posix_path, &posix_path_size, NULL,
|
2000-02-18 03:38:33 +08:00
|
|
|
NULL, NULL, NULL);
|
|
|
|
|
2000-09-19 00:42:28 +08:00
|
|
|
if (res == ERROR_NO_MORE_ITEMS)
|
2000-02-18 03:38:33 +08:00
|
|
|
break;
|
2000-09-19 00:42:28 +08:00
|
|
|
else if (res != ERROR_SUCCESS)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2002-09-30 12:35:18 +08:00
|
|
|
debug_printf ("RegEnumKeyEx failed, error %d!", res);
|
2000-02-18 03:38:33 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get a reg_key based on i. */
|
|
|
|
reg_key subkey = reg_key (key, KEY_READ, posix_path, NULL);
|
|
|
|
|
|
|
|
/* Fetch info from the subkey. */
|
|
|
|
subkey.get_string ("native", native_path, sizeof (native_path), "");
|
|
|
|
mount_flags = subkey.get_int ("flags", 0);
|
|
|
|
|
|
|
|
/* Add mount_item corresponding to registry mount point. */
|
2001-12-07 13:03:32 +08:00
|
|
|
res = mount_table->add_item (native_path, posix_path, mount_flags, false);
|
2000-06-08 21:24:52 +08:00
|
|
|
if (res && get_errno () == EMFILE)
|
|
|
|
break; /* The number of entries exceeds MAX_MOUNTS */
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* from_registry: Build the entire mount table from the registry. Also,
|
|
|
|
read in cygdrive-related information from its registry location. */
|
|
|
|
|
|
|
|
void
|
|
|
|
mount_info::from_registry ()
|
|
|
|
{
|
|
|
|
/* Use current mount areas if either user or system mount areas
|
|
|
|
already exist. Otherwise, import old mounts. */
|
|
|
|
|
|
|
|
reg_key r;
|
|
|
|
|
|
|
|
/* Retrieve cygdrive-related information. */
|
|
|
|
read_cygdrive_info_from_registry ();
|
|
|
|
|
|
|
|
nmounts = 0;
|
|
|
|
|
|
|
|
/* First read mounts from user's table. */
|
|
|
|
read_mounts (r);
|
|
|
|
|
|
|
|
/* Then read mounts from system-wide mount table. */
|
|
|
|
reg_key r1 (HKEY_LOCAL_MACHINE, KEY_READ, "SOFTWARE",
|
2001-10-25 05:56:54 +08:00
|
|
|
CYGWIN_INFO_CYGNUS_REGISTRY_NAME, CYGWIN_REGNAME,
|
2000-02-18 03:38:33 +08:00
|
|
|
CYGWIN_INFO_CYGWIN_MOUNT_REGISTRY_NAME,
|
|
|
|
NULL);
|
|
|
|
read_mounts (r1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* add_reg_mount: Add mount item to registry. Return zero on success,
|
|
|
|
non-zero on failure. */
|
|
|
|
/* FIXME: Need a mutex to avoid collisions with other tasks. */
|
|
|
|
|
|
|
|
int
|
|
|
|
mount_info::add_reg_mount (const char * native_path, const char * posix_path, unsigned mountflags)
|
|
|
|
{
|
2000-09-19 00:42:28 +08:00
|
|
|
int res = 0;
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Add the mount to the right registry location, depending on
|
|
|
|
whether MOUNT_SYSTEM is set in the mount flags. */
|
|
|
|
if (!(mountflags & MOUNT_SYSTEM)) /* current_user mount */
|
|
|
|
{
|
|
|
|
/* reg_key for user mounts in HKEY_CURRENT_USER. */
|
|
|
|
reg_key reg_user;
|
|
|
|
|
|
|
|
/* Start by deleting existing mount if one exists. */
|
2000-09-19 00:42:28 +08:00
|
|
|
res = reg_user.kill (posix_path);
|
|
|
|
if (res != ERROR_SUCCESS && res != ERROR_FILE_NOT_FOUND)
|
|
|
|
goto err;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
/* Create the new mount. */
|
|
|
|
reg_key subkey = reg_key (reg_user.get_key (),
|
|
|
|
KEY_ALL_ACCESS,
|
|
|
|
posix_path, NULL);
|
2000-09-19 00:42:28 +08:00
|
|
|
res = subkey.set_string ("native", native_path);
|
|
|
|
if (res != ERROR_SUCCESS)
|
|
|
|
goto err;
|
|
|
|
res = subkey.set_int ("flags", mountflags);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
else /* local_machine mount */
|
|
|
|
{
|
|
|
|
/* reg_key for system mounts in HKEY_LOCAL_MACHINE. */
|
|
|
|
reg_key reg_sys (HKEY_LOCAL_MACHINE, KEY_ALL_ACCESS, "SOFTWARE",
|
2001-10-25 05:56:54 +08:00
|
|
|
CYGWIN_INFO_CYGNUS_REGISTRY_NAME, CYGWIN_REGNAME,
|
2000-02-18 03:38:33 +08:00
|
|
|
CYGWIN_INFO_CYGWIN_MOUNT_REGISTRY_NAME,
|
|
|
|
NULL);
|
|
|
|
|
|
|
|
/* Start by deleting existing mount if one exists. */
|
2000-09-19 00:42:28 +08:00
|
|
|
res = reg_sys.kill (posix_path);
|
|
|
|
if (res != ERROR_SUCCESS && res != ERROR_FILE_NOT_FOUND)
|
|
|
|
goto err;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
/* Create the new mount. */
|
|
|
|
reg_key subkey = reg_key (reg_sys.get_key (),
|
|
|
|
KEY_ALL_ACCESS,
|
|
|
|
posix_path, NULL);
|
2000-09-19 00:42:28 +08:00
|
|
|
res = subkey.set_string ("native", native_path);
|
|
|
|
if (res != ERROR_SUCCESS)
|
|
|
|
goto err;
|
|
|
|
res = subkey.set_int ("flags", mountflags);
|
2001-01-28 14:23:42 +08:00
|
|
|
|
|
|
|
sys_mount_table_counter++;
|
|
|
|
cygwin_shared->sys_mount_table_counter++;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2001-03-05 14:28:25 +08:00
|
|
|
return 0; /* Success */
|
2000-09-19 00:42:28 +08:00
|
|
|
err:
|
|
|
|
__seterrno_from_win_error (res);
|
|
|
|
return -1;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* del_reg_mount: delete mount item from registry indicated in flags.
|
|
|
|
Return zero on success, non-zero on failure.*/
|
|
|
|
/* FIXME: Need a mutex to avoid collisions with other tasks. */
|
|
|
|
|
|
|
|
int
|
|
|
|
mount_info::del_reg_mount (const char * posix_path, unsigned flags)
|
|
|
|
{
|
2000-09-19 00:42:28 +08:00
|
|
|
int res;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-01-28 14:23:42 +08:00
|
|
|
if (!(flags & MOUNT_SYSTEM)) /* Delete from user registry */
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
reg_key reg_user (KEY_ALL_ACCESS,
|
|
|
|
CYGWIN_INFO_CYGWIN_MOUNT_REGISTRY_NAME, NULL);
|
2000-09-19 00:42:28 +08:00
|
|
|
res = reg_user.kill (posix_path);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2000-08-22 11:58:47 +08:00
|
|
|
else /* Delete from system registry */
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-01-28 14:23:42 +08:00
|
|
|
sys_mount_table_counter++;
|
|
|
|
cygwin_shared->sys_mount_table_counter++;
|
2000-02-18 03:38:33 +08:00
|
|
|
reg_key reg_sys (HKEY_LOCAL_MACHINE, KEY_ALL_ACCESS, "SOFTWARE",
|
2001-10-25 05:56:54 +08:00
|
|
|
CYGWIN_INFO_CYGNUS_REGISTRY_NAME, CYGWIN_REGNAME,
|
2000-02-18 03:38:33 +08:00
|
|
|
CYGWIN_INFO_CYGWIN_MOUNT_REGISTRY_NAME,
|
|
|
|
NULL);
|
2000-09-19 00:42:28 +08:00
|
|
|
res = reg_sys.kill (posix_path);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2000-09-19 00:42:28 +08:00
|
|
|
if (res != ERROR_SUCCESS)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2000-09-19 00:42:28 +08:00
|
|
|
__seterrno_from_win_error (res);
|
2000-02-18 03:38:33 +08:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-03-05 14:28:25 +08:00
|
|
|
return 0; /* Success */
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* read_cygdrive_info_from_registry: Read the default prefix and flags
|
|
|
|
to use when creating cygdrives from the special user registry
|
|
|
|
location used to store cygdrive information. */
|
|
|
|
|
|
|
|
void
|
|
|
|
mount_info::read_cygdrive_info_from_registry ()
|
|
|
|
{
|
2000-07-29 06:33:43 +08:00
|
|
|
/* reg_key for user path prefix in HKEY_CURRENT_USER. */
|
2000-02-18 03:38:33 +08:00
|
|
|
reg_key r;
|
|
|
|
|
2001-12-04 04:09:33 +08:00
|
|
|
if (r.get_string (CYGWIN_INFO_CYGDRIVE_PREFIX, cygdrive, sizeof (cygdrive), "") != 0)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2000-07-29 06:33:43 +08:00
|
|
|
/* Didn't find the user path prefix so check the system path prefix. */
|
|
|
|
|
|
|
|
/* reg_key for system path prefix in HKEY_LOCAL_MACHINE. */
|
2000-11-25 02:04:44 +08:00
|
|
|
reg_key r2 (HKEY_LOCAL_MACHINE, KEY_READ, "SOFTWARE",
|
2001-10-25 05:56:54 +08:00
|
|
|
CYGWIN_INFO_CYGNUS_REGISTRY_NAME, CYGWIN_REGNAME,
|
2000-07-29 06:33:43 +08:00
|
|
|
CYGWIN_INFO_CYGWIN_MOUNT_REGISTRY_NAME,
|
|
|
|
NULL);
|
|
|
|
|
2001-12-04 04:09:33 +08:00
|
|
|
if (r2.get_string (CYGWIN_INFO_CYGDRIVE_PREFIX, cygdrive,
|
|
|
|
sizeof (cygdrive), ""))
|
|
|
|
strcpy (cygdrive, CYGWIN_INFO_CYGDRIVE_DEFAULT_PREFIX);
|
2002-06-09 08:48:38 +08:00
|
|
|
cygdrive_flags = r2.get_int (CYGWIN_INFO_CYGDRIVE_FLAGS, MOUNT_CYGDRIVE);
|
2001-12-04 04:09:33 +08:00
|
|
|
slashify (cygdrive, cygdrive, 1);
|
|
|
|
cygdrive_len = strlen (cygdrive);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2002-06-09 08:48:38 +08:00
|
|
|
/* Fetch user cygdrive_flags from registry; returns MOUNT_CYGDRIVE on
|
2000-08-22 11:58:47 +08:00
|
|
|
error. */
|
2002-06-09 08:48:38 +08:00
|
|
|
cygdrive_flags = r.get_int (CYGWIN_INFO_CYGDRIVE_FLAGS, MOUNT_CYGDRIVE);
|
2000-02-18 03:38:33 +08:00
|
|
|
slashify (cygdrive, cygdrive, 1);
|
2002-09-22 11:38:57 +08:00
|
|
|
cygdrive_len = strlen (cygdrive);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* write_cygdrive_info_to_registry: Write the default prefix and flags
|
|
|
|
to use when creating cygdrives to the special user registry
|
|
|
|
location used to store cygdrive information. */
|
|
|
|
|
|
|
|
int
|
|
|
|
mount_info::write_cygdrive_info_to_registry (const char *cygdrive_prefix, unsigned flags)
|
|
|
|
{
|
2000-07-29 06:33:43 +08:00
|
|
|
/* Determine whether to modify user or system cygdrive path prefix. */
|
|
|
|
HKEY top = (flags & MOUNT_SYSTEM) ? HKEY_LOCAL_MACHINE : HKEY_CURRENT_USER;
|
|
|
|
|
2001-01-28 14:23:42 +08:00
|
|
|
if (flags & MOUNT_SYSTEM)
|
|
|
|
{
|
|
|
|
sys_mount_table_counter++;
|
|
|
|
cygwin_shared->sys_mount_table_counter++;
|
|
|
|
}
|
|
|
|
|
2000-07-29 06:33:43 +08:00
|
|
|
/* reg_key for user path prefix in HKEY_CURRENT_USER or system path prefix in
|
|
|
|
HKEY_LOCAL_MACHINE. */
|
|
|
|
reg_key r (top, KEY_ALL_ACCESS, "SOFTWARE",
|
2001-10-25 05:56:54 +08:00
|
|
|
CYGWIN_INFO_CYGNUS_REGISTRY_NAME, CYGWIN_REGNAME,
|
2000-07-29 06:33:43 +08:00
|
|
|
CYGWIN_INFO_CYGWIN_MOUNT_REGISTRY_NAME,
|
|
|
|
NULL);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
/* Verify cygdrive prefix starts with a forward slash and if there's
|
|
|
|
another character, it's not a slash. */
|
|
|
|
if ((cygdrive_prefix == NULL) || (*cygdrive_prefix == 0) ||
|
2000-04-21 13:32:19 +08:00
|
|
|
(!isslash (cygdrive_prefix[0])) ||
|
|
|
|
((cygdrive_prefix[1] != '\0') && (isslash (cygdrive_prefix[1]))))
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
char hold_cygdrive_prefix[strlen (cygdrive_prefix) + 1];
|
|
|
|
/* Ensure that there is never a final slash */
|
|
|
|
nofinalslash (cygdrive_prefix, hold_cygdrive_prefix);
|
|
|
|
|
2000-09-19 00:42:28 +08:00
|
|
|
int res;
|
2000-11-07 00:40:29 +08:00
|
|
|
res = r.set_string (CYGWIN_INFO_CYGDRIVE_PREFIX, hold_cygdrive_prefix);
|
2000-09-19 00:42:28 +08:00
|
|
|
if (res != ERROR_SUCCESS)
|
|
|
|
{
|
|
|
|
__seterrno_from_win_error (res);
|
|
|
|
return -1;
|
|
|
|
}
|
2000-11-07 00:40:29 +08:00
|
|
|
r.set_int (CYGWIN_INFO_CYGDRIVE_FLAGS, flags);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2000-07-29 06:33:43 +08:00
|
|
|
/* This also needs to go in the in-memory copy of "cygdrive", but only if
|
|
|
|
appropriate:
|
|
|
|
1. setting user path prefix, or
|
|
|
|
2. overwriting (a previous) system path prefix */
|
2001-01-28 14:23:42 +08:00
|
|
|
if (!(flags & MOUNT_SYSTEM) || (mount_table->cygdrive_flags & MOUNT_SYSTEM))
|
2000-07-29 06:33:43 +08:00
|
|
|
{
|
2001-01-28 13:51:15 +08:00
|
|
|
slashify (cygdrive_prefix, mount_table->cygdrive, 1);
|
|
|
|
mount_table->cygdrive_flags = flags;
|
2002-09-22 11:38:57 +08:00
|
|
|
mount_table->cygdrive_len = strlen (mount_table->cygdrive);
|
2000-07-29 06:33:43 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-07-29 06:33:43 +08:00
|
|
|
int
|
|
|
|
mount_info::remove_cygdrive_info_from_registry (const char *cygdrive_prefix, unsigned flags)
|
|
|
|
{
|
|
|
|
/* Determine whether to modify user or system cygdrive path prefix. */
|
|
|
|
HKEY top = (flags & MOUNT_SYSTEM) ? HKEY_LOCAL_MACHINE : HKEY_CURRENT_USER;
|
|
|
|
|
2001-01-28 14:23:42 +08:00
|
|
|
if (flags & MOUNT_SYSTEM)
|
|
|
|
{
|
|
|
|
sys_mount_table_counter++;
|
|
|
|
cygwin_shared->sys_mount_table_counter++;
|
|
|
|
}
|
|
|
|
|
2000-07-29 06:33:43 +08:00
|
|
|
/* reg_key for user path prefix in HKEY_CURRENT_USER or system path prefix in
|
|
|
|
HKEY_LOCAL_MACHINE. */
|
|
|
|
reg_key r (top, KEY_ALL_ACCESS, "SOFTWARE",
|
2001-10-25 05:56:54 +08:00
|
|
|
CYGWIN_INFO_CYGNUS_REGISTRY_NAME, CYGWIN_REGNAME,
|
2000-07-29 06:33:43 +08:00
|
|
|
CYGWIN_INFO_CYGWIN_MOUNT_REGISTRY_NAME,
|
|
|
|
NULL);
|
|
|
|
|
|
|
|
/* Delete cygdrive prefix and flags. */
|
2000-11-07 00:40:29 +08:00
|
|
|
int res = r.killvalue (CYGWIN_INFO_CYGDRIVE_PREFIX);
|
|
|
|
int res2 = r.killvalue (CYGWIN_INFO_CYGDRIVE_FLAGS);
|
2000-07-29 06:33:43 +08:00
|
|
|
|
|
|
|
/* Reinitialize the cygdrive path prefix to reflect to removal from the
|
|
|
|
registry. */
|
|
|
|
read_cygdrive_info_from_registry ();
|
|
|
|
|
|
|
|
return (res != ERROR_SUCCESS) ? res : res2;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2000-11-09 04:36:37 +08:00
|
|
|
mount_info::get_cygdrive_info (char *user, char *system, char* user_flags,
|
|
|
|
char* system_flags)
|
2000-07-29 06:33:43 +08:00
|
|
|
{
|
|
|
|
/* Get the user path prefix from HKEY_CURRENT_USER. */
|
|
|
|
reg_key r;
|
2000-11-07 00:40:29 +08:00
|
|
|
int res = r.get_string (CYGWIN_INFO_CYGDRIVE_PREFIX, user, MAX_PATH, "");
|
2000-07-29 06:33:43 +08:00
|
|
|
|
2000-11-09 04:36:37 +08:00
|
|
|
/* Get the user flags, if appropriate */
|
|
|
|
if (res == ERROR_SUCCESS)
|
|
|
|
{
|
2002-06-09 08:48:38 +08:00
|
|
|
int flags = r.get_int (CYGWIN_INFO_CYGDRIVE_FLAGS, MOUNT_CYGDRIVE);
|
2000-11-09 04:36:37 +08:00
|
|
|
strcpy (user_flags, (flags & MOUNT_BINARY) ? "binmode" : "textmode");
|
|
|
|
}
|
|
|
|
|
2000-07-29 06:33:43 +08:00
|
|
|
/* Get the system path prefix from HKEY_LOCAL_MACHINE. */
|
2000-11-25 02:04:44 +08:00
|
|
|
reg_key r2 (HKEY_LOCAL_MACHINE, KEY_READ, "SOFTWARE",
|
2001-10-25 05:56:54 +08:00
|
|
|
CYGWIN_INFO_CYGNUS_REGISTRY_NAME, CYGWIN_REGNAME,
|
2000-07-29 06:33:43 +08:00
|
|
|
CYGWIN_INFO_CYGWIN_MOUNT_REGISTRY_NAME,
|
|
|
|
NULL);
|
2000-11-07 00:40:29 +08:00
|
|
|
int res2 = r2.get_string (CYGWIN_INFO_CYGDRIVE_PREFIX, system, MAX_PATH, "");
|
2000-07-29 06:33:43 +08:00
|
|
|
|
2000-11-09 04:36:37 +08:00
|
|
|
/* Get the system flags, if appropriate */
|
|
|
|
if (res2 == ERROR_SUCCESS)
|
|
|
|
{
|
2002-06-09 08:48:38 +08:00
|
|
|
int flags = r2.get_int (CYGWIN_INFO_CYGDRIVE_FLAGS, MOUNT_CYGDRIVE);
|
2000-11-09 04:36:37 +08:00
|
|
|
strcpy (system_flags, (flags & MOUNT_BINARY) ? "binmode" : "textmode");
|
|
|
|
}
|
|
|
|
|
2000-07-29 06:33:43 +08:00
|
|
|
return (res != ERROR_SUCCESS) ? res : res2;
|
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
static mount_item *mounts_for_sort;
|
|
|
|
|
|
|
|
/* sort_by_posix_name: qsort callback to sort the mount entries. Sort
|
|
|
|
user mounts ahead of system mounts to the same POSIX path. */
|
|
|
|
/* FIXME: should the user should be able to choose whether to
|
|
|
|
prefer user or system mounts??? */
|
|
|
|
static int
|
|
|
|
sort_by_posix_name (const void *a, const void *b)
|
|
|
|
{
|
|
|
|
mount_item *ap = mounts_for_sort + (*((int*) a));
|
|
|
|
mount_item *bp = mounts_for_sort + (*((int*) b));
|
|
|
|
|
|
|
|
/* Base weighting on longest posix path first so that the most
|
|
|
|
obvious path will be chosen. */
|
|
|
|
size_t alen = strlen (ap->posix_path);
|
|
|
|
size_t blen = strlen (bp->posix_path);
|
|
|
|
|
|
|
|
int res = blen - alen;
|
|
|
|
|
|
|
|
if (res)
|
|
|
|
return res; /* Path lengths differed */
|
|
|
|
|
|
|
|
/* The two paths were the same length, so just determine normal
|
|
|
|
lexical sorted order. */
|
|
|
|
res = strcmp (ap->posix_path, bp->posix_path);
|
|
|
|
|
|
|
|
if (res == 0)
|
|
|
|
{
|
|
|
|
/* need to select between user and system mount to same POSIX path */
|
2001-01-28 14:23:42 +08:00
|
|
|
if (!(bp->flags & MOUNT_SYSTEM)) /* user mount */
|
2000-02-18 03:38:33 +08:00
|
|
|
return 1;
|
|
|
|
else
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* sort_by_native_name: qsort callback to sort the mount entries. Sort
|
|
|
|
user mounts ahead of system mounts to the same POSIX path. */
|
|
|
|
/* FIXME: should the user should be able to choose whether to
|
|
|
|
prefer user or system mounts??? */
|
|
|
|
static int
|
|
|
|
sort_by_native_name (const void *a, const void *b)
|
|
|
|
{
|
|
|
|
mount_item *ap = mounts_for_sort + (*((int*) a));
|
|
|
|
mount_item *bp = mounts_for_sort + (*((int*) b));
|
|
|
|
|
|
|
|
/* Base weighting on longest win32 path first so that the most
|
|
|
|
obvious path will be chosen. */
|
|
|
|
size_t alen = strlen (ap->native_path);
|
|
|
|
size_t blen = strlen (bp->native_path);
|
|
|
|
|
|
|
|
int res = blen - alen;
|
|
|
|
|
|
|
|
if (res)
|
|
|
|
return res; /* Path lengths differed */
|
|
|
|
|
|
|
|
/* The two paths were the same length, so just determine normal
|
|
|
|
lexical sorted order. */
|
2000-07-02 01:30:35 +08:00
|
|
|
res = strcmp (ap->native_path, bp->native_path);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
if (res == 0)
|
|
|
|
{
|
|
|
|
/* need to select between user and system mount to same POSIX path */
|
2001-01-28 14:23:42 +08:00
|
|
|
if (!(bp->flags & MOUNT_SYSTEM)) /* user mount */
|
2000-02-18 03:38:33 +08:00
|
|
|
return 1;
|
|
|
|
else
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
mount_info::sort ()
|
|
|
|
{
|
|
|
|
for (int i = 0; i < nmounts; i++)
|
|
|
|
native_sorted[i] = posix_sorted[i] = i;
|
|
|
|
/* Sort them into reverse length order, otherwise we won't
|
|
|
|
be able to look for /foo in /. */
|
|
|
|
mounts_for_sort = mount; /* ouch. */
|
|
|
|
qsort (posix_sorted, nmounts, sizeof (posix_sorted[0]), sort_by_posix_name);
|
|
|
|
qsort (native_sorted, nmounts, sizeof (native_sorted[0]), sort_by_native_name);
|
|
|
|
}
|
|
|
|
|
2000-06-08 21:24:52 +08:00
|
|
|
/* Add an entry to the mount table.
|
2000-02-18 03:38:33 +08:00
|
|
|
Returns 0 on success, -1 on failure and errno is set.
|
|
|
|
|
|
|
|
This is where all argument validation is done. It may not make sense to
|
|
|
|
do this when called internally, but it's cleaner to keep it all here. */
|
|
|
|
|
|
|
|
int
|
2000-06-08 21:24:52 +08:00
|
|
|
mount_info::add_item (const char *native, const char *posix, unsigned mountflags, int reg_p)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
/* Something's wrong if either path is NULL or empty, or if it's
|
|
|
|
not a UNC or absolute path. */
|
|
|
|
|
|
|
|
if ((native == NULL) || (*native == 0) ||
|
|
|
|
(posix == NULL) || (*posix == 0) ||
|
2000-09-19 00:42:28 +08:00
|
|
|
!isabspath (native) || !isabspath (posix) ||
|
|
|
|
slash_unc_prefix_p (posix) || isdrive (posix))
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Make sure both paths do not end in /. */
|
|
|
|
char nativetmp[MAX_PATH];
|
|
|
|
char posixtmp[MAX_PATH];
|
|
|
|
|
2001-05-25 11:13:14 +08:00
|
|
|
backslashify (native, nativetmp, 0);
|
2000-06-16 03:44:50 +08:00
|
|
|
nofinalslash (nativetmp, nativetmp);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
slashify (posix, posixtmp, 0);
|
|
|
|
nofinalslash (posixtmp, posixtmp);
|
|
|
|
|
|
|
|
debug_printf ("%s[%s], %s[%s], %p",
|
|
|
|
native, nativetmp, posix, posixtmp, mountflags);
|
|
|
|
|
|
|
|
/* Duplicate /'s in path are an error. */
|
|
|
|
for (char *p = posixtmp + 1; *p; ++p)
|
|
|
|
{
|
|
|
|
if (p[-1] == '/' && p[0] == '/')
|
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Write over an existing mount item with the same POSIX path if
|
|
|
|
it exists and is from the same registry area. */
|
2000-06-08 21:24:52 +08:00
|
|
|
int i;
|
|
|
|
for (i = 0; i < nmounts; i++)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2000-06-08 21:24:52 +08:00
|
|
|
if (strcasematch (mount[i].posix_path, posixtmp) &&
|
|
|
|
(mount[i].flags & MOUNT_SYSTEM) == (mountflags & MOUNT_SYSTEM))
|
|
|
|
break;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2000-09-19 00:42:28 +08:00
|
|
|
if (i == nmounts && nmounts == MAX_MOUNTS)
|
2000-06-08 21:24:52 +08:00
|
|
|
{
|
2000-09-19 00:42:28 +08:00
|
|
|
set_errno (EMFILE);
|
|
|
|
return -1;
|
2000-06-08 21:24:52 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (reg_p && add_reg_mount (nativetmp, posixtmp, mountflags))
|
|
|
|
return -1;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2000-09-19 00:42:28 +08:00
|
|
|
if (i == nmounts)
|
|
|
|
nmounts++;
|
2000-06-08 21:24:52 +08:00
|
|
|
mount[i].init (nativetmp, posixtmp, mountflags);
|
2000-02-18 03:38:33 +08:00
|
|
|
sort ();
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Delete a mount table entry where path is either a Win32 or POSIX
|
|
|
|
path. Since the mount table is really just a table of aliases,
|
|
|
|
deleting / is ok (although running without a slash mount is
|
|
|
|
strongly discouraged because some programs may run erratically
|
|
|
|
without one). If MOUNT_SYSTEM is set in flags, remove from system
|
|
|
|
registry, otherwise remove the user registry mount.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
2000-06-08 21:24:52 +08:00
|
|
|
mount_info::del_item (const char *path, unsigned flags, int reg_p)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
char pathtmp[MAX_PATH];
|
2001-12-07 13:03:32 +08:00
|
|
|
int posix_path_p = false;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
/* Something's wrong if path is NULL or empty. */
|
2000-06-16 03:44:50 +08:00
|
|
|
if (path == NULL || *path == 0 || !isabspath (path))
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-05-25 11:13:14 +08:00
|
|
|
if (slash_unc_prefix_p (path) || strpbrk (path, ":\\"))
|
|
|
|
backslashify (path, pathtmp, 0);
|
2000-06-16 03:44:50 +08:00
|
|
|
else
|
|
|
|
{
|
|
|
|
slashify (path, pathtmp, 0);
|
|
|
|
posix_path_p = TRUE;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
nofinalslash (pathtmp, pathtmp);
|
|
|
|
|
2000-06-16 03:44:50 +08:00
|
|
|
if (reg_p && posix_path_p &&
|
|
|
|
del_reg_mount (pathtmp, flags) &&
|
|
|
|
del_reg_mount (path, flags)) /* for old irregular entries */
|
2000-06-08 21:24:52 +08:00
|
|
|
return -1;
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
for (int i = 0; i < nmounts; i++)
|
|
|
|
{
|
2000-06-16 03:44:50 +08:00
|
|
|
int ent = native_sorted[i]; /* in the same order as getmntent() */
|
|
|
|
if (((posix_path_p)
|
|
|
|
? strcasematch (mount[ent].posix_path, pathtmp)
|
|
|
|
: strcasematch (mount[ent].native_path, pathtmp)) &&
|
|
|
|
(mount[ent].flags & MOUNT_SYSTEM) == (flags & MOUNT_SYSTEM))
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2000-06-16 03:44:50 +08:00
|
|
|
if (!posix_path_p &&
|
|
|
|
reg_p && del_reg_mount (mount[ent].posix_path, flags))
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
nmounts--; /* One less mount table entry */
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Fill in the hole if not at the end of the table */
|
2000-06-16 03:44:50 +08:00
|
|
|
if (ent < nmounts)
|
|
|
|
memmove (mount + ent, mount + ent + 1,
|
|
|
|
sizeof (mount[ent]) * (nmounts - ent));
|
|
|
|
sort (); /* Resort the table */
|
2000-02-18 03:38:33 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/************************* mount_item class ****************************/
|
|
|
|
|
2001-04-01 11:06:02 +08:00
|
|
|
static mntent *
|
|
|
|
fillout_mntent (const char *native_path, const char *posix_path, unsigned flags)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
#ifdef _MT_SAFE
|
2002-09-22 11:38:57 +08:00
|
|
|
struct mntent &ret=_reent_winsup ()->mntbuf;
|
2000-02-18 03:38:33 +08:00
|
|
|
#else
|
|
|
|
static NO_COPY struct mntent ret;
|
|
|
|
#endif
|
|
|
|
|
2001-04-01 13:09:57 +08:00
|
|
|
/* Remove drivenum from list if we see a x: style path */
|
|
|
|
if (strlen (native_path) == 2 && native_path[1] == ':')
|
|
|
|
{
|
2001-11-22 13:59:07 +08:00
|
|
|
int drivenum = cyg_tolower (native_path[0]) - 'a';
|
2001-04-01 13:09:57 +08:00
|
|
|
if (drivenum >= 0 && drivenum <= 31)
|
|
|
|
available_drives &= ~(1 << drivenum);
|
|
|
|
}
|
|
|
|
|
2001-01-28 13:51:15 +08:00
|
|
|
/* Pass back pointers to mount_table strings reserved for use by
|
2000-02-18 03:38:33 +08:00
|
|
|
getmntent rather than pointers to strings in the internal mount
|
|
|
|
table because the mount table might change, causing weird effects
|
|
|
|
from the getmntent user's point of view. */
|
|
|
|
|
2001-04-02 12:27:12 +08:00
|
|
|
strcpy (_reent_winsup ()->mnt_fsname, native_path);
|
|
|
|
ret.mnt_fsname = _reent_winsup ()->mnt_fsname;
|
|
|
|
strcpy (_reent_winsup ()->mnt_dir, posix_path);
|
|
|
|
ret.mnt_dir = _reent_winsup ()->mnt_dir;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2000-08-22 11:58:47 +08:00
|
|
|
if (!(flags & MOUNT_SYSTEM)) /* user mount */
|
2001-04-02 12:27:12 +08:00
|
|
|
strcpy (_reent_winsup ()->mnt_type, (char *) "user");
|
2000-08-22 11:58:47 +08:00
|
|
|
else /* system mount */
|
2001-04-02 12:27:12 +08:00
|
|
|
strcpy (_reent_winsup ()->mnt_type, (char *) "system");
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-04-02 12:27:12 +08:00
|
|
|
ret.mnt_type = _reent_winsup ()->mnt_type;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
/* mnt_opts is a string that details mount params such as
|
|
|
|
binary or textmode, or exec. We don't print
|
|
|
|
`silent' here; it's a magic internal thing. */
|
|
|
|
|
2001-03-05 14:28:25 +08:00
|
|
|
if (!(flags & MOUNT_BINARY))
|
2001-04-02 12:27:12 +08:00
|
|
|
strcpy (_reent_winsup ()->mnt_opts, (char *) "textmode");
|
2000-02-18 03:38:33 +08:00
|
|
|
else
|
2001-04-02 12:27:12 +08:00
|
|
|
strcpy (_reent_winsup ()->mnt_opts, (char *) "binmode");
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2000-04-26 13:13:32 +08:00
|
|
|
if (flags & MOUNT_CYGWIN_EXEC)
|
2001-04-02 12:27:12 +08:00
|
|
|
strcat (_reent_winsup ()->mnt_opts, (char *) ",cygexec");
|
2000-04-26 13:13:32 +08:00
|
|
|
else if (flags & MOUNT_EXEC)
|
2001-04-02 12:27:12 +08:00
|
|
|
strcat (_reent_winsup ()->mnt_opts, (char *) ",exec");
|
2002-05-12 11:08:59 +08:00
|
|
|
else if (flags & MOUNT_NOTEXEC)
|
|
|
|
strcat (_reent_winsup ()->mnt_opts, (char *) ",noexec");
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2002-06-09 08:48:38 +08:00
|
|
|
if ((flags & MOUNT_CYGDRIVE)) /* cygdrive */
|
2001-04-02 12:27:12 +08:00
|
|
|
strcat (_reent_winsup ()->mnt_opts, (char *) ",noumount");
|
2000-04-26 13:13:32 +08:00
|
|
|
|
2001-04-02 12:27:12 +08:00
|
|
|
ret.mnt_opts = _reent_winsup ()->mnt_opts;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
ret.mnt_freq = 1;
|
|
|
|
ret.mnt_passno = 1;
|
|
|
|
return &ret;
|
|
|
|
}
|
|
|
|
|
2001-04-01 11:06:02 +08:00
|
|
|
struct mntent *
|
|
|
|
mount_item::getmntent ()
|
|
|
|
{
|
|
|
|
return fillout_mntent (native_path, posix_path, flags);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct mntent *
|
|
|
|
cygdrive_getmntent ()
|
|
|
|
{
|
2001-04-01 13:09:57 +08:00
|
|
|
char native_path[4];
|
|
|
|
char posix_path[MAX_PATH];
|
|
|
|
DWORD mask = 1, drive = 'a';
|
|
|
|
struct mntent *ret = NULL;
|
2001-04-01 11:06:02 +08:00
|
|
|
|
2001-04-01 13:09:57 +08:00
|
|
|
while (available_drives)
|
|
|
|
{
|
|
|
|
for (/* nothing */; drive <= 'z'; mask <<= 1, drive++)
|
|
|
|
if (available_drives & mask)
|
|
|
|
break;
|
2001-04-01 11:06:02 +08:00
|
|
|
|
2001-04-01 13:09:57 +08:00
|
|
|
__small_sprintf (native_path, "%c:\\", drive);
|
|
|
|
if (GetDriveType (native_path) == DRIVE_REMOVABLE ||
|
2002-01-15 04:39:59 +08:00
|
|
|
GetFileAttributes (native_path) == INVALID_FILE_ATTRIBUTES)
|
2001-06-04 09:28:09 +08:00
|
|
|
{
|
2001-04-01 13:09:57 +08:00
|
|
|
available_drives &= ~mask;
|
|
|
|
continue;
|
2001-06-04 09:28:09 +08:00
|
|
|
}
|
2001-04-01 13:09:57 +08:00
|
|
|
native_path[2] = '\0';
|
|
|
|
__small_sprintf (posix_path, "%s%c", mount_table->cygdrive, drive);
|
|
|
|
ret = fillout_mntent (native_path, posix_path, mount_table->cygdrive_flags);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
2001-04-01 11:06:02 +08:00
|
|
|
}
|
2001-06-11 11:38:32 +08:00
|
|
|
|
2001-04-01 11:06:02 +08:00
|
|
|
struct mntent *
|
|
|
|
mount_info::getmntent (int x)
|
|
|
|
{
|
|
|
|
if (x < 0 || x >= nmounts)
|
|
|
|
return cygdrive_getmntent ();
|
|
|
|
|
|
|
|
return mount[native_sorted[x]].getmntent ();
|
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Fill in the fields of a mount table entry. */
|
|
|
|
|
|
|
|
void
|
|
|
|
mount_item::init (const char *native, const char *posix, unsigned mountflags)
|
|
|
|
{
|
|
|
|
strcpy ((char *) native_path, native);
|
|
|
|
strcpy ((char *) posix_path, posix);
|
|
|
|
|
|
|
|
native_pathlen = strlen (native_path);
|
|
|
|
posix_pathlen = strlen (posix_path);
|
|
|
|
|
|
|
|
flags = mountflags;
|
|
|
|
}
|
|
|
|
|
|
|
|
/********************** Mount System Calls **************************/
|
|
|
|
|
|
|
|
/* Mount table system calls.
|
|
|
|
Note that these are exported to the application. */
|
|
|
|
|
|
|
|
/* mount: Add a mount to the mount table in memory and to the registry
|
|
|
|
that will cause paths under win32_path to be translated to paths
|
|
|
|
under posix_path. */
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
mount (const char *win32_path, const char *posix_path, unsigned flags)
|
|
|
|
{
|
|
|
|
int res = -1;
|
|
|
|
|
2002-06-09 08:48:38 +08:00
|
|
|
if (flags & MOUNT_CYGDRIVE) /* normal mount */
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2002-06-09 08:48:38 +08:00
|
|
|
/* When flags include MOUNT_CYGDRIVE, take this to mean that
|
2000-02-18 03:38:33 +08:00
|
|
|
we actually want to change the cygdrive prefix and flags
|
|
|
|
without actually mounting anything. */
|
2001-01-28 13:51:15 +08:00
|
|
|
res = mount_table->write_cygdrive_info_to_registry (posix_path, flags);
|
2000-02-18 03:38:33 +08:00
|
|
|
win32_path = NULL;
|
|
|
|
}
|
|
|
|
else
|
2001-01-28 13:51:15 +08:00
|
|
|
res = mount_table->add_item (win32_path, posix_path, flags, TRUE);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
syscall_printf ("%d = mount (%s, %s, %p)", res, win32_path, posix_path, flags);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* umount: The standard umount call only has a path parameter. Since
|
|
|
|
it is not possible for this call to specify whether to remove the
|
|
|
|
mount from the user or global mount registry table, assume the user
|
|
|
|
table. */
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
umount (const char *path)
|
|
|
|
{
|
|
|
|
return cygwin_umount (path, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* cygwin_umount: This is like umount but takes an additional flags
|
|
|
|
parameter that specifies whether to umount from the user or system-wide
|
|
|
|
registry area. */
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
cygwin_umount (const char *path, unsigned flags)
|
|
|
|
{
|
2000-07-29 06:33:43 +08:00
|
|
|
int res = -1;
|
|
|
|
|
2002-06-09 08:48:38 +08:00
|
|
|
if (flags & MOUNT_CYGDRIVE)
|
2000-07-29 06:33:43 +08:00
|
|
|
{
|
2002-06-09 08:48:38 +08:00
|
|
|
/* When flags include MOUNT_CYGDRIVE, take this to mean that we actually want
|
2000-08-22 11:58:47 +08:00
|
|
|
to remove the cygdrive prefix and flags without actually unmounting
|
2000-07-29 06:33:43 +08:00
|
|
|
anything. */
|
2001-01-28 13:51:15 +08:00
|
|
|
res = mount_table->remove_cygdrive_info_from_registry (path, flags);
|
2000-07-29 06:33:43 +08:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2001-01-28 13:51:15 +08:00
|
|
|
res = mount_table->del_item (path, flags, TRUE);
|
2000-07-29 06:33:43 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
syscall_printf ("%d = cygwin_umount (%s, %d)", res, path, flags);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" FILE *
|
2000-02-18 03:38:33 +08:00
|
|
|
setmntent (const char *filep, const char *)
|
|
|
|
{
|
|
|
|
iteration = 0;
|
2001-04-01 11:06:02 +08:00
|
|
|
available_drives = GetLogicalDrives ();
|
2000-02-18 03:38:33 +08:00
|
|
|
return (FILE *) filep;
|
|
|
|
}
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" struct mntent *
|
2000-02-18 03:38:33 +08:00
|
|
|
getmntent (FILE *)
|
|
|
|
{
|
2001-01-28 13:51:15 +08:00
|
|
|
return mount_table->getmntent (iteration++);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
endmntent (FILE *)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/********************** Symbolic Link Support **************************/
|
|
|
|
|
2001-06-05 18:45:52 +08:00
|
|
|
/* Read symlink from Extended Attribute */
|
|
|
|
int
|
|
|
|
get_symlink_ea (const char* frompath, char* buf, int buf_size)
|
|
|
|
{
|
|
|
|
int res = NTReadEA (frompath, SYMLINK_EA_NAME, buf, buf_size);
|
|
|
|
if (res == 0)
|
|
|
|
debug_printf ("Cannot read symlink from EA");
|
|
|
|
return (res - 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Save symlink to Extended Attribute */
|
|
|
|
BOOL
|
|
|
|
set_symlink_ea (const char* frompath, const char* topath)
|
|
|
|
{
|
|
|
|
if (!NTWriteEA (frompath, SYMLINK_EA_NAME, topath, strlen (topath) + 1))
|
|
|
|
{
|
|
|
|
debug_printf ("Cannot save symlink in EA");
|
2001-12-07 13:03:32 +08:00
|
|
|
return false;
|
2001-06-05 18:45:52 +08:00
|
|
|
}
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Create a symlink from FROMPATH to TOPATH. */
|
|
|
|
|
2001-12-07 13:03:32 +08:00
|
|
|
/* If TRUE create symlinks as Windows shortcuts, if false create symlinks
|
2001-03-02 19:41:09 +08:00
|
|
|
as normal files with magic number and system bit set. */
|
|
|
|
int allow_winsymlinks = TRUE;
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
symlink (const char *topath, const char *frompath)
|
|
|
|
{
|
|
|
|
HANDLE h;
|
|
|
|
int res = -1;
|
2001-03-02 19:41:09 +08:00
|
|
|
path_conv win32_path, win32_topath;
|
2001-02-25 17:34:00 +08:00
|
|
|
char from[MAX_PATH + 5];
|
2001-02-23 00:26:13 +08:00
|
|
|
char cwd[MAX_PATH + 1], *cp = NULL, c = 0;
|
2001-02-23 00:14:59 +08:00
|
|
|
char w32topath[MAX_PATH + 1];
|
2001-03-02 19:41:09 +08:00
|
|
|
DWORD written;
|
2001-08-07 23:09:54 +08:00
|
|
|
SECURITY_ATTRIBUTES sa = sec_none_nih;
|
2001-03-02 19:41:09 +08:00
|
|
|
|
2001-09-16 22:26:11 +08:00
|
|
|
/* POSIX says that empty 'frompath' is invalid input whlie empty
|
|
|
|
'topath' is valid -- it's symlink resolver job to verify if
|
2001-11-05 14:09:15 +08:00
|
|
|
symlink contents point to existing filesystem object */
|
2001-09-16 22:26:11 +08:00
|
|
|
if (check_null_empty_str_errno (topath) == EFAULT ||
|
|
|
|
check_null_empty_str_errno (frompath))
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
if (strlen (topath) >= MAX_PATH)
|
|
|
|
{
|
|
|
|
set_errno (ENAMETOOLONG);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2001-04-13 05:21:37 +08:00
|
|
|
win32_path.check (frompath, PC_SYM_NOFOLLOW);
|
2002-01-24 00:50:17 +08:00
|
|
|
if (allow_winsymlinks && !win32_path.exists ())
|
2001-03-02 19:41:09 +08:00
|
|
|
{
|
|
|
|
strcpy (from, frompath);
|
|
|
|
strcat (from, ".lnk");
|
|
|
|
win32_path.check (from, PC_SYM_NOFOLLOW);
|
|
|
|
}
|
2001-02-22 05:49:37 +08:00
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
if (win32_path.error)
|
|
|
|
{
|
2001-04-13 05:21:37 +08:00
|
|
|
set_errno (win32_path.case_clash ? ECASECLASH : win32_path.error);
|
2000-02-18 03:38:33 +08:00
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
syscall_printf ("symlink (%s, %s)", topath, win32_path.get_win32 ());
|
|
|
|
|
2001-10-01 12:10:07 +08:00
|
|
|
if (win32_path.is_device () || win32_path.exists ())
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
set_errno (EEXIST);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2001-03-02 19:41:09 +08:00
|
|
|
if (allow_winsymlinks)
|
|
|
|
{
|
|
|
|
if (!isabspath (topath))
|
|
|
|
{
|
|
|
|
getcwd (cwd, MAX_PATH + 1);
|
|
|
|
if ((cp = strrchr (from, '/')) || (cp = strrchr (from, '\\')))
|
|
|
|
{
|
|
|
|
c = *cp;
|
|
|
|
*cp = '\0';
|
|
|
|
chdir (from);
|
|
|
|
}
|
|
|
|
backslashify (topath, w32topath, 0);
|
|
|
|
}
|
2002-01-15 04:39:59 +08:00
|
|
|
if (!cp || GetFileAttributes (w32topath) == INVALID_FILE_ATTRIBUTES)
|
2001-03-02 19:41:09 +08:00
|
|
|
{
|
|
|
|
win32_topath.check (topath, PC_SYM_NOFOLLOW);
|
|
|
|
if (!cp || win32_topath.error != ENOENT)
|
|
|
|
strcpy (w32topath, win32_topath);
|
|
|
|
}
|
|
|
|
if (cp)
|
|
|
|
{
|
|
|
|
*cp = c;
|
|
|
|
chdir (cwd);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2001-08-07 23:09:54 +08:00
|
|
|
if (allow_ntsec && win32_path.has_acls ())
|
2003-02-05 03:26:01 +08:00
|
|
|
set_security_attribute (S_IFLNK | STD_RBITS | STD_WBITS,
|
2001-09-06 11:39:18 +08:00
|
|
|
&sa, alloca (4096), 4096);
|
2001-08-07 23:09:54 +08:00
|
|
|
|
2002-09-06 12:39:49 +08:00
|
|
|
h = CreateFile (win32_path, GENERIC_WRITE, 0, &sa,
|
2002-05-28 09:55:40 +08:00
|
|
|
CREATE_NEW, FILE_ATTRIBUTE_NORMAL, 0);
|
2000-02-18 03:38:33 +08:00
|
|
|
if (h == INVALID_HANDLE_VALUE)
|
2001-11-14 05:49:06 +08:00
|
|
|
__seterrno ();
|
2000-02-18 03:38:33 +08:00
|
|
|
else
|
|
|
|
{
|
2001-03-02 19:41:09 +08:00
|
|
|
BOOL success;
|
|
|
|
|
|
|
|
if (allow_winsymlinks)
|
|
|
|
{
|
|
|
|
create_shortcut_header ();
|
|
|
|
/* Don't change the datatypes of `len' and `win_len' since
|
|
|
|
their sizeof is used when writing. */
|
|
|
|
unsigned short len = strlen (topath);
|
|
|
|
unsigned short win_len = strlen (w32topath);
|
|
|
|
success = WriteFile (h, shortcut_header, SHORTCUT_HDR_SIZE,
|
2001-06-04 09:28:09 +08:00
|
|
|
&written, NULL)
|
2001-03-02 19:41:09 +08:00
|
|
|
&& written == SHORTCUT_HDR_SIZE
|
|
|
|
&& WriteFile (h, &len, sizeof len, &written, NULL)
|
|
|
|
&& written == sizeof len
|
|
|
|
&& WriteFile (h, topath, len, &written, NULL)
|
|
|
|
&& written == len
|
|
|
|
&& WriteFile (h, &win_len, sizeof win_len, &written, NULL)
|
|
|
|
&& written == sizeof win_len
|
|
|
|
&& WriteFile (h, w32topath, win_len, &written, NULL)
|
|
|
|
&& written == win_len;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* This is the old technique creating a symlink. */
|
|
|
|
char buf[sizeof (SYMLINK_COOKIE) + MAX_PATH + 10];
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-03-02 19:41:09 +08:00
|
|
|
__small_sprintf (buf, "%s%s", SYMLINK_COOKIE, topath);
|
|
|
|
DWORD len = strlen (buf) + 1;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-03-02 19:41:09 +08:00
|
|
|
/* Note that the terminating nul is written. */
|
|
|
|
success = WriteFile (h, buf, len, &written, NULL)
|
2001-06-04 09:28:09 +08:00
|
|
|
|| written != len;
|
2001-03-02 19:41:09 +08:00
|
|
|
|
|
|
|
}
|
|
|
|
if (success)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
CloseHandle (h);
|
2001-08-07 23:09:54 +08:00
|
|
|
if (!allow_ntsec && allow_ntea)
|
|
|
|
set_file_attribute (win32_path.has_acls (),
|
|
|
|
win32_path.get_win32 (),
|
|
|
|
S_IFLNK | S_IRWXU | S_IRWXG | S_IRWXO);
|
2001-11-14 05:49:06 +08:00
|
|
|
|
|
|
|
DWORD attr = allow_winsymlinks ? FILE_ATTRIBUTE_READONLY
|
2002-05-28 09:55:40 +08:00
|
|
|
: FILE_ATTRIBUTE_SYSTEM;
|
2001-11-14 05:49:06 +08:00
|
|
|
#ifdef HIDDEN_DOT_FILES
|
|
|
|
cp = strrchr (win32_path, '\\');
|
|
|
|
if ((cp && cp[1] == '.') || *win32_path == '.')
|
|
|
|
attr |= FILE_ATTRIBUTE_HIDDEN;
|
|
|
|
#endif
|
2001-11-22 13:59:07 +08:00
|
|
|
SetFileAttributes (win32_path.get_win32 (), attr);
|
2001-11-14 05:49:06 +08:00
|
|
|
|
2001-06-05 18:45:52 +08:00
|
|
|
if (win32_path.fs_fast_ea ())
|
2001-06-11 11:38:32 +08:00
|
|
|
set_symlink_ea (win32_path, topath);
|
2000-02-18 03:38:33 +08:00
|
|
|
res = 0;
|
|
|
|
}
|
2001-02-22 05:49:37 +08:00
|
|
|
else
|
|
|
|
{
|
|
|
|
__seterrno ();
|
|
|
|
CloseHandle (h);
|
|
|
|
DeleteFileA (win32_path.get_win32 ());
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
syscall_printf ("%d = symlink (%s, %s)", res, topath, frompath);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2002-09-04 21:11:29 +08:00
|
|
|
static BOOL
|
|
|
|
cmp_shortcut_header (const char *file_header)
|
|
|
|
{
|
|
|
|
create_shortcut_header ();
|
|
|
|
return memcmp (shortcut_header, file_header, SHORTCUT_HDR_SIZE);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
check_shortcut (const char *path, DWORD fileattr, HANDLE h,
|
|
|
|
char *contents, int *error, unsigned *pflags)
|
|
|
|
{
|
|
|
|
char file_header[SHORTCUT_HDR_SIZE];
|
|
|
|
unsigned short len;
|
|
|
|
int res = 0;
|
|
|
|
DWORD got = 0;
|
|
|
|
|
|
|
|
/* Valid Cygwin & U/WIN shortcuts are R/O. */
|
|
|
|
if (!(fileattr & FILE_ATTRIBUTE_READONLY))
|
|
|
|
goto file_not_symlink;
|
|
|
|
/* Read the files header information. This is used to check for a
|
|
|
|
Cygwin or U/WIN shortcut or later to check for executable files. */
|
|
|
|
if (!ReadFile (h, file_header, SHORTCUT_HDR_SIZE, &got, 0))
|
|
|
|
{
|
|
|
|
*error = EIO;
|
|
|
|
goto close_it;
|
|
|
|
}
|
|
|
|
/* Check header if the shortcut is really created by Cygwin or U/WIN. */
|
|
|
|
if (got != SHORTCUT_HDR_SIZE || cmp_shortcut_header (file_header))
|
|
|
|
goto file_not_symlink;
|
|
|
|
/* Next 2 byte are USHORT, containing length of description entry. */
|
|
|
|
if (!ReadFile (h, &len, sizeof len, &got, 0))
|
|
|
|
{
|
|
|
|
*error = EIO;
|
|
|
|
goto close_it;
|
|
|
|
}
|
|
|
|
if (got != sizeof len || len == 0 || len > MAX_PATH)
|
|
|
|
goto file_not_symlink;
|
|
|
|
/* Now read description entry. */
|
|
|
|
if (!ReadFile (h, contents, len, &got, 0))
|
|
|
|
{
|
|
|
|
*error = EIO;
|
|
|
|
goto close_it;
|
|
|
|
}
|
|
|
|
if (got != len)
|
|
|
|
goto file_not_symlink;
|
|
|
|
contents[len] = '\0';
|
|
|
|
res = len;
|
|
|
|
if (res) /* It's a symlink. */
|
|
|
|
*pflags = PATH_SYMLINK;
|
|
|
|
goto close_it;
|
|
|
|
|
|
|
|
file_not_symlink:
|
|
|
|
/* Not a symlink, see if executable. */
|
|
|
|
if (!(*pflags & PATH_ALL_EXEC) && has_exec_chars (file_header, got))
|
|
|
|
*pflags |= PATH_EXEC;
|
|
|
|
|
|
|
|
close_it:
|
|
|
|
CloseHandle (h);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2001-02-22 20:56:36 +08:00
|
|
|
static int
|
|
|
|
check_sysfile (const char *path, DWORD fileattr, HANDLE h,
|
|
|
|
char *contents, int *error, unsigned *pflags)
|
2001-02-22 05:49:37 +08:00
|
|
|
{
|
|
|
|
char cookie_buf[sizeof (SYMLINK_COOKIE) - 1];
|
|
|
|
DWORD got;
|
|
|
|
int res = 0;
|
|
|
|
|
2001-03-05 14:28:25 +08:00
|
|
|
if (!ReadFile (h, cookie_buf, sizeof (cookie_buf), &got, 0))
|
2001-02-22 05:49:37 +08:00
|
|
|
{
|
|
|
|
debug_printf ("ReadFile1 failed");
|
2001-02-22 20:56:36 +08:00
|
|
|
*error = EIO;
|
2001-02-22 05:49:37 +08:00
|
|
|
}
|
|
|
|
else if (got == sizeof (cookie_buf)
|
|
|
|
&& memcmp (cookie_buf, SYMLINK_COOKIE, sizeof (cookie_buf)) == 0)
|
|
|
|
{
|
|
|
|
/* It's a symlink. */
|
2001-02-22 20:56:36 +08:00
|
|
|
*pflags = PATH_SYMLINK;
|
2001-02-22 05:49:37 +08:00
|
|
|
|
|
|
|
res = ReadFile (h, contents, MAX_PATH + 1, &got, 0);
|
|
|
|
if (!res)
|
|
|
|
{
|
|
|
|
debug_printf ("ReadFile2 failed");
|
2001-02-22 20:56:36 +08:00
|
|
|
*error = EIO;
|
2001-02-22 05:49:37 +08:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Versions prior to b16 stored several trailing
|
|
|
|
NULs with the path (to fill the path out to 1024
|
|
|
|
chars). Current versions only store one trailing
|
|
|
|
NUL. The length returned is the path without
|
|
|
|
*any* trailing NULs. We also have to handle (or
|
|
|
|
at least not die from) corrupted paths. */
|
|
|
|
if (memchr (contents, 0, got) != NULL)
|
|
|
|
res = strlen (contents);
|
|
|
|
else
|
|
|
|
res = got;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if (got == sizeof (cookie_buf)
|
|
|
|
&& memcmp (cookie_buf, SOCKET_COOKIE, sizeof (cookie_buf)) == 0)
|
2001-02-22 20:56:36 +08:00
|
|
|
*pflags |= PATH_SOCKET;
|
2001-02-22 05:49:37 +08:00
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Not a symlink, see if executable. */
|
2001-03-05 14:28:25 +08:00
|
|
|
if (*pflags & PATH_ALL_EXEC)
|
|
|
|
/* Nothing to do */;
|
|
|
|
else if (has_exec_chars (cookie_buf, got))
|
2001-02-22 20:56:36 +08:00
|
|
|
*pflags |= PATH_EXEC;
|
2001-03-05 14:28:25 +08:00
|
|
|
else
|
|
|
|
*pflags |= PATH_NOTEXEC;
|
|
|
|
}
|
|
|
|
syscall_printf ("%d = symlink.check_sysfile (%s, %s) (%p)",
|
|
|
|
res, path, contents, *pflags);
|
2001-04-23 00:19:27 +08:00
|
|
|
|
|
|
|
CloseHandle (h);
|
2001-02-22 05:49:37 +08:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2001-03-17 09:29:14 +08:00
|
|
|
enum
|
|
|
|
{
|
|
|
|
SCAN_BEG,
|
|
|
|
SCAN_LNK,
|
|
|
|
SCAN_HASLNK,
|
|
|
|
SCAN_JUSTCHECK,
|
|
|
|
SCAN_APPENDLNK,
|
2001-03-17 15:09:41 +08:00
|
|
|
SCAN_EXTRALNK,
|
|
|
|
SCAN_DONE,
|
2001-03-17 09:29:14 +08:00
|
|
|
};
|
2001-03-05 14:28:25 +08:00
|
|
|
|
|
|
|
class suffix_scan
|
|
|
|
{
|
2001-03-17 15:09:41 +08:00
|
|
|
const suffix_info *suffixes, *suffixes_start;
|
2001-03-17 09:29:14 +08:00
|
|
|
int nextstate;
|
2001-03-17 15:09:41 +08:00
|
|
|
char *eopath;
|
2001-03-05 14:28:25 +08:00
|
|
|
public:
|
|
|
|
const char *path;
|
2001-03-17 15:09:41 +08:00
|
|
|
char *has (const char *, const suffix_info *);
|
2001-03-05 14:28:25 +08:00
|
|
|
int next ();
|
2001-03-17 15:09:41 +08:00
|
|
|
int lnk_match () {return nextstate >= SCAN_EXTRALNK;}
|
2001-03-05 14:28:25 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
char *
|
2001-03-17 15:09:41 +08:00
|
|
|
suffix_scan::has (const char *in_path, const suffix_info *in_suffixes)
|
2001-03-05 14:28:25 +08:00
|
|
|
{
|
2001-03-17 09:29:14 +08:00
|
|
|
nextstate = SCAN_BEG;
|
2001-03-17 15:09:41 +08:00
|
|
|
suffixes = suffixes_start = in_suffixes;
|
|
|
|
|
|
|
|
char *ext_here = strrchr (in_path, '.');
|
2001-04-12 03:09:53 +08:00
|
|
|
path = in_path;
|
|
|
|
eopath = strchr (path, '\0');
|
|
|
|
|
2001-03-17 15:09:41 +08:00
|
|
|
if (!ext_here)
|
2001-04-12 03:09:53 +08:00
|
|
|
goto noext;
|
2001-03-17 15:09:41 +08:00
|
|
|
|
|
|
|
if (suffixes)
|
2001-03-05 14:28:25 +08:00
|
|
|
{
|
2001-03-17 15:09:41 +08:00
|
|
|
/* Check if the extension matches a known extension */
|
|
|
|
for (const suffix_info *ex = in_suffixes; ex->name != NULL; ex++)
|
|
|
|
if (strcasematch (ext_here, ex->name))
|
|
|
|
{
|
|
|
|
nextstate = SCAN_JUSTCHECK;
|
|
|
|
suffixes = NULL; /* Has an extension so don't scan for one. */
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Didn't match. Use last resort -- .lnk. */
|
|
|
|
if (strcasematch (ext_here, ".lnk"))
|
|
|
|
{
|
|
|
|
nextstate = SCAN_HASLNK;
|
|
|
|
suffixes = NULL;
|
2001-03-05 14:28:25 +08:00
|
|
|
}
|
|
|
|
|
2001-04-12 03:09:53 +08:00
|
|
|
noext:
|
|
|
|
ext_here = eopath;
|
|
|
|
|
2001-03-17 15:09:41 +08:00
|
|
|
done:
|
2001-04-12 03:09:53 +08:00
|
|
|
return ext_here;
|
2001-03-05 14:28:25 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
suffix_scan::next ()
|
|
|
|
{
|
2002-07-06 05:58:49 +08:00
|
|
|
for (;;)
|
2001-03-05 14:28:25 +08:00
|
|
|
{
|
2002-07-06 05:58:49 +08:00
|
|
|
if (!suffixes)
|
|
|
|
switch (nextstate)
|
|
|
|
{
|
|
|
|
case SCAN_BEG:
|
|
|
|
suffixes = suffixes_start;
|
|
|
|
if (!suffixes)
|
|
|
|
{
|
|
|
|
nextstate = SCAN_LNK;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
if (!*suffixes->name)
|
|
|
|
suffixes++;
|
|
|
|
nextstate = SCAN_EXTRALNK;
|
|
|
|
/* fall through to suffix checking below */
|
|
|
|
break;
|
|
|
|
case SCAN_HASLNK:
|
|
|
|
nextstate = SCAN_EXTRALNK; /* Skip SCAN_BEG */
|
|
|
|
return 1;
|
|
|
|
case SCAN_LNK:
|
|
|
|
case SCAN_EXTRALNK:
|
|
|
|
strcpy (eopath, ".lnk");
|
|
|
|
nextstate = SCAN_DONE;
|
|
|
|
return 1;
|
|
|
|
case SCAN_JUSTCHECK:
|
|
|
|
nextstate = SCAN_APPENDLNK;
|
|
|
|
return 1;
|
|
|
|
case SCAN_APPENDLNK:
|
|
|
|
strcat (eopath, ".lnk");
|
|
|
|
nextstate = SCAN_DONE;
|
|
|
|
return 1;
|
|
|
|
default:
|
|
|
|
*eopath = '\0';
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2001-03-05 14:28:25 +08:00
|
|
|
while (suffixes && suffixes->name)
|
|
|
|
if (!suffixes->addon)
|
|
|
|
suffixes++;
|
|
|
|
else
|
|
|
|
{
|
2001-03-17 15:09:41 +08:00
|
|
|
strcpy (eopath, suffixes->name);
|
|
|
|
if (nextstate == SCAN_EXTRALNK)
|
|
|
|
strcat (eopath, ".lnk");
|
2001-03-05 14:28:25 +08:00
|
|
|
suffixes++;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
suffixes = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Check if PATH is a symlink. PATH must be a valid Win32 path name.
|
|
|
|
|
|
|
|
If PATH is a symlink, put the value of the symlink--the file to
|
|
|
|
which it points--into BUF. The value stored in BUF is not
|
|
|
|
necessarily null terminated. BUFLEN is the length of BUF; only up
|
|
|
|
to BUFLEN characters will be stored in BUF. BUF may be NULL, in
|
|
|
|
which case nothing will be stored.
|
|
|
|
|
|
|
|
Set *SYML if PATH is a symlink.
|
|
|
|
|
|
|
|
Set *EXEC if PATH appears to be executable. This is an efficiency
|
|
|
|
hack because we sometimes have to open the file anyhow. *EXEC will
|
|
|
|
not be set for every executable file.
|
|
|
|
|
|
|
|
Return -1 on error, 0 if PATH is not a symlink, or the length
|
|
|
|
stored into BUF if PATH is a symlink. */
|
|
|
|
|
2000-04-14 06:43:48 +08:00
|
|
|
int
|
2001-04-30 09:46:31 +08:00
|
|
|
symlink_info::check (char *path, const suffix_info *suffixes, unsigned opt)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
HANDLE h;
|
|
|
|
int res = 0;
|
2001-03-05 14:28:25 +08:00
|
|
|
suffix_scan suffix;
|
2001-04-29 07:48:28 +08:00
|
|
|
contents[0] = '\0';
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2000-04-14 06:43:48 +08:00
|
|
|
is_symlink = TRUE;
|
2001-04-30 09:46:31 +08:00
|
|
|
ext_here = suffix.has (path, suffixes);
|
|
|
|
extn = ext_here - path;
|
|
|
|
|
|
|
|
pflags &= ~PATH_SYMLINK;
|
2001-04-12 03:09:53 +08:00
|
|
|
|
2001-12-07 13:03:32 +08:00
|
|
|
case_clash = false;
|
2001-04-13 05:21:37 +08:00
|
|
|
|
2001-03-05 14:28:25 +08:00
|
|
|
while (suffix.next ())
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2000-08-23 01:59:53 +08:00
|
|
|
error = 0;
|
2001-11-22 13:59:07 +08:00
|
|
|
fileattr = GetFileAttributes (suffix.path);
|
2002-01-15 04:39:59 +08:00
|
|
|
if (fileattr == INVALID_FILE_ATTRIBUTES)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-11-22 13:59:07 +08:00
|
|
|
/* The GetFileAttributes call can fail for reasons that don't
|
2000-02-18 03:38:33 +08:00
|
|
|
matter, so we just return 0. For example, getting the
|
|
|
|
attributes of \\HOST will typically fail. */
|
2001-11-22 13:59:07 +08:00
|
|
|
debug_printf ("GetFileAttributes (%s) failed", suffix.path);
|
2000-08-22 11:58:47 +08:00
|
|
|
error = geterrno_from_win_error (GetLastError (), EACCES);
|
2000-02-18 03:38:33 +08:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2001-05-25 23:07:46 +08:00
|
|
|
|
|
|
|
ext_tacked_on = !!*ext_here;
|
|
|
|
|
2001-04-30 09:46:31 +08:00
|
|
|
if (pcheck_case != PCHECK_RELAXED && !case_check (path)
|
2001-06-04 09:28:09 +08:00
|
|
|
|| (opt & PC_SYM_IGNORE))
|
|
|
|
goto file_not_symlink;
|
2001-04-13 05:21:37 +08:00
|
|
|
|
2001-05-25 23:07:46 +08:00
|
|
|
int sym_check;
|
|
|
|
|
|
|
|
sym_check = 0;
|
2001-02-22 05:49:37 +08:00
|
|
|
|
|
|
|
if (fileattr & FILE_ATTRIBUTE_DIRECTORY)
|
2001-06-04 09:28:09 +08:00
|
|
|
goto file_not_symlink;
|
2001-02-22 05:49:37 +08:00
|
|
|
|
|
|
|
/* Windows shortcuts are treated as symlinks. */
|
2001-03-05 14:28:25 +08:00
|
|
|
if (suffix.lnk_match ())
|
2001-02-22 05:49:37 +08:00
|
|
|
sym_check = 1;
|
|
|
|
|
2001-04-29 07:48:28 +08:00
|
|
|
/* This is the old Cygwin method creating symlinks: */
|
2000-02-18 03:38:33 +08:00
|
|
|
/* A symlink will have the `system' file attribute. */
|
|
|
|
/* Only files can be symlinks (which can be symlinks to directories). */
|
2001-02-22 05:49:37 +08:00
|
|
|
if (fileattr & FILE_ATTRIBUTE_SYSTEM)
|
|
|
|
sym_check = 2;
|
|
|
|
|
2001-04-29 07:48:28 +08:00
|
|
|
if (!sym_check)
|
2000-02-18 03:38:33 +08:00
|
|
|
goto file_not_symlink;
|
|
|
|
|
2001-06-05 18:45:52 +08:00
|
|
|
if (sym_check > 0 && opt & PC_CHECK_EA &&
|
|
|
|
(res = get_symlink_ea (suffix.path, contents, sizeof (contents))) > 0)
|
|
|
|
{
|
|
|
|
pflags = PATH_SYMLINK;
|
|
|
|
debug_printf ("Got symlink from EA: %s", contents);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Open the file. */
|
|
|
|
|
2002-09-06 12:39:49 +08:00
|
|
|
h = CreateFile (suffix.path, GENERIC_READ, FILE_SHARE_READ,
|
|
|
|
&sec_none_nih, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, 0);
|
2000-02-18 03:38:33 +08:00
|
|
|
res = -1;
|
|
|
|
if (h == INVALID_HANDLE_VALUE)
|
2000-05-09 06:50:19 +08:00
|
|
|
goto file_not_symlink;
|
2001-04-23 00:19:27 +08:00
|
|
|
|
2001-06-11 11:38:32 +08:00
|
|
|
/* FIXME: if symlink isn't present in EA, but EAs are supported,
|
2001-06-05 18:45:52 +08:00
|
|
|
* should we write it there?
|
|
|
|
*/
|
2001-04-23 00:19:27 +08:00
|
|
|
switch (sym_check)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-04-23 00:19:27 +08:00
|
|
|
case 1:
|
|
|
|
res = check_shortcut (suffix.path, fileattr, h, contents, &error, &pflags);
|
|
|
|
if (res)
|
2001-05-25 23:07:46 +08:00
|
|
|
break;
|
2001-04-23 00:19:27 +08:00
|
|
|
/* If searching for `foo' and then finding a `foo.lnk' which is
|
|
|
|
no shortcut, return the same as if file not found. */
|
2001-05-25 23:07:46 +08:00
|
|
|
if (!suffix.lnk_match () || !ext_tacked_on)
|
2001-04-23 00:19:27 +08:00
|
|
|
goto file_not_symlink;
|
|
|
|
|
2002-01-15 04:39:59 +08:00
|
|
|
fileattr = INVALID_FILE_ATTRIBUTES;
|
2001-04-23 00:19:27 +08:00
|
|
|
continue; /* in case we're going to tack *another* .lnk on this filename. */
|
|
|
|
case 2:
|
|
|
|
res = check_sysfile (suffix.path, fileattr, h, contents, &error, &pflags);
|
|
|
|
if (!res)
|
|
|
|
goto file_not_symlink;
|
|
|
|
break;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2001-03-05 14:28:25 +08:00
|
|
|
break;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-05-25 23:07:46 +08:00
|
|
|
file_not_symlink:
|
2001-12-07 13:03:32 +08:00
|
|
|
is_symlink = false;
|
2001-05-25 23:07:46 +08:00
|
|
|
syscall_printf ("not a symlink");
|
|
|
|
res = 0;
|
|
|
|
break;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2000-04-14 06:43:48 +08:00
|
|
|
syscall_printf ("%d = symlink.check (%s, %p) (%p)",
|
2001-03-05 14:28:25 +08:00
|
|
|
res, suffix.path, contents, pflags);
|
2000-02-18 03:38:33 +08:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2001-04-13 05:21:37 +08:00
|
|
|
/* Check the correct case of the last path component (given in DOS style).
|
|
|
|
Adjust the case in this->path if pcheck_case == PCHECK_ADJUST or return
|
2001-12-07 13:03:32 +08:00
|
|
|
false if pcheck_case == PCHECK_STRICT.
|
2001-04-13 05:21:37 +08:00
|
|
|
Dont't call if pcheck_case == PCHECK_RELAXED.
|
|
|
|
*/
|
|
|
|
|
|
|
|
BOOL
|
2001-04-30 09:46:31 +08:00
|
|
|
symlink_info::case_check (char *path)
|
2001-04-13 05:21:37 +08:00
|
|
|
{
|
|
|
|
WIN32_FIND_DATA data;
|
|
|
|
HANDLE h;
|
2001-04-30 09:46:31 +08:00
|
|
|
char *c;
|
2001-04-13 05:21:37 +08:00
|
|
|
|
|
|
|
/* Set a pointer to the beginning of the last component. */
|
|
|
|
if (!(c = strrchr (path, '\\')))
|
|
|
|
c = path;
|
|
|
|
else
|
|
|
|
++c;
|
|
|
|
|
|
|
|
if ((h = FindFirstFile (path, &data))
|
|
|
|
!= INVALID_HANDLE_VALUE)
|
|
|
|
{
|
|
|
|
FindClose (h);
|
|
|
|
|
|
|
|
/* If that part of the component exists, check the case. */
|
|
|
|
if (strcmp (c, data.cFileName))
|
|
|
|
{
|
2001-04-17 19:47:37 +08:00
|
|
|
case_clash = TRUE;
|
|
|
|
|
2001-04-13 05:21:37 +08:00
|
|
|
/* If check is set to STRICT, a wrong case results
|
|
|
|
in returning a ENOENT. */
|
|
|
|
if (pcheck_case == PCHECK_STRICT)
|
2001-12-07 13:03:32 +08:00
|
|
|
return false;
|
2001-04-13 05:21:37 +08:00
|
|
|
|
|
|
|
/* PCHECK_ADJUST adjusts the case in the incoming
|
|
|
|
path which points to the path in *this. */
|
2001-04-30 09:46:31 +08:00
|
|
|
strcpy (c, data.cFileName);
|
2001-04-13 05:21:37 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* readlink system call */
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
readlink (const char *path, char *buf, int buflen)
|
|
|
|
{
|
2000-04-14 06:43:48 +08:00
|
|
|
extern suffix_info stat_suffixes[];
|
2000-09-05 01:52:42 +08:00
|
|
|
|
|
|
|
if (buflen < 0)
|
|
|
|
{
|
|
|
|
set_errno (ENAMETOOLONG);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2000-07-18 03:18:21 +08:00
|
|
|
path_conv pathbuf (path, PC_SYM_CONTENTS, stat_suffixes);
|
2000-04-14 06:43:48 +08:00
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
if (pathbuf.error)
|
|
|
|
{
|
|
|
|
set_errno (pathbuf.error);
|
|
|
|
syscall_printf ("-1 = readlink (%s, %p, %d)", path, buf, buflen);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-10-01 12:10:07 +08:00
|
|
|
if (!pathbuf.exists ())
|
2000-11-01 07:01:21 +08:00
|
|
|
{
|
|
|
|
set_errno (ENOENT);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
if (!pathbuf.issymlink ())
|
|
|
|
{
|
2002-07-24 13:37:47 +08:00
|
|
|
if (pathbuf.exists ())
|
2000-02-18 03:38:33 +08:00
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2000-09-06 05:51:06 +08:00
|
|
|
int len = min (buflen, (int) strlen (pathbuf.get_win32 ()));
|
2000-02-18 03:38:33 +08:00
|
|
|
memcpy (buf, pathbuf.get_win32 (), len);
|
|
|
|
|
2000-04-14 06:43:48 +08:00
|
|
|
/* errno set by symlink.check if error */
|
2000-02-18 03:38:33 +08:00
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Some programs rely on st_dev/st_ino being unique for each file.
|
|
|
|
Hash the path name and hope for the best. The hash arg is not
|
|
|
|
always initialized to zero since readdir needs to compute the
|
|
|
|
dirent ino_t based on a combination of the hash of the directory
|
|
|
|
done during the opendir call and the hash or the filename within
|
|
|
|
the directory. FIXME: Not bullet-proof. */
|
|
|
|
/* Cygwin internal */
|
|
|
|
|
|
|
|
unsigned long __stdcall
|
|
|
|
hash_path_name (unsigned long hash, const char *name)
|
|
|
|
{
|
|
|
|
if (!*name)
|
|
|
|
return hash;
|
|
|
|
|
|
|
|
/* Perform some initial permutations on the pathname if this is
|
|
|
|
not "seeded" */
|
|
|
|
if (!hash)
|
|
|
|
{
|
|
|
|
/* Simplistic handling of drives. If there is a drive specified,
|
|
|
|
make sure that the initial letter is upper case. If there is
|
|
|
|
no \ after the ':' assume access through the root directory
|
|
|
|
of that drive.
|
|
|
|
FIXME: Should really honor MS-Windows convention of using
|
|
|
|
the environment to track current directory on various drives. */
|
|
|
|
if (name[1] == ':')
|
|
|
|
{
|
|
|
|
char *nn, *newname = (char *) alloca (strlen (name) + 2);
|
2001-05-05 04:39:38 +08:00
|
|
|
nn = newname;
|
|
|
|
*nn = isupper (*name) ? cyg_tolower (*name) : *name;
|
|
|
|
*++nn = ':';
|
2000-02-18 03:38:33 +08:00
|
|
|
name += 2;
|
|
|
|
if (*name != '\\')
|
2001-05-05 04:39:38 +08:00
|
|
|
*++nn = '\\';
|
|
|
|
strcpy (++nn, name);
|
2000-02-18 03:38:33 +08:00
|
|
|
name = newname;
|
|
|
|
goto hashit;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Fill out the hashed path name with the current working directory if
|
|
|
|
this is not an absolute path and there is no pre-specified hash value.
|
|
|
|
Otherwise the inodes same will differ depending on whether a file is
|
|
|
|
referenced with an absolute value or relatively. */
|
|
|
|
|
2000-10-15 09:37:07 +08:00
|
|
|
if (!hash && !isabspath (name))
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-04-17 11:52:08 +08:00
|
|
|
hash = cygheap->cwd.get_hash ();
|
2000-02-18 03:38:33 +08:00
|
|
|
if (name[0] == '.' && name[1] == '\0')
|
|
|
|
return hash;
|
2002-05-03 00:46:12 +08:00
|
|
|
hash = (hash << 5) - hash + '\\';
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
hashit:
|
|
|
|
/* Build up hash. Ignore single trailing slash or \a\b\ != \a\b or
|
|
|
|
\a\b\. but allow a single \ if that's all there is. */
|
|
|
|
do
|
|
|
|
{
|
2002-09-22 11:38:57 +08:00
|
|
|
int ch = cyg_tolower (*name);
|
2002-05-03 00:46:12 +08:00
|
|
|
hash = (hash << 5) - hash + ch;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
while (*++name != '\0' &&
|
|
|
|
!(*name == '\\' && (!name[1] || (name[1] == '.' && !name[2]))));
|
|
|
|
return hash;
|
|
|
|
}
|
|
|
|
|
2000-03-17 03:35:18 +08:00
|
|
|
char *
|
2000-09-05 11:16:28 +08:00
|
|
|
getcwd (char *buf, size_t ulen)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-09-16 22:26:11 +08:00
|
|
|
char* res = NULL;
|
2001-10-20 03:17:04 +08:00
|
|
|
if (ulen == 0 && buf)
|
2001-09-16 22:26:11 +08:00
|
|
|
set_errno (EINVAL);
|
2001-10-05 23:05:07 +08:00
|
|
|
else if (buf == NULL || !__check_null_invalid_struct_errno (buf, ulen))
|
2001-09-16 22:26:11 +08:00
|
|
|
res = cygheap->cwd.get (buf, 1, 1, ulen);
|
|
|
|
return res;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* getwd: standards? */
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" char *
|
2000-02-18 03:38:33 +08:00
|
|
|
getwd (char *buf)
|
|
|
|
{
|
|
|
|
return getcwd (buf, MAX_PATH);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* chdir: POSIX 5.2.1.1 */
|
2001-06-17 01:09:19 +08:00
|
|
|
extern "C" int
|
2001-06-11 08:24:28 +08:00
|
|
|
chdir (const char *in_dir)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-06-28 10:19:57 +08:00
|
|
|
if (check_null_empty_str_errno (in_dir))
|
|
|
|
return -1;
|
2001-06-11 08:24:28 +08:00
|
|
|
|
|
|
|
syscall_printf ("dir '%s'", in_dir);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-03-29 08:30:39 +08:00
|
|
|
char *s;
|
2001-06-11 08:24:28 +08:00
|
|
|
char dir[strlen (in_dir) + 1];
|
|
|
|
strcpy (dir, in_dir);
|
2001-03-29 08:30:39 +08:00
|
|
|
/* Incredibly. Windows allows you to specify a path with trailing
|
|
|
|
whitespace to SetCurrentDirectory. This doesn't work too well
|
|
|
|
with other parts of the API, though, apparently. So nuke trailing
|
|
|
|
white space. */
|
2001-06-01 22:57:52 +08:00
|
|
|
for (s = strchr (dir, '\0'); --s >= dir && isspace ((unsigned int) (*s & 0xff)); )
|
2001-03-29 08:30:39 +08:00
|
|
|
*s = '\0';
|
|
|
|
|
2001-06-11 08:24:28 +08:00
|
|
|
if (!*s)
|
|
|
|
{
|
|
|
|
set_errno (ENOENT);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-06-11 23:20:49 +08:00
|
|
|
/* Convert path. First argument ensures that we don't check for NULL/empty/invalid
|
2001-06-11 08:24:28 +08:00
|
|
|
again. */
|
2001-06-11 23:20:49 +08:00
|
|
|
path_conv path (PC_NONULLEMPTY, dir, PC_FULL | PC_SYM_FOLLOW);
|
2001-06-11 08:24:28 +08:00
|
|
|
if (path.error)
|
|
|
|
{
|
|
|
|
set_errno (path.error);
|
|
|
|
syscall_printf ("-1 = chdir (%s)", dir);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2000-09-10 11:36:40 +08:00
|
|
|
/* Look for trailing path component consisting entirely of dots. This
|
|
|
|
is needed only in case of chdir since Windows simply ignores count
|
|
|
|
of dots > 2 here instead of returning an error code. Counts of dots
|
|
|
|
<= 2 are already eliminated by normalize_posix_path. */
|
|
|
|
const char *p = strrchr (dir, '/');
|
|
|
|
if (!p)
|
|
|
|
p = dir;
|
|
|
|
else
|
|
|
|
p++;
|
|
|
|
|
2000-09-11 00:43:47 +08:00
|
|
|
size_t len = strlen (p);
|
2000-09-10 11:36:40 +08:00
|
|
|
if (len > 2 && strspn (p, ".") == len)
|
|
|
|
{
|
|
|
|
set_errno (ENOENT);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-11-24 11:35:58 +08:00
|
|
|
const char *native_dir = path.get_win32 ();
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
/* Check to see if path translates to something like C:.
|
|
|
|
If it does, append a \ to the native directory specification to
|
|
|
|
defeat the Windows 95 (i.e. MS-DOS) tendency of returning to
|
|
|
|
the last directory visited on the given drive. */
|
2000-05-30 08:38:51 +08:00
|
|
|
if (isdrive (native_dir) && !native_dir[2])
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2001-11-24 11:35:58 +08:00
|
|
|
path.get_win32 ()[2] = '\\';
|
|
|
|
path.get_win32 ()[3] = '\0';
|
|
|
|
}
|
|
|
|
int res;
|
2002-09-22 11:38:57 +08:00
|
|
|
int devn = path.get_devn ();
|
2002-05-02 12:13:48 +08:00
|
|
|
if (!isvirtual_dev (devn))
|
2001-11-24 11:35:58 +08:00
|
|
|
res = SetCurrentDirectory (native_dir) ? 0 : -1;
|
2002-05-31 11:11:21 +08:00
|
|
|
else if (!path.exists ())
|
|
|
|
{
|
|
|
|
set_errno (ENOENT);
|
|
|
|
return -1;
|
|
|
|
}
|
2002-06-02 02:20:51 +08:00
|
|
|
else if (!path.isdir ())
|
|
|
|
{
|
|
|
|
set_errno (ENOTDIR);
|
|
|
|
return -1;
|
|
|
|
}
|
2001-11-24 11:35:58 +08:00
|
|
|
else
|
|
|
|
{
|
|
|
|
native_dir = "c:\\";
|
|
|
|
res = 0;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2001-01-27 23:34:38 +08:00
|
|
|
|
2002-06-13 11:04:50 +08:00
|
|
|
/* If res != 0, we didn't change to a new directory.
|
2001-01-27 23:34:38 +08:00
|
|
|
Otherwise, set the current windows and posix directory cache from input.
|
|
|
|
If the specified directory is a MS-DOS style directory or if the directory
|
|
|
|
was symlinked, convert the MS-DOS path back to posix style. Otherwise just
|
|
|
|
store the given directory. This allows things like "find", which traverse
|
|
|
|
directory trees, to work correctly with Cygwin mounted directories.
|
|
|
|
FIXME: Is just storing the posixized windows directory the correct thing to
|
|
|
|
do when we detect a symlink? Should we instead rebuild the posix path from
|
|
|
|
the input by traversing links? This would be an expensive operation but
|
|
|
|
we'll see if Cygwin mailing list users whine about the current behavior. */
|
2002-06-13 11:04:50 +08:00
|
|
|
if (res)
|
2000-02-18 03:38:33 +08:00
|
|
|
__seterrno ();
|
2002-05-02 12:13:48 +08:00
|
|
|
else if ((!path.has_symlinks () && strpbrk (dir, ":\\") == NULL
|
2002-05-28 09:55:40 +08:00
|
|
|
&& pcheck_case == PCHECK_RELAXED) || isvirtual_dev (devn))
|
2001-11-24 11:35:58 +08:00
|
|
|
cygheap->cwd.set (native_dir, dir);
|
2000-06-16 06:14:14 +08:00
|
|
|
else
|
2001-11-24 11:35:58 +08:00
|
|
|
cygheap->cwd.set (native_dir, NULL);
|
2000-09-05 11:16:28 +08:00
|
|
|
|
|
|
|
/* Note that we're accessing cwd.posix without a lock here. I didn't think
|
|
|
|
it was worth locking just for strace. */
|
2001-04-17 11:52:08 +08:00
|
|
|
syscall_printf ("%d = chdir() cygheap->cwd.posix '%s' native '%s'", res,
|
|
|
|
cygheap->cwd.posix, native_dir);
|
2000-10-02 10:26:04 +08:00
|
|
|
MALLOC_CHECK;
|
2000-05-30 08:38:51 +08:00
|
|
|
return res;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" int
|
2001-06-10 18:00:21 +08:00
|
|
|
fchdir (int fd)
|
|
|
|
{
|
2001-10-16 07:39:33 +08:00
|
|
|
int res;
|
2001-06-10 18:00:21 +08:00
|
|
|
sigframe thisframe (mainthread);
|
|
|
|
|
2001-10-16 07:39:33 +08:00
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
if (cfd >= 0)
|
2002-01-16 04:29:09 +08:00
|
|
|
res = chdir (cfd->get_win32_name ());
|
2001-10-16 07:39:33 +08:00
|
|
|
else
|
|
|
|
res = -1;
|
|
|
|
|
|
|
|
syscall_printf ("%d = fchdir (%d)", res, fd);
|
|
|
|
return res;
|
2001-06-10 18:00:21 +08:00
|
|
|
}
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/******************** Exported Path Routines *********************/
|
|
|
|
|
|
|
|
/* Cover functions to the path conversion routines.
|
|
|
|
These are exported to the world as cygwin_foo by cygwin.din. */
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
cygwin_conv_to_win32_path (const char *path, char *win32_path)
|
|
|
|
{
|
2000-07-18 03:18:21 +08:00
|
|
|
path_conv p (path, PC_SYM_FOLLOW);
|
2000-02-18 03:38:33 +08:00
|
|
|
if (p.error)
|
|
|
|
{
|
2001-12-07 06:36:08 +08:00
|
|
|
win32_path[0] = '\0';
|
2000-02-18 03:38:33 +08:00
|
|
|
set_errno (p.error);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-12-07 06:36:08 +08:00
|
|
|
strcpy (win32_path, p);
|
2000-02-18 03:38:33 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
cygwin_conv_to_full_win32_path (const char *path, char *win32_path)
|
|
|
|
{
|
2000-07-18 03:18:21 +08:00
|
|
|
path_conv p (path, PC_SYM_FOLLOW | PC_FULL);
|
2000-02-18 03:38:33 +08:00
|
|
|
if (p.error)
|
|
|
|
{
|
2001-12-07 06:36:08 +08:00
|
|
|
win32_path[0] = '\0';
|
2000-02-18 03:38:33 +08:00
|
|
|
set_errno (p.error);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2001-12-07 06:36:08 +08:00
|
|
|
strcpy (win32_path, p);
|
2000-02-18 03:38:33 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* This is exported to the world as cygwin_foo by cygwin.din. */
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
cygwin_conv_to_posix_path (const char *path, char *posix_path)
|
|
|
|
{
|
2001-06-28 10:19:57 +08:00
|
|
|
if (check_null_empty_str_errno (path))
|
2000-02-18 03:38:33 +08:00
|
|
|
return -1;
|
2001-01-28 13:51:15 +08:00
|
|
|
mount_table->conv_to_posix_path (path, posix_path, 1);
|
2000-02-18 03:38:33 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
cygwin_conv_to_full_posix_path (const char *path, char *posix_path)
|
|
|
|
{
|
2001-06-28 10:19:57 +08:00
|
|
|
if (check_null_empty_str_errno (path))
|
2000-02-18 03:38:33 +08:00
|
|
|
return -1;
|
2001-01-28 13:51:15 +08:00
|
|
|
mount_table->conv_to_posix_path (path, posix_path, 0);
|
2000-02-18 03:38:33 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The realpath function is supported on some UNIX systems. */
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" char *
|
2000-02-18 03:38:33 +08:00
|
|
|
realpath (const char *path, char *resolved)
|
|
|
|
{
|
|
|
|
int err;
|
|
|
|
|
2000-07-18 03:18:21 +08:00
|
|
|
path_conv real_path (path, PC_SYM_FOLLOW | PC_FULL);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
if (real_path.error)
|
|
|
|
err = real_path.error;
|
|
|
|
else
|
|
|
|
{
|
2001-01-28 13:51:15 +08:00
|
|
|
err = mount_table->conv_to_posix_path (real_path.get_win32 (), resolved, 0);
|
2000-02-18 03:38:33 +08:00
|
|
|
if (err == 0)
|
|
|
|
return resolved;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* FIXME: on error, we are supposed to put the name of the path
|
|
|
|
component which could not be resolved into RESOLVED. */
|
|
|
|
resolved[0] = '\0';
|
|
|
|
|
|
|
|
set_errno (err);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Return non-zero if path is a POSIX path list.
|
|
|
|
This is exported to the world as cygwin_foo by cygwin.din.
|
|
|
|
|
|
|
|
DOCTOOL-START
|
|
|
|
<sect1 id="add-func-cygwin-posix-path-list-p">
|
|
|
|
<para>Rather than use a mode to say what the "proper" path list
|
|
|
|
format is, we allow any, and give apps the tools they need to
|
|
|
|
convert between the two. If a ';' is present in the path list it's
|
|
|
|
a Win32 path list. Otherwise, if the first path begins with
|
|
|
|
[letter]: (in which case it can be the only element since if it
|
|
|
|
wasn't a ';' would be present) it's a Win32 path list. Otherwise,
|
|
|
|
it's a POSIX path list.</para>
|
|
|
|
</sect1>
|
|
|
|
DOCTOOL-END
|
|
|
|
*/
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
cygwin_posix_path_list_p (const char *path)
|
|
|
|
{
|
2001-03-05 14:28:25 +08:00
|
|
|
int posix_p = !(strchr (path, ';') || isdrive (path));
|
2000-02-18 03:38:33 +08:00
|
|
|
return posix_p;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* These are used for apps that need to convert env vars like PATH back and
|
|
|
|
forth. The conversion is a two step process. First, an upper bound on the
|
|
|
|
size of the buffer needed is computed. Then the conversion is done. This
|
|
|
|
allows the caller to use alloca if it wants. */
|
|
|
|
|
|
|
|
static int
|
|
|
|
conv_path_list_buf_size (const char *path_list, int to_posix_p)
|
|
|
|
{
|
|
|
|
int i, num_elms, max_mount_path_len, size;
|
|
|
|
const char *p;
|
|
|
|
|
|
|
|
/* The theory is that an upper bound is
|
|
|
|
current_size + (num_elms * max_mount_path_len) */
|
|
|
|
|
|
|
|
char delim = to_posix_p ? ';' : ':';
|
|
|
|
p = path_list;
|
|
|
|
for (num_elms = 1; (p = strchr (p, delim)) != NULL; ++num_elms)
|
|
|
|
++p;
|
|
|
|
|
|
|
|
/* 7: strlen ("//c") + slop, a conservative initial value */
|
2001-01-28 13:51:15 +08:00
|
|
|
for (max_mount_path_len = 7, i = 0; i < mount_table->nmounts; ++i)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
int mount_len = (to_posix_p
|
2001-01-28 13:51:15 +08:00
|
|
|
? mount_table->mount[i].posix_pathlen
|
|
|
|
: mount_table->mount[i].native_pathlen);
|
2000-02-18 03:38:33 +08:00
|
|
|
if (max_mount_path_len < mount_len)
|
|
|
|
max_mount_path_len = mount_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* 100: slop */
|
|
|
|
size = strlen (path_list) + (num_elms * max_mount_path_len) + 100;
|
|
|
|
return size;
|
|
|
|
}
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
cygwin_win32_to_posix_path_list_buf_size (const char *path_list)
|
|
|
|
{
|
|
|
|
return conv_path_list_buf_size (path_list, 1);
|
|
|
|
}
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
cygwin_posix_to_win32_path_list_buf_size (const char *path_list)
|
|
|
|
{
|
|
|
|
return conv_path_list_buf_size (path_list, 0);
|
|
|
|
}
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
cygwin_win32_to_posix_path_list (const char *win32, char *posix)
|
|
|
|
{
|
|
|
|
conv_path_list (win32, posix, 1);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
cygwin_posix_to_win32_path_list (const char *posix, char *win32)
|
|
|
|
{
|
|
|
|
conv_path_list (posix, win32, 0);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* cygwin_split_path: Split a path into directory and file name parts.
|
|
|
|
Buffers DIR and FILE are assumed to be big enough.
|
|
|
|
|
|
|
|
Examples (path -> `dir' / `file'):
|
|
|
|
/ -> `/' / `'
|
|
|
|
"" -> `.' / `'
|
|
|
|
. -> `.' / `.' (FIXME: should this be `.' / `'?)
|
|
|
|
.. -> `.' / `..' (FIXME: should this be `..' / `'?)
|
|
|
|
foo -> `.' / `foo'
|
|
|
|
foo/bar -> `foo' / `bar'
|
|
|
|
foo/bar/ -> `foo' / `bar'
|
|
|
|
/foo -> `/' / `foo'
|
|
|
|
/foo/bar -> `/foo' / `bar'
|
|
|
|
c: -> `c:/' / `'
|
|
|
|
c:/ -> `c:/' / `'
|
|
|
|
c:foo -> `c:/' / `foo'
|
|
|
|
c:/foo -> `c:/' / `foo'
|
|
|
|
*/
|
|
|
|
|
2001-10-16 21:49:38 +08:00
|
|
|
extern "C" void
|
2000-02-18 03:38:33 +08:00
|
|
|
cygwin_split_path (const char *path, char *dir, char *file)
|
|
|
|
{
|
|
|
|
int dir_started_p = 0;
|
|
|
|
|
|
|
|
/* Deal with drives.
|
|
|
|
Remember that c:foo <==> c:/foo. */
|
2000-05-30 08:38:51 +08:00
|
|
|
if (isdrive (path))
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
*dir++ = *path++;
|
|
|
|
*dir++ = *path++;
|
|
|
|
*dir++ = '/';
|
2001-03-05 14:28:25 +08:00
|
|
|
if (!*path)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
*dir = 0;
|
|
|
|
*file = 0;
|
|
|
|
return;
|
|
|
|
}
|
2003-01-09 16:22:05 +08:00
|
|
|
if (isdirsep (*path))
|
2000-02-18 03:38:33 +08:00
|
|
|
++path;
|
|
|
|
dir_started_p = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Determine if there are trailing slashes and "delete" them if present.
|
|
|
|
We pretend as if they don't exist. */
|
|
|
|
const char *end = path + strlen (path);
|
|
|
|
/* path + 1: keep leading slash. */
|
2003-01-09 16:22:05 +08:00
|
|
|
while (end > path + 1 && isdirsep (end[-1]))
|
2000-02-18 03:38:33 +08:00
|
|
|
--end;
|
|
|
|
|
|
|
|
/* At this point, END points to one beyond the last character
|
|
|
|
(with trailing slashes "deleted"). */
|
|
|
|
|
|
|
|
/* Point LAST_SLASH at the last slash (duh...). */
|
|
|
|
const char *last_slash;
|
|
|
|
for (last_slash = end - 1; last_slash >= path; --last_slash)
|
2003-01-09 16:22:05 +08:00
|
|
|
if (isdirsep (*last_slash))
|
2000-02-18 03:38:33 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
if (last_slash == path)
|
|
|
|
{
|
|
|
|
*dir++ = '/';
|
|
|
|
*dir = 0;
|
|
|
|
}
|
|
|
|
else if (last_slash > path)
|
|
|
|
{
|
|
|
|
memcpy (dir, path, last_slash - path);
|
|
|
|
dir[last_slash - path] = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (dir_started_p)
|
|
|
|
; /* nothing to do */
|
|
|
|
else
|
|
|
|
*dir++ = '.';
|
|
|
|
*dir = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy (file, last_slash + 1, end - last_slash - 1);
|
|
|
|
file[end - last_slash - 1] = 0;
|
|
|
|
}
|
|
|
|
|
2000-10-19 11:12:44 +08:00
|
|
|
/*****************************************************************************/
|
|
|
|
|
2000-09-05 11:16:28 +08:00
|
|
|
/* Return the hash value for the current win32 value.
|
|
|
|
This is used when constructing inodes. */
|
|
|
|
DWORD
|
|
|
|
cwdstuff::get_hash ()
|
|
|
|
{
|
|
|
|
DWORD hashnow;
|
2002-02-23 03:33:41 +08:00
|
|
|
cwd_lock->acquire ();
|
2000-09-05 11:16:28 +08:00
|
|
|
hashnow = hash;
|
2002-02-23 03:33:41 +08:00
|
|
|
cwd_lock->release ();
|
2000-09-05 11:16:28 +08:00
|
|
|
return hashnow;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize cygcwd 'muto' for serializing access to cwd info. */
|
|
|
|
void
|
|
|
|
cwdstuff::init ()
|
|
|
|
{
|
2002-02-23 03:33:41 +08:00
|
|
|
new_muto (cwd_lock);
|
2000-09-05 11:16:28 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Get initial cwd. Should only be called once in a
|
|
|
|
process tree. */
|
|
|
|
bool
|
|
|
|
cwdstuff::get_initial ()
|
|
|
|
{
|
2002-02-23 03:33:41 +08:00
|
|
|
cwd_lock->acquire ();
|
2000-10-17 07:55:58 +08:00
|
|
|
|
2000-09-06 14:42:08 +08:00
|
|
|
if (win32)
|
|
|
|
return 1;
|
2000-09-05 11:16:28 +08:00
|
|
|
|
|
|
|
int i;
|
2000-09-06 14:42:08 +08:00
|
|
|
DWORD len, dlen;
|
2000-09-05 11:16:28 +08:00
|
|
|
for (i = 0, dlen = MAX_PATH, len = 0; i < 3; dlen *= 2, i++)
|
|
|
|
{
|
|
|
|
win32 = (char *) crealloc (win32, dlen + 2);
|
|
|
|
if ((len = GetCurrentDirectoryA (dlen, win32)) < dlen)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len == 0)
|
|
|
|
{
|
|
|
|
__seterrno ();
|
2002-02-23 03:33:41 +08:00
|
|
|
cwd_lock->release ();
|
2000-09-05 11:16:28 +08:00
|
|
|
debug_printf ("get_initial_cwd failed, %E");
|
2002-02-23 03:33:41 +08:00
|
|
|
cwd_lock->release ();
|
2000-09-05 11:16:28 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
set (NULL);
|
|
|
|
return 1; /* Leaves cwd lock unreleased */
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Fill out the elements of a cwdstuff struct.
|
|
|
|
It is assumed that the lock for the cwd is acquired if
|
|
|
|
win32_cwd == NULL. */
|
|
|
|
void
|
2000-09-10 11:36:40 +08:00
|
|
|
cwdstuff::set (const char *win32_cwd, const char *posix_cwd)
|
2000-09-05 11:16:28 +08:00
|
|
|
{
|
2000-09-10 11:36:40 +08:00
|
|
|
char pathbuf[MAX_PATH];
|
|
|
|
|
2000-09-05 11:16:28 +08:00
|
|
|
if (win32_cwd)
|
|
|
|
{
|
2002-02-23 03:33:41 +08:00
|
|
|
cwd_lock->acquire ();
|
2000-09-05 11:16:28 +08:00
|
|
|
win32 = (char *) crealloc (win32, strlen (win32_cwd) + 1);
|
|
|
|
strcpy (win32, win32_cwd);
|
|
|
|
}
|
|
|
|
|
2000-09-10 11:36:40 +08:00
|
|
|
if (!posix_cwd)
|
2001-01-28 13:51:15 +08:00
|
|
|
mount_table->conv_to_posix_path (win32, pathbuf, 0);
|
2000-09-10 11:36:40 +08:00
|
|
|
else
|
|
|
|
(void) normalize_posix_path (posix_cwd, pathbuf);
|
2000-09-05 11:16:28 +08:00
|
|
|
|
2000-09-10 11:36:40 +08:00
|
|
|
posix = (char *) crealloc (posix, strlen (pathbuf) + 1);
|
|
|
|
strcpy (posix, pathbuf);
|
2000-09-05 11:16:28 +08:00
|
|
|
|
2000-09-10 11:36:40 +08:00
|
|
|
hash = hash_path_name (0, win32);
|
2000-09-05 11:16:28 +08:00
|
|
|
|
|
|
|
if (win32_cwd)
|
2002-02-23 03:33:41 +08:00
|
|
|
cwd_lock->release ();
|
2000-09-05 11:16:28 +08:00
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Copy the value for either the posix or the win32 cwd into a buffer. */
|
|
|
|
char *
|
|
|
|
cwdstuff::get (char *buf, int need_posix, int with_chroot, unsigned ulen)
|
|
|
|
{
|
2000-10-02 10:26:04 +08:00
|
|
|
MALLOC_CHECK;
|
2000-10-11 03:24:32 +08:00
|
|
|
|
2000-11-02 10:15:02 +08:00
|
|
|
if (ulen)
|
|
|
|
/* nothing */;
|
|
|
|
else if (buf == NULL)
|
|
|
|
ulen = (unsigned) -1;
|
|
|
|
else
|
2000-10-11 03:24:32 +08:00
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2000-09-05 11:16:28 +08:00
|
|
|
if (!get_initial ()) /* Get initial cwd and set cwd lock */
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
char *tocopy;
|
|
|
|
if (!need_posix)
|
|
|
|
tocopy = win32;
|
|
|
|
else
|
2001-06-03 10:31:16 +08:00
|
|
|
tocopy = posix;
|
2000-09-05 11:16:28 +08:00
|
|
|
|
2002-09-22 11:38:57 +08:00
|
|
|
debug_printf ("posix %s", posix);
|
2000-09-05 11:16:28 +08:00
|
|
|
if (strlen (tocopy) >= ulen)
|
2000-09-06 09:56:17 +08:00
|
|
|
{
|
|
|
|
set_errno (ERANGE);
|
|
|
|
buf = NULL;
|
|
|
|
}
|
2000-09-05 11:16:28 +08:00
|
|
|
else
|
|
|
|
{
|
2000-10-11 03:24:32 +08:00
|
|
|
if (!buf)
|
2000-10-02 10:26:04 +08:00
|
|
|
buf = (char *) malloc (strlen (tocopy) + 1);
|
2000-09-05 11:16:28 +08:00
|
|
|
strcpy (buf, tocopy);
|
|
|
|
if (!buf[0]) /* Should only happen when chroot */
|
|
|
|
strcpy (buf, "/");
|
|
|
|
}
|
|
|
|
|
2002-02-23 03:33:41 +08:00
|
|
|
cwd_lock->release ();
|
2000-10-11 03:24:32 +08:00
|
|
|
|
|
|
|
out:
|
|
|
|
syscall_printf ("(%s) = cwdstuff::get (%p, %d, %d, %d), errno %d",
|
|
|
|
buf, buf, ulen, need_posix, with_chroot, errno);
|
2000-10-02 10:26:04 +08:00
|
|
|
MALLOC_CHECK;
|
2000-09-05 11:16:28 +08:00
|
|
|
return buf;
|
|
|
|
}
|
2003-01-20 10:57:54 +08:00
|
|
|
|
|
|
|
int etc::curr_ix = 0;
|
|
|
|
/* Note that the first elements of the below arrays are unused */
|
2003-01-21 13:07:28 +08:00
|
|
|
bool etc::change_possible[MAX_ETC_FILES + 1];
|
2003-01-20 10:57:54 +08:00
|
|
|
const char *etc::fn[MAX_ETC_FILES + 1];
|
|
|
|
FILETIME etc::last_modified[MAX_ETC_FILES + 1];
|
|
|
|
|
|
|
|
int
|
|
|
|
etc::init (int n, const char *etc_fn)
|
|
|
|
{
|
|
|
|
if (n > 0)
|
|
|
|
/* ok */;
|
|
|
|
else if (++curr_ix <= MAX_ETC_FILES)
|
|
|
|
n = curr_ix;
|
|
|
|
else
|
|
|
|
api_fatal ("internal error");
|
|
|
|
|
|
|
|
fn[n] = etc_fn;
|
|
|
|
change_possible[n] = false;
|
|
|
|
(void) test_file_change (n);
|
|
|
|
paranoid_printf ("fn[%d] %s, curr_ix %d", n, fn[n], curr_ix);
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
etc::test_file_change (int n)
|
|
|
|
{
|
|
|
|
HANDLE h;
|
|
|
|
WIN32_FIND_DATA data;
|
|
|
|
bool res;
|
|
|
|
|
2003-01-21 13:07:28 +08:00
|
|
|
if ((h = FindFirstFile (fn[n], &data)) == INVALID_HANDLE_VALUE)
|
2003-01-20 10:57:54 +08:00
|
|
|
{
|
|
|
|
res = true;
|
|
|
|
memset (last_modified + n, 0, sizeof (last_modified[n]));
|
|
|
|
debug_printf ("FindFirstFile failed, %E");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
FindClose (h);
|
|
|
|
res = CompareFileTime (&data.ftLastWriteTime, last_modified + n) > 0;
|
|
|
|
last_modified[n] = data.ftLastWriteTime;
|
|
|
|
debug_printf ("FindFirstFile succeeded");
|
|
|
|
}
|
|
|
|
|
|
|
|
paranoid_printf ("fn[%d] %s res %d", n, fn[n], res);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
etc::dir_changed (int n)
|
|
|
|
{
|
|
|
|
if (!change_possible[n])
|
|
|
|
{
|
|
|
|
static HANDLE changed_h NO_COPY;
|
|
|
|
|
|
|
|
if (!changed_h)
|
|
|
|
{
|
|
|
|
path_conv pwd ("/etc");
|
|
|
|
changed_h = FindFirstChangeNotification (pwd, FALSE,
|
2003-01-24 11:53:46 +08:00
|
|
|
FILE_NOTIFY_CHANGE_LAST_WRITE
|
|
|
|
| FILE_NOTIFY_CHANGE_FILE_NAME);
|
2003-01-20 10:57:54 +08:00
|
|
|
#ifdef DEBUGGING
|
|
|
|
if (changed_h == INVALID_HANDLE_VALUE)
|
2003-02-06 00:40:51 +08:00
|
|
|
system_printf ("Can't open %s for checking, %E", (char *) pwd);
|
2003-01-20 10:57:54 +08:00
|
|
|
#endif
|
2003-01-21 13:07:28 +08:00
|
|
|
memset (change_possible, true, sizeof (change_possible));
|
2003-01-20 10:57:54 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (changed_h == INVALID_HANDLE_VALUE)
|
2003-01-21 13:07:28 +08:00
|
|
|
change_possible[n] = true;
|
2003-01-20 10:57:54 +08:00
|
|
|
else if (WaitForSingleObject (changed_h, 0) == WAIT_OBJECT_0)
|
|
|
|
{
|
|
|
|
(void) FindNextChangeNotification (changed_h);
|
2003-01-21 13:07:28 +08:00
|
|
|
memset (change_possible, true, sizeof change_possible);
|
2003-01-20 10:57:54 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
paranoid_printf ("fn[%d] %s change_possible %d", n, fn[n], change_possible[n]);
|
|
|
|
return change_possible[n];
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
etc::file_changed (int n)
|
|
|
|
{
|
|
|
|
bool res = false;
|
2003-01-21 13:07:28 +08:00
|
|
|
if (dir_changed (n) && test_file_change (n))
|
2003-01-20 10:57:54 +08:00
|
|
|
res = true;
|
2003-01-21 13:07:28 +08:00
|
|
|
change_possible[n] = false; /* Change is no longer possible */
|
2003-01-20 10:57:54 +08:00
|
|
|
paranoid_printf ("fn[%d] %s res %d", n, fn[n], res);
|
|
|
|
return res;
|
|
|
|
}
|