2008-11-27 01:21:04 +08:00
|
|
|
/* path.cc: path support.
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 15:13:47 +08:00
|
|
|
Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
|
2013-01-21 12:34:52 +08:00
|
|
|
2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013 Red Hat, Inc.
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 15:13:47 +08:00
|
|
|
This file is part of Cygwin.
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 15:13:47 +08:00
|
|
|
This software is a copyrighted work licensed under the terms of the
|
|
|
|
Cygwin license. Please consult the file "CYGWIN_LICENSE" for
|
|
|
|
details. */
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 15:13:47 +08:00
|
|
|
/* This module's job is to
|
|
|
|
- convert between POSIX and Win32 style filenames,
|
|
|
|
- support the `mount' functionality,
|
|
|
|
- support symlinks for files and directories
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 15:13:47 +08:00
|
|
|
Pathnames are handled as follows:
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 15:13:47 +08:00
|
|
|
- A \ or : in a path denotes a pure windows spec.
|
|
|
|
- Paths beginning with // (or \\) are not translated (i.e. looked
|
|
|
|
up in the mount table) and are assumed to be UNC path names.
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 15:13:47 +08:00
|
|
|
The goal in the above set of rules is to allow both POSIX and Win32
|
|
|
|
flavors of pathnames without either interfering. The rules are
|
|
|
|
intended to be as close to a superset of both as possible.
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 15:13:47 +08:00
|
|
|
Note that you can have more than one path to a file. The mount
|
|
|
|
table is always prefered when translating Win32 paths to POSIX
|
|
|
|
paths. Win32 paths in mount table entries may be UNC paths or
|
|
|
|
standard Win32 paths starting with <drive-letter>:
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 15:13:47 +08:00
|
|
|
Text vs Binary issues are not considered here in path style
|
|
|
|
decisions, although the appropriate flags are retrieved and
|
|
|
|
stored in various structures.
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 15:13:47 +08:00
|
|
|
Removing mounted filesystem support would simplify things greatly,
|
|
|
|
but having it gives us a mechanism of treating disk that lives on a
|
|
|
|
UNIX machine as having UNIX semantics [it allows one to edit a text
|
|
|
|
file on that disk and not have cr's magically appear and perhaps
|
|
|
|
break apps running on UNIX boxes]. It also useful to be able to
|
|
|
|
layout a hierarchy without changing the underlying directories.
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 15:13:47 +08:00
|
|
|
The semantics of mounting file systems is not intended to precisely
|
|
|
|
follow normal UNIX systems.
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 15:13:47 +08:00
|
|
|
Each DOS drive is defined to have a current directory. Supporting
|
|
|
|
this would complicate things so for now things are defined so that
|
|
|
|
c: means c:\.
|
|
|
|
*/
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2000-08-03 00:28:18 +08:00
|
|
|
#include "winsup.h"
|
2008-04-08 00:15:45 +08:00
|
|
|
#include "miscfuncs.h"
|
2000-02-18 03:38:33 +08:00
|
|
|
#include <ctype.h>
|
2000-06-08 21:24:52 +08:00
|
|
|
#include <winioctl.h>
|
2001-02-22 05:49:37 +08:00
|
|
|
#include <wingdi.h>
|
|
|
|
#include <winuser.h>
|
|
|
|
#include <winnetwk.h>
|
2011-12-03 00:06:10 +08:00
|
|
|
#include <winnls.h>
|
2005-01-18 21:00:18 +08:00
|
|
|
#include <shlobj.h>
|
2012-03-08 17:36:11 +08:00
|
|
|
#include <sys/param.h>
|
2000-09-08 10:56:55 +08:00
|
|
|
#include <sys/cygwin.h>
|
2000-08-22 11:58:47 +08:00
|
|
|
#include "cygerrno.h"
|
2001-07-27 03:22:24 +08:00
|
|
|
#include "security.h"
|
2000-08-22 13:10:20 +08:00
|
|
|
#include "path.h"
|
* devices.cc: New file.
* devices.gperf: New file.
* devices.shilka: New file.
* cygwin-gperf: New file.
* cygwin-shilka: New file.
* fhandler_fifo.cc: New file.
* fhandler_nodevice.cc : New file. Reorganize headers so that path.h precedes
fhandler.h throughout. Remove device argument and unit arguments from fhandler
constructors throughout. Remove pc arguments to fhandler functions and use
internal pc element instead, throughout. Use dev element in pc throughout.
Use major/minor elements rather than units and device numbers previously in
fhandler class. Use correct methods for fhandler file names rather than
directly accessing file name variables, throughout.
* Makefile.in (DLL_OFILES): Add devices.o, fhandler_fifo.o
* dcrt0.cc (dll_crt0_1): Call device::init.
* devices.h: Renumber devices based on more Linux-like major/minor numbers.
Add more devices. Declare standard device storage.
(device): Declare struct.
* dir.cc (opendir): Use new 'build_fh_name' to construct a fhandler_* type.
* dtable.cc (dtable::get_debugger_info): Ditto.
(cygwin_attach_handle_to_fd): Ditto.
(dtable::release): Remove special FH_SOCKET case in favor of generic
"need_fixup_before" test.
(dtable::init_std_file_from_handle): Use either build_fh_dev or build_fh_name
to build standard fhandler.
(dtable::build_fh_name): Renamed from dtable::build_fhandler_from_name. Move
out of dtable class. Don't accept a path_conv argument. Just build it here
and pass it to:
(build_fh_pc): Renamed from dtable::build_fhandler. Move out of dtable class.
Use intrinsic device type in path_conv to create new fhandler.
(build_fh_dev): Renamed from dtable::build_fhandler. Move out of dtable class.
Simplify arguments to just take new 'device' type and a name. Just return
pointer to fhandler rather than trying to insert into dtable.
(dtable::dup_worker): Accommodate above build_fh name changes.
(dtable::find_fifo): New (currently broken) function.
(handle_to_fn): Use strechr for efficiency.
* dtable.h: Reflect above build_fh name changes and argument differences.
(fhandler_base *&operator []): Return self rather than copy of self.
* fhandler.cc (fhandler_base::operator =): Use pc element to set normalized
path.
(fhandler_base::set_name): Ditto.
(fhandler_base::raw_read): Use method to access name.
(fhandler_base::write): Correctly use get_output_handle rather than get_handle.
(handler_base::device_access_denied): New function.
(fhandler_base::open): Eliminate pc argument and use pc element of
fhandler_base throughout.
(fhandler_base::fstat): Detect if device is based in filesystem and use
fstat_fs to calculate stat, if so.
(fhandler_base::fhandler_base): Eliminate handling of file names and, instead,
just free appropriate component from pc.
(fhandler_base::opendir): Remove path_conv parameter.
* fhandler.h: Remove all device flags.
(fhandler_base::pc): New element.
(fhandler_base::set_name): Change argument to path_conv.
(fhandler_base::error): New function.
(fhandler_base::exists): New function.
(fhandler_base::pc_binmode): New function.
(fhandler_base::dev): New function.
(fhandler_base::open_fs): New function.
(fhandler_base::fstat_fs): New function.
(fhandler_base::fstat_by_name): New function.
(fhandler_base::fstat_by_handle): New function.
(fhandler_base::isfifo): New function.
(fhandler_base::is_slow): New function.
(fhandler_base::is_auto_device): New function.
(fhandler_base::is_fs_special): New function.
(fhandler_base::device_access_denied): New function.
(fhandler_base::operator DWORD&): New operator.
(fhandler_base::get_name): Return normalized path from pc.
(fhandler_base::get_win32_name): Return windows path from pc.
(fhandler_base::isdevice): Renamed from is_device.
(fhandler_base::get_native_name): Return device format.
(fhandler_fifo): New class.
(fhandler_nodevice): New class.
(select_stuff::device_specific): Remove array.
(select_stuff::device_specific_pipe): New class element.
(select_stuff::device_specific_socket): New class element.
(select_stuff::device_specific_serial): New class element.
(select_stuff::select_stuff): Initialize new elements.
* fhandler_disk_file.cc (fhandler_base::fstat_by_handle): Move to base class
from fhandler_disk_file.
(fhandler_base::fstat_by_name): Ditto.
(fhandler_base::fstat_by_name): Ditto.
(fhandler_disk_file::open): Move most functionality into
fhandler_base::open_fs.
(fhandler_base::open_fs): New function.
(fhandler_disk_file::close): Move most functionality into
fhandler_base::close_fs.
(fhandler_base::close_fs): New function.
* fhandler_mem.cc (fhandler_dev_mem::open): Use device name in debugging
output.
* fhandler_socket.cc (fhandler_socket::set_connect_secret): Copy standard
urandom device into appropriate place.
(fhandler_socket::accept): Reflect change in fdsock return value.
* fhandler_tty.cc: See "throughouts" above.
* net.cc: Accommodate fdsock change throughout.
(fdsock): Return success or failure, accept fd argument and device argument.
* path.cc (symlink_info::major): New element.
(symlink_info::minor): New element.
(symlink_info::parse_device): Declare new function.
(fs_info::update): Accommodate changes in path_conv class.
(path_conv::fillin): Ditto.
(path_conv::return_and_clear_normalized_path): Eliminate.
(path_conv::set_normalized_path): New function.
(path_conv::path_conv): Set info in dev element. Use path_conv methods Check
for FH_FS rather than FH_BAD to indicate when to fill in filesystem stuff.
where appropriate rather than direct access. Use set_normalized_path to set
normalized path.
(windows_device_names): Eliminate.
(get_dev): Ditto.
(get_raw_device_number): Ditto.
(get_device_number): Ditto.
(win32_device_name): Call new device name parser to do most of the heavy
lifting.
(mount_info::conv_to_win32_path): Fill in dev field as appropriate.
(symlink_worker): Handle new device files.
(symlink_info::check): Ditto.
(symlink_info::parse_device): Define new function.
* path.h (executable_states): Move here from fhandler.h.
(fs_info): Rename variables to *_storage and create methods for accessing same.
(path_conv): Add dev element, remove devn and unit and adjust inline methods to
accommodate.
(set_normalized_path): Declare new function.
* pinfo.cc (_pinfo::commune_recv): Add broken support for handling fifos.
(_pinfo::commune_send): Ditto.
* pipe.cc (fhandler_pipe::close): check for existence of handle before closing
it.
(handler_pipe::create): Rename from make_pipe. Change arguments to accept
fhandler_pipe array. Accommodate fifos.
(pipe): Rework to deal with fhandler_pipe::create changes.
(_pipe): Ditto.
* select.cc: Use individual device_specific types throughout rather than
indexing with obsolete device number.
(set_bits): Use is_socket call rather than checking device number.
* shared_info.h (CURR_MOUNT_MAGIC): Update.
(conv_to_win32_path): Reflect addition of device argument.
* syscalls.cc (mknod_worker): New function.
(open): Use build_fh_name to build fhandler.
(chown_worker): Detect if this is an 'auto' device rather than an on-filesystem
device and handle appropriately.
(chmod_device): New function.
(chmod): Detect if this is an 'auto' device rather than an on-filesystem device
and handle appropriately. Use chmod_device to set mode of in-filesystem
devices.
(stat_worker): Eliminate path_conv argument. Call build_fh_name to construct
fhandler. Use fh->error() rather than pc->error to detect errors in fhandler
construction.
(access_worker): New function pulled from access. Accommodate in-filesystem
devices.
(access): Use access_worker.
(fpathconf): Detect if this is an 'auto' device rather than an on-filesystem
device and handle appropriately.
(mknod_worker): New function.
(mknod32): New function.
(chroot): Free normalized path -- assuming it was actually cmalloced.
* tty.cc (create_tty_master): Tweak for new device class.
(tty::common_init): Ditto.
* winsup.h (stat_worker): Remove.
(symlink_worker): Declare.
* exceptions.cc (set_process_mask): Just call sig_dispatch_pending and don't
worry about pending_signals since sig_dispatch_pending should always do the
right thing now.
(sig_handle): Reorganize SIGCONT handling to more closely conform to SUSv3.
* pinfo.h: Move __SIG enum to sigproc.h.
(PICOM_FIFO): New enum element.
(_pinfo): Remove 'thread2signal' stuff throughout class.
(_pinfo::commune_send): Make varargs.
(_pinfo::sigtodo): Eliminate.
(_pinfo::thread2signal): Ditto.
* signal.cc (kill_worker): Eliminate call to setthread2signal.
* sigproc.cc (local_sigtodo): Eliminate.
(getlocal_sigtodo): Ditto.
(sigelem): New class.
(pending_signals): New class.
(sigqueue): New variable, start of sigqueue linked list.
(sigcatch_nonmain): Eliminate.
(sigcatch_main): Eliminate.
(sigcatch_nosync): Eliminate.
(sigcomplete_nonmain): Eliminate.
(pending_signals): Eliminate.
(sig_clear): Call signal thread to clear pending signals, unless already in
signal thread.
(sigpending): Call signal thread to get pending signals.
(sig_dispatch_pending): Eliminate use of pending_signals and just check
sigqueue.
(sigproc_terminate): Eliminate all of the obsolete semaphore stuff. Close
signal pipe handle.
(sig_send): Eliminate all of the obsolete semaphore stuff and use pipe to send
signals.
(getevent): Eliminate.
(pending_signals::add): New function.
(pending_signals::del): New function.
(pending_signals::next): New function.
(wait_sig): Eliminate all of the obsolete semaphore stuff. Use pipe to
communicate and maintain a linked list of signals.
* sigproc.h: Move __SIG defines here. Add __SIGPENDING.
(sig_dispatch_pending): Remove "C" specifier.
(sig_handle): Accept a mask argument.
* thread.cc: Remove signal handling considerations throughout.
2003-09-25 08:37:18 +08:00
|
|
|
#include "fhandler.h"
|
2001-04-19 05:10:15 +08:00
|
|
|
#include "dtable.h"
|
2000-09-03 12:16:35 +08:00
|
|
|
#include "cygheap.h"
|
2000-09-08 00:23:51 +08:00
|
|
|
#include "shared_info.h"
|
2003-12-24 00:26:31 +08:00
|
|
|
#include "cygtls.h"
|
2008-03-07 19:24:51 +08:00
|
|
|
#include "tls_pbuf.h"
|
2006-08-02 23:11:48 +08:00
|
|
|
#include "environ.h"
|
2000-10-13 06:15:47 +08:00
|
|
|
#include <assert.h>
|
2007-01-17 02:01:06 +08:00
|
|
|
#include <ntdll.h>
|
2007-07-19 19:41:17 +08:00
|
|
|
#include <wchar.h>
|
2008-07-17 04:20:45 +08:00
|
|
|
#include <wctype.h>
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2009-01-03 13:12:22 +08:00
|
|
|
suffix_info stat_suffixes[] =
|
|
|
|
{
|
|
|
|
suffix_info ("", 1),
|
|
|
|
suffix_info (".exe", 1),
|
|
|
|
suffix_info (NULL)
|
|
|
|
};
|
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
struct symlink_info
|
|
|
|
{
|
|
|
|
char contents[SYMLINK_MAX + 1];
|
|
|
|
char *ext_here;
|
|
|
|
int extn;
|
|
|
|
unsigned pflags;
|
|
|
|
DWORD fileattr;
|
|
|
|
int issymlink;
|
|
|
|
bool ext_tacked_on;
|
|
|
|
int error;
|
|
|
|
bool isdevice;
|
|
|
|
_major_t major;
|
|
|
|
_minor_t minor;
|
|
|
|
_mode_t mode;
|
2010-06-15 20:05:15 +08:00
|
|
|
int check (char *path, const suffix_info *suffixes, fs_info &fs,
|
|
|
|
path_conv_handle &conv_hdl);
|
2008-05-23 19:00:35 +08:00
|
|
|
int set (char *path);
|
|
|
|
bool parse_device (const char *);
|
|
|
|
int check_sysfile (HANDLE h);
|
|
|
|
int check_shortcut (HANDLE h);
|
2011-12-24 21:11:34 +08:00
|
|
|
int check_reparse_point (HANDLE h, bool remote);
|
2008-05-23 19:00:35 +08:00
|
|
|
int check_nfs_symlink (HANDLE h);
|
|
|
|
int posixify (char *srcbuf);
|
|
|
|
bool set_error (int);
|
|
|
|
};
|
|
|
|
|
|
|
|
muto NO_COPY cwdstuff::cwd_lock;
|
|
|
|
|
|
|
|
static const GUID GUID_shortcut
|
2008-09-11 12:34:24 +08:00
|
|
|
= { 0x00021401L, 0, 0, {0xc0, 0, 0, 0, 0, 0, 0, 0x46}};
|
2008-05-23 19:00:35 +08:00
|
|
|
|
2012-07-02 08:40:06 +08:00
|
|
|
enum
|
|
|
|
{
|
2008-05-23 19:00:35 +08:00
|
|
|
WSH_FLAG_IDLIST = 0x01, /* Contains an ITEMIDLIST. */
|
|
|
|
WSH_FLAG_FILE = 0x02, /* Contains a file locator element. */
|
|
|
|
WSH_FLAG_DESC = 0x04, /* Contains a description. */
|
|
|
|
WSH_FLAG_RELPATH = 0x08, /* Contains a relative path. */
|
|
|
|
WSH_FLAG_WD = 0x10, /* Contains a working dir. */
|
|
|
|
WSH_FLAG_CMDLINE = 0x20, /* Contains command line args. */
|
|
|
|
WSH_FLAG_ICON = 0x40 /* Contains a custom icon. */
|
|
|
|
};
|
|
|
|
|
|
|
|
struct win_shortcut_hdr
|
2012-07-02 08:40:06 +08:00
|
|
|
{
|
|
|
|
DWORD size; /* Header size in bytes. Must contain 0x4c. */
|
|
|
|
GUID magic; /* GUID of shortcut files. */
|
|
|
|
DWORD flags; /* Content flags. See above. */
|
|
|
|
|
|
|
|
/* The next fields from attr to icon_no are always set to 0 in Cygwin
|
|
|
|
and U/Win shortcuts. */
|
|
|
|
DWORD attr; /* Target file attributes. */
|
|
|
|
FILETIME ctime; /* These filetime items are never touched by the */
|
|
|
|
FILETIME mtime; /* system, apparently. Values don't matter. */
|
|
|
|
FILETIME atime;
|
|
|
|
DWORD filesize; /* Target filesize. */
|
|
|
|
DWORD icon_no; /* Icon number. */
|
|
|
|
|
|
|
|
DWORD run; /* Values defined in winuser.h. Use SW_NORMAL. */
|
|
|
|
DWORD hotkey; /* Hotkey value. Set to 0. */
|
|
|
|
DWORD dummy[2]; /* Future extension probably. Always 0. */
|
|
|
|
};
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Return non-zero if PATH1 is a prefix of PATH2.
|
|
|
|
Both are assumed to be of the same path style and / vs \ usage.
|
|
|
|
Neither may be "".
|
|
|
|
LEN1 = strlen (PATH1). It's passed because often it's already known.
|
|
|
|
|
|
|
|
Examples:
|
|
|
|
/foo/ is a prefix of /foo <-- may seem odd, but desired
|
|
|
|
/foo is a prefix of /foo/
|
|
|
|
/ is a prefix of /foo/bar
|
|
|
|
/ is not a prefix of foo/bar
|
|
|
|
foo/ is a prefix foo/bar
|
|
|
|
/foo is not a prefix of /foobar
|
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
2008-07-17 04:20:45 +08:00
|
|
|
path_prefix_p (const char *path1, const char *path2, int len1,
|
|
|
|
bool caseinsensitive)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
/* Handle case where PATH1 has trailing '/' and when it doesn't. */
|
|
|
|
if (len1 > 0 && isdirsep (path1[len1 - 1]))
|
|
|
|
len1--;
|
|
|
|
|
|
|
|
if (len1 == 0)
|
|
|
|
return isdirsep (path2[0]) && !isdirsep (path2[1]);
|
|
|
|
|
|
|
|
if (isdirsep (path2[len1]) || path2[len1] == 0 || path1[len1 - 1] == ':')
|
2009-01-10 00:20:26 +08:00
|
|
|
return caseinsensitive ? strncasematch (path1, path2, len1)
|
|
|
|
: !strncmp (path1, path2, len1);
|
2008-05-23 19:00:35 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Return non-zero if paths match in first len chars.
|
|
|
|
Check is dependent of the case sensitivity setting. */
|
|
|
|
int
|
2008-07-17 04:20:45 +08:00
|
|
|
pathnmatch (const char *path1, const char *path2, int len, bool caseinsensitive)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2008-07-17 04:20:45 +08:00
|
|
|
return caseinsensitive
|
|
|
|
? strncasematch (path1, path2, len) : !strncmp (path1, path2, len);
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Return non-zero if paths match. Check is dependent of the case
|
|
|
|
sensitivity setting. */
|
|
|
|
int
|
2008-07-17 04:20:45 +08:00
|
|
|
pathmatch (const char *path1, const char *path2, bool caseinsensitive)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2008-07-17 04:20:45 +08:00
|
|
|
return caseinsensitive
|
|
|
|
? strcasematch (path1, path2) : !strcmp (path1, path2);
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* TODO: This function is used in mkdir and rmdir to generate correct
|
|
|
|
error messages in case of paths ending in /. or /.. components.
|
|
|
|
Right now, normalize_posix_path will just normalize
|
|
|
|
those components away, which changes the semantics. */
|
|
|
|
bool
|
|
|
|
has_dot_last_component (const char *dir, bool test_dot_dot)
|
|
|
|
{
|
|
|
|
/* SUSv3: . and .. are not allowed as last components in various system
|
|
|
|
calls. Don't test for backslash path separator since that's a Win32
|
|
|
|
path following Win32 rules. */
|
2009-10-02 14:04:57 +08:00
|
|
|
const char *last_comp = strchr (dir, '\0');
|
|
|
|
|
|
|
|
if (last_comp == dir)
|
|
|
|
return false; /* Empty string. Probably shouldn't happen here? */
|
|
|
|
|
|
|
|
/* Detect run of trailing slashes */
|
|
|
|
while (last_comp > dir && *--last_comp == '/')
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/* Detect just a run of slashes or a path that does not end with a slash. */
|
|
|
|
if (*last_comp != '.')
|
|
|
|
return false;
|
|
|
|
|
|
|
|
/* We know we have a trailing dot here. Check that it really is a standalone "."
|
|
|
|
path component by checking that it is at the beginning of the string or is
|
|
|
|
preceded by a "/" */
|
|
|
|
if (last_comp == dir || *--last_comp == '/')
|
|
|
|
return true;
|
|
|
|
|
|
|
|
/* If we're not checking for '..' we're done. Ditto if we're now pointing to
|
|
|
|
a non-dot. */
|
|
|
|
if (!test_dot_dot || *last_comp != '.')
|
|
|
|
return false; /* either not testing for .. or this was not '..' */
|
|
|
|
|
|
|
|
/* Repeat previous test for standalone or path component. */
|
|
|
|
return last_comp == dir || last_comp[-1] == '/';
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Normalize a POSIX path.
|
|
|
|
All duplicate /'s, except for 2 leading /'s, are deleted.
|
|
|
|
The result is 0 for success, or an errno error value. */
|
|
|
|
|
|
|
|
int
|
|
|
|
normalize_posix_path (const char *src, char *dst, char *&tail)
|
|
|
|
{
|
|
|
|
const char *in_src = src;
|
|
|
|
char *dst_start = dst;
|
2013-06-13 01:45:42 +08:00
|
|
|
bool check_parent = false;
|
2008-05-23 19:00:35 +08:00
|
|
|
syscall_printf ("src %s", src);
|
|
|
|
|
|
|
|
if ((isdrive (src) && isdirsep (src[2])) || *src == '\\')
|
|
|
|
goto win32_path;
|
|
|
|
|
|
|
|
tail = dst;
|
|
|
|
if (!isslash (src[0]))
|
|
|
|
{
|
|
|
|
if (!cygheap->cwd.get (dst))
|
|
|
|
return get_errno ();
|
|
|
|
tail = strchr (tail, '\0');
|
|
|
|
if (isslash (dst[0]) && isslash (dst[1]))
|
|
|
|
++dst_start;
|
|
|
|
if (*src == '.')
|
|
|
|
{
|
|
|
|
if (tail == dst_start + 1 && *dst_start == '/')
|
|
|
|
tail--;
|
|
|
|
goto sawdot;
|
|
|
|
}
|
|
|
|
if (tail > dst && !isslash (tail[-1]))
|
|
|
|
*tail++ = '/';
|
|
|
|
}
|
|
|
|
/* Two leading /'s? If so, preserve them. */
|
|
|
|
else if (isslash (src[1]) && !isslash (src[2]))
|
|
|
|
{
|
|
|
|
*tail++ = *src++;
|
|
|
|
++dst_start;
|
|
|
|
}
|
2001-04-29 07:48:28 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
while (*src)
|
|
|
|
{
|
|
|
|
if (*src == '\\')
|
|
|
|
goto win32_path;
|
|
|
|
/* Strip runs of /'s. */
|
|
|
|
if (!isslash (*src))
|
|
|
|
*tail++ = *src++;
|
|
|
|
else
|
|
|
|
{
|
2013-06-13 01:45:42 +08:00
|
|
|
check_parent = true;
|
2008-05-23 19:00:35 +08:00
|
|
|
while (*++src)
|
|
|
|
{
|
|
|
|
if (isslash (*src))
|
|
|
|
continue;
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (*src != '.')
|
|
|
|
break;
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
sawdot:
|
|
|
|
if (src[1] != '.')
|
|
|
|
{
|
|
|
|
if (!src[1])
|
|
|
|
{
|
|
|
|
*tail++ = '/';
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
if (!isslash (src[1]))
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
else if (src[2] && !isslash (src[2]))
|
|
|
|
break;
|
|
|
|
else
|
|
|
|
{
|
2013-06-13 01:45:42 +08:00
|
|
|
/* According to POSIX semantics all elements of path must
|
|
|
|
exist. To follow it, we must validate our path before
|
|
|
|
removing the trailing component. Check_parent is needed
|
|
|
|
for performance optimization, in order not to verify paths
|
|
|
|
which are already verified. For example this prevents
|
|
|
|
double check in case of foo/bar/../.. */
|
|
|
|
if (check_parent)
|
|
|
|
{
|
|
|
|
*tail = 0;
|
|
|
|
debug_printf ("checking %s before '..'", dst_start);
|
|
|
|
path_conv head (dst_start);
|
|
|
|
if (!head.isdir())
|
|
|
|
return ENOENT;
|
|
|
|
check_parent = false;
|
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
while (tail > dst_start && !isslash (*--tail))
|
|
|
|
continue;
|
|
|
|
src++;
|
|
|
|
}
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2004-12-19 11:27:09 +08:00
|
|
|
*tail++ = '/';
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
if ((tail - dst) >= NT_MAX_PATH)
|
2001-04-29 07:48:28 +08:00
|
|
|
{
|
2008-05-23 19:00:35 +08:00
|
|
|
debug_printf ("ENAMETOOLONG = normalize_posix_path (%s)", src);
|
|
|
|
return ENAMETOOLONG;
|
2001-04-29 07:48:28 +08:00
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
done:
|
|
|
|
*tail = '\0';
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
debug_printf ("%s = normalize_posix_path (%s)", dst, in_src);
|
|
|
|
return 0;
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
win32_path:
|
|
|
|
int err = normalize_win32_path (in_src, dst, tail);
|
|
|
|
if (!err)
|
|
|
|
for (char *p = dst; (p = strchr (p, '\\')); p++)
|
|
|
|
*p = '/';
|
|
|
|
return err ?: -1;
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
inline void
|
|
|
|
path_conv::add_ext_from_sym (symlink_info &sym)
|
|
|
|
{
|
|
|
|
if (sym.ext_here && *sym.ext_here)
|
|
|
|
{
|
|
|
|
known_suffix = path + sym.extn;
|
|
|
|
if (sym.ext_tacked_on)
|
2009-08-02 03:52:46 +08:00
|
|
|
strcpy ((char *) known_suffix, sym.ext_here);
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-01-21 12:34:52 +08:00
|
|
|
static void __reg2 mkrelpath (char *dst, bool caseinsensitive);
|
2009-08-02 03:52:46 +08:00
|
|
|
|
2013-05-01 09:20:37 +08:00
|
|
|
static void __reg2
|
2008-07-17 04:20:45 +08:00
|
|
|
mkrelpath (char *path, bool caseinsensitive)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
tmp_pathbuf tp;
|
|
|
|
char *cwd_win32 = tp.c_get ();
|
|
|
|
if (!cygheap->cwd.get (cwd_win32, 0))
|
|
|
|
return;
|
|
|
|
|
|
|
|
unsigned cwdlen = strlen (cwd_win32);
|
2008-07-17 04:20:45 +08:00
|
|
|
if (!path_prefix_p (cwd_win32, path, cwdlen, caseinsensitive))
|
2008-05-23 19:00:35 +08:00
|
|
|
return;
|
|
|
|
|
|
|
|
size_t n = strlen (path);
|
|
|
|
if (n < cwdlen)
|
|
|
|
return;
|
|
|
|
|
|
|
|
char *tail = path;
|
|
|
|
if (n == cwdlen)
|
|
|
|
tail += cwdlen;
|
|
|
|
else
|
|
|
|
tail += isdirsep (cwd_win32[cwdlen - 1]) ? cwdlen : cwdlen + 1;
|
|
|
|
|
|
|
|
memmove (path, tail, strlen (tail) + 1);
|
|
|
|
if (!*path)
|
|
|
|
strcpy (path, ".");
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
path_conv::set_normalized_path (const char *path_copy)
|
|
|
|
{
|
2009-07-30 16:56:57 +08:00
|
|
|
if (path_copy)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2009-07-30 16:56:57 +08:00
|
|
|
size_t n = strlen (path_copy) + 1;
|
2010-04-10 00:51:08 +08:00
|
|
|
char *p = (char *) crealloc_abort ((void *) normalized_path, n);
|
2009-08-02 03:52:46 +08:00
|
|
|
normalized_path = (const char *) memcpy (p, path_copy, n);
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-05-09 23:08:16 +08:00
|
|
|
static inline void
|
|
|
|
str2uni_cat (UNICODE_STRING &tgt, const char *srcstr)
|
|
|
|
{
|
|
|
|
int len = sys_mbstowcs (tgt.Buffer + tgt.Length / sizeof (WCHAR),
|
|
|
|
(tgt.MaximumLength - tgt.Length) / sizeof (WCHAR),
|
|
|
|
srcstr);
|
|
|
|
if (len)
|
|
|
|
tgt.Length += (len - 1) * sizeof (WCHAR);
|
|
|
|
}
|
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
PUNICODE_STRING
|
2010-04-23 19:07:35 +08:00
|
|
|
get_nt_native_path (const char *path, UNICODE_STRING& upath, bool dos)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
upath.Length = 0;
|
|
|
|
if (path[0] == '/') /* special path w/o NT path representation. */
|
|
|
|
str2uni_cat (upath, path);
|
2008-06-11 22:06:05 +08:00
|
|
|
else if (path[0] != '\\') /* X:\... or relative path. */
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2008-06-11 22:06:05 +08:00
|
|
|
if (path[1] == ':') /* X:\... */
|
2008-07-17 04:20:45 +08:00
|
|
|
{
|
2009-07-15 01:37:42 +08:00
|
|
|
RtlAppendUnicodeStringToString (&upath, &ro_u_natp);
|
2008-07-17 04:20:45 +08:00
|
|
|
str2uni_cat (upath, path);
|
|
|
|
/* The drive letter must be upper case. */
|
|
|
|
upath.Buffer[4] = towupper (upath.Buffer[4]);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
str2uni_cat (upath, path);
|
|
|
|
transform_chars (&upath, 7);
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
else if (path[1] != '\\') /* \Device\... */
|
|
|
|
str2uni_cat (upath, path);
|
|
|
|
else if ((path[2] != '.' && path[2] != '?')
|
|
|
|
|| path[3] != '\\') /* \\server\share\... */
|
|
|
|
{
|
2009-07-15 01:37:42 +08:00
|
|
|
RtlAppendUnicodeStringToString (&upath, &ro_u_uncp);
|
2008-05-23 19:00:35 +08:00
|
|
|
str2uni_cat (upath, path + 2);
|
2008-07-17 04:20:45 +08:00
|
|
|
transform_chars (&upath, 8);
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
else /* \\.\device or \\?\foo */
|
|
|
|
{
|
2009-07-15 01:37:42 +08:00
|
|
|
RtlAppendUnicodeStringToString (&upath, &ro_u_natp);
|
2008-05-23 19:00:35 +08:00
|
|
|
str2uni_cat (upath, path + 4);
|
|
|
|
}
|
2010-04-23 19:07:35 +08:00
|
|
|
if (dos)
|
|
|
|
{
|
|
|
|
/* Unfortunately we can't just use transform_chars with the tfx_rev_chars
|
2011-07-26 17:54:11 +08:00
|
|
|
table since only leading and trailing spaces and dots are affected.
|
2010-04-23 19:07:35 +08:00
|
|
|
So we step to every backslash and fix surrounding dots and spaces.
|
|
|
|
That makes these broken filesystems a bit slower, but, hey. */
|
|
|
|
PWCHAR cp = upath.Buffer + 7;
|
|
|
|
PWCHAR cend = upath.Buffer + upath.Length / sizeof (WCHAR);
|
|
|
|
while (++cp < cend)
|
|
|
|
if (*cp == L'\\')
|
|
|
|
{
|
|
|
|
PWCHAR ccp = cp - 1;
|
|
|
|
while (*ccp == L'.' || *ccp == L' ')
|
|
|
|
*ccp-- |= 0xf000;
|
|
|
|
while (cp[1] == L' ')
|
|
|
|
*++cp |= 0xf000;
|
|
|
|
}
|
|
|
|
while (*--cp == L'.' || *cp == L' ')
|
2011-06-06 13:02:13 +08:00
|
|
|
*cp |= 0xf000;
|
2010-04-23 19:07:35 +08:00
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
return &upath;
|
|
|
|
}
|
2004-05-01 01:36:36 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
PUNICODE_STRING
|
|
|
|
path_conv::get_nt_native_path ()
|
|
|
|
{
|
2011-10-24 01:19:17 +08:00
|
|
|
PUNICODE_STRING res;
|
|
|
|
if (wide_path)
|
|
|
|
res = &uni_path;
|
|
|
|
else if (!path)
|
|
|
|
res = NULL;
|
|
|
|
else
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
uni_path.Length = 0;
|
|
|
|
uni_path.MaximumLength = (strlen (path) + 10) * sizeof (WCHAR);
|
|
|
|
wide_path = (PWCHAR) cmalloc_abort (HEAP_STR, uni_path.MaximumLength);
|
|
|
|
uni_path.Buffer = wide_path;
|
2010-04-29 18:38:05 +08:00
|
|
|
::get_nt_native_path (path, uni_path, has_dos_filenames_only ());
|
2011-10-24 01:19:17 +08:00
|
|
|
res = &uni_path;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2011-10-24 01:19:17 +08:00
|
|
|
return res;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2007-07-19 19:41:17 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
PWCHAR
|
|
|
|
path_conv::get_wide_win32_path (PWCHAR wc)
|
|
|
|
{
|
|
|
|
get_nt_native_path ();
|
2009-04-15 17:58:41 +08:00
|
|
|
if (!wide_path)
|
2008-05-23 19:00:35 +08:00
|
|
|
return NULL;
|
2009-04-15 17:58:41 +08:00
|
|
|
wcpcpy (wc, wide_path);
|
|
|
|
if (wc[1] == L'?')
|
|
|
|
wc[1] = L'\\';
|
2008-05-23 19:00:35 +08:00
|
|
|
return wc;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
warn_msdos (const char *src)
|
|
|
|
{
|
2009-03-15 02:35:26 +08:00
|
|
|
if (user_shared->warned_msdos || !dos_file_warning || !cygwin_finished_initializing)
|
2008-05-23 19:00:35 +08:00
|
|
|
return;
|
|
|
|
tmp_pathbuf tp;
|
|
|
|
char *posix_path = tp.c_get ();
|
|
|
|
small_printf ("cygwin warning:\n");
|
|
|
|
if (cygwin_conv_path (CCP_WIN_A_TO_POSIX | CCP_RELATIVE, src,
|
|
|
|
posix_path, NT_MAX_PATH))
|
2010-02-20 17:17:07 +08:00
|
|
|
small_printf (" MS-DOS style path detected: %ls\n POSIX equivalent preferred.\n",
|
2008-05-23 19:00:35 +08:00
|
|
|
src);
|
|
|
|
else
|
2010-02-20 17:17:07 +08:00
|
|
|
small_printf (" MS-DOS style path detected: %ls\n Preferred POSIX equivalent is: %ls\n",
|
2008-05-23 19:00:35 +08:00
|
|
|
src, posix_path);
|
|
|
|
small_printf (" CYGWIN environment variable option \"nodosfilewarning\" turns off this warning.\n"
|
|
|
|
" Consult the user's guide for more details about POSIX paths:\n"
|
|
|
|
" http://cygwin.com/cygwin-ug-net/using.html#using-pathnames\n");
|
|
|
|
user_shared->warned_msdos = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static DWORD
|
2008-07-17 04:20:45 +08:00
|
|
|
getfileattr (const char *path, bool caseinsensitive) /* path has to be always absolute. */
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
tmp_pathbuf tp;
|
|
|
|
UNICODE_STRING upath;
|
|
|
|
OBJECT_ATTRIBUTES attr;
|
|
|
|
FILE_BASIC_INFORMATION fbi;
|
|
|
|
NTSTATUS status;
|
|
|
|
IO_STATUS_BLOCK io;
|
|
|
|
|
|
|
|
tp.u_get (&upath);
|
2008-07-17 04:20:45 +08:00
|
|
|
InitializeObjectAttributes (&attr, &upath,
|
|
|
|
caseinsensitive ? OBJ_CASE_INSENSITIVE : 0,
|
|
|
|
NULL, NULL);
|
2010-04-23 19:07:35 +08:00
|
|
|
get_nt_native_path (path, upath, false);
|
2008-05-23 19:00:35 +08:00
|
|
|
|
|
|
|
status = NtQueryAttributesFile (&attr, &fbi);
|
|
|
|
if (NT_SUCCESS (status))
|
|
|
|
return fbi.FileAttributes;
|
|
|
|
|
|
|
|
if (status != STATUS_OBJECT_NAME_NOT_FOUND
|
|
|
|
&& status != STATUS_NO_SUCH_FILE) /* File not found on 9x share */
|
|
|
|
{
|
|
|
|
/* File exists but access denied. Try to get attribute through
|
|
|
|
directory query. */
|
|
|
|
UNICODE_STRING dirname, basename;
|
|
|
|
HANDLE dir;
|
2013-04-23 17:44:36 +08:00
|
|
|
FILE_BOTH_DIR_INFORMATION fdi;
|
2008-05-23 19:00:35 +08:00
|
|
|
|
|
|
|
RtlSplitUnicodePath (&upath, &dirname, &basename);
|
|
|
|
InitializeObjectAttributes (&attr, &dirname,
|
2008-07-17 04:20:45 +08:00
|
|
|
caseinsensitive ? OBJ_CASE_INSENSITIVE : 0,
|
|
|
|
NULL, NULL);
|
2008-05-23 19:00:35 +08:00
|
|
|
status = NtOpenFile (&dir, SYNCHRONIZE | FILE_LIST_DIRECTORY,
|
|
|
|
&attr, &io, FILE_SHARE_VALID_FLAGS,
|
|
|
|
FILE_SYNCHRONOUS_IO_NONALERT
|
|
|
|
| FILE_OPEN_FOR_BACKUP_INTENT
|
|
|
|
| FILE_DIRECTORY_FILE);
|
|
|
|
if (NT_SUCCESS (status))
|
|
|
|
{
|
|
|
|
status = NtQueryDirectoryFile (dir, NULL, NULL, 0, &io,
|
|
|
|
&fdi, sizeof fdi,
|
2010-01-29 19:20:06 +08:00
|
|
|
FileBothDirectoryInformation,
|
2008-05-23 19:00:35 +08:00
|
|
|
TRUE, &basename, TRUE);
|
|
|
|
NtClose (dir);
|
|
|
|
if (NT_SUCCESS (status) || status == STATUS_BUFFER_OVERFLOW)
|
|
|
|
return fdi.FileAttributes;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
SetLastError (RtlNtStatusToDosError (status));
|
|
|
|
return INVALID_FILE_ATTRIBUTES;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Convert an arbitrary path SRC to a pure Win32 path, suitable for
|
|
|
|
passing to Win32 API routines.
|
|
|
|
|
|
|
|
If an error occurs, `error' is set to the errno value.
|
|
|
|
Otherwise it is set to 0.
|
|
|
|
|
|
|
|
follow_mode values:
|
|
|
|
SYMLINK_FOLLOW - convert to PATH symlink points to
|
|
|
|
SYMLINK_NOFOLLOW - convert to PATH of symlink itself
|
|
|
|
SYMLINK_IGNORE - do not check PATH for symlinks
|
|
|
|
SYMLINK_CONTENTS - just return symlink contents
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* TODO: This implementation is only preliminary. For internal
|
|
|
|
purposes it's necessary to have a path_conv::check function which
|
|
|
|
takes a UNICODE_STRING src path, otherwise we waste a lot of time
|
|
|
|
for converting back and forth. The below implementation does
|
|
|
|
realy nothing but converting to char *, until path_conv handles
|
|
|
|
wide-char paths directly. */
|
|
|
|
void
|
|
|
|
path_conv::check (const UNICODE_STRING *src, unsigned opt,
|
|
|
|
const suffix_info *suffixes)
|
|
|
|
{
|
|
|
|
tmp_pathbuf tp;
|
|
|
|
char *path = tp.c_get ();
|
|
|
|
|
|
|
|
user_shared->warned_msdos = true;
|
|
|
|
sys_wcstombs (path, NT_MAX_PATH, src->Buffer, src->Length / sizeof (WCHAR));
|
|
|
|
path_conv::check (path, opt, suffixes);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
path_conv::check (const char *src, unsigned opt,
|
|
|
|
const suffix_info *suffixes)
|
|
|
|
{
|
|
|
|
/* The tmp_buf array is used when expanding symlinks. It is NT_MAX_PATH * 2
|
|
|
|
in length so that we can hold the expanded symlink plus a trailer. */
|
|
|
|
tmp_pathbuf tp;
|
|
|
|
char *path_copy = tp.c_get ();
|
|
|
|
char *pathbuf = tp.c_get ();
|
|
|
|
char *tmp_buf = tp.t_get ();
|
2009-07-30 16:56:57 +08:00
|
|
|
char *THIS_path = tp.c_get ();
|
2008-05-23 19:00:35 +08:00
|
|
|
symlink_info sym;
|
|
|
|
bool need_directory = 0;
|
|
|
|
bool saw_symlinks = 0;
|
2009-07-30 16:56:57 +08:00
|
|
|
bool add_ext = false;
|
2008-05-23 19:00:35 +08:00
|
|
|
bool is_relpath;
|
|
|
|
char *tail, *path_end;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
#if 0
|
|
|
|
static path_conv last_path_conv;
|
|
|
|
static char last_src[CYG_MAX_PATH];
|
2000-10-23 11:35:50 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (*last_src && strcmp (last_src, src) == 0)
|
|
|
|
{
|
|
|
|
*this = last_path_conv;
|
2000-10-23 11:35:50 +08:00
|
|
|
return;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
#endif
|
2000-10-23 11:35:50 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
myfault efault;
|
|
|
|
if (efault.faulted ())
|
|
|
|
{
|
|
|
|
error = EFAULT;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
int loop = 0;
|
|
|
|
path_flags = 0;
|
|
|
|
known_suffix = NULL;
|
|
|
|
fileattr = INVALID_FILE_ATTRIBUTES;
|
2008-07-17 04:20:45 +08:00
|
|
|
caseinsensitive = OBJ_CASE_INSENSITIVE;
|
2008-05-23 19:00:35 +08:00
|
|
|
if (wide_path)
|
|
|
|
cfree (wide_path);
|
|
|
|
wide_path = NULL;
|
2009-07-30 16:56:57 +08:00
|
|
|
if (path)
|
2009-08-02 03:52:46 +08:00
|
|
|
{
|
|
|
|
cfree (modifiable_path ());
|
|
|
|
path = NULL;
|
|
|
|
}
|
2010-06-15 20:05:15 +08:00
|
|
|
close_conv_handle ();
|
2008-05-23 19:00:35 +08:00
|
|
|
memset (&dev, 0, sizeof (dev));
|
|
|
|
fs.clear ();
|
2009-07-30 16:56:57 +08:00
|
|
|
if (normalized_path)
|
2009-08-02 03:52:46 +08:00
|
|
|
{
|
|
|
|
cfree ((void *) normalized_path);
|
|
|
|
normalized_path = NULL;
|
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
int component = 0; // Number of translated components
|
|
|
|
|
|
|
|
if (!(opt & PC_NULLEMPTY))
|
|
|
|
error = 0;
|
|
|
|
else if (!*src)
|
|
|
|
{
|
|
|
|
error = ENOENT;
|
|
|
|
return;
|
|
|
|
}
|
2005-07-03 10:40:30 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
bool is_msdos = false;
|
|
|
|
/* This loop handles symlink expansion. */
|
|
|
|
for (;;)
|
|
|
|
{
|
|
|
|
MALLOC_CHECK;
|
|
|
|
assert (src);
|
2004-12-19 00:41:27 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
is_relpath = !isabspath (src);
|
|
|
|
error = normalize_posix_path (src, path_copy, tail);
|
|
|
|
if (error > 0)
|
|
|
|
return;
|
|
|
|
if (error < 0)
|
|
|
|
{
|
|
|
|
if (component == 0)
|
|
|
|
is_msdos = true;
|
|
|
|
error = 0;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Detect if the user was looking for a directory. We have to strip the
|
|
|
|
trailing slash initially while trying to add extensions but take it
|
|
|
|
into account during processing */
|
|
|
|
if (tail > path_copy + 2 && isslash (tail[-1]))
|
|
|
|
{
|
|
|
|
need_directory = 1;
|
|
|
|
*--tail = '\0';
|
|
|
|
}
|
|
|
|
path_end = tail;
|
|
|
|
|
|
|
|
/* Scan path_copy from right to left looking either for a symlink
|
|
|
|
or an actual existing file. If an existing file is found, just
|
|
|
|
return. If a symlink is found, exit the for loop.
|
|
|
|
Also: be careful to preserve the errno returned from
|
|
|
|
symlink.check as the caller may need it. */
|
|
|
|
/* FIXME: Do we have to worry about multiple \'s here? */
|
|
|
|
component = 0; // Number of translated components
|
|
|
|
sym.contents[0] = '\0';
|
|
|
|
|
|
|
|
int symlen = 0;
|
|
|
|
|
2010-06-15 20:05:15 +08:00
|
|
|
for (unsigned pflags_or = opt & (PC_NO_ACCESS_CHECK | PC_KEEP_HANDLE);
|
|
|
|
;
|
|
|
|
pflags_or = 0)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
const suffix_info *suff;
|
|
|
|
char *full_path;
|
|
|
|
|
|
|
|
/* Don't allow symlink.check to set anything in the path_conv
|
|
|
|
class if we're working on an inner component of the path */
|
|
|
|
if (component)
|
|
|
|
{
|
|
|
|
suff = NULL;
|
|
|
|
full_path = pathbuf;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
suff = suffixes;
|
2009-07-30 16:56:57 +08:00
|
|
|
full_path = THIS_path;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Convert to native path spec sans symbolic link info. */
|
|
|
|
error = mount_table->conv_to_win32_path (path_copy, full_path, dev,
|
|
|
|
&sym.pflags);
|
2001-06-03 10:31:16 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (error)
|
|
|
|
return;
|
2001-04-30 09:46:31 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
sym.pflags |= pflags_or;
|
2005-03-12 10:33:00 +08:00
|
|
|
|
2012-04-01 04:14:14 +08:00
|
|
|
if (!dev.exists ())
|
2012-04-01 01:38:00 +08:00
|
|
|
{
|
|
|
|
error = ENXIO;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-04-02 23:56:43 +08:00
|
|
|
if (iscygdrive_dev (dev))
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
if (!component)
|
|
|
|
fileattr = FILE_ATTRIBUTE_DIRECTORY | FILE_ATTRIBUTE_READONLY;
|
|
|
|
else
|
|
|
|
{
|
2009-07-30 16:56:57 +08:00
|
|
|
fileattr = getfileattr (THIS_path,
|
2008-07-17 04:20:45 +08:00
|
|
|
sym.pflags & MOUNT_NOPOSIX);
|
2011-05-29 02:17:09 +08:00
|
|
|
dev = FH_FS;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
goto out;
|
|
|
|
}
|
2012-03-30 02:02:54 +08:00
|
|
|
else if (isdev_dev (dev))
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2012-03-30 02:02:54 +08:00
|
|
|
/* Just make sure that the path handling goes on as with FH_FS. */
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2011-05-29 02:17:09 +08:00
|
|
|
else if (isvirtual_dev (dev))
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
/* FIXME: Calling build_fhandler here is not the right way to handle this. */
|
|
|
|
fhandler_virtual *fh = (fhandler_virtual *) build_fh_dev (dev, path_copy);
|
2012-04-08 01:32:44 +08:00
|
|
|
virtual_ftype_t file_type;
|
|
|
|
if (!fh)
|
|
|
|
file_type = virt_none;
|
|
|
|
else
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2012-04-08 01:32:44 +08:00
|
|
|
file_type = fh->exists ();
|
|
|
|
if (file_type == virt_symlink)
|
|
|
|
{
|
|
|
|
fh->fill_filebuf ();
|
|
|
|
symlen = sym.set (fh->get_filebuf ());
|
|
|
|
}
|
|
|
|
delete fh;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
switch (file_type)
|
|
|
|
{
|
2010-09-06 17:47:01 +08:00
|
|
|
case virt_directory:
|
|
|
|
case virt_rootdir:
|
2008-05-23 19:00:35 +08:00
|
|
|
if (component == 0)
|
|
|
|
fileattr = FILE_ATTRIBUTE_DIRECTORY;
|
|
|
|
break;
|
2010-09-06 17:47:01 +08:00
|
|
|
case virt_file:
|
2008-05-23 19:00:35 +08:00
|
|
|
if (component == 0)
|
|
|
|
fileattr = 0;
|
|
|
|
break;
|
2010-09-06 17:47:01 +08:00
|
|
|
case virt_symlink:
|
2008-05-23 19:00:35 +08:00
|
|
|
goto is_virtual_symlink;
|
2010-09-06 17:47:01 +08:00
|
|
|
case virt_pipe:
|
2008-05-23 19:00:35 +08:00
|
|
|
if (component == 0)
|
|
|
|
{
|
|
|
|
fileattr = 0;
|
|
|
|
dev.parse (FH_PIPE);
|
|
|
|
}
|
|
|
|
break;
|
2010-09-06 17:47:01 +08:00
|
|
|
case virt_socket:
|
2008-05-23 19:00:35 +08:00
|
|
|
if (component == 0)
|
|
|
|
{
|
|
|
|
fileattr = 0;
|
|
|
|
dev.parse (FH_TCP);
|
|
|
|
}
|
|
|
|
break;
|
2010-09-06 17:47:01 +08:00
|
|
|
case virt_fsdir:
|
|
|
|
case virt_fsfile:
|
|
|
|
/* Access to real file or directory via block device
|
|
|
|
entry in /proc/sys. Convert to real file and go with
|
|
|
|
the flow. */
|
|
|
|
dev.parse (FH_FS);
|
|
|
|
goto is_fs_via_procsys;
|
|
|
|
case virt_blk:
|
|
|
|
/* Block special device. If the trailing slash has been
|
|
|
|
requested, the target is the root directory of the
|
|
|
|
filesystem on this block device. So we convert this to
|
|
|
|
a real file and attach the backslash. */
|
2011-02-15 23:25:59 +08:00
|
|
|
if (component == 0 && need_directory)
|
2010-09-06 17:47:01 +08:00
|
|
|
{
|
|
|
|
dev.parse (FH_FS);
|
2011-02-15 23:25:59 +08:00
|
|
|
strcat (full_path, "\\");
|
|
|
|
fileattr = FILE_ATTRIBUTE_DIRECTORY
|
|
|
|
| FILE_ATTRIBUTE_DEVICE;
|
2010-09-06 17:47:01 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
/*FALLTHRU*/
|
|
|
|
case virt_chr:
|
|
|
|
if (component == 0)
|
|
|
|
fileattr = FILE_ATTRIBUTE_DEVICE;
|
|
|
|
break;
|
2008-05-23 19:00:35 +08:00
|
|
|
default:
|
|
|
|
if (component == 0)
|
|
|
|
fileattr = INVALID_FILE_ATTRIBUTES;
|
|
|
|
goto virtual_component_retry;
|
|
|
|
}
|
2011-05-29 02:17:09 +08:00
|
|
|
if (component == 0 || dev != FH_NETDRIVE)
|
2008-05-23 19:00:35 +08:00
|
|
|
path_flags |= PATH_RO;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
/* devn should not be a device. If it is, then stop parsing now. */
|
2011-05-29 02:17:09 +08:00
|
|
|
else if (dev != FH_FS)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
fileattr = 0;
|
|
|
|
path_flags = sym.pflags;
|
|
|
|
if (component)
|
|
|
|
{
|
|
|
|
error = ENOTDIR;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
goto out; /* Found a device. Stop parsing. */
|
|
|
|
}
|
2001-04-30 09:46:31 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* If path is only a drivename, Windows interprets it as the
|
|
|
|
current working directory on this drive instead of the root
|
|
|
|
dir which is what we want. So we need the trailing backslash
|
|
|
|
in this case. */
|
|
|
|
if (full_path[0] && full_path[1] == ':' && full_path[2] == '\0')
|
|
|
|
{
|
|
|
|
full_path[2] = '\\';
|
|
|
|
full_path[3] = '\0';
|
|
|
|
}
|
2005-01-29 19:23:07 +08:00
|
|
|
|
2010-05-06 18:04:50 +08:00
|
|
|
/* If the incoming path was given in DOS notation, always treat
|
|
|
|
it as caseinsensitive,noacl path. This must be set before
|
|
|
|
calling sym.check, otherwise the path is potentially treated
|
|
|
|
casesensitive. */
|
|
|
|
if (is_msdos)
|
|
|
|
sym.pflags |= PATH_NOPOSIX | PATH_NOACL;
|
|
|
|
|
2010-09-06 17:47:01 +08:00
|
|
|
is_fs_via_procsys:
|
|
|
|
|
2010-06-15 20:05:15 +08:00
|
|
|
symlen = sym.check (full_path, suff, fs, conv_handle);
|
* devices.cc: New file.
* devices.gperf: New file.
* devices.shilka: New file.
* cygwin-gperf: New file.
* cygwin-shilka: New file.
* fhandler_fifo.cc: New file.
* fhandler_nodevice.cc : New file. Reorganize headers so that path.h precedes
fhandler.h throughout. Remove device argument and unit arguments from fhandler
constructors throughout. Remove pc arguments to fhandler functions and use
internal pc element instead, throughout. Use dev element in pc throughout.
Use major/minor elements rather than units and device numbers previously in
fhandler class. Use correct methods for fhandler file names rather than
directly accessing file name variables, throughout.
* Makefile.in (DLL_OFILES): Add devices.o, fhandler_fifo.o
* dcrt0.cc (dll_crt0_1): Call device::init.
* devices.h: Renumber devices based on more Linux-like major/minor numbers.
Add more devices. Declare standard device storage.
(device): Declare struct.
* dir.cc (opendir): Use new 'build_fh_name' to construct a fhandler_* type.
* dtable.cc (dtable::get_debugger_info): Ditto.
(cygwin_attach_handle_to_fd): Ditto.
(dtable::release): Remove special FH_SOCKET case in favor of generic
"need_fixup_before" test.
(dtable::init_std_file_from_handle): Use either build_fh_dev or build_fh_name
to build standard fhandler.
(dtable::build_fh_name): Renamed from dtable::build_fhandler_from_name. Move
out of dtable class. Don't accept a path_conv argument. Just build it here
and pass it to:
(build_fh_pc): Renamed from dtable::build_fhandler. Move out of dtable class.
Use intrinsic device type in path_conv to create new fhandler.
(build_fh_dev): Renamed from dtable::build_fhandler. Move out of dtable class.
Simplify arguments to just take new 'device' type and a name. Just return
pointer to fhandler rather than trying to insert into dtable.
(dtable::dup_worker): Accommodate above build_fh name changes.
(dtable::find_fifo): New (currently broken) function.
(handle_to_fn): Use strechr for efficiency.
* dtable.h: Reflect above build_fh name changes and argument differences.
(fhandler_base *&operator []): Return self rather than copy of self.
* fhandler.cc (fhandler_base::operator =): Use pc element to set normalized
path.
(fhandler_base::set_name): Ditto.
(fhandler_base::raw_read): Use method to access name.
(fhandler_base::write): Correctly use get_output_handle rather than get_handle.
(handler_base::device_access_denied): New function.
(fhandler_base::open): Eliminate pc argument and use pc element of
fhandler_base throughout.
(fhandler_base::fstat): Detect if device is based in filesystem and use
fstat_fs to calculate stat, if so.
(fhandler_base::fhandler_base): Eliminate handling of file names and, instead,
just free appropriate component from pc.
(fhandler_base::opendir): Remove path_conv parameter.
* fhandler.h: Remove all device flags.
(fhandler_base::pc): New element.
(fhandler_base::set_name): Change argument to path_conv.
(fhandler_base::error): New function.
(fhandler_base::exists): New function.
(fhandler_base::pc_binmode): New function.
(fhandler_base::dev): New function.
(fhandler_base::open_fs): New function.
(fhandler_base::fstat_fs): New function.
(fhandler_base::fstat_by_name): New function.
(fhandler_base::fstat_by_handle): New function.
(fhandler_base::isfifo): New function.
(fhandler_base::is_slow): New function.
(fhandler_base::is_auto_device): New function.
(fhandler_base::is_fs_special): New function.
(fhandler_base::device_access_denied): New function.
(fhandler_base::operator DWORD&): New operator.
(fhandler_base::get_name): Return normalized path from pc.
(fhandler_base::get_win32_name): Return windows path from pc.
(fhandler_base::isdevice): Renamed from is_device.
(fhandler_base::get_native_name): Return device format.
(fhandler_fifo): New class.
(fhandler_nodevice): New class.
(select_stuff::device_specific): Remove array.
(select_stuff::device_specific_pipe): New class element.
(select_stuff::device_specific_socket): New class element.
(select_stuff::device_specific_serial): New class element.
(select_stuff::select_stuff): Initialize new elements.
* fhandler_disk_file.cc (fhandler_base::fstat_by_handle): Move to base class
from fhandler_disk_file.
(fhandler_base::fstat_by_name): Ditto.
(fhandler_base::fstat_by_name): Ditto.
(fhandler_disk_file::open): Move most functionality into
fhandler_base::open_fs.
(fhandler_base::open_fs): New function.
(fhandler_disk_file::close): Move most functionality into
fhandler_base::close_fs.
(fhandler_base::close_fs): New function.
* fhandler_mem.cc (fhandler_dev_mem::open): Use device name in debugging
output.
* fhandler_socket.cc (fhandler_socket::set_connect_secret): Copy standard
urandom device into appropriate place.
(fhandler_socket::accept): Reflect change in fdsock return value.
* fhandler_tty.cc: See "throughouts" above.
* net.cc: Accommodate fdsock change throughout.
(fdsock): Return success or failure, accept fd argument and device argument.
* path.cc (symlink_info::major): New element.
(symlink_info::minor): New element.
(symlink_info::parse_device): Declare new function.
(fs_info::update): Accommodate changes in path_conv class.
(path_conv::fillin): Ditto.
(path_conv::return_and_clear_normalized_path): Eliminate.
(path_conv::set_normalized_path): New function.
(path_conv::path_conv): Set info in dev element. Use path_conv methods Check
for FH_FS rather than FH_BAD to indicate when to fill in filesystem stuff.
where appropriate rather than direct access. Use set_normalized_path to set
normalized path.
(windows_device_names): Eliminate.
(get_dev): Ditto.
(get_raw_device_number): Ditto.
(get_device_number): Ditto.
(win32_device_name): Call new device name parser to do most of the heavy
lifting.
(mount_info::conv_to_win32_path): Fill in dev field as appropriate.
(symlink_worker): Handle new device files.
(symlink_info::check): Ditto.
(symlink_info::parse_device): Define new function.
* path.h (executable_states): Move here from fhandler.h.
(fs_info): Rename variables to *_storage and create methods for accessing same.
(path_conv): Add dev element, remove devn and unit and adjust inline methods to
accommodate.
(set_normalized_path): Declare new function.
* pinfo.cc (_pinfo::commune_recv): Add broken support for handling fifos.
(_pinfo::commune_send): Ditto.
* pipe.cc (fhandler_pipe::close): check for existence of handle before closing
it.
(handler_pipe::create): Rename from make_pipe. Change arguments to accept
fhandler_pipe array. Accommodate fifos.
(pipe): Rework to deal with fhandler_pipe::create changes.
(_pipe): Ditto.
* select.cc: Use individual device_specific types throughout rather than
indexing with obsolete device number.
(set_bits): Use is_socket call rather than checking device number.
* shared_info.h (CURR_MOUNT_MAGIC): Update.
(conv_to_win32_path): Reflect addition of device argument.
* syscalls.cc (mknod_worker): New function.
(open): Use build_fh_name to build fhandler.
(chown_worker): Detect if this is an 'auto' device rather than an on-filesystem
device and handle appropriately.
(chmod_device): New function.
(chmod): Detect if this is an 'auto' device rather than an on-filesystem device
and handle appropriately. Use chmod_device to set mode of in-filesystem
devices.
(stat_worker): Eliminate path_conv argument. Call build_fh_name to construct
fhandler. Use fh->error() rather than pc->error to detect errors in fhandler
construction.
(access_worker): New function pulled from access. Accommodate in-filesystem
devices.
(access): Use access_worker.
(fpathconf): Detect if this is an 'auto' device rather than an on-filesystem
device and handle appropriately.
(mknod_worker): New function.
(mknod32): New function.
(chroot): Free normalized path -- assuming it was actually cmalloced.
* tty.cc (create_tty_master): Tweak for new device class.
(tty::common_init): Ditto.
* winsup.h (stat_worker): Remove.
(symlink_worker): Declare.
* exceptions.cc (set_process_mask): Just call sig_dispatch_pending and don't
worry about pending_signals since sig_dispatch_pending should always do the
right thing now.
(sig_handle): Reorganize SIGCONT handling to more closely conform to SUSv3.
* pinfo.h: Move __SIG enum to sigproc.h.
(PICOM_FIFO): New enum element.
(_pinfo): Remove 'thread2signal' stuff throughout class.
(_pinfo::commune_send): Make varargs.
(_pinfo::sigtodo): Eliminate.
(_pinfo::thread2signal): Ditto.
* signal.cc (kill_worker): Eliminate call to setthread2signal.
* sigproc.cc (local_sigtodo): Eliminate.
(getlocal_sigtodo): Ditto.
(sigelem): New class.
(pending_signals): New class.
(sigqueue): New variable, start of sigqueue linked list.
(sigcatch_nonmain): Eliminate.
(sigcatch_main): Eliminate.
(sigcatch_nosync): Eliminate.
(sigcomplete_nonmain): Eliminate.
(pending_signals): Eliminate.
(sig_clear): Call signal thread to clear pending signals, unless already in
signal thread.
(sigpending): Call signal thread to get pending signals.
(sig_dispatch_pending): Eliminate use of pending_signals and just check
sigqueue.
(sigproc_terminate): Eliminate all of the obsolete semaphore stuff. Close
signal pipe handle.
(sig_send): Eliminate all of the obsolete semaphore stuff and use pipe to send
signals.
(getevent): Eliminate.
(pending_signals::add): New function.
(pending_signals::del): New function.
(pending_signals::next): New function.
(wait_sig): Eliminate all of the obsolete semaphore stuff. Use pipe to
communicate and maintain a linked list of signals.
* sigproc.h: Move __SIG defines here. Add __SIGPENDING.
(sig_dispatch_pending): Remove "C" specifier.
(sig_handle): Accept a mask argument.
* thread.cc: Remove signal handling considerations throughout.
2003-09-25 08:37:18 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
is_virtual_symlink:
|
2000-04-14 06:43:48 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (sym.isdevice)
|
|
|
|
{
|
2010-06-15 05:16:41 +08:00
|
|
|
if (component)
|
|
|
|
{
|
|
|
|
error = ENOTDIR;
|
|
|
|
return;
|
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
dev.parse (sym.major, sym.minor);
|
|
|
|
dev.setfs (1);
|
|
|
|
dev.mode = sym.mode;
|
|
|
|
fileattr = sym.fileattr;
|
|
|
|
goto out;
|
|
|
|
}
|
2001-04-13 05:21:37 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (sym.pflags & PATH_SOCKET)
|
|
|
|
{
|
|
|
|
if (component)
|
|
|
|
{
|
|
|
|
error = ENOTDIR;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
fileattr = sym.fileattr;
|
|
|
|
dev.parse (FH_UNIX);
|
|
|
|
dev.setfs (1);
|
|
|
|
goto out;
|
|
|
|
}
|
2001-06-11 11:38:32 +08:00
|
|
|
|
2008-07-17 04:20:45 +08:00
|
|
|
if (!component)
|
|
|
|
{
|
2012-03-30 02:02:54 +08:00
|
|
|
/* Make sure that /dev always exists. */
|
|
|
|
fileattr = isdev_dev (dev) ? FILE_ATTRIBUTE_DIRECTORY
|
|
|
|
: sym.fileattr;
|
2008-07-17 04:20:45 +08:00
|
|
|
path_flags = sym.pflags;
|
|
|
|
}
|
2012-04-04 20:06:21 +08:00
|
|
|
else if (isdev_dev (dev))
|
|
|
|
{
|
|
|
|
/* If we're looking for a file below /dev, which doesn't exist,
|
2012-08-17 07:34:45 +08:00
|
|
|
make sure that the device type is converted to FH_FS, so that
|
2012-04-04 20:06:21 +08:00
|
|
|
subsequent code handles the file correctly.
|
|
|
|
Unless /dev itself doesn't exist on disk. In that case /dev
|
|
|
|
is handled as virtual filesystem, and virtual filesystems are
|
2012-04-04 20:45:24 +08:00
|
|
|
read-only. The PC_KEEP_HANDLE check allows to check for
|
|
|
|
a call from an informational system call. In that case we
|
|
|
|
just stick to ENOENT, and the device type doesn't matter
|
|
|
|
anyway. */
|
|
|
|
if (sym.error == ENOENT && !(opt & PC_KEEP_HANDLE))
|
2012-04-04 20:06:21 +08:00
|
|
|
sym.error = EROFS;
|
|
|
|
else
|
2012-04-06 12:40:49 +08:00
|
|
|
dev = FH_FS;
|
2012-04-04 20:06:21 +08:00
|
|
|
}
|
2008-07-17 04:20:45 +08:00
|
|
|
|
|
|
|
/* If symlink.check found an existing non-symlink file, then
|
|
|
|
it sets the appropriate flag. It also sets any suffix found
|
|
|
|
into `ext_here'. */
|
|
|
|
if (!sym.issymlink && sym.fileattr != INVALID_FILE_ATTRIBUTES)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2008-07-17 04:20:45 +08:00
|
|
|
error = sym.error;
|
|
|
|
if (component == 0)
|
2009-07-30 16:56:57 +08:00
|
|
|
add_ext = true;
|
2008-07-17 04:20:45 +08:00
|
|
|
else if (!(sym.fileattr & FILE_ATTRIBUTE_DIRECTORY))
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2008-07-17 04:20:45 +08:00
|
|
|
error = ENOTDIR;
|
2008-05-23 19:00:35 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2008-07-17 04:20:45 +08:00
|
|
|
goto out; // file found
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2008-07-17 04:20:45 +08:00
|
|
|
/* Found a symlink if symlen > 0. If component == 0, then the
|
|
|
|
src path itself was a symlink. If !follow_mode then
|
|
|
|
we're done. Otherwise we have to insert the path found
|
|
|
|
into the full path that we are building and perform all of
|
|
|
|
these operations again on the newly derived path. */
|
|
|
|
else if (symlen > 0)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2008-07-17 04:20:45 +08:00
|
|
|
saw_symlinks = 1;
|
2011-01-17 22:19:39 +08:00
|
|
|
if (component == 0 && !need_directory
|
|
|
|
&& (!(opt & PC_SYM_FOLLOW)
|
|
|
|
|| (is_rep_symlink () && (opt & PC_SYM_NOFOLLOW_REP))))
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2008-07-17 04:20:45 +08:00
|
|
|
set_symlink (symlen); // last component of path is a symlink.
|
|
|
|
if (opt & PC_SYM_CONTENTS)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2009-07-30 16:56:57 +08:00
|
|
|
strcpy (THIS_path, sym.contents);
|
2008-05-23 19:00:35 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2009-07-30 16:56:57 +08:00
|
|
|
add_ext = true;
|
2008-05-23 19:00:35 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2010-04-26 21:48:04 +08:00
|
|
|
/* Following a symlink we can't trust the collected filesystem
|
|
|
|
information any longer. */
|
|
|
|
fs.clear ();
|
2010-08-20 22:29:56 +08:00
|
|
|
/* Close handle, if we have any. Otherwise we're collecting
|
2011-06-06 13:02:13 +08:00
|
|
|
handles while following symlinks. */
|
2010-08-20 22:29:56 +08:00
|
|
|
conv_handle.close ();
|
2010-04-26 21:48:04 +08:00
|
|
|
break;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2009-01-12 00:13:11 +08:00
|
|
|
else if (sym.error && sym.error != ENOENT)
|
2008-07-17 04:20:45 +08:00
|
|
|
{
|
|
|
|
error = sym.error;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
/* No existing file found. */
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
virtual_component_retry:
|
|
|
|
/* Find the new "tail" of the path, e.g. in '/for/bar/baz',
|
|
|
|
/baz is the tail. */
|
|
|
|
if (tail != path_end)
|
|
|
|
*tail = '/';
|
|
|
|
while (--tail > path_copy + 1 && *tail != '/') {}
|
|
|
|
/* Exit loop if there is no tail or we are at the
|
|
|
|
beginning of a UNC path */
|
|
|
|
if (tail <= path_copy + 1)
|
|
|
|
goto out; // all done
|
|
|
|
|
|
|
|
/* Haven't found an existing pathname component yet.
|
|
|
|
Pinch off the tail and try again. */
|
|
|
|
*tail = '\0';
|
|
|
|
component++;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Arrive here if above loop detected a symlink. */
|
|
|
|
if (++loop > SYMLOOP_MAX)
|
|
|
|
{
|
|
|
|
error = ELOOP; // Eep.
|
|
|
|
return;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
MALLOC_CHECK;
|
2008-05-20 23:11:23 +08:00
|
|
|
|
2001-06-03 10:31:16 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Place the link content, possibly with head and/or tail, in tmp_buf */
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
char *headptr;
|
|
|
|
if (isabspath (sym.contents))
|
|
|
|
headptr = tmp_buf; /* absolute path */
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Copy the first part of the path (with ending /) and point to the end. */
|
|
|
|
char *prevtail = tail;
|
|
|
|
while (--prevtail > path_copy && *prevtail != '/') {}
|
|
|
|
int headlen = prevtail - path_copy + 1;;
|
|
|
|
memcpy (tmp_buf, path_copy, headlen);
|
|
|
|
headptr = &tmp_buf[headlen];
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Make sure there is enough space */
|
|
|
|
if (headptr + symlen >= tmp_buf + (2 * NT_MAX_PATH))
|
|
|
|
{
|
|
|
|
too_long:
|
|
|
|
error = ENAMETOOLONG;
|
2009-08-05 06:35:35 +08:00
|
|
|
set_path ("::ENAMETOOLONG::");
|
2008-05-23 19:00:35 +08:00
|
|
|
return;
|
|
|
|
}
|
2001-03-02 19:41:09 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Copy the symlink contents to the end of tmp_buf.
|
|
|
|
Convert slashes. */
|
|
|
|
for (char *p = sym.contents; *p; p++)
|
|
|
|
*headptr++ = *p == '\\' ? '/' : *p;
|
|
|
|
*headptr = '\0';
|
|
|
|
|
|
|
|
/* Copy any tail component (with the 0) */
|
|
|
|
if (tail++ < path_end)
|
|
|
|
{
|
|
|
|
/* Add a slash if needed. There is space. */
|
|
|
|
if (*(headptr - 1) != '/')
|
|
|
|
*headptr++ = '/';
|
|
|
|
int taillen = path_end - tail + 1;
|
|
|
|
if (headptr + taillen > tmp_buf + (2 * NT_MAX_PATH))
|
|
|
|
goto too_long;
|
|
|
|
memcpy (headptr, tail, taillen);
|
|
|
|
}
|
2008-02-16 01:53:11 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Evaluate everything all over again. */
|
|
|
|
src = tmp_buf;
|
|
|
|
}
|
2001-03-17 15:09:41 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (!(opt & PC_SYM_CONTENTS))
|
2009-07-30 16:56:57 +08:00
|
|
|
add_ext = true;
|
2001-04-12 03:09:53 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
out:
|
2009-08-02 03:52:46 +08:00
|
|
|
set_path (THIS_path);
|
2009-07-30 16:56:57 +08:00
|
|
|
if (add_ext)
|
|
|
|
add_ext_from_sym (sym);
|
2011-05-29 02:17:09 +08:00
|
|
|
if (dev == FH_NETDRIVE && component)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
/* This case indicates a non-existant resp. a non-retrievable
|
|
|
|
share. This happens for instance if the share is a printer.
|
|
|
|
In this case the path must not be treated like a FH_NETDRIVE,
|
|
|
|
but like a FH_FS instead, so the usual open call for files
|
|
|
|
is used on it. */
|
|
|
|
dev.parse (FH_FS);
|
|
|
|
}
|
2011-05-29 02:17:09 +08:00
|
|
|
else if (isproc_dev (dev) && fileattr == INVALID_FILE_ATTRIBUTES)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2010-12-06 21:09:40 +08:00
|
|
|
/* FIXME: Usually we don't set error to ENOENT if a file doesn't
|
2011-06-06 13:02:13 +08:00
|
|
|
exist. This is typically indicated by the fileattr content.
|
2010-12-06 21:09:40 +08:00
|
|
|
So, why here? The downside is that cygwin_conv_path just gets
|
|
|
|
an error for these paths so it reports the error back to the
|
|
|
|
application. Unlike in all other cases of non-existant files,
|
|
|
|
for which check doesn't set error, so cygwin_conv_path just
|
|
|
|
returns the path, as intended. */
|
2009-01-12 00:13:11 +08:00
|
|
|
error = ENOENT;
|
2008-05-23 19:00:35 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
else if (!need_directory || error)
|
|
|
|
/* nothing to do */;
|
|
|
|
else if (fileattr == INVALID_FILE_ATTRIBUTES)
|
2009-08-02 03:52:46 +08:00
|
|
|
strcat (modifiable_path (), "\\"); /* Reattach trailing dirsep in native path. */
|
2008-05-23 19:00:35 +08:00
|
|
|
else if (fileattr & FILE_ATTRIBUTE_DIRECTORY)
|
|
|
|
path_flags &= ~PATH_SYMLINK;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
debug_printf ("%s is a non-directory", path);
|
|
|
|
error = ENOTDIR;
|
|
|
|
return;
|
|
|
|
}
|
2001-03-05 14:28:25 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (dev.isfs ())
|
|
|
|
{
|
|
|
|
if (strncmp (path, "\\\\.\\", 4))
|
|
|
|
{
|
|
|
|
if (!tail || tail == path)
|
|
|
|
/* nothing */;
|
|
|
|
else if (tail[-1] != '\\')
|
|
|
|
*tail = '\0';
|
|
|
|
else
|
|
|
|
{
|
|
|
|
error = ENOENT;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2002-07-06 05:58:49 +08:00
|
|
|
|
2010-04-26 21:48:04 +08:00
|
|
|
/* If FS hasn't been checked already in symlink_info::check, do so now. */
|
|
|
|
if (fs.inited ()|| fs.update (get_nt_native_path (), NULL))
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2008-12-19 20:15:33 +08:00
|
|
|
/* Incoming DOS paths are treated like DOS paths in native
|
|
|
|
Windows applications. No ACLs, just default settings. */
|
|
|
|
if (is_msdos)
|
|
|
|
fs.has_acls (false);
|
2008-05-23 19:00:35 +08:00
|
|
|
debug_printf ("this->path(%s), has_acls(%d)", path, fs.has_acls ());
|
2009-06-02 21:29:30 +08:00
|
|
|
/* CV: We could use this->has_acls() but I want to make sure that
|
|
|
|
we don't forget that the PATH_NOACL flag must be taken into
|
|
|
|
account here. */
|
|
|
|
if (!(path_flags & PATH_NOACL) && fs.has_acls ())
|
2008-05-23 19:00:35 +08:00
|
|
|
set_exec (0); /* We really don't know if this is executable or not here
|
|
|
|
but set it to not executable since it will be figured out
|
|
|
|
later by anything which cares about this. */
|
|
|
|
}
|
2010-07-05 01:12:27 +08:00
|
|
|
/* If the FS has been found to have unrelibale inodes, note
|
|
|
|
that in path_flags. */
|
|
|
|
if (!fs.hasgood_inode ())
|
|
|
|
path_flags |= PATH_IHASH;
|
|
|
|
/* If the OS is caseinsensitive or the FS is caseinsensitive,
|
|
|
|
don't handle path casesensitive. */
|
|
|
|
if (cygwin_shared->obcaseinsensitive || fs.caseinsensitive ())
|
|
|
|
path_flags |= PATH_NOPOSIX;
|
|
|
|
caseinsensitive = (path_flags & PATH_NOPOSIX)
|
|
|
|
? OBJ_CASE_INSENSITIVE : 0;
|
2008-05-23 19:00:35 +08:00
|
|
|
if (exec_state () != dont_know_if_executable)
|
|
|
|
/* ok */;
|
|
|
|
else if (isdir ())
|
|
|
|
set_exec (1);
|
|
|
|
else if (issymlink () || issocket ())
|
|
|
|
set_exec (0);
|
|
|
|
}
|
2001-03-05 14:28:25 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (opt & PC_NOFULL)
|
|
|
|
{
|
|
|
|
if (is_relpath)
|
2008-11-11 19:45:05 +08:00
|
|
|
{
|
2009-08-02 03:52:46 +08:00
|
|
|
mkrelpath (this->modifiable_path (), !!caseinsensitive);
|
2008-11-11 19:45:05 +08:00
|
|
|
/* Invalidate wide_path so that wide relpath can be created
|
|
|
|
in later calls to get_nt_native_path or get_wide_win32_path. */
|
|
|
|
if (wide_path)
|
|
|
|
cfree (wide_path);
|
|
|
|
wide_path = NULL;
|
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
if (need_directory)
|
|
|
|
{
|
|
|
|
size_t n = strlen (this->path);
|
|
|
|
/* Do not add trailing \ to UNC device names like \\.\a: */
|
|
|
|
if (this->path[n - 1] != '\\' &&
|
|
|
|
(strncmp (this->path, "\\\\.\\", 4) != 0))
|
|
|
|
{
|
2009-08-02 03:52:46 +08:00
|
|
|
this->modifiable_path ()[n] = '\\';
|
|
|
|
this->modifiable_path ()[n + 1] = '\0';
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
* devices.cc: New file.
* devices.gperf: New file.
* devices.shilka: New file.
* cygwin-gperf: New file.
* cygwin-shilka: New file.
* fhandler_fifo.cc: New file.
* fhandler_nodevice.cc : New file. Reorganize headers so that path.h precedes
fhandler.h throughout. Remove device argument and unit arguments from fhandler
constructors throughout. Remove pc arguments to fhandler functions and use
internal pc element instead, throughout. Use dev element in pc throughout.
Use major/minor elements rather than units and device numbers previously in
fhandler class. Use correct methods for fhandler file names rather than
directly accessing file name variables, throughout.
* Makefile.in (DLL_OFILES): Add devices.o, fhandler_fifo.o
* dcrt0.cc (dll_crt0_1): Call device::init.
* devices.h: Renumber devices based on more Linux-like major/minor numbers.
Add more devices. Declare standard device storage.
(device): Declare struct.
* dir.cc (opendir): Use new 'build_fh_name' to construct a fhandler_* type.
* dtable.cc (dtable::get_debugger_info): Ditto.
(cygwin_attach_handle_to_fd): Ditto.
(dtable::release): Remove special FH_SOCKET case in favor of generic
"need_fixup_before" test.
(dtable::init_std_file_from_handle): Use either build_fh_dev or build_fh_name
to build standard fhandler.
(dtable::build_fh_name): Renamed from dtable::build_fhandler_from_name. Move
out of dtable class. Don't accept a path_conv argument. Just build it here
and pass it to:
(build_fh_pc): Renamed from dtable::build_fhandler. Move out of dtable class.
Use intrinsic device type in path_conv to create new fhandler.
(build_fh_dev): Renamed from dtable::build_fhandler. Move out of dtable class.
Simplify arguments to just take new 'device' type and a name. Just return
pointer to fhandler rather than trying to insert into dtable.
(dtable::dup_worker): Accommodate above build_fh name changes.
(dtable::find_fifo): New (currently broken) function.
(handle_to_fn): Use strechr for efficiency.
* dtable.h: Reflect above build_fh name changes and argument differences.
(fhandler_base *&operator []): Return self rather than copy of self.
* fhandler.cc (fhandler_base::operator =): Use pc element to set normalized
path.
(fhandler_base::set_name): Ditto.
(fhandler_base::raw_read): Use method to access name.
(fhandler_base::write): Correctly use get_output_handle rather than get_handle.
(handler_base::device_access_denied): New function.
(fhandler_base::open): Eliminate pc argument and use pc element of
fhandler_base throughout.
(fhandler_base::fstat): Detect if device is based in filesystem and use
fstat_fs to calculate stat, if so.
(fhandler_base::fhandler_base): Eliminate handling of file names and, instead,
just free appropriate component from pc.
(fhandler_base::opendir): Remove path_conv parameter.
* fhandler.h: Remove all device flags.
(fhandler_base::pc): New element.
(fhandler_base::set_name): Change argument to path_conv.
(fhandler_base::error): New function.
(fhandler_base::exists): New function.
(fhandler_base::pc_binmode): New function.
(fhandler_base::dev): New function.
(fhandler_base::open_fs): New function.
(fhandler_base::fstat_fs): New function.
(fhandler_base::fstat_by_name): New function.
(fhandler_base::fstat_by_handle): New function.
(fhandler_base::isfifo): New function.
(fhandler_base::is_slow): New function.
(fhandler_base::is_auto_device): New function.
(fhandler_base::is_fs_special): New function.
(fhandler_base::device_access_denied): New function.
(fhandler_base::operator DWORD&): New operator.
(fhandler_base::get_name): Return normalized path from pc.
(fhandler_base::get_win32_name): Return windows path from pc.
(fhandler_base::isdevice): Renamed from is_device.
(fhandler_base::get_native_name): Return device format.
(fhandler_fifo): New class.
(fhandler_nodevice): New class.
(select_stuff::device_specific): Remove array.
(select_stuff::device_specific_pipe): New class element.
(select_stuff::device_specific_socket): New class element.
(select_stuff::device_specific_serial): New class element.
(select_stuff::select_stuff): Initialize new elements.
* fhandler_disk_file.cc (fhandler_base::fstat_by_handle): Move to base class
from fhandler_disk_file.
(fhandler_base::fstat_by_name): Ditto.
(fhandler_base::fstat_by_name): Ditto.
(fhandler_disk_file::open): Move most functionality into
fhandler_base::open_fs.
(fhandler_base::open_fs): New function.
(fhandler_disk_file::close): Move most functionality into
fhandler_base::close_fs.
(fhandler_base::close_fs): New function.
* fhandler_mem.cc (fhandler_dev_mem::open): Use device name in debugging
output.
* fhandler_socket.cc (fhandler_socket::set_connect_secret): Copy standard
urandom device into appropriate place.
(fhandler_socket::accept): Reflect change in fdsock return value.
* fhandler_tty.cc: See "throughouts" above.
* net.cc: Accommodate fdsock change throughout.
(fdsock): Return success or failure, accept fd argument and device argument.
* path.cc (symlink_info::major): New element.
(symlink_info::minor): New element.
(symlink_info::parse_device): Declare new function.
(fs_info::update): Accommodate changes in path_conv class.
(path_conv::fillin): Ditto.
(path_conv::return_and_clear_normalized_path): Eliminate.
(path_conv::set_normalized_path): New function.
(path_conv::path_conv): Set info in dev element. Use path_conv methods Check
for FH_FS rather than FH_BAD to indicate when to fill in filesystem stuff.
where appropriate rather than direct access. Use set_normalized_path to set
normalized path.
(windows_device_names): Eliminate.
(get_dev): Ditto.
(get_raw_device_number): Ditto.
(get_device_number): Ditto.
(win32_device_name): Call new device name parser to do most of the heavy
lifting.
(mount_info::conv_to_win32_path): Fill in dev field as appropriate.
(symlink_worker): Handle new device files.
(symlink_info::check): Ditto.
(symlink_info::parse_device): Define new function.
* path.h (executable_states): Move here from fhandler.h.
(fs_info): Rename variables to *_storage and create methods for accessing same.
(path_conv): Add dev element, remove devn and unit and adjust inline methods to
accommodate.
(set_normalized_path): Declare new function.
* pinfo.cc (_pinfo::commune_recv): Add broken support for handling fifos.
(_pinfo::commune_send): Ditto.
* pipe.cc (fhandler_pipe::close): check for existence of handle before closing
it.
(handler_pipe::create): Rename from make_pipe. Change arguments to accept
fhandler_pipe array. Accommodate fifos.
(pipe): Rework to deal with fhandler_pipe::create changes.
(_pipe): Ditto.
* select.cc: Use individual device_specific types throughout rather than
indexing with obsolete device number.
(set_bits): Use is_socket call rather than checking device number.
* shared_info.h (CURR_MOUNT_MAGIC): Update.
(conv_to_win32_path): Reflect addition of device argument.
* syscalls.cc (mknod_worker): New function.
(open): Use build_fh_name to build fhandler.
(chown_worker): Detect if this is an 'auto' device rather than an on-filesystem
device and handle appropriately.
(chmod_device): New function.
(chmod): Detect if this is an 'auto' device rather than an on-filesystem device
and handle appropriately. Use chmod_device to set mode of in-filesystem
devices.
(stat_worker): Eliminate path_conv argument. Call build_fh_name to construct
fhandler. Use fh->error() rather than pc->error to detect errors in fhandler
construction.
(access_worker): New function pulled from access. Accommodate in-filesystem
devices.
(access): Use access_worker.
(fpathconf): Detect if this is an 'auto' device rather than an on-filesystem
device and handle appropriately.
(mknod_worker): New function.
(mknod32): New function.
(chroot): Free normalized path -- assuming it was actually cmalloced.
* tty.cc (create_tty_master): Tweak for new device class.
(tty::common_init): Ditto.
* winsup.h (stat_worker): Remove.
(symlink_worker): Declare.
* exceptions.cc (set_process_mask): Just call sig_dispatch_pending and don't
worry about pending_signals since sig_dispatch_pending should always do the
right thing now.
(sig_handle): Reorganize SIGCONT handling to more closely conform to SUSv3.
* pinfo.h: Move __SIG enum to sigproc.h.
(PICOM_FIFO): New enum element.
(_pinfo): Remove 'thread2signal' stuff throughout class.
(_pinfo::commune_send): Make varargs.
(_pinfo::sigtodo): Eliminate.
(_pinfo::thread2signal): Ditto.
* signal.cc (kill_worker): Eliminate call to setthread2signal.
* sigproc.cc (local_sigtodo): Eliminate.
(getlocal_sigtodo): Ditto.
(sigelem): New class.
(pending_signals): New class.
(sigqueue): New variable, start of sigqueue linked list.
(sigcatch_nonmain): Eliminate.
(sigcatch_main): Eliminate.
(sigcatch_nosync): Eliminate.
(sigcomplete_nonmain): Eliminate.
(pending_signals): Eliminate.
(sig_clear): Call signal thread to clear pending signals, unless already in
signal thread.
(sigpending): Call signal thread to get pending signals.
(sig_dispatch_pending): Eliminate use of pending_signals and just check
sigqueue.
(sigproc_terminate): Eliminate all of the obsolete semaphore stuff. Close
signal pipe handle.
(sig_send): Eliminate all of the obsolete semaphore stuff and use pipe to send
signals.
(getevent): Eliminate.
(pending_signals::add): New function.
(pending_signals::del): New function.
(pending_signals::next): New function.
(wait_sig): Eliminate all of the obsolete semaphore stuff. Use pipe to
communicate and maintain a linked list of signals.
* sigproc.h: Move __SIG defines here. Add __SIGPENDING.
(sig_dispatch_pending): Remove "C" specifier.
(sig_handle): Accept a mask argument.
* thread.cc: Remove signal handling considerations throughout.
2003-09-25 08:37:18 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (saw_symlinks)
|
|
|
|
set_has_symlinks ();
|
2007-08-23 15:43:24 +08:00
|
|
|
|
2011-10-16 06:37:30 +08:00
|
|
|
if (opt & PC_OPEN)
|
|
|
|
path_flags |= PATH_OPEN;
|
|
|
|
|
|
|
|
if (opt & PC_CTTY)
|
|
|
|
path_flags |= PATH_CTTY;
|
|
|
|
|
2012-07-30 03:18:05 +08:00
|
|
|
if (opt & PC_POSIX)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
if (tail < path_end && tail > path_copy + 1)
|
|
|
|
*tail = '/';
|
|
|
|
set_normalized_path (path_copy);
|
|
|
|
if (is_msdos && !(opt & PC_NOWARN))
|
|
|
|
warn_msdos (src);
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
|
|
|
#if 0
|
2008-05-23 19:00:35 +08:00
|
|
|
if (!error)
|
|
|
|
{
|
|
|
|
last_path_conv = *this;
|
|
|
|
strcpy (last_src, src);
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
#endif
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
path_conv::~path_conv ()
|
|
|
|
{
|
2009-07-30 16:56:57 +08:00
|
|
|
if (normalized_path)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2009-08-02 03:52:46 +08:00
|
|
|
cfree ((void *) normalized_path);
|
2008-05-23 19:00:35 +08:00
|
|
|
normalized_path = NULL;
|
|
|
|
}
|
2009-07-30 16:56:57 +08:00
|
|
|
if (path)
|
|
|
|
{
|
2009-08-02 03:52:46 +08:00
|
|
|
cfree (modifiable_path ());
|
2009-07-30 16:56:57 +08:00
|
|
|
path = NULL;
|
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
if (wide_path)
|
|
|
|
{
|
|
|
|
cfree (wide_path);
|
|
|
|
wide_path = NULL;
|
|
|
|
}
|
2010-06-15 20:05:15 +08:00
|
|
|
close_conv_handle ();
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
path_conv::is_binary ()
|
|
|
|
{
|
|
|
|
tmp_pathbuf tp;
|
|
|
|
PWCHAR bintest = tp.w_get ();
|
|
|
|
DWORD bin;
|
2008-10-09 17:43:02 +08:00
|
|
|
|
2009-01-07 22:12:40 +08:00
|
|
|
return GetBinaryTypeW (get_wide_win32_path (bintest), &bin)
|
|
|
|
&& (bin == SCS_32BIT_BINARY || bin == SCS_64BIT_BINARY);
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
|
2011-12-13 19:54:28 +08:00
|
|
|
/* Helper function to fill the fnoi datastructure for a file. */
|
|
|
|
NTSTATUS
|
|
|
|
file_get_fnoi (HANDLE h, bool skip_network_open_inf,
|
|
|
|
PFILE_NETWORK_OPEN_INFORMATION pfnoi)
|
|
|
|
{
|
|
|
|
NTSTATUS status;
|
|
|
|
IO_STATUS_BLOCK io;
|
|
|
|
|
|
|
|
/* Some FSes (Netapps) don't implement FileNetworkOpenInformation. */
|
|
|
|
status = skip_network_open_inf ? STATUS_INVALID_PARAMETER
|
|
|
|
: NtQueryInformationFile (h, &io, pfnoi, sizeof *pfnoi,
|
|
|
|
FileNetworkOpenInformation);
|
2013-04-23 17:44:36 +08:00
|
|
|
if (status == STATUS_INVALID_PARAMETER)
|
2011-12-13 19:54:28 +08:00
|
|
|
{
|
|
|
|
/* Apart from accessing Netapps, this also occurs when accessing SMB
|
2013-04-23 17:44:36 +08:00
|
|
|
share root dirs hosted on NT4. */
|
2011-12-13 19:54:28 +08:00
|
|
|
FILE_BASIC_INFORMATION fbi;
|
|
|
|
FILE_STANDARD_INFORMATION fsi;
|
|
|
|
|
|
|
|
status = NtQueryInformationFile (h, &io, &fbi, sizeof fbi,
|
|
|
|
FileBasicInformation);
|
|
|
|
if (NT_SUCCESS (status))
|
|
|
|
{
|
|
|
|
memcpy (pfnoi, &fbi, 4 * sizeof (LARGE_INTEGER));
|
|
|
|
if (NT_SUCCESS (NtQueryInformationFile (h, &io, &fsi,
|
|
|
|
sizeof fsi,
|
|
|
|
FileStandardInformation)))
|
|
|
|
{
|
|
|
|
pfnoi->EndOfFile.QuadPart = fsi.EndOfFile.QuadPart;
|
|
|
|
pfnoi->AllocationSize.QuadPart
|
|
|
|
= fsi.AllocationSize.QuadPart;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
pfnoi->EndOfFile.QuadPart
|
|
|
|
= pfnoi->AllocationSize.QuadPart = 0;
|
|
|
|
pfnoi->FileAttributes = fbi.FileAttributes;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Normalize a Win32 path.
|
|
|
|
/'s are converted to \'s in the process.
|
|
|
|
All duplicate \'s, except for 2 leading \'s, are deleted.
|
|
|
|
|
|
|
|
The result is 0 for success, or an errno error value.
|
|
|
|
FIXME: A lot of this should be mergeable with the POSIX critter. */
|
|
|
|
int
|
|
|
|
normalize_win32_path (const char *src, char *dst, char *&tail)
|
|
|
|
{
|
|
|
|
const char *src_start = src;
|
|
|
|
bool beg_src_slash = isdirsep (src[0]);
|
|
|
|
|
|
|
|
tail = dst;
|
|
|
|
/* Skip long path name prefixes in Win32 or NT syntax. */
|
|
|
|
if (beg_src_slash && (src[1] == '?' || isdirsep (src[1]))
|
|
|
|
&& src[2] == '?' && isdirsep (src[3]))
|
|
|
|
{
|
|
|
|
src += 4;
|
|
|
|
if (src[1] != ':') /* native UNC path */
|
2008-07-25 23:23:56 +08:00
|
|
|
src += 2; /* Fortunately the first char is not copied... */
|
2008-05-23 19:00:35 +08:00
|
|
|
else
|
2008-07-25 23:23:56 +08:00
|
|
|
beg_src_slash = false;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
if (beg_src_slash && isdirsep (src[1]))
|
|
|
|
{
|
|
|
|
if (isdirsep (src[2]))
|
|
|
|
{
|
|
|
|
/* More than two slashes are just folded into one. */
|
2008-05-23 15:13:47 +08:00
|
|
|
src += 2;
|
2008-05-23 19:00:35 +08:00
|
|
|
while (isdirsep (src[1]))
|
|
|
|
++src;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Two slashes start a network or device path. */
|
|
|
|
*tail++ = '\\';
|
|
|
|
src++;
|
|
|
|
if (src[1] == '.' && isdirsep (src[2]))
|
|
|
|
{
|
2008-05-23 15:13:47 +08:00
|
|
|
*tail++ = '\\';
|
2008-05-23 19:00:35 +08:00
|
|
|
*tail++ = '.';
|
|
|
|
src += 2;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2009-01-10 00:20:26 +08:00
|
|
|
if (tail == dst)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2009-01-10 00:20:26 +08:00
|
|
|
if (isdrive (src))
|
|
|
|
/* Always convert drive letter to uppercase for case sensitivity. */
|
|
|
|
*tail++ = cyg_toupper (*src++);
|
|
|
|
else if (*src != '/')
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2009-01-10 00:20:26 +08:00
|
|
|
if (beg_src_slash)
|
|
|
|
tail += cygheap->cwd.get_drive (dst);
|
|
|
|
else if (!cygheap->cwd.get (dst, 0))
|
|
|
|
return get_errno ();
|
|
|
|
else
|
|
|
|
{
|
|
|
|
tail = strchr (tail, '\0');
|
|
|
|
if (tail[-1] != '\\')
|
|
|
|
*tail++ = '\\';
|
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
while (*src)
|
|
|
|
{
|
|
|
|
/* Strip duplicate /'s. */
|
|
|
|
if (isdirsep (src[0]) && isdirsep (src[1]))
|
|
|
|
src++;
|
|
|
|
/* Ignore "./". */
|
|
|
|
else if (src[0] == '.' && isdirsep (src[1])
|
|
|
|
&& (src == src_start || isdirsep (src[-1])))
|
|
|
|
src += 2;
|
|
|
|
|
|
|
|
/* Backup if "..". */
|
|
|
|
else if (src[0] == '.' && src[1] == '.'
|
|
|
|
/* dst must be greater than dst_start */
|
|
|
|
&& tail[-1] == '\\')
|
|
|
|
{
|
|
|
|
if (!isdirsep (src[2]) && src[2] != '\0')
|
|
|
|
*tail++ = *src++;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Back up over /, but not if it's the first one. */
|
|
|
|
if (tail > dst + 1)
|
|
|
|
tail--;
|
|
|
|
/* Now back up to the next /. */
|
|
|
|
while (tail > dst + 1 && tail[-1] != '\\' && tail[-2] != ':')
|
|
|
|
tail--;
|
|
|
|
src += 2;
|
2011-06-18 16:36:59 +08:00
|
|
|
/* Skip /'s to the next path component. */
|
|
|
|
while (isdirsep (*src))
|
2008-05-23 19:00:35 +08:00
|
|
|
src++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Otherwise, add char to result. */
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (*src == '/')
|
|
|
|
*tail++ = '\\';
|
|
|
|
else
|
|
|
|
*tail++ = *src;
|
|
|
|
src++;
|
|
|
|
}
|
|
|
|
if ((tail - dst) >= NT_MAX_PATH)
|
|
|
|
return ENAMETOOLONG;
|
|
|
|
}
|
2012-07-02 08:40:06 +08:00
|
|
|
if (tail > dst + 1 && tail[-1] == '.' && tail[-2] == '\\')
|
|
|
|
tail--;
|
2008-05-23 19:00:35 +08:00
|
|
|
*tail = '\0';
|
|
|
|
debug_printf ("%s = normalize_win32_path (%s)", dst, src_start);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Various utilities. */
|
|
|
|
|
|
|
|
/* nofinalslash: Remove trailing / and \ from SRC (except for the
|
|
|
|
first one). It is ok for src == dst. */
|
|
|
|
|
2013-05-01 09:20:37 +08:00
|
|
|
void __reg2
|
2008-05-23 19:00:35 +08:00
|
|
|
nofinalslash (const char *src, char *dst)
|
|
|
|
{
|
|
|
|
int len = strlen (src);
|
|
|
|
if (src != dst)
|
|
|
|
memcpy (dst, src, len + 1);
|
|
|
|
while (len > 1 && isdirsep (dst[--len]))
|
|
|
|
dst[len] = '\0';
|
|
|
|
}
|
|
|
|
|
|
|
|
/* conv_path_list: Convert a list of path names to/from Win32/POSIX. */
|
|
|
|
|
|
|
|
static int
|
2011-12-03 00:06:10 +08:00
|
|
|
conv_path_list (const char *src, char *dst, size_t size,
|
|
|
|
cygwin_conv_path_t what)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
tmp_pathbuf tp;
|
|
|
|
char src_delim, dst_delim;
|
|
|
|
size_t len;
|
2011-12-03 00:06:10 +08:00
|
|
|
bool env_cvt = false;
|
2008-05-23 19:00:35 +08:00
|
|
|
|
2011-12-03 00:06:10 +08:00
|
|
|
if (what == (cygwin_conv_path_t) ENV_CVT)
|
|
|
|
{
|
|
|
|
what = CCP_WIN_A_TO_POSIX | CCP_RELATIVE;
|
|
|
|
env_cvt = true;
|
|
|
|
}
|
2011-12-13 22:53:10 +08:00
|
|
|
if ((what & CCP_CONVTYPE_MASK) == CCP_WIN_A_TO_POSIX)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
src_delim = ';';
|
|
|
|
dst_delim = ':';
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
src_delim = ':';
|
|
|
|
dst_delim = ';';
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
char *srcbuf;
|
|
|
|
len = strlen (src) + 1;
|
|
|
|
if (len <= NT_MAX_PATH * sizeof (WCHAR))
|
|
|
|
srcbuf = (char *) tp.w_get ();
|
|
|
|
else
|
|
|
|
srcbuf = (char *) alloca (len);
|
|
|
|
|
|
|
|
int err = 0;
|
|
|
|
char *d = dst - 1;
|
|
|
|
bool saw_empty = false;
|
|
|
|
do
|
|
|
|
{
|
2011-02-02 17:59:10 +08:00
|
|
|
char *srcpath = srcbuf;
|
|
|
|
char *s = strccpy (srcpath, &src, src_delim);
|
|
|
|
size_t len = s - srcpath;
|
2008-05-23 19:00:35 +08:00
|
|
|
if (len >= NT_MAX_PATH)
|
|
|
|
{
|
|
|
|
err = ENAMETOOLONG;
|
2008-05-23 15:13:47 +08:00
|
|
|
break;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2011-02-02 17:59:10 +08:00
|
|
|
/* Paths in Win32 path lists in the environment (%Path%), are often
|
|
|
|
enclosed in quotes (usually paths with spaces). Trailing backslashes
|
|
|
|
are common, too. Remove them. */
|
2011-12-03 00:06:10 +08:00
|
|
|
if (env_cvt && len)
|
2011-02-02 17:59:10 +08:00
|
|
|
{
|
|
|
|
if (*srcpath == '"')
|
|
|
|
{
|
|
|
|
++srcpath;
|
|
|
|
*--s = '\0';
|
|
|
|
len -= 2;
|
|
|
|
}
|
|
|
|
while (len && s[-1] == '\\')
|
|
|
|
{
|
|
|
|
*--s = '\0';
|
|
|
|
--len;
|
|
|
|
}
|
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
if (len)
|
|
|
|
{
|
|
|
|
++d;
|
2011-12-03 00:06:10 +08:00
|
|
|
err = cygwin_conv_path (what, srcpath, d, size - (d - dst));
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2011-12-03 00:06:10 +08:00
|
|
|
else if ((what & CCP_CONVTYPE_MASK) == CCP_POSIX_TO_WIN_A)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
++d;
|
2011-12-03 00:06:10 +08:00
|
|
|
err = cygwin_conv_path (what, ".", d, size - (d - dst));
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2011-12-03 00:06:10 +08:00
|
|
|
if (env_cvt)
|
2008-05-23 19:00:35 +08:00
|
|
|
saw_empty = true;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (err)
|
|
|
|
break;
|
|
|
|
d = strchr (d, '\0');
|
|
|
|
*d = dst_delim;
|
|
|
|
}
|
|
|
|
while (*src++);
|
|
|
|
|
|
|
|
if (saw_empty)
|
|
|
|
err = EIDRM;
|
|
|
|
|
|
|
|
if (d < dst)
|
|
|
|
d++;
|
|
|
|
*d = '\0';
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/********************** Symbolic Link Support **************************/
|
|
|
|
|
|
|
|
/* Create a symlink from FROMPATH to TOPATH. */
|
|
|
|
|
|
|
|
extern "C" int
|
|
|
|
symlink (const char *oldpath, const char *newpath)
|
|
|
|
{
|
2013-04-24 18:16:13 +08:00
|
|
|
return symlink_worker (oldpath, newpath, false);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
symlink_nfs (const char *oldpath, path_conv &win32_newpath)
|
|
|
|
{
|
|
|
|
/* On NFS, create symlinks by calling NtCreateFile with an EA of type
|
|
|
|
NfsSymlinkTargetName containing ... the symlink target name. */
|
|
|
|
tmp_pathbuf tp;
|
|
|
|
PFILE_FULL_EA_INFORMATION pffei;
|
|
|
|
NTSTATUS status;
|
|
|
|
HANDLE fh;
|
|
|
|
OBJECT_ATTRIBUTES attr;
|
|
|
|
IO_STATUS_BLOCK io;
|
|
|
|
|
|
|
|
pffei = (PFILE_FULL_EA_INFORMATION) tp.w_get ();
|
|
|
|
pffei->NextEntryOffset = 0;
|
|
|
|
pffei->Flags = 0;
|
|
|
|
pffei->EaNameLength = sizeof (NFS_SYML_TARGET) - 1;
|
|
|
|
char *EaValue = stpcpy (pffei->EaName, NFS_SYML_TARGET) + 1;
|
|
|
|
pffei->EaValueLength = sizeof (WCHAR) *
|
|
|
|
(sys_mbstowcs ((PWCHAR) EaValue, NT_MAX_PATH, oldpath) - 1);
|
|
|
|
status = NtCreateFile (&fh, FILE_WRITE_DATA | FILE_WRITE_EA | SYNCHRONIZE,
|
|
|
|
win32_newpath.get_object_attr (attr, sec_none_nih),
|
|
|
|
&io, NULL, FILE_ATTRIBUTE_SYSTEM,
|
|
|
|
FILE_SHARE_VALID_FLAGS, FILE_CREATE,
|
|
|
|
FILE_SYNCHRONOUS_IO_NONALERT
|
|
|
|
| FILE_OPEN_FOR_BACKUP_INTENT,
|
|
|
|
pffei, NT_MAX_PATH * sizeof (WCHAR));
|
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
|
|
|
__seterrno_from_nt_status (status);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
NtClose (fh);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-06-17 20:37:09 +08:00
|
|
|
/* Count backslashes between s and e. */
|
|
|
|
static inline int
|
|
|
|
cnt_bs (PWCHAR s, PWCHAR e)
|
|
|
|
{
|
|
|
|
int num = 0;
|
|
|
|
|
|
|
|
while (s < e)
|
|
|
|
if (*s++ == L'\\')
|
|
|
|
++num;
|
|
|
|
return num;
|
|
|
|
}
|
|
|
|
|
2013-04-24 18:16:13 +08:00
|
|
|
static int
|
|
|
|
symlink_native (const char *oldpath, path_conv &win32_newpath)
|
|
|
|
{
|
|
|
|
tmp_pathbuf tp;
|
|
|
|
path_conv win32_oldpath;
|
|
|
|
PUNICODE_STRING final_oldpath, final_newpath;
|
2013-06-17 20:37:09 +08:00
|
|
|
UNICODE_STRING final_oldpath_buf;
|
2013-04-24 18:16:13 +08:00
|
|
|
|
|
|
|
if (isabspath (oldpath))
|
|
|
|
{
|
|
|
|
win32_oldpath.check (oldpath, PC_SYM_NOFOLLOW, stat_suffixes);
|
|
|
|
final_oldpath = win32_oldpath.get_nt_native_path ();
|
|
|
|
final_oldpath->Buffer[1] = L'\\';
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* The symlink target is relative to the directory in which
|
|
|
|
the symlink gets created, not relative to the cwd. Therefore
|
|
|
|
we have to mangle the path quite a bit before calling path_conv. */
|
|
|
|
ssize_t len = strrchr (win32_newpath.normalized_path, '/')
|
|
|
|
- win32_newpath.normalized_path + 1;
|
|
|
|
char *absoldpath = tp.t_get ();
|
|
|
|
stpcpy (stpncpy (absoldpath, win32_newpath.normalized_path, len),
|
|
|
|
oldpath);
|
|
|
|
win32_oldpath.check (absoldpath, PC_SYM_NOFOLLOW, stat_suffixes);
|
2013-06-17 20:37:09 +08:00
|
|
|
|
|
|
|
/* Try hard to keep Windows symlink path relative. */
|
|
|
|
|
|
|
|
/* 1. Find common path prefix. */
|
|
|
|
PWCHAR c_old = win32_oldpath.get_nt_native_path ()->Buffer;
|
|
|
|
PWCHAR c_new = win32_newpath.get_nt_native_path ()->Buffer;
|
|
|
|
/* Windows compatible == always check case insensitive. */
|
|
|
|
while (towupper (*c_old++) == towupper (*c_new++))
|
|
|
|
;
|
|
|
|
/* The last component could share a common prefix, so make sure we end
|
|
|
|
up on the first char after the last common backslash. */
|
|
|
|
while (c_old[-1] != L'\\')
|
|
|
|
--c_old, --c_new;
|
|
|
|
|
|
|
|
/* 2. Check if prefix is long enough. The prefix must at least points to
|
|
|
|
a complete device: \\?\X:\ or \\?\UNC\server\share\ are the minimum
|
|
|
|
prefix strings. We start counting behind the \\?\ for speed. */
|
|
|
|
int num = cnt_bs (win32_oldpath.get_nt_native_path ()->Buffer + 4, c_old);
|
|
|
|
if (num < 1 /* locale drive. */
|
|
|
|
|| (win32_oldpath.get_nt_native_path ()->Buffer[6] != L':'
|
|
|
|
&& num < 3)) /* UNC path. */
|
|
|
|
{
|
|
|
|
/* 3a. No valid common path prefix: Create absolute symlink. */
|
|
|
|
final_oldpath = win32_oldpath.get_nt_native_path ();
|
|
|
|
final_oldpath->Buffer[1] = L'\\';
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* 3b. Common path prefx. Count number of additional directories
|
|
|
|
in symlink's path, and prepend as much ".." path components
|
|
|
|
to the target path. */
|
|
|
|
PWCHAR e_new = win32_newpath.get_nt_native_path ()->Buffer
|
|
|
|
+ win32_newpath.get_nt_native_path ()->Length
|
|
|
|
/ sizeof (WCHAR);
|
|
|
|
num = cnt_bs (c_new, e_new);
|
|
|
|
final_oldpath = &final_oldpath_buf;
|
|
|
|
final_oldpath->Buffer = tp.w_get ();
|
|
|
|
PWCHAR e_old = final_oldpath->Buffer;
|
|
|
|
while (num-- > 0)
|
|
|
|
e_old = wcpcpy (e_old, L"..\\");
|
|
|
|
wcpcpy (e_old, c_old);
|
|
|
|
}
|
2013-04-24 18:16:13 +08:00
|
|
|
}
|
2013-05-23 22:23:01 +08:00
|
|
|
/* If the symlink target doesn't exist, don't create native symlink.
|
|
|
|
Otherwise the directory flag in the symlink is potentially wrong
|
|
|
|
when the target comes into existence, and native tools will fail.
|
|
|
|
This is so screwball. This is no problem on AFS, fortunately. */
|
|
|
|
if (!win32_oldpath.exists () && !win32_oldpath.fs_is_afs ())
|
|
|
|
{
|
|
|
|
SetLastError (ERROR_FILE_NOT_FOUND);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
/* Convert native path to DOS UNC path. */
|
2013-04-24 18:16:13 +08:00
|
|
|
final_newpath = win32_newpath.get_nt_native_path ();
|
|
|
|
final_newpath->Buffer[1] = L'\\';
|
2013-05-23 22:23:01 +08:00
|
|
|
/* Try to create native symlink. */
|
2013-04-24 18:16:13 +08:00
|
|
|
if (!CreateSymbolicLinkW (final_newpath->Buffer, final_oldpath->Buffer,
|
|
|
|
win32_oldpath.isdir ()
|
|
|
|
? SYMBOLIC_LINK_FLAG_DIRECTORY : 0))
|
|
|
|
{
|
|
|
|
/* Repair native path, we still need it. */
|
|
|
|
final_newpath->Buffer[1] = L'?';
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2013-04-24 18:16:13 +08:00
|
|
|
symlink_worker (const char *oldpath, const char *newpath, bool isdevice)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
int res = -1;
|
|
|
|
size_t len;
|
2013-04-24 18:16:13 +08:00
|
|
|
path_conv win32_newpath;
|
2008-05-23 19:00:35 +08:00
|
|
|
char *buf, *cp;
|
|
|
|
tmp_pathbuf tp;
|
2008-11-27 01:21:04 +08:00
|
|
|
unsigned check_opt;
|
2009-09-22 17:24:30 +08:00
|
|
|
bool has_trailing_dirsep = false;
|
2013-04-24 18:16:13 +08:00
|
|
|
winsym_t wsym_type;
|
2008-05-23 19:00:35 +08:00
|
|
|
|
|
|
|
/* POSIX says that empty 'newpath' is invalid input while empty
|
|
|
|
'oldpath' is valid -- it's symlink resolver job to verify if
|
|
|
|
symlink contents point to existing filesystem object */
|
|
|
|
myfault efault;
|
|
|
|
if (efault.faulted (EFAULT))
|
|
|
|
goto done;
|
|
|
|
if (!*oldpath || !*newpath)
|
|
|
|
{
|
|
|
|
set_errno (ENOENT);
|
|
|
|
goto done;
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (strlen (oldpath) > SYMLINK_MAX)
|
|
|
|
{
|
|
|
|
set_errno (ENAMETOOLONG);
|
|
|
|
goto done;
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Trailing dirsep is a no-no. */
|
2009-09-22 17:24:30 +08:00
|
|
|
len = strlen (newpath);
|
|
|
|
has_trailing_dirsep = isdirsep (newpath[len - 1]);
|
|
|
|
if (has_trailing_dirsep)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2009-09-22 17:24:30 +08:00
|
|
|
newpath = strdup (newpath);
|
|
|
|
((char *) newpath)[len - 1] = '\0';
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2008-11-27 01:21:04 +08:00
|
|
|
|
|
|
|
check_opt = PC_SYM_NOFOLLOW | PC_POSIX | (isdevice ? PC_NOWARN : 0);
|
2008-05-23 19:00:35 +08:00
|
|
|
/* We need the normalized full path below. */
|
2008-11-27 01:21:04 +08:00
|
|
|
win32_newpath.check (newpath, check_opt, stat_suffixes);
|
2013-04-24 18:16:13 +08:00
|
|
|
|
|
|
|
/* Default symlink type is determined by global allow_winsymlinks variable.
|
|
|
|
Device files are always shortcuts. */
|
|
|
|
wsym_type = isdevice ? WSYM_lnk : allow_winsymlinks;
|
|
|
|
/* NFS has its own, dedicated way to create symlinks. */
|
|
|
|
if (win32_newpath.fs_is_nfs ())
|
|
|
|
wsym_type = WSYM_nfs;
|
2009-07-17 17:00:19 +08:00
|
|
|
/* MVFS doesn't handle the SYSTEM DOS attribute, but it handles the R/O
|
|
|
|
attribute. Therefore we create symlinks on MVFS always as shortcuts. */
|
2013-04-24 18:16:13 +08:00
|
|
|
else if (win32_newpath.fs_is_mvfs ())
|
|
|
|
wsym_type = WSYM_lnk;
|
|
|
|
/* AFS only supports native symlinks. */
|
|
|
|
else if (win32_newpath.fs_is_afs ())
|
|
|
|
{
|
|
|
|
/* Bail out if OS doesn't support native symlinks. */
|
|
|
|
if (wincap.max_sys_priv () < SE_CREATE_SYMBOLIC_LINK_PRIVILEGE)
|
|
|
|
{
|
|
|
|
set_errno (EPERM);
|
|
|
|
goto done;
|
|
|
|
}
|
2013-05-23 22:23:01 +08:00
|
|
|
wsym_type = WSYM_nativestrict;
|
2013-04-24 18:16:13 +08:00
|
|
|
}
|
|
|
|
/* Don't try native symlinks on filesystems not supporting reparse points. */
|
2013-05-23 22:23:01 +08:00
|
|
|
else if ((wsym_type == WSYM_native || wsym_type == WSYM_nativestrict)
|
2013-04-24 18:16:13 +08:00
|
|
|
&& !(win32_newpath.fs_flags () & FILE_SUPPORTS_REPARSE_POINTS))
|
|
|
|
wsym_type = WSYM_sysfile;
|
2009-07-17 17:00:19 +08:00
|
|
|
|
2013-04-24 18:16:13 +08:00
|
|
|
/* Attach .lnk suffix when shortcut is requested. */
|
|
|
|
if (wsym_type == WSYM_lnk && !win32_newpath.exists ()
|
2008-05-23 19:00:35 +08:00
|
|
|
&& (isdevice || !win32_newpath.fs_is_nfs ()))
|
|
|
|
{
|
|
|
|
char *newplnk = tp.c_get ();
|
|
|
|
stpcpy (stpcpy (newplnk, newpath), ".lnk");
|
2008-11-27 01:21:04 +08:00
|
|
|
win32_newpath.check (newplnk, check_opt);
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (win32_newpath.error)
|
|
|
|
{
|
2008-07-17 04:20:45 +08:00
|
|
|
set_errno (win32_newpath.error);
|
2008-05-23 19:00:35 +08:00
|
|
|
goto done;
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2013-04-24 18:16:13 +08:00
|
|
|
syscall_printf ("symlink (%s, %S) wsym_type %d", oldpath,
|
|
|
|
win32_newpath.get_nt_native_path (), wsym_type);
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if ((!isdevice && win32_newpath.exists ())
|
|
|
|
|| win32_newpath.is_auto_device ())
|
|
|
|
{
|
|
|
|
set_errno (EEXIST);
|
|
|
|
goto done;
|
|
|
|
}
|
2009-09-22 17:24:30 +08:00
|
|
|
if (has_trailing_dirsep && !win32_newpath.exists ())
|
|
|
|
{
|
|
|
|
set_errno (ENOENT);
|
|
|
|
goto done;
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2013-04-24 18:16:13 +08:00
|
|
|
/* Handle NFS and native symlinks in their own functions. */
|
|
|
|
switch (wsym_type)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2013-04-24 18:16:13 +08:00
|
|
|
case WSYM_nfs:
|
|
|
|
res = symlink_nfs (oldpath, win32_newpath);
|
|
|
|
goto done;
|
|
|
|
case WSYM_native:
|
2013-05-23 22:23:01 +08:00
|
|
|
case WSYM_nativestrict:
|
2013-04-24 18:16:13 +08:00
|
|
|
res = symlink_native (oldpath, win32_newpath);
|
2013-05-23 22:23:01 +08:00
|
|
|
if (!res)
|
|
|
|
goto done;
|
|
|
|
/* Strictly native? Too bad. */
|
|
|
|
if (wsym_type == WSYM_nativestrict)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2013-04-24 18:16:13 +08:00
|
|
|
__seterrno ();
|
2008-05-23 19:00:35 +08:00
|
|
|
goto done;
|
|
|
|
}
|
2013-05-23 22:23:01 +08:00
|
|
|
/* Otherwise, fall back to default symlink type. */
|
2013-04-24 18:16:13 +08:00
|
|
|
wsym_type = WSYM_sysfile;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2013-04-24 18:16:13 +08:00
|
|
|
if (wsym_type == WSYM_lnk)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2013-04-24 18:16:13 +08:00
|
|
|
path_conv win32_oldpath;
|
2008-05-23 19:00:35 +08:00
|
|
|
ITEMIDLIST *pidl = NULL;
|
|
|
|
size_t full_len = 0;
|
|
|
|
unsigned short oldpath_len, desc_len, relpath_len, pidl_len = 0;
|
|
|
|
char desc[MAX_PATH + 1], *relpath;
|
|
|
|
|
|
|
|
if (!isdevice)
|
|
|
|
{
|
|
|
|
/* First create an IDLIST to learn how big our shortcut is
|
|
|
|
going to be. */
|
|
|
|
IShellFolder *psl;
|
|
|
|
|
|
|
|
/* The symlink target is relative to the directory in which
|
|
|
|
the symlink gets created, not relative to the cwd. Therefore
|
|
|
|
we have to mangle the path quite a bit before calling path_conv. */
|
2013-04-24 18:16:13 +08:00
|
|
|
if (isabspath (oldpath))
|
|
|
|
win32_oldpath.check (oldpath,
|
|
|
|
PC_SYM_NOFOLLOW,
|
|
|
|
stat_suffixes);
|
|
|
|
else
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
len = strrchr (win32_newpath.normalized_path, '/')
|
|
|
|
- win32_newpath.normalized_path + 1;
|
|
|
|
char *absoldpath = tp.t_get ();
|
|
|
|
stpcpy (stpncpy (absoldpath, win32_newpath.normalized_path, len),
|
|
|
|
oldpath);
|
|
|
|
win32_oldpath.check (absoldpath, PC_SYM_NOFOLLOW, stat_suffixes);
|
|
|
|
}
|
|
|
|
if (SUCCEEDED (SHGetDesktopFolder (&psl)))
|
|
|
|
{
|
|
|
|
WCHAR wc_path[win32_oldpath.get_wide_win32_path_len () + 1];
|
|
|
|
win32_oldpath.get_wide_win32_path (wc_path);
|
|
|
|
/* Amazing but true: Even though the ParseDisplayName method
|
|
|
|
takes a wide char path name, it does not understand the
|
|
|
|
Win32 prefix for long pathnames! So we have to tack off
|
|
|
|
the prefix and convert the path to the "normal" syntax
|
|
|
|
for ParseDisplayName. */
|
|
|
|
WCHAR *wc = wc_path + 4;
|
|
|
|
if (wc[1] != L':') /* native UNC path */
|
|
|
|
*(wc += 2) = L'\\';
|
|
|
|
HRESULT res;
|
|
|
|
if (SUCCEEDED (res = psl->ParseDisplayName (NULL, NULL, wc, NULL,
|
|
|
|
&pidl, NULL)))
|
|
|
|
{
|
|
|
|
ITEMIDLIST *p;
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
for (p = pidl; p->mkid.cb > 0;
|
|
|
|
p = (ITEMIDLIST *)((char *) p + p->mkid.cb))
|
|
|
|
;
|
|
|
|
pidl_len = (char *) p - (char *) pidl + 2;
|
|
|
|
}
|
|
|
|
psl->Release ();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Compute size of shortcut file. */
|
|
|
|
full_len = sizeof (win_shortcut_hdr);
|
|
|
|
if (pidl_len)
|
|
|
|
full_len += sizeof (unsigned short) + pidl_len;
|
|
|
|
oldpath_len = strlen (oldpath);
|
|
|
|
/* Unfortunately the length of the description is restricted to a
|
2013-04-23 17:44:36 +08:00
|
|
|
length of 2000 bytes. We don't want to add considerations for
|
|
|
|
the different lengths and even 2000 bytes is not enough for long
|
|
|
|
path names. So what we do here is to set the description to the
|
|
|
|
POSIX path only if the path is not longer than MAX_PATH characters.
|
|
|
|
We append the full path name after the regular shortcut data
|
2008-05-23 19:00:35 +08:00
|
|
|
(see below), which works fine with Windows Explorer as well
|
|
|
|
as older Cygwin versions (as long as the whole file isn't bigger
|
|
|
|
than 8K). The description field is only used for backward
|
|
|
|
compatibility to older Cygwin versions and those versions are
|
|
|
|
not capable of handling long path names anyway. */
|
|
|
|
desc_len = stpcpy (desc, oldpath_len > MAX_PATH
|
|
|
|
? "[path too long]" : oldpath) - desc;
|
|
|
|
full_len += sizeof (unsigned short) + desc_len;
|
|
|
|
/* Devices get the oldpath string unchanged as relative path. */
|
|
|
|
if (isdevice)
|
|
|
|
{
|
|
|
|
relpath_len = oldpath_len;
|
|
|
|
stpcpy (relpath = tp.c_get (), oldpath);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
relpath_len = strlen (win32_oldpath.get_win32 ());
|
|
|
|
stpcpy (relpath = tp.c_get (), win32_oldpath.get_win32 ());
|
|
|
|
}
|
|
|
|
full_len += sizeof (unsigned short) + relpath_len;
|
|
|
|
full_len += sizeof (unsigned short) + oldpath_len;
|
|
|
|
/* 1 byte more for trailing 0 written by stpcpy. */
|
|
|
|
if (full_len < NT_MAX_PATH * sizeof (WCHAR))
|
2013-04-24 18:16:13 +08:00
|
|
|
buf = tp.t_get ();
|
2008-05-23 19:00:35 +08:00
|
|
|
else
|
|
|
|
buf = (char *) alloca (full_len + 1);
|
|
|
|
|
|
|
|
/* Create shortcut header */
|
|
|
|
win_shortcut_hdr *shortcut_header = (win_shortcut_hdr *) buf;
|
|
|
|
memset (shortcut_header, 0, sizeof *shortcut_header);
|
|
|
|
shortcut_header->size = sizeof *shortcut_header;
|
|
|
|
shortcut_header->magic = GUID_shortcut;
|
|
|
|
shortcut_header->flags = (WSH_FLAG_DESC | WSH_FLAG_RELPATH);
|
|
|
|
if (pidl)
|
|
|
|
shortcut_header->flags |= WSH_FLAG_IDLIST;
|
|
|
|
shortcut_header->run = SW_NORMAL;
|
|
|
|
cp = buf + sizeof (win_shortcut_hdr);
|
|
|
|
|
|
|
|
/* Create IDLIST */
|
|
|
|
if (pidl)
|
|
|
|
{
|
|
|
|
*(unsigned short *)cp = pidl_len;
|
|
|
|
memcpy (cp += 2, pidl, pidl_len);
|
|
|
|
cp += pidl_len;
|
|
|
|
CoTaskMemFree (pidl);
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Create description */
|
|
|
|
*(unsigned short *)cp = desc_len;
|
|
|
|
cp = stpcpy (cp += 2, desc);
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Create relpath */
|
|
|
|
*(unsigned short *)cp = relpath_len;
|
|
|
|
cp = stpcpy (cp += 2, relpath);
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Append the POSIX path after the regular shortcut data for
|
|
|
|
the long path support. */
|
2009-03-26 20:12:11 +08:00
|
|
|
unsigned short *plen = (unsigned short *) cp;
|
|
|
|
cp += 2;
|
|
|
|
*(PWCHAR) cp = 0xfeff; /* BOM */
|
|
|
|
cp += 2;
|
|
|
|
*plen = sys_mbstowcs ((PWCHAR) cp, NT_MAX_PATH, oldpath) * sizeof (WCHAR);
|
|
|
|
cp += *plen;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2009-03-26 20:12:11 +08:00
|
|
|
/* Default technique creating a symlink. */
|
2013-04-24 18:16:13 +08:00
|
|
|
buf = tp.t_get ();
|
2009-03-26 20:12:11 +08:00
|
|
|
cp = stpcpy (buf, SYMLINK_COOKIE);
|
|
|
|
*(PWCHAR) cp = 0xfeff; /* BOM */
|
|
|
|
cp += 2;
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Note that the terminating nul is written. */
|
2009-03-26 20:12:11 +08:00
|
|
|
cp += sys_mbstowcs ((PWCHAR) cp, NT_MAX_PATH, oldpath) * sizeof (WCHAR);
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2013-04-24 18:16:13 +08:00
|
|
|
OBJECT_ATTRIBUTES attr;
|
|
|
|
IO_STATUS_BLOCK io;
|
|
|
|
NTSTATUS status;
|
|
|
|
ULONG access;
|
|
|
|
HANDLE fh;
|
|
|
|
|
|
|
|
access = DELETE | FILE_GENERIC_WRITE;
|
2008-05-23 19:00:35 +08:00
|
|
|
if (isdevice && win32_newpath.exists ())
|
|
|
|
{
|
|
|
|
status = NtOpenFile (&fh, FILE_WRITE_ATTRIBUTES,
|
2013-04-24 18:16:13 +08:00
|
|
|
win32_newpath.get_object_attr (attr, sec_none_nih),
|
2008-05-23 19:00:35 +08:00
|
|
|
&io, 0, FILE_OPEN_FOR_BACKUP_INTENT);
|
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
|
|
|
__seterrno_from_nt_status (status);
|
|
|
|
goto done;
|
|
|
|
}
|
2008-10-21 03:30:06 +08:00
|
|
|
status = NtSetAttributesFile (fh, FILE_ATTRIBUTE_NORMAL);
|
2008-05-23 19:00:35 +08:00
|
|
|
NtClose (fh);
|
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
|
|
|
__seterrno_from_nt_status (status);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
}
|
2011-07-05 17:59:34 +08:00
|
|
|
else if (!isdevice && win32_newpath.has_acls () && !win32_newpath.isremote ())
|
2011-03-08 22:26:15 +08:00
|
|
|
/* If the filesystem supports ACLs, we will overwrite the DACL after the
|
|
|
|
call to NtCreateFile. This requires a handle with READ_CONTROL and
|
|
|
|
WRITE_DAC access, otherwise get_file_sd and set_file_sd both have to
|
2011-07-05 17:59:34 +08:00
|
|
|
open the file again.
|
|
|
|
FIXME: On remote NTFS shares open sometimes fails because even the
|
|
|
|
creator of the file doesn't have the right to change the DACL.
|
2011-08-02 01:01:38 +08:00
|
|
|
I don't know what setting that is or how to recognize such a share,
|
2011-07-05 17:59:34 +08:00
|
|
|
so for now we don't request WRITE_DAC on remote drives. */
|
2011-03-08 22:26:15 +08:00
|
|
|
access |= READ_CONTROL | WRITE_DAC;
|
|
|
|
|
2013-05-23 22:23:01 +08:00
|
|
|
status = NtCreateFile (&fh, access,
|
|
|
|
win32_newpath.get_object_attr (attr, sec_none_nih),
|
2008-05-23 19:00:35 +08:00
|
|
|
&io, NULL, FILE_ATTRIBUTE_NORMAL,
|
|
|
|
FILE_SHARE_VALID_FLAGS,
|
|
|
|
isdevice ? FILE_OVERWRITE_IF : FILE_CREATE,
|
|
|
|
FILE_SYNCHRONOUS_IO_NONALERT
|
|
|
|
| FILE_NON_DIRECTORY_FILE
|
|
|
|
| FILE_OPEN_FOR_BACKUP_INTENT,
|
|
|
|
NULL, 0);
|
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
|
|
|
__seterrno_from_nt_status (status);
|
|
|
|
goto done;
|
|
|
|
}
|
2009-10-31 03:58:53 +08:00
|
|
|
if (win32_newpath.has_acls ())
|
2008-08-14 22:05:04 +08:00
|
|
|
set_file_attribute (fh, win32_newpath, ILLEGAL_UID, ILLEGAL_GID,
|
2009-10-31 03:58:53 +08:00
|
|
|
(io.Information == FILE_CREATED ? S_JUSTCREATED : 0)
|
|
|
|
| S_IFLNK | STD_RBITS | STD_WBITS);
|
2008-05-23 19:00:35 +08:00
|
|
|
status = NtWriteFile (fh, NULL, NULL, NULL, &io, buf, cp - buf, NULL, NULL);
|
|
|
|
if (NT_SUCCESS (status) && io.Information == (ULONG) (cp - buf))
|
|
|
|
{
|
2013-04-24 18:16:13 +08:00
|
|
|
status = NtSetAttributesFile (fh, wsym_type == WSYM_lnk
|
|
|
|
? FILE_ATTRIBUTE_READONLY
|
|
|
|
: FILE_ATTRIBUTE_SYSTEM);
|
2008-05-23 19:00:35 +08:00
|
|
|
if (!NT_SUCCESS (status))
|
2013-04-23 17:44:36 +08:00
|
|
|
debug_printf ("Setting attributes failed, status = %y", status);
|
2008-05-23 19:00:35 +08:00
|
|
|
res = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
__seterrno_from_nt_status (status);
|
|
|
|
FILE_DISPOSITION_INFORMATION fdi = { TRUE };
|
|
|
|
status = NtSetInformationFile (fh, &io, &fdi, sizeof fdi,
|
|
|
|
FileDispositionInformation);
|
|
|
|
if (!NT_SUCCESS (status))
|
2013-04-23 17:44:36 +08:00
|
|
|
debug_printf ("Setting delete dispostion failed, status = %y", status);
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
NtClose (fh);
|
|
|
|
|
|
|
|
done:
|
2013-04-24 18:16:13 +08:00
|
|
|
syscall_printf ("%d = symlink_worker(%s, %s, %d)",
|
|
|
|
res, oldpath, newpath, isdevice);
|
2009-09-22 17:24:30 +08:00
|
|
|
if (has_trailing_dirsep)
|
|
|
|
free ((void *) newpath);
|
2008-05-23 19:00:35 +08:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool
|
|
|
|
cmp_shortcut_header (win_shortcut_hdr *file_header)
|
|
|
|
{
|
|
|
|
/* A Cygwin or U/Win shortcut only contains a description and a relpath.
|
|
|
|
Cygwin shortcuts also might contain an ITEMIDLIST. The run type is
|
|
|
|
always set to SW_NORMAL. */
|
|
|
|
return file_header->size == sizeof (win_shortcut_hdr)
|
|
|
|
&& !memcmp (&file_header->magic, &GUID_shortcut, sizeof GUID_shortcut)
|
|
|
|
&& (file_header->flags & ~WSH_FLAG_IDLIST)
|
|
|
|
== (WSH_FLAG_DESC | WSH_FLAG_RELPATH)
|
|
|
|
&& file_header->run == SW_NORMAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2010-06-15 20:05:15 +08:00
|
|
|
symlink_info::check_shortcut (HANDLE h)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
tmp_pathbuf tp;
|
|
|
|
win_shortcut_hdr *file_header;
|
|
|
|
char *buf, *cp;
|
|
|
|
unsigned short len;
|
|
|
|
int res = 0;
|
|
|
|
NTSTATUS status;
|
|
|
|
IO_STATUS_BLOCK io;
|
|
|
|
FILE_STANDARD_INFORMATION fsi;
|
2010-06-15 20:05:15 +08:00
|
|
|
LARGE_INTEGER off = { QuadPart:0LL };
|
2008-05-23 19:00:35 +08:00
|
|
|
|
|
|
|
status = NtQueryInformationFile (h, &io, &fsi, sizeof fsi,
|
|
|
|
FileStandardInformation);
|
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
|
|
|
set_error (EIO);
|
2010-06-15 20:05:15 +08:00
|
|
|
return 0;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2013-04-23 17:44:36 +08:00
|
|
|
if (fsi.EndOfFile.QuadPart <= (LONGLONG) sizeof (win_shortcut_hdr)
|
2008-05-23 19:00:35 +08:00
|
|
|
|| fsi.EndOfFile.QuadPart > 4 * 65536)
|
2010-06-15 20:05:15 +08:00
|
|
|
return 0;
|
2008-05-23 19:00:35 +08:00
|
|
|
if (fsi.EndOfFile.LowPart < NT_MAX_PATH * sizeof (WCHAR))
|
|
|
|
buf = (char *) tp.w_get ();
|
|
|
|
else
|
|
|
|
buf = (char *) alloca (fsi.EndOfFile.LowPart + 1);
|
2010-06-15 20:05:15 +08:00
|
|
|
status = NtReadFile (h, NULL, NULL, NULL, &io, buf, fsi.EndOfFile.LowPart,
|
|
|
|
&off, NULL);
|
|
|
|
if (!NT_SUCCESS (status))
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2010-06-15 20:05:15 +08:00
|
|
|
if (status != STATUS_END_OF_FILE)
|
|
|
|
set_error (EIO);
|
|
|
|
return 0;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
file_header = (win_shortcut_hdr *) buf;
|
|
|
|
if (io.Information != fsi.EndOfFile.LowPart
|
|
|
|
|| !cmp_shortcut_header (file_header))
|
2010-06-15 20:05:15 +08:00
|
|
|
return 0;
|
2008-05-23 19:00:35 +08:00
|
|
|
cp = buf + sizeof (win_shortcut_hdr);
|
|
|
|
if (file_header->flags & WSH_FLAG_IDLIST) /* Skip ITEMIDLIST */
|
|
|
|
cp += *(unsigned short *) cp + 2;
|
|
|
|
if (!(len = *(unsigned short *) cp))
|
2010-06-15 20:05:15 +08:00
|
|
|
return 0;
|
2008-05-23 19:00:35 +08:00
|
|
|
cp += 2;
|
|
|
|
/* Check if this is a device file - these start with the sequence :\\ */
|
|
|
|
if (strncmp (cp, ":\\", 2) == 0)
|
|
|
|
res = strlen (strcpy (contents, cp)); /* Don't mess with device files */
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Has appended full path? If so, use it instead of description. */
|
|
|
|
unsigned short relpath_len = *(unsigned short *) (cp + len);
|
|
|
|
if (cp + len + 2 + relpath_len < buf + fsi.EndOfFile.LowPart)
|
|
|
|
{
|
|
|
|
cp += len + 2 + relpath_len;
|
|
|
|
len = *(unsigned short *) cp;
|
|
|
|
cp += 2;
|
|
|
|
}
|
2009-03-26 20:12:11 +08:00
|
|
|
if (*(PWCHAR) cp == 0xfeff) /* BOM */
|
|
|
|
{
|
|
|
|
char *tmpbuf = tp.c_get ();
|
|
|
|
if (sys_wcstombs (tmpbuf, NT_MAX_PATH, (PWCHAR) (cp + 2))
|
|
|
|
> SYMLINK_MAX + 1)
|
2010-06-15 20:05:15 +08:00
|
|
|
return 0;
|
2009-03-26 20:12:11 +08:00
|
|
|
res = posixify (tmpbuf);
|
|
|
|
}
|
|
|
|
else if (len > SYMLINK_MAX)
|
2010-06-15 20:05:15 +08:00
|
|
|
return 0;
|
2009-03-26 20:12:11 +08:00
|
|
|
else
|
|
|
|
{
|
|
|
|
cp[len] = '\0';
|
|
|
|
res = posixify (cp);
|
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
if (res) /* It's a symlink. */
|
2010-04-29 18:38:05 +08:00
|
|
|
pflags |= PATH_SYMLINK | PATH_LNK;
|
2008-12-25 00:34:38 +08:00
|
|
|
return res;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2010-06-15 20:05:15 +08:00
|
|
|
symlink_info::check_sysfile (HANDLE h)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2009-03-26 20:12:11 +08:00
|
|
|
tmp_pathbuf tp;
|
2008-05-23 19:00:35 +08:00
|
|
|
char cookie_buf[sizeof (SYMLINK_COOKIE) - 1];
|
2009-03-26 20:12:11 +08:00
|
|
|
char *srcbuf = tp.c_get ();
|
2008-05-23 19:00:35 +08:00
|
|
|
int res = 0;
|
|
|
|
NTSTATUS status;
|
|
|
|
IO_STATUS_BLOCK io;
|
2009-08-27 04:32:35 +08:00
|
|
|
bool interix_symlink = false;
|
2010-06-15 20:05:15 +08:00
|
|
|
LARGE_INTEGER off = { QuadPart:0LL };
|
2008-05-23 19:00:35 +08:00
|
|
|
|
2010-06-15 20:05:15 +08:00
|
|
|
status = NtReadFile (h, NULL, NULL, NULL, &io, cookie_buf,
|
|
|
|
sizeof (cookie_buf), &off, NULL);
|
2008-05-23 19:00:35 +08:00
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
2013-04-23 17:44:36 +08:00
|
|
|
debug_printf ("ReadFile1 failed %y", status);
|
2008-05-23 19:00:35 +08:00
|
|
|
if (status != STATUS_END_OF_FILE)
|
2008-05-23 15:13:47 +08:00
|
|
|
set_error (EIO);
|
2010-06-15 20:05:15 +08:00
|
|
|
return 0;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2010-06-15 20:05:15 +08:00
|
|
|
off.QuadPart = io.Information;
|
|
|
|
if (io.Information == sizeof (cookie_buf)
|
2008-05-23 19:00:35 +08:00
|
|
|
&& memcmp (cookie_buf, SYMLINK_COOKIE, sizeof (cookie_buf)) == 0)
|
|
|
|
{
|
|
|
|
/* It's a symlink. */
|
2010-04-29 18:38:05 +08:00
|
|
|
pflags |= PATH_SYMLINK;
|
2009-08-27 04:32:35 +08:00
|
|
|
}
|
|
|
|
else if (io.Information == sizeof (cookie_buf)
|
|
|
|
&& memcmp (cookie_buf, SOCKET_COOKIE, sizeof (cookie_buf)) == 0)
|
|
|
|
pflags |= PATH_SOCKET;
|
|
|
|
else if (io.Information >= sizeof (INTERIX_SYMLINK_COOKIE)
|
|
|
|
&& memcmp (cookie_buf, INTERIX_SYMLINK_COOKIE,
|
|
|
|
sizeof (INTERIX_SYMLINK_COOKIE) - 1) == 0)
|
|
|
|
{
|
|
|
|
/* It's an Interix symlink. */
|
2010-04-29 18:38:05 +08:00
|
|
|
pflags |= PATH_SYMLINK;
|
2009-08-27 04:32:35 +08:00
|
|
|
interix_symlink = true;
|
|
|
|
/* Interix symlink cookies are shorter than Cygwin symlink cookies, so
|
2011-06-06 13:02:13 +08:00
|
|
|
in case of an Interix symlink cooky we have read too far into the
|
2009-08-27 04:32:35 +08:00
|
|
|
file. Set file pointer back to the position right after the cookie. */
|
2010-06-15 20:05:15 +08:00
|
|
|
off.QuadPart = sizeof (INTERIX_SYMLINK_COOKIE) - 1;
|
2009-08-27 04:32:35 +08:00
|
|
|
}
|
2010-04-29 18:38:05 +08:00
|
|
|
if (pflags & PATH_SYMLINK)
|
2009-08-27 04:32:35 +08:00
|
|
|
{
|
2008-05-23 19:00:35 +08:00
|
|
|
status = NtReadFile (h, NULL, NULL, NULL, &io, srcbuf,
|
2010-06-15 20:05:15 +08:00
|
|
|
NT_MAX_PATH, &off, NULL);
|
2008-05-23 19:00:35 +08:00
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
|
|
|
debug_printf ("ReadFile2 failed");
|
|
|
|
if (status != STATUS_END_OF_FILE)
|
|
|
|
set_error (EIO);
|
|
|
|
}
|
2009-08-27 04:32:35 +08:00
|
|
|
else if (*(PWCHAR) srcbuf == 0xfeff /* BOM */
|
|
|
|
|| interix_symlink)
|
2009-03-26 20:12:11 +08:00
|
|
|
{
|
2009-08-27 04:32:35 +08:00
|
|
|
/* Add trailing 0 to Interix symlink target. Skip BOM in Cygwin
|
|
|
|
symlinks. */
|
|
|
|
if (interix_symlink)
|
|
|
|
((PWCHAR) srcbuf)[io.Information / sizeof (WCHAR)] = L'\0';
|
|
|
|
else
|
|
|
|
srcbuf += 2;
|
2009-03-26 20:12:11 +08:00
|
|
|
char *tmpbuf = tp.c_get ();
|
2009-08-27 04:32:35 +08:00
|
|
|
if (sys_wcstombs (tmpbuf, NT_MAX_PATH, (PWCHAR) srcbuf)
|
2009-03-26 20:12:11 +08:00
|
|
|
> SYMLINK_MAX + 1)
|
|
|
|
debug_printf ("symlink string too long");
|
|
|
|
else
|
|
|
|
res = posixify (tmpbuf);
|
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
else if (io.Information > SYMLINK_MAX + 1)
|
|
|
|
debug_printf ("symlink string too long");
|
|
|
|
else
|
|
|
|
res = posixify (srcbuf);
|
|
|
|
}
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2011-12-24 21:11:34 +08:00
|
|
|
symlink_info::check_reparse_point (HANDLE h, bool remote)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
tmp_pathbuf tp;
|
|
|
|
NTSTATUS status;
|
|
|
|
IO_STATUS_BLOCK io;
|
|
|
|
PREPARSE_DATA_BUFFER rp = (PREPARSE_DATA_BUFFER) tp.c_get ();
|
2009-11-10 16:54:24 +08:00
|
|
|
UNICODE_STRING subst;
|
2008-05-23 19:00:35 +08:00
|
|
|
char srcbuf[SYMLINK_MAX + 7];
|
|
|
|
|
2011-12-24 21:11:34 +08:00
|
|
|
/* On remote drives or under heavy load, NtFsControlFile can return with
|
|
|
|
STATUS_PENDING. If so, instead of creating an event object, just set
|
|
|
|
io.Status to an invalid value and perform a minimal wait until io.Status
|
|
|
|
changed. */
|
|
|
|
memset (&io, 0xff, sizeof io);
|
|
|
|
status = NtFsControlFile (h, NULL, NULL, NULL, &io,
|
|
|
|
FSCTL_GET_REPARSE_POINT, NULL, 0, (LPVOID) rp,
|
2008-05-23 19:00:35 +08:00
|
|
|
MAXIMUM_REPARSE_DATA_BUFFER_SIZE);
|
2011-12-24 21:11:34 +08:00
|
|
|
if (status == STATUS_PENDING)
|
|
|
|
{
|
|
|
|
while (io.Status == (NTSTATUS) 0xffffffff)
|
|
|
|
Sleep (1L);
|
|
|
|
status = io.Status;
|
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
2013-04-23 17:44:36 +08:00
|
|
|
debug_printf ("NtFsControlFile(FSCTL_GET_REPARSE_POINT) failed, %y",
|
2008-05-23 19:00:35 +08:00
|
|
|
status);
|
|
|
|
set_error (EIO);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (rp->ReparseTag == IO_REPARSE_TAG_SYMLINK)
|
2011-12-24 21:11:34 +08:00
|
|
|
/* Windows evaluates native symlink literally. If a remote symlink points
|
|
|
|
to, say, C:\foo, it will be handled as if the target is the local file
|
|
|
|
C:\foo. That comes in handy since that's how symlinks are treated under
|
|
|
|
POSIX as well. */
|
2009-11-10 16:54:24 +08:00
|
|
|
RtlInitCountedUnicodeString (&subst,
|
|
|
|
(WCHAR *)((char *)rp->SymbolicLinkReparseBuffer.PathBuffer
|
|
|
|
+ rp->SymbolicLinkReparseBuffer.SubstituteNameOffset),
|
|
|
|
rp->SymbolicLinkReparseBuffer.SubstituteNameLength);
|
2011-12-24 21:11:34 +08:00
|
|
|
else if (!remote && rp->ReparseTag == IO_REPARSE_TAG_MOUNT_POINT)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2011-12-24 21:11:34 +08:00
|
|
|
/* Don't handle junctions on remote filesystems as symlinks. This type
|
|
|
|
of reparse point is handled transparently by the OS so that the
|
|
|
|
target of the junction is the remote directory it is supposed to
|
|
|
|
point to. If we handle it as symlink, it will be mistreated as
|
|
|
|
pointing to a dir on the local system. */
|
2011-06-06 13:02:13 +08:00
|
|
|
RtlInitCountedUnicodeString (&subst,
|
2009-08-24 19:14:30 +08:00
|
|
|
(WCHAR *)((char *)rp->MountPointReparseBuffer.PathBuffer
|
|
|
|
+ rp->MountPointReparseBuffer.SubstituteNameOffset),
|
|
|
|
rp->MountPointReparseBuffer.SubstituteNameLength);
|
2009-11-10 03:46:36 +08:00
|
|
|
if (RtlEqualUnicodePathPrefix (&subst, &ro_u_volume, TRUE))
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2009-08-25 19:27:03 +08:00
|
|
|
/* Volume mount point. Not treated as symlink. The return
|
|
|
|
value of -1 is a hint for the caller to treat this as a
|
|
|
|
volume mount point. */
|
|
|
|
return -1;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
}
|
2009-11-10 16:54:24 +08:00
|
|
|
else
|
|
|
|
{
|
2011-12-24 21:11:34 +08:00
|
|
|
/* Maybe it's a reparse point, but it's certainly not one we recognize.
|
|
|
|
Drop REPARSE attribute so we don't try to use the flag accidentally.
|
|
|
|
It's just some arbitrary file or directory for us. */
|
2009-11-10 16:54:24 +08:00
|
|
|
fileattr &= ~FILE_ATTRIBUTE_REPARSE_POINT;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
sys_wcstombs (srcbuf, SYMLINK_MAX + 7, subst.Buffer,
|
|
|
|
subst.Length / sizeof (WCHAR));
|
2010-04-29 18:38:05 +08:00
|
|
|
pflags |= PATH_SYMLINK | PATH_REP;
|
2010-09-13 19:17:36 +08:00
|
|
|
/* A symlink is never a directory. */
|
2009-11-10 16:54:24 +08:00
|
|
|
fileattr &= ~FILE_ATTRIBUTE_DIRECTORY;
|
2008-05-23 19:00:35 +08:00
|
|
|
return posixify (srcbuf);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
symlink_info::check_nfs_symlink (HANDLE h)
|
|
|
|
{
|
|
|
|
tmp_pathbuf tp;
|
|
|
|
NTSTATUS status;
|
|
|
|
IO_STATUS_BLOCK io;
|
|
|
|
struct {
|
|
|
|
FILE_GET_EA_INFORMATION fgei;
|
|
|
|
char buf[sizeof (NFS_SYML_TARGET)];
|
|
|
|
} fgei_buf;
|
|
|
|
PFILE_FULL_EA_INFORMATION pffei;
|
|
|
|
int res = 0;
|
|
|
|
|
|
|
|
/* To find out if the file is a symlink and to get the symlink target,
|
|
|
|
try to fetch the NfsSymlinkTargetName EA. */
|
|
|
|
fgei_buf.fgei.NextEntryOffset = 0;
|
|
|
|
fgei_buf.fgei.EaNameLength = sizeof (NFS_SYML_TARGET) - 1;
|
|
|
|
stpcpy (fgei_buf.fgei.EaName, NFS_SYML_TARGET);
|
|
|
|
pffei = (PFILE_FULL_EA_INFORMATION) tp.w_get ();
|
|
|
|
status = NtQueryEaFile (h, &io, pffei, NT_MAX_PATH * sizeof (WCHAR), TRUE,
|
|
|
|
&fgei_buf.fgei, sizeof fgei_buf, NULL, TRUE);
|
|
|
|
if (NT_SUCCESS (status) && pffei->EaValueLength > 0)
|
|
|
|
{
|
|
|
|
PWCHAR spath = (PWCHAR)
|
|
|
|
(pffei->EaName + pffei->EaNameLength + 1);
|
|
|
|
res = sys_wcstombs (contents, SYMLINK_MAX + 1,
|
2010-06-15 20:05:15 +08:00
|
|
|
spath, pffei->EaValueLength) - 1;
|
2010-04-29 18:38:05 +08:00
|
|
|
pflags |= PATH_SYMLINK;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
symlink_info::posixify (char *srcbuf)
|
|
|
|
{
|
|
|
|
/* The definition for a path in a native symlink is a bit weird. The Flags
|
|
|
|
value seem to contain 0 for absolute paths (stored as NT native path)
|
|
|
|
and 1 for relative paths. Relative paths are paths not starting with a
|
|
|
|
drive letter. These are not converted to NT native, but stored as
|
|
|
|
given. A path starting with a single backslash is relative to the
|
|
|
|
current drive thus a "relative" value (Flags == 1).
|
|
|
|
Funny enough it's possible to store paths with slashes instead of
|
|
|
|
backslashes, but they are evaluated incorrectly by subsequent Windows
|
|
|
|
calls like CreateFile (ERROR_INVALID_NAME). So, what we do here is to
|
|
|
|
take paths starting with slashes at face value, evaluating them as
|
|
|
|
Cygwin specific POSIX paths.
|
|
|
|
A path starting with two slashes(!) or backslashes is converted into an
|
|
|
|
NT UNC path. Unfortunately, in contrast to POSIX rules, paths starting
|
|
|
|
with three or more (back)slashes are also converted into UNC paths,
|
2011-02-15 23:25:59 +08:00
|
|
|
just incorrectly sticking to one redundant leading backslash. We go
|
2008-05-23 19:00:35 +08:00
|
|
|
along with this behaviour to avoid scenarios in which native tools access
|
|
|
|
other files than Cygwin.
|
|
|
|
The above rules are used exactly the same way on Cygwin specific symlinks
|
|
|
|
(sysfiles and shortcuts) to eliminate non-POSIX paths in the output. */
|
|
|
|
|
|
|
|
/* Eliminate native NT prefixes. */
|
|
|
|
if (srcbuf[0] == '\\' && !strncmp (srcbuf + 1, "??\\", 3))
|
|
|
|
{
|
|
|
|
srcbuf += 4;
|
|
|
|
if (srcbuf[1] != ':') /* native UNC path */
|
|
|
|
*(srcbuf += 2) = '\\';
|
|
|
|
}
|
|
|
|
if (isdrive (srcbuf))
|
|
|
|
mount_table->conv_to_posix_path (srcbuf, contents, 0);
|
|
|
|
else if (srcbuf[0] == '\\')
|
|
|
|
{
|
|
|
|
if (srcbuf[1] == '\\') /* UNC path */
|
|
|
|
slashify (srcbuf, contents, 0);
|
|
|
|
else /* Paths starting with \ are current drive relative. */
|
|
|
|
{
|
|
|
|
char cvtbuf[SYMLINK_MAX + 1];
|
|
|
|
|
|
|
|
stpcpy (cvtbuf + cygheap->cwd.get_drive (cvtbuf), srcbuf);
|
|
|
|
mount_table->conv_to_posix_path (cvtbuf, contents, 0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else /* Everything else is taken as is. */
|
|
|
|
slashify (srcbuf, contents, 0);
|
|
|
|
return strlen (contents);
|
|
|
|
}
|
|
|
|
|
|
|
|
enum
|
|
|
|
{
|
|
|
|
SCAN_BEG,
|
|
|
|
SCAN_LNK,
|
|
|
|
SCAN_HASLNK,
|
|
|
|
SCAN_JUSTCHECK,
|
|
|
|
SCAN_JUSTCHECKTHIS, /* Never try to append a suffix. */
|
|
|
|
SCAN_APPENDLNK,
|
|
|
|
SCAN_EXTRALNK,
|
|
|
|
SCAN_DONE,
|
|
|
|
};
|
|
|
|
|
|
|
|
class suffix_scan
|
|
|
|
{
|
|
|
|
const suffix_info *suffixes, *suffixes_start;
|
|
|
|
int nextstate;
|
|
|
|
char *eopath;
|
2013-04-03 19:20:36 +08:00
|
|
|
size_t namelen;
|
2008-05-23 19:00:35 +08:00
|
|
|
public:
|
|
|
|
const char *path;
|
|
|
|
char *has (const char *, const suffix_info *);
|
|
|
|
int next ();
|
|
|
|
int lnk_match () {return nextstate >= SCAN_APPENDLNK;}
|
2013-04-03 19:20:36 +08:00
|
|
|
size_t name_len () {return namelen;}
|
2008-05-23 19:00:35 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
char *
|
|
|
|
suffix_scan::has (const char *in_path, const suffix_info *in_suffixes)
|
|
|
|
{
|
|
|
|
nextstate = SCAN_BEG;
|
|
|
|
suffixes = suffixes_start = in_suffixes;
|
|
|
|
|
|
|
|
const char *fname = strrchr (in_path, '\\');
|
|
|
|
fname = fname ? fname + 1 : in_path;
|
|
|
|
char *ext_here = strrchr (fname, '.');
|
|
|
|
path = in_path;
|
|
|
|
eopath = strchr (path, '\0');
|
|
|
|
|
|
|
|
if (!ext_here)
|
|
|
|
goto noext;
|
|
|
|
|
|
|
|
if (suffixes)
|
|
|
|
{
|
|
|
|
/* Check if the extension matches a known extension */
|
|
|
|
for (const suffix_info *ex = in_suffixes; ex->name != NULL; ex++)
|
|
|
|
if (ascii_strcasematch (ext_here, ex->name))
|
2008-05-23 15:13:47 +08:00
|
|
|
{
|
2008-05-23 19:00:35 +08:00
|
|
|
nextstate = SCAN_JUSTCHECK;
|
|
|
|
suffixes = NULL; /* Has an extension so don't scan for one. */
|
|
|
|
goto done;
|
2008-05-23 15:13:47 +08:00
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Didn't match. Use last resort -- .lnk. */
|
|
|
|
if (ascii_strcasematch (ext_here, ".lnk"))
|
|
|
|
{
|
|
|
|
nextstate = SCAN_HASLNK;
|
|
|
|
suffixes = NULL;
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
noext:
|
|
|
|
ext_here = eopath;
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
done:
|
2013-04-03 19:20:36 +08:00
|
|
|
namelen = eopath - fname;
|
|
|
|
/* Avoid attaching suffixes if the resulting filename would be invalid.
|
|
|
|
For performance reasons we don't check the length of a suffix, since
|
|
|
|
we know that all suffixes are 4 chars in length.
|
|
|
|
|
|
|
|
FIXME: This is not really correct. A fully functional test should
|
|
|
|
work on wide character paths. This would probably also speed
|
|
|
|
up symlink_info::check. */
|
|
|
|
if (namelen > NAME_MAX - 4)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
nextstate = SCAN_JUSTCHECKTHIS;
|
|
|
|
suffixes = NULL;
|
|
|
|
}
|
|
|
|
return ext_here;
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
int
|
|
|
|
suffix_scan::next ()
|
|
|
|
{
|
|
|
|
for (;;)
|
|
|
|
{
|
|
|
|
if (!suffixes)
|
|
|
|
switch (nextstate)
|
2008-05-23 15:13:47 +08:00
|
|
|
{
|
2008-05-23 19:00:35 +08:00
|
|
|
case SCAN_BEG:
|
|
|
|
suffixes = suffixes_start;
|
|
|
|
if (!suffixes)
|
|
|
|
{
|
|
|
|
nextstate = SCAN_LNK;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
nextstate = SCAN_EXTRALNK;
|
|
|
|
/* fall through to suffix checking below */
|
|
|
|
break;
|
|
|
|
case SCAN_HASLNK:
|
|
|
|
nextstate = SCAN_APPENDLNK; /* Skip SCAN_BEG */
|
|
|
|
return 1;
|
|
|
|
case SCAN_EXTRALNK:
|
|
|
|
nextstate = SCAN_DONE;
|
|
|
|
*eopath = '\0';
|
|
|
|
return 0;
|
|
|
|
case SCAN_JUSTCHECK:
|
|
|
|
nextstate = SCAN_LNK;
|
|
|
|
return 1;
|
|
|
|
case SCAN_JUSTCHECKTHIS:
|
|
|
|
nextstate = SCAN_DONE;
|
|
|
|
return 1;
|
|
|
|
case SCAN_LNK:
|
|
|
|
case SCAN_APPENDLNK:
|
|
|
|
nextstate = SCAN_DONE;
|
2013-04-03 19:20:36 +08:00
|
|
|
if (namelen + (*eopath ? 8 : 4) > NAME_MAX)
|
|
|
|
{
|
|
|
|
*eopath = '\0';
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
strcat (eopath, ".lnk");
|
2008-05-23 19:00:35 +08:00
|
|
|
return 1;
|
|
|
|
default:
|
|
|
|
*eopath = '\0';
|
2008-05-23 15:13:47 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
while (suffixes && suffixes->name)
|
2013-04-03 19:20:36 +08:00
|
|
|
if (nextstate == SCAN_EXTRALNK
|
|
|
|
&& (!suffixes->addon || namelen > NAME_MAX - 8))
|
2008-05-23 19:00:35 +08:00
|
|
|
suffixes++;
|
|
|
|
else
|
2008-05-23 15:13:47 +08:00
|
|
|
{
|
2008-05-23 19:00:35 +08:00
|
|
|
strcpy (eopath, suffixes->name);
|
|
|
|
if (nextstate == SCAN_EXTRALNK)
|
|
|
|
strcat (eopath, ".lnk");
|
|
|
|
suffixes++;
|
|
|
|
return 1;
|
2008-05-23 15:13:47 +08:00
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
suffixes = NULL;
|
|
|
|
}
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
bool
|
|
|
|
symlink_info::set_error (int in_errno)
|
|
|
|
{
|
|
|
|
bool res;
|
|
|
|
if (!(pflags & PATH_NO_ACCESS_CHECK) || in_errno == ENAMETOOLONG || in_errno == EIO)
|
|
|
|
{
|
|
|
|
error = in_errno;
|
|
|
|
res = true;
|
|
|
|
}
|
|
|
|
else if (in_errno == ENOENT)
|
|
|
|
res = true;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
fileattr = FILE_ATTRIBUTE_NORMAL;
|
|
|
|
res = false;
|
|
|
|
}
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
symlink_info::parse_device (const char *contents)
|
|
|
|
{
|
|
|
|
char *endptr;
|
|
|
|
_major_t mymajor;
|
|
|
|
_major_t myminor;
|
|
|
|
_mode_t mymode;
|
|
|
|
|
|
|
|
mymajor = strtol (contents += 2, &endptr, 16);
|
|
|
|
if (endptr == contents)
|
|
|
|
return isdevice = false;
|
|
|
|
|
|
|
|
contents = endptr;
|
|
|
|
myminor = strtol (++contents, &endptr, 16);
|
|
|
|
if (endptr == contents)
|
|
|
|
return isdevice = false;
|
|
|
|
|
|
|
|
contents = endptr;
|
|
|
|
mymode = strtol (++contents, &endptr, 16);
|
|
|
|
if (endptr == contents)
|
|
|
|
return isdevice = false;
|
|
|
|
|
|
|
|
if ((mymode & S_IFMT) == S_IFIFO)
|
|
|
|
{
|
|
|
|
mymajor = _major (FH_FIFO);
|
|
|
|
myminor = _minor (FH_FIFO);
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
major = mymajor;
|
|
|
|
minor = myminor;
|
|
|
|
mode = mymode;
|
|
|
|
return isdevice = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if PATH is a symlink. PATH must be a valid Win32 path name.
|
|
|
|
|
|
|
|
If PATH is a symlink, put the value of the symlink--the file to
|
|
|
|
which it points--into BUF. The value stored in BUF is not
|
|
|
|
necessarily null terminated. BUFLEN is the length of BUF; only up
|
|
|
|
to BUFLEN characters will be stored in BUF. BUF may be NULL, in
|
|
|
|
which case nothing will be stored.
|
|
|
|
|
|
|
|
Set *SYML if PATH is a symlink.
|
|
|
|
|
|
|
|
Set *EXEC if PATH appears to be executable. This is an efficiency
|
|
|
|
hack because we sometimes have to open the file anyhow. *EXEC will
|
|
|
|
not be set for every executable file.
|
|
|
|
|
|
|
|
Return -1 on error, 0 if PATH is not a symlink, or the length
|
|
|
|
stored into BUF if PATH is a symlink. */
|
|
|
|
|
|
|
|
int
|
2010-06-15 20:05:15 +08:00
|
|
|
symlink_info::check (char *path, const suffix_info *suffixes, fs_info &fs,
|
|
|
|
path_conv_handle &conv_hdl)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2010-04-23 01:33:28 +08:00
|
|
|
int res;
|
|
|
|
HANDLE h;
|
|
|
|
NTSTATUS status;
|
|
|
|
UNICODE_STRING upath;
|
|
|
|
OBJECT_ATTRIBUTES attr;
|
|
|
|
IO_STATUS_BLOCK io;
|
2008-05-23 19:00:35 +08:00
|
|
|
suffix_scan suffix;
|
|
|
|
|
2010-04-23 19:07:35 +08:00
|
|
|
const ULONG ci_flag = cygwin_shared->obcaseinsensitive
|
|
|
|
|| (pflags & PATH_NOPOSIX) ? OBJ_CASE_INSENSITIVE : 0;
|
2008-05-23 19:00:35 +08:00
|
|
|
/* TODO: Temporarily do all char->UNICODE conversion here. This should
|
|
|
|
already be slightly faster than using Ascii functions. */
|
|
|
|
tmp_pathbuf tp;
|
|
|
|
tp.u_get (&upath);
|
2008-07-17 04:20:45 +08:00
|
|
|
InitializeObjectAttributes (&attr, &upath, ci_flag, NULL, NULL);
|
2008-05-23 19:00:35 +08:00
|
|
|
|
2010-04-23 01:33:28 +08:00
|
|
|
/* This label is used in case we encounter a FS which only handles
|
|
|
|
DOS paths. See below. */
|
2010-04-23 01:42:18 +08:00
|
|
|
bool restarted = false;
|
2010-04-23 01:33:28 +08:00
|
|
|
restart:
|
|
|
|
|
|
|
|
h = NULL;
|
|
|
|
res = 0;
|
|
|
|
contents[0] = '\0';
|
|
|
|
issymlink = true;
|
|
|
|
isdevice = false;
|
|
|
|
major = 0;
|
|
|
|
minor = 0;
|
|
|
|
mode = 0;
|
|
|
|
pflags &= ~(PATH_SYMLINK | PATH_LNK | PATH_REP);
|
|
|
|
|
2008-05-24 01:22:18 +08:00
|
|
|
PVOID eabuf = &nfs_aol_ffei;
|
2008-05-23 19:00:35 +08:00
|
|
|
ULONG easize = sizeof nfs_aol_ffei;
|
|
|
|
|
2013-04-03 19:20:36 +08:00
|
|
|
ext_here = suffix.has (path, suffixes);
|
|
|
|
extn = ext_here - path;
|
2010-03-30 01:15:51 +08:00
|
|
|
bool had_ext = !!*ext_here;
|
2013-04-03 19:20:36 +08:00
|
|
|
|
|
|
|
/* If the filename is too long, don't even try. */
|
|
|
|
if (suffix.name_len () > NAME_MAX)
|
|
|
|
{
|
|
|
|
set_error (ENAMETOOLONG);
|
|
|
|
goto file_not_symlink;
|
|
|
|
}
|
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
while (suffix.next ())
|
|
|
|
{
|
|
|
|
error = 0;
|
2010-04-29 18:38:05 +08:00
|
|
|
get_nt_native_path (suffix.path, upath, pflags & PATH_DOS);
|
2008-05-23 19:00:35 +08:00
|
|
|
if (h)
|
|
|
|
{
|
|
|
|
NtClose (h);
|
|
|
|
h = NULL;
|
|
|
|
}
|
|
|
|
/* The EA given to NtCreateFile allows to get a handle to a symlink on
|
|
|
|
an NFS share, rather than getting a handle to the target of the
|
|
|
|
symlink (which would spoil the task of this method quite a bit).
|
|
|
|
Fortunately it's ignored on most other file systems so we don't have
|
|
|
|
to special case NFS too much. */
|
2010-10-07 22:03:26 +08:00
|
|
|
status = NtCreateFile (&h,
|
|
|
|
READ_CONTROL | FILE_READ_ATTRIBUTES | FILE_READ_EA,
|
|
|
|
&attr, &io, NULL, 0, FILE_SHARE_VALID_FLAGS,
|
|
|
|
FILE_OPEN,
|
2008-05-23 19:00:35 +08:00
|
|
|
FILE_OPEN_REPARSE_POINT
|
|
|
|
| FILE_OPEN_FOR_BACKUP_INTENT,
|
|
|
|
eabuf, easize);
|
2013-04-23 17:44:36 +08:00
|
|
|
debug_printf ("%y = NtCreateFile (%S)", status, &upath);
|
2008-05-23 19:00:35 +08:00
|
|
|
/* No right to access EAs or EAs not supported? */
|
2010-01-29 19:20:06 +08:00
|
|
|
if (!NT_SUCCESS (status)
|
|
|
|
&& (status == STATUS_ACCESS_DENIED
|
|
|
|
|| status == STATUS_EAS_NOT_SUPPORTED
|
|
|
|
|| status == STATUS_NOT_SUPPORTED
|
|
|
|
|| status == STATUS_INVALID_NETWORK_RESPONSE
|
|
|
|
/* Or a bug in Samba 3.2.x (x <= 7) when accessing a share's
|
|
|
|
root dir which has EAs enabled? */
|
|
|
|
|| status == STATUS_INVALID_PARAMETER))
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
/* If EAs are not supported, there's no sense to check them again
|
2009-07-22 23:55:47 +08:00
|
|
|
with suffixes attached. So we set eabuf/easize to 0 here once. */
|
2009-07-23 02:21:09 +08:00
|
|
|
if (status == STATUS_EAS_NOT_SUPPORTED
|
|
|
|
|| status == STATUS_NOT_SUPPORTED)
|
2005-06-07 00:58:39 +08:00
|
|
|
{
|
2008-05-23 19:00:35 +08:00
|
|
|
eabuf = NULL;
|
|
|
|
easize = 0;
|
2007-08-23 15:43:24 +08:00
|
|
|
}
|
2010-10-07 22:03:26 +08:00
|
|
|
status = NtOpenFile (&h, READ_CONTROL | FILE_READ_ATTRIBUTES,
|
|
|
|
&attr, &io, FILE_SHARE_VALID_FLAGS,
|
2008-08-15 18:19:12 +08:00
|
|
|
FILE_OPEN_REPARSE_POINT
|
|
|
|
| FILE_OPEN_FOR_BACKUP_INTENT);
|
2013-04-23 17:44:36 +08:00
|
|
|
debug_printf ("%y = NtOpenFile (no-EAs %S)", status, &upath);
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2010-04-23 01:33:28 +08:00
|
|
|
if (status == STATUS_OBJECT_NAME_NOT_FOUND)
|
|
|
|
{
|
2010-04-23 19:07:35 +08:00
|
|
|
if (ci_flag == 0 && wincap.has_broken_udf ()
|
2010-04-26 21:48:04 +08:00
|
|
|
&& (!fs.inited () || fs.is_udf ()))
|
2009-01-30 04:32:08 +08:00
|
|
|
{
|
2010-04-23 01:33:28 +08:00
|
|
|
/* On NT 5.x UDF is broken (at least) in terms of case
|
|
|
|
sensitivity. When trying to open a file case sensitive,
|
|
|
|
the file appears to be non-existant. Another bug is
|
|
|
|
described in fs_info::update. */
|
|
|
|
attr.Attributes = OBJ_CASE_INSENSITIVE;
|
|
|
|
status = NtOpenFile (&h, READ_CONTROL | FILE_READ_ATTRIBUTES,
|
|
|
|
&attr, &io, FILE_SHARE_VALID_FLAGS,
|
|
|
|
FILE_OPEN_REPARSE_POINT
|
|
|
|
| FILE_OPEN_FOR_BACKUP_INTENT);
|
2013-04-23 17:44:36 +08:00
|
|
|
debug_printf ("%y = NtOpenFile (broken-UDF, %S)", status, &upath);
|
2010-04-23 01:33:28 +08:00
|
|
|
attr.Attributes = 0;
|
|
|
|
if (NT_SUCCESS (status))
|
|
|
|
{
|
2010-04-26 21:48:04 +08:00
|
|
|
if (!fs.inited ())
|
|
|
|
fs.update (&upath, h);
|
2010-04-23 19:07:35 +08:00
|
|
|
if (!fs.is_udf ())
|
2010-04-23 01:33:28 +08:00
|
|
|
{
|
|
|
|
NtClose (h);
|
2010-06-08 23:25:09 +08:00
|
|
|
h = NULL;
|
2010-04-23 01:33:28 +08:00
|
|
|
status = STATUS_OBJECT_NAME_NOT_FOUND;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* There are filesystems out in the wild (Netapp, NWFS, and others)
|
|
|
|
which are uncapable of generating pathnames outside the Win32
|
|
|
|
rules. That means, filenames on these FSes must not have a
|
|
|
|
leading space or trailing dots and spaces. This code snippet
|
|
|
|
manages them. I really hope it's streamlined enough not to
|
|
|
|
slow down normal operation. This extra check only kicks in if
|
|
|
|
we encountered a STATUS_OBJECT_NAME_NOT_FOUND *and* we didn't
|
|
|
|
already attach a suffix *and* the above special case for UDF
|
|
|
|
on XP didn't succeeed. */
|
2010-04-29 18:38:05 +08:00
|
|
|
if (!restarted && !*ext_here && !(pflags & PATH_DOS) && !fs.inited ())
|
2010-04-23 01:33:28 +08:00
|
|
|
{
|
2010-04-26 21:48:04 +08:00
|
|
|
/* Check for trailing dot or space or leading space in
|
2011-06-06 13:02:13 +08:00
|
|
|
last component. */
|
2010-04-26 21:48:04 +08:00
|
|
|
char *p = ext_here - 1;
|
|
|
|
if (*p != '.' && *p != ' ')
|
|
|
|
{
|
|
|
|
while (*--p != '\\')
|
|
|
|
;
|
|
|
|
if (*++p != ' ')
|
|
|
|
p = NULL;
|
|
|
|
}
|
|
|
|
if (p)
|
2010-04-23 01:33:28 +08:00
|
|
|
{
|
2010-04-26 21:48:04 +08:00
|
|
|
/* If so, check if file resides on one of the known broken
|
|
|
|
FSes only supporting filenames following DOS rules. */
|
|
|
|
if (!fs.inited ())
|
|
|
|
fs.update (&upath, NULL);
|
2010-04-23 19:07:35 +08:00
|
|
|
if (fs.has_dos_filenames_only ())
|
|
|
|
{
|
2010-04-26 21:48:04 +08:00
|
|
|
/* If so, try again. Since we now know the FS, the
|
2011-06-06 13:02:13 +08:00
|
|
|
filenames will be tweaked to follow DOS rules via the
|
2010-04-26 21:48:04 +08:00
|
|
|
third parameter in the call to get_nt_native_path. */
|
2010-04-29 18:38:05 +08:00
|
|
|
pflags |= PATH_DOS;
|
2010-04-23 19:07:35 +08:00
|
|
|
restarted = true;
|
|
|
|
goto restart;
|
|
|
|
}
|
2009-01-30 04:32:08 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-04-23 17:44:36 +08:00
|
|
|
else if (status == STATUS_NETWORK_OPEN_RESTRICTION
|
|
|
|
|| status == STATUS_SYMLINK_CLASS_DISABLED)
|
|
|
|
{
|
|
|
|
/* These status codes are returned if you try to open a native
|
|
|
|
symlink and the usage of this kind of symlink is forbidden
|
|
|
|
(see fsutil). Since we can't open them at all, not even for
|
|
|
|
stat purposes, we have to return a POSIX error code which is
|
|
|
|
at least a bit helpful.
|
|
|
|
|
|
|
|
Additionally Windows 8 introduces a bug in NFS: If you have
|
|
|
|
a symlink to a directory, with symlinks underneath, resolving
|
|
|
|
the second level of symlinks fails if remote->remote symlinks
|
|
|
|
are disabled in fsutil. Unfortunately that's the default. */
|
|
|
|
set_error (ELOOP);
|
|
|
|
break;
|
|
|
|
}
|
2010-01-12 22:47:46 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (NT_SUCCESS (status)
|
2010-01-29 19:20:06 +08:00
|
|
|
/* Check file system while we're having the file open anyway.
|
|
|
|
This speeds up path_conv noticably (~10%). */
|
2010-09-13 19:17:36 +08:00
|
|
|
&& (fs.inited () || fs.update (&upath, h)))
|
|
|
|
{
|
|
|
|
if (fs.is_nfs ())
|
|
|
|
{
|
2010-10-03 03:03:44 +08:00
|
|
|
status = nfs_fetch_fattr3 (h, conv_hdl.nfsattr ());
|
2010-09-13 19:17:36 +08:00
|
|
|
if (NT_SUCCESS (status))
|
2010-10-03 03:03:44 +08:00
|
|
|
fileattr = ((conv_hdl.nfsattr ()->type & 7) == NF3DIR)
|
|
|
|
? FILE_ATTRIBUTE_DIRECTORY : 0;
|
2010-09-13 19:17:36 +08:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2011-12-13 19:54:28 +08:00
|
|
|
status = file_get_fnoi (h, fs.is_netapp (), conv_hdl.fnoi ());
|
2010-09-13 19:17:36 +08:00
|
|
|
if (NT_SUCCESS (status))
|
2011-12-13 19:54:28 +08:00
|
|
|
fileattr = conv_hdl.fnoi ()->FileAttributes;
|
2010-09-13 19:17:36 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!NT_SUCCESS (status))
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2013-04-23 17:44:36 +08:00
|
|
|
debug_printf ("%y = NtQueryInformationFile (%S)", status, &upath);
|
2008-05-23 19:00:35 +08:00
|
|
|
fileattr = INVALID_FILE_ATTRIBUTES;
|
|
|
|
|
|
|
|
/* One of the inner path components is invalid, or the path contains
|
|
|
|
invalid characters. Bail out with ENOENT.
|
|
|
|
|
|
|
|
Note that additional STATUS_OBJECT_PATH_INVALID and
|
|
|
|
STATUS_OBJECT_PATH_SYNTAX_BAD status codes exist. The first one
|
2010-01-12 18:14:59 +08:00
|
|
|
is seemingly not generated by NtQueryInformationFile, the latter
|
2008-05-23 19:00:35 +08:00
|
|
|
is only generated if the path is no absolute path within the
|
|
|
|
NT name space, which should not happen and would point to an
|
|
|
|
error in get_nt_native_path. Both status codes are deliberately
|
|
|
|
not tested here unless proved necessary. */
|
|
|
|
if (status == STATUS_OBJECT_PATH_NOT_FOUND
|
2009-06-08 23:22:52 +08:00
|
|
|
|| status == STATUS_OBJECT_NAME_INVALID
|
2010-06-02 22:52:34 +08:00
|
|
|
|| status == STATUS_BAD_NETWORK_PATH
|
|
|
|
|| status == STATUS_BAD_NETWORK_NAME
|
2009-06-08 23:22:52 +08:00
|
|
|
|| status == STATUS_NO_MEDIA_IN_DEVICE)
|
2007-08-23 15:43:24 +08:00
|
|
|
{
|
2008-05-23 19:00:35 +08:00
|
|
|
set_error (ENOENT);
|
|
|
|
goto file_not_symlink;
|
2005-06-07 00:58:39 +08:00
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
if (status != STATUS_OBJECT_NAME_NOT_FOUND
|
|
|
|
&& status != STATUS_NO_SUCH_FILE) /* ENOENT on NFS or 9x share */
|
2008-05-23 15:13:47 +08:00
|
|
|
{
|
2008-05-23 19:00:35 +08:00
|
|
|
/* The file exists, but the user can't access it for one reason
|
|
|
|
or the other. To get the file attributes we try to access the
|
|
|
|
information by opening the parent directory and getting the
|
|
|
|
file attributes using a matching NtQueryDirectoryFile call. */
|
|
|
|
UNICODE_STRING dirname, basename;
|
|
|
|
OBJECT_ATTRIBUTES dattr;
|
|
|
|
HANDLE dir;
|
|
|
|
struct {
|
2013-04-23 17:44:36 +08:00
|
|
|
FILE_BOTH_DIR_INFORMATION fdi;
|
2008-05-23 19:00:35 +08:00
|
|
|
WCHAR dummy_buf[NAME_MAX + 1];
|
|
|
|
} fdi_buf;
|
|
|
|
|
|
|
|
RtlSplitUnicodePath (&upath, &dirname, &basename);
|
2008-07-17 04:20:45 +08:00
|
|
|
InitializeObjectAttributes (&dattr, &dirname, ci_flag,
|
|
|
|
NULL, NULL);
|
2008-05-23 19:00:35 +08:00
|
|
|
status = NtOpenFile (&dir, SYNCHRONIZE | FILE_LIST_DIRECTORY,
|
|
|
|
&dattr, &io, FILE_SHARE_VALID_FLAGS,
|
|
|
|
FILE_SYNCHRONOUS_IO_NONALERT
|
|
|
|
| FILE_OPEN_FOR_BACKUP_INTENT
|
|
|
|
| FILE_DIRECTORY_FILE);
|
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
2013-04-23 17:44:36 +08:00
|
|
|
debug_printf ("%y = NtOpenFile(%S)", status, &dirname);
|
2009-12-24 20:53:43 +08:00
|
|
|
/* There's a special case if the file is itself the root
|
|
|
|
of a drive which is not accessible by the current user.
|
|
|
|
This case is only recognized by the length of the
|
|
|
|
basename part. If it's 0, the incoming file is the
|
|
|
|
root of a drive. So we at least know it's a directory. */
|
|
|
|
fileattr = basename.Length ? 0 : FILE_ATTRIBUTE_DIRECTORY;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2008-12-18 23:37:19 +08:00
|
|
|
status = NtQueryDirectoryFile (dir, NULL, NULL, NULL, &io,
|
2008-05-23 19:00:35 +08:00
|
|
|
&fdi_buf, sizeof fdi_buf,
|
2010-01-29 19:20:06 +08:00
|
|
|
FileBothDirectoryInformation,
|
2008-05-23 19:00:35 +08:00
|
|
|
TRUE, &basename, TRUE);
|
2009-03-13 06:03:28 +08:00
|
|
|
/* Take the opportunity to check file system while we're
|
|
|
|
having the handle to the parent dir. */
|
2010-06-08 23:25:09 +08:00
|
|
|
fs.update (&upath, dir);
|
2008-05-23 19:00:35 +08:00
|
|
|
NtClose (dir);
|
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
2013-04-23 17:44:36 +08:00
|
|
|
debug_printf ("%y = NtQueryDirectoryFile(%S)",
|
2008-05-23 19:00:35 +08:00
|
|
|
status, &dirname);
|
2008-07-31 22:48:28 +08:00
|
|
|
if (status == STATUS_NO_SUCH_FILE)
|
|
|
|
{
|
|
|
|
/* This can happen when trying to access files
|
|
|
|
which match DOS device names on SMB shares.
|
|
|
|
NtOpenFile failed with STATUS_ACCESS_DENIED,
|
|
|
|
but the NtQueryDirectoryFile tells us the
|
|
|
|
file doesn't exist. We're suspicious in this
|
|
|
|
case and retry with the next suffix instead of
|
|
|
|
just giving up. */
|
|
|
|
set_error (ENOENT);
|
|
|
|
continue;
|
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
fileattr = 0;
|
|
|
|
}
|
|
|
|
else
|
2010-09-13 19:17:36 +08:00
|
|
|
{
|
2010-09-30 21:52:34 +08:00
|
|
|
PFILE_NETWORK_OPEN_INFORMATION pfnoi = conv_hdl.fnoi ();
|
|
|
|
|
2010-09-13 19:17:36 +08:00
|
|
|
fileattr = fdi_buf.fdi.FileAttributes;
|
|
|
|
memcpy (pfnoi, &fdi_buf.fdi.CreationTime, sizeof *pfnoi);
|
2010-09-14 22:10:39 +08:00
|
|
|
/* Amazing, but true: The FILE_NETWORK_OPEN_INFORMATION
|
2011-06-06 13:02:13 +08:00
|
|
|
structure has the AllocationSize and EndOfFile members
|
2010-09-14 22:10:39 +08:00
|
|
|
interchanged relative to the directory information
|
|
|
|
classes. */
|
|
|
|
pfnoi->AllocationSize.QuadPart
|
|
|
|
= fdi_buf.fdi.AllocationSize.QuadPart;
|
|
|
|
pfnoi->EndOfFile.QuadPart
|
|
|
|
= fdi_buf.fdi.EndOfFile.QuadPart;
|
2010-09-13 19:17:36 +08:00
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
ext_tacked_on = !!*ext_here;
|
2008-05-23 15:13:47 +08:00
|
|
|
goto file_not_symlink;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
set_error (ENOENT);
|
|
|
|
continue;
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
ext_tacked_on = !!*ext_here;
|
2010-03-30 01:15:51 +08:00
|
|
|
/* Don't allow to returns directories with appended suffix. If we found
|
2011-06-06 13:02:13 +08:00
|
|
|
a directory with a suffix which has been appended here, then this
|
2010-03-30 01:15:51 +08:00
|
|
|
directory doesn't match the request. So, just do as usual if file
|
|
|
|
hasn't been found. */
|
|
|
|
if (ext_tacked_on && !had_ext && (fileattr & FILE_ATTRIBUTE_DIRECTORY))
|
|
|
|
{
|
|
|
|
set_error (ENOENT);
|
|
|
|
continue;
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
|
|
|
res = -1;
|
|
|
|
|
2010-10-07 22:03:26 +08:00
|
|
|
/* Reparse points are potentially symlinks. This check must be
|
|
|
|
performed before checking the SYSTEM attribute for sysfile
|
|
|
|
symlinks, since reparse points can have this flag set, too.
|
|
|
|
For instance, Vista starts to create a couple of reparse points
|
|
|
|
with SYSTEM and HIDDEN flags set. */
|
|
|
|
if ((fileattr & FILE_ATTRIBUTE_REPARSE_POINT))
|
|
|
|
{
|
2011-12-24 21:11:34 +08:00
|
|
|
res = check_reparse_point (h, fs.is_remote_drive ());
|
2013-04-12 16:30:47 +08:00
|
|
|
if (res > 0)
|
2010-10-07 22:03:26 +08:00
|
|
|
{
|
2013-04-12 16:30:47 +08:00
|
|
|
/* A symlink is never a directory. */
|
|
|
|
conv_hdl.fnoi ()->FileAttributes &= ~FILE_ATTRIBUTE_DIRECTORY;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Volume moint point or unrecognized reparse point type.
|
|
|
|
Make sure the open handle is not used in later stat calls.
|
|
|
|
The handle has been opened with the FILE_OPEN_REPARSE_POINT
|
|
|
|
flag, so it's a handle to the reparse point, not a handle
|
|
|
|
to the volumes root dir. */
|
|
|
|
pflags &= ~PC_KEEP_HANDLE;
|
|
|
|
/* Volume mount point: The filesystem information for the top
|
2010-10-07 22:03:26 +08:00
|
|
|
level directory should be for the volume top level directory,
|
|
|
|
rather than for the reparse point itself. So we fetch the
|
|
|
|
filesystem information again, but with a NULL handle.
|
|
|
|
This does what we want because fs_info::update opens the
|
|
|
|
handle without FILE_OPEN_REPARSE_POINT. */
|
2013-04-12 16:30:47 +08:00
|
|
|
if (res == -1)
|
|
|
|
fs.update (&upath, NULL);
|
2010-10-07 22:03:26 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Windows shortcuts are potentially treated as symlinks. Valid Cygwin
|
|
|
|
& U/WIN shortcuts are R/O, but definitely not directories. */
|
2010-10-07 22:03:26 +08:00
|
|
|
else if ((fileattr & (FILE_ATTRIBUTE_READONLY | FILE_ATTRIBUTE_DIRECTORY))
|
2008-05-23 19:00:35 +08:00
|
|
|
== FILE_ATTRIBUTE_READONLY && suffix.lnk_match ())
|
|
|
|
{
|
2010-10-07 22:03:26 +08:00
|
|
|
HANDLE sym_h;
|
|
|
|
|
|
|
|
status = NtOpenFile (&sym_h, SYNCHRONIZE | GENERIC_READ, &attr, &io,
|
|
|
|
FILE_SHARE_VALID_FLAGS,
|
|
|
|
FILE_OPEN_FOR_BACKUP_INTENT
|
|
|
|
| FILE_SYNCHRONOUS_IO_NONALERT);
|
|
|
|
if (!NT_SUCCESS (status))
|
2010-06-15 20:05:15 +08:00
|
|
|
res = 0;
|
|
|
|
else
|
2010-10-07 22:03:26 +08:00
|
|
|
{
|
|
|
|
res = check_shortcut (sym_h);
|
|
|
|
NtClose (sym_h);
|
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
if (!res)
|
|
|
|
{
|
2010-10-07 22:03:26 +08:00
|
|
|
/* If searching for `foo' and then finding a `foo.lnk' which
|
|
|
|
is no shortcut, return the same as if file not found. */
|
2008-12-18 23:37:19 +08:00
|
|
|
if (ext_tacked_on)
|
|
|
|
{
|
|
|
|
fileattr = INVALID_FILE_ATTRIBUTES;
|
|
|
|
set_error (ENOENT);
|
|
|
|
continue;
|
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2008-12-18 23:37:19 +08:00
|
|
|
else if (contents[0] != ':' || contents[1] != '\\'
|
|
|
|
|| !parse_device (contents))
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If searching for `foo' and then finding a `foo.lnk' which is
|
|
|
|
no shortcut, return the same as if file not found. */
|
|
|
|
else if (suffix.lnk_match () && ext_tacked_on)
|
2011-06-06 13:02:13 +08:00
|
|
|
{
|
2008-12-18 23:37:19 +08:00
|
|
|
fileattr = INVALID_FILE_ATTRIBUTES;
|
|
|
|
set_error (ENOENT);
|
|
|
|
continue;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2008-05-20 23:11:23 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* This is the old Cygwin method creating symlinks. A symlink will
|
|
|
|
have the `system' file attribute. Only files can be symlinks
|
|
|
|
(which can be symlinks to directories). */
|
|
|
|
else if ((fileattr & (FILE_ATTRIBUTE_SYSTEM | FILE_ATTRIBUTE_DIRECTORY))
|
|
|
|
== FILE_ATTRIBUTE_SYSTEM)
|
|
|
|
{
|
2010-10-07 22:03:26 +08:00
|
|
|
HANDLE sym_h;
|
|
|
|
|
|
|
|
status = NtOpenFile (&sym_h, SYNCHRONIZE | GENERIC_READ, &attr, &io,
|
|
|
|
FILE_SHARE_VALID_FLAGS,
|
|
|
|
FILE_OPEN_FOR_BACKUP_INTENT
|
|
|
|
| FILE_SYNCHRONOUS_IO_NONALERT);
|
|
|
|
|
|
|
|
if (!NT_SUCCESS (status))
|
2010-06-15 20:05:15 +08:00
|
|
|
res = 0;
|
|
|
|
else
|
2010-10-07 22:03:26 +08:00
|
|
|
{
|
|
|
|
res = check_sysfile (sym_h);
|
|
|
|
NtClose (sym_h);
|
|
|
|
}
|
2008-12-18 23:37:19 +08:00
|
|
|
if (res)
|
|
|
|
break;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2008-05-20 23:11:23 +08:00
|
|
|
|
2010-06-15 20:05:15 +08:00
|
|
|
/* If the file is on an NFS share and could be opened with extended
|
|
|
|
attributes, check if it's a symlink. Only files can be symlinks
|
2008-05-23 19:00:35 +08:00
|
|
|
(which can be symlinks to directories). */
|
2010-09-30 21:52:34 +08:00
|
|
|
else if (fs.is_nfs () && (conv_hdl.nfsattr ()->type & 7) == NF3LNK)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2010-09-30 18:42:34 +08:00
|
|
|
res = check_nfs_symlink (h);
|
2008-12-18 23:37:19 +08:00
|
|
|
if (res)
|
|
|
|
break;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-12-18 23:37:19 +08:00
|
|
|
/* Normal file. */
|
2008-05-23 19:00:35 +08:00
|
|
|
file_not_symlink:
|
|
|
|
issymlink = false;
|
|
|
|
syscall_printf ("%s", isdevice ? "is a device" : "not a symlink");
|
|
|
|
res = 0;
|
|
|
|
break;
|
|
|
|
}
|
2001-04-13 05:21:37 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (h)
|
2010-06-15 20:05:15 +08:00
|
|
|
{
|
|
|
|
if (pflags & PC_KEEP_HANDLE)
|
2010-10-07 22:03:26 +08:00
|
|
|
conv_hdl.set (h);
|
2010-06-15 20:05:15 +08:00
|
|
|
else
|
|
|
|
NtClose (h);
|
|
|
|
}
|
2001-04-17 19:47:37 +08:00
|
|
|
|
2013-04-23 17:44:36 +08:00
|
|
|
syscall_printf ("%d = symlink.check(%s, %p) (%y)",
|
2008-05-23 19:00:35 +08:00
|
|
|
res, suffix.path, contents, pflags);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* "path" is the path in a virtual symlink. Set a symlink_info struct from
|
|
|
|
that and proceed with further path checking afterwards. */
|
|
|
|
int
|
|
|
|
symlink_info::set (char *path)
|
|
|
|
{
|
|
|
|
strcpy (contents, path);
|
|
|
|
pflags = PATH_SYMLINK;
|
|
|
|
fileattr = FILE_ATTRIBUTE_NORMAL;
|
|
|
|
error = 0;
|
|
|
|
issymlink = true;
|
|
|
|
isdevice = false;
|
2008-07-17 04:20:45 +08:00
|
|
|
ext_tacked_on = false;
|
2008-05-23 19:00:35 +08:00
|
|
|
ext_here = NULL;
|
|
|
|
extn = major = minor = mode = 0;
|
|
|
|
return strlen (path);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* readlink system call */
|
2000-04-14 06:43:48 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
extern "C" ssize_t
|
|
|
|
readlink (const char *path, char *buf, size_t buflen)
|
|
|
|
{
|
|
|
|
if (buflen < 0)
|
|
|
|
{
|
|
|
|
set_errno (ENAMETOOLONG);
|
|
|
|
return -1;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
path_conv pathbuf (path, PC_SYM_CONTENTS, stat_suffixes);
|
2000-11-01 07:01:21 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (pathbuf.error)
|
|
|
|
{
|
|
|
|
set_errno (pathbuf.error);
|
2013-04-23 17:44:36 +08:00
|
|
|
syscall_printf ("-1 = readlink (%s, %p, %lu)", path, buf, buflen);
|
2008-05-23 19:00:35 +08:00
|
|
|
return -1;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (!pathbuf.exists ())
|
|
|
|
{
|
|
|
|
set_errno (ENOENT);
|
|
|
|
return -1;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (!pathbuf.issymlink ())
|
|
|
|
{
|
|
|
|
if (pathbuf.exists ())
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2012-03-08 22:56:18 +08:00
|
|
|
size_t pathbuf_len = strlen (pathbuf.get_win32 ());
|
|
|
|
ssize_t len = MIN (buflen, pathbuf_len);
|
2008-05-23 19:00:35 +08:00
|
|
|
memcpy (buf, pathbuf.get_win32 (), len);
|
|
|
|
|
|
|
|
/* errno set by symlink.check if error */
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Some programs rely on st_dev/st_ino being unique for each file.
|
|
|
|
Hash the path name and hope for the best. The hash arg is not
|
|
|
|
always initialized to zero since readdir needs to compute the
|
|
|
|
dirent ino_t based on a combination of the hash of the directory
|
|
|
|
done during the opendir call and the hash or the filename within
|
|
|
|
the directory. FIXME: Not bullet-proof. */
|
|
|
|
/* Cygwin internal */
|
2013-05-01 09:20:37 +08:00
|
|
|
ino_t __reg2
|
2013-04-23 17:44:36 +08:00
|
|
|
hash_path_name (ino_t hash, PUNICODE_STRING name)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
if (name->Length == 0)
|
|
|
|
return hash;
|
|
|
|
|
|
|
|
/* Build up hash. Name is already normalized */
|
|
|
|
USHORT len = name->Length / sizeof (WCHAR);
|
|
|
|
for (USHORT idx = 0; idx < len; ++idx)
|
|
|
|
hash = RtlUpcaseUnicodeChar (name->Buffer[idx])
|
|
|
|
+ (hash << 6) + (hash << 16) - hash;
|
|
|
|
return hash;
|
|
|
|
}
|
|
|
|
|
2013-05-01 09:20:37 +08:00
|
|
|
ino_t __reg2
|
2013-04-23 17:44:36 +08:00
|
|
|
hash_path_name (ino_t hash, PCWSTR name)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
UNICODE_STRING uname;
|
|
|
|
RtlInitUnicodeString (&uname, name);
|
|
|
|
return hash_path_name (hash, &uname);
|
|
|
|
}
|
|
|
|
|
2013-05-01 09:20:37 +08:00
|
|
|
ino_t __reg2
|
2013-04-23 17:44:36 +08:00
|
|
|
hash_path_name (ino_t hash, const char *name)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
UNICODE_STRING uname;
|
|
|
|
RtlCreateUnicodeStringFromAsciiz (&uname, name);
|
2013-04-23 17:44:36 +08:00
|
|
|
ino_t ret = hash_path_name (hash, &uname);
|
2008-05-23 19:00:35 +08:00
|
|
|
RtlFreeUnicodeString (&uname);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" char *
|
|
|
|
getcwd (char *buf, size_t ulen)
|
|
|
|
{
|
|
|
|
char* res = NULL;
|
|
|
|
myfault efault;
|
|
|
|
if (efault.faulted (EFAULT))
|
|
|
|
/* errno set */;
|
|
|
|
else if (ulen == 0 && buf)
|
2001-09-16 22:26:11 +08:00
|
|
|
set_errno (EINVAL);
|
2008-05-23 19:00:35 +08:00
|
|
|
else
|
|
|
|
res = cygheap->cwd.get (buf, 1, 1, ulen);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* getwd: Legacy. */
|
|
|
|
extern "C" char *
|
|
|
|
getwd (char *buf)
|
|
|
|
{
|
|
|
|
return getcwd (buf, PATH_MAX + 1); /*Per SuSv3!*/
|
|
|
|
}
|
|
|
|
|
2012-01-02 02:54:25 +08:00
|
|
|
extern "C" char *
|
|
|
|
get_current_dir_name (void)
|
|
|
|
{
|
2012-01-03 01:45:51 +08:00
|
|
|
const char *pwd = getenv ("PWD");
|
2012-01-02 02:54:25 +08:00
|
|
|
char *cwd = getcwd (NULL, 0);
|
2013-04-23 17:44:36 +08:00
|
|
|
struct stat pwdbuf, cwdbuf;
|
2012-01-02 02:54:25 +08:00
|
|
|
|
2012-01-03 01:45:51 +08:00
|
|
|
if (pwd && strcmp (pwd, cwd) != 0
|
|
|
|
&& stat64 (pwd, &pwdbuf) == 0
|
|
|
|
&& stat64 (cwd, &cwdbuf) == 0
|
|
|
|
&& pwdbuf.st_dev == cwdbuf.st_dev
|
|
|
|
&& pwdbuf.st_ino == cwdbuf.st_ino)
|
2012-01-02 02:54:25 +08:00
|
|
|
{
|
2012-01-03 01:45:51 +08:00
|
|
|
cwd = (char *) realloc (cwd, strlen (pwd) + 1);
|
|
|
|
strcpy (cwd, pwd);
|
2012-01-02 02:54:25 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return cwd;
|
|
|
|
}
|
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* chdir: POSIX 5.2.1.1 */
|
|
|
|
extern "C" int
|
|
|
|
chdir (const char *in_dir)
|
|
|
|
{
|
|
|
|
myfault efault;
|
|
|
|
if (efault.faulted (EFAULT))
|
2001-06-28 10:19:57 +08:00
|
|
|
return -1;
|
2008-05-23 19:00:35 +08:00
|
|
|
if (!*in_dir)
|
|
|
|
{
|
|
|
|
set_errno (ENOENT);
|
|
|
|
return -1;
|
|
|
|
}
|
2001-06-11 08:24:28 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
syscall_printf ("dir '%s'", in_dir);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Convert path. First argument ensures that we don't check for NULL/empty/invalid
|
|
|
|
again. */
|
|
|
|
path_conv path (PC_NONULLEMPTY, in_dir, PC_SYM_FOLLOW | PC_POSIX);
|
|
|
|
if (path.error)
|
|
|
|
{
|
|
|
|
set_errno (path.error);
|
|
|
|
syscall_printf ("-1 = chdir (%s)", in_dir);
|
|
|
|
return -1;
|
|
|
|
}
|
2008-03-12 20:41:50 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
int res = -1;
|
|
|
|
const char *posix_cwd = NULL;
|
2013-04-23 17:44:36 +08:00
|
|
|
dev_t devn = path.get_device ();
|
2009-06-18 17:47:13 +08:00
|
|
|
if (!path.exists ())
|
|
|
|
set_errno (ENOENT);
|
|
|
|
else if (!path.isdir ())
|
|
|
|
set_errno (ENOTDIR);
|
|
|
|
else if (!isvirtual_dev (devn))
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
/* The sequence chdir("xx"); chdir(".."); must be a noop if xx
|
|
|
|
is not a symlink. This is exploited by find.exe.
|
|
|
|
The posix_cwd is just path.normalized_path.
|
|
|
|
In other cases we let cwd.set obtain the Posix path through
|
|
|
|
the mount table. */
|
|
|
|
if (!isdrive(path.normalized_path))
|
|
|
|
posix_cwd = path.normalized_path;
|
|
|
|
res = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
posix_cwd = path.normalized_path;
|
|
|
|
res = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!res)
|
2010-08-13 19:51:54 +08:00
|
|
|
res = cygheap->cwd.set (&path, posix_cwd);
|
2008-05-23 19:00:35 +08:00
|
|
|
|
|
|
|
/* Note that we're accessing cwd.posix without a lock here. I didn't think
|
|
|
|
it was worth locking just for strace. */
|
2011-12-04 05:43:27 +08:00
|
|
|
syscall_printf ("%R = chdir() cygheap->cwd.posix '%s' native '%S'", res,
|
2009-05-13 23:00:06 +08:00
|
|
|
cygheap->cwd.get_posix (), path.get_nt_native_path ());
|
2008-05-23 19:00:35 +08:00
|
|
|
MALLOC_CHECK;
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" int
|
|
|
|
fchdir (int fd)
|
|
|
|
{
|
|
|
|
int res;
|
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
if (cfd >= 0)
|
|
|
|
res = chdir (cfd->get_name ());
|
|
|
|
else
|
|
|
|
res = -1;
|
|
|
|
|
2011-12-04 05:43:27 +08:00
|
|
|
syscall_printf ("%R = fchdir(%d)", res, fd);
|
2008-05-23 19:00:35 +08:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
/******************** Exported Path Routines *********************/
|
|
|
|
|
|
|
|
/* Cover functions to the path conversion routines.
|
|
|
|
These are exported to the world as cygwin_foo by cygwin.din. */
|
2008-03-12 20:41:50 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
#define return_with_errno(x) \
|
|
|
|
do {\
|
|
|
|
int err = (x);\
|
|
|
|
if (!err)\
|
|
|
|
return 0;\
|
|
|
|
set_errno (err);\
|
|
|
|
return -1;\
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
extern "C" ssize_t
|
|
|
|
cygwin_conv_path (cygwin_conv_path_t what, const void *from, void *to,
|
|
|
|
size_t size)
|
|
|
|
{
|
|
|
|
tmp_pathbuf tp;
|
|
|
|
myfault efault;
|
|
|
|
if (efault.faulted (EFAULT))
|
|
|
|
return -1;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
path_conv p;
|
|
|
|
size_t lsiz = 0;
|
|
|
|
char *buf = NULL;
|
2010-08-04 19:25:13 +08:00
|
|
|
PWCHAR path = NULL;
|
2008-05-23 19:00:35 +08:00
|
|
|
int error = 0;
|
|
|
|
bool relative = !!(what & CCP_RELATIVE);
|
2011-12-13 22:53:10 +08:00
|
|
|
what &= CCP_CONVTYPE_MASK;
|
2005-08-26 05:18:26 +08:00
|
|
|
|
2013-06-21 16:14:26 +08:00
|
|
|
if (!from)
|
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
switch (what)
|
|
|
|
{
|
|
|
|
case CCP_POSIX_TO_WIN_A:
|
2008-09-11 12:34:24 +08:00
|
|
|
{
|
|
|
|
p.check ((const char *) from,
|
2011-01-17 22:19:39 +08:00
|
|
|
PC_POSIX | PC_SYM_FOLLOW | PC_SYM_NOFOLLOW_REP
|
|
|
|
| PC_NO_ACCESS_CHECK | PC_NOWARN | (relative ? PC_NOFULL : 0));
|
2008-09-11 12:34:24 +08:00
|
|
|
if (p.error)
|
|
|
|
return_with_errno (p.error);
|
|
|
|
PUNICODE_STRING up = p.get_nt_native_path ();
|
|
|
|
buf = tp.c_get ();
|
2011-12-13 22:53:10 +08:00
|
|
|
sys_wcstombs (buf, NT_MAX_PATH,
|
|
|
|
up->Buffer, up->Length / sizeof (WCHAR));
|
2008-09-11 12:34:24 +08:00
|
|
|
/* Convert native path to standard DOS path. */
|
|
|
|
if (!strncmp (buf, "\\??\\", 4))
|
|
|
|
{
|
|
|
|
buf += 4;
|
|
|
|
if (buf[1] != ':') /* native UNC path */
|
|
|
|
*(buf += 2) = '\\';
|
|
|
|
}
|
2010-09-06 17:47:01 +08:00
|
|
|
else if (*buf == '\\')
|
|
|
|
{
|
2011-06-06 13:02:13 +08:00
|
|
|
/* Device name points to somewhere else in the NT namespace.
|
2010-09-06 17:47:01 +08:00
|
|
|
Use GLOBALROOT prefix to convert to Win32 path. */
|
2011-12-13 22:53:10 +08:00
|
|
|
char *p = buf + sys_wcstombs (buf, NT_MAX_PATH,
|
|
|
|
ro_u_globalroot.Buffer,
|
|
|
|
ro_u_globalroot.Length
|
|
|
|
/ sizeof (WCHAR));
|
|
|
|
sys_wcstombs (p, NT_MAX_PATH - (p - buf),
|
|
|
|
up->Buffer, up->Length / sizeof (WCHAR));
|
2010-09-06 17:47:01 +08:00
|
|
|
}
|
2008-09-11 12:34:24 +08:00
|
|
|
lsiz = strlen (buf) + 1;
|
2009-12-22 00:44:37 +08:00
|
|
|
/* TODO: Incoming "." is a special case which leads to a trailing
|
|
|
|
backslash ".\\" in the Win32 path. That's a result of the
|
|
|
|
conversion in normalize_posix_path. This should not occur
|
|
|
|
so the below code is just a band-aid. */
|
2010-08-04 19:25:13 +08:00
|
|
|
if (relative && !strcmp ((const char *) from, ".")
|
2009-12-22 00:44:37 +08:00
|
|
|
&& !strcmp (buf, ".\\"))
|
|
|
|
{
|
2010-08-04 19:25:13 +08:00
|
|
|
lsiz = 2;
|
|
|
|
buf[1] = '\0';
|
2009-12-22 00:44:37 +08:00
|
|
|
}
|
2008-09-11 12:34:24 +08:00
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
break;
|
|
|
|
case CCP_POSIX_TO_WIN_W:
|
2011-01-17 22:19:39 +08:00
|
|
|
p.check ((const char *) from,
|
|
|
|
PC_POSIX | PC_SYM_FOLLOW | PC_SYM_NOFOLLOW_REP
|
|
|
|
| PC_NO_ACCESS_CHECK | PC_NOWARN | (relative ? PC_NOFULL : 0));
|
2008-05-23 19:00:35 +08:00
|
|
|
if (p.error)
|
|
|
|
return_with_errno (p.error);
|
2009-04-15 17:58:41 +08:00
|
|
|
/* Relative Windows paths are always restricted to MAX_PATH chars. */
|
|
|
|
if (relative && !isabspath (p.get_win32 ())
|
|
|
|
&& sys_mbstowcs (NULL, 0, p.get_win32 ()) > MAX_PATH)
|
|
|
|
{
|
|
|
|
/* Recreate as absolute path. */
|
|
|
|
p.check ((const char *) from, PC_POSIX | PC_SYM_FOLLOW
|
|
|
|
| PC_NO_ACCESS_CHECK | PC_NOWARN);
|
|
|
|
if (p.error)
|
|
|
|
return_with_errno (p.error);
|
|
|
|
}
|
2009-12-22 00:44:37 +08:00
|
|
|
lsiz = p.get_wide_win32_path_len () + 1;
|
2010-08-04 19:25:13 +08:00
|
|
|
path = p.get_nt_native_path ()->Buffer;
|
|
|
|
|
|
|
|
/* Convert native path to standard DOS path. */
|
|
|
|
if (!wcsncmp (path, L"\\??\\", 4))
|
|
|
|
{
|
|
|
|
path[1] = L'\\';
|
|
|
|
|
|
|
|
/* Drop long path prefix for short pathnames. Unfortunately there's
|
|
|
|
quite a bunch of Win32 functions, especially in user32.dll,
|
|
|
|
apparently, which don't grok long path names at all, not even
|
|
|
|
in the UNICODE API. */
|
2010-09-06 17:47:01 +08:00
|
|
|
if ((path[5] == L':' && lsiz <= MAX_PATH + 4)
|
|
|
|
|| (!wcsncmp (path + 4, L"UNC\\", 4) && lsiz <= MAX_PATH + 6))
|
2010-08-04 19:25:13 +08:00
|
|
|
{
|
|
|
|
path += 4;
|
|
|
|
lsiz -= 4;
|
|
|
|
if (path[1] != L':')
|
|
|
|
{
|
|
|
|
*(path += 2) = '\\';
|
|
|
|
lsiz -= 2;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2010-09-06 17:47:01 +08:00
|
|
|
else if (*path == L'\\')
|
|
|
|
{
|
2011-06-06 13:02:13 +08:00
|
|
|
/* Device name points to somewhere else in the NT namespace.
|
2010-09-06 17:47:01 +08:00
|
|
|
Use GLOBALROOT prefix to convert to Win32 path. */
|
2011-02-15 23:25:59 +08:00
|
|
|
to = (void *) wcpcpy ((wchar_t *) to, ro_u_globalroot.Buffer);
|
|
|
|
lsiz += ro_u_globalroot.Length / sizeof (WCHAR);
|
2010-09-06 17:47:01 +08:00
|
|
|
}
|
2009-12-22 00:44:37 +08:00
|
|
|
/* TODO: Same ".\\" band-aid as in CCP_POSIX_TO_WIN_A case. */
|
2010-08-04 19:25:13 +08:00
|
|
|
if (relative && !strcmp ((const char *) from, ".")
|
|
|
|
&& !wcscmp (path, L".\\"))
|
2011-06-06 13:02:13 +08:00
|
|
|
{
|
2010-08-04 19:25:13 +08:00
|
|
|
lsiz = 2;
|
|
|
|
path[1] = L'\0';
|
2009-12-22 00:44:37 +08:00
|
|
|
}
|
|
|
|
lsiz *= sizeof (WCHAR);
|
2008-05-23 19:00:35 +08:00
|
|
|
break;
|
|
|
|
case CCP_WIN_A_TO_POSIX:
|
2011-12-13 22:53:10 +08:00
|
|
|
buf = tp.c_get ();
|
|
|
|
error = mount_table->conv_to_posix_path ((const char *) from, buf,
|
|
|
|
relative);
|
|
|
|
if (error)
|
|
|
|
return_with_errno (error);
|
|
|
|
lsiz = strlen (buf) + 1;
|
2008-05-23 19:00:35 +08:00
|
|
|
break;
|
|
|
|
case CCP_WIN_W_TO_POSIX:
|
|
|
|
buf = tp.c_get ();
|
|
|
|
error = mount_table->conv_to_posix_path ((const PWCHAR) from, buf,
|
|
|
|
relative);
|
|
|
|
if (error)
|
|
|
|
return_with_errno (error);
|
|
|
|
lsiz = strlen (buf) + 1;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (!size)
|
|
|
|
return lsiz;
|
|
|
|
if (size < lsiz)
|
|
|
|
{
|
|
|
|
set_errno (ENOSPC);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
switch (what)
|
|
|
|
{
|
|
|
|
case CCP_POSIX_TO_WIN_A:
|
|
|
|
case CCP_WIN_A_TO_POSIX:
|
|
|
|
case CCP_WIN_W_TO_POSIX:
|
2010-09-06 17:47:01 +08:00
|
|
|
stpcpy ((char *) to, buf);
|
2008-05-23 19:00:35 +08:00
|
|
|
break;
|
|
|
|
case CCP_POSIX_TO_WIN_W:
|
2010-09-06 17:47:01 +08:00
|
|
|
wcpcpy ((PWCHAR) to, path);
|
2008-05-23 19:00:35 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" void *
|
|
|
|
cygwin_create_path (cygwin_conv_path_t what, const void *from)
|
|
|
|
{
|
|
|
|
void *to;
|
|
|
|
ssize_t size = cygwin_conv_path (what, from, NULL, 0);
|
|
|
|
if (size <= 0)
|
2010-04-20 22:32:29 +08:00
|
|
|
to = NULL;
|
|
|
|
else if (!(to = malloc (size)))
|
|
|
|
to = NULL;
|
2008-05-23 19:00:35 +08:00
|
|
|
if (cygwin_conv_path (what, from, to, size) == -1)
|
2010-04-20 22:32:29 +08:00
|
|
|
{
|
|
|
|
free (to);
|
|
|
|
to = NULL;
|
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
return to;
|
|
|
|
}
|
|
|
|
|
2013-04-23 17:44:36 +08:00
|
|
|
#ifndef __x86_64__ /* Disable deprecated functions on x86_64. */
|
2008-05-23 19:00:35 +08:00
|
|
|
|
|
|
|
extern "C" int
|
|
|
|
cygwin_conv_to_win32_path (const char *path, char *win32_path)
|
|
|
|
{
|
|
|
|
return cygwin_conv_path (CCP_POSIX_TO_WIN_A | CCP_RELATIVE, path, win32_path,
|
|
|
|
MAX_PATH);
|
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" int
|
|
|
|
cygwin_conv_to_full_win32_path (const char *path, char *win32_path)
|
|
|
|
{
|
|
|
|
return cygwin_conv_path (CCP_POSIX_TO_WIN_A | CCP_ABSOLUTE, path, win32_path,
|
|
|
|
MAX_PATH);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* This is exported to the world as cygwin_foo by cygwin.din. */
|
|
|
|
|
|
|
|
extern "C" int
|
|
|
|
cygwin_conv_to_posix_path (const char *path, char *posix_path)
|
|
|
|
{
|
|
|
|
return cygwin_conv_path (CCP_WIN_A_TO_POSIX | CCP_RELATIVE, path, posix_path,
|
|
|
|
MAX_PATH);
|
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" int
|
|
|
|
cygwin_conv_to_full_posix_path (const char *path, char *posix_path)
|
|
|
|
{
|
|
|
|
return cygwin_conv_path (CCP_WIN_A_TO_POSIX | CCP_ABSOLUTE, path, posix_path,
|
|
|
|
MAX_PATH);
|
|
|
|
}
|
|
|
|
|
2013-04-23 17:44:36 +08:00
|
|
|
#endif /* !__x86_64__ */
|
|
|
|
|
2009-09-26 07:55:00 +08:00
|
|
|
/* The realpath function is required by POSIX:2008. */
|
2008-05-23 19:00:35 +08:00
|
|
|
|
|
|
|
extern "C" char *
|
|
|
|
realpath (const char *path, char *resolved)
|
|
|
|
{
|
|
|
|
/* Make sure the right errno is returned if path is NULL. */
|
|
|
|
if (!path)
|
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return NULL;
|
|
|
|
}
|
2005-08-26 23:11:06 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Guard reading from a potentially invalid path and writing to a
|
|
|
|
potentially invalid resolved. */
|
|
|
|
tmp_pathbuf tp;
|
|
|
|
myfault efault;
|
|
|
|
if (efault.faulted (EFAULT))
|
|
|
|
return NULL;
|
2005-08-26 23:11:06 +08:00
|
|
|
|
2012-06-21 17:33:19 +08:00
|
|
|
/* Win32 drive letter paths have to be converted to a POSIX path first,
|
2012-06-22 17:51:29 +08:00
|
|
|
because path_conv leaves the incoming path untouched except for
|
|
|
|
converting backslashes to forward slashes. */
|
2008-05-23 19:00:35 +08:00
|
|
|
char *tpath;
|
|
|
|
if (isdrive (path))
|
|
|
|
{
|
|
|
|
tpath = tp.c_get ();
|
2012-06-21 17:33:19 +08:00
|
|
|
mount_table->conv_to_posix_path (path, tpath, 0);
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
else
|
|
|
|
tpath = (char *) path;
|
2005-08-26 23:11:06 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
path_conv real_path (tpath, PC_SYM_FOLLOW | PC_POSIX, stat_suffixes);
|
2005-08-26 05:18:26 +08:00
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2009-09-26 07:55:00 +08:00
|
|
|
/* POSIX 2008 requires malloc'ing if resolved is NULL, and states
|
|
|
|
that using non-NULL resolved is asking for portability
|
|
|
|
problems. */
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (!real_path.error && real_path.exists ())
|
|
|
|
{
|
|
|
|
if (!resolved)
|
|
|
|
{
|
|
|
|
resolved = (char *) malloc (strlen (real_path.normalized_path) + 1);
|
|
|
|
if (!resolved)
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
strcpy (resolved, real_path.normalized_path);
|
|
|
|
return resolved;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2009-09-26 07:55:00 +08:00
|
|
|
/* FIXME: on error, Linux puts the name of the path
|
|
|
|
component which could not be resolved into RESOLVED, but POSIX
|
|
|
|
does not require this. */
|
2008-05-23 19:00:35 +08:00
|
|
|
if (resolved)
|
|
|
|
resolved[0] = '\0';
|
|
|
|
set_errno (real_path.error ?: ENOENT);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2009-09-26 07:55:00 +08:00
|
|
|
/* Linux provides this extension. Since the only portable use of
|
|
|
|
realpath requires a NULL second argument, we might as well have a
|
|
|
|
one-argument wrapper. */
|
|
|
|
extern "C" char *
|
|
|
|
canonicalize_file_name (const char *path)
|
|
|
|
{
|
|
|
|
return realpath (path, NULL);
|
|
|
|
}
|
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Return non-zero if path is a POSIX path list.
|
|
|
|
This is exported to the world as cygwin_foo by cygwin.din.
|
|
|
|
|
|
|
|
DOCTOOL-START
|
|
|
|
<sect1 id="add-func-cygwin-posix-path-list-p">
|
|
|
|
<para>Rather than use a mode to say what the "proper" path list
|
|
|
|
format is, we allow any, and give apps the tools they need to
|
|
|
|
convert between the two. If a ';' is present in the path list it's
|
|
|
|
a Win32 path list. Otherwise, if the first path begins with
|
|
|
|
[letter]: (in which case it can be the only element since if it
|
|
|
|
wasn't a ';' would be present) it's a Win32 path list. Otherwise,
|
|
|
|
it's a POSIX path list.</para>
|
|
|
|
</sect1>
|
|
|
|
DOCTOOL-END
|
|
|
|
*/
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
extern "C" int
|
|
|
|
cygwin_posix_path_list_p (const char *path)
|
|
|
|
{
|
|
|
|
int posix_p = !(strchr (path, ';') || isdrive (path));
|
|
|
|
return posix_p;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* These are used for apps that need to convert env vars like PATH back and
|
|
|
|
forth. The conversion is a two step process. First, an upper bound on the
|
|
|
|
size of the buffer needed is computed. Then the conversion is done. This
|
|
|
|
allows the caller to use alloca if it wants. */
|
|
|
|
|
|
|
|
static int
|
|
|
|
conv_path_list_buf_size (const char *path_list, bool to_posix)
|
|
|
|
{
|
|
|
|
int i, num_elms, max_mount_path_len, size;
|
|
|
|
const char *p;
|
|
|
|
|
|
|
|
path_conv pc(".", PC_POSIX);
|
|
|
|
/* The theory is that an upper bound is
|
|
|
|
current_size + (num_elms * max_mount_path_len) */
|
|
|
|
/* FIXME: This method is questionable in the long run. */
|
|
|
|
|
|
|
|
unsigned nrel;
|
|
|
|
char delim = to_posix ? ';' : ':';
|
|
|
|
for (p = path_list, num_elms = nrel = 0; p; num_elms++)
|
|
|
|
{
|
|
|
|
if (!isabspath (p))
|
|
|
|
nrel++;
|
|
|
|
p = strchr (++p, delim);
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* 7: strlen ("//c") + slop, a conservative initial value */
|
|
|
|
for (max_mount_path_len = sizeof ("/cygdrive/X"), i = 0;
|
|
|
|
i < mount_table->nmounts; i++)
|
|
|
|
{
|
|
|
|
int mount_len = (to_posix
|
|
|
|
? mount_table->mount[i].posix_pathlen
|
|
|
|
: mount_table->mount[i].native_pathlen);
|
|
|
|
if (max_mount_path_len < mount_len)
|
|
|
|
max_mount_path_len = mount_len;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* 100: slop */
|
|
|
|
size = strlen (path_list)
|
|
|
|
+ (num_elms * max_mount_path_len)
|
|
|
|
+ (nrel * strlen (to_posix ? pc.normalized_path : pc.get_win32 ()))
|
|
|
|
+ 100;
|
|
|
|
|
|
|
|
return size;
|
|
|
|
}
|
|
|
|
|
2013-04-23 17:44:36 +08:00
|
|
|
extern "C" ssize_t
|
|
|
|
env_PATH_to_posix (const void *win32, void *posix, size_t size)
|
|
|
|
{
|
|
|
|
return_with_errno (conv_path_list ((const char *) win32, (char *) posix,
|
|
|
|
size, ENV_CVT));
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef __x86_64__ /* Disable deprecated functions on x86_64. */
|
2008-05-23 19:00:35 +08:00
|
|
|
|
|
|
|
extern "C" int
|
|
|
|
cygwin_win32_to_posix_path_list_buf_size (const char *path_list)
|
|
|
|
{
|
|
|
|
return conv_path_list_buf_size (path_list, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" int
|
|
|
|
cygwin_posix_to_win32_path_list_buf_size (const char *path_list)
|
|
|
|
{
|
|
|
|
return conv_path_list_buf_size (path_list, false);
|
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" int
|
|
|
|
cygwin_win32_to_posix_path_list (const char *win32, char *posix)
|
|
|
|
{
|
2011-12-03 00:06:10 +08:00
|
|
|
return_with_errno (conv_path_list (win32, posix, MAX_PATH,
|
|
|
|
CCP_WIN_A_TO_POSIX | CCP_RELATIVE));
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" int
|
|
|
|
cygwin_posix_to_win32_path_list (const char *posix, char *win32)
|
|
|
|
{
|
2011-12-03 00:06:10 +08:00
|
|
|
return_with_errno (conv_path_list (posix, win32, MAX_PATH,
|
|
|
|
CCP_POSIX_TO_WIN_A | CCP_RELATIVE));
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
|
2013-04-23 17:44:36 +08:00
|
|
|
#endif /* !__x86_64__ */
|
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
extern "C" ssize_t
|
|
|
|
cygwin_conv_path_list (cygwin_conv_path_t what, const void *from, void *to,
|
|
|
|
size_t size)
|
|
|
|
{
|
2011-12-03 00:06:10 +08:00
|
|
|
int ret;
|
|
|
|
char *winp = NULL;
|
|
|
|
void *orig_to = NULL;
|
|
|
|
tmp_pathbuf tp;
|
|
|
|
|
|
|
|
switch (what & CCP_CONVTYPE_MASK)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
case CCP_WIN_W_TO_POSIX:
|
2011-12-03 00:06:10 +08:00
|
|
|
if (!sys_wcstombs_alloc (&winp, HEAP_NOTHEAP, (const wchar_t *) from,
|
|
|
|
(size_t) -1))
|
|
|
|
return -1;
|
|
|
|
what = (what & ~CCP_CONVTYPE_MASK) | CCP_WIN_A_TO_POSIX;
|
|
|
|
from = (const void *) winp;
|
|
|
|
break;
|
2008-05-23 19:00:35 +08:00
|
|
|
case CCP_POSIX_TO_WIN_W:
|
2011-12-03 00:06:10 +08:00
|
|
|
if (size == 0)
|
|
|
|
return conv_path_list_buf_size ((const char *) from, 0)
|
|
|
|
* sizeof (WCHAR);
|
|
|
|
what = (what & ~CCP_CONVTYPE_MASK) | CCP_POSIX_TO_WIN_A;
|
|
|
|
orig_to = to;
|
|
|
|
to = (void *) tp.w_get ();
|
|
|
|
size = 65536;
|
2008-05-23 19:00:35 +08:00
|
|
|
break;
|
2011-12-03 00:06:10 +08:00
|
|
|
}
|
|
|
|
switch (what & CCP_CONVTYPE_MASK)
|
|
|
|
{
|
2008-05-23 19:00:35 +08:00
|
|
|
case CCP_WIN_A_TO_POSIX:
|
|
|
|
case CCP_POSIX_TO_WIN_A:
|
|
|
|
if (size == 0)
|
|
|
|
return conv_path_list_buf_size ((const char *) from,
|
|
|
|
what == CCP_WIN_A_TO_POSIX);
|
2011-12-03 00:06:10 +08:00
|
|
|
ret = conv_path_list ((const char *) from, (char *) to, size, what);
|
|
|
|
/* Free winp buffer in case of CCP_WIN_W_TO_POSIX. */
|
|
|
|
if (winp)
|
|
|
|
free (winp);
|
|
|
|
/* Convert to WCHAR in case of CCP_POSIX_TO_WIN_W. */
|
|
|
|
if (orig_to)
|
|
|
|
sys_mbstowcs ((wchar_t *) orig_to, size / sizeof (WCHAR),
|
|
|
|
(const char *) to, (size_t) -1);
|
|
|
|
return_with_errno (ret);
|
2008-05-23 19:00:35 +08:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
set_errno (EINVAL);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* cygwin_split_path: Split a path into directory and file name parts.
|
|
|
|
Buffers DIR and FILE are assumed to be big enough.
|
|
|
|
|
|
|
|
Examples (path -> `dir' / `file'):
|
|
|
|
/ -> `/' / `'
|
|
|
|
"" -> `.' / `'
|
|
|
|
. -> `.' / `.' (FIXME: should this be `.' / `'?)
|
|
|
|
.. -> `.' / `..' (FIXME: should this be `..' / `'?)
|
|
|
|
foo -> `.' / `foo'
|
|
|
|
foo/bar -> `foo' / `bar'
|
|
|
|
foo/bar/ -> `foo' / `bar'
|
|
|
|
/foo -> `/' / `foo'
|
|
|
|
/foo/bar -> `/foo' / `bar'
|
|
|
|
c: -> `c:/' / `'
|
|
|
|
c:/ -> `c:/' / `'
|
|
|
|
c:foo -> `c:/' / `foo'
|
|
|
|
c:/foo -> `c:/' / `foo'
|
|
|
|
*/
|
|
|
|
|
|
|
|
extern "C" void
|
|
|
|
cygwin_split_path (const char *path, char *dir, char *file)
|
|
|
|
{
|
|
|
|
int dir_started_p = 0;
|
|
|
|
|
|
|
|
/* Deal with drives.
|
|
|
|
Remember that c:foo <==> c:/foo. */
|
|
|
|
if (isdrive (path))
|
|
|
|
{
|
|
|
|
*dir++ = *path++;
|
|
|
|
*dir++ = *path++;
|
|
|
|
*dir++ = '/';
|
|
|
|
if (!*path)
|
|
|
|
{
|
|
|
|
*dir = 0;
|
|
|
|
*file = 0;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (isdirsep (*path))
|
|
|
|
++path;
|
|
|
|
dir_started_p = 1;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Determine if there are trailing slashes and "delete" them if present.
|
|
|
|
We pretend as if they don't exist. */
|
|
|
|
const char *end = path + strlen (path);
|
|
|
|
/* path + 1: keep leading slash. */
|
|
|
|
while (end > path + 1 && isdirsep (end[-1]))
|
|
|
|
--end;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* At this point, END points to one beyond the last character
|
|
|
|
(with trailing slashes "deleted"). */
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/* Point LAST_SLASH at the last slash (duh...). */
|
|
|
|
const char *last_slash;
|
|
|
|
for (last_slash = end - 1; last_slash >= path; --last_slash)
|
|
|
|
if (isdirsep (*last_slash))
|
|
|
|
break;
|
2000-09-05 11:16:28 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (last_slash == path)
|
|
|
|
{
|
|
|
|
*dir++ = '/';
|
|
|
|
*dir = 0;
|
|
|
|
}
|
|
|
|
else if (last_slash > path)
|
|
|
|
{
|
|
|
|
memcpy (dir, path, last_slash - path);
|
|
|
|
dir[last_slash - path] = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (dir_started_p)
|
|
|
|
; /* nothing to do */
|
|
|
|
else
|
|
|
|
*dir++ = '.';
|
|
|
|
*dir = 0;
|
|
|
|
}
|
2007-10-24 00:26:28 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
memcpy (file, last_slash + 1, end - last_slash - 1);
|
|
|
|
file[end - last_slash - 1] = 0;
|
|
|
|
}
|
|
|
|
|
2011-10-13 23:32:10 +08:00
|
|
|
static inline void
|
|
|
|
copy_cwd_str (PUNICODE_STRING tgt, PUNICODE_STRING src)
|
|
|
|
{
|
|
|
|
RtlCopyUnicodeString (tgt, src);
|
|
|
|
if (tgt->Buffer[tgt->Length / sizeof (WCHAR) - 1] != L'\\')
|
|
|
|
{
|
|
|
|
tgt->Buffer[tgt->Length / sizeof (WCHAR)] = L'\\';
|
|
|
|
tgt->Length += sizeof (WCHAR);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
/*****************************************************************************/
|
|
|
|
|
2011-02-15 23:25:59 +08:00
|
|
|
/* The find_fast_cwd_pointer function and parts of the
|
2010-10-09 18:54:13 +08:00
|
|
|
cwdstuff::override_win32_cwd method are based on code using the
|
|
|
|
following license:
|
|
|
|
|
|
|
|
Copyright 2010 John Carey. All rights reserved.
|
|
|
|
|
|
|
|
Redistribution and use in source and binary forms, with or without
|
|
|
|
modification, are permitted provided that the following conditions
|
|
|
|
are met:
|
|
|
|
|
|
|
|
1. Redistributions of source code must retain the above
|
|
|
|
copyright notice, this list of conditions and the following
|
|
|
|
disclaimer.
|
|
|
|
|
|
|
|
2. Redistributions in binary form must reproduce the above
|
|
|
|
copyright notice, this list of conditions and the following
|
|
|
|
disclaimer in the documentation and/or other materials provided
|
|
|
|
with the distribution.
|
|
|
|
|
|
|
|
THIS SOFTWARE IS PROVIDED BY JOHN CAREY ``AS IS'' AND ANY EXPRESS
|
|
|
|
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
|
|
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
ARE DISCLAIMED. IN NO EVENT SHALL JOHN CAREY OR CONTRIBUTORS BE
|
|
|
|
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
|
|
|
|
OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
|
|
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
|
|
|
|
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
|
|
|
|
USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
|
|
|
|
DAMAGE. */
|
|
|
|
|
2012-03-05 19:50:25 +08:00
|
|
|
void
|
|
|
|
fcwd_access_t::SetFSCharacteristics (LONG val)
|
|
|
|
{
|
2011-10-13 23:32:10 +08:00
|
|
|
/* Special case FSCharacteristics. Didn't exist originally. */
|
2012-03-05 19:50:25 +08:00
|
|
|
switch (fast_cwd_version ())
|
2011-10-13 23:32:10 +08:00
|
|
|
{
|
2012-03-05 19:50:25 +08:00
|
|
|
case FCWD_OLD:
|
|
|
|
break;
|
|
|
|
case FCWD_W7:
|
|
|
|
f7.FSCharacteristics = val;
|
|
|
|
break;
|
|
|
|
case FCWD_W8:
|
|
|
|
f8.FSCharacteristics = val;
|
|
|
|
break;
|
2011-10-13 23:32:10 +08:00
|
|
|
}
|
2012-03-05 19:50:25 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
fcwd_version_t &
|
|
|
|
fcwd_access_t::fast_cwd_version ()
|
|
|
|
{
|
|
|
|
return cygheap->cwd.fast_cwd_version;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
fcwd_access_t::CopyPath (UNICODE_STRING &target)
|
|
|
|
{
|
|
|
|
/* Copy the Path contents over into the UNICODE_STRING referenced by
|
|
|
|
target. This is used to set the CurrentDirectoryName in the
|
|
|
|
user parameter block. */
|
|
|
|
target = Path ();
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
fcwd_access_t::Free (PVOID heap)
|
|
|
|
{
|
|
|
|
/* Decrement the reference count. If it's down to 0, free
|
|
|
|
structure from heap. */
|
|
|
|
if (this && InterlockedDecrement (&ReferenceCount ()) == 0)
|
2011-10-13 23:32:10 +08:00
|
|
|
{
|
2012-03-05 19:50:25 +08:00
|
|
|
/* In contrast to pre-Vista, the handle on init is always a
|
|
|
|
fresh one and not the handle inherited from the parent
|
|
|
|
process. So we always have to close it here. However, the
|
|
|
|
handle could be NULL, if we cd'ed into a virtual dir. */
|
|
|
|
HANDLE h = DirectoryHandle ();
|
|
|
|
if (h)
|
|
|
|
NtClose (h);
|
|
|
|
RtlFreeHeap (heap, 0, this);
|
2011-10-13 23:32:10 +08:00
|
|
|
}
|
2012-03-05 19:50:25 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
fcwd_access_t::FillIn (HANDLE dir, PUNICODE_STRING name,
|
|
|
|
ULONG old_dismount_count)
|
|
|
|
{
|
|
|
|
/* Fill in all values into this FAST_CWD structure. */
|
|
|
|
DirectoryHandle () = dir;
|
|
|
|
ReferenceCount () = 1;
|
|
|
|
OldDismountCount () = old_dismount_count;
|
|
|
|
/* The new structure stores the device characteristics of the
|
|
|
|
volume holding the dir. RtlGetCurrentDirectory_U checks
|
|
|
|
if the FILE_REMOVABLE_MEDIA flag is set and, if so, checks if
|
|
|
|
the volume is still the same as the one used when opening
|
|
|
|
the directory handle.
|
|
|
|
We don't call NtQueryVolumeInformationFile for the \\?\PIPE,
|
|
|
|
though. It just returns STATUS_INVALID_HANDLE anyway. */
|
|
|
|
if (fast_cwd_version () != FCWD_OLD)
|
|
|
|
{
|
|
|
|
SetFSCharacteristics (0);
|
|
|
|
if (name != &ro_u_pipedir)
|
2011-10-13 23:32:10 +08:00
|
|
|
{
|
2012-03-05 19:50:25 +08:00
|
|
|
IO_STATUS_BLOCK io;
|
|
|
|
FILE_FS_DEVICE_INFORMATION ffdi;
|
|
|
|
if (NT_SUCCESS (NtQueryVolumeInformationFile (dir, &io, &ffdi,
|
|
|
|
sizeof ffdi, FileFsDeviceInformation)))
|
|
|
|
SetFSCharacteristics (ffdi.Characteristics);
|
2011-10-13 23:32:10 +08:00
|
|
|
}
|
|
|
|
}
|
2012-03-05 19:50:25 +08:00
|
|
|
RtlInitEmptyUnicodeString (&Path (), Buffer (),
|
|
|
|
MAX_PATH * sizeof (WCHAR));
|
|
|
|
copy_cwd_str (&Path (), name);
|
|
|
|
}
|
2011-10-13 23:32:10 +08:00
|
|
|
|
2012-03-05 19:50:25 +08:00
|
|
|
void
|
|
|
|
fcwd_access_t::SetDirHandleFromBufferPointer (PWCHAR buf_p, HANDLE dir)
|
|
|
|
{
|
|
|
|
/* Input: The buffer pointer as it's stored in the user parameter block
|
|
|
|
and a directory handle.
|
|
|
|
This function computes the address to the FAST_CWD structure based
|
|
|
|
on the version and overwrites the directory handle. It is only
|
|
|
|
used if we couldn't figure out the address of fast_cwd_ptr. */
|
|
|
|
fcwd_access_t *f_cwd;
|
|
|
|
switch (fast_cwd_version ())
|
2011-10-13 23:32:10 +08:00
|
|
|
{
|
2012-03-05 19:50:25 +08:00
|
|
|
case FCWD_OLD:
|
|
|
|
default:
|
|
|
|
f_cwd = (fcwd_access_t *)
|
|
|
|
((PBYTE) buf_p - __builtin_offsetof (FAST_CWD_OLD, Buffer));
|
|
|
|
case FCWD_W7:
|
|
|
|
f_cwd = (fcwd_access_t *)
|
|
|
|
((PBYTE) buf_p - __builtin_offsetof (FAST_CWD_7, Buffer));
|
|
|
|
case FCWD_W8:
|
|
|
|
f_cwd = (fcwd_access_t *)
|
|
|
|
((PBYTE) buf_p - __builtin_offsetof (FAST_CWD_8, Buffer));
|
2011-10-13 23:32:10 +08:00
|
|
|
}
|
2012-03-05 19:50:25 +08:00
|
|
|
f_cwd->DirectoryHandle () = dir;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
fcwd_access_t::SetVersionFromPointer (PBYTE buf_p, bool is_buffer)
|
|
|
|
{
|
|
|
|
/* Given a pointer to the FAST_CWD structure (is_buffer == false) or a
|
|
|
|
pointer to the Buffer within (is_buffer == true), this function
|
|
|
|
computes the FAST_CWD version by checking that Path.MaximumLength
|
|
|
|
equals MAX_PATH, and that Path.Buffer == Buffer. */
|
|
|
|
if (is_buffer)
|
|
|
|
buf_p -= __builtin_offsetof (FAST_CWD_8, Buffer);
|
|
|
|
fcwd_access_t *f_cwd = (fcwd_access_t *) buf_p;
|
|
|
|
if (f_cwd->f8.Path.MaximumLength == MAX_PATH * sizeof (WCHAR)
|
|
|
|
&& f_cwd->f8.Path.Buffer == f_cwd->f8.Buffer)
|
|
|
|
fast_cwd_version () = FCWD_W8;
|
|
|
|
else if (f_cwd->f7.Path.MaximumLength == MAX_PATH * sizeof (WCHAR)
|
|
|
|
&& f_cwd->f7.Path.Buffer == f_cwd->f7.Buffer)
|
|
|
|
fast_cwd_version () = FCWD_W7;
|
|
|
|
else
|
|
|
|
fast_cwd_version () = FCWD_OLD;
|
|
|
|
}
|
2010-10-09 18:54:13 +08:00
|
|
|
|
|
|
|
/* This function scans the code in ntdll.dll to find the address of the
|
|
|
|
global variable used to access the CWD starting with Vista. While the
|
|
|
|
pointer is global, it's not exported from the DLL, unfortunately.
|
|
|
|
Therefore we have to use some knowledge to figure out the address.
|
|
|
|
|
|
|
|
This code has been tested on Vista 32/64 bit, Server 2008 32/64 bit,
|
2012-03-05 19:50:25 +08:00
|
|
|
Windows 7 32/64 bit, Server 2008 R2 (which is only 64 bit anyway),
|
|
|
|
and W8CP 32/64 bit. There's some hope this will still work for
|
|
|
|
Windows 8 RTM... */
|
2013-04-23 17:44:36 +08:00
|
|
|
|
|
|
|
#ifdef __x86_64__
|
|
|
|
|
|
|
|
#define peek32(x) (*(int32_t *)(x))
|
|
|
|
|
|
|
|
static fcwd_access_t **
|
|
|
|
find_fast_cwd_pointer ()
|
|
|
|
{
|
|
|
|
/* Fetch entry points of relevant functions in ntdll.dll. */
|
|
|
|
HMODULE ntdll = GetModuleHandle ("ntdll.dll");
|
|
|
|
if (!ntdll)
|
|
|
|
return NULL;
|
|
|
|
const uint8_t *get_dir = (const uint8_t *)
|
|
|
|
GetProcAddress (ntdll, "RtlGetCurrentDirectory_U");
|
|
|
|
const uint8_t *ent_crit = (const uint8_t *)
|
|
|
|
GetProcAddress (ntdll, "RtlEnterCriticalSection");
|
|
|
|
if (!get_dir || !ent_crit)
|
|
|
|
return NULL;
|
|
|
|
/* Search first relative call instruction in RtlGetCurrentDirectory_U. */
|
|
|
|
const uint8_t *rcall = (const uint8_t *) memchr (get_dir, 0xe8, 40);
|
|
|
|
if (!rcall)
|
|
|
|
return NULL;
|
|
|
|
/* Fetch offset from instruction and compute address of called function.
|
|
|
|
This function actually fetches the current FAST_CWD instance and
|
|
|
|
performs some other actions, not important to us. */
|
|
|
|
const uint8_t *use_cwd = rcall + 5 + peek32 (rcall + 1);
|
|
|
|
/* Next we search for the locking mechanism and perform a sanity check.
|
|
|
|
On Pre-Windows 8 we basically look for the RtlEnterCriticalSection call.
|
|
|
|
Windows 8 does not call RtlEnterCriticalSection. The code manipulates
|
|
|
|
the FastPebLock manually, probably because RtlEnterCriticalSection has
|
|
|
|
been converted to an inline function. Either way, we test if the code
|
|
|
|
uses the FastPebLock. */
|
|
|
|
const uint8_t *movrbx;
|
|
|
|
const uint8_t *lock = (const uint8_t *)
|
|
|
|
memmem ((const char *) use_cwd, 80,
|
|
|
|
"\xf0\x0f\xba\x35", 4);
|
|
|
|
if (lock)
|
|
|
|
{
|
|
|
|
/* The lock instruction tweaks the LockCount member, which is not at
|
|
|
|
the start of the PRTL_CRITICAL_SECTION structure. So we have to
|
|
|
|
subtract the offset of LockCount to get the real address. */
|
|
|
|
PRTL_CRITICAL_SECTION lockaddr =
|
|
|
|
(PRTL_CRITICAL_SECTION) (lock + 9 + peek32 (lock + 4)
|
|
|
|
- offsetof (RTL_CRITICAL_SECTION, LockCount));
|
|
|
|
/* Test if lock address is FastPebLock. */
|
|
|
|
if (lockaddr != NtCurrentTeb ()->Peb->FastPebLock)
|
|
|
|
return NULL;
|
2013-06-28 18:52:30 +08:00
|
|
|
/* Search `mov rel(%rip),%rbx'. This is the instruction fetching the
|
2013-04-23 17:44:36 +08:00
|
|
|
address of the current fcwd_access_t pointer, and it should be pretty
|
|
|
|
near to the locking stuff. */
|
|
|
|
movrbx = (const uint8_t *) memmem ((const char *) lock, 40,
|
|
|
|
"\x48\x8b\x1d", 3);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2013-06-28 18:52:30 +08:00
|
|
|
/* Usually the callq RtlEnterCriticalSection follows right after
|
|
|
|
fetching the lock address. */
|
|
|
|
int call_rtl_offset = 7;
|
|
|
|
/* Search `lea rel(%rip),%rcx'. This loads the address of the lock into
|
|
|
|
%rcx for the subsequent RtlEnterCriticalSection call. */
|
2013-04-23 17:44:36 +08:00
|
|
|
lock = (const uint8_t *) memmem ((const char *) use_cwd, 80,
|
|
|
|
"\x48\x8d\x0d", 3);
|
|
|
|
if (!lock)
|
2013-06-28 18:52:30 +08:00
|
|
|
{
|
|
|
|
/* Windows 8.1 Preview calls `lea rel(rip),%r12' then some unrelated
|
|
|
|
or, then `mov %r12,%rcx', then `callq RtlEnterCriticalSection'. */
|
|
|
|
lock = (const uint8_t *) memmem ((const char *) use_cwd, 80,
|
|
|
|
"\x4c\x8d\x25", 3);
|
|
|
|
if (!lock)
|
|
|
|
return NULL;
|
|
|
|
call_rtl_offset = 14;
|
|
|
|
}
|
2013-04-23 17:44:36 +08:00
|
|
|
PRTL_CRITICAL_SECTION lockaddr =
|
|
|
|
(PRTL_CRITICAL_SECTION) (lock + 7 + peek32 (lock + 3));
|
|
|
|
/* Test if lock address is FastPebLock. */
|
|
|
|
if (lockaddr != NtCurrentTeb ()->Peb->FastPebLock)
|
|
|
|
return NULL;
|
2013-06-28 18:52:30 +08:00
|
|
|
/* Next is the `callq RtlEnterCriticalSection'. */
|
|
|
|
lock += call_rtl_offset;
|
2013-04-23 17:44:36 +08:00
|
|
|
if (lock[0] != 0xe8)
|
|
|
|
return NULL;
|
|
|
|
const uint8_t *call_addr = (const uint8_t *)
|
|
|
|
(lock + 5 + peek32 (lock + 1));
|
|
|
|
if (call_addr != ent_crit)
|
|
|
|
return NULL;
|
|
|
|
/* In contrast to the above Windows 8 code, we don't have to search
|
2013-06-28 18:52:30 +08:00
|
|
|
for the `mov rel(%rip),%rbx' instruction. It follows right after
|
2013-04-23 17:44:36 +08:00
|
|
|
the call to RtlEnterCriticalSection. */
|
|
|
|
movrbx = lock + 5;
|
|
|
|
}
|
|
|
|
if (!movrbx)
|
|
|
|
return NULL;
|
|
|
|
/* Check that the next instruction tests if the fetched value is NULL. */
|
|
|
|
const uint8_t *testrbx = (const uint8_t *)
|
|
|
|
memmem (movrbx + 7, 3, "\x48\x85\xdb", 3);
|
|
|
|
if (!testrbx)
|
|
|
|
return NULL;
|
|
|
|
/* Compute address of the fcwd_access_t ** pointer. */
|
|
|
|
return (fcwd_access_t **) (testrbx + peek32 (movrbx + 3));
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
|
|
|
|
#define peek32(x) (*(uint32_t *)(x))
|
|
|
|
|
2011-10-13 23:32:10 +08:00
|
|
|
static fcwd_access_t **
|
2011-02-15 23:25:59 +08:00
|
|
|
find_fast_cwd_pointer ()
|
2010-10-09 18:54:13 +08:00
|
|
|
{
|
|
|
|
/* Fetch entry points of relevant functions in ntdll.dll. */
|
|
|
|
HMODULE ntdll = GetModuleHandle ("ntdll.dll");
|
|
|
|
if (!ntdll)
|
2011-02-15 23:25:59 +08:00
|
|
|
return NULL;
|
2010-10-09 18:54:13 +08:00
|
|
|
const uint8_t *get_dir = (const uint8_t *)
|
|
|
|
GetProcAddress (ntdll, "RtlGetCurrentDirectory_U");
|
|
|
|
const uint8_t *ent_crit = (const uint8_t *)
|
|
|
|
GetProcAddress (ntdll, "RtlEnterCriticalSection");
|
|
|
|
if (!get_dir || !ent_crit)
|
2011-02-15 23:25:59 +08:00
|
|
|
return NULL;
|
2010-10-09 18:54:13 +08:00
|
|
|
/* Search first relative call instruction in RtlGetCurrentDirectory_U. */
|
|
|
|
const uint8_t *rcall = (const uint8_t *) memchr (get_dir, 0xe8, 32);
|
|
|
|
if (!rcall)
|
2011-02-15 23:25:59 +08:00
|
|
|
return NULL;
|
2010-10-09 18:54:13 +08:00
|
|
|
/* Fetch offset from instruction and compute address of called function.
|
|
|
|
This function actually fetches the current FAST_CWD instance and
|
|
|
|
performs some other actions, not important to us. */
|
|
|
|
ptrdiff_t offset = (ptrdiff_t) peek32 (rcall + 1);
|
|
|
|
const uint8_t *use_cwd = rcall + 5 + offset;
|
2013-06-28 18:52:30 +08:00
|
|
|
/* Find first `push %edi' instruction. */
|
2010-10-09 18:54:13 +08:00
|
|
|
const uint8_t *pushedi = (const uint8_t *) memchr (use_cwd, 0x57, 32);
|
2013-06-28 18:52:30 +08:00
|
|
|
/* ...which should be followed by `mov crit-sect-addr,%edi' then
|
|
|
|
`push %edi', or by just a single `push crit-sect-addr'. */
|
2010-10-09 18:54:13 +08:00
|
|
|
const uint8_t *movedi = pushedi + 1;
|
2012-04-27 20:07:15 +08:00
|
|
|
const uint8_t *mov_pfast_cwd;
|
2013-06-28 18:52:30 +08:00
|
|
|
if (movedi[0] == 0x8b && movedi[1] == 0xff) /* mov %edi,%edi -> W8 */
|
2012-04-27 20:07:15 +08:00
|
|
|
{
|
2013-04-23 17:44:36 +08:00
|
|
|
/* Windows 8 does not call RtlEnterCriticalSection. The code manipulates
|
|
|
|
the FastPebLock manually, probably because RtlEnterCriticalSection has
|
2012-04-27 20:07:15 +08:00
|
|
|
been converted to an inline function.
|
|
|
|
|
2013-06-28 18:52:30 +08:00
|
|
|
Next we search for a `mov some address,%eax'. This address points
|
2012-04-27 20:07:15 +08:00
|
|
|
to the LockCount member of the FastPebLock structure, so the address
|
|
|
|
is equal to FastPebLock + 4. */
|
|
|
|
const uint8_t *moveax = (const uint8_t *) memchr (movedi, 0xb8, 16);
|
|
|
|
if (!moveax)
|
|
|
|
return NULL;
|
|
|
|
offset = (ptrdiff_t) peek32 (moveax + 1) - 4;
|
|
|
|
/* Compare the address with the known PEB lock as stored in the PEB. */
|
|
|
|
if ((PRTL_CRITICAL_SECTION) offset != NtCurrentTeb ()->Peb->FastPebLock)
|
|
|
|
return NULL;
|
|
|
|
/* Now search for the mov instruction fetching the address of the global
|
|
|
|
PFAST_CWD *. */
|
|
|
|
mov_pfast_cwd = moveax;
|
|
|
|
do
|
|
|
|
{
|
|
|
|
mov_pfast_cwd = (const uint8_t *) memchr (++mov_pfast_cwd, 0x8b, 48);
|
|
|
|
}
|
|
|
|
while (mov_pfast_cwd && mov_pfast_cwd[1] != 0x1d
|
|
|
|
&& (mov_pfast_cwd - moveax) < 48);
|
|
|
|
if (!mov_pfast_cwd || mov_pfast_cwd[1] != 0x1d)
|
|
|
|
return NULL;
|
|
|
|
}
|
2011-10-14 00:47:32 +08:00
|
|
|
else
|
2012-04-27 20:07:15 +08:00
|
|
|
{
|
|
|
|
if (movedi[0] == 0xbf && movedi[5] == 0x57)
|
|
|
|
rcall = movedi + 6;
|
|
|
|
else if (movedi[0] == 0x68)
|
|
|
|
rcall = movedi + 5;
|
2013-06-28 18:52:30 +08:00
|
|
|
else if (movedi[0] == 0x88 && movedi[4] == 0x83 && movedi[7] == 0x68)
|
|
|
|
{
|
|
|
|
/* Windows 8.1 Preview: The `mov lock_addr,%edi' is actually a
|
|
|
|
`mov %cl,15(%esp), followed by an `or #-1,%ebx, followed by a
|
|
|
|
`push lock_addr'. */
|
|
|
|
movedi += 7;
|
|
|
|
rcall = movedi + 5;
|
|
|
|
}
|
2012-04-27 20:07:15 +08:00
|
|
|
else
|
|
|
|
return NULL;
|
|
|
|
/* Compare the address used for the critical section with the known
|
|
|
|
PEB lock as stored in the PEB. */
|
|
|
|
if ((PRTL_CRITICAL_SECTION) peek32 (movedi + 1)
|
|
|
|
!= NtCurrentTeb ()->Peb->FastPebLock)
|
|
|
|
return NULL;
|
|
|
|
/* To check we are seeing the right code, we check our expectation that
|
|
|
|
the next instruction is a relative call into RtlEnterCriticalSection. */
|
|
|
|
if (rcall[0] != 0xe8)
|
|
|
|
return NULL;
|
|
|
|
/* Check that this is a relative call to RtlEnterCriticalSection. */
|
|
|
|
offset = (ptrdiff_t) peek32 (rcall + 1);
|
|
|
|
if (rcall + 5 + offset != ent_crit)
|
|
|
|
return NULL;
|
|
|
|
mov_pfast_cwd = rcall + 5;
|
|
|
|
}
|
2010-10-09 18:54:13 +08:00
|
|
|
/* After locking the critical section, the code should read the global
|
|
|
|
PFAST_CWD * pointer that is guarded by that critical section. */
|
2012-04-27 20:07:15 +08:00
|
|
|
if (mov_pfast_cwd[0] != 0x8b)
|
2011-02-15 23:25:59 +08:00
|
|
|
return NULL;
|
2012-04-27 20:07:15 +08:00
|
|
|
return (fcwd_access_t **) peek32 (mov_pfast_cwd + 2);
|
2010-10-09 18:54:13 +08:00
|
|
|
}
|
2013-04-23 17:44:36 +08:00
|
|
|
#endif
|
2010-10-09 18:54:13 +08:00
|
|
|
|
2011-10-13 23:32:10 +08:00
|
|
|
static fcwd_access_t **
|
2011-02-15 23:25:59 +08:00
|
|
|
find_fast_cwd ()
|
|
|
|
{
|
|
|
|
/* Fetch the pointer but don't set the global fast_cwd_ptr yet. First
|
|
|
|
we have to make sure we know the version of the FAST_CWD structure
|
|
|
|
used on the system. */
|
2011-10-13 23:32:10 +08:00
|
|
|
fcwd_access_t **f_cwd_ptr = find_fast_cwd_pointer ();
|
2011-02-15 23:25:59 +08:00
|
|
|
if (!f_cwd_ptr)
|
|
|
|
system_printf ("WARNING: Couldn't compute FAST_CWD pointer. "
|
|
|
|
"Please report this problem to\nthe public mailing "
|
|
|
|
"list cygwin@cygwin.com");
|
|
|
|
if (f_cwd_ptr && *f_cwd_ptr)
|
|
|
|
{
|
2011-10-13 23:32:10 +08:00
|
|
|
/* Just evaluate structure version. */
|
|
|
|
fcwd_access_t::SetVersionFromPointer ((PBYTE) *f_cwd_ptr, false);
|
2011-02-15 23:25:59 +08:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2011-10-18 16:47:08 +08:00
|
|
|
/* If we couldn't fetch fast_cwd_ptr, or if fast_cwd_ptr is NULL(*)
|
|
|
|
we have to figure out the version from the Buffer pointer in the
|
|
|
|
ProcessParameters.
|
2011-12-18 07:39:47 +08:00
|
|
|
|
2011-10-18 16:47:08 +08:00
|
|
|
(*) This is very unlikely to happen when starting the first
|
|
|
|
Cygwin process, since it only happens when starting the
|
|
|
|
process in a directory which can't be used as CWD by Win32, or
|
|
|
|
if the directory doesn't exist. But *if* it happens, we have
|
|
|
|
no valid FAST_CWD structure, even though upp_cwd_str.Buffer is
|
|
|
|
not NULL in that case. So we let the OS create a valid
|
|
|
|
FAST_CWD structure temporarily to have something to work with.
|
|
|
|
We know the pipe FS works. */
|
2011-02-15 23:25:59 +08:00
|
|
|
PEB &peb = *NtCurrentTeb ()->Peb;
|
|
|
|
|
|
|
|
if (f_cwd_ptr /* so *f_cwd_ptr == NULL */
|
2011-06-06 13:02:13 +08:00
|
|
|
&& !NT_SUCCESS (RtlSetCurrentDirectory_U (&ro_u_pipedir)))
|
2011-02-15 23:25:59 +08:00
|
|
|
api_fatal ("Couldn't set directory to %S temporarily.\n"
|
|
|
|
"Cannot continue.", &ro_u_pipedir);
|
|
|
|
RtlEnterCriticalSection (peb.FastPebLock);
|
2011-10-13 23:32:10 +08:00
|
|
|
fcwd_access_t::SetVersionFromPointer
|
|
|
|
((PBYTE) peb.ProcessParameters->CurrentDirectoryName.Buffer, true);
|
2011-02-15 23:25:59 +08:00
|
|
|
RtlLeaveCriticalSection (peb.FastPebLock);
|
|
|
|
}
|
|
|
|
/* Eventually, after we set the version as well, set fast_cwd_ptr. */
|
|
|
|
return f_cwd_ptr;
|
|
|
|
}
|
|
|
|
|
2010-10-09 18:54:13 +08:00
|
|
|
void
|
|
|
|
cwdstuff::override_win32_cwd (bool init, ULONG old_dismount_count)
|
|
|
|
{
|
|
|
|
HANDLE h = NULL;
|
|
|
|
|
|
|
|
PEB &peb = *NtCurrentTeb ()->Peb;
|
|
|
|
UNICODE_STRING &upp_cwd_str = peb.ProcessParameters->CurrentDirectoryName;
|
|
|
|
HANDLE &upp_cwd_hdl = peb.ProcessParameters->CurrentDirectoryHandle;
|
|
|
|
|
|
|
|
if (wincap.has_fast_cwd ())
|
|
|
|
{
|
2011-10-13 23:32:10 +08:00
|
|
|
if (fast_cwd_ptr == (fcwd_access_t **) -1)
|
2011-02-15 23:25:59 +08:00
|
|
|
fast_cwd_ptr = find_fast_cwd ();
|
2010-10-09 18:54:13 +08:00
|
|
|
if (fast_cwd_ptr)
|
|
|
|
{
|
|
|
|
/* Default method starting with Vista. If we got a valid value for
|
|
|
|
fast_cwd_ptr, we can simply replace the RtlSetCurrentDirectory_U
|
|
|
|
function entirely, just as on pre-Vista. */
|
|
|
|
PVOID heap = peb.ProcessHeap;
|
2011-10-13 23:32:10 +08:00
|
|
|
/* First allocate a new fcwd_access_t structure on the heap.
|
|
|
|
The new fcwd_access_t structure is 4 byte bigger than the old one,
|
2011-02-13 23:43:00 +08:00
|
|
|
but we simply don't care, so we allocate always room for the
|
|
|
|
new one. */
|
2011-10-13 23:32:10 +08:00
|
|
|
fcwd_access_t *f_cwd = (fcwd_access_t *)
|
|
|
|
RtlAllocateHeap (heap, 0, sizeof (fcwd_access_t));
|
2010-10-09 18:54:13 +08:00
|
|
|
if (!f_cwd)
|
|
|
|
{
|
|
|
|
debug_printf ("RtlAllocateHeap failed");
|
|
|
|
return;
|
|
|
|
}
|
2011-02-15 23:25:59 +08:00
|
|
|
/* Fill in the values. */
|
2011-10-13 23:32:10 +08:00
|
|
|
f_cwd->FillIn (dir, error ? &ro_u_pipedir : &win32,
|
|
|
|
old_dismount_count);
|
|
|
|
/* Use PEB lock when switching fast_cwd_ptr to the new FAST_CWD
|
|
|
|
structure and writing the CWD to the user process parameter
|
|
|
|
block. This is equivalent to calling RtlAcquirePebLock/
|
|
|
|
RtlReleasePebLock, but without having to go through the FS
|
|
|
|
selector again. */
|
|
|
|
RtlEnterCriticalSection (peb.FastPebLock);
|
|
|
|
fcwd_access_t *old_cwd = *fast_cwd_ptr;
|
|
|
|
*fast_cwd_ptr = f_cwd;
|
|
|
|
f_cwd->CopyPath (upp_cwd_str);
|
|
|
|
upp_cwd_hdl = dir;
|
|
|
|
RtlLeaveCriticalSection (peb.FastPebLock);
|
|
|
|
old_cwd->Free (heap);
|
2010-10-09 18:54:13 +08:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* This is more a hack, and it's only used on Vista and later if we
|
|
|
|
failed to find the fast_cwd_ptr value. What we do here is to call
|
|
|
|
RtlSetCurrentDirectory_U and let it set up a new FAST_CWD
|
|
|
|
structure. Afterwards, compute the address of that structure
|
|
|
|
utilizing the fact that the buffer address in the user process
|
|
|
|
parameter block is actually pointing to the buffer in that
|
|
|
|
FAST_CWD structure. Then replace the directory handle in that
|
|
|
|
structure with our own handle and close the original one.
|
|
|
|
|
|
|
|
Note that the call to RtlSetCurrentDirectory_U also closes our
|
|
|
|
old dir handle, so there won't be any handle left open.
|
|
|
|
|
|
|
|
This method is prone to two race conditions:
|
|
|
|
|
|
|
|
- Due to the way RtlSetCurrentDirectory_U opens the directory
|
|
|
|
handle, the directory is locked against deletion or renaming
|
|
|
|
between the RtlSetCurrentDirectory_U and the subsequent NtClose
|
|
|
|
call.
|
2011-06-06 13:02:13 +08:00
|
|
|
|
2010-10-09 18:54:13 +08:00
|
|
|
- When another thread calls SetCurrentDirectory at exactly the
|
|
|
|
same time, a crash might occur, or worse, unrelated data could
|
|
|
|
be overwritten or NtClose could be called on an unrelated handle.
|
2011-06-06 13:02:13 +08:00
|
|
|
|
2010-10-09 18:54:13 +08:00
|
|
|
Therefore, use this *only* as a fallback. */
|
|
|
|
if (!init)
|
|
|
|
{
|
2011-10-13 23:32:10 +08:00
|
|
|
NTSTATUS status =
|
|
|
|
RtlSetCurrentDirectory_U (error ? &ro_u_pipedir : &win32);
|
2010-10-09 18:54:13 +08:00
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
2013-04-23 17:44:36 +08:00
|
|
|
debug_printf ("RtlSetCurrentDirectory_U(%S) failed, %y",
|
2010-10-09 18:54:13 +08:00
|
|
|
error ? &ro_u_pipedir : &win32, status);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2011-02-15 23:25:59 +08:00
|
|
|
else if (upp_cwd_hdl == NULL)
|
|
|
|
return;
|
2010-10-09 18:54:13 +08:00
|
|
|
RtlEnterCriticalSection (peb.FastPebLock);
|
2011-10-13 23:32:10 +08:00
|
|
|
fcwd_access_t::SetDirHandleFromBufferPointer(upp_cwd_str.Buffer, dir);
|
2010-10-09 18:54:13 +08:00
|
|
|
h = upp_cwd_hdl;
|
2011-02-13 23:43:00 +08:00
|
|
|
upp_cwd_hdl = dir;
|
2010-10-09 18:54:13 +08:00
|
|
|
RtlLeaveCriticalSection (peb.FastPebLock);
|
|
|
|
/* In contrast to pre-Vista, the handle on init is always a fresh one
|
|
|
|
and not the handle inherited from the parent process. So we always
|
|
|
|
have to close it here. */
|
|
|
|
NtClose (h);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* This method is used for all pre-Vista OSes. We simply set the values
|
2011-06-06 13:02:13 +08:00
|
|
|
for the CWD in the user process parameter block entirely by ourselves
|
2010-10-09 18:54:13 +08:00
|
|
|
under PEB lock condition. This is how RtlSetCurrentDirectory_U worked
|
|
|
|
in these older OSes, so we're safe.
|
2011-06-06 13:02:13 +08:00
|
|
|
|
2010-10-09 18:54:13 +08:00
|
|
|
Note that we can't just RtlEnterCriticalSection (peb.FastPebLock)
|
|
|
|
on pre-Vista. RtlAcquirePebLock was way more complicated back then. */
|
|
|
|
RtlAcquirePebLock ();
|
|
|
|
if (!init)
|
|
|
|
copy_cwd_str (&upp_cwd_str, error ? &ro_u_pipedir : &win32);
|
|
|
|
h = upp_cwd_hdl;
|
|
|
|
upp_cwd_hdl = dir;
|
|
|
|
RtlReleasePebLock ();
|
|
|
|
/* Only on init, the handle is potentially a native handle. However,
|
|
|
|
if it's identical to dir, it's the inherited handle from a Cygwin
|
|
|
|
parent process and must not be closed. */
|
|
|
|
if (h && h != dir)
|
|
|
|
NtClose (h);
|
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize cygcwd 'muto' for serializing access to cwd info. */
|
|
|
|
void
|
|
|
|
cwdstuff::init ()
|
|
|
|
{
|
|
|
|
cwd_lock.init ("cwd_lock");
|
2010-08-13 19:51:54 +08:00
|
|
|
|
|
|
|
/* Cygwin processes inherit the cwd from their parent. If the win32 path
|
2010-10-09 18:54:13 +08:00
|
|
|
buffer is not NULL, the cwd struct is already set up, and we only
|
|
|
|
have to override the Win32 CWD with ours. */
|
2010-08-13 19:51:54 +08:00
|
|
|
if (win32.Buffer)
|
2010-10-09 18:54:13 +08:00
|
|
|
override_win32_cwd (true, SharedUserData.DismountCount);
|
|
|
|
else
|
2012-03-05 19:50:25 +08:00
|
|
|
{
|
|
|
|
/* Initialize fast_cwd stuff. */
|
|
|
|
fast_cwd_ptr = (fcwd_access_t **) -1;
|
|
|
|
fast_cwd_version = FCWD_W7;
|
|
|
|
/* Initially re-open the cwd to allow POSIX semantics. */
|
|
|
|
set (NULL, NULL);
|
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Chdir and fill out the elements of a cwdstuff struct. */
|
|
|
|
int
|
2010-08-13 19:51:54 +08:00
|
|
|
cwdstuff::set (path_conv *nat_cwd, const char *posix_cwd)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2010-08-28 01:58:45 +08:00
|
|
|
NTSTATUS status;
|
2008-05-23 19:00:35 +08:00
|
|
|
UNICODE_STRING upath;
|
2010-10-09 18:54:13 +08:00
|
|
|
PEB &peb = *NtCurrentTeb ()->Peb;
|
2010-08-13 19:51:54 +08:00
|
|
|
bool virtual_path = false;
|
|
|
|
bool unc_path = false;
|
|
|
|
bool inaccessible_path = false;
|
|
|
|
|
2010-08-28 01:58:45 +08:00
|
|
|
/* Here are the problems with using SetCurrentDirectory. Just skip this
|
|
|
|
comment if you don't like whining.
|
2011-06-06 13:02:13 +08:00
|
|
|
|
2010-08-13 19:51:54 +08:00
|
|
|
- SetCurrentDirectory only supports paths of up to MAX_PATH - 1 chars,
|
|
|
|
including a trailing backslash. That's an absolute restriction, even
|
|
|
|
in the UNICODE API.
|
|
|
|
|
2010-08-28 01:58:45 +08:00
|
|
|
- SetCurrentDirectory fails for directories with strict permissions even
|
|
|
|
for processes with the SE_BACKUP_NAME privilege enabled. The reason
|
|
|
|
is apparently that SetCurrentDirectory calls NtOpenFile without the
|
2010-08-13 19:51:54 +08:00
|
|
|
FILE_OPEN_FOR_BACKUP_INTENT flag set.
|
|
|
|
|
|
|
|
- SetCurrentDirectory does not support case-sensitivity.
|
|
|
|
|
2010-08-28 01:58:45 +08:00
|
|
|
- Unlinking a cwd fails because SetCurrentDirectory seems to open
|
|
|
|
directories so that deleting the directory is disallowed.
|
2010-08-13 19:51:54 +08:00
|
|
|
|
|
|
|
- SetCurrentDirectory can naturally not work on virtual Cygwin paths
|
|
|
|
like /proc or /cygdrive.
|
|
|
|
|
2010-08-28 01:58:45 +08:00
|
|
|
Unfortunately, even though we have access to the Win32 process parameter
|
|
|
|
block, we can't just replace the directory handle. Starting with Vista,
|
|
|
|
the handle is used elsewhere, and just replacing the handle in the process
|
|
|
|
parameter block shows quite surprising results.
|
|
|
|
FIXME: If we ever find a *safe* way to replace the directory handle in
|
|
|
|
the process parameter block, we're back in business.
|
|
|
|
|
|
|
|
Nevertheless, doing entirely without SetCurrentDirectory is not really
|
|
|
|
feasible, because it breaks too many mixed applications using the Win32
|
|
|
|
API.
|
|
|
|
|
|
|
|
Therefore we handle the CWD all by ourselves and just keep the Win32
|
|
|
|
CWD in sync. However, to avoid surprising behaviour in the Win32 API
|
|
|
|
when we are in a CWD which is inaccessible as Win32 CWD, we set the
|
|
|
|
Win32 CWD to a "weird" directory in which all relative filesystem-related
|
|
|
|
calls fail. */
|
2008-05-23 19:00:35 +08:00
|
|
|
|
|
|
|
cwd_lock.acquire ();
|
|
|
|
|
|
|
|
if (nat_cwd)
|
|
|
|
{
|
2010-08-13 19:51:54 +08:00
|
|
|
upath = *nat_cwd->get_nt_native_path ();
|
|
|
|
if (nat_cwd->isspecial ())
|
|
|
|
virtual_path = true;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2007-10-24 00:26:28 +08:00
|
|
|
|
2010-10-09 18:54:13 +08:00
|
|
|
/* Memorize old DismountCount before opening the dir. This value is
|
|
|
|
stored in the FAST_CWD structure on Vista and later. It would be
|
|
|
|
simpler to fetch the old DismountCount in override_win32_cwd, but
|
|
|
|
Windows also fetches it before opening the directory handle. It's
|
|
|
|
not quite clear if that's really required, but since we don't know
|
|
|
|
the side effects of this action, we better follow Windows' lead. */
|
|
|
|
ULONG old_dismount_count = SharedUserData.DismountCount;
|
2010-08-13 19:51:54 +08:00
|
|
|
/* Open a directory handle with FILE_OPEN_FOR_BACKUP_INTENT and with all
|
|
|
|
sharing flags set. The handle is right now used in exceptions.cc only,
|
|
|
|
but that might change in future. */
|
2010-08-18 22:22:07 +08:00
|
|
|
HANDLE h = NULL;
|
2010-08-13 19:51:54 +08:00
|
|
|
if (!virtual_path)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
IO_STATUS_BLOCK io;
|
|
|
|
OBJECT_ATTRIBUTES attr;
|
2010-08-13 19:51:54 +08:00
|
|
|
|
|
|
|
if (!nat_cwd)
|
|
|
|
{
|
|
|
|
/* On init, just reopen Win32 CWD with desired access flags.
|
|
|
|
We can access the PEB without lock, because no other thread
|
|
|
|
can change the CWD. */
|
|
|
|
RtlInitUnicodeString (&upath, L"");
|
|
|
|
InitializeObjectAttributes (&attr, &upath,
|
|
|
|
OBJ_CASE_INSENSITIVE | OBJ_INHERIT,
|
2010-10-09 18:54:13 +08:00
|
|
|
peb.ProcessParameters->CurrentDirectoryHandle, NULL);
|
2010-08-13 19:51:54 +08:00
|
|
|
}
|
|
|
|
else
|
|
|
|
InitializeObjectAttributes (&attr, &upath,
|
|
|
|
nat_cwd->objcaseinsensitive () | OBJ_INHERIT,
|
|
|
|
NULL, NULL);
|
|
|
|
/* First try without FILE_OPEN_FOR_BACKUP_INTENT, to find out if the
|
2011-06-06 13:02:13 +08:00
|
|
|
directory is valid for Win32 apps. And, no, we can't just call
|
2010-08-28 01:58:45 +08:00
|
|
|
SetCurrentDirectory here, since that would potentially break
|
|
|
|
case-sensitivity. */
|
2008-05-23 19:00:35 +08:00
|
|
|
status = NtOpenFile (&h, SYNCHRONIZE | FILE_TRAVERSE, &attr, &io,
|
|
|
|
FILE_SHARE_VALID_FLAGS,
|
|
|
|
FILE_DIRECTORY_FILE
|
2010-08-13 19:51:54 +08:00
|
|
|
| FILE_SYNCHRONOUS_IO_NONALERT);
|
|
|
|
if (status == STATUS_ACCESS_DENIED)
|
2011-06-06 13:02:13 +08:00
|
|
|
{
|
2010-08-13 19:51:54 +08:00
|
|
|
status = NtOpenFile (&h, SYNCHRONIZE | FILE_TRAVERSE, &attr, &io,
|
|
|
|
FILE_SHARE_VALID_FLAGS,
|
|
|
|
FILE_DIRECTORY_FILE
|
|
|
|
| FILE_SYNCHRONOUS_IO_NONALERT
|
|
|
|
| FILE_OPEN_FOR_BACKUP_INTENT);
|
|
|
|
inaccessible_path = true;
|
|
|
|
}
|
2008-05-23 19:00:35 +08:00
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
2010-08-13 19:51:54 +08:00
|
|
|
cwd_lock.release ();
|
2008-05-23 19:00:35 +08:00
|
|
|
__seterrno_from_nt_status (status);
|
2010-08-13 19:51:54 +08:00
|
|
|
return -1;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2010-08-13 19:51:54 +08:00
|
|
|
}
|
2010-10-09 18:54:13 +08:00
|
|
|
/* Set new handle. Note that we simply overwrite the old handle here
|
|
|
|
without closing it. The handle is also used as Win32 CWD handle in
|
|
|
|
the user parameter block, and it will be closed in override_win32_cwd,
|
|
|
|
if required. */
|
2010-08-18 22:22:07 +08:00
|
|
|
dir = h;
|
2010-08-13 19:51:54 +08:00
|
|
|
|
|
|
|
if (!nat_cwd)
|
|
|
|
{
|
|
|
|
/* On init, just fetch the Win32 dir from the PEB. We can access
|
|
|
|
the PEB without lock, because no other thread can change the CWD
|
|
|
|
at that time. */
|
2010-10-09 18:54:13 +08:00
|
|
|
PUNICODE_STRING pdir = &peb.ProcessParameters->CurrentDirectoryName;
|
2010-08-13 19:51:54 +08:00
|
|
|
RtlInitEmptyUnicodeString (&win32,
|
|
|
|
(PWCHAR) crealloc_abort (win32.Buffer,
|
2010-09-22 00:41:17 +08:00
|
|
|
pdir->Length
|
|
|
|
+ sizeof (WCHAR)),
|
|
|
|
pdir->Length + sizeof (WCHAR));
|
2010-08-13 19:51:54 +08:00
|
|
|
RtlCopyUnicodeString (&win32, pdir);
|
|
|
|
|
|
|
|
PWSTR eoBuffer = win32.Buffer + (win32.Length / sizeof (WCHAR));
|
|
|
|
/* Remove trailing slash if one exists. */
|
|
|
|
if ((eoBuffer - win32.Buffer) > 3 && eoBuffer[-1] == L'\\')
|
|
|
|
win32.Length -= sizeof (WCHAR);
|
|
|
|
if (eoBuffer[0] == L'\\')
|
|
|
|
unc_path = true;
|
|
|
|
|
|
|
|
posix_cwd = NULL;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2011-02-15 23:25:59 +08:00
|
|
|
if (!virtual_path) /* don't mangle virtual path. */
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2011-02-15 23:25:59 +08:00
|
|
|
/* Convert into Win32 path and compute length. */
|
|
|
|
if (upath.Buffer[1] == L'?')
|
2010-08-13 19:51:54 +08:00
|
|
|
{
|
2011-02-15 23:25:59 +08:00
|
|
|
upath.Buffer += 4;
|
|
|
|
upath.Length -= 4 * sizeof (WCHAR);
|
|
|
|
if (upath.Buffer[1] != L':')
|
|
|
|
{
|
|
|
|
/* UNC path */
|
|
|
|
upath.Buffer += 2;
|
|
|
|
upath.Length -= 2 * sizeof (WCHAR);
|
|
|
|
unc_path = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Path via native NT namespace. Prepend GLOBALROOT prefix
|
2011-06-06 13:02:13 +08:00
|
|
|
to create a valid Win32 path. */
|
2011-02-15 23:25:59 +08:00
|
|
|
PWCHAR buf = (PWCHAR) alloca (upath.Length
|
|
|
|
+ ro_u_globalroot.Length
|
|
|
|
+ sizeof (WCHAR));
|
|
|
|
wcpcpy (wcpcpy (buf, ro_u_globalroot.Buffer), upath.Buffer);
|
|
|
|
upath.Buffer = buf;
|
|
|
|
upath.Length += ro_u_globalroot.Length;
|
2010-08-13 19:51:54 +08:00
|
|
|
}
|
|
|
|
PWSTR eoBuffer = upath.Buffer + (upath.Length / sizeof (WCHAR));
|
|
|
|
/* Remove trailing slash if one exists. */
|
|
|
|
if ((eoBuffer - upath.Buffer) > 3 && eoBuffer[-1] == L'\\')
|
|
|
|
upath.Length -= sizeof (WCHAR);
|
|
|
|
}
|
|
|
|
RtlInitEmptyUnicodeString (&win32,
|
|
|
|
(PWCHAR) crealloc_abort (win32.Buffer,
|
2010-09-22 00:41:17 +08:00
|
|
|
upath.Length
|
|
|
|
+ sizeof (WCHAR)),
|
|
|
|
upath.Length + sizeof (WCHAR));
|
2010-08-13 19:51:54 +08:00
|
|
|
RtlCopyUnicodeString (&win32, &upath);
|
|
|
|
if (unc_path)
|
|
|
|
win32.Buffer[0] = L'\\';
|
|
|
|
}
|
|
|
|
/* Make sure it's NUL-terminated. */
|
|
|
|
win32.Buffer[win32.Length / sizeof (WCHAR)] = L'\0';
|
|
|
|
|
|
|
|
/* Set drive_length, used in path conversion, and error code, used in
|
|
|
|
spawn_guts to decide whether a native Win32 app can be started or not. */
|
|
|
|
if (virtual_path)
|
|
|
|
{
|
|
|
|
drive_length = 0;
|
|
|
|
error = ENOTDIR;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2010-08-13 19:51:54 +08:00
|
|
|
else
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2010-08-13 19:51:54 +08:00
|
|
|
if (!unc_path)
|
2008-05-23 19:00:35 +08:00
|
|
|
drive_length = 2;
|
2010-08-13 19:51:54 +08:00
|
|
|
else
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
PWCHAR ptr = wcschr (win32.Buffer + 2, L'\\');
|
|
|
|
if (ptr)
|
|
|
|
ptr = wcschr (ptr + 1, L'\\');
|
|
|
|
if (ptr)
|
|
|
|
drive_length = ptr - win32.Buffer;
|
|
|
|
else
|
|
|
|
drive_length = win32.Length / sizeof (WCHAR);
|
|
|
|
}
|
2010-08-13 19:51:54 +08:00
|
|
|
if (inaccessible_path)
|
|
|
|
error = EACCES;
|
|
|
|
else if (win32.Length > (MAX_PATH - 2) * sizeof (WCHAR))
|
|
|
|
error = ENAMETOOLONG;
|
|
|
|
else
|
|
|
|
error = 0;
|
|
|
|
}
|
2010-08-28 01:58:45 +08:00
|
|
|
/* Keep the Win32 CWD in sync. Don't check for error, other than for
|
|
|
|
strace output. Try to keep overhead low. */
|
2010-10-09 18:54:13 +08:00
|
|
|
override_win32_cwd (!nat_cwd, old_dismount_count);
|
2008-05-23 19:00:35 +08:00
|
|
|
|
2010-08-13 19:51:54 +08:00
|
|
|
/* Eventually, create POSIX path if it's not set on entry. */
|
|
|
|
tmp_pathbuf tp;
|
|
|
|
if (!posix_cwd)
|
|
|
|
{
|
|
|
|
posix_cwd = (const char *) tp.c_get ();
|
|
|
|
mount_table->conv_to_posix_path (win32.Buffer, (char *) posix_cwd, 0);
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2010-08-13 19:51:54 +08:00
|
|
|
posix = (char *) crealloc_abort (posix, strlen (posix_cwd) + 1);
|
|
|
|
stpcpy (posix, posix_cwd);
|
2000-09-05 11:16:28 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
cwd_lock.release ();
|
2010-08-13 19:51:54 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
const char *
|
|
|
|
cwdstuff::get_error_desc () const
|
|
|
|
{
|
|
|
|
switch (cygheap->cwd.get_error ())
|
|
|
|
{
|
|
|
|
case EACCES:
|
|
|
|
return "has restricted permissions which render it\n"
|
|
|
|
"inaccessible as Win32 working directory";
|
|
|
|
case ENOTDIR:
|
|
|
|
return "is a virtual Cygwin directory which does\n"
|
|
|
|
"not exist for a native Windows application";
|
|
|
|
case ENAMETOOLONG:
|
|
|
|
return "has a path longer than allowed for a\n"
|
|
|
|
"Win32 working directory";
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* That shouldn't occur, unless we defined a new error code
|
|
|
|
in cwdstuff::set. */
|
|
|
|
return "is not accessible for some unknown reason";
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
|
2009-09-22 03:29:16 +08:00
|
|
|
/* Store incoming wchar_t path as current posix cwd. This is called from
|
|
|
|
setlocale so that the cwd is always stored in the right charset. */
|
|
|
|
void
|
|
|
|
cwdstuff::reset_posix (wchar_t *w_cwd)
|
2009-05-13 23:00:06 +08:00
|
|
|
{
|
2009-09-22 03:29:16 +08:00
|
|
|
size_t len = sys_wcstombs (NULL, (size_t) -1, w_cwd);
|
|
|
|
posix = (char *) crealloc_abort (posix, len + 1);
|
|
|
|
sys_wcstombs (posix, len + 1, w_cwd);
|
2009-05-13 23:00:06 +08:00
|
|
|
}
|
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
char *
|
|
|
|
cwdstuff::get (char *buf, int need_posix, int with_chroot, unsigned ulen)
|
|
|
|
{
|
|
|
|
MALLOC_CHECK;
|
|
|
|
|
|
|
|
tmp_pathbuf tp;
|
|
|
|
if (ulen)
|
|
|
|
/* nothing */;
|
|
|
|
else if (buf == NULL)
|
|
|
|
ulen = (unsigned) -1;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
|
|
|
goto out;
|
|
|
|
}
|
2000-09-05 11:16:28 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
cwd_lock.acquire ();
|
2000-09-05 11:16:28 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
char *tocopy;
|
|
|
|
if (!need_posix)
|
|
|
|
{
|
|
|
|
tocopy = tp.c_get ();
|
|
|
|
sys_wcstombs (tocopy, NT_MAX_PATH, win32.Buffer,
|
|
|
|
win32.Length / sizeof (WCHAR));
|
|
|
|
}
|
|
|
|
else
|
|
|
|
tocopy = posix;
|
2003-01-20 10:57:54 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
debug_printf ("posix %s", posix);
|
|
|
|
if (strlen (tocopy) >= ulen)
|
|
|
|
{
|
|
|
|
set_errno (ERANGE);
|
|
|
|
buf = NULL;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (!buf)
|
|
|
|
buf = (char *) malloc (strlen (tocopy) + 1);
|
|
|
|
strcpy (buf, tocopy);
|
|
|
|
if (!buf[0]) /* Should only happen when chroot */
|
|
|
|
strcpy (buf, "/");
|
|
|
|
}
|
2003-01-20 10:57:54 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
cwd_lock.release ();
|
|
|
|
|
|
|
|
out:
|
2013-04-23 17:44:36 +08:00
|
|
|
syscall_printf ("(%s) = cwdstuff::get (%p, %u, %d, %d), errno %d",
|
2008-05-23 19:00:35 +08:00
|
|
|
buf, buf, ulen, need_posix, with_chroot, errno);
|
|
|
|
MALLOC_CHECK;
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
int etc::curr_ix = 0;
|
|
|
|
/* Note that the first elements of the below arrays are unused */
|
|
|
|
bool etc::change_possible[MAX_ETC_FILES + 1];
|
|
|
|
OBJECT_ATTRIBUTES etc::fn[MAX_ETC_FILES + 1];
|
|
|
|
LARGE_INTEGER etc::last_modified[MAX_ETC_FILES + 1];
|
|
|
|
|
|
|
|
int
|
2008-07-25 02:25:52 +08:00
|
|
|
etc::init (int n, POBJECT_ATTRIBUTES attr)
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
|
|
|
if (n > 0)
|
|
|
|
/* ok */;
|
|
|
|
else if (++curr_ix <= MAX_ETC_FILES)
|
|
|
|
n = curr_ix;
|
|
|
|
else
|
|
|
|
api_fatal ("internal error");
|
|
|
|
|
2008-07-25 02:25:52 +08:00
|
|
|
fn[n] = *attr;
|
2008-05-23 19:00:35 +08:00
|
|
|
change_possible[n] = false;
|
|
|
|
test_file_change (n);
|
|
|
|
paranoid_printf ("fn[%d] %S, curr_ix %d", n, fn[n].ObjectName, curr_ix);
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
etc::test_file_change (int n)
|
|
|
|
{
|
|
|
|
NTSTATUS status;
|
|
|
|
FILE_NETWORK_OPEN_INFORMATION fnoi;
|
|
|
|
bool res;
|
|
|
|
|
|
|
|
status = NtQueryFullAttributesFile (&fn[n], &fnoi);
|
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
|
|
|
res = true;
|
|
|
|
memset (last_modified + n, 0, sizeof (last_modified[n]));
|
2013-04-23 17:44:36 +08:00
|
|
|
debug_printf ("NtQueryFullAttributesFile (%S) failed, %y",
|
2008-05-23 19:00:35 +08:00
|
|
|
fn[n].ObjectName, status);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
res = CompareFileTime ((FILETIME *) &fnoi.LastWriteTime,
|
|
|
|
(FILETIME *) last_modified + n) > 0;
|
|
|
|
last_modified[n].QuadPart = fnoi.LastWriteTime.QuadPart;
|
|
|
|
}
|
|
|
|
|
|
|
|
paranoid_printf ("fn[%d] %S res %d", n, fn[n].ObjectName, res);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
etc::dir_changed (int n)
|
|
|
|
{
|
2012-08-01 03:36:16 +08:00
|
|
|
/* io MUST be static because NtNotifyChangeDirectoryFile works asynchronously.
|
|
|
|
It may write into io after the function has left, which may result in all
|
|
|
|
sorts of stack corruption. */
|
|
|
|
static IO_STATUS_BLOCK io NO_COPY;
|
2012-08-01 03:56:32 +08:00
|
|
|
static HANDLE changed_h NO_COPY;
|
2012-08-01 03:36:16 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (!change_possible[n])
|
|
|
|
{
|
|
|
|
NTSTATUS status;
|
|
|
|
|
|
|
|
if (!changed_h)
|
|
|
|
{
|
|
|
|
OBJECT_ATTRIBUTES attr;
|
|
|
|
|
2012-08-01 03:56:32 +08:00
|
|
|
path_conv dir ("/etc");
|
|
|
|
status = NtOpenFile (&changed_h, SYNCHRONIZE | FILE_LIST_DIRECTORY,
|
|
|
|
dir.get_object_attr (attr, sec_none_nih), &io,
|
|
|
|
FILE_SHARE_VALID_FLAGS, FILE_DIRECTORY_FILE);
|
|
|
|
if (!NT_SUCCESS (status))
|
2008-05-23 19:00:35 +08:00
|
|
|
{
|
2007-08-21 20:37:40 +08:00
|
|
|
#ifdef DEBUGGING
|
2013-04-23 17:44:36 +08:00
|
|
|
system_printf ("NtOpenFile (%S) failed, %y",
|
2012-08-01 03:56:32 +08:00
|
|
|
dir.get_nt_native_path (), status);
|
2007-08-21 20:37:40 +08:00
|
|
|
#endif
|
2012-08-01 03:56:32 +08:00
|
|
|
changed_h = INVALID_HANDLE_VALUE;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
status = NtNotifyChangeDirectoryFile (changed_h, NULL, NULL,
|
2008-05-23 19:00:35 +08:00
|
|
|
NULL, &io, NULL, 0,
|
|
|
|
FILE_NOTIFY_CHANGE_LAST_WRITE
|
|
|
|
| FILE_NOTIFY_CHANGE_FILE_NAME,
|
|
|
|
FALSE);
|
2012-08-01 03:56:32 +08:00
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
2003-01-20 10:57:54 +08:00
|
|
|
#ifdef DEBUGGING
|
2013-04-23 17:44:36 +08:00
|
|
|
system_printf ("NtNotifyChangeDirectoryFile (1) failed, %y",
|
2012-08-01 03:56:32 +08:00
|
|
|
status);
|
2003-01-20 10:57:54 +08:00
|
|
|
#endif
|
2012-08-01 03:56:32 +08:00
|
|
|
NtClose (changed_h);
|
|
|
|
changed_h = INVALID_HANDLE_VALUE;
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
|
|
|
}
|
2012-08-01 03:56:32 +08:00
|
|
|
memset (change_possible, true, sizeof (change_possible));
|
2008-05-23 19:00:35 +08:00
|
|
|
}
|
2003-01-20 10:57:54 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
if (changed_h == INVALID_HANDLE_VALUE)
|
|
|
|
change_possible[n] = true;
|
|
|
|
else if (WaitForSingleObject (changed_h, 0) == WAIT_OBJECT_0)
|
|
|
|
{
|
|
|
|
status = NtNotifyChangeDirectoryFile (changed_h, NULL, NULL,
|
|
|
|
NULL, &io, NULL, 0,
|
|
|
|
FILE_NOTIFY_CHANGE_LAST_WRITE
|
|
|
|
| FILE_NOTIFY_CHANGE_FILE_NAME,
|
|
|
|
FALSE);
|
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
2007-08-21 20:37:40 +08:00
|
|
|
#ifdef DEBUGGING
|
2013-04-23 17:44:36 +08:00
|
|
|
system_printf ("NtNotifyChangeDirectoryFile (2) failed, %y",
|
2008-05-23 19:00:35 +08:00
|
|
|
status);
|
2007-08-21 20:37:40 +08:00
|
|
|
#endif
|
2008-05-23 19:00:35 +08:00
|
|
|
NtClose (changed_h);
|
|
|
|
changed_h = INVALID_HANDLE_VALUE;
|
|
|
|
}
|
|
|
|
memset (change_possible, true, sizeof change_possible);
|
|
|
|
}
|
|
|
|
}
|
2008-05-23 15:13:47 +08:00
|
|
|
|
2008-05-23 19:00:35 +08:00
|
|
|
paranoid_printf ("fn[%d] %S change_possible %d",
|
|
|
|
n, fn[n].ObjectName, change_possible[n]);
|
|
|
|
return change_possible[n];
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
etc::file_changed (int n)
|
|
|
|
{
|
|
|
|
bool res = false;
|
|
|
|
if (dir_changed (n) && test_file_change (n))
|
|
|
|
res = true;
|
|
|
|
change_possible[n] = false; /* Change is no longer possible */
|
|
|
|
paranoid_printf ("fn[%d] %S res %d", n, fn[n].ObjectName, res);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* No need to be reentrant or thread-safe according to SUSv3.
|
|
|
|
/ and \\ are treated equally. Leading drive specifiers are
|
|
|
|
kept intact as far as it makes sense. Everything else is
|
|
|
|
POSIX compatible. */
|
|
|
|
extern "C" char *
|
|
|
|
basename (char *path)
|
|
|
|
{
|
|
|
|
static char buf[4];
|
|
|
|
char *c, *d, *bs = path;
|
|
|
|
|
|
|
|
if (!path || !*path)
|
|
|
|
return strcpy (buf, ".");
|
|
|
|
if (isalpha (path[0]) && path[1] == ':')
|
|
|
|
bs += 2;
|
|
|
|
else if (strspn (path, "/\\") > 1)
|
|
|
|
++bs;
|
|
|
|
c = strrchr (bs, '/');
|
|
|
|
if ((d = strrchr (c ?: bs, '\\')) > c)
|
|
|
|
c = d;
|
|
|
|
if (c)
|
|
|
|
{
|
|
|
|
/* Trailing (back)slashes are eliminated. */
|
|
|
|
while (c && c > bs && c[1] == '\0')
|
|
|
|
{
|
|
|
|
*c = '\0';
|
|
|
|
c = strrchr (bs, '/');
|
|
|
|
if ((d = strrchr (c ?: bs, '\\')) > c)
|
|
|
|
c = d;
|
|
|
|
}
|
|
|
|
if (c && (c > bs || c[1]))
|
|
|
|
return c + 1;
|
|
|
|
}
|
|
|
|
else if (!bs[0])
|
|
|
|
{
|
|
|
|
stpncpy (buf, path, bs - path);
|
|
|
|
stpcpy (buf + (bs - path), ".");
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
return path;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* No need to be reentrant or thread-safe according to SUSv3.
|
|
|
|
/ and \\ are treated equally. Leading drive specifiers and
|
|
|
|
leading double (back)slashes are kept intact as far as it
|
|
|
|
makes sense. Everything else is POSIX compatible. */
|
|
|
|
extern "C" char *
|
|
|
|
dirname (char *path)
|
|
|
|
{
|
|
|
|
static char buf[4];
|
|
|
|
char *c, *d, *bs = path;
|
|
|
|
|
|
|
|
if (!path || !*path)
|
|
|
|
return strcpy (buf, ".");
|
|
|
|
if (isalpha (path[0]) && path[1] == ':')
|
|
|
|
bs += 2;
|
|
|
|
else if (strspn (path, "/\\") > 1)
|
|
|
|
++bs;
|
|
|
|
c = strrchr (bs, '/');
|
|
|
|
if ((d = strrchr (c ?: bs, '\\')) > c)
|
|
|
|
c = d;
|
|
|
|
if (c)
|
|
|
|
{
|
|
|
|
/* Trailing (back)slashes are eliminated. */
|
|
|
|
while (c && c > bs && c[1] == '\0')
|
|
|
|
{
|
|
|
|
*c = '\0';
|
|
|
|
c = strrchr (bs, '/');
|
|
|
|
if ((d = strrchr (c ?: bs, '\\')) > c)
|
|
|
|
c = d;
|
|
|
|
}
|
|
|
|
if (!c)
|
|
|
|
strcpy (bs, ".");
|
|
|
|
else if (c > bs)
|
|
|
|
{
|
|
|
|
/* More trailing (back)slashes are eliminated. */
|
|
|
|
while (c > bs && (*c == '/' || *c == '\\'))
|
|
|
|
*c-- = '\0';
|
|
|
|
}
|
|
|
|
else
|
|
|
|
c[1] = '\0';
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
stpncpy (buf, path, bs - path);
|
|
|
|
stpcpy (buf + (bs - path), ".");
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
return path;
|
|
|
|
}
|