ade47a3430
* mount.cc: New file. * path.cc: Move mount-specific stuff into mount.cc. Move common stuff into miscfuncs.cc. Remove unneeded includes. * miscfuncs.cc: Move some common path functions here. * miscfuncs.h: New file. * winsup.h: Move miscelleneous functions to miscfuncs.h. * dcrt0.cc: Remove unneeded includes. * Makefile.in (DLL_OFILES): Add mount.o. * include/cygwin/config.h: Fix a minor typo.
3586 lines
97 KiB
C++
3586 lines
97 KiB
C++
/* path.cc: path support.
|
|
|
|
Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
|
|
2006, 2007, 2008 Red Hat, Inc.
|
|
|
|
This file is part of Cygwin.
|
|
|
|
This software is a copyrighted work licensed under the terms of the
|
|
Cygwin license. Please consult the file "CYGWIN_LICENSE" for
|
|
details. */
|
|
|
|
/* This module's job is to
|
|
- convert between POSIX and Win32 style filenames,
|
|
- support the `mount' functionality,
|
|
- support symlinks for files and directories
|
|
|
|
Pathnames are handled as follows:
|
|
|
|
- A \ or : in a path denotes a pure windows spec.
|
|
- Paths beginning with // (or \\) are not translated (i.e. looked
|
|
up in the mount table) and are assumed to be UNC path names.
|
|
|
|
The goal in the above set of rules is to allow both POSIX and Win32
|
|
flavors of pathnames without either interfering. The rules are
|
|
intended to be as close to a superset of both as possible.
|
|
|
|
Note that you can have more than one path to a file. The mount
|
|
table is always prefered when translating Win32 paths to POSIX
|
|
paths. Win32 paths in mount table entries may be UNC paths or
|
|
standard Win32 paths starting with <drive-letter>:
|
|
|
|
Text vs Binary issues are not considered here in path style
|
|
decisions, although the appropriate flags are retrieved and
|
|
stored in various structures.
|
|
|
|
Removing mounted filesystem support would simplify things greatly,
|
|
but having it gives us a mechanism of treating disk that lives on a
|
|
UNIX machine as having UNIX semantics [it allows one to edit a text
|
|
file on that disk and not have cr's magically appear and perhaps
|
|
break apps running on UNIX boxes]. It also useful to be able to
|
|
layout a hierarchy without changing the underlying directories.
|
|
|
|
The semantics of mounting file systems is not intended to precisely
|
|
follow normal UNIX systems.
|
|
|
|
Each DOS drive is defined to have a current directory. Supporting
|
|
this would complicate things so for now things are defined so that
|
|
c: means c:\.
|
|
*/
|
|
|
|
#include "winsup.h"
|
|
#include "miscfuncs.h"
|
|
#include <ctype.h>
|
|
#include <winioctl.h>
|
|
#include <wingdi.h>
|
|
#include <winuser.h>
|
|
#include <winnetwk.h>
|
|
#include <shlobj.h>
|
|
#include <sys/cygwin.h>
|
|
#include "cygerrno.h"
|
|
#include "security.h"
|
|
#include "path.h"
|
|
#include "fhandler.h"
|
|
#include "dtable.h"
|
|
#include "cygheap.h"
|
|
#include "shared_info.h"
|
|
#include "cygtls.h"
|
|
#include "tls_pbuf.h"
|
|
#include "environ.h"
|
|
#include <assert.h>
|
|
#include <ntdll.h>
|
|
#include <wchar.h>
|
|
|
|
bool dos_file_warning = true;
|
|
|
|
struct symlink_info
|
|
{
|
|
char contents[SYMLINK_MAX + 1];
|
|
char *ext_here;
|
|
int extn;
|
|
unsigned pflags;
|
|
DWORD fileattr;
|
|
int issymlink;
|
|
bool ext_tacked_on;
|
|
int error;
|
|
bool case_clash;
|
|
bool isdevice;
|
|
_major_t major;
|
|
_minor_t minor;
|
|
_mode_t mode;
|
|
int check (char *path, const suffix_info *suffixes, unsigned opt);
|
|
int set (char *path);
|
|
bool parse_device (const char *);
|
|
bool case_check (char *path);
|
|
int check_sysfile (HANDLE h);
|
|
int check_shortcut (HANDLE h);
|
|
int check_reparse_point (HANDLE h);
|
|
int posixify (char *srcbuf);
|
|
bool set_error (int);
|
|
};
|
|
|
|
muto NO_COPY cwdstuff::cwd_lock;
|
|
|
|
int pcheck_case = PCHECK_RELAXED; /* Determines the case check behaviour. */
|
|
|
|
static const GUID GUID_shortcut
|
|
= { 0x00021401L, 0, 0, 0xc0, 0, 0, 0, 0, 0, 0, 0x46 };
|
|
|
|
enum {
|
|
WSH_FLAG_IDLIST = 0x01, /* Contains an ITEMIDLIST. */
|
|
WSH_FLAG_FILE = 0x02, /* Contains a file locator element. */
|
|
WSH_FLAG_DESC = 0x04, /* Contains a description. */
|
|
WSH_FLAG_RELPATH = 0x08, /* Contains a relative path. */
|
|
WSH_FLAG_WD = 0x10, /* Contains a working dir. */
|
|
WSH_FLAG_CMDLINE = 0x20, /* Contains command line args. */
|
|
WSH_FLAG_ICON = 0x40 /* Contains a custom icon. */
|
|
};
|
|
|
|
struct win_shortcut_hdr
|
|
{
|
|
DWORD size; /* Header size in bytes. Must contain 0x4c. */
|
|
GUID magic; /* GUID of shortcut files. */
|
|
DWORD flags; /* Content flags. See above. */
|
|
|
|
/* The next fields from attr to icon_no are always set to 0 in Cygwin
|
|
and U/Win shortcuts. */
|
|
DWORD attr; /* Target file attributes. */
|
|
FILETIME ctime; /* These filetime items are never touched by the */
|
|
FILETIME mtime; /* system, apparently. Values don't matter. */
|
|
FILETIME atime;
|
|
DWORD filesize; /* Target filesize. */
|
|
DWORD icon_no; /* Icon number. */
|
|
|
|
DWORD run; /* Values defined in winuser.h. Use SW_NORMAL. */
|
|
DWORD hotkey; /* Hotkey value. Set to 0. */
|
|
DWORD dummy[2]; /* Future extension probably. Always 0. */
|
|
};
|
|
|
|
/* Return non-zero if PATH1 is a prefix of PATH2.
|
|
Both are assumed to be of the same path style and / vs \ usage.
|
|
Neither may be "".
|
|
LEN1 = strlen (PATH1). It's passed because often it's already known.
|
|
|
|
Examples:
|
|
/foo/ is a prefix of /foo <-- may seem odd, but desired
|
|
/foo is a prefix of /foo/
|
|
/ is a prefix of /foo/bar
|
|
/ is not a prefix of foo/bar
|
|
foo/ is a prefix foo/bar
|
|
/foo is not a prefix of /foobar
|
|
*/
|
|
|
|
int
|
|
path_prefix_p (const char *path1, const char *path2, int len1)
|
|
{
|
|
/* Handle case where PATH1 has trailing '/' and when it doesn't. */
|
|
if (len1 > 0 && isdirsep (path1[len1 - 1]))
|
|
len1--;
|
|
|
|
if (len1 == 0)
|
|
return isdirsep (path2[0]) && !isdirsep (path2[1]);
|
|
|
|
if (isdirsep (path2[len1]) || path2[len1] == 0 || path1[len1 - 1] == ':')
|
|
return pathnmatch (path1, path2, len1);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* Return non-zero if paths match in first len chars.
|
|
Check is dependent of the case sensitivity setting. */
|
|
int
|
|
pathnmatch (const char *path1, const char *path2, int len)
|
|
{
|
|
return pcheck_case == PCHECK_STRICT ? !strncmp (path1, path2, len)
|
|
: strncasematch (path1, path2, len);
|
|
}
|
|
|
|
/* Return non-zero if paths match. Check is dependent of the case
|
|
sensitivity setting. */
|
|
int
|
|
pathmatch (const char *path1, const char *path2)
|
|
{
|
|
return pcheck_case == PCHECK_STRICT ? !strcmp (path1, path2)
|
|
: strcasematch (path1, path2);
|
|
}
|
|
|
|
/* TODO: This function is used in mkdir and rmdir to generate correct
|
|
error messages in case of paths ending in /. or /.. components.
|
|
Right now, normalize_posix_path will just normalize
|
|
those components away, which changes the semantics. */
|
|
bool
|
|
has_dot_last_component (const char *dir, bool test_dot_dot)
|
|
{
|
|
/* SUSv3: . and .. are not allowed as last components in various system
|
|
calls. Don't test for backslash path separator since that's a Win32
|
|
path following Win32 rules. */
|
|
const char *last_comp = strrchr (dir, '/');
|
|
if (!last_comp)
|
|
last_comp = dir;
|
|
else {
|
|
/* Check for trailing slash. If so, hop back to the previous slash. */
|
|
if (!last_comp[1])
|
|
while (last_comp > dir)
|
|
if (*--last_comp == '/')
|
|
break;
|
|
if (*last_comp == '/')
|
|
++last_comp;
|
|
}
|
|
return last_comp[0] == '.'
|
|
&& ((last_comp[1] == '\0' || last_comp[1] == '/')
|
|
|| (test_dot_dot
|
|
&& last_comp[1] == '.'
|
|
&& (last_comp[2] == '\0' || last_comp[2] == '/')));
|
|
}
|
|
|
|
/* Normalize a POSIX path.
|
|
All duplicate /'s, except for 2 leading /'s, are deleted.
|
|
The result is 0 for success, or an errno error value. */
|
|
|
|
int
|
|
normalize_posix_path (const char *src, char *dst, char *&tail)
|
|
{
|
|
const char *in_src = src;
|
|
char *dst_start = dst;
|
|
syscall_printf ("src %s", src);
|
|
|
|
if ((isdrive (src) && isdirsep (src[2])) || *src == '\\')
|
|
goto win32_path;
|
|
|
|
tail = dst;
|
|
if (!isslash (src[0]))
|
|
{
|
|
if (!cygheap->cwd.get (dst))
|
|
return get_errno ();
|
|
tail = strchr (tail, '\0');
|
|
if (isslash (dst[0]) && isslash (dst[1]))
|
|
++dst_start;
|
|
if (*src == '.')
|
|
{
|
|
if (tail == dst_start + 1 && *dst_start == '/')
|
|
tail--;
|
|
goto sawdot;
|
|
}
|
|
if (tail > dst && !isslash (tail[-1]))
|
|
*tail++ = '/';
|
|
}
|
|
/* Two leading /'s? If so, preserve them. */
|
|
else if (isslash (src[1]) && !isslash (src[2]))
|
|
{
|
|
*tail++ = *src++;
|
|
++dst_start;
|
|
}
|
|
|
|
while (*src)
|
|
{
|
|
if (*src == '\\')
|
|
goto win32_path;
|
|
/* Strip runs of /'s. */
|
|
if (!isslash (*src))
|
|
*tail++ = *src++;
|
|
else
|
|
{
|
|
while (*++src)
|
|
{
|
|
if (isslash (*src))
|
|
continue;
|
|
|
|
if (*src != '.')
|
|
break;
|
|
|
|
sawdot:
|
|
if (src[1] != '.')
|
|
{
|
|
if (!src[1])
|
|
{
|
|
*tail++ = '/';
|
|
goto done;
|
|
}
|
|
if (!isslash (src[1]))
|
|
break;
|
|
}
|
|
else if (src[2] && !isslash (src[2]))
|
|
break;
|
|
else
|
|
{
|
|
while (tail > dst_start && !isslash (*--tail))
|
|
continue;
|
|
src++;
|
|
}
|
|
}
|
|
|
|
*tail++ = '/';
|
|
}
|
|
if ((tail - dst) >= NT_MAX_PATH)
|
|
{
|
|
debug_printf ("ENAMETOOLONG = normalize_posix_path (%s)", src);
|
|
return ENAMETOOLONG;
|
|
}
|
|
}
|
|
|
|
done:
|
|
*tail = '\0';
|
|
|
|
debug_printf ("%s = normalize_posix_path (%s)", dst, in_src);
|
|
return 0;
|
|
|
|
win32_path:
|
|
int err = normalize_win32_path (in_src, dst, tail);
|
|
if (!err)
|
|
for (char *p = dst; (p = strchr (p, '\\')); p++)
|
|
*p = '/';
|
|
return err ?: -1;
|
|
}
|
|
|
|
inline void
|
|
path_conv::add_ext_from_sym (symlink_info &sym)
|
|
{
|
|
if (sym.ext_here && *sym.ext_here)
|
|
{
|
|
known_suffix = path + sym.extn;
|
|
if (sym.ext_tacked_on)
|
|
strcpy (known_suffix, sym.ext_here);
|
|
}
|
|
}
|
|
|
|
static void __stdcall mkrelpath (char *dst) __attribute__ ((regparm (2)));
|
|
static void __stdcall
|
|
mkrelpath (char *path)
|
|
{
|
|
tmp_pathbuf tp;
|
|
char *cwd_win32 = tp.c_get ();
|
|
if (!cygheap->cwd.get (cwd_win32, 0))
|
|
return;
|
|
|
|
unsigned cwdlen = strlen (cwd_win32);
|
|
if (!path_prefix_p (cwd_win32, path, cwdlen))
|
|
return;
|
|
|
|
size_t n = strlen (path);
|
|
if (n < cwdlen)
|
|
return;
|
|
|
|
char *tail = path;
|
|
if (n == cwdlen)
|
|
tail += cwdlen;
|
|
else
|
|
tail += isdirsep (cwd_win32[cwdlen - 1]) ? cwdlen : cwdlen + 1;
|
|
|
|
memmove (path, tail, strlen (tail) + 1);
|
|
if (!*path)
|
|
strcpy (path, ".");
|
|
}
|
|
|
|
/* Beginning with Samba 3.0.28a, Samba allows to get version information using
|
|
the ExtendedInfo member returned by a FileFsObjectIdInformation request.
|
|
We just store the samba_version information for now. Older versions than
|
|
3.2 are still guessed at by testing the file system flags. */
|
|
#define SAMBA_EXTENDED_INFO_MAGIC 0x536d4261 /* "SmBa" */
|
|
#define SAMBA_EXTENDED_INFO_VERSION_STRING_LENGTH 28
|
|
#pragma pack(push,4)
|
|
struct smb_extended_info {
|
|
DWORD samba_magic; /* Always SAMBA_EXTENDED_INFO_MAGIC */
|
|
DWORD samba_version; /* Major/Minor/Release/Revision */
|
|
DWORD samba_subversion; /* Prerelease/RC/Vendor patch */
|
|
LARGE_INTEGER samba_gitcommitdate;
|
|
char samba_version_string[SAMBA_EXTENDED_INFO_VERSION_STRING_LENGTH];
|
|
};
|
|
#pragma pack(pop)
|
|
|
|
bool
|
|
fs_info::update (PUNICODE_STRING upath, bool exists)
|
|
{
|
|
NTSTATUS status = STATUS_OBJECT_NAME_NOT_FOUND;
|
|
HANDLE vol;
|
|
OBJECT_ATTRIBUTES attr;
|
|
IO_STATUS_BLOCK io;
|
|
bool no_media = false;
|
|
FILE_FS_DEVICE_INFORMATION ffdi;
|
|
FILE_FS_OBJECTID_INFORMATION ffoi;
|
|
PFILE_FS_ATTRIBUTE_INFORMATION pffai;
|
|
const DWORD fvi_size = (NAME_MAX + 1) * sizeof (WCHAR)
|
|
+ sizeof (FILE_FS_VOLUME_INFORMATION);
|
|
PFILE_FS_VOLUME_INFORMATION pfvi = (PFILE_FS_VOLUME_INFORMATION)
|
|
alloca (fvi_size);
|
|
UNICODE_STRING fsname, testname;
|
|
|
|
InitializeObjectAttributes (&attr, upath, OBJ_CASE_INSENSITIVE, NULL, NULL);
|
|
if (exists)
|
|
status = NtOpenFile (&vol, READ_CONTROL, &attr, &io, FILE_SHARE_VALID_FLAGS,
|
|
FILE_OPEN_FOR_BACKUP_INTENT);
|
|
while (!NT_SUCCESS (status)
|
|
&& (attr.ObjectName->Length > 7 * sizeof (WCHAR)
|
|
|| status == STATUS_NO_MEDIA_IN_DEVICE))
|
|
{
|
|
UNICODE_STRING dir;
|
|
RtlSplitUnicodePath (attr.ObjectName, &dir, NULL);
|
|
attr.ObjectName = &dir;
|
|
if (status == STATUS_NO_MEDIA_IN_DEVICE)
|
|
{
|
|
no_media = true;
|
|
dir.Length = 6 * sizeof (WCHAR);
|
|
}
|
|
else if (dir.Length > 7 * sizeof (WCHAR))
|
|
dir.Length -= sizeof (WCHAR);
|
|
status = NtOpenFile (&vol, READ_CONTROL, &attr, &io,
|
|
FILE_SHARE_VALID_FLAGS, FILE_OPEN_FOR_BACKUP_INTENT);
|
|
}
|
|
if (!NT_SUCCESS (status))
|
|
{
|
|
debug_printf ("Cannot access path %S, status %08lx", attr.ObjectName,
|
|
status);
|
|
clear ();
|
|
NtClose (vol);
|
|
return false;
|
|
}
|
|
status = NtQueryVolumeInformationFile (vol, &io, pfvi, fvi_size,
|
|
FileFsVolumeInformation);
|
|
sernum = NT_SUCCESS (status) ? pfvi->VolumeSerialNumber : 0;
|
|
status = NtQueryVolumeInformationFile (vol, &io, &ffdi, sizeof ffdi,
|
|
FileFsDeviceInformation);
|
|
if (!NT_SUCCESS (status))
|
|
ffdi.DeviceType = ffdi.Characteristics = 0;
|
|
|
|
if (ffdi.Characteristics & FILE_REMOTE_DEVICE
|
|
|| (!ffdi.DeviceType
|
|
&& RtlEqualUnicodePathPrefix (attr.ObjectName, L"\\??\\UNC\\", TRUE)))
|
|
is_remote_drive (true);
|
|
else
|
|
is_remote_drive (false);
|
|
|
|
if (!no_media)
|
|
{
|
|
const ULONG size = sizeof (FILE_FS_ATTRIBUTE_INFORMATION)
|
|
+ NAME_MAX * sizeof (WCHAR);
|
|
pffai = (PFILE_FS_ATTRIBUTE_INFORMATION) alloca (size);
|
|
status = NtQueryVolumeInformationFile (vol, &io, pffai, size,
|
|
FileFsAttributeInformation);
|
|
}
|
|
if (no_media || !NT_SUCCESS (status))
|
|
{
|
|
debug_printf ("Cannot get volume attributes (%S), %08lx",
|
|
attr.ObjectName, status);
|
|
has_buggy_open (false);
|
|
flags (0);
|
|
NtClose (vol);
|
|
return false;
|
|
}
|
|
flags (pffai->FileSystemAttributes);
|
|
/* Should be reevaluated for each new OS. Right now this mask is valid up
|
|
to Vista. The important point here is to test only flags indicating
|
|
capabilities and to ignore flags indicating a specific state of this
|
|
volume. At present these flags to ignore are FILE_VOLUME_IS_COMPRESSED
|
|
and FILE_READ_ONLY_VOLUME. */
|
|
#define GETVOLINFO_VALID_MASK (0x003701ffUL)
|
|
#define TEST_GVI(f,m) (((f) & GETVOLINFO_VALID_MASK) == (m))
|
|
|
|
/* Volume quotas are potentially supported since Samba 3.0, object ids and
|
|
the unicode on disk flag since Samba 3.2. */
|
|
#define SAMBA_IGNORE (FILE_VOLUME_QUOTAS \
|
|
| FILE_SUPPORTS_OBJECT_IDS \
|
|
| FILE_UNICODE_ON_DISK)
|
|
#define FS_IS_SAMBA TEST_GVI(flags () & ~SAMBA_IGNORE, \
|
|
FILE_CASE_SENSITIVE_SEARCH \
|
|
| FILE_CASE_PRESERVED_NAMES \
|
|
| FILE_PERSISTENT_ACLS)
|
|
#define FS_IS_NETAPP_DATAONTAP TEST_GVI(flags (), \
|
|
FILE_CASE_SENSITIVE_SEARCH \
|
|
| FILE_CASE_PRESERVED_NAMES \
|
|
| FILE_UNICODE_ON_DISK \
|
|
| FILE_PERSISTENT_ACLS \
|
|
| FILE_NAMED_STREAMS)
|
|
RtlInitCountedUnicodeString (&fsname, pffai->FileSystemName,
|
|
pffai->FileSystemNameLength);
|
|
is_fat (RtlEqualUnicodePathPrefix (&fsname, L"FAT", TRUE));
|
|
RtlInitUnicodeString (&testname, L"NTFS");
|
|
if (is_remote_drive ())
|
|
{
|
|
/* This always fails on NT4. */
|
|
status = NtQueryVolumeInformationFile (vol, &io, &ffoi, sizeof ffoi,
|
|
FileFsObjectIdInformation);
|
|
if (NT_SUCCESS (status))
|
|
{
|
|
smb_extended_info *extended_info = (smb_extended_info *)
|
|
&ffoi.ExtendedInfo;
|
|
if (extended_info->samba_magic == SAMBA_EXTENDED_INFO_MAGIC)
|
|
{
|
|
is_samba (true);
|
|
samba_version (extended_info->samba_version);
|
|
}
|
|
}
|
|
/* Test for Samba on NT4 or for older Samba releases not supporting
|
|
extended info. */
|
|
if (!is_samba ())
|
|
is_samba (RtlEqualUnicodeString (&fsname, &testname, FALSE)
|
|
&& FS_IS_SAMBA);
|
|
|
|
is_netapp (!is_samba ()
|
|
&& RtlEqualUnicodeString (&fsname, &testname, FALSE)
|
|
&& FS_IS_NETAPP_DATAONTAP);
|
|
}
|
|
is_ntfs (RtlEqualUnicodeString (&fsname, &testname, FALSE)
|
|
&& !is_samba () && !is_netapp ());
|
|
RtlInitUnicodeString (&testname, L"NFS");
|
|
is_nfs (RtlEqualUnicodeString (&fsname, &testname, FALSE));
|
|
is_cdrom (ffdi.DeviceType == FILE_DEVICE_CD_ROM);
|
|
|
|
has_acls ((flags () & FS_PERSISTENT_ACLS)
|
|
&& (allow_smbntsec || !is_remote_drive ()));
|
|
hasgood_inode (((flags () & FILE_PERSISTENT_ACLS) && !is_netapp ())
|
|
|| is_nfs ());
|
|
/* Known file systems with buggy open calls. Further explanation
|
|
in fhandler.cc (fhandler_disk_file::open). */
|
|
RtlInitUnicodeString (&testname, L"SUNWNFS");
|
|
has_buggy_open (RtlEqualUnicodeString (&fsname, &testname, FALSE));
|
|
|
|
NtClose (vol);
|
|
return true;
|
|
}
|
|
|
|
void
|
|
path_conv::fillin (HANDLE h)
|
|
{
|
|
IO_STATUS_BLOCK io;
|
|
FILE_BASIC_INFORMATION fbi;
|
|
|
|
if (NT_SUCCESS (NtQueryInformationFile (h, &io, &fbi, sizeof fbi,
|
|
FileBasicInformation)))
|
|
fileattr = fbi.FileAttributes;
|
|
else
|
|
fileattr = INVALID_FILE_ATTRIBUTES;
|
|
}
|
|
|
|
void
|
|
path_conv::set_normalized_path (const char *path_copy, bool strip_tail)
|
|
{
|
|
char *p = strchr (path_copy, '\0');
|
|
|
|
if (strip_tail)
|
|
{
|
|
while (*--p == '.' || *p == ' ')
|
|
continue;
|
|
*++p = '\0';
|
|
}
|
|
|
|
size_t n = 1 + p - path_copy;
|
|
|
|
normalized_path = path + sizeof (path) - n;
|
|
|
|
char *eopath = strchr (path, '\0');
|
|
if (normalized_path > eopath)
|
|
normalized_path_size = n;
|
|
else
|
|
{
|
|
normalized_path = (char *) cmalloc_abort (HEAP_STR, n);
|
|
normalized_path_size = 0;
|
|
}
|
|
|
|
memcpy (normalized_path, path_copy, n);
|
|
}
|
|
|
|
WCHAR tfx_chars[] NO_COPY = {
|
|
0, 1, 2, 3, 4, 5, 6, 7,
|
|
8, 9, 10, 11, 12, 13, 14, 15,
|
|
16, 17, 18, 19, 20, 21, 22, 23,
|
|
24, 25, 26, 27, 28, 29, 30, 31,
|
|
32, '!', 0xf000 | '"', '#', '$', '%', '&', 39,
|
|
'(', ')', 0xf000 | '*', '+', ',', '-', '.', '/',
|
|
'0', '1', '2', '3', '4', '5', '6', '7',
|
|
'8', '9', 0xf000 | ':', ';', 0xf000 | '<', '=', 0xf000 | '>', 0xf000 | '?',
|
|
'@', 'A', 'B', 'C', 'D', 'E', 'F', 'G',
|
|
'H', 'I', 'J', 'K', 'L', 'M', 'N', 'O',
|
|
'P', 'Q', 'R', 'S', 'T', 'U', 'V', 'W',
|
|
'X', 'Y', 'Z', '[', '\\', ']', '^', '_',
|
|
'`', 'a', 'b', 'c', 'd', 'e', 'f', 'g',
|
|
'h', 'i', 'j', 'k', 'l', 'm', 'n', 'o',
|
|
'p', 'q', 'r', 's', 't', 'u', 'v', 'w',
|
|
'x', 'y', 'z', '{', 0xf000 | '|', '}', '~', 127
|
|
};
|
|
|
|
WCHAR tfx_chars_managed[] NO_COPY = {
|
|
0, 1, 2, 3, 4, 5, 6, 7,
|
|
8, 9, 10, 11, 12, 13, 14, 15,
|
|
16, 17, 18, 19, 20, 21, 22, 23,
|
|
24, 25, 26, 27, 28, 29, 30, 31,
|
|
32, '!', 0xf000 | '"', '#', '$', '%', '&', 39,
|
|
'(', ')', 0xf000 | '*', '+', ',', '-', '.', '/',
|
|
'0', '1', '2', '3', '4', '5', '6', '7',
|
|
'8', '9', 0xf000 | ':', ';', 0xf000 | '<', '=', 0xf000 | '>', 0xf000 | '?',
|
|
'@', 0xf000 | 'A', 0xf000 | 'B', 0xf000 | 'C', 0xf000 | 'D', 0xf000 | 'E', 0xf000 | 'F', 0xf000 | 'G',
|
|
0xf000 | 'H', 0xf000 | 'I', 0xf000 | 'J', 0xf000 | 'K', 0xf000 | 'L', 0xf000 | 'M', 0xf000 | 'N', 0xf000 | 'O',
|
|
0xf000 | 'P', 0xf000 | 'Q', 0xf000 | 'R', 0xf000 | 'S', 0xf000 | 'T', 0xf000 | 'U', 0xf000 | 'V', 0xf000 | 'W',
|
|
0xf000 | 'X', 0xf000 | 'Y', 0xf000 | 'Z', '[', '\\', ']', '^', '_',
|
|
'`', 'a', 'b', 'c', 'd', 'e', 'f', 'g',
|
|
'h', 'i', 'j', 'k', 'l', 'm', 'n', 'o',
|
|
'p', 'q', 'r', 's', 't', 'u', 'v', 'w',
|
|
'x', 'y', 'z', '{', 0xf000 | '|', '}', '~', 127
|
|
};
|
|
|
|
static void
|
|
transform_chars (PUNICODE_STRING upath, USHORT start_idx, bool managed)
|
|
{
|
|
register PWCHAR buf = upath->Buffer;
|
|
register PWCHAR end = buf + upath->Length / sizeof (WCHAR) - 1;
|
|
register PWCHAR tfx = managed ? tfx_chars_managed : tfx_chars;
|
|
for (buf += start_idx; buf <= end; ++buf)
|
|
if (*buf < 128)
|
|
*buf = tfx[*buf];
|
|
/* Win32 can't handle trailing dots and spaces. Transform the last of them
|
|
to the private use area, too, to create a valid Win32 filename. */
|
|
if (*end == L'.' || *end == L' ')
|
|
*end |= 0xf000;
|
|
}
|
|
|
|
PUNICODE_STRING
|
|
get_nt_native_path (const char *path, UNICODE_STRING& upath, bool managed)
|
|
{
|
|
upath.Length = 0;
|
|
if (path[0] == '/') /* special path w/o NT path representation. */
|
|
str2uni_cat (upath, path);
|
|
else if (path[0] != '\\') /* X:\... or NUL, etc. */
|
|
{
|
|
str2uni_cat (upath, "\\??\\");
|
|
str2uni_cat (upath, path);
|
|
transform_chars (&upath, 7, managed);
|
|
}
|
|
else if (path[1] != '\\') /* \Device\... */
|
|
str2uni_cat (upath, path);
|
|
else if ((path[2] != '.' && path[2] != '?')
|
|
|| path[3] != '\\') /* \\server\share\... */
|
|
{
|
|
str2uni_cat (upath, "\\??\\UNC\\");
|
|
str2uni_cat (upath, path + 2);
|
|
transform_chars (&upath, 8, managed);
|
|
}
|
|
else /* \\.\device or \\?\foo */
|
|
{
|
|
str2uni_cat (upath, "\\??\\");
|
|
str2uni_cat (upath, path + 4);
|
|
}
|
|
return &upath;
|
|
}
|
|
|
|
PUNICODE_STRING
|
|
path_conv::get_nt_native_path ()
|
|
{
|
|
if (!wide_path)
|
|
{
|
|
uni_path.Length = 0;
|
|
uni_path.MaximumLength = (strlen (path) + 10) * sizeof (WCHAR);
|
|
wide_path = (PWCHAR) cmalloc_abort (HEAP_STR, uni_path.MaximumLength);
|
|
uni_path.Buffer = wide_path;
|
|
::get_nt_native_path (path, uni_path, isencoded ());
|
|
}
|
|
return &uni_path;
|
|
}
|
|
|
|
POBJECT_ATTRIBUTES
|
|
path_conv::get_object_attr (OBJECT_ATTRIBUTES &attr, SECURITY_ATTRIBUTES &sa)
|
|
{
|
|
if (!get_nt_native_path ())
|
|
return NULL;
|
|
InitializeObjectAttributes (&attr, &uni_path,
|
|
OBJ_CASE_INSENSITIVE
|
|
| (sa.bInheritHandle ? OBJ_INHERIT : 0),
|
|
NULL, sa.lpSecurityDescriptor);
|
|
return &attr;
|
|
}
|
|
|
|
PWCHAR
|
|
path_conv::get_wide_win32_path (PWCHAR wc)
|
|
{
|
|
get_nt_native_path ();
|
|
if (!wide_path || wide_path[1] != L'?') /* Native NT device path */
|
|
return NULL;
|
|
wcscpy (wc, wide_path);
|
|
wc[1] = L'\\';
|
|
return wc;
|
|
}
|
|
|
|
void
|
|
warn_msdos (const char *src)
|
|
{
|
|
if (user_shared->warned_msdos || !dos_file_warning)
|
|
return;
|
|
tmp_pathbuf tp;
|
|
char *posix_path = tp.c_get ();
|
|
small_printf ("cygwin warning:\n");
|
|
if (cygwin_conv_path (CCP_WIN_A_TO_POSIX | CCP_RELATIVE, src,
|
|
posix_path, NT_MAX_PATH))
|
|
small_printf (" MS-DOS style path detected: %s\n POSIX equivalent preferred.\n",
|
|
src);
|
|
else
|
|
small_printf (" MS-DOS style path detected: %s\n Preferred POSIX equivalent is: %s\n",
|
|
src, posix_path);
|
|
small_printf (" CYGWIN environment variable option \"nodosfilewarning\" turns off this warning.\n"
|
|
" Consult the user's guide for more details about POSIX paths:\n"
|
|
" http://cygwin.com/cygwin-ug-net/using.html#using-pathnames\n");
|
|
user_shared->warned_msdos = true;
|
|
}
|
|
|
|
static DWORD
|
|
getfileattr (const char *path, bool managed) /* path has to be always absolute. */
|
|
{
|
|
tmp_pathbuf tp;
|
|
UNICODE_STRING upath;
|
|
OBJECT_ATTRIBUTES attr;
|
|
FILE_BASIC_INFORMATION fbi;
|
|
NTSTATUS status;
|
|
IO_STATUS_BLOCK io;
|
|
|
|
tp.u_get (&upath);
|
|
InitializeObjectAttributes (&attr, &upath, OBJ_CASE_INSENSITIVE, NULL, NULL);
|
|
get_nt_native_path (path, upath, managed);
|
|
|
|
status = NtQueryAttributesFile (&attr, &fbi);
|
|
if (NT_SUCCESS (status))
|
|
return fbi.FileAttributes;
|
|
|
|
if (status != STATUS_OBJECT_NAME_NOT_FOUND
|
|
&& status != STATUS_NO_SUCH_FILE) /* File not found on 9x share */
|
|
{
|
|
/* File exists but access denied. Try to get attribute through
|
|
directory query. */
|
|
UNICODE_STRING dirname, basename;
|
|
HANDLE dir;
|
|
FILE_DIRECTORY_INFORMATION fdi;
|
|
|
|
RtlSplitUnicodePath (&upath, &dirname, &basename);
|
|
InitializeObjectAttributes (&attr, &dirname,
|
|
OBJ_CASE_INSENSITIVE, NULL, NULL);
|
|
status = NtOpenFile (&dir, SYNCHRONIZE | FILE_LIST_DIRECTORY,
|
|
&attr, &io, FILE_SHARE_VALID_FLAGS,
|
|
FILE_SYNCHRONOUS_IO_NONALERT
|
|
| FILE_OPEN_FOR_BACKUP_INTENT
|
|
| FILE_DIRECTORY_FILE);
|
|
if (NT_SUCCESS (status))
|
|
{
|
|
status = NtQueryDirectoryFile (dir, NULL, NULL, 0, &io,
|
|
&fdi, sizeof fdi,
|
|
FileDirectoryInformation,
|
|
TRUE, &basename, TRUE);
|
|
NtClose (dir);
|
|
if (NT_SUCCESS (status) || status == STATUS_BUFFER_OVERFLOW)
|
|
return fdi.FileAttributes;
|
|
}
|
|
}
|
|
SetLastError (RtlNtStatusToDosError (status));
|
|
return INVALID_FILE_ATTRIBUTES;
|
|
}
|
|
|
|
/* Convert an arbitrary path SRC to a pure Win32 path, suitable for
|
|
passing to Win32 API routines.
|
|
|
|
If an error occurs, `error' is set to the errno value.
|
|
Otherwise it is set to 0.
|
|
|
|
follow_mode values:
|
|
SYMLINK_FOLLOW - convert to PATH symlink points to
|
|
SYMLINK_NOFOLLOW - convert to PATH of symlink itself
|
|
SYMLINK_IGNORE - do not check PATH for symlinks
|
|
SYMLINK_CONTENTS - just return symlink contents
|
|
*/
|
|
|
|
/* TODO: This implementation is only preliminary. For internal
|
|
purposes it's necessary to have a path_conv::check function which
|
|
takes a UNICODE_STRING src path, otherwise we waste a lot of time
|
|
for converting back and forth. The below implementation does
|
|
realy nothing but converting to char *, until path_conv handles
|
|
wide-char paths directly. */
|
|
void
|
|
path_conv::check (const UNICODE_STRING *src, unsigned opt,
|
|
const suffix_info *suffixes)
|
|
{
|
|
tmp_pathbuf tp;
|
|
char *path = tp.c_get ();
|
|
|
|
user_shared->warned_msdos = true;
|
|
sys_wcstombs (path, NT_MAX_PATH, src->Buffer, src->Length / sizeof (WCHAR));
|
|
path_conv::check (path, opt, suffixes);
|
|
}
|
|
|
|
void
|
|
path_conv::check (const char *src, unsigned opt,
|
|
const suffix_info *suffixes)
|
|
{
|
|
/* The tmp_buf array is used when expanding symlinks. It is NT_MAX_PATH * 2
|
|
in length so that we can hold the expanded symlink plus a trailer. */
|
|
tmp_pathbuf tp;
|
|
char *path_copy = tp.c_get ();
|
|
char *pathbuf = tp.c_get ();
|
|
char *tmp_buf = tp.t_get ();
|
|
symlink_info sym;
|
|
bool need_directory = 0;
|
|
bool saw_symlinks = 0;
|
|
bool is_relpath;
|
|
char *tail, *path_end;
|
|
|
|
#if 0
|
|
static path_conv last_path_conv;
|
|
static char last_src[CYG_MAX_PATH];
|
|
|
|
if (*last_src && strcmp (last_src, src) == 0)
|
|
{
|
|
*this = last_path_conv;
|
|
return;
|
|
}
|
|
#endif
|
|
|
|
myfault efault;
|
|
if (efault.faulted ())
|
|
{
|
|
error = EFAULT;
|
|
return;
|
|
}
|
|
int loop = 0;
|
|
path_flags = 0;
|
|
known_suffix = NULL;
|
|
fileattr = INVALID_FILE_ATTRIBUTES;
|
|
wide_path = NULL;
|
|
case_clash = false;
|
|
memset (&dev, 0, sizeof (dev));
|
|
fs.clear ();
|
|
normalized_path = NULL;
|
|
int component = 0; // Number of translated components
|
|
|
|
if (!(opt & PC_NULLEMPTY))
|
|
error = 0;
|
|
else if (!*src)
|
|
{
|
|
error = ENOENT;
|
|
return;
|
|
}
|
|
|
|
bool is_msdos = false;
|
|
/* This loop handles symlink expansion. */
|
|
for (;;)
|
|
{
|
|
MALLOC_CHECK;
|
|
assert (src);
|
|
|
|
is_relpath = !isabspath (src);
|
|
error = normalize_posix_path (src, path_copy, tail);
|
|
if (error > 0)
|
|
return;
|
|
if (error < 0)
|
|
{
|
|
if (component == 0)
|
|
is_msdos = true;
|
|
error = 0;
|
|
}
|
|
|
|
/* Detect if the user was looking for a directory. We have to strip the
|
|
trailing slash initially while trying to add extensions but take it
|
|
into account during processing */
|
|
if (tail > path_copy + 2 && isslash (tail[-1]))
|
|
{
|
|
need_directory = 1;
|
|
*--tail = '\0';
|
|
}
|
|
path_end = tail;
|
|
|
|
/* Scan path_copy from right to left looking either for a symlink
|
|
or an actual existing file. If an existing file is found, just
|
|
return. If a symlink is found, exit the for loop.
|
|
Also: be careful to preserve the errno returned from
|
|
symlink.check as the caller may need it. */
|
|
/* FIXME: Do we have to worry about multiple \'s here? */
|
|
component = 0; // Number of translated components
|
|
sym.contents[0] = '\0';
|
|
|
|
int symlen = 0;
|
|
|
|
for (unsigned pflags_or = opt & PC_NO_ACCESS_CHECK; ; pflags_or = 0)
|
|
{
|
|
const suffix_info *suff;
|
|
char *full_path;
|
|
|
|
/* Don't allow symlink.check to set anything in the path_conv
|
|
class if we're working on an inner component of the path */
|
|
if (component)
|
|
{
|
|
suff = NULL;
|
|
sym.pflags = 0;
|
|
full_path = pathbuf;
|
|
}
|
|
else
|
|
{
|
|
suff = suffixes;
|
|
sym.pflags = path_flags;
|
|
full_path = this->path;
|
|
}
|
|
|
|
/* Convert to native path spec sans symbolic link info. */
|
|
error = mount_table->conv_to_win32_path (path_copy, full_path, dev,
|
|
&sym.pflags);
|
|
|
|
if (error)
|
|
return;
|
|
|
|
sym.pflags |= pflags_or;
|
|
|
|
if (dev.major == DEV_CYGDRIVE_MAJOR)
|
|
{
|
|
if (!component)
|
|
fileattr = FILE_ATTRIBUTE_DIRECTORY | FILE_ATTRIBUTE_READONLY;
|
|
else
|
|
{
|
|
fileattr = getfileattr (this->path, sym.pflags & MOUNT_ENC);
|
|
dev.devn = FH_FS;
|
|
}
|
|
goto out;
|
|
}
|
|
else if (dev == FH_DEV)
|
|
{
|
|
dev.devn = FH_FS;
|
|
#if 0
|
|
fileattr = getfileattr (this->path, sym.pflags & MOUNT_ENC);
|
|
if (!component && fileattr == INVALID_FILE_ATTRIBUTES)
|
|
{
|
|
fileattr = FILE_ATTRIBUTE_DIRECTORY | FILE_ATTRIBUTE_READONLY;
|
|
goto out;
|
|
}
|
|
#endif
|
|
}
|
|
else if (isvirtual_dev (dev.devn))
|
|
{
|
|
/* FIXME: Calling build_fhandler here is not the right way to handle this. */
|
|
fhandler_virtual *fh = (fhandler_virtual *) build_fh_dev (dev, path_copy);
|
|
int file_type = fh->exists ();
|
|
if (file_type == -2)
|
|
{
|
|
fh->fill_filebuf ();
|
|
symlen = sym.set (fh->get_filebuf ());
|
|
}
|
|
delete fh;
|
|
switch (file_type)
|
|
{
|
|
case 1:
|
|
case 2:
|
|
if (component == 0)
|
|
fileattr = FILE_ATTRIBUTE_DIRECTORY;
|
|
break;
|
|
case -1:
|
|
if (component == 0)
|
|
fileattr = 0;
|
|
break;
|
|
case -2: /* /proc/self or /proc/<pid>/symlinks */
|
|
goto is_virtual_symlink;
|
|
case -3: /* /proc/<pid>/fd/pipe:[] */
|
|
if (component == 0)
|
|
{
|
|
fileattr = 0;
|
|
dev.parse (FH_PIPE);
|
|
}
|
|
break;
|
|
case -4: /* /proc/<pid>/fd/socket:[] */
|
|
if (component == 0)
|
|
{
|
|
fileattr = 0;
|
|
dev.parse (FH_TCP);
|
|
}
|
|
break;
|
|
default:
|
|
if (component == 0)
|
|
fileattr = INVALID_FILE_ATTRIBUTES;
|
|
goto virtual_component_retry;
|
|
}
|
|
if (component == 0 || dev.devn != FH_NETDRIVE)
|
|
path_flags |= PATH_RO;
|
|
goto out;
|
|
}
|
|
/* devn should not be a device. If it is, then stop parsing now. */
|
|
else if (dev.devn != FH_FS)
|
|
{
|
|
fileattr = 0;
|
|
path_flags = sym.pflags;
|
|
if (component)
|
|
{
|
|
error = ENOTDIR;
|
|
return;
|
|
}
|
|
goto out; /* Found a device. Stop parsing. */
|
|
}
|
|
|
|
/* If path is only a drivename, Windows interprets it as the
|
|
current working directory on this drive instead of the root
|
|
dir which is what we want. So we need the trailing backslash
|
|
in this case. */
|
|
if (full_path[0] && full_path[1] == ':' && full_path[2] == '\0')
|
|
{
|
|
full_path[2] = '\\';
|
|
full_path[3] = '\0';
|
|
}
|
|
|
|
symlen = sym.check (full_path, suff, opt);
|
|
|
|
is_virtual_symlink:
|
|
|
|
if (sym.isdevice)
|
|
{
|
|
dev.parse (sym.major, sym.minor);
|
|
dev.setfs (1);
|
|
dev.mode = sym.mode;
|
|
fileattr = sym.fileattr;
|
|
goto out;
|
|
}
|
|
|
|
if (sym.pflags & PATH_SOCKET)
|
|
{
|
|
if (component)
|
|
{
|
|
error = ENOTDIR;
|
|
return;
|
|
}
|
|
fileattr = sym.fileattr;
|
|
dev.parse (FH_UNIX);
|
|
dev.setfs (1);
|
|
goto out;
|
|
}
|
|
|
|
if (sym.case_clash)
|
|
{
|
|
if (pcheck_case == PCHECK_STRICT)
|
|
{
|
|
case_clash = true;
|
|
error = ENOENT;
|
|
goto out;
|
|
}
|
|
/* If pcheck_case==PCHECK_ADJUST the case_clash is remembered
|
|
if the last component is concerned. This allows functions
|
|
which shall create files to avoid overriding already existing
|
|
files with another case. */
|
|
if (!component)
|
|
case_clash = true;
|
|
}
|
|
if (!(opt & PC_SYM_IGNORE))
|
|
{
|
|
if (!component)
|
|
{
|
|
fileattr = sym.fileattr;
|
|
path_flags = sym.pflags;
|
|
}
|
|
|
|
/* If symlink.check found an existing non-symlink file, then
|
|
it sets the appropriate flag. It also sets any suffix found
|
|
into `ext_here'. */
|
|
if (!sym.issymlink && sym.fileattr != INVALID_FILE_ATTRIBUTES)
|
|
{
|
|
error = sym.error;
|
|
if (component == 0)
|
|
add_ext_from_sym (sym);
|
|
else if (!(sym.fileattr & FILE_ATTRIBUTE_DIRECTORY))
|
|
{
|
|
error = ENOTDIR;
|
|
goto out;
|
|
}
|
|
if (pcheck_case == PCHECK_RELAXED)
|
|
goto out; // file found
|
|
/* Avoid further symlink evaluation. Only case checks are
|
|
done now. */
|
|
opt |= PC_SYM_IGNORE;
|
|
}
|
|
/* Found a symlink if symlen > 0. If component == 0, then the
|
|
src path itself was a symlink. If !follow_mode then
|
|
we're done. Otherwise we have to insert the path found
|
|
into the full path that we are building and perform all of
|
|
these operations again on the newly derived path. */
|
|
else if (symlen > 0)
|
|
{
|
|
saw_symlinks = 1;
|
|
if (component == 0 && !need_directory && !(opt & PC_SYM_FOLLOW))
|
|
{
|
|
set_symlink (symlen); // last component of path is a symlink.
|
|
if (opt & PC_SYM_CONTENTS)
|
|
{
|
|
strcpy (path, sym.contents);
|
|
goto out;
|
|
}
|
|
add_ext_from_sym (sym);
|
|
if (pcheck_case == PCHECK_RELAXED)
|
|
goto out;
|
|
/* Avoid further symlink evaluation. Only case checks are
|
|
done now. */
|
|
opt |= PC_SYM_IGNORE;
|
|
}
|
|
else
|
|
break;
|
|
}
|
|
else if (sym.error && sym.error != ENOENT && sym.error != ENOSHARE)
|
|
{
|
|
error = sym.error;
|
|
goto out;
|
|
}
|
|
/* No existing file found. */
|
|
}
|
|
|
|
virtual_component_retry:
|
|
/* Find the new "tail" of the path, e.g. in '/for/bar/baz',
|
|
/baz is the tail. */
|
|
if (tail != path_end)
|
|
*tail = '/';
|
|
while (--tail > path_copy + 1 && *tail != '/') {}
|
|
/* Exit loop if there is no tail or we are at the
|
|
beginning of a UNC path */
|
|
if (tail <= path_copy + 1)
|
|
goto out; // all done
|
|
|
|
/* Haven't found an existing pathname component yet.
|
|
Pinch off the tail and try again. */
|
|
*tail = '\0';
|
|
component++;
|
|
}
|
|
|
|
/* Arrive here if above loop detected a symlink. */
|
|
if (++loop > SYMLOOP_MAX)
|
|
{
|
|
error = ELOOP; // Eep.
|
|
return;
|
|
}
|
|
|
|
MALLOC_CHECK;
|
|
|
|
|
|
/* Place the link content, possibly with head and/or tail, in tmp_buf */
|
|
|
|
char *headptr;
|
|
if (isabspath (sym.contents))
|
|
headptr = tmp_buf; /* absolute path */
|
|
else
|
|
{
|
|
/* Copy the first part of the path (with ending /) and point to the end. */
|
|
char *prevtail = tail;
|
|
while (--prevtail > path_copy && *prevtail != '/') {}
|
|
int headlen = prevtail - path_copy + 1;;
|
|
memcpy (tmp_buf, path_copy, headlen);
|
|
headptr = &tmp_buf[headlen];
|
|
}
|
|
|
|
/* Make sure there is enough space */
|
|
if (headptr + symlen >= tmp_buf + (2 * NT_MAX_PATH))
|
|
{
|
|
too_long:
|
|
error = ENAMETOOLONG;
|
|
strcpy (path, "::ENAMETOOLONG::");
|
|
return;
|
|
}
|
|
|
|
/* Copy the symlink contents to the end of tmp_buf.
|
|
Convert slashes. */
|
|
for (char *p = sym.contents; *p; p++)
|
|
*headptr++ = *p == '\\' ? '/' : *p;
|
|
*headptr = '\0';
|
|
|
|
/* Copy any tail component (with the 0) */
|
|
if (tail++ < path_end)
|
|
{
|
|
/* Add a slash if needed. There is space. */
|
|
if (*(headptr - 1) != '/')
|
|
*headptr++ = '/';
|
|
int taillen = path_end - tail + 1;
|
|
if (headptr + taillen > tmp_buf + (2 * NT_MAX_PATH))
|
|
goto too_long;
|
|
memcpy (headptr, tail, taillen);
|
|
}
|
|
|
|
/* Evaluate everything all over again. */
|
|
src = tmp_buf;
|
|
}
|
|
|
|
if (!(opt & PC_SYM_CONTENTS))
|
|
add_ext_from_sym (sym);
|
|
|
|
out:
|
|
bool strip_tail = false;
|
|
if (dev.devn == FH_NETDRIVE && component)
|
|
{
|
|
/* This case indicates a non-existant resp. a non-retrievable
|
|
share. This happens for instance if the share is a printer.
|
|
In this case the path must not be treated like a FH_NETDRIVE,
|
|
but like a FH_FS instead, so the usual open call for files
|
|
is used on it. */
|
|
dev.parse (FH_FS);
|
|
}
|
|
else if (isvirtual_dev (dev.devn) && fileattr == INVALID_FILE_ATTRIBUTES)
|
|
{
|
|
error = dev.devn == FH_NETDRIVE ? ENOSHARE : ENOENT;
|
|
return;
|
|
}
|
|
else if (!need_directory || error)
|
|
/* nothing to do */;
|
|
else if (fileattr == INVALID_FILE_ATTRIBUTES)
|
|
strcat (path, "\\"); /* Reattach trailing dirsep in native path. */
|
|
else if (fileattr & FILE_ATTRIBUTE_DIRECTORY)
|
|
path_flags &= ~PATH_SYMLINK;
|
|
else
|
|
{
|
|
debug_printf ("%s is a non-directory", path);
|
|
error = ENOTDIR;
|
|
return;
|
|
}
|
|
|
|
if (dev.isfs ())
|
|
{
|
|
if (strncmp (path, "\\\\.\\", 4))
|
|
{
|
|
#if 0
|
|
/* Windows ignores trailing dots and spaces in the last path
|
|
component, and ignores exactly one trailing dot in inner
|
|
path components. */
|
|
char *tail = NULL;
|
|
for (char *p = path; *p; p++)
|
|
{
|
|
if (*p != '.' && *p != ' ')
|
|
tail = NULL;
|
|
else if (!tail)
|
|
tail = p;
|
|
if (tail && p[1] == '\\')
|
|
{
|
|
if (p > tail || *tail != '.')
|
|
{
|
|
error = ENOENT;
|
|
return;
|
|
}
|
|
tail = NULL;
|
|
}
|
|
}
|
|
#endif
|
|
if (!tail || tail == path)
|
|
/* nothing */;
|
|
else if (tail[-1] != '\\')
|
|
{
|
|
*tail = '\0';
|
|
strip_tail = true;
|
|
}
|
|
else
|
|
{
|
|
error = ENOENT;
|
|
return;
|
|
}
|
|
}
|
|
|
|
if (fs.update (get_nt_native_path (), exists ()))
|
|
{
|
|
debug_printf ("this->path(%s), has_acls(%d)", path, fs.has_acls ());
|
|
if (fs.has_acls () && allow_ntsec)
|
|
set_exec (0); /* We really don't know if this is executable or not here
|
|
but set it to not executable since it will be figured out
|
|
later by anything which cares about this. */
|
|
}
|
|
if (exec_state () != dont_know_if_executable)
|
|
/* ok */;
|
|
else if (isdir ())
|
|
set_exec (1);
|
|
else if (issymlink () || issocket ())
|
|
set_exec (0);
|
|
}
|
|
|
|
#if 0
|
|
if (issocket ())
|
|
devn = FH_SOCKET;
|
|
#endif
|
|
|
|
if (opt & PC_NOFULL)
|
|
{
|
|
if (is_relpath)
|
|
mkrelpath (this->path);
|
|
if (need_directory)
|
|
{
|
|
size_t n = strlen (this->path);
|
|
/* Do not add trailing \ to UNC device names like \\.\a: */
|
|
if (this->path[n - 1] != '\\' &&
|
|
(strncmp (this->path, "\\\\.\\", 4) != 0))
|
|
{
|
|
this->path[n] = '\\';
|
|
this->path[n + 1] = '\0';
|
|
}
|
|
}
|
|
}
|
|
|
|
if (saw_symlinks)
|
|
set_has_symlinks ();
|
|
|
|
if (!error && !isdir () && !(path_flags & PATH_ALL_EXEC))
|
|
{
|
|
const char *p = strchr (path, '\0') - 4;
|
|
if (p >= path &&
|
|
(ascii_strcasematch (".exe", p) ||
|
|
ascii_strcasematch (".bat", p) ||
|
|
ascii_strcasematch (".com", p)))
|
|
path_flags |= PATH_EXEC;
|
|
}
|
|
|
|
if (!(opt & PC_POSIX))
|
|
normalized_path_size = 0;
|
|
else
|
|
{
|
|
if (tail < path_end && tail > path_copy + 1)
|
|
*tail = '/';
|
|
set_normalized_path (path_copy, strip_tail);
|
|
if (is_msdos && !(opt & PC_NOWARN))
|
|
warn_msdos (src);
|
|
}
|
|
|
|
#if 0
|
|
if (!error)
|
|
{
|
|
last_path_conv = *this;
|
|
strcpy (last_src, src);
|
|
}
|
|
#endif
|
|
}
|
|
|
|
path_conv::~path_conv ()
|
|
{
|
|
if (!normalized_path_size && normalized_path)
|
|
{
|
|
cfree (normalized_path);
|
|
normalized_path = NULL;
|
|
}
|
|
if (wide_path)
|
|
{
|
|
cfree (wide_path);
|
|
wide_path = NULL;
|
|
}
|
|
}
|
|
|
|
bool
|
|
path_conv::is_binary ()
|
|
{
|
|
tmp_pathbuf tp;
|
|
PWCHAR bintest = tp.w_get ();
|
|
DWORD bin;
|
|
return exec_state () == is_executable
|
|
&& RtlEqualUnicodePathSuffix (get_nt_native_path (), L".exe", TRUE)
|
|
&& GetBinaryTypeW (get_wide_win32_path (bintest), &bin);
|
|
}
|
|
|
|
/* Normalize a Win32 path.
|
|
/'s are converted to \'s in the process.
|
|
All duplicate \'s, except for 2 leading \'s, are deleted.
|
|
|
|
The result is 0 for success, or an errno error value.
|
|
FIXME: A lot of this should be mergeable with the POSIX critter. */
|
|
int
|
|
normalize_win32_path (const char *src, char *dst, char *&tail)
|
|
{
|
|
const char *src_start = src;
|
|
bool beg_src_slash = isdirsep (src[0]);
|
|
|
|
tail = dst;
|
|
/* Skip long path name prefixes in Win32 or NT syntax. */
|
|
if (beg_src_slash && (src[1] == '?' || isdirsep (src[1]))
|
|
&& src[2] == '?' && isdirsep (src[3]))
|
|
{
|
|
src += 4;
|
|
if (ascii_strncasematch (src, "UNC", 3))
|
|
{
|
|
src += 2; /* Fortunately the first char is not copied... */
|
|
beg_src_slash = true;
|
|
}
|
|
else
|
|
beg_src_slash = isdirsep (src[0]);
|
|
}
|
|
if (beg_src_slash && isdirsep (src[1]))
|
|
{
|
|
if (isdirsep (src[2]))
|
|
{
|
|
/* More than two slashes are just folded into one. */
|
|
src += 2;
|
|
while (isdirsep (src[1]))
|
|
++src;
|
|
}
|
|
else
|
|
{
|
|
/* Two slashes start a network or device path. */
|
|
*tail++ = '\\';
|
|
src++;
|
|
if (src[1] == '.' && isdirsep (src[2]))
|
|
{
|
|
*tail++ = '\\';
|
|
*tail++ = '.';
|
|
src += 2;
|
|
}
|
|
}
|
|
}
|
|
if (tail == dst && !isdrive (src) && *src != '/')
|
|
{
|
|
if (beg_src_slash)
|
|
tail += cygheap->cwd.get_drive (dst);
|
|
else if (!cygheap->cwd.get (dst, 0))
|
|
return get_errno ();
|
|
else
|
|
{
|
|
tail = strchr (tail, '\0');
|
|
*tail++ = '\\';
|
|
}
|
|
}
|
|
|
|
while (*src)
|
|
{
|
|
/* Strip duplicate /'s. */
|
|
if (isdirsep (src[0]) && isdirsep (src[1]))
|
|
src++;
|
|
/* Ignore "./". */
|
|
else if (src[0] == '.' && isdirsep (src[1])
|
|
&& (src == src_start || isdirsep (src[-1])))
|
|
src += 2;
|
|
|
|
/* Backup if "..". */
|
|
else if (src[0] == '.' && src[1] == '.'
|
|
/* dst must be greater than dst_start */
|
|
&& tail[-1] == '\\')
|
|
{
|
|
if (!isdirsep (src[2]) && src[2] != '\0')
|
|
*tail++ = *src++;
|
|
else
|
|
{
|
|
/* Back up over /, but not if it's the first one. */
|
|
if (tail > dst + 1)
|
|
tail--;
|
|
/* Now back up to the next /. */
|
|
while (tail > dst + 1 && tail[-1] != '\\' && tail[-2] != ':')
|
|
tail--;
|
|
src += 2;
|
|
if (isdirsep (*src))
|
|
src++;
|
|
}
|
|
}
|
|
/* Otherwise, add char to result. */
|
|
else
|
|
{
|
|
if (*src == '/')
|
|
*tail++ = '\\';
|
|
else
|
|
*tail++ = *src;
|
|
src++;
|
|
}
|
|
if ((tail - dst) >= NT_MAX_PATH)
|
|
return ENAMETOOLONG;
|
|
}
|
|
if (tail > dst + 1 && tail[-1] == '.' && tail[-2] == '\\')
|
|
tail--;
|
|
*tail = '\0';
|
|
debug_printf ("%s = normalize_win32_path (%s)", dst, src_start);
|
|
return 0;
|
|
}
|
|
|
|
/* Various utilities. */
|
|
|
|
/* nofinalslash: Remove trailing / and \ from SRC (except for the
|
|
first one). It is ok for src == dst. */
|
|
|
|
void __stdcall
|
|
nofinalslash (const char *src, char *dst)
|
|
{
|
|
int len = strlen (src);
|
|
if (src != dst)
|
|
memcpy (dst, src, len + 1);
|
|
while (len > 1 && isdirsep (dst[--len]))
|
|
dst[len] = '\0';
|
|
}
|
|
|
|
/* conv_path_list: Convert a list of path names to/from Win32/POSIX. */
|
|
|
|
static int
|
|
conv_path_list (const char *src, char *dst, size_t size, int to_posix)
|
|
{
|
|
char src_delim, dst_delim;
|
|
cygwin_conv_path_t conv_fn;
|
|
|
|
if (to_posix)
|
|
{
|
|
src_delim = ';';
|
|
dst_delim = ':';
|
|
conv_fn = CCP_WIN_A_TO_POSIX | CCP_RELATIVE;
|
|
}
|
|
else
|
|
{
|
|
src_delim = ':';
|
|
dst_delim = ';';
|
|
conv_fn = CCP_POSIX_TO_WIN_A | CCP_RELATIVE;
|
|
}
|
|
|
|
char *srcbuf = (char *) alloca (strlen (src) + 1);
|
|
|
|
int err = 0;
|
|
char *d = dst - 1;
|
|
bool saw_empty = false;
|
|
do
|
|
{
|
|
char *s = strccpy (srcbuf, &src, src_delim);
|
|
size_t len = s - srcbuf;
|
|
if (len >= NT_MAX_PATH)
|
|
{
|
|
err = ENAMETOOLONG;
|
|
break;
|
|
}
|
|
if (len)
|
|
{
|
|
++d;
|
|
err = cygwin_conv_path (conv_fn, srcbuf, d, size - (d - dst));
|
|
}
|
|
else if (!to_posix)
|
|
{
|
|
++d;
|
|
err = cygwin_conv_path (conv_fn, ".", d, size - (d - dst));
|
|
}
|
|
else
|
|
{
|
|
if (to_posix == ENV_CVT)
|
|
saw_empty = true;
|
|
continue;
|
|
}
|
|
if (err)
|
|
break;
|
|
d = strchr (d, '\0');
|
|
*d = dst_delim;
|
|
}
|
|
while (*src++);
|
|
|
|
if (saw_empty)
|
|
err = EIDRM;
|
|
|
|
if (d < dst)
|
|
d++;
|
|
*d = '\0';
|
|
return err;
|
|
}
|
|
|
|
/********************** Symbolic Link Support **************************/
|
|
|
|
/* Create a symlink from FROMPATH to TOPATH. */
|
|
|
|
/* If TRUE create symlinks as Windows shortcuts, if false create symlinks
|
|
as normal files with magic number and system bit set. */
|
|
bool allow_winsymlinks = true;
|
|
|
|
extern "C" int
|
|
symlink (const char *oldpath, const char *newpath)
|
|
{
|
|
return symlink_worker (oldpath, newpath, allow_winsymlinks, false);
|
|
}
|
|
|
|
int
|
|
symlink_worker (const char *oldpath, const char *newpath, bool use_winsym,
|
|
bool isdevice)
|
|
{
|
|
int res = -1;
|
|
size_t len;
|
|
path_conv win32_newpath, win32_oldpath;
|
|
char *buf, *cp;
|
|
SECURITY_ATTRIBUTES sa = sec_none_nih;
|
|
security_descriptor sd;
|
|
OBJECT_ATTRIBUTES attr;
|
|
IO_STATUS_BLOCK io;
|
|
NTSTATUS status;
|
|
HANDLE fh;
|
|
FILE_BASIC_INFORMATION fbi;
|
|
tmp_pathbuf tp;
|
|
|
|
/* POSIX says that empty 'newpath' is invalid input while empty
|
|
'oldpath' is valid -- it's symlink resolver job to verify if
|
|
symlink contents point to existing filesystem object */
|
|
myfault efault;
|
|
if (efault.faulted (EFAULT))
|
|
goto done;
|
|
if (!*oldpath || !*newpath)
|
|
{
|
|
set_errno (ENOENT);
|
|
goto done;
|
|
}
|
|
|
|
if (strlen (oldpath) > SYMLINK_MAX)
|
|
{
|
|
set_errno (ENAMETOOLONG);
|
|
goto done;
|
|
}
|
|
|
|
len = strlen (newpath);
|
|
/* Trailing dirsep is a no-no. */
|
|
if (isdirsep (newpath[len - 1]))
|
|
{
|
|
set_errno (ENOENT);
|
|
goto done;
|
|
}
|
|
/* We need the normalized full path below. */
|
|
win32_newpath.check (newpath, PC_SYM_NOFOLLOW | PC_POSIX, stat_suffixes);
|
|
if (use_winsym && !win32_newpath.exists ())
|
|
{
|
|
char *newplnk = tp.c_get ();
|
|
stpcpy (stpcpy (newplnk, newpath), ".lnk");
|
|
win32_newpath.check (newplnk, PC_SYM_NOFOLLOW | PC_POSIX);
|
|
}
|
|
|
|
if (win32_newpath.error)
|
|
{
|
|
set_errno (win32_newpath.case_clash ? ECASECLASH : win32_newpath.error);
|
|
goto done;
|
|
}
|
|
|
|
syscall_printf ("symlink (%s, %S)", oldpath,
|
|
win32_newpath.get_nt_native_path ());
|
|
|
|
if ((!isdevice && win32_newpath.exists ())
|
|
|| win32_newpath.is_auto_device ())
|
|
{
|
|
set_errno (EEXIST);
|
|
goto done;
|
|
}
|
|
|
|
if (use_winsym)
|
|
{
|
|
ITEMIDLIST *pidl = NULL;
|
|
size_t full_len = 0;
|
|
unsigned short oldpath_len, desc_len, relpath_len, pidl_len = 0;
|
|
char desc[MAX_PATH + 1], *relpath;
|
|
|
|
if (!isdevice)
|
|
{
|
|
/* First create an IDLIST to learn how big our shortcut is
|
|
going to be. */
|
|
IShellFolder *psl;
|
|
|
|
/* The symlink target is relative to the directory in which
|
|
the symlink gets created, not relative to the cwd. Therefore
|
|
we have to mangle the path quite a bit before calling path_conv. */
|
|
if (!isabspath (oldpath))
|
|
{
|
|
len = strrchr (win32_newpath.normalized_path, '/')
|
|
- win32_newpath.normalized_path + 1;
|
|
char *absoldpath = tp.t_get ();
|
|
stpcpy (stpncpy (absoldpath, win32_newpath.normalized_path, len),
|
|
oldpath);
|
|
win32_oldpath.check (absoldpath, PC_SYM_NOFOLLOW, stat_suffixes);
|
|
}
|
|
else
|
|
win32_oldpath.check (oldpath, PC_SYM_NOFOLLOW, stat_suffixes);
|
|
if (SUCCEEDED (SHGetDesktopFolder (&psl)))
|
|
{
|
|
WCHAR wc_path[win32_oldpath.get_wide_win32_path_len () + 1];
|
|
win32_oldpath.get_wide_win32_path (wc_path);
|
|
/* Amazing but true: Even though the ParseDisplayName method
|
|
takes a wide char path name, it does not understand the
|
|
Win32 prefix for long pathnames! So we have to tack off
|
|
the prefix and convert tyhe path to the "normal" syntax
|
|
for ParseDisplayName. I have no idea if it's able to take
|
|
long path names at all since I can't test it right now. */
|
|
WCHAR *wc = wc_path + 4;
|
|
if (!wcscmp (wc, L"UNC\\"))
|
|
*(wc += 2) = L'\\';
|
|
HRESULT res;
|
|
if (SUCCEEDED (res = psl->ParseDisplayName (NULL, NULL, wc, NULL,
|
|
&pidl, NULL)))
|
|
{
|
|
ITEMIDLIST *p;
|
|
|
|
for (p = pidl; p->mkid.cb > 0;
|
|
p = (ITEMIDLIST *)((char *) p + p->mkid.cb))
|
|
;
|
|
pidl_len = (char *) p - (char *) pidl + 2;
|
|
}
|
|
psl->Release ();
|
|
}
|
|
}
|
|
/* Compute size of shortcut file. */
|
|
full_len = sizeof (win_shortcut_hdr);
|
|
if (pidl_len)
|
|
full_len += sizeof (unsigned short) + pidl_len;
|
|
oldpath_len = strlen (oldpath);
|
|
/* Unfortunately the length of the description is restricted to a
|
|
length of MAX_PATH up to NT4, and to a length of 2000 bytes
|
|
since W2K. We don't want to add considerations for the different
|
|
lengths and even 2000 bytes is not enough for long path names.
|
|
So what we do here is to set the description to the POSIX path
|
|
only if the path is not longer than MAX_PATH characters. We
|
|
append the full path name after the regular shortcut data
|
|
(see below), which works fine with Windows Explorer as well
|
|
as older Cygwin versions (as long as the whole file isn't bigger
|
|
than 8K). The description field is only used for backward
|
|
compatibility to older Cygwin versions and those versions are
|
|
not capable of handling long path names anyway. */
|
|
desc_len = stpcpy (desc, oldpath_len > MAX_PATH
|
|
? "[path too long]" : oldpath) - desc;
|
|
full_len += sizeof (unsigned short) + desc_len;
|
|
/* Devices get the oldpath string unchanged as relative path. */
|
|
if (isdevice)
|
|
{
|
|
relpath_len = oldpath_len;
|
|
stpcpy (relpath = tp.c_get (), oldpath);
|
|
}
|
|
else
|
|
{
|
|
relpath_len = strlen (win32_oldpath.get_win32 ());
|
|
stpcpy (relpath = tp.c_get (), win32_oldpath.get_win32 ());
|
|
}
|
|
full_len += sizeof (unsigned short) + relpath_len;
|
|
full_len += sizeof (unsigned short) + oldpath_len;
|
|
/* 1 byte more for trailing 0 written by stpcpy. */
|
|
buf = (char *) alloca (full_len + 1);
|
|
|
|
/* Create shortcut header */
|
|
win_shortcut_hdr *shortcut_header = (win_shortcut_hdr *) buf;
|
|
memset (shortcut_header, 0, sizeof *shortcut_header);
|
|
shortcut_header->size = sizeof *shortcut_header;
|
|
shortcut_header->magic = GUID_shortcut;
|
|
shortcut_header->flags = (WSH_FLAG_DESC | WSH_FLAG_RELPATH);
|
|
if (pidl)
|
|
shortcut_header->flags |= WSH_FLAG_IDLIST;
|
|
shortcut_header->run = SW_NORMAL;
|
|
cp = buf + sizeof (win_shortcut_hdr);
|
|
|
|
/* Create IDLIST */
|
|
if (pidl)
|
|
{
|
|
*(unsigned short *)cp = pidl_len;
|
|
memcpy (cp += 2, pidl, pidl_len);
|
|
cp += pidl_len;
|
|
CoTaskMemFree (pidl);
|
|
}
|
|
|
|
/* Create description */
|
|
*(unsigned short *)cp = desc_len;
|
|
cp = stpcpy (cp += 2, desc);
|
|
|
|
/* Create relpath */
|
|
*(unsigned short *)cp = relpath_len;
|
|
cp = stpcpy (cp += 2, relpath);
|
|
|
|
/* Append the POSIX path after the regular shortcut data for
|
|
the long path support. */
|
|
*(unsigned short *)cp = oldpath_len;
|
|
cp = stpcpy (cp += 2, oldpath);
|
|
}
|
|
else
|
|
{
|
|
/* This is the old technique creating a symlink. */
|
|
unsigned short oldpath_len = strlen (oldpath);
|
|
buf = (char *) alloca (sizeof (SYMLINK_COOKIE) + oldpath_len + 1);
|
|
/* Note that the terminating nul is written. */
|
|
cp = stpcpy (stpcpy (buf, SYMLINK_COOKIE), oldpath) + 1;
|
|
}
|
|
|
|
if (isdevice && win32_newpath.exists ())
|
|
{
|
|
status = NtOpenFile (&fh, FILE_WRITE_ATTRIBUTES,
|
|
win32_newpath.get_object_attr (attr, sa),
|
|
&io, 0, FILE_OPEN_FOR_BACKUP_INTENT);
|
|
if (!NT_SUCCESS (status))
|
|
{
|
|
__seterrno_from_nt_status (status);
|
|
goto done;
|
|
}
|
|
fbi.CreationTime.QuadPart = fbi.LastAccessTime.QuadPart
|
|
= fbi.LastWriteTime.QuadPart = fbi.ChangeTime.QuadPart = 0LL;
|
|
fbi.FileAttributes = FILE_ATTRIBUTE_NORMAL;
|
|
status = NtSetInformationFile (fh, &io, &fbi, sizeof fbi,
|
|
FileBasicInformation);
|
|
NtClose (fh);
|
|
if (!NT_SUCCESS (status))
|
|
{
|
|
__seterrno_from_nt_status (status);
|
|
goto done;
|
|
}
|
|
}
|
|
if (allow_ntsec && win32_newpath.has_acls ())
|
|
set_security_attribute (S_IFLNK | STD_RBITS | STD_WBITS,
|
|
&sa, sd);
|
|
status = NtCreateFile (&fh, DELETE | FILE_GENERIC_WRITE,
|
|
win32_newpath.get_object_attr (attr, sa),
|
|
&io, NULL, FILE_ATTRIBUTE_NORMAL,
|
|
FILE_SHARE_VALID_FLAGS,
|
|
isdevice ? FILE_OVERWRITE_IF : FILE_CREATE,
|
|
FILE_SYNCHRONOUS_IO_NONALERT
|
|
| FILE_NON_DIRECTORY_FILE
|
|
| FILE_OPEN_FOR_BACKUP_INTENT,
|
|
NULL, 0);
|
|
if (!NT_SUCCESS (status))
|
|
{
|
|
__seterrno_from_nt_status (status);
|
|
goto done;
|
|
}
|
|
status = NtWriteFile (fh, NULL, NULL, NULL, &io, buf, cp - buf, NULL, NULL);
|
|
if (NT_SUCCESS (status) && io.Information == (ULONG) (cp - buf))
|
|
{
|
|
fbi.CreationTime.QuadPart = fbi.LastAccessTime.QuadPart
|
|
= fbi.LastWriteTime.QuadPart = fbi.ChangeTime.QuadPart = 0LL;
|
|
fbi.FileAttributes = use_winsym ? FILE_ATTRIBUTE_READONLY
|
|
: FILE_ATTRIBUTE_SYSTEM;
|
|
status = NtSetInformationFile (fh, &io, &fbi, sizeof fbi,
|
|
FileBasicInformation);
|
|
if (!NT_SUCCESS (status))
|
|
debug_printf ("Setting attributes failed, status = %p", status);
|
|
res = 0;
|
|
}
|
|
else
|
|
{
|
|
__seterrno_from_nt_status (status);
|
|
FILE_DISPOSITION_INFORMATION fdi = { TRUE };
|
|
status = NtSetInformationFile (fh, &io, &fdi, sizeof fdi,
|
|
FileDispositionInformation);
|
|
if (!NT_SUCCESS (status))
|
|
debug_printf ("Setting delete dispostion failed, status = %p", status);
|
|
}
|
|
NtClose (fh);
|
|
|
|
done:
|
|
syscall_printf ("%d = symlink_worker (%s, %s, %d, %d)", res, oldpath,
|
|
newpath, use_winsym, isdevice);
|
|
return res;
|
|
}
|
|
|
|
static bool
|
|
cmp_shortcut_header (win_shortcut_hdr *file_header)
|
|
{
|
|
/* A Cygwin or U/Win shortcut only contains a description and a relpath.
|
|
Cygwin shortcuts also might contain an ITEMIDLIST. The run type is
|
|
always set to SW_NORMAL. */
|
|
return file_header->size == sizeof (win_shortcut_hdr)
|
|
&& !memcmp (&file_header->magic, &GUID_shortcut, sizeof GUID_shortcut)
|
|
&& (file_header->flags & ~WSH_FLAG_IDLIST)
|
|
== (WSH_FLAG_DESC | WSH_FLAG_RELPATH)
|
|
&& file_header->run == SW_NORMAL;
|
|
}
|
|
|
|
int
|
|
symlink_info::check_shortcut (HANDLE h)
|
|
{
|
|
win_shortcut_hdr *file_header;
|
|
char *buf, *cp;
|
|
unsigned short len;
|
|
int res = 0;
|
|
NTSTATUS status;
|
|
IO_STATUS_BLOCK io;
|
|
FILE_STANDARD_INFORMATION fsi;
|
|
|
|
status = NtQueryInformationFile (h, &io, &fsi, sizeof fsi,
|
|
FileStandardInformation);
|
|
if (!NT_SUCCESS (status))
|
|
{
|
|
set_error (EIO);
|
|
return 0;
|
|
}
|
|
if (fsi.EndOfFile.QuadPart <= sizeof (win_shortcut_hdr)
|
|
|| fsi.EndOfFile.QuadPart > 4 * 65536)
|
|
return 0;
|
|
buf = (char *) alloca (fsi.EndOfFile.LowPart + 1);
|
|
if (!NT_SUCCESS (NtReadFile (h, NULL, NULL, NULL,
|
|
&io, buf, fsi.EndOfFile.LowPart, NULL, NULL)))
|
|
{
|
|
set_error (EIO);
|
|
return 0;
|
|
}
|
|
file_header = (win_shortcut_hdr *) buf;
|
|
if (io.Information != fsi.EndOfFile.LowPart
|
|
|| !cmp_shortcut_header (file_header))
|
|
goto file_not_symlink;
|
|
cp = buf + sizeof (win_shortcut_hdr);
|
|
if (file_header->flags & WSH_FLAG_IDLIST) /* Skip ITEMIDLIST */
|
|
cp += *(unsigned short *) cp + 2;
|
|
if (!(len = *(unsigned short *) cp))
|
|
goto file_not_symlink;
|
|
cp += 2;
|
|
/* Check if this is a device file - these start with the sequence :\\ */
|
|
if (strncmp (cp, ":\\", 2) == 0)
|
|
res = strlen (strcpy (contents, cp)); /* Don't mess with device files */
|
|
else
|
|
{
|
|
/* Has appended full path? If so, use it instead of description. */
|
|
unsigned short relpath_len = *(unsigned short *) (cp + len);
|
|
if (cp + len + 2 + relpath_len < buf + fsi.EndOfFile.LowPart)
|
|
{
|
|
cp += len + 2 + relpath_len;
|
|
len = *(unsigned short *) cp;
|
|
cp += 2;
|
|
}
|
|
if (len > SYMLINK_MAX)
|
|
goto file_not_symlink;
|
|
cp[len] = '\0';
|
|
res = posixify (cp);
|
|
}
|
|
if (res) /* It's a symlink. */
|
|
pflags = PATH_SYMLINK | PATH_LNK;
|
|
return res;
|
|
|
|
file_not_symlink:
|
|
/* Not a symlink, see if executable. */
|
|
if (!(pflags & PATH_ALL_EXEC) && has_exec_chars ((const char *) &file_header, io.Information))
|
|
pflags |= PATH_EXEC;
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
symlink_info::check_sysfile (HANDLE h)
|
|
{
|
|
char cookie_buf[sizeof (SYMLINK_COOKIE) - 1];
|
|
char srcbuf[SYMLINK_MAX + 2];
|
|
NTSTATUS status;
|
|
IO_STATUS_BLOCK io;
|
|
int res = 0;
|
|
|
|
status = NtReadFile (h, NULL, NULL, NULL, &io, cookie_buf,
|
|
sizeof (cookie_buf), NULL, NULL);
|
|
if (!NT_SUCCESS (status))
|
|
{
|
|
debug_printf ("ReadFile1 failed");
|
|
if (status != STATUS_END_OF_FILE)
|
|
set_error (EIO);
|
|
}
|
|
else if (io.Information == sizeof (cookie_buf)
|
|
&& memcmp (cookie_buf, SYMLINK_COOKIE, sizeof (cookie_buf)) == 0)
|
|
{
|
|
/* It's a symlink. */
|
|
pflags = PATH_SYMLINK;
|
|
|
|
status = NtReadFile (h, NULL, NULL, NULL, &io, srcbuf,
|
|
SYMLINK_MAX + 2, NULL, NULL);
|
|
if (!NT_SUCCESS (status))
|
|
{
|
|
debug_printf ("ReadFile2 failed");
|
|
if (status != STATUS_END_OF_FILE)
|
|
set_error (EIO);
|
|
}
|
|
else if (io.Information > SYMLINK_MAX + 1)
|
|
debug_printf ("symlink string too long");
|
|
else
|
|
res = posixify (srcbuf);
|
|
}
|
|
else if (io.Information == sizeof (cookie_buf)
|
|
&& memcmp (cookie_buf, SOCKET_COOKIE, sizeof (cookie_buf)) == 0)
|
|
pflags |= PATH_SOCKET;
|
|
else
|
|
{
|
|
/* Not a symlink, see if executable. */
|
|
if (pflags & PATH_ALL_EXEC)
|
|
/* Nothing to do */;
|
|
else if (has_exec_chars (cookie_buf, io.Information))
|
|
pflags |= PATH_EXEC;
|
|
else
|
|
pflags |= PATH_NOTEXEC;
|
|
}
|
|
return res;
|
|
}
|
|
|
|
int
|
|
symlink_info::check_reparse_point (HANDLE h)
|
|
{
|
|
NTSTATUS status;
|
|
IO_STATUS_BLOCK io;
|
|
PREPARSE_DATA_BUFFER rp = (PREPARSE_DATA_BUFFER)
|
|
alloca (MAXIMUM_REPARSE_DATA_BUFFER_SIZE);
|
|
char srcbuf[SYMLINK_MAX + 7];
|
|
|
|
status = NtFsControlFile (h, NULL, NULL, NULL, &io, FSCTL_GET_REPARSE_POINT,
|
|
NULL, 0, (LPVOID) rp,
|
|
MAXIMUM_REPARSE_DATA_BUFFER_SIZE);
|
|
if (!NT_SUCCESS (status))
|
|
{
|
|
debug_printf ("NtFsControlFile(FSCTL_GET_REPARSE_POINT) failed, %p",
|
|
status);
|
|
set_error (EIO);
|
|
return 0;
|
|
}
|
|
if (rp->ReparseTag == IO_REPARSE_TAG_SYMLINK)
|
|
{
|
|
sys_wcstombs (srcbuf, SYMLINK_MAX + 1,
|
|
(WCHAR *)((char *)rp->SymbolicLinkReparseBuffer.PathBuffer
|
|
+ rp->SymbolicLinkReparseBuffer.SubstituteNameOffset),
|
|
rp->SymbolicLinkReparseBuffer.SubstituteNameLength / sizeof (WCHAR));
|
|
pflags = PATH_SYMLINK | PATH_REP;
|
|
fileattr &= ~FILE_ATTRIBUTE_DIRECTORY;
|
|
}
|
|
else if (rp->ReparseTag == IO_REPARSE_TAG_MOUNT_POINT)
|
|
{
|
|
if (rp->SymbolicLinkReparseBuffer.PrintNameLength == 0)
|
|
{
|
|
/* Likely a volume mount point. Not treated as symlink. */
|
|
return 0;
|
|
}
|
|
sys_wcstombs (srcbuf, SYMLINK_MAX + 1,
|
|
(WCHAR *)((char *)rp->MountPointReparseBuffer.PathBuffer
|
|
+ rp->MountPointReparseBuffer.SubstituteNameOffset),
|
|
rp->MountPointReparseBuffer.SubstituteNameLength / sizeof (WCHAR));
|
|
pflags = PATH_SYMLINK | PATH_REP;
|
|
fileattr &= ~FILE_ATTRIBUTE_DIRECTORY;
|
|
}
|
|
return posixify (srcbuf);
|
|
}
|
|
|
|
int
|
|
symlink_info::posixify (char *srcbuf)
|
|
{
|
|
/* The definition for a path in a native symlink is a bit weird. The Flags
|
|
value seem to contain 0 for absolute paths (stored as NT native path)
|
|
and 1 for relative paths. Relative paths are paths not starting with a
|
|
drive letter. These are not converted to NT native, but stored as
|
|
given. A path starting with a single backslash is relative to the
|
|
current drive thus a "relative" value (Flags == 1).
|
|
Funny enough it's possible to store paths with slashes instead of
|
|
backslashes, but they are evaluated incorrectly by subsequent Windows
|
|
calls like CreateFile (ERROR_INVALID_NAME). So, what we do here is to
|
|
take paths starting with slashes at face value, evaluating them as
|
|
Cygwin specific POSIX paths.
|
|
A path starting with two slashes(!) or backslashes is converted into an
|
|
NT UNC path. Unfortunately, in contrast to POSIX rules, paths starting
|
|
with three or more (back)slashes are also converted into UNC paths,
|
|
just incorrectly sticking to one redundant leading backslashe. We go
|
|
along with this behaviour to avoid scenarios in which native tools access
|
|
other files than Cygwin.
|
|
The above rules are used exactly the same way on Cygwin specific symlinks
|
|
(sysfiles and shortcuts) to eliminate non-POSIX paths in the output. */
|
|
|
|
/* Eliminate native NT prefixes. */
|
|
if (srcbuf[0] == '\\' && !strncmp (srcbuf + 1, "??\\", 3))
|
|
{
|
|
srcbuf += 4;
|
|
if (!strncmp (srcbuf, "UNC\\", 4))
|
|
{
|
|
srcbuf += 2;
|
|
*srcbuf = '\\';
|
|
}
|
|
}
|
|
if (isdrive (srcbuf))
|
|
mount_table->conv_to_posix_path (srcbuf, contents, 0);
|
|
else if (srcbuf[0] == '\\')
|
|
{
|
|
if (srcbuf[1] == '\\') /* UNC path */
|
|
slashify (srcbuf, contents, 0);
|
|
else /* Paths starting with \ are current drive relative. */
|
|
{
|
|
char cvtbuf[SYMLINK_MAX + 1];
|
|
|
|
stpcpy (cvtbuf + cygheap->cwd.get_drive (cvtbuf), srcbuf);
|
|
mount_table->conv_to_posix_path (cvtbuf, contents, 0);
|
|
}
|
|
}
|
|
else /* Everything else is taken as is. */
|
|
slashify (srcbuf, contents, 0);
|
|
return strlen (contents);
|
|
}
|
|
|
|
enum
|
|
{
|
|
SCAN_BEG,
|
|
SCAN_LNK,
|
|
SCAN_HASLNK,
|
|
SCAN_JUSTCHECK,
|
|
SCAN_JUSTCHECKTHIS, /* Never try to append a suffix. */
|
|
SCAN_APPENDLNK,
|
|
SCAN_EXTRALNK,
|
|
SCAN_DONE,
|
|
};
|
|
|
|
class suffix_scan
|
|
{
|
|
const suffix_info *suffixes, *suffixes_start;
|
|
int nextstate;
|
|
char *eopath;
|
|
public:
|
|
const char *path;
|
|
char *has (const char *, const suffix_info *);
|
|
int next ();
|
|
int lnk_match () {return nextstate >= SCAN_APPENDLNK;}
|
|
};
|
|
|
|
char *
|
|
suffix_scan::has (const char *in_path, const suffix_info *in_suffixes)
|
|
{
|
|
nextstate = SCAN_BEG;
|
|
suffixes = suffixes_start = in_suffixes;
|
|
|
|
const char *fname = strrchr (in_path, '\\');
|
|
fname = fname ? fname + 1 : in_path;
|
|
char *ext_here = strrchr (fname, '.');
|
|
path = in_path;
|
|
eopath = strchr (path, '\0');
|
|
|
|
if (!ext_here)
|
|
goto noext;
|
|
|
|
if (suffixes)
|
|
{
|
|
/* Check if the extension matches a known extension */
|
|
for (const suffix_info *ex = in_suffixes; ex->name != NULL; ex++)
|
|
if (ascii_strcasematch (ext_here, ex->name))
|
|
{
|
|
nextstate = SCAN_JUSTCHECK;
|
|
suffixes = NULL; /* Has an extension so don't scan for one. */
|
|
goto done;
|
|
}
|
|
}
|
|
|
|
/* Didn't match. Use last resort -- .lnk. */
|
|
if (ascii_strcasematch (ext_here, ".lnk"))
|
|
{
|
|
nextstate = SCAN_HASLNK;
|
|
suffixes = NULL;
|
|
}
|
|
|
|
noext:
|
|
ext_here = eopath;
|
|
|
|
done:
|
|
/* Avoid attaching suffixes if the resulting filename would be invalid. */
|
|
if (eopath - fname > NAME_MAX - 4)
|
|
{
|
|
nextstate = SCAN_JUSTCHECKTHIS;
|
|
suffixes = NULL;
|
|
}
|
|
return ext_here;
|
|
}
|
|
|
|
int
|
|
suffix_scan::next ()
|
|
{
|
|
for (;;)
|
|
{
|
|
if (!suffixes)
|
|
switch (nextstate)
|
|
{
|
|
case SCAN_BEG:
|
|
suffixes = suffixes_start;
|
|
if (!suffixes)
|
|
{
|
|
nextstate = SCAN_LNK;
|
|
return 1;
|
|
}
|
|
nextstate = SCAN_EXTRALNK;
|
|
/* fall through to suffix checking below */
|
|
break;
|
|
case SCAN_HASLNK:
|
|
nextstate = SCAN_APPENDLNK; /* Skip SCAN_BEG */
|
|
return 1;
|
|
case SCAN_EXTRALNK:
|
|
nextstate = SCAN_DONE;
|
|
*eopath = '\0';
|
|
return 0;
|
|
case SCAN_JUSTCHECK:
|
|
nextstate = SCAN_LNK;
|
|
return 1;
|
|
case SCAN_JUSTCHECKTHIS:
|
|
nextstate = SCAN_DONE;
|
|
return 1;
|
|
case SCAN_LNK:
|
|
case SCAN_APPENDLNK:
|
|
strcat (eopath, ".lnk");
|
|
nextstate = SCAN_DONE;
|
|
return 1;
|
|
default:
|
|
*eopath = '\0';
|
|
return 0;
|
|
}
|
|
|
|
while (suffixes && suffixes->name)
|
|
if (nextstate == SCAN_EXTRALNK && !suffixes->addon)
|
|
suffixes++;
|
|
else
|
|
{
|
|
strcpy (eopath, suffixes->name);
|
|
if (nextstate == SCAN_EXTRALNK)
|
|
strcat (eopath, ".lnk");
|
|
suffixes++;
|
|
return 1;
|
|
}
|
|
suffixes = NULL;
|
|
}
|
|
}
|
|
|
|
bool
|
|
symlink_info::set_error (int in_errno)
|
|
{
|
|
bool res;
|
|
if (!(pflags & PATH_NO_ACCESS_CHECK) || in_errno == ENAMETOOLONG || in_errno == EIO)
|
|
{
|
|
error = in_errno;
|
|
res = true;
|
|
}
|
|
else if (in_errno == ENOENT)
|
|
res = true;
|
|
else
|
|
{
|
|
fileattr = FILE_ATTRIBUTE_NORMAL;
|
|
res = false;
|
|
}
|
|
return res;
|
|
}
|
|
|
|
bool
|
|
symlink_info::parse_device (const char *contents)
|
|
{
|
|
char *endptr;
|
|
_major_t mymajor;
|
|
_major_t myminor;
|
|
_mode_t mymode;
|
|
|
|
mymajor = strtol (contents += 2, &endptr, 16);
|
|
if (endptr == contents)
|
|
return isdevice = false;
|
|
|
|
contents = endptr;
|
|
myminor = strtol (++contents, &endptr, 16);
|
|
if (endptr == contents)
|
|
return isdevice = false;
|
|
|
|
contents = endptr;
|
|
mymode = strtol (++contents, &endptr, 16);
|
|
if (endptr == contents)
|
|
return isdevice = false;
|
|
|
|
if ((mymode & S_IFMT) == S_IFIFO)
|
|
{
|
|
mymajor = _major (FH_FIFO);
|
|
myminor = _minor (FH_FIFO);
|
|
}
|
|
|
|
major = mymajor;
|
|
minor = myminor;
|
|
mode = mymode;
|
|
return isdevice = true;
|
|
}
|
|
|
|
/* Check if PATH is a symlink. PATH must be a valid Win32 path name.
|
|
|
|
If PATH is a symlink, put the value of the symlink--the file to
|
|
which it points--into BUF. The value stored in BUF is not
|
|
necessarily null terminated. BUFLEN is the length of BUF; only up
|
|
to BUFLEN characters will be stored in BUF. BUF may be NULL, in
|
|
which case nothing will be stored.
|
|
|
|
Set *SYML if PATH is a symlink.
|
|
|
|
Set *EXEC if PATH appears to be executable. This is an efficiency
|
|
hack because we sometimes have to open the file anyhow. *EXEC will
|
|
not be set for every executable file.
|
|
|
|
Return -1 on error, 0 if PATH is not a symlink, or the length
|
|
stored into BUF if PATH is a symlink. */
|
|
|
|
enum symlink_t {
|
|
is_no_symlink,
|
|
is_shortcut_symlink,
|
|
is_reparse_symlink,
|
|
is_sysfile_symlink
|
|
};
|
|
|
|
int
|
|
symlink_info::check (char *path, const suffix_info *suffixes, unsigned opt)
|
|
{
|
|
HANDLE h;
|
|
int res = 0;
|
|
suffix_scan suffix;
|
|
contents[0] = '\0';
|
|
|
|
issymlink = true;
|
|
isdevice = false;
|
|
ext_here = suffix.has (path, suffixes);
|
|
extn = ext_here - path;
|
|
major = 0;
|
|
minor = 0;
|
|
mode = 0;
|
|
pflags &= ~(PATH_SYMLINK | PATH_LNK | PATH_REP);
|
|
case_clash = false;
|
|
|
|
/* TODO: Temporarily do all char->UNICODE conversion here. This should
|
|
already be slightly faster than using Ascii functions. */
|
|
tmp_pathbuf tp;
|
|
UNICODE_STRING upath;
|
|
OBJECT_ATTRIBUTES attr;
|
|
tp.u_get (&upath);
|
|
InitializeObjectAttributes (&attr, &upath, OBJ_CASE_INSENSITIVE, NULL, NULL);
|
|
|
|
while (suffix.next ())
|
|
{
|
|
FILE_BASIC_INFORMATION fbi;
|
|
NTSTATUS status;
|
|
IO_STATUS_BLOCK io;
|
|
|
|
error = 0;
|
|
get_nt_native_path (suffix.path, upath, pflags & MOUNT_ENC);
|
|
status = NtQueryAttributesFile (&attr, &fbi);
|
|
if (NT_SUCCESS (status))
|
|
fileattr = fbi.FileAttributes;
|
|
else
|
|
{
|
|
debug_printf ("%p = NtQueryAttributesFile (%S)", status, &upath);
|
|
fileattr = INVALID_FILE_ATTRIBUTES;
|
|
|
|
/* One of the inner path components is invalid, or the path contains
|
|
invalid characters. Bail out with ENOENT.
|
|
|
|
Note that additional STATUS_OBJECT_PATH_INVALID and
|
|
STATUS_OBJECT_PATH_SYNTAX_BAD status codes exist. The first one
|
|
is seemingly not generated by NtQueryAttributesFile, the latter
|
|
is only generated if the path is no absolute path within the
|
|
NT name space, which should not happen and would point to an
|
|
error in get_nt_native_path. Both status codes are deliberately
|
|
not tested here unless proved necessary. */
|
|
if (status == STATUS_OBJECT_PATH_NOT_FOUND
|
|
|| status == STATUS_OBJECT_NAME_INVALID)
|
|
{
|
|
set_error (ENOENT);
|
|
goto file_not_symlink;
|
|
}
|
|
if (status != STATUS_OBJECT_NAME_NOT_FOUND
|
|
&& status != STATUS_NO_SUCH_FILE) /* File not found on 9x share */
|
|
{
|
|
/* The file exists, but the user can't access it for one reason
|
|
or the other. To get the file attributes we try to access the
|
|
information by opening the parent directory and getting the
|
|
file attributes using a matching NtQueryDirectoryFile call. */
|
|
UNICODE_STRING dirname, basename;
|
|
OBJECT_ATTRIBUTES dattr;
|
|
HANDLE dir;
|
|
FILE_DIRECTORY_INFORMATION fdi;
|
|
|
|
RtlSplitUnicodePath (&upath, &dirname, &basename);
|
|
InitializeObjectAttributes (&dattr, &dirname,
|
|
OBJ_CASE_INSENSITIVE, NULL, NULL);
|
|
status = NtOpenFile (&dir, SYNCHRONIZE | FILE_LIST_DIRECTORY,
|
|
&dattr, &io, FILE_SHARE_VALID_FLAGS,
|
|
FILE_SYNCHRONOUS_IO_NONALERT
|
|
| FILE_OPEN_FOR_BACKUP_INTENT
|
|
| FILE_DIRECTORY_FILE);
|
|
if (!NT_SUCCESS (status))
|
|
{
|
|
debug_printf ("%p = NtOpenFile(%S)", status, &dirname);
|
|
fileattr = 0;
|
|
}
|
|
else
|
|
{
|
|
status = NtQueryDirectoryFile (dir, NULL, NULL, 0, &io,
|
|
&fdi, sizeof fdi,
|
|
FileDirectoryInformation,
|
|
TRUE, &basename, TRUE);
|
|
NtClose (dir);
|
|
/* Per MSDN, ZwQueryDirectoryFile allows to specify a buffer
|
|
which only fits the static parts of the structure (without
|
|
filename that is) in the first call. The buffer actually
|
|
contains valid data, even though ZwQueryDirectoryFile
|
|
returned STATUS_BUFFER_OVERFLOW.
|
|
|
|
Please note that this doesn't work for the info class
|
|
FileIdBothDirectoryInformation, unfortunately, so we don't
|
|
use this technique in fhandler_base::fstat_by_name, */
|
|
if (!NT_SUCCESS (status) && status != STATUS_BUFFER_OVERFLOW)
|
|
{
|
|
debug_printf ("%p = NtQueryDirectoryFile(%S)",
|
|
status, &dirname);
|
|
fileattr = 0;
|
|
}
|
|
else
|
|
fileattr = fdi.FileAttributes;
|
|
}
|
|
ext_tacked_on = !!*ext_here;
|
|
goto file_not_symlink;
|
|
}
|
|
if (set_error (geterrno_from_win_error
|
|
(RtlNtStatusToDosError (status), EACCES)))
|
|
continue;
|
|
}
|
|
|
|
ext_tacked_on = !!*ext_here;
|
|
|
|
if (pcheck_case != PCHECK_RELAXED && !case_check (path)
|
|
|| (opt & PC_SYM_IGNORE))
|
|
goto file_not_symlink;
|
|
|
|
symlink_t sym_check;
|
|
|
|
sym_check = is_no_symlink;
|
|
|
|
if ((fileattr & (FILE_ATTRIBUTE_DIRECTORY | FILE_ATTRIBUTE_REPARSE_POINT))
|
|
== FILE_ATTRIBUTE_DIRECTORY)
|
|
goto file_not_symlink;
|
|
|
|
/* Windows shortcuts are potentially treated as symlinks. */
|
|
/* Valid Cygwin & U/WIN shortcuts are R/O. */
|
|
if ((fileattr & FILE_ATTRIBUTE_READONLY) && suffix.lnk_match ())
|
|
sym_check = is_shortcut_symlink;
|
|
|
|
/* Reparse points are potentially symlinks. This check must be
|
|
performed before checking the SYSTEM attribute for sysfile
|
|
symlinks, since reparse points can have this flag set, too.
|
|
For instance, Vista starts to create a couple of reparse points
|
|
with SYSTEM and HIDDEN flags set. */
|
|
else if (fileattr & FILE_ATTRIBUTE_REPARSE_POINT)
|
|
sym_check = is_reparse_symlink;
|
|
|
|
/* This is the old Cygwin method creating symlinks: */
|
|
/* A symlink will have the `system' file attribute. */
|
|
/* Only files can be symlinks (which can be symlinks to directories). */
|
|
else if (fileattr & FILE_ATTRIBUTE_SYSTEM)
|
|
sym_check = is_sysfile_symlink;
|
|
|
|
if (sym_check == is_no_symlink)
|
|
goto file_not_symlink;
|
|
|
|
res = -1;
|
|
|
|
/* Open the file. Opening reparse points must not use GENERIC_READ.
|
|
The reason is that Vista starts to create a couple of reparse
|
|
points for backward compatibility, hidden system files, explicitely
|
|
denying everyone FILE_READ_DATA access. */
|
|
status = NtOpenFile (&h,
|
|
sym_check == is_reparse_symlink
|
|
? READ_CONTROL : FILE_GENERIC_READ,
|
|
&attr, &io, FILE_SHARE_VALID_FLAGS,
|
|
FILE_OPEN_FOR_BACKUP_INTENT
|
|
| (sym_check == is_reparse_symlink
|
|
? FILE_OPEN_REPARSE_POINT
|
|
: FILE_SYNCHRONOUS_IO_NONALERT));
|
|
if (!NT_SUCCESS (status))
|
|
goto file_not_symlink;
|
|
|
|
switch (sym_check)
|
|
{
|
|
case is_shortcut_symlink:
|
|
res = check_shortcut (h);
|
|
NtClose (h);
|
|
if (!res)
|
|
/* check more below */;
|
|
else if (contents[0] == ':' && contents[1] == '\\' && parse_device (contents))
|
|
goto file_not_symlink;
|
|
else
|
|
break;
|
|
/* If searching for `foo' and then finding a `foo.lnk' which is
|
|
no shortcut, return the same as if file not found. */
|
|
if (!suffix.lnk_match () || !ext_tacked_on)
|
|
goto file_not_symlink;
|
|
|
|
fileattr = INVALID_FILE_ATTRIBUTES;
|
|
continue; /* in case we're going to tack *another* .lnk on this filename. */
|
|
case is_reparse_symlink:
|
|
res = check_reparse_point (h);
|
|
NtClose (h);
|
|
if (!res)
|
|
goto file_not_symlink;
|
|
break;
|
|
case is_sysfile_symlink:
|
|
res = check_sysfile (h);
|
|
NtClose (h);
|
|
if (!res)
|
|
goto file_not_symlink;
|
|
break;
|
|
default: /* Make gcc happy. Won't happen. */
|
|
goto file_not_symlink;
|
|
}
|
|
break;
|
|
|
|
file_not_symlink:
|
|
issymlink = false;
|
|
syscall_printf ("%s", isdevice ? "is a device" : "not a symlink");
|
|
res = 0;
|
|
break;
|
|
}
|
|
|
|
syscall_printf ("%d = symlink.check (%s, %p) (%p)",
|
|
res, suffix.path, contents, pflags);
|
|
return res;
|
|
}
|
|
|
|
/* "path" is the path in a virtual symlink. Set a symlink_info struct from
|
|
that and proceed with further path checking afterwards. */
|
|
int
|
|
symlink_info::set (char *path)
|
|
{
|
|
strcpy (contents, path);
|
|
pflags = PATH_SYMLINK;
|
|
fileattr = FILE_ATTRIBUTE_NORMAL;
|
|
error = 0;
|
|
issymlink = true;
|
|
isdevice = false;
|
|
ext_tacked_on = case_clash = false;
|
|
ext_here = NULL;
|
|
extn = major = minor = mode = 0;
|
|
return strlen (path);
|
|
}
|
|
|
|
/* Check the correct case of the last path component (given in DOS style).
|
|
Adjust the case in this->path if pcheck_case == PCHECK_ADJUST or return
|
|
false if pcheck_case == PCHECK_STRICT.
|
|
Dont't call if pcheck_case == PCHECK_RELAXED.
|
|
*/
|
|
|
|
bool
|
|
symlink_info::case_check (char *path)
|
|
{
|
|
WIN32_FIND_DATA data;
|
|
HANDLE h;
|
|
char *c;
|
|
|
|
/* Set a pointer to the beginning of the last component. */
|
|
if (!(c = strrchr (path, '\\')))
|
|
c = path;
|
|
else
|
|
++c;
|
|
|
|
if ((h = FindFirstFile (path, &data))
|
|
!= INVALID_HANDLE_VALUE)
|
|
{
|
|
FindClose (h);
|
|
|
|
/* If that part of the component exists, check the case. */
|
|
if (strncmp (c, data.cFileName, strlen (data.cFileName)))
|
|
{
|
|
case_clash = true;
|
|
|
|
/* If check is set to STRICT, a wrong case results
|
|
in returning a ENOENT. */
|
|
if (pcheck_case == PCHECK_STRICT)
|
|
return false;
|
|
|
|
/* PCHECK_ADJUST adjusts the case in the incoming
|
|
path which points to the path in *this. */
|
|
strcpy (c, data.cFileName);
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
/* readlink system call */
|
|
|
|
extern "C" int
|
|
readlink (const char *path, char *buf, int buflen)
|
|
{
|
|
if (buflen < 0)
|
|
{
|
|
set_errno (ENAMETOOLONG);
|
|
return -1;
|
|
}
|
|
|
|
path_conv pathbuf (path, PC_SYM_CONTENTS, stat_suffixes);
|
|
|
|
if (pathbuf.error)
|
|
{
|
|
set_errno (pathbuf.error);
|
|
syscall_printf ("-1 = readlink (%s, %p, %d)", path, buf, buflen);
|
|
return -1;
|
|
}
|
|
|
|
if (!pathbuf.exists ())
|
|
{
|
|
set_errno (ENOENT);
|
|
return -1;
|
|
}
|
|
|
|
if (!pathbuf.issymlink ())
|
|
{
|
|
if (pathbuf.exists ())
|
|
set_errno (EINVAL);
|
|
return -1;
|
|
}
|
|
|
|
int len = min (buflen, (int) strlen (pathbuf.get_win32 ()));
|
|
memcpy (buf, pathbuf.get_win32 (), len);
|
|
|
|
/* errno set by symlink.check if error */
|
|
return len;
|
|
}
|
|
|
|
/* Some programs rely on st_dev/st_ino being unique for each file.
|
|
Hash the path name and hope for the best. The hash arg is not
|
|
always initialized to zero since readdir needs to compute the
|
|
dirent ino_t based on a combination of the hash of the directory
|
|
done during the opendir call and the hash or the filename within
|
|
the directory. FIXME: Not bullet-proof. */
|
|
/* Cygwin internal */
|
|
__ino64_t __stdcall
|
|
hash_path_name (__ino64_t hash, PUNICODE_STRING name)
|
|
{
|
|
if (name->Length == 0)
|
|
return hash;
|
|
|
|
/* Build up hash. Name is already normalized */
|
|
USHORT len = name->Length / sizeof (WCHAR);
|
|
for (USHORT idx = 0; idx < len; ++idx)
|
|
hash = RtlUpcaseUnicodeChar (name->Buffer[idx])
|
|
+ (hash << 6) + (hash << 16) - hash;
|
|
return hash;
|
|
}
|
|
|
|
__ino64_t __stdcall
|
|
hash_path_name (__ino64_t hash, PCWSTR name)
|
|
{
|
|
UNICODE_STRING uname;
|
|
RtlInitUnicodeString (&uname, name);
|
|
return hash_path_name (hash, &uname);
|
|
}
|
|
|
|
__ino64_t __stdcall
|
|
hash_path_name (__ino64_t hash, const char *name)
|
|
{
|
|
UNICODE_STRING uname;
|
|
RtlCreateUnicodeStringFromAsciiz (&uname, name);
|
|
__ino64_t ret = hash_path_name (hash, &uname);
|
|
RtlFreeUnicodeString (&uname);
|
|
return ret;
|
|
}
|
|
|
|
extern "C" char *
|
|
getcwd (char *buf, size_t ulen)
|
|
{
|
|
char* res = NULL;
|
|
myfault efault;
|
|
if (efault.faulted (EFAULT))
|
|
/* errno set */;
|
|
else if (ulen == 0 && buf)
|
|
set_errno (EINVAL);
|
|
else
|
|
res = cygheap->cwd.get (buf, 1, 1, ulen);
|
|
return res;
|
|
}
|
|
|
|
/* getwd: Legacy. */
|
|
extern "C" char *
|
|
getwd (char *buf)
|
|
{
|
|
return getcwd (buf, PATH_MAX + 1); /*Per SuSv3!*/
|
|
}
|
|
|
|
/* chdir: POSIX 5.2.1.1 */
|
|
extern "C" int
|
|
chdir (const char *in_dir)
|
|
{
|
|
myfault efault;
|
|
if (efault.faulted (EFAULT))
|
|
return -1;
|
|
if (!*in_dir)
|
|
{
|
|
set_errno (ENOENT);
|
|
return -1;
|
|
}
|
|
|
|
syscall_printf ("dir '%s'", in_dir);
|
|
|
|
/* Convert path. First argument ensures that we don't check for NULL/empty/invalid
|
|
again. */
|
|
path_conv path (PC_NONULLEMPTY, in_dir, PC_SYM_FOLLOW | PC_POSIX);
|
|
if (path.error)
|
|
{
|
|
set_errno (path.error);
|
|
syscall_printf ("-1 = chdir (%s)", in_dir);
|
|
return -1;
|
|
}
|
|
|
|
int res = -1;
|
|
bool doit = false;
|
|
const char *posix_cwd = NULL;
|
|
int devn = path.get_devn ();
|
|
if (!isvirtual_dev (devn))
|
|
{
|
|
/* The sequence chdir("xx"); chdir(".."); must be a noop if xx
|
|
is not a symlink. This is exploited by find.exe.
|
|
The posix_cwd is just path.normalized_path.
|
|
In other cases we let cwd.set obtain the Posix path through
|
|
the mount table. */
|
|
if (!isdrive(path.normalized_path))
|
|
posix_cwd = path.normalized_path;
|
|
res = 0;
|
|
doit = true;
|
|
}
|
|
else if (!path.exists ())
|
|
set_errno (ENOENT);
|
|
else if (!path.isdir ())
|
|
set_errno (ENOTDIR);
|
|
else
|
|
{
|
|
posix_cwd = path.normalized_path;
|
|
res = 0;
|
|
}
|
|
|
|
if (!res)
|
|
res = cygheap->cwd.set (path.get_nt_native_path (), posix_cwd, doit);
|
|
|
|
/* Note that we're accessing cwd.posix without a lock here. I didn't think
|
|
it was worth locking just for strace. */
|
|
syscall_printf ("%d = chdir() cygheap->cwd.posix '%s' native '%S'", res,
|
|
cygheap->cwd.posix, path.get_nt_native_path ());
|
|
MALLOC_CHECK;
|
|
return res;
|
|
}
|
|
|
|
extern "C" int
|
|
fchdir (int fd)
|
|
{
|
|
int res;
|
|
cygheap_fdget cfd (fd);
|
|
if (cfd >= 0)
|
|
res = chdir (cfd->get_name ());
|
|
else
|
|
res = -1;
|
|
|
|
syscall_printf ("%d = fchdir (%d)", res, fd);
|
|
return res;
|
|
}
|
|
|
|
/******************** Exported Path Routines *********************/
|
|
|
|
/* Cover functions to the path conversion routines.
|
|
These are exported to the world as cygwin_foo by cygwin.din. */
|
|
|
|
#define return_with_errno(x) \
|
|
do {\
|
|
int err = (x);\
|
|
if (!err)\
|
|
return 0;\
|
|
set_errno (err);\
|
|
return -1;\
|
|
} while (0)
|
|
|
|
extern "C" ssize_t
|
|
cygwin_conv_path (cygwin_conv_path_t what, const void *from, void *to,
|
|
size_t size)
|
|
{
|
|
myfault efault;
|
|
if (efault.faulted (EFAULT))
|
|
return -1;
|
|
|
|
path_conv p;
|
|
tmp_pathbuf tp;
|
|
size_t lsiz = 0;
|
|
char *buf = NULL;
|
|
int error = 0;
|
|
bool relative = !!(what & CCP_RELATIVE);
|
|
what &= ~CCP_RELATIVE;
|
|
|
|
switch (what)
|
|
{
|
|
case CCP_POSIX_TO_WIN_A:
|
|
p.check ((const char *) from,
|
|
PC_POSIX | PC_SYM_FOLLOW | PC_NO_ACCESS_CHECK | PC_NOWARN
|
|
| (relative ? PC_NOFULL : 0));
|
|
if (p.error)
|
|
return_with_errno (p.error);
|
|
PUNICODE_STRING up = p.get_nt_native_path ();
|
|
buf = tp.c_get ();
|
|
sys_wcstombs (buf, NT_MAX_PATH, up->Buffer, up->Length / sizeof (WCHAR));
|
|
buf += 4; /* Skip \??\ */
|
|
if (ascii_strncasematch (buf, "UNC\\", 4))
|
|
*(buf += 2) = '\\';
|
|
lsiz = strlen (buf) + 1;
|
|
break;
|
|
case CCP_POSIX_TO_WIN_W:
|
|
p.check ((const char *) from,
|
|
PC_POSIX | PC_SYM_FOLLOW | PC_NO_ACCESS_CHECK | PC_NOWARN
|
|
| (relative ? PC_NOFULL : 0));
|
|
if (p.error)
|
|
return_with_errno (p.error);
|
|
lsiz = (p.get_wide_win32_path_len () + 1) * sizeof (WCHAR);
|
|
break;
|
|
case CCP_WIN_A_TO_POSIX:
|
|
buf = tp.c_get ();
|
|
error = mount_table->conv_to_posix_path ((const char *) from, buf,
|
|
relative);
|
|
if (error)
|
|
return_with_errno (error);
|
|
lsiz = strlen (buf) + 1;
|
|
break;
|
|
case CCP_WIN_W_TO_POSIX:
|
|
buf = tp.c_get ();
|
|
error = mount_table->conv_to_posix_path ((const PWCHAR) from, buf,
|
|
relative);
|
|
if (error)
|
|
return_with_errno (error);
|
|
lsiz = strlen (buf) + 1;
|
|
break;
|
|
default:
|
|
set_errno (EINVAL);
|
|
return -1;
|
|
}
|
|
if (!size)
|
|
return lsiz;
|
|
if (size < lsiz)
|
|
{
|
|
set_errno (ENOSPC);
|
|
return -1;
|
|
}
|
|
switch (what)
|
|
{
|
|
case CCP_POSIX_TO_WIN_A:
|
|
case CCP_WIN_A_TO_POSIX:
|
|
case CCP_WIN_W_TO_POSIX:
|
|
strcpy ((char *) to, buf);
|
|
break;
|
|
case CCP_POSIX_TO_WIN_W:
|
|
p.get_wide_win32_path ((PWCHAR) to);
|
|
break;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
extern "C" void *
|
|
cygwin_create_path (cygwin_conv_path_t what, const void *from)
|
|
{
|
|
void *to;
|
|
ssize_t size = cygwin_conv_path (what, from, NULL, 0);
|
|
if (size <= 0)
|
|
return NULL;
|
|
if (!(to = malloc (size)))
|
|
return NULL;
|
|
if (cygwin_conv_path (what, from, to, size) == -1)
|
|
return NULL;
|
|
return to;
|
|
}
|
|
|
|
|
|
extern "C" int
|
|
cygwin_conv_to_win32_path (const char *path, char *win32_path)
|
|
{
|
|
return cygwin_conv_path (CCP_POSIX_TO_WIN_A | CCP_RELATIVE, path, win32_path,
|
|
MAX_PATH);
|
|
}
|
|
|
|
extern "C" int
|
|
cygwin_conv_to_full_win32_path (const char *path, char *win32_path)
|
|
{
|
|
return cygwin_conv_path (CCP_POSIX_TO_WIN_A | CCP_ABSOLUTE, path, win32_path,
|
|
MAX_PATH);
|
|
}
|
|
|
|
/* This is exported to the world as cygwin_foo by cygwin.din. */
|
|
|
|
extern "C" int
|
|
cygwin_conv_to_posix_path (const char *path, char *posix_path)
|
|
{
|
|
return cygwin_conv_path (CCP_WIN_A_TO_POSIX | CCP_RELATIVE, path, posix_path,
|
|
MAX_PATH);
|
|
}
|
|
|
|
extern "C" int
|
|
cygwin_conv_to_full_posix_path (const char *path, char *posix_path)
|
|
{
|
|
return cygwin_conv_path (CCP_WIN_A_TO_POSIX | CCP_ABSOLUTE, path, posix_path,
|
|
MAX_PATH);
|
|
}
|
|
|
|
/* The realpath function is supported on some UNIX systems. */
|
|
|
|
extern "C" char *
|
|
realpath (const char *path, char *resolved)
|
|
{
|
|
/* Make sure the right errno is returned if path is NULL. */
|
|
if (!path)
|
|
{
|
|
set_errno (EINVAL);
|
|
return NULL;
|
|
}
|
|
|
|
/* Guard reading from a potentially invalid path and writing to a
|
|
potentially invalid resolved. */
|
|
myfault efault;
|
|
if (efault.faulted (EFAULT))
|
|
return NULL;
|
|
|
|
tmp_pathbuf tp;
|
|
char *tpath;
|
|
if (isdrive (path))
|
|
{
|
|
tpath = tp.c_get ();
|
|
mount_table->cygdrive_posix_path (path, tpath, 0);
|
|
}
|
|
else
|
|
tpath = (char *) path;
|
|
|
|
path_conv real_path (tpath, PC_SYM_FOLLOW | PC_POSIX, stat_suffixes);
|
|
|
|
|
|
/* Linux has this funny non-standard extension. If "resolved" is NULL,
|
|
realpath mallocs the space by itself and returns it to the application.
|
|
The application is responsible for calling free() then. This extension
|
|
is backed by POSIX, which allows implementation-defined behaviour if
|
|
"resolved" is NULL. That's good enough for us to do the same here. */
|
|
|
|
if (!real_path.error && real_path.exists ())
|
|
{
|
|
/* Check for the suffix being tacked on. */
|
|
int tack_on = 0;
|
|
if (!transparent_exe && real_path.known_suffix)
|
|
{
|
|
char *c = strrchr (real_path.normalized_path, '.');
|
|
if (!c || !ascii_strcasematch (c, real_path.known_suffix))
|
|
tack_on = strlen (real_path.known_suffix);
|
|
}
|
|
|
|
if (!resolved)
|
|
{
|
|
resolved = (char *) malloc (strlen (real_path.normalized_path)
|
|
+ tack_on + 1);
|
|
if (!resolved)
|
|
return NULL;
|
|
}
|
|
strcpy (resolved, real_path.normalized_path);
|
|
if (tack_on)
|
|
strcat (resolved, real_path.known_suffix);
|
|
return resolved;
|
|
}
|
|
|
|
/* FIXME: on error, we are supposed to put the name of the path
|
|
component which could not be resolved into RESOLVED. */
|
|
if (resolved)
|
|
resolved[0] = '\0';
|
|
set_errno (real_path.error ?: ENOENT);
|
|
return NULL;
|
|
}
|
|
|
|
/* Return non-zero if path is a POSIX path list.
|
|
This is exported to the world as cygwin_foo by cygwin.din.
|
|
|
|
DOCTOOL-START
|
|
<sect1 id="add-func-cygwin-posix-path-list-p">
|
|
<para>Rather than use a mode to say what the "proper" path list
|
|
format is, we allow any, and give apps the tools they need to
|
|
convert between the two. If a ';' is present in the path list it's
|
|
a Win32 path list. Otherwise, if the first path begins with
|
|
[letter]: (in which case it can be the only element since if it
|
|
wasn't a ';' would be present) it's a Win32 path list. Otherwise,
|
|
it's a POSIX path list.</para>
|
|
</sect1>
|
|
DOCTOOL-END
|
|
*/
|
|
|
|
extern "C" int
|
|
cygwin_posix_path_list_p (const char *path)
|
|
{
|
|
int posix_p = !(strchr (path, ';') || isdrive (path));
|
|
return posix_p;
|
|
}
|
|
|
|
/* These are used for apps that need to convert env vars like PATH back and
|
|
forth. The conversion is a two step process. First, an upper bound on the
|
|
size of the buffer needed is computed. Then the conversion is done. This
|
|
allows the caller to use alloca if it wants. */
|
|
|
|
static int
|
|
conv_path_list_buf_size (const char *path_list, bool to_posix)
|
|
{
|
|
int i, num_elms, max_mount_path_len, size;
|
|
const char *p;
|
|
|
|
path_conv pc(".", PC_POSIX);
|
|
/* The theory is that an upper bound is
|
|
current_size + (num_elms * max_mount_path_len) */
|
|
/* FIXME: This method is questionable in the long run. */
|
|
|
|
unsigned nrel;
|
|
char delim = to_posix ? ';' : ':';
|
|
for (p = path_list, num_elms = nrel = 0; p; num_elms++)
|
|
{
|
|
if (!isabspath (p))
|
|
nrel++;
|
|
p = strchr (++p, delim);
|
|
}
|
|
|
|
/* 7: strlen ("//c") + slop, a conservative initial value */
|
|
for (max_mount_path_len = sizeof ("/cygdrive/X"), i = 0;
|
|
i < mount_table->nmounts; i++)
|
|
{
|
|
int mount_len = (to_posix
|
|
? mount_table->mount[i].posix_pathlen
|
|
: mount_table->mount[i].native_pathlen);
|
|
if (max_mount_path_len < mount_len)
|
|
max_mount_path_len = mount_len;
|
|
}
|
|
|
|
/* 100: slop */
|
|
size = strlen (path_list)
|
|
+ (num_elms * max_mount_path_len)
|
|
+ (nrel * strlen (to_posix ? pc.normalized_path : pc.get_win32 ()))
|
|
+ 100;
|
|
|
|
return size;
|
|
}
|
|
|
|
|
|
extern "C" int
|
|
cygwin_win32_to_posix_path_list_buf_size (const char *path_list)
|
|
{
|
|
return conv_path_list_buf_size (path_list, true);
|
|
}
|
|
|
|
extern "C" int
|
|
cygwin_posix_to_win32_path_list_buf_size (const char *path_list)
|
|
{
|
|
return conv_path_list_buf_size (path_list, false);
|
|
}
|
|
|
|
extern "C" ssize_t
|
|
env_PATH_to_posix (const void *win32, void *posix, size_t size)
|
|
{
|
|
return_with_errno (conv_path_list ((const char *) win32, (char *) posix,
|
|
size, ENV_CVT));
|
|
}
|
|
|
|
extern "C" int
|
|
cygwin_win32_to_posix_path_list (const char *win32, char *posix)
|
|
{
|
|
return_with_errno (conv_path_list (win32, posix, MAX_PATH, 1));
|
|
}
|
|
|
|
extern "C" int
|
|
cygwin_posix_to_win32_path_list (const char *posix, char *win32)
|
|
{
|
|
return_with_errno (conv_path_list (posix, win32, MAX_PATH, 0));
|
|
}
|
|
|
|
extern "C" ssize_t
|
|
cygwin_conv_path_list (cygwin_conv_path_t what, const void *from, void *to,
|
|
size_t size)
|
|
{
|
|
/* FIXME: Path lists are (so far) always retaining relative paths. */
|
|
what &= ~CCP_RELATIVE;
|
|
switch (what)
|
|
{
|
|
case CCP_WIN_W_TO_POSIX:
|
|
case CCP_POSIX_TO_WIN_W:
|
|
/*FIXME*/
|
|
api_fatal ("wide char path lists not yet supported");
|
|
break;
|
|
case CCP_WIN_A_TO_POSIX:
|
|
case CCP_POSIX_TO_WIN_A:
|
|
if (size == 0)
|
|
return conv_path_list_buf_size ((const char *) from,
|
|
what == CCP_WIN_A_TO_POSIX);
|
|
return_with_errno (conv_path_list ((const char *) from, (char *) to,
|
|
size, what == CCP_WIN_A_TO_POSIX));
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
set_errno (EINVAL);
|
|
return -1;
|
|
}
|
|
|
|
/* cygwin_split_path: Split a path into directory and file name parts.
|
|
Buffers DIR and FILE are assumed to be big enough.
|
|
|
|
Examples (path -> `dir' / `file'):
|
|
/ -> `/' / `'
|
|
"" -> `.' / `'
|
|
. -> `.' / `.' (FIXME: should this be `.' / `'?)
|
|
.. -> `.' / `..' (FIXME: should this be `..' / `'?)
|
|
foo -> `.' / `foo'
|
|
foo/bar -> `foo' / `bar'
|
|
foo/bar/ -> `foo' / `bar'
|
|
/foo -> `/' / `foo'
|
|
/foo/bar -> `/foo' / `bar'
|
|
c: -> `c:/' / `'
|
|
c:/ -> `c:/' / `'
|
|
c:foo -> `c:/' / `foo'
|
|
c:/foo -> `c:/' / `foo'
|
|
*/
|
|
|
|
extern "C" void
|
|
cygwin_split_path (const char *path, char *dir, char *file)
|
|
{
|
|
int dir_started_p = 0;
|
|
|
|
/* Deal with drives.
|
|
Remember that c:foo <==> c:/foo. */
|
|
if (isdrive (path))
|
|
{
|
|
*dir++ = *path++;
|
|
*dir++ = *path++;
|
|
*dir++ = '/';
|
|
if (!*path)
|
|
{
|
|
*dir = 0;
|
|
*file = 0;
|
|
return;
|
|
}
|
|
if (isdirsep (*path))
|
|
++path;
|
|
dir_started_p = 1;
|
|
}
|
|
|
|
/* Determine if there are trailing slashes and "delete" them if present.
|
|
We pretend as if they don't exist. */
|
|
const char *end = path + strlen (path);
|
|
/* path + 1: keep leading slash. */
|
|
while (end > path + 1 && isdirsep (end[-1]))
|
|
--end;
|
|
|
|
/* At this point, END points to one beyond the last character
|
|
(with trailing slashes "deleted"). */
|
|
|
|
/* Point LAST_SLASH at the last slash (duh...). */
|
|
const char *last_slash;
|
|
for (last_slash = end - 1; last_slash >= path; --last_slash)
|
|
if (isdirsep (*last_slash))
|
|
break;
|
|
|
|
if (last_slash == path)
|
|
{
|
|
*dir++ = '/';
|
|
*dir = 0;
|
|
}
|
|
else if (last_slash > path)
|
|
{
|
|
memcpy (dir, path, last_slash - path);
|
|
dir[last_slash - path] = 0;
|
|
}
|
|
else
|
|
{
|
|
if (dir_started_p)
|
|
; /* nothing to do */
|
|
else
|
|
*dir++ = '.';
|
|
*dir = 0;
|
|
}
|
|
|
|
memcpy (file, last_slash + 1, end - last_slash - 1);
|
|
file[end - last_slash - 1] = 0;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static inline PRTL_USER_PROCESS_PARAMETERS
|
|
get_user_proc_parms ()
|
|
{
|
|
return NtCurrentTeb ()->Peb->ProcessParameters;
|
|
}
|
|
|
|
/* Initialize cygcwd 'muto' for serializing access to cwd info. */
|
|
void
|
|
cwdstuff::init ()
|
|
{
|
|
cwd_lock.init ("cwd_lock");
|
|
/* Initially re-open the cwd to allow POSIX semantics. */
|
|
set (NULL, NULL, true);
|
|
}
|
|
|
|
/* Chdir and fill out the elements of a cwdstuff struct. */
|
|
int
|
|
cwdstuff::set (PUNICODE_STRING nat_cwd, const char *posix_cwd, bool doit)
|
|
{
|
|
int res = 0;
|
|
UNICODE_STRING upath;
|
|
size_t len = 0;
|
|
|
|
cwd_lock.acquire ();
|
|
|
|
if (nat_cwd)
|
|
{
|
|
upath = *nat_cwd;
|
|
if (upath.Buffer[0] == L'/') /* Virtual path. Never use in PEB. */
|
|
doit = false;
|
|
else
|
|
{
|
|
len = upath.Length / sizeof (WCHAR) - 4;
|
|
if (RtlEqualUnicodePathPrefix (&upath, L"\\??\\UNC\\", TRUE))
|
|
len -= 2;
|
|
}
|
|
}
|
|
|
|
if (doit)
|
|
{
|
|
/* We utilize the user parameter block. The directory is
|
|
stored manually there. Why the hassle?
|
|
|
|
- SetCurrentDirectory fails for directories with strict
|
|
permissions even for processes with the SE_BACKUP_NAME
|
|
privilege enabled. The reason is apparently that
|
|
SetCurrentDirectory calls NtOpenFile without the
|
|
FILE_OPEN_FOR_BACKUP_INTENT flag set.
|
|
|
|
- Unlinking a cwd fails because SetCurrentDirectory seems to
|
|
open directories so that deleting the directory is disallowed.
|
|
The below code opens with *all* sharing flags set. */
|
|
HANDLE h;
|
|
NTSTATUS status;
|
|
IO_STATUS_BLOCK io;
|
|
OBJECT_ATTRIBUTES attr;
|
|
PHANDLE phdl;
|
|
|
|
RtlAcquirePebLock ();
|
|
phdl = &get_user_proc_parms ()->CurrentDirectoryHandle;
|
|
if (!nat_cwd) /* On init, just reopen CWD with desired access flags. */
|
|
RtlInitUnicodeString (&upath, L"");
|
|
InitializeObjectAttributes (&attr, &upath,
|
|
OBJ_CASE_INSENSITIVE | OBJ_INHERIT,
|
|
nat_cwd ? NULL : *phdl, NULL);
|
|
status = NtOpenFile (&h, SYNCHRONIZE | FILE_TRAVERSE, &attr, &io,
|
|
FILE_SHARE_VALID_FLAGS,
|
|
FILE_DIRECTORY_FILE
|
|
| FILE_SYNCHRONOUS_IO_NONALERT
|
|
| FILE_OPEN_FOR_BACKUP_INTENT);
|
|
if (!NT_SUCCESS (status))
|
|
{
|
|
RtlReleasePebLock ();
|
|
__seterrno_from_nt_status (status);
|
|
res = -1;
|
|
goto out;
|
|
}
|
|
/* Workaround a problem in Vista/Longhorn which fails in subsequent
|
|
calls to CreateFile with ERROR_INVALID_HANDLE if the handle in
|
|
CurrentDirectoryHandle changes without calling SetCurrentDirectory,
|
|
and the filename given to CreateFile is a relative path. It looks
|
|
like Vista stores a copy of the CWD handle in some other undocumented
|
|
place. The NtClose/DuplicateHandle reuses the original handle for
|
|
the copy of the new handle and the next CreateFile works.
|
|
Note that this is not thread-safe (yet?) */
|
|
NtClose (*phdl);
|
|
if (DuplicateHandle (GetCurrentProcess (), h, GetCurrentProcess (), phdl,
|
|
0, TRUE, DUPLICATE_SAME_ACCESS))
|
|
NtClose (h);
|
|
else
|
|
*phdl = h;
|
|
dir = *phdl;
|
|
|
|
/* No need to set path on init. */
|
|
if (nat_cwd
|
|
/* TODO:
|
|
Check the length of the new CWD. Windows can only handle
|
|
CWDs of up to MAX_PATH length, including a trailing backslash.
|
|
If the path is longer, it's not an error condition for Cygwin,
|
|
so we don't fail. Windows on the other hand has a problem now.
|
|
For now, we just don't store the path in the PEB and proceed as
|
|
usual. */
|
|
&& len <= MAX_PATH - (nat_cwd->Buffer[len - 1] == L'\\' ? 1 : 2))
|
|
{
|
|
/* Convert to a Win32 path. */
|
|
upath.Buffer += upath.Length / sizeof (WCHAR) - len;
|
|
if (upath.Buffer[1] == L'\\') /* UNC path */
|
|
upath.Buffer[0] = L'\\';
|
|
upath.Length = len * sizeof (WCHAR);
|
|
/* Append backslash if necessary. */
|
|
if (upath.Buffer[len - 1] != L'\\')
|
|
{
|
|
upath.Buffer[len] = L'\\';
|
|
upath.Length += sizeof (WCHAR);
|
|
}
|
|
RtlCopyUnicodeString (&get_user_proc_parms ()->CurrentDirectoryName,
|
|
&upath);
|
|
}
|
|
|
|
RtlReleasePebLock ();
|
|
}
|
|
|
|
if (nat_cwd || !win32.Buffer)
|
|
{
|
|
/* If there is no win32 path */
|
|
if (!nat_cwd)
|
|
{
|
|
PUNICODE_STRING pdir;
|
|
|
|
RtlAcquirePebLock ();
|
|
pdir = &get_user_proc_parms ()->CurrentDirectoryName;
|
|
RtlInitEmptyUnicodeString (&win32,
|
|
(PWCHAR) crealloc_abort (win32.Buffer,
|
|
pdir->Length + 2),
|
|
pdir->Length + 2);
|
|
RtlCopyUnicodeString (&win32, pdir);
|
|
RtlReleasePebLock ();
|
|
/* Remove trailing slash. */
|
|
if (win32.Length > 3 * sizeof (WCHAR))
|
|
win32.Length -= sizeof (WCHAR);
|
|
posix_cwd = NULL;
|
|
}
|
|
else
|
|
{
|
|
if (upath.Buffer[0] == L'/') /* Virtual path, don't mangle. */
|
|
;
|
|
else if (!doit)
|
|
{
|
|
/* Convert to a Win32 path. */
|
|
upath.Buffer += upath.Length / sizeof (WCHAR) - len;
|
|
if (upath.Buffer[1] == L'\\') /* UNC path */
|
|
upath.Buffer[0] = L'\\';
|
|
upath.Length = len * sizeof (WCHAR);
|
|
}
|
|
else if (upath.Length > 3 * sizeof (WCHAR))
|
|
upath.Length -= sizeof (WCHAR); /* Strip trailing backslash */
|
|
RtlInitEmptyUnicodeString (&win32,
|
|
(PWCHAR) crealloc_abort (win32.Buffer,
|
|
upath.Length + 2),
|
|
upath.Length + 2);
|
|
RtlCopyUnicodeString (&win32, &upath);
|
|
}
|
|
/* Make sure it's NUL-termniated. */
|
|
win32.Buffer[win32.Length / sizeof (WCHAR)] = L'\0';
|
|
if (!doit) /* Virtual path */
|
|
drive_length = 0;
|
|
else if (win32.Buffer[1] == L':') /* X: */
|
|
drive_length = 2;
|
|
else if (win32.Buffer[1] == L'\\') /* UNC path */
|
|
{
|
|
PWCHAR ptr = wcschr (win32.Buffer + 2, L'\\');
|
|
if (ptr)
|
|
ptr = wcschr (ptr + 1, L'\\');
|
|
if (ptr)
|
|
drive_length = ptr - win32.Buffer;
|
|
else
|
|
drive_length = win32.Length / sizeof (WCHAR);
|
|
}
|
|
else /* Shouldn't happen */
|
|
drive_length = 0;
|
|
|
|
tmp_pathbuf tp;
|
|
if (!posix_cwd)
|
|
{
|
|
posix_cwd = (const char *) tp.c_get ();
|
|
mount_table->conv_to_posix_path (win32.Buffer, (char *) posix_cwd, 0);
|
|
}
|
|
posix = (char *) crealloc_abort (posix, strlen (posix_cwd) + 1);
|
|
stpcpy (posix, posix_cwd);
|
|
}
|
|
|
|
out:
|
|
cwd_lock.release ();
|
|
return res;
|
|
}
|
|
|
|
/* Copy the value for either the posix or the win32 cwd into a buffer. */
|
|
char *
|
|
cwdstuff::get (char *buf, int need_posix, int with_chroot, unsigned ulen)
|
|
{
|
|
MALLOC_CHECK;
|
|
|
|
tmp_pathbuf tp;
|
|
if (ulen)
|
|
/* nothing */;
|
|
else if (buf == NULL)
|
|
ulen = (unsigned) -1;
|
|
else
|
|
{
|
|
set_errno (EINVAL);
|
|
goto out;
|
|
}
|
|
|
|
cwd_lock.acquire ();
|
|
|
|
char *tocopy;
|
|
if (!need_posix)
|
|
{
|
|
tocopy = tp.c_get ();
|
|
sys_wcstombs (tocopy, NT_MAX_PATH, win32.Buffer,
|
|
win32.Length / sizeof (WCHAR));
|
|
}
|
|
else
|
|
tocopy = posix;
|
|
|
|
debug_printf ("posix %s", posix);
|
|
if (strlen (tocopy) >= ulen)
|
|
{
|
|
set_errno (ERANGE);
|
|
buf = NULL;
|
|
}
|
|
else
|
|
{
|
|
if (!buf)
|
|
buf = (char *) malloc (strlen (tocopy) + 1);
|
|
strcpy (buf, tocopy);
|
|
if (!buf[0]) /* Should only happen when chroot */
|
|
strcpy (buf, "/");
|
|
}
|
|
|
|
cwd_lock.release ();
|
|
|
|
out:
|
|
syscall_printf ("(%s) = cwdstuff::get (%p, %d, %d, %d), errno %d",
|
|
buf, buf, ulen, need_posix, with_chroot, errno);
|
|
MALLOC_CHECK;
|
|
return buf;
|
|
}
|
|
|
|
int etc::curr_ix = 0;
|
|
/* Note that the first elements of the below arrays are unused */
|
|
bool etc::change_possible[MAX_ETC_FILES + 1];
|
|
OBJECT_ATTRIBUTES etc::fn[MAX_ETC_FILES + 1];
|
|
LARGE_INTEGER etc::last_modified[MAX_ETC_FILES + 1];
|
|
|
|
int
|
|
etc::init (int n, PUNICODE_STRING etc_fn)
|
|
{
|
|
if (n > 0)
|
|
/* ok */;
|
|
else if (++curr_ix <= MAX_ETC_FILES)
|
|
n = curr_ix;
|
|
else
|
|
api_fatal ("internal error");
|
|
|
|
InitializeObjectAttributes (&fn[n], etc_fn, OBJ_CASE_INSENSITIVE, NULL, NULL);
|
|
change_possible[n] = false;
|
|
test_file_change (n);
|
|
paranoid_printf ("fn[%d] %S, curr_ix %d", n, fn[n].ObjectName, curr_ix);
|
|
return n;
|
|
}
|
|
|
|
bool
|
|
etc::test_file_change (int n)
|
|
{
|
|
NTSTATUS status;
|
|
FILE_NETWORK_OPEN_INFORMATION fnoi;
|
|
bool res;
|
|
|
|
status = NtQueryFullAttributesFile (&fn[n], &fnoi);
|
|
if (!NT_SUCCESS (status))
|
|
{
|
|
res = true;
|
|
memset (last_modified + n, 0, sizeof (last_modified[n]));
|
|
debug_printf ("NtQueryFullAttributesFile (%S) failed, %p",
|
|
fn[n].ObjectName, status);
|
|
}
|
|
else
|
|
{
|
|
res = CompareFileTime ((FILETIME *) &fnoi.LastWriteTime,
|
|
(FILETIME *) last_modified + n) > 0;
|
|
last_modified[n].QuadPart = fnoi.LastWriteTime.QuadPart;
|
|
}
|
|
|
|
paranoid_printf ("fn[%d] %S res %d", n, fn[n].ObjectName, res);
|
|
return res;
|
|
}
|
|
|
|
bool
|
|
etc::dir_changed (int n)
|
|
{
|
|
if (!change_possible[n])
|
|
{
|
|
static HANDLE changed_h NO_COPY;
|
|
NTSTATUS status;
|
|
IO_STATUS_BLOCK io;
|
|
|
|
if (!changed_h)
|
|
{
|
|
OBJECT_ATTRIBUTES attr;
|
|
|
|
path_conv dir ("/etc");
|
|
status = NtOpenFile (&changed_h, SYNCHRONIZE | FILE_LIST_DIRECTORY,
|
|
dir.get_object_attr (attr, sec_none_nih), &io,
|
|
FILE_SHARE_VALID_FLAGS, FILE_DIRECTORY_FILE);
|
|
if (!NT_SUCCESS (status))
|
|
{
|
|
#ifdef DEBUGGING
|
|
system_printf ("NtOpenFile (%S) failed, %p",
|
|
dir.get_nt_native_path (), status);
|
|
#endif
|
|
changed_h = INVALID_HANDLE_VALUE;
|
|
}
|
|
else
|
|
{
|
|
status = NtNotifyChangeDirectoryFile (changed_h, NULL, NULL,
|
|
NULL, &io, NULL, 0,
|
|
FILE_NOTIFY_CHANGE_LAST_WRITE
|
|
| FILE_NOTIFY_CHANGE_FILE_NAME,
|
|
FALSE);
|
|
if (!NT_SUCCESS (status))
|
|
{
|
|
#ifdef DEBUGGING
|
|
system_printf ("NtNotifyChangeDirectoryFile (1) failed, %p",
|
|
status);
|
|
#endif
|
|
NtClose (changed_h);
|
|
changed_h = INVALID_HANDLE_VALUE;
|
|
}
|
|
}
|
|
memset (change_possible, true, sizeof (change_possible));
|
|
}
|
|
|
|
if (changed_h == INVALID_HANDLE_VALUE)
|
|
change_possible[n] = true;
|
|
else if (WaitForSingleObject (changed_h, 0) == WAIT_OBJECT_0)
|
|
{
|
|
status = NtNotifyChangeDirectoryFile (changed_h, NULL, NULL,
|
|
NULL, &io, NULL, 0,
|
|
FILE_NOTIFY_CHANGE_LAST_WRITE
|
|
| FILE_NOTIFY_CHANGE_FILE_NAME,
|
|
FALSE);
|
|
if (!NT_SUCCESS (status))
|
|
{
|
|
#ifdef DEBUGGING
|
|
system_printf ("NtNotifyChangeDirectoryFile (2) failed, %p",
|
|
status);
|
|
#endif
|
|
NtClose (changed_h);
|
|
changed_h = INVALID_HANDLE_VALUE;
|
|
}
|
|
memset (change_possible, true, sizeof change_possible);
|
|
}
|
|
}
|
|
|
|
paranoid_printf ("fn[%d] %S change_possible %d",
|
|
n, fn[n].ObjectName, change_possible[n]);
|
|
return change_possible[n];
|
|
}
|
|
|
|
bool
|
|
etc::file_changed (int n)
|
|
{
|
|
bool res = false;
|
|
if (dir_changed (n) && test_file_change (n))
|
|
res = true;
|
|
change_possible[n] = false; /* Change is no longer possible */
|
|
paranoid_printf ("fn[%d] %S res %d", n, fn[n].ObjectName, res);
|
|
return res;
|
|
}
|
|
|
|
/* No need to be reentrant or thread-safe according to SUSv3.
|
|
/ and \\ are treated equally. Leading drive specifiers are
|
|
kept intact as far as it makes sense. Everything else is
|
|
POSIX compatible. */
|
|
extern "C" char *
|
|
basename (char *path)
|
|
{
|
|
static char buf[4];
|
|
char *c, *d, *bs = path;
|
|
|
|
if (!path || !*path)
|
|
return strcpy (buf, ".");
|
|
if (isalpha (path[0]) && path[1] == ':')
|
|
bs += 2;
|
|
else if (strspn (path, "/\\") > 1)
|
|
++bs;
|
|
c = strrchr (bs, '/');
|
|
if ((d = strrchr (c ?: bs, '\\')) > c)
|
|
c = d;
|
|
if (c)
|
|
{
|
|
/* Trailing (back)slashes are eliminated. */
|
|
while (c && c > bs && c[1] == '\0')
|
|
{
|
|
*c = '\0';
|
|
c = strrchr (bs, '/');
|
|
if ((d = strrchr (c ?: bs, '\\')) > c)
|
|
c = d;
|
|
}
|
|
if (c && (c > bs || c[1]))
|
|
return c + 1;
|
|
}
|
|
else if (!bs[0])
|
|
{
|
|
stpncpy (buf, path, bs - path);
|
|
stpcpy (buf + (bs - path), ".");
|
|
return buf;
|
|
}
|
|
return path;
|
|
}
|
|
|
|
/* No need to be reentrant or thread-safe according to SUSv3.
|
|
/ and \\ are treated equally. Leading drive specifiers and
|
|
leading double (back)slashes are kept intact as far as it
|
|
makes sense. Everything else is POSIX compatible. */
|
|
extern "C" char *
|
|
dirname (char *path)
|
|
{
|
|
static char buf[4];
|
|
char *c, *d, *bs = path;
|
|
|
|
if (!path || !*path)
|
|
return strcpy (buf, ".");
|
|
if (isalpha (path[0]) && path[1] == ':')
|
|
bs += 2;
|
|
else if (strspn (path, "/\\") > 1)
|
|
++bs;
|
|
c = strrchr (bs, '/');
|
|
if ((d = strrchr (c ?: bs, '\\')) > c)
|
|
c = d;
|
|
if (c)
|
|
{
|
|
/* Trailing (back)slashes are eliminated. */
|
|
while (c && c > bs && c[1] == '\0')
|
|
{
|
|
*c = '\0';
|
|
c = strrchr (bs, '/');
|
|
if ((d = strrchr (c ?: bs, '\\')) > c)
|
|
c = d;
|
|
}
|
|
if (!c)
|
|
strcpy (bs, ".");
|
|
else if (c > bs)
|
|
{
|
|
/* More trailing (back)slashes are eliminated. */
|
|
while (c > bs && (*c == '/' || *c == '\\'))
|
|
*c-- = '\0';
|
|
}
|
|
else
|
|
c[1] = '\0';
|
|
}
|
|
else
|
|
{
|
|
stpncpy (buf, path, bs - path);
|
|
stpcpy (buf + (bs - path), ".");
|
|
return buf;
|
|
}
|
|
return path;
|
|
}
|