Blame gnulib/tests/open.c

Packit 06dd63
/* Open a descriptor to a file.
Packit 06dd63
   Copyright (C) 2007-2019 Free Software Foundation, Inc.
Packit 06dd63
Packit 06dd63
   This program is free software: you can redistribute it and/or modify
Packit 06dd63
   it under the terms of the GNU General Public License as published by
Packit 06dd63
   the Free Software Foundation; either version 3 of the License, or
Packit 06dd63
   (at your option) any later version.
Packit 06dd63
Packit 06dd63
   This program is distributed in the hope that it will be useful,
Packit 06dd63
   but WITHOUT ANY WARRANTY; without even the implied warranty of
Packit 06dd63
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
Packit 06dd63
   GNU General Public License for more details.
Packit 06dd63
Packit 06dd63
   You should have received a copy of the GNU General Public License
Packit 06dd63
   along with this program.  If not, see <https://www.gnu.org/licenses/>.  */
Packit 06dd63
Packit 06dd63
/* Written by Bruno Haible <bruno@clisp.org>, 2007.  */
Packit 06dd63
Packit 06dd63
/* If the user's config.h happens to include <fcntl.h>, let it include only
Packit 06dd63
   the system's <fcntl.h> here, so that orig_open doesn't recurse to
Packit 06dd63
   rpl_open.  */
Packit 06dd63
#define __need_system_fcntl_h
Packit 06dd63
#include <config.h>
Packit 06dd63
Packit 06dd63
/* Get the original definition of open.  It might be defined as a macro.  */
Packit 06dd63
#include <fcntl.h>
Packit 06dd63
#include <sys/types.h>
Packit 06dd63
#undef __need_system_fcntl_h
Packit 06dd63
Packit 06dd63
static int
Packit 06dd63
orig_open (const char *filename, int flags, mode_t mode)
Packit 06dd63
{
Packit 06dd63
  return open (filename, flags, mode);
Packit 06dd63
}
Packit 06dd63
Packit 06dd63
/* Specification.  */
Packit 06dd63
/* Write "fcntl.h" here, not <fcntl.h>, otherwise OSF/1 5.1 DTK cc eliminates
Packit 06dd63
   this include because of the preliminary #include <fcntl.h> above.  */
Packit 06dd63
#include "fcntl.h"
Packit 06dd63
Packit 06dd63
#include "cloexec.h"
Packit 06dd63
Packit 06dd63
#include <errno.h>
Packit 06dd63
#include <stdarg.h>
Packit 06dd63
#include <string.h>
Packit 06dd63
#include <sys/types.h>
Packit 06dd63
#include <sys/stat.h>
Packit 06dd63
#include <unistd.h>
Packit 06dd63
Packit 06dd63
#ifndef REPLACE_OPEN_DIRECTORY
Packit 06dd63
# define REPLACE_OPEN_DIRECTORY 0
Packit 06dd63
#endif
Packit 06dd63
Packit 06dd63
int
Packit 06dd63
open (const char *filename, int flags, ...)
Packit 06dd63
{
Packit 06dd63
  /* 0 = unknown, 1 = yes, -1 = no.  */
Packit 06dd63
#if GNULIB_defined_O_CLOEXEC
Packit 06dd63
  int have_cloexec = -1;
Packit 06dd63
#else
Packit 06dd63
  static int have_cloexec;
Packit 06dd63
#endif
Packit 06dd63
Packit 06dd63
  mode_t mode;
Packit 06dd63
  int fd;
Packit 06dd63
Packit 06dd63
  mode = 0;
Packit 06dd63
  if (flags & O_CREAT)
Packit 06dd63
    {
Packit 06dd63
      va_list arg;
Packit 06dd63
      va_start (arg, flags);
Packit 06dd63
Packit 06dd63
      /* We have to use PROMOTED_MODE_T instead of mode_t, otherwise GCC 4
Packit 06dd63
         creates crashing code when 'mode_t' is smaller than 'int'.  */
Packit 06dd63
      mode = va_arg (arg, PROMOTED_MODE_T);
Packit 06dd63
Packit 06dd63
      va_end (arg);
Packit 06dd63
    }
Packit 06dd63
Packit 06dd63
#if GNULIB_defined_O_NONBLOCK
Packit 06dd63
  /* The only known platform that lacks O_NONBLOCK is mingw, but it
Packit 06dd63
     also lacks named pipes and Unix sockets, which are the only two
Packit 06dd63
     file types that require non-blocking handling in open().
Packit 06dd63
     Therefore, it is safe to ignore O_NONBLOCK here.  It is handy
Packit 06dd63
     that mingw also lacks openat(), so that is also covered here.  */
Packit 06dd63
  flags &= ~O_NONBLOCK;
Packit 06dd63
#endif
Packit 06dd63
Packit 06dd63
#if defined _WIN32 && ! defined __CYGWIN__
Packit 06dd63
  if (strcmp (filename, "/dev/null") == 0)
Packit 06dd63
    filename = "NUL";
Packit 06dd63
#endif
Packit 06dd63
Packit 06dd63
#if OPEN_TRAILING_SLASH_BUG
Packit 06dd63
  /* If the filename ends in a slash and one of O_CREAT, O_WRONLY, O_RDWR
Packit 06dd63
     is specified, then fail.
Packit 06dd63
     Rationale: POSIX <http://www.opengroup.org/susv3/basedefs/xbd_chap04.html>
Packit 06dd63
     says that
Packit 06dd63
       "A pathname that contains at least one non-slash character and that
Packit 06dd63
        ends with one or more trailing slashes shall be resolved as if a
Packit 06dd63
        single dot character ( '.' ) were appended to the pathname."
Packit 06dd63
     and
Packit 06dd63
       "The special filename dot shall refer to the directory specified by
Packit 06dd63
        its predecessor."
Packit 06dd63
     If the named file already exists as a directory, then
Packit 06dd63
       - if O_CREAT is specified, open() must fail because of the semantics
Packit 06dd63
         of O_CREAT,
Packit 06dd63
       - if O_WRONLY or O_RDWR is specified, open() must fail because POSIX
Packit 06dd63
         <http://www.opengroup.org/susv3/functions/open.html> says that it
Packit 06dd63
         fails with errno = EISDIR in this case.
Packit 06dd63
     If the named file does not exist or does not name a directory, then
Packit 06dd63
       - if O_CREAT is specified, open() must fail since open() cannot create
Packit 06dd63
         directories,
Packit 06dd63
       - if O_WRONLY or O_RDWR is specified, open() must fail because the
Packit 06dd63
         file does not contain a '.' directory.  */
Packit 06dd63
  if (flags & (O_CREAT | O_WRONLY | O_RDWR))
Packit 06dd63
    {
Packit 06dd63
      size_t len = strlen (filename);
Packit 06dd63
      if (len > 0 && filename[len - 1] == '/')
Packit 06dd63
        {
Packit 06dd63
          errno = EISDIR;
Packit 06dd63
          return -1;
Packit 06dd63
        }
Packit 06dd63
    }
Packit 06dd63
#endif
Packit 06dd63
Packit 06dd63
  fd = orig_open (filename,
Packit 06dd63
                  flags & ~(have_cloexec <= 0 ? O_CLOEXEC : 0), mode);
Packit 06dd63
Packit 06dd63
  if (flags & O_CLOEXEC)
Packit 06dd63
    {
Packit 06dd63
      if (! have_cloexec)
Packit 06dd63
        {
Packit 06dd63
          if (0 <= fd)
Packit 06dd63
            have_cloexec = 1;
Packit 06dd63
          else if (errno == EINVAL)
Packit 06dd63
            {
Packit 06dd63
              fd = orig_open (filename, flags & ~O_CLOEXEC, mode);
Packit 06dd63
              have_cloexec = -1;
Packit 06dd63
            }
Packit 06dd63
        }
Packit 06dd63
      if (have_cloexec < 0 && 0 <= fd)
Packit 06dd63
        set_cloexec_flag (fd, true);
Packit 06dd63
    }
Packit 06dd63
Packit 06dd63
Packit 06dd63
#if REPLACE_FCHDIR
Packit 06dd63
  /* Implementing fchdir and fdopendir requires the ability to open a
Packit 06dd63
     directory file descriptor.  If open doesn't support that (as on
Packit 06dd63
     mingw), we use a dummy file that behaves the same as directories
Packit 06dd63
     on Linux (ie. always reports EOF on attempts to read()), and
Packit 06dd63
     override fstat() in fchdir.c to hide the fact that we have a
Packit 06dd63
     dummy.  */
Packit 06dd63
  if (REPLACE_OPEN_DIRECTORY && fd < 0 && errno == EACCES
Packit 06dd63
      && ((flags & O_ACCMODE) == O_RDONLY
Packit 06dd63
          || (O_SEARCH != O_RDONLY && (flags & O_ACCMODE) == O_SEARCH)))
Packit 06dd63
    {
Packit 06dd63
      struct stat statbuf;
Packit 06dd63
      if (stat (filename, &statbuf) == 0 && S_ISDIR (statbuf.st_mode))
Packit 06dd63
        {
Packit 06dd63
          /* Maximum recursion depth of 1.  */
Packit 06dd63
          fd = open ("/dev/null", flags, mode);
Packit 06dd63
          if (0 <= fd)
Packit 06dd63
            fd = _gl_register_fd (fd, filename);
Packit 06dd63
        }
Packit 06dd63
      else
Packit 06dd63
        errno = EACCES;
Packit 06dd63
    }
Packit 06dd63
#endif
Packit 06dd63
Packit 06dd63
#if OPEN_TRAILING_SLASH_BUG
Packit 06dd63
  /* If the filename ends in a slash and fd does not refer to a directory,
Packit 06dd63
     then fail.
Packit 06dd63
     Rationale: POSIX <http://www.opengroup.org/susv3/basedefs/xbd_chap04.html>
Packit 06dd63
     says that
Packit 06dd63
       "A pathname that contains at least one non-slash character and that
Packit 06dd63
        ends with one or more trailing slashes shall be resolved as if a
Packit 06dd63
        single dot character ( '.' ) were appended to the pathname."
Packit 06dd63
     and
Packit 06dd63
       "The special filename dot shall refer to the directory specified by
Packit 06dd63
        its predecessor."
Packit 06dd63
     If the named file without the slash is not a directory, open() must fail
Packit 06dd63
     with ENOTDIR.  */
Packit 06dd63
  if (fd >= 0)
Packit 06dd63
    {
Packit 06dd63
      /* We know len is positive, since open did not fail with ENOENT.  */
Packit 06dd63
      size_t len = strlen (filename);
Packit 06dd63
      if (filename[len - 1] == '/')
Packit 06dd63
        {
Packit 06dd63
          struct stat statbuf;
Packit 06dd63
Packit 06dd63
          if (fstat (fd, &statbuf) >= 0 && !S_ISDIR (statbuf.st_mode))
Packit 06dd63
            {
Packit 06dd63
              close (fd);
Packit 06dd63
              errno = ENOTDIR;
Packit 06dd63
              return -1;
Packit 06dd63
            }
Packit 06dd63
        }
Packit 06dd63
    }
Packit 06dd63
#endif
Packit 06dd63
Packit 06dd63
#if REPLACE_FCHDIR
Packit 06dd63
  if (!REPLACE_OPEN_DIRECTORY && 0 <= fd)
Packit 06dd63
    fd = _gl_register_fd (fd, filename);
Packit 06dd63
#endif
Packit 06dd63
Packit 06dd63
  return fd;
Packit 06dd63
}