]> git.saurik.com Git - apple/libc.git/blobdiff - stdlib/realpath-fbsd.c
Libc-498.tar.gz
[apple/libc.git] / stdlib / realpath-fbsd.c
diff --git a/stdlib/realpath-fbsd.c b/stdlib/realpath-fbsd.c
new file mode 100644 (file)
index 0000000..34c5bc8
--- /dev/null
@@ -0,0 +1,355 @@
+/*
+ * Copyright (c) 2003 Constantin S. Svintsoff <kostik@iclub.nsu.ru>
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ * 3. The names of the authors may not be used to endorse or promote
+ *    products derived from this software without specific prior written
+ *    permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+
+#if defined(LIBC_SCCS) && !defined(lint)
+static char sccsid[] = "@(#)realpath.c 8.1 (Berkeley) 2/16/94";
+#endif /* LIBC_SCCS and not lint */
+#include <sys/cdefs.h>
+__FBSDID("$FreeBSD: src/lib/libc/stdlib/realpath.c,v 1.20 2003/05/28 08:23:01 fjoe Exp $");
+
+#include "namespace.h"
+#include <sys/param.h>
+#include <sys/stat.h>
+#include <sys/mount.h>
+
+#include <errno.h>
+#include <stdlib.h>
+#include <string.h>
+#include <unistd.h>
+#include <sys/attr.h>
+#include <sys/vnode.h>
+#include "un-namespace.h"
+
+struct attrs {
+       u_int32_t len;
+       attrreference_t name;
+       dev_t dev;
+       fsobj_type_t type;
+       fsobj_id_t id;
+       char buf[PATH_MAX];
+};
+
+#ifndef BUILDING_VARIANT
+__private_extern__ struct attrlist _rp_alist = {
+       ATTR_BIT_MAP_COUNT,
+       0,
+       ATTR_CMN_NAME | ATTR_CMN_DEVID | ATTR_CMN_OBJTYPE | ATTR_CMN_OBJID,
+       0,
+       0,
+       0,
+       0,
+};
+#else /* BUILDING_VARIANT */
+__private_extern__ struct attrlist _rp_alist;
+#endif /* BUILDING_VARIANT */
+
+extern char * __private_getcwd(char *, size_t, int);
+
+/*
+ * char *realpath(const char *path, char resolved[PATH_MAX]);
+ *
+ * Find the real name of path, by removing all ".", ".." and symlink
+ * components.  Returns (resolved) on success, or (NULL) on failure,
+ * in which case the path which caused trouble is left in (resolved).
+ */
+char *
+realpath(const char *path, char resolved[PATH_MAX])
+{
+       struct attrs attrs;
+       struct stat sb;
+       char *p, *q, *s;
+       size_t left_len, resolved_len, save_resolved_len;
+       unsigned symlinks;
+       int serrno, slen, useattrs, islink;
+       char left[PATH_MAX], next_token[PATH_MAX], symlink[PATH_MAX];
+       dev_t dev, lastdev;
+       struct statfs sfs;
+       static dev_t rootdev;
+       static int rootdev_inited = 0;
+       ino_t inode;
+
+       if (path == NULL) {
+               errno = EINVAL;
+               return (NULL);
+       }
+#if __DARWIN_UNIX03
+       if (*path == 0) {
+               errno = ENOENT;
+               return (NULL);
+       }
+#endif /* __DARWIN_UNIX03 */
+       if (!rootdev_inited) {
+               rootdev_inited = 1;
+               if (stat("/", &sb) < 0) {
+                       return (NULL);
+                       }
+               rootdev = sb.st_dev;
+       }
+       serrno = errno;
+       symlinks = 0;
+       if (path[0] == '/') {
+               resolved[0] = '/';
+               resolved[1] = '\0';
+               if (path[1] == '\0') {
+                       return (resolved);
+               }
+               resolved_len = 1;
+               left_len = strlcpy(left, path + 1, sizeof(left));
+       } else {
+#if !defined(VARIANT_DARWINEXTSN) && __DARWIN_UNIX03
+               /* 4447159: don't use GETPATH, so this will fail if */
+               /* if parent directories are not readable, as per POSIX */
+               if (__private_getcwd(resolved, PATH_MAX, 0) == NULL)
+#else /* VARIANT_DARWINEXTSN || !__DARWIN_UNIX03 */
+               if (__private_getcwd(resolved, PATH_MAX, 1) == NULL)
+#endif /* !VARIANT_DARWINEXTSN && __DARWIN_UNIX03 */
+               {
+                       strlcpy(resolved, ".", PATH_MAX);
+                       return (NULL);
+               }
+               resolved_len = strlen(resolved);
+               left_len = strlcpy(left, path, sizeof(left));
+       }
+       if (left_len >= sizeof(left) || resolved_len >= PATH_MAX) {
+               errno = ENAMETOOLONG;
+               return (NULL);
+       }
+       if (resolved_len > 1) {
+               if (stat(resolved, &sb) < 0) {
+                       return (NULL);
+               }
+               lastdev = sb.st_dev;
+       } else
+               lastdev = rootdev;
+
+       /*
+        * Iterate over path components in `left'.
+        */
+       while (left_len != 0) {
+               /*
+                * Extract the next path component and adjust `left'
+                * and its length.
+                */
+               p = strchr(left, '/');
+               s = p ? p : left + left_len;
+               if (s - left >= sizeof(next_token)) {
+                       errno = ENAMETOOLONG;
+                       return (NULL);
+               }
+               memcpy(next_token, left, s - left);
+               next_token[s - left] = '\0';
+               left_len -= s - left;
+               if (p != NULL)
+                       memmove(left, s + 1, left_len + 1);
+               if (resolved[resolved_len - 1] != '/') {
+                       if (resolved_len + 1 >= PATH_MAX) {
+                               errno = ENAMETOOLONG;
+                               return (NULL);
+                       }
+                       resolved[resolved_len++] = '/';
+                       resolved[resolved_len] = '\0';
+               }
+               if (next_token[0] == '\0')
+                       continue;
+               else if (strcmp(next_token, ".") == 0)
+                       continue;
+               else if (strcmp(next_token, "..") == 0) {
+                       /*
+                        * Strip the last path component except when we have
+                        * single "/"
+                        */
+                       if (resolved_len > 1) {
+                               resolved[resolved_len - 1] = '\0';
+                               q = strrchr(resolved, '/') + 1;
+                               *q = '\0';
+                               resolved_len = q - resolved;
+                       }
+                       continue;
+               }
+
+               /*
+                * Save resolved_len, so that we can later null out
+                * the the appended next_token, and replace with the
+                * real name (matters on case-insensitive filesystems).
+                */
+               save_resolved_len = resolved_len;
+
+               /*
+                * Append the next path component and lstat() it. If
+                * lstat() fails we still can return successfully if
+                * there are no more path components left.
+                */
+               resolved_len = strlcat(resolved, next_token, PATH_MAX);
+               if (resolved_len >= PATH_MAX) {
+                       errno = ENAMETOOLONG;
+                       return (NULL);
+               }
+               if (getattrlist(resolved, &_rp_alist, &attrs, sizeof(attrs), FSOPT_NOFOLLOW) == 0) {
+                       useattrs = 1;
+                       islink = (attrs.type == VLNK);
+                       dev = attrs.dev;
+                       inode = attrs.id.fid_objno;
+               } else if (errno == ENOTSUP || errno == EINVAL) {
+                       if ((useattrs = lstat(resolved, &sb)) == 0) {
+                               islink = S_ISLNK(sb.st_mode);
+                               dev = sb.st_dev;
+                               inode = sb.st_ino;
+                       }
+               } else
+                       useattrs = -1;
+               if (useattrs < 0) {
+#if !__DARWIN_UNIX03
+                       if (errno == ENOENT && p == NULL) {
+                               errno = serrno;
+                               return (resolved);
+                       }
+#endif /* !__DARWIN_UNIX03 */
+                       return (NULL);
+               }
+               if (dev != lastdev) {
+                       /*
+                        * We have crossed a mountpoint.  For volumes like UDF
+                        * the getattrlist name may not match the actual
+                        * mountpoint, so we just copy the mountpoint directly.
+                        * (3703138).  However, the mountpoint may not be
+                        * accessible, as when chroot-ed, so check first.
+                        * There may be a file on the chroot-ed volume with
+                        * the same name as the mountpoint, so compare device
+                        * and inode numbers.
+                        */
+                       lastdev = dev;
+                       if (statfs(resolved, &sfs) == 0 && lstat(sfs.f_mntonname, &sb) == 0 && dev == sb.st_dev && inode == sb.st_ino) {
+                               /*
+                                * However, it's possible that the mountpoint
+                                * path matches, even though it isn't the real
+                                * path in the chroot-ed environment, so check
+                                * that each component of the mountpoint
+                                * is a directory (and not a symlink)
+                                */
+                               char temp[MNAMELEN];
+                               char *cp;
+                               int ok = 1;
+
+                               strcpy(temp, sfs.f_mntonname);
+                               for(;;) {
+                                       if ((cp = strrchr(temp, '/')) == NULL) {
+                                               ok = 0;
+                                               break;
+                                       }
+                                       if (cp <= temp)
+                                               break;
+                                       *cp = 0;
+                                       if (lstat(temp, &sb) < 0 || (sb.st_mode & S_IFMT) != S_IFDIR) {
+                                               ok = 0;
+                                               break;
+                                       }
+                               }
+                               if (ok) {
+                                       resolved_len = strlcpy(resolved, sfs.f_mntonname, PATH_MAX);
+                                       continue;
+                               }
+                       }
+                       /* if we fail, use the other methods. */
+               }
+               if (islink) {
+                       if (symlinks++ > MAXSYMLINKS) {
+                               errno = ELOOP;
+                               return (NULL);
+                       }
+                       slen = readlink(resolved, symlink, sizeof(symlink) - 1);
+                       if (slen < 0) {
+                               return (NULL);
+                       }
+                       symlink[slen] = '\0';
+                       if (symlink[0] == '/') {
+                               resolved[1] = 0;
+                               resolved_len = 1;
+                               lastdev = rootdev;
+                       } else if (resolved_len > 1) {
+                               /* Strip the last path component. */
+                               resolved[resolved_len - 1] = '\0';
+                               q = strrchr(resolved, '/') + 1;
+                               *q = '\0';
+                               resolved_len = q - resolved;
+                       }
+
+                       /*
+                        * If there are any path components left, then
+                        * append them to symlink. The result is placed
+                        * in `left'.
+                        */
+                       if (p != NULL) {
+                               if (symlink[slen - 1] != '/') {
+                                       if (slen + 1 >= sizeof(symlink)) {
+                                               errno = ENAMETOOLONG;
+                                               return (NULL);
+                                       }
+                                       symlink[slen] = '/';
+                                       symlink[slen + 1] = 0;
+                               }
+                               left_len = strlcat(symlink, left, sizeof(left));
+                               if (left_len >= sizeof(left)) {
+                                       errno = ENAMETOOLONG;
+                                       return (NULL);
+                               }
+                       }
+                       left_len = strlcpy(left, symlink, sizeof(left));
+               } else if (useattrs) {
+                       /*
+                        * attrs already has the real name.
+                        */
+
+                       resolved[save_resolved_len] = '\0';
+                       resolved_len = strlcat(resolved, (const char *)&attrs.name + attrs.name.attr_dataoffset, PATH_MAX);
+                       if (resolved_len >= PATH_MAX) {
+                               errno = ENAMETOOLONG;
+                               return (NULL);
+                       }
+               }
+               /*
+                * For the case of useattrs == 0, we could scan the directory
+                * and try to match the inode.  There are many problems with
+                * this: (1) the directory may not be readable, (2) for multiple
+                * hard links, we would find the first, but not necessarily
+                * the one specified in the path, (3) we can't try to do
+                * a case-insensitive search to match the right one in (2),
+                * because the underlying filesystem may do things like
+                * decompose composed characters.  For most cases, doing
+                * nothing is the right thing when useattrs == 0, so we punt
+                * for now.
+                */
+       }
+
+       /*
+        * Remove trailing slash except when the resolved pathname
+        * is a single "/".
+        */
+       if (resolved_len > 1 && resolved[resolved_len - 1] == '/')
+               resolved[resolved_len - 1] = '\0';
+       return (resolved);
+}