2020-06-15 14:18:57 +00:00
|
|
|
/*-*- mode:c;indent-tabs-mode:nil;c-basic-offset:2;tab-width:8;coding:utf-8 -*-│
|
|
|
|
│vi: set net ft=c ts=2 sts=2 sw=2 fenc=utf-8 :vi│
|
|
|
|
╞══════════════════════════════════════════════════════════════════════════════╡
|
|
|
|
│ Copyright 2020 Justine Alexandra Roberts Tunney │
|
|
|
|
│ │
|
2020-12-28 01:18:44 +00:00
|
|
|
│ Permission to use, copy, modify, and/or distribute this software for │
|
|
|
|
│ any purpose with or without fee is hereby granted, provided that the │
|
|
|
|
│ above copyright notice and this permission notice appear in all copies. │
|
2020-06-15 14:18:57 +00:00
|
|
|
│ │
|
2020-12-28 01:18:44 +00:00
|
|
|
│ THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL │
|
|
|
|
│ WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED │
|
|
|
|
│ WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE │
|
|
|
|
│ AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL │
|
|
|
|
│ DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR │
|
|
|
|
│ PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER │
|
|
|
|
│ TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR │
|
|
|
|
│ PERFORMANCE OF THIS SOFTWARE. │
|
2020-06-15 14:18:57 +00:00
|
|
|
╚─────────────────────────────────────────────────────────────────────────────*/
|
2023-05-13 05:42:57 +00:00
|
|
|
#include "libc/assert.h"
|
2020-06-15 14:18:57 +00:00
|
|
|
#include "libc/calls/calls.h"
|
2022-11-06 02:49:41 +00:00
|
|
|
#include "libc/calls/cp.internal.h"
|
2020-08-25 11:23:25 +00:00
|
|
|
#include "libc/calls/internal.h"
|
2022-05-23 22:06:11 +00:00
|
|
|
#include "libc/calls/state.internal.h"
|
|
|
|
#include "libc/calls/syscall-nt.internal.h"
|
|
|
|
#include "libc/calls/syscall-sysv.internal.h"
|
2021-01-30 09:49:43 +00:00
|
|
|
#include "libc/dce.h"
|
Improve ZIP filesystem and change its prefix
The ZIP filesystem has a breaking change. You now need to use /zip/ to
open() / opendir() / etc. assets within the ZIP structure of your APE
binary, instead of the previous convention of using zip: or zip! URIs.
This is needed because Python likes to use absolute paths, and having
ZIP paths encoded like URIs simply broke too many things.
Many more system calls have been updated to be able to operate on ZIP
files and file descriptors. In particular fcntl() and ioctl() since
Python would do things like ask if a ZIP file is a terminal and get
confused when the old implementation mistakenly said yes, because the
fastest way to guarantee native file descriptors is to dup(2). This
change also improves the async signal safety of zipos and ensures it
doesn't maintain any open file descriptors beyond that which the user
has opened.
This change makes a lot of progress towards adding magic numbers that
are specific to platforms other than Linux. The philosophy here is that,
if you use an operating system like FreeBSD, then you should be able to
take advantage of FreeBSD exclusive features, even if we don't polyfill
them on other platforms. For example, you can now open() a file with the
O_VERIFY flag. If your program runs on other platforms, then Cosmo will
automatically set O_VERIFY to zero. This lets you safely use it without
the need for #ifdef or ifstatements which detract from readability.
One of the blindspots of the ASAN memory hardening we use to offer Rust
like assurances has always been that memory passed to the kernel via
system calls (e.g. writev) can't be checked automatically since the
kernel wasn't built with MODE=asan. This change makes more progress
ensuring that each system call will verify the soundness of memory
before it's passed to the kernel. The code for doing these checks is
fast, particularly for buffers, where it can verify 64 bytes a cycle.
- Correct O_LOOP definition on NT
- Introduce program_executable_name
- Add ASAN guards to more system calls
- Improve termios compatibility with BSDs
- Fix bug in Windows auxiliary value encoding
- Add BSD and XNU specific errnos and open flags
- Add check to ensure build doesn't talk to internet
2021-08-22 08:04:18 +00:00
|
|
|
#include "libc/intrin/asan.internal.h"
|
2022-05-12 13:43:59 +00:00
|
|
|
#include "libc/intrin/describeflags.internal.h"
|
2022-09-13 06:10:38 +00:00
|
|
|
#include "libc/intrin/strace.internal.h"
|
2022-08-13 20:11:56 +00:00
|
|
|
#include "libc/intrin/weaken.h"
|
Improve ZIP filesystem and change its prefix
The ZIP filesystem has a breaking change. You now need to use /zip/ to
open() / opendir() / etc. assets within the ZIP structure of your APE
binary, instead of the previous convention of using zip: or zip! URIs.
This is needed because Python likes to use absolute paths, and having
ZIP paths encoded like URIs simply broke too many things.
Many more system calls have been updated to be able to operate on ZIP
files and file descriptors. In particular fcntl() and ioctl() since
Python would do things like ask if a ZIP file is a terminal and get
confused when the old implementation mistakenly said yes, because the
fastest way to guarantee native file descriptors is to dup(2). This
change also improves the async signal safety of zipos and ensures it
doesn't maintain any open file descriptors beyond that which the user
has opened.
This change makes a lot of progress towards adding magic numbers that
are specific to platforms other than Linux. The philosophy here is that,
if you use an operating system like FreeBSD, then you should be able to
take advantage of FreeBSD exclusive features, even if we don't polyfill
them on other platforms. For example, you can now open() a file with the
O_VERIFY flag. If your program runs on other platforms, then Cosmo will
automatically set O_VERIFY to zero. This lets you safely use it without
the need for #ifdef or ifstatements which detract from readability.
One of the blindspots of the ASAN memory hardening we use to offer Rust
like assurances has always been that memory passed to the kernel via
system calls (e.g. writev) can't be checked automatically since the
kernel wasn't built with MODE=asan. This change makes more progress
ensuring that each system call will verify the soundness of memory
before it's passed to the kernel. The code for doing these checks is
fast, particularly for buffers, where it can verify 64 bytes a cycle.
- Correct O_LOOP definition on NT
- Introduce program_executable_name
- Add ASAN guards to more system calls
- Improve termios compatibility with BSDs
- Fix bug in Windows auxiliary value encoding
- Add BSD and XNU specific errnos and open flags
- Add check to ensure build doesn't talk to internet
2021-08-22 08:04:18 +00:00
|
|
|
#include "libc/log/log.h"
|
2021-01-30 09:49:43 +00:00
|
|
|
#include "libc/str/str.h"
|
2020-08-25 11:23:25 +00:00
|
|
|
#include "libc/sysv/consts/at.h"
|
2021-09-28 05:58:51 +00:00
|
|
|
#include "libc/sysv/consts/o.h"
|
2020-08-25 11:23:25 +00:00
|
|
|
#include "libc/sysv/errfuns.h"
|
2021-01-30 09:49:43 +00:00
|
|
|
#include "libc/zipos/zipos.internal.h"
|
2020-06-15 14:18:57 +00:00
|
|
|
|
|
|
|
/**
|
2021-01-30 09:49:43 +00:00
|
|
|
* Opens file.
|
2020-06-15 14:18:57 +00:00
|
|
|
*
|
2022-10-02 14:42:44 +00:00
|
|
|
* Here's an example of how a file can be created:
|
|
|
|
*
|
|
|
|
* int fd = openat(AT_FDCWD, "hi.txt", O_CREAT | O_WRONLY | O_TRUNC, 0644);
|
|
|
|
* write(fd, "hello\n", 6);
|
|
|
|
* close(fd);
|
|
|
|
*
|
|
|
|
* Here's an example of how that file could read back into memory:
|
|
|
|
*
|
|
|
|
* char data[513] = {0};
|
|
|
|
* int fd = openat(AT_FDCWD, "hi.txt", O_RDONLY);
|
|
|
|
* read(fd, data, 512);
|
|
|
|
* close(fd);
|
|
|
|
* assert(!strcmp(data, "hello\n"));
|
|
|
|
*
|
|
|
|
* If your main() source file has this statement:
|
|
|
|
*
|
2023-07-26 20:54:49 +00:00
|
|
|
* __static_yoink("zipos");
|
2022-10-02 14:42:44 +00:00
|
|
|
*
|
|
|
|
* Then you can read zip assets by adding a `"/zip/..."` prefix to `file`, e.g.
|
|
|
|
*
|
|
|
|
* // run `zip program.com hi.txt` beforehand
|
|
|
|
* openat(AT_FDCWD, "/zip/hi.txt", O_RDONLY);
|
|
|
|
*
|
|
|
|
* @param dirfd is normally `AT_FDCWD` but if it's an open directory and
|
|
|
|
* `file` names a relative path then it's opened relative to `dirfd`
|
|
|
|
* @param file is a UTF-8 string naming filesystem entity, e.g. `foo/bar.txt`,
|
|
|
|
* which on Windows is bludgeoned into a WIN32 path automatically, e.g.
|
|
|
|
* - `foo/bar.txt` becomes `foo\bar.txt`
|
|
|
|
* - `/tmp/...` becomes whatever GetTempPath() is
|
|
|
|
* - `\\...` or `//...` is passed through to WIN32 unchanged
|
|
|
|
* - `/c/foo` or `\c\foo` becomes `\\?\c:\foo`
|
|
|
|
* - `c:/foo` or `c:\foo` becomes `\\?\c:\foo`
|
|
|
|
* - `/D` becomes `\\?\D:\`
|
|
|
|
* @param flags must have one of the following under the `O_ACCMODE` bits:
|
|
|
|
* - `O_RDONLY` to open `file` for reading only
|
|
|
|
* - `O_WRONLY` to open `file` for writing
|
|
|
|
* - `O_RDWR` to open `file` for reading and writing
|
|
|
|
* The following may optionally be bitwise or'd into `flags`:
|
|
|
|
* - `O_CREAT` create file if it doesn't exist
|
|
|
|
* - `O_TRUNC` automatic `ftruncate(fd,0)` if exists
|
|
|
|
* - `O_CLOEXEC` automatic close() upon execve()
|
|
|
|
* - `O_EXCL` exclusive access (see below)
|
|
|
|
* - `O_APPEND` open file for appending only
|
|
|
|
* - `O_EXEC` open file for execution only; see fexecve()
|
|
|
|
* - `O_NOCTTY` prevents `file` possibly becoming controlling terminal
|
|
|
|
* - `O_NONBLOCK` asks read/write to fail with `EAGAIN` rather than block
|
|
|
|
* - `O_DIRECT` it's complicated (not supported on Apple and OpenBSD)
|
|
|
|
* - `O_DIRECTORY` useful for stat'ing (hint on UNIX but required on NT)
|
|
|
|
* - `O_NOFOLLOW` fail if it's a symlink (zero on Windows)
|
|
|
|
* - `O_DSYNC` it's complicated (zero on non-Linux/Apple)
|
|
|
|
* - `O_RSYNC` it's complicated (zero on non-Linux/Apple)
|
|
|
|
* - `O_VERIFY` it's complicated (zero on non-FreeBSD)
|
|
|
|
* - `O_SHLOCK` it's complicated (zero on non-BSD)
|
|
|
|
* - `O_EXLOCK` it's complicated (zero on non-BSD)
|
|
|
|
* - `O_PATH` open only for metadata (Linux 2.6.39+ otherwise zero)
|
|
|
|
* - `O_NOATIME` don't record access time (zero on non-Linux)
|
|
|
|
* - `O_RANDOM` hint random access intent (zero on non-Windows)
|
|
|
|
* - `O_SEQUENTIAL` hint sequential access intent (zero on non-Windows)
|
|
|
|
* - `O_COMPRESSED` ask fs to abstract compression (zero on non-Windows)
|
|
|
|
* - `O_INDEXED` turns on that slow performance (zero on non-Windows)
|
|
|
|
* - `O_TMPFILE` should not be used; use tmpfd() or tmpfile() instead
|
|
|
|
* There are three regular combinations for the above flags:
|
|
|
|
* - `O_RDONLY`: Opens existing file for reading. If it doesn't
|
|
|
|
* exist then nil is returned and errno will be `ENOENT` (or in
|
|
|
|
* some other cases `ENOTDIR`).
|
|
|
|
* - `O_WRONLY|O_CREAT|O_TRUNC`: Creates file. If it already
|
|
|
|
* exists, then the existing copy is destroyed and the opened
|
|
|
|
* file will start off with a length of zero. This is the
|
|
|
|
* behavior of the traditional creat() system call.
|
|
|
|
* - `O_WRONLY|O_CREAT|O_EXCL`: Create file only if doesn't exist
|
|
|
|
* already. If it does exist then `nil` is returned along with
|
|
|
|
* `errno` set to `EEXIST`.
|
|
|
|
* @param mode is an octal user/group/other permission signifier that's
|
|
|
|
* ignored if `O_CREAT` isn't passed in `flags`; when creating files
|
|
|
|
* you'll usually want `mode` to be `0644` which enables global read
|
|
|
|
* and only permits the owner to write; or when creating executables
|
|
|
|
* you'll usually want `mode` to be `0755` which is the same, except
|
|
|
|
* the executable bit is set thrice too
|
|
|
|
* @return file descriptor (which needs to be close()'d), or -1 w/ errno
|
|
|
|
* @raise EPERM if pledge() is in play w/o appropriate rpath/wpath/cpath
|
|
|
|
* @raise EACCES if unveil() is in play and didn't unveil your `file` path
|
|
|
|
* @raise EACCES if we don't have permission to search a component of `file`
|
|
|
|
* @raise EACCES if file exists but requested `flags & O_ACCMODE` was denied
|
|
|
|
* @raise EACCES if file doesn't exist and parent dir lacks write permissions
|
|
|
|
* @raise EACCES if `O_TRUNC` was specified in `flags` but writing was denied
|
|
|
|
* @raise ENOTSUP if `file` is on zip file system and `dirfd` isn't `AT_FDCWD`
|
|
|
|
* @raise ENOTDIR if a directory component in `file` exists as non-directory
|
|
|
|
* @raise ENOTDIR if `file` is relative and `dirfd` isn't an open directory
|
|
|
|
* @raise EROFS when writing is requested w/ `file` on read-only filesystem
|
|
|
|
* @raise ENAMETOOLONG if symlink-resolved `file` length exceeds `PATH_MAX`
|
|
|
|
* @raise ENAMETOOLONG if component in `file` exists longer than `NAME_MAX`
|
|
|
|
* @raise ENOTSUP if `file` is on zip file system and process is vfork()'d
|
|
|
|
* @raise ENOSPC if file system is full when `file` would be `O_CREAT`ed
|
|
|
|
* @raise EINTR if we needed to block and a signal was delivered instead
|
2023-07-30 01:44:15 +00:00
|
|
|
* @raise EEXIST if `O_CREAT|O_EXCL` are used and `file` already existed
|
2022-11-06 02:49:41 +00:00
|
|
|
* @raise ECANCELED if thread was cancelled in masked mode
|
2022-10-02 14:42:44 +00:00
|
|
|
* @raise ENOENT if `file` doesn't exist when `O_CREAT` isn't in `flags`
|
|
|
|
* @raise ENOENT if `file` points to a string that's empty
|
|
|
|
* @raise ENOMEM if insufficient memory was available
|
2022-10-14 15:25:47 +00:00
|
|
|
* @raise EMFILE if process `RLIMIT_NOFILE` has been reached
|
|
|
|
* @raise ENFILE if system-wide file limit has been reached
|
2022-10-02 14:42:44 +00:00
|
|
|
* @raise EOPNOTSUPP if `file` names a named socket
|
2022-10-03 05:14:33 +00:00
|
|
|
* @raise EFAULT if `file` points to invalid memory
|
2022-10-02 14:42:44 +00:00
|
|
|
* @raise ETXTBSY if writing is requested on `file` that's being executed
|
|
|
|
* @raise ELOOP if `flags` had `O_NOFOLLOW` and `file` is a symbolic link
|
|
|
|
* @raise ELOOP if a loop was detected resolving components of `file`
|
|
|
|
* @raise EISDIR if writing is requested and `file` names a directory
|
2022-11-04 08:04:43 +00:00
|
|
|
* @cancellationpoint
|
2022-10-02 14:42:44 +00:00
|
|
|
* @asyncsignalsafe
|
|
|
|
* @restartable
|
2022-06-15 23:19:50 +00:00
|
|
|
* @threadsafe
|
2022-10-02 14:42:44 +00:00
|
|
|
* @vforksafe
|
2020-06-15 14:18:57 +00:00
|
|
|
*/
|
2021-02-07 14:11:44 +00:00
|
|
|
int openat(int dirfd, const char *file, int flags, ...) {
|
2021-10-15 02:36:49 +00:00
|
|
|
int rc;
|
2020-08-25 11:23:25 +00:00
|
|
|
va_list va;
|
|
|
|
unsigned mode;
|
2021-01-30 09:49:43 +00:00
|
|
|
struct ZiposUri zipname;
|
2020-08-25 11:23:25 +00:00
|
|
|
va_start(va, flags);
|
|
|
|
mode = va_arg(va, unsigned);
|
|
|
|
va_end(va);
|
2022-11-06 02:49:41 +00:00
|
|
|
BEGIN_CANCELLATION_POINT;
|
|
|
|
|
2022-11-02 05:36:03 +00:00
|
|
|
if (file && (!IsAsan() || __asan_is_valid_str(file))) {
|
2021-10-15 02:36:49 +00:00
|
|
|
if (!__isfdkind(dirfd, kFdZip)) {
|
2022-09-13 06:10:38 +00:00
|
|
|
if (_weaken(__zipos_open) &&
|
|
|
|
_weaken(__zipos_parseuri)(file, &zipname) != -1) {
|
2021-10-15 02:36:49 +00:00
|
|
|
if (!__vforked && dirfd == AT_FDCWD) {
|
2022-09-13 06:10:38 +00:00
|
|
|
rc = _weaken(__zipos_open)(&zipname, flags, mode);
|
2021-10-15 02:36:49 +00:00
|
|
|
} else {
|
2022-10-02 14:42:44 +00:00
|
|
|
rc = enotsup(); /* TODO */
|
2021-10-15 02:36:49 +00:00
|
|
|
}
|
|
|
|
} else if (!IsWindows() && !IsMetal()) {
|
|
|
|
rc = sys_openat(dirfd, file, flags, mode);
|
|
|
|
} else if (IsMetal()) {
|
|
|
|
rc = sys_openat_metal(dirfd, file, flags, mode);
|
|
|
|
} else {
|
|
|
|
rc = sys_open_nt(dirfd, file, flags, mode);
|
|
|
|
}
|
|
|
|
} else {
|
2022-10-02 14:42:44 +00:00
|
|
|
rc = enotsup(); /* TODO */
|
2021-10-15 02:36:49 +00:00
|
|
|
}
|
2020-08-25 11:23:25 +00:00
|
|
|
} else {
|
2021-10-15 02:36:49 +00:00
|
|
|
rc = efault();
|
2020-08-25 11:23:25 +00:00
|
|
|
}
|
2022-11-06 02:49:41 +00:00
|
|
|
|
|
|
|
END_CANCELLATION_POINT;
|
2022-06-26 01:17:31 +00:00
|
|
|
STRACE("openat(%s, %#s, %s, %#o) → %d% m", DescribeDirfd(dirfd), file,
|
2022-04-25 15:30:14 +00:00
|
|
|
DescribeOpenFlags(flags), (flags & (O_CREAT | O_TMPFILE)) ? mode : 0,
|
|
|
|
rc);
|
2021-10-15 02:36:49 +00:00
|
|
|
return rc;
|
2020-06-15 14:18:57 +00:00
|
|
|
}
|