2 Copyright (C) 2009-2024 Free Software Foundation, Inc.
4 This program is free software: you can redistribute it and/or modify
5 it under the terms of the GNU General Public License as published by
6 the Free Software Foundation, either version 3 of the License, or
7 (at your option) any later version.
9 This program is distributed in the hope that it will be useful,
10 but WITHOUT ANY WARRANTY; without even the implied warranty of
11 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 GNU General Public License for more details.
14 You should have received a copy of the GNU General Public License
15 along with this program. If not, see <https://www.gnu.org/licenses/>. */
17 /* Written by Eric Blake <ebb9@byu.net>, 2009. */
24 #include "signature.h"
25 SIGNATURE_CHECK (fcntl
, int, (int, int, ...));
32 #if defined _WIN32 && ! defined __CYGWIN__
33 /* Get declarations of the native Windows API functions. */
34 # define WIN32_LEAN_AND_MEAN
36 /* Get _get_osfhandle. */
37 # if GNULIB_MSVC_NOTHROW
38 # include "msvc-nothrow.h"
44 #include "binary-io.h"
47 /* Tell GCC not to warn about the specific edge cases tested here. */
48 #if _GL_GNUC_PREREQ (13, 0)
49 # pragma GCC diagnostic ignored "-Wanalyzer-fd-leak"
50 # pragma GCC diagnostic ignored "-Wanalyzer-va-arg-type-mismatch"
54 # define set_binary_mode my_set_binary_mode
56 set_binary_mode (_GL_UNUSED
int fd
, _GL_UNUSED
int mode
)
62 /* Return true if FD is open. */
66 #if defined _WIN32 && ! defined __CYGWIN__
67 /* On native Windows, the initial state of unassigned standard file
68 descriptors is that they are open but point to an
69 INVALID_HANDLE_VALUE, and there is no fcntl. */
70 return (HANDLE
) _get_osfhandle (fd
) != INVALID_HANDLE_VALUE
;
73 # error Please port fcntl to your platform
75 return 0 <= fcntl (fd
, F_GETFL
);
79 /* Return true if FD is open and inheritable across exec/spawn. */
81 is_inheritable (int fd
)
83 #if defined _WIN32 && ! defined __CYGWIN__
84 /* On native Windows, the initial state of unassigned standard file
85 descriptors is that they are open but point to an
86 INVALID_HANDLE_VALUE, and there is no fcntl. */
87 HANDLE h
= (HANDLE
) _get_osfhandle (fd
);
89 if (h
== INVALID_HANDLE_VALUE
|| GetHandleInformation (h
, &flags
) == 0)
91 return (flags
& HANDLE_FLAG_INHERIT
) != 0;
94 # error Please port fcntl to your platform
96 int i
= fcntl (fd
, F_GETFD
);
97 return 0 <= i
&& (i
& FD_CLOEXEC
) == 0;
101 /* Return non-zero if FD is open in the given MODE, which is either
102 O_TEXT or O_BINARY. */
104 is_mode (int fd
, int mode
)
106 int value
= set_binary_mode (fd
, O_BINARY
);
107 set_binary_mode (fd
, value
);
108 return mode
== value
;
111 /* Since native fcntl can have more supported operations than our
112 replacement is aware of, and since various operations assign
113 different types to the vararg argument, a wrapper around fcntl must
114 be able to pass a vararg of unknown type on through to the original
115 fcntl. Make sure that this works properly: func1 behaves like the
116 original fcntl interpreting the vararg as an int or a pointer to a
117 struct, and func2 behaves like rpl_fcntl that doesn't know what
131 i
= va_arg (arg
, int);
134 struct dummy_struct
*s
= va_arg (arg
, struct dummy_struct
*);
146 p
= va_arg (arg
, void *);
151 /* Ensure that all supported fcntl actions are distinct, and
152 usable in preprocessor expressions. */
162 case F_DUPFD_CLOEXEC
:
224 main (int argc
, _GL_UNUSED
char *argv
[])
228 return (is_open (10) ? 42 : 0);
230 const char *file
= "test-fcntl.tmp";
232 int bad_fd
= getdtablesize ();
234 /* Sanity check that rpl_fcntl is likely to work. */
235 ASSERT (func2 (1, 2) == 2);
236 ASSERT (func2 (2, -2) == -2);
237 ASSERT (func2 (3, 0x80000000) == 0x80000000);
239 struct dummy_struct s
= { 0L, 4 };
240 ASSERT (func2 (4, &s
) == 4);
244 /* Assume std descriptors were provided by invoker, and ignore fds
245 that might have been inherited. */
246 fd
= creat (file
, 0600);
247 ASSERT (STDERR_FILENO
< fd
);
251 /* For F_DUPFD*, the source must be valid. */
253 ASSERT (fcntl (-1, F_DUPFD
, 0) == -1);
254 ASSERT (errno
== EBADF
);
256 ASSERT (fcntl (fd
+ 1, F_DUPFD
, 0) == -1);
257 ASSERT (errno
== EBADF
);
259 ASSERT (fcntl (bad_fd
, F_DUPFD
, 0) == -1);
260 ASSERT (errno
== EBADF
);
262 ASSERT (fcntl (-1, F_DUPFD_CLOEXEC
, 0) == -1);
263 ASSERT (errno
== EBADF
);
265 ASSERT (fcntl (fd
+ 1, F_DUPFD_CLOEXEC
, 0) == -1);
266 ASSERT (errno
== EBADF
);
268 ASSERT (fcntl (bad_fd
, F_DUPFD_CLOEXEC
, 0) == -1);
269 ASSERT (errno
== EBADF
);
271 /* For F_DUPFD*, the destination must be valid. */
273 ASSERT (fcntl (fd
, F_DUPFD
, -1) == -1);
274 ASSERT (errno
== EINVAL
);
276 ASSERT (fcntl (fd
, F_DUPFD
, bad_fd
) == -1);
277 ASSERT (errno
== EINVAL
);
279 ASSERT (fcntl (fd
, F_DUPFD_CLOEXEC
, -1) == -1);
280 ASSERT (errno
== EINVAL
);
282 ASSERT (fcntl (fd
, F_DUPFD_CLOEXEC
, bad_fd
) == -1);
283 ASSERT (errno
== EINVAL
284 || errno
== EMFILE
/* WSL */);
286 /* For F_DUPFD*, check for correct inheritance, as well as
287 preservation of text vs. binary. */
288 set_binary_mode (fd
, O_BINARY
);
289 ASSERT (is_open (fd
));
290 ASSERT (!is_open (fd
+ 1));
291 ASSERT (!is_open (fd
+ 2));
292 ASSERT (is_inheritable (fd
));
293 ASSERT (is_mode (fd
, O_BINARY
));
295 ASSERT (fcntl (fd
, F_DUPFD
, fd
) == fd
+ 1);
296 ASSERT (is_open (fd
));
297 ASSERT (is_open (fd
+ 1));
298 ASSERT (!is_open (fd
+ 2));
299 ASSERT (is_inheritable (fd
+ 1));
300 ASSERT (is_mode (fd
, O_BINARY
));
301 ASSERT (is_mode (fd
+ 1, O_BINARY
));
302 ASSERT (close (fd
+ 1) == 0);
304 ASSERT (fcntl (fd
, F_DUPFD_CLOEXEC
, fd
+ 2) == fd
+ 2);
305 ASSERT (is_open (fd
));
306 ASSERT (!is_open (fd
+ 1));
307 ASSERT (is_open (fd
+ 2));
308 ASSERT (is_inheritable (fd
));
309 ASSERT (!is_inheritable (fd
+ 2));
310 ASSERT (is_mode (fd
, O_BINARY
));
311 ASSERT (is_mode (fd
+ 2, O_BINARY
));
312 ASSERT (close (fd
) == 0);
314 set_binary_mode (fd
+ 2, O_TEXT
);
315 ASSERT (fcntl (fd
+ 2, F_DUPFD
, fd
+ 1) == fd
+ 1);
316 ASSERT (!is_open (fd
));
317 ASSERT (is_open (fd
+ 1));
318 ASSERT (is_open (fd
+ 2));
319 ASSERT (is_inheritable (fd
+ 1));
320 ASSERT (!is_inheritable (fd
+ 2));
321 ASSERT (is_mode (fd
+ 1, O_TEXT
));
322 ASSERT (is_mode (fd
+ 2, O_TEXT
));
323 ASSERT (close (fd
+ 1) == 0);
325 ASSERT (fcntl (fd
+ 2, F_DUPFD_CLOEXEC
, 0) == fd
);
326 ASSERT (is_open (fd
));
327 ASSERT (!is_open (fd
+ 1));
328 ASSERT (is_open (fd
+ 2));
329 ASSERT (!is_inheritable (fd
));
330 ASSERT (!is_inheritable (fd
+ 2));
331 ASSERT (is_mode (fd
, O_TEXT
));
332 ASSERT (is_mode (fd
+ 2, O_TEXT
));
333 ASSERT (close (fd
+ 2) == 0);
335 /* Test F_GETFD on invalid file descriptors. */
337 ASSERT (fcntl (-1, F_GETFD
) == -1);
338 ASSERT (errno
== EBADF
);
340 ASSERT (fcntl (fd
+ 1, F_GETFD
) == -1);
341 ASSERT (errno
== EBADF
);
343 ASSERT (fcntl (bad_fd
, F_GETFD
) == -1);
344 ASSERT (errno
== EBADF
);
346 /* Test F_GETFD, the FD_CLOEXEC bit. */
348 int result
= fcntl (fd
, F_GETFD
);
349 ASSERT (0 <= result
);
350 ASSERT ((result
& FD_CLOEXEC
) == FD_CLOEXEC
);
351 ASSERT (dup (fd
) == fd
+ 1);
352 result
= fcntl (fd
+ 1, F_GETFD
);
353 ASSERT (0 <= result
);
354 ASSERT ((result
& FD_CLOEXEC
) == 0);
355 ASSERT (close (fd
+ 1) == 0);
359 /* Test F_SETFD on invalid file descriptors. */
361 ASSERT (fcntl (-1, F_SETFD
, 0) == -1);
362 ASSERT (errno
== EBADF
);
364 ASSERT (fcntl (fd
+ 1, F_SETFD
, 0) == -1);
365 ASSERT (errno
== EBADF
);
367 ASSERT (fcntl (bad_fd
, F_SETFD
, 0) == -1);
368 ASSERT (errno
== EBADF
);
372 /* Test F_GETFL on invalid file descriptors. */
374 ASSERT (fcntl (-1, F_GETFL
) == -1);
375 ASSERT (errno
== EBADF
);
377 ASSERT (fcntl (fd
+ 1, F_GETFL
) == -1);
378 ASSERT (errno
== EBADF
);
380 ASSERT (fcntl (bad_fd
, F_GETFL
) == -1);
381 ASSERT (errno
== EBADF
);
385 /* Test F_SETFL on invalid file descriptors. */
387 ASSERT (fcntl (-1, F_SETFL
, 0) == -1);
388 ASSERT (errno
== EBADF
);
390 ASSERT (fcntl (fd
+ 1, F_SETFL
, 0) == -1);
391 ASSERT (errno
== EBADF
);
393 ASSERT (fcntl (bad_fd
, F_SETFL
, 0) == -1);
394 ASSERT (errno
== EBADF
);
398 /* Test F_GETOWN on invalid file descriptors. */
400 ASSERT (fcntl (-1, F_GETOWN
) == -1);
401 ASSERT (errno
== EBADF
);
403 ASSERT (fcntl (fd
+ 1, F_GETOWN
) == -1);
404 ASSERT (errno
== EBADF
);
406 ASSERT (fcntl (bad_fd
, F_GETOWN
) == -1);
407 ASSERT (errno
== EBADF
);
411 /* Test F_SETFL on invalid file descriptors. */
413 ASSERT (fcntl (-1, F_SETOWN
, 0) == -1);
414 ASSERT (errno
== EBADF
);
416 ASSERT (fcntl (fd
+ 1, F_SETOWN
, 0) == -1);
417 ASSERT (errno
== EBADF
);
419 ASSERT (fcntl (bad_fd
, F_SETOWN
, 0) == -1);
420 ASSERT (errno
== EBADF
);
424 ASSERT (close (fd
) == 0);
425 ASSERT (unlink (file
) == 0);
427 /* Close file descriptors that may have been inherited from the parent
428 process and that would cause failures below.
429 Such file descriptors have been seen:
430 - with GNU make, when invoked as 'make -j N' with j > 1,
431 - in some versions of the KDE desktop environment,
433 - in MacPorts with the "trace mode" enabled.
437 /* Test whether F_DUPFD_CLOEXEC is effective. */
438 ASSERT (fcntl (1, F_DUPFD_CLOEXEC
, 10) >= 0);
439 if (test_exit_status
)
440 return test_exit_status
;
441 #if defined _WIN32 && !defined __CYGWIN__
442 return _execl ("./test-fcntl", "./test-fcntl", "child", NULL
);
444 return execl ("./test-fcntl", "./test-fcntl", "child", NULL
);