From 65ea604c74f3fecbc61a266a22fdf527764995b6 Mon Sep 17 00:00:00 2001 From: Rich Felker Date: Thu, 19 Dec 2013 14:24:55 -0500 Subject: fix failure of fchmod, fstat, fchdir, and fchown to produce EBADF the workaround/fallback code for supporting O_PATH file descriptors when the kernel lacks support for performing these operations on them caused EBADF to get replaced by ENOENT (due to missing entry in /proc/self/fd). this is unlikely to affect real-world code (calls that might yield EBADF are generally unsafe, especially in library code) but it was breaking some test cases. the fix I've applied is something of a tradeoff: it adds one syscall to these operations on kernels where the workaround is needed. the alternative would be to catch ENOENT from the /proc lookup and translate it to EBADF, but I want to avoid doing that in the interest of not touching/depending on /proc at all in these functions as long as the kernel correctly supports the operations. this is following the general principle of isolating hacks to code paths that are taken on broken systems, and keeping the code for correct systems completely hack-free. --- src/stat/fchmod.c | 4 +++- src/stat/fstat.c | 4 +++- 2 files changed, 6 insertions(+), 2 deletions(-) (limited to 'src/stat') diff --git a/src/stat/fchmod.c b/src/stat/fchmod.c index 1b943d44..6d281416 100644 --- a/src/stat/fchmod.c +++ b/src/stat/fchmod.c @@ -1,5 +1,6 @@ #include #include +#include #include "syscall.h" void __procfdname(char *, unsigned); @@ -7,7 +8,8 @@ void __procfdname(char *, unsigned); int fchmod(int fd, mode_t mode) { int ret = __syscall(SYS_fchmod, fd, mode); - if (ret != -EBADF || fd < 0) return __syscall_ret(ret); + if (ret != -EBADF || __syscall(SYS_fcntl, fd, F_GETFD) < 0) + return __syscall_ret(ret); char buf[15+3*sizeof(int)]; __procfdname(buf, fd); diff --git a/src/stat/fstat.c b/src/stat/fstat.c index 29b4243d..b5611767 100644 --- a/src/stat/fstat.c +++ b/src/stat/fstat.c @@ -1,5 +1,6 @@ #include #include +#include #include "syscall.h" #include "libc.h" @@ -8,7 +9,8 @@ void __procfdname(char *, unsigned); int fstat(int fd, struct stat *st) { int ret = __syscall(SYS_fstat, fd, st); - if (ret != -EBADF || fd < 0) return __syscall_ret(ret); + if (ret != -EBADF || __syscall(SYS_fcntl, fd, F_GETFD) < 0) + return __syscall_ret(ret); char buf[15+3*sizeof(int)]; __procfdname(buf, fd); -- cgit v1.2.1