• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*	$OpenBSD: findfp.c,v 1.15 2013/12/17 16:33:27 deraadt Exp $ */
2 /*-
3  * Copyright (c) 1990, 1993
4  *	The Regents of the University of California.  All rights reserved.
5  *
6  * This code is derived from software contributed to Berkeley by
7  * Chris Torek.
8  *
9  * Redistribution and use in source and binary forms, with or without
10  * modification, are permitted provided that the following conditions
11  * are met:
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  * 2. Redistributions in binary form must reproduce the above copyright
15  *    notice, this list of conditions and the following disclaimer in the
16  *    documentation and/or other materials provided with the distribution.
17  * 3. Neither the name of the University nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 #define __BIONIC_NO_STDIO_FORTIFY
35 #include <stdio.h>
36 
37 #include <errno.h>
38 #include <fcntl.h>
39 #include <limits.h>
40 #include <paths.h>
41 #include <stdlib.h>
42 #include <string.h>
43 #include <sys/param.h>
44 #include <sys/socket.h>
45 #include <sys/stat.h>
46 #include <sys/wait.h>
47 #include <unistd.h>
48 
49 #include <android/fdsan.h>
50 
51 #include <async_safe/log.h>
52 
53 #include "glue.h"
54 #include "local.h"
55 #include "private/ErrnoRestorer.h"
56 #include "private/FdPath.h"
57 #include "private/__bionic_get_shell_path.h"
58 #include "private/bionic_fortify.h"
59 #include "private/thread_private.h"
60 
61 #include "private/bsd_sys_param.h" // For ALIGN/ALIGNBYTES.
62 
63 #define	NDYNAMIC 10		/* add ten more whenever necessary */
64 
65 #define PRINTF_IMPL(expr) \
66     va_list ap; \
67     va_start(ap, fmt); \
68     int result = (expr); \
69     va_end(ap); \
70     return result;
71 
72 #define MAKE_STD_STREAM(flags, fd)                                          \
73   {                                                                         \
74     ._flags = flags, ._file = fd, ._cookie = __sF + fd, ._close = __sclose, \
75     ._read = __sread, ._write = __swrite, ._ext = {                         \
76       ._base = reinterpret_cast<uint8_t*>(__sFext + fd)                     \
77     }                                                                       \
78   }
79 
80 static struct __sfileext __sFext[3] = {
81     {._lock = PTHREAD_RECURSIVE_MUTEX_INITIALIZER_NP,
82      ._caller_handles_locking = false,
83      ._seek64 = __sseek64,
84      ._popen_pid = 0},
85     {._lock = PTHREAD_RECURSIVE_MUTEX_INITIALIZER_NP,
86      ._caller_handles_locking = false,
87      ._seek64 = __sseek64,
88      ._popen_pid = 0},
89     {._lock = PTHREAD_RECURSIVE_MUTEX_INITIALIZER_NP,
90      ._caller_handles_locking = false,
91      ._seek64 = __sseek64,
92      ._popen_pid = 0},
93 };
94 
95 // __sF is exported for backwards compatibility. Until M, we didn't have symbols
96 // for stdin/stdout/stderr; they were macros accessing __sF.
97 FILE __sF[3] = {
98     MAKE_STD_STREAM(__SRD, STDIN_FILENO),
99     MAKE_STD_STREAM(__SWR, STDOUT_FILENO),
100     MAKE_STD_STREAM(__SWR|__SNBF, STDERR_FILENO),
101 };
102 
103 FILE* stdin = &__sF[0];
104 FILE* stdout = &__sF[1];
105 FILE* stderr = &__sF[2];
106 
107 static pthread_mutex_t __stdio_mutex = PTHREAD_MUTEX_INITIALIZER;
108 
__get_file_tag(FILE * fp)109 static uint64_t __get_file_tag(FILE* fp) {
110   // Don't use a tag for the standard streams.
111   // They don't really own their file descriptors, because the values are well-known, and you're
112   // allowed to do things like `close(STDIN_FILENO); open("foo", O_RDONLY)` when single-threaded.
113   if (fp == stdin || fp == stderr || fp == stdout) {
114     return 0;
115   }
116 
117   return android_fdsan_create_owner_tag(ANDROID_FDSAN_OWNER_TYPE_FILE,
118                                         reinterpret_cast<uint64_t>(fp));
119 }
120 
121 struct glue __sglue = { nullptr, 3, __sF };
122 static struct glue* lastglue = &__sglue;
123 
124 class ScopedFileLock {
125  public:
ScopedFileLock(FILE * fp)126   explicit ScopedFileLock(FILE* fp) : fp_(fp) {
127     FLOCKFILE(fp_);
128   }
~ScopedFileLock()129   ~ScopedFileLock() {
130     FUNLOCKFILE(fp_);
131   }
132 
133  private:
134   FILE* fp_;
135 };
136 
moreglue(int n)137 static glue* moreglue(int n) {
138   char* data = new char[sizeof(glue) + ALIGNBYTES + n * sizeof(FILE) + n * sizeof(__sfileext)];
139   if (data == nullptr) return nullptr;
140 
141   glue* g = reinterpret_cast<glue*>(data);
142   FILE* p = reinterpret_cast<FILE*>(ALIGN(data + sizeof(*g)));
143   __sfileext* pext = reinterpret_cast<__sfileext*>(ALIGN(data + sizeof(*g)) + n * sizeof(FILE));
144   g->next = nullptr;
145   g->niobs = n;
146   g->iobs = p;
147   while (--n >= 0) {
148     *p = {};
149     _FILEEXT_SETUP(p, pext);
150     p++;
151     pext++;
152   }
153   return g;
154 }
155 
free_fgetln_buffer(FILE * fp)156 static inline void free_fgetln_buffer(FILE* fp) {
157   if (__predict_false(fp->_lb._base != nullptr)) {
158     free(fp->_lb._base);
159     fp->_lb._base = nullptr;
160   }
161 }
162 
163 /*
164  * Find a free FILE for fopen et al.
165  */
__sfp(void)166 FILE* __sfp(void) {
167 	FILE *fp;
168 	int n;
169 	struct glue *g;
170 
171 	pthread_mutex_lock(&__stdio_mutex);
172 	for (g = &__sglue; g != nullptr; g = g->next) {
173 		for (fp = g->iobs, n = g->niobs; --n >= 0; fp++)
174 			if (fp->_flags == 0)
175 				goto found;
176 	}
177 
178 	/* release lock while mallocing */
179 	pthread_mutex_unlock(&__stdio_mutex);
180 	if ((g = moreglue(NDYNAMIC)) == nullptr) return nullptr;
181 	pthread_mutex_lock(&__stdio_mutex);
182 	lastglue->next = g;
183 	lastglue = g;
184 	fp = g->iobs;
185 found:
186 	fp->_flags = 1;		/* reserve this slot; caller sets real flags */
187 	pthread_mutex_unlock(&__stdio_mutex);
188 	fp->_p = nullptr;		/* no current pointer */
189 	fp->_w = 0;		/* nothing to read or write */
190 	fp->_r = 0;
191 	fp->_bf._base = nullptr;	/* no buffer */
192 	fp->_bf._size = 0;
193 	fp->_lbfsize = 0;	/* not line buffered */
194 	fp->_file = -1;		/* no file */
195 
196 	fp->_lb._base = nullptr;	/* no line buffer */
197 	fp->_lb._size = 0;
198 
199 	memset(_EXT(fp), 0, sizeof(struct __sfileext));
200 	_EXT(fp)->_lock = PTHREAD_RECURSIVE_MUTEX_INITIALIZER_NP;
201 	_EXT(fp)->_caller_handles_locking = false;
202 
203 	// Caller sets cookie, _read/_write etc.
204 	// We explicitly clear _seek and _seek64 to prevent subtle bugs.
205 	fp->_seek = nullptr;
206 	_EXT(fp)->_seek64 = nullptr;
207 
208 	return fp;
209 }
210 
_fwalk(int (* callback)(FILE *))211 int _fwalk(int (*callback)(FILE*)) {
212   int result = 0;
213   for (glue* g = &__sglue; g != nullptr; g = g->next) {
214     FILE* fp = g->iobs;
215     for (int n = g->niobs; --n >= 0; ++fp) {
216       if (fp->_flags != 0 && (fp->_flags & __SIGN) == 0) {
217         result |= (*callback)(fp);
218       }
219     }
220   }
221   return result;
222 }
223 
__libc_stdio_cleanup(void)224 extern "C" __LIBC_HIDDEN__ void __libc_stdio_cleanup(void) {
225   // Equivalent to fflush(nullptr), but without all the locking since we're shutting down anyway.
226   _fwalk(__sflush);
227 }
228 
__FILE_init(FILE * fp,int fd,int flags)229 static FILE* __FILE_init(FILE* fp, int fd, int flags) {
230   if (fp == nullptr) return nullptr;
231 
232 #if !defined(__LP64__)
233   if (fd > SHRT_MAX) __fortify_fatal("stdio: fd %d > SHRT_MAX", fd);
234 #endif
235 
236   fp->_file = fd;
237   android_fdsan_exchange_owner_tag(fd, 0, __get_file_tag(fp));
238   fp->_flags = flags;
239   fp->_cookie = fp;
240   fp->_read = __sread;
241   fp->_write = __swrite;
242   fp->_close = __sclose;
243   _EXT(fp)->_seek64 = __sseek64;
244   return fp;
245 }
246 
fopen(const char * file,const char * mode)247 FILE* fopen(const char* file, const char* mode) {
248   int mode_flags;
249   int flags = __sflags(mode, &mode_flags);
250   if (flags == 0) return nullptr;
251 
252   int fd = open(file, mode_flags, DEFFILEMODE);
253   if (fd == -1) {
254     return nullptr;
255   }
256 
257   FILE* fp = __FILE_init(__sfp(), fd, flags);
258   if (fp == nullptr) {
259     ErrnoRestorer errno_restorer;
260     close(fd);
261     return nullptr;
262   }
263 
264   // For append mode, O_APPEND sets the write position for free, but we need to
265   // set the read position manually.
266   if ((mode_flags & O_APPEND) != 0) __sseek64(fp, 0, SEEK_END);
267   return fp;
268 }
269 __strong_alias(fopen64, fopen);
270 
fdopen(int fd,const char * mode)271 FILE* fdopen(int fd, const char* mode) {
272   int mode_flags;
273   int flags = __sflags(mode, &mode_flags);
274   if (flags == 0) return nullptr;
275 
276   // Make sure the mode the user wants is a subset of the actual mode.
277   int fd_flags = fcntl(fd, F_GETFL, 0);
278   if (fd_flags == -1) return nullptr;
279   int tmp = fd_flags & O_ACCMODE;
280   if (tmp != O_RDWR && (tmp != (mode_flags & O_ACCMODE))) {
281     errno = EINVAL;
282     return nullptr;
283   }
284 
285   // Make sure O_APPEND is set on the underlying fd if our mode has 'a'.
286   // POSIX says we just take the current offset of the underlying fd.
287   if ((mode_flags & O_APPEND) && !(fd_flags & O_APPEND)) {
288     if (fcntl(fd, F_SETFL, fd_flags | O_APPEND) == -1) return nullptr;
289   }
290 
291   // Make sure O_CLOEXEC is set on the underlying fd if our mode has 'e'.
292   if ((mode_flags & O_CLOEXEC) && !((tmp = fcntl(fd, F_GETFD)) & FD_CLOEXEC)) {
293     fcntl(fd, F_SETFD, tmp | FD_CLOEXEC);
294   }
295 
296   return __FILE_init(__sfp(), fd, flags);
297 }
298 
freopen(const char * file,const char * mode,FILE * fp)299 FILE* freopen(const char* file, const char* mode, FILE* fp) {
300   CHECK_FP(fp);
301 
302   // POSIX says: "If pathname is a null pointer, the freopen() function shall
303   // attempt to change the mode of the stream to that specified by mode, as if
304   // the name of the file currently associated with the stream had been used. In
305   // this case, the file descriptor associated with the stream need not be
306   // closed if the call to freopen() succeeds. It is implementation-defined
307   // which changes of mode are permitted (if any), and under what
308   // circumstances."
309   //
310   // Linux is quite restrictive about what changes you can make with F_SETFL,
311   // and in particular won't let you touch the access bits. It's easiest and
312   // most effective to just rely on /proc/self/fd/...
313   FdPath fd_path(fp->_file);
314   if (file == nullptr) file = fd_path.c_str();
315 
316   int mode_flags;
317   int flags = __sflags(mode, &mode_flags);
318   if (flags == 0) {
319     fclose(fp);
320     return nullptr;
321   }
322 
323   ScopedFileLock sfl(fp);
324 
325   // TODO: rewrite this mess completely.
326 
327   // There are actually programs that depend on being able to "freopen"
328   // descriptors that weren't originally open.  Keep this from breaking.
329   // Remember whether the stream was open to begin with, and which file
330   // descriptor (if any) was associated with it.  If it was attached to
331   // a descriptor, defer closing it; freopen("/dev/stdin", "r", stdin)
332   // should work.  This is unnecessary if it was not a Unix file.
333   int isopen, wantfd;
334   if (fp->_flags == 0) {
335     fp->_flags = __SEOF; // Hold on to it.
336     isopen = 0;
337     wantfd = -1;
338   } else {
339     // Flush the stream; ANSI doesn't require this.
340     if (fp->_flags & __SWR) __sflush(fp);
341 
342     // If close is null, closing is a no-op, hence pointless.
343     isopen = (fp->_close != nullptr);
344     if ((wantfd = fp->_file) < 0 && isopen) {
345         (*fp->_close)(fp->_cookie);
346         isopen = 0;
347     }
348   }
349 
350   // Get a new descriptor to refer to the new file.
351   int fd = open(file, mode_flags, DEFFILEMODE);
352   if (fd < 0 && isopen) {
353     // If out of fd's close the old one and try again.
354     if (errno == ENFILE || errno == EMFILE) {
355       (*fp->_close)(fp->_cookie);
356       isopen = 0;
357       fd = open(file, mode_flags, DEFFILEMODE);
358     }
359   }
360 
361   int sverrno = errno;
362 
363   // Finish closing fp.  Even if the open succeeded above, we cannot
364   // keep fp->_base: it may be the wrong size.  This loses the effect
365   // of any setbuffer calls, but stdio has always done this before.
366   if (isopen && fd != wantfd) (*fp->_close)(fp->_cookie);
367   if (fp->_flags & __SMBF) free(fp->_bf._base);
368   fp->_w = 0;
369   fp->_r = 0;
370   fp->_p = nullptr;
371   fp->_bf._base = nullptr;
372   fp->_bf._size = 0;
373   fp->_lbfsize = 0;
374   if (HASUB(fp)) FREEUB(fp);
375   _UB(fp)._size = 0;
376   WCIO_FREE(fp);
377   free_fgetln_buffer(fp);
378   fp->_lb._size = 0;
379 
380   if (fd < 0) { // Did not get it after all.
381     fp->_flags = 0; // Release.
382     errno = sverrno; // Restore errno in case _close clobbered it.
383     return nullptr;
384   }
385 
386   // If reopening something that was open before on a real file, try
387   // to maintain the descriptor.  Various C library routines (perror)
388   // assume stderr is always fd STDERR_FILENO, even if being freopen'd.
389   if (wantfd >= 0 && fd != wantfd) {
390     if (dup3(fd, wantfd, mode_flags & O_CLOEXEC) >= 0) {
391       close(fd);
392       fd = wantfd;
393     }
394   }
395 
396   __FILE_init(fp, fd, flags);
397 
398   // For append mode, O_APPEND sets the write position for free, but we need to
399   // set the read position manually.
400   if ((mode_flags & O_APPEND) != 0) __sseek64(fp, 0, SEEK_END);
401 
402   return fp;
403 }
404 __strong_alias(freopen64, freopen);
405 
__FILE_close(FILE * fp)406 static int __FILE_close(FILE* fp) {
407   if (fp->_flags == 0) {
408     // Already freed!
409     errno = EBADF;
410     return EOF;
411   }
412 
413   ScopedFileLock sfl(fp);
414   WCIO_FREE(fp);
415   int r = fp->_flags & __SWR ? __sflush(fp) : 0;
416   if (fp->_close != nullptr && (*fp->_close)(fp->_cookie) < 0) {
417     r = EOF;
418   }
419   if (fp->_flags & __SMBF) free(fp->_bf._base);
420   if (HASUB(fp)) FREEUB(fp);
421   free_fgetln_buffer(fp);
422 
423   // If we were created by popen(3), wait for the child.
424   pid_t pid = _EXT(fp)->_popen_pid;
425   if (pid > 0) {
426     int status;
427     if (TEMP_FAILURE_RETRY(wait4(pid, &status, 0, nullptr)) != -1) {
428       r = status;
429     }
430   }
431   _EXT(fp)->_popen_pid = 0;
432 
433   // Poison this FILE so accesses after fclose will be obvious.
434   fp->_file = -1;
435   fp->_r = fp->_w = 0;
436 
437   // Release this FILE for reuse.
438   fp->_flags = 0;
439   return r;
440 }
441 
fclose(FILE * fp)442 int fclose(FILE* fp) {
443   CHECK_FP(fp);
444   return __FILE_close(fp);
445 }
446 
fileno_unlocked(FILE * fp)447 int fileno_unlocked(FILE* fp) {
448   CHECK_FP(fp);
449   int fd = fp->_file;
450   if (fd == -1) {
451     errno = EBADF;
452     return -1;
453   }
454   return fd;
455 }
456 
fileno(FILE * fp)457 int fileno(FILE* fp) {
458   CHECK_FP(fp);
459   ScopedFileLock sfl(fp);
460   return fileno_unlocked(fp);
461 }
462 
clearerr_unlocked(FILE * fp)463 void clearerr_unlocked(FILE* fp) {
464   CHECK_FP(fp);
465   return __sclearerr(fp);
466 }
467 
clearerr(FILE * fp)468 void clearerr(FILE* fp) {
469   CHECK_FP(fp);
470   ScopedFileLock sfl(fp);
471   clearerr_unlocked(fp);
472 }
473 
feof_unlocked(FILE * fp)474 int feof_unlocked(FILE* fp) {
475   CHECK_FP(fp);
476   return ((fp->_flags & __SEOF) != 0);
477 }
478 
feof(FILE * fp)479 int feof(FILE* fp) {
480   CHECK_FP(fp);
481   ScopedFileLock sfl(fp);
482   return feof_unlocked(fp);
483 }
484 
ferror_unlocked(FILE * fp)485 int ferror_unlocked(FILE* fp) {
486   CHECK_FP(fp);
487   return __sferror(fp);
488 }
489 
ferror(FILE * fp)490 int ferror(FILE* fp) {
491   CHECK_FP(fp);
492   ScopedFileLock sfl(fp);
493   return ferror_unlocked(fp);
494 }
495 
__sflush(FILE * fp)496 int __sflush(FILE* fp) {
497   // Flushing a read-only file is a no-op.
498   if ((fp->_flags & __SWR) == 0) return 0;
499 
500   // Flushing a file without a buffer is a no-op.
501   unsigned char* p = fp->_bf._base;
502   if (p == nullptr) return 0;
503 
504   // Set these immediately to avoid problems with longjmp and to allow
505   // exchange buffering (via setvbuf) in user write function.
506   int n = fp->_p - p;
507   fp->_p = p;
508   fp->_w = (fp->_flags & (__SLBF|__SNBF)) ? 0 : fp->_bf._size;
509 
510   while (n > 0) {
511     int written = (*fp->_write)(fp->_cookie, reinterpret_cast<char*>(p), n);
512     if (written <= 0) {
513       fp->_flags |= __SERR;
514       return EOF;
515     }
516     n -= written, p += written;
517   }
518   return 0;
519 }
520 
__sflush_locked(FILE * fp)521 int __sflush_locked(FILE* fp) {
522   ScopedFileLock sfl(fp);
523   return __sflush(fp);
524 }
525 
__sread(void * cookie,char * buf,int n)526 int __sread(void* cookie, char* buf, int n) {
527   FILE* fp = reinterpret_cast<FILE*>(cookie);
528   return TEMP_FAILURE_RETRY(read(fp->_file, buf, n));
529 }
530 
__swrite(void * cookie,const char * buf,int n)531 int __swrite(void* cookie, const char* buf, int n) {
532   FILE* fp = reinterpret_cast<FILE*>(cookie);
533   return TEMP_FAILURE_RETRY(write(fp->_file, buf, n));
534 }
535 
__sseek(void * cookie,fpos_t offset,int whence)536 fpos_t __sseek(void* cookie, fpos_t offset, int whence) {
537   FILE* fp = reinterpret_cast<FILE*>(cookie);
538   return TEMP_FAILURE_RETRY(lseek(fp->_file, offset, whence));
539 }
540 
__sseek64(void * cookie,off64_t offset,int whence)541 off64_t __sseek64(void* cookie, off64_t offset, int whence) {
542   FILE* fp = reinterpret_cast<FILE*>(cookie);
543   return TEMP_FAILURE_RETRY(lseek64(fp->_file, offset, whence));
544 }
545 
__sclose(void * cookie)546 int __sclose(void* cookie) {
547   FILE* fp = reinterpret_cast<FILE*>(cookie);
548   return android_fdsan_close_with_tag(fp->_file, __get_file_tag(fp));
549 }
550 
__seek_unlocked(FILE * fp,off64_t offset,int whence)551 static off64_t __seek_unlocked(FILE* fp, off64_t offset, int whence) {
552   // Use `_seek64` if set, but fall back to `_seek`.
553   if (_EXT(fp)->_seek64 != nullptr) {
554     return (*_EXT(fp)->_seek64)(fp->_cookie, offset, whence);
555   } else if (fp->_seek != nullptr) {
556     off64_t result = (*fp->_seek)(fp->_cookie, offset, whence);
557 #if !defined(__LP64__)
558     // Avoid sign extension if off64_t is larger than off_t.
559     if (result != -1) result &= 0xffffffff;
560 #endif
561     return result;
562   } else {
563     errno = ESPIPE;
564     return -1;
565   }
566 }
567 
__ftello64_unlocked(FILE * fp)568 static off64_t __ftello64_unlocked(FILE* fp) {
569   // Find offset of underlying I/O object, then adjust for buffered bytes.
570   __sflush(fp);  // May adjust seek offset on append stream.
571 
572   off64_t result = __seek_unlocked(fp, 0, SEEK_CUR);
573   if (result == -1) {
574     return -1;
575   }
576 
577   if (fp->_flags & __SRD) {
578     // Reading.  Any unread characters (including
579     // those from ungetc) cause the position to be
580     // smaller than that in the underlying object.
581     result -= fp->_r;
582     if (HASUB(fp)) result -= fp->_ur;
583   } else if (fp->_flags & __SWR && fp->_p != nullptr) {
584     // Writing.  Any buffered characters cause the
585     // position to be greater than that in the
586     // underlying object.
587     result += fp->_p - fp->_bf._base;
588   }
589   return result;
590 }
591 
__fseeko64(FILE * fp,off64_t offset,int whence,int off_t_bits)592 int __fseeko64(FILE* fp, off64_t offset, int whence, int off_t_bits) {
593   ScopedFileLock sfl(fp);
594 
595   // Change any SEEK_CUR to SEEK_SET, and check `whence` argument.
596   // After this, whence is either SEEK_SET or SEEK_END.
597   if (whence == SEEK_CUR) {
598     fpos64_t current_offset = __ftello64_unlocked(fp);
599     if (current_offset == -1) {
600       return -1;
601     }
602     offset += current_offset;
603     whence = SEEK_SET;
604   } else if (whence != SEEK_SET && whence != SEEK_END) {
605     errno = EINVAL;
606     return -1;
607   }
608 
609   // If our caller has a 32-bit interface, refuse to go past a 32-bit file offset.
610   if (off_t_bits == 32 && offset > LONG_MAX) {
611     errno = EOVERFLOW;
612     return -1;
613   }
614 
615   if (fp->_bf._base == nullptr) __smakebuf(fp);
616 
617   // Flush unwritten data and attempt the seek.
618   if (__sflush(fp) || __seek_unlocked(fp, offset, whence) == -1) {
619     return -1;
620   }
621 
622   // Success: clear EOF indicator and discard ungetc() data.
623   if (HASUB(fp)) FREEUB(fp);
624   fp->_p = fp->_bf._base;
625   fp->_r = 0;
626   /* fp->_w = 0; */	/* unnecessary (I think...) */
627   fp->_flags &= ~__SEOF;
628   return 0;
629 }
630 
fseeko(FILE * fp,off_t offset,int whence)631 int fseeko(FILE* fp, off_t offset, int whence) {
632   CHECK_FP(fp);
633   static_assert(sizeof(off_t) == sizeof(long), "sizeof(off_t) != sizeof(long)");
634   return __fseeko64(fp, offset, whence, 8*sizeof(off_t));
635 }
636 __strong_alias(fseek, fseeko);
637 
fseeko64(FILE * fp,off64_t offset,int whence)638 int fseeko64(FILE* fp, off64_t offset, int whence) {
639   CHECK_FP(fp);
640   return __fseeko64(fp, offset, whence, 8*sizeof(off64_t));
641 }
642 
fsetpos(FILE * fp,const fpos_t * pos)643 int fsetpos(FILE* fp, const fpos_t* pos) {
644   CHECK_FP(fp);
645   return fseeko(fp, *pos, SEEK_SET);
646 }
647 
fsetpos64(FILE * fp,const fpos64_t * pos)648 int fsetpos64(FILE* fp, const fpos64_t* pos) {
649   CHECK_FP(fp);
650   return fseeko64(fp, *pos, SEEK_SET);
651 }
652 
ftello(FILE * fp)653 off_t ftello(FILE* fp) {
654   CHECK_FP(fp);
655   static_assert(sizeof(off_t) == sizeof(long), "sizeof(off_t) != sizeof(long)");
656   off64_t result = ftello64(fp);
657   if (result > LONG_MAX) {
658     errno = EOVERFLOW;
659     return -1;
660   }
661   return result;
662 }
663 __strong_alias(ftell, ftello);
664 
ftello64(FILE * fp)665 off64_t ftello64(FILE* fp) {
666   CHECK_FP(fp);
667   ScopedFileLock sfl(fp);
668   return __ftello64_unlocked(fp);
669 }
670 
fgetpos(FILE * fp,fpos_t * pos)671 int fgetpos(FILE* fp, fpos_t* pos) {
672   CHECK_FP(fp);
673   *pos = ftello(fp);
674   return (*pos == -1) ? -1 : 0;
675 }
676 
fgetpos64(FILE * fp,fpos64_t * pos)677 int fgetpos64(FILE* fp, fpos64_t* pos) {
678   CHECK_FP(fp);
679   *pos = ftello64(fp);
680   return (*pos == -1) ? -1 : 0;
681 }
682 
__funopen(const void * cookie,int (* read_fn)(void *,char *,int),int (* write_fn)(void *,const char *,int),int (* close_fn)(void *))683 static FILE* __funopen(const void* cookie,
684                        int (*read_fn)(void*, char*, int),
685                        int (*write_fn)(void*, const char*, int),
686                        int (*close_fn)(void*)) {
687   if (read_fn == nullptr && write_fn == nullptr) {
688     errno = EINVAL;
689     return nullptr;
690   }
691 
692   FILE* fp = __sfp();
693   if (fp == nullptr) return nullptr;
694 
695   if (read_fn != nullptr && write_fn != nullptr) {
696     fp->_flags = __SRW;
697   } else if (read_fn != nullptr) {
698     fp->_flags = __SRD;
699   } else if (write_fn != nullptr) {
700     fp->_flags = __SWR;
701   }
702 
703   fp->_file = -1;
704   fp->_cookie = const_cast<void*>(cookie); // The funopen(3) API is incoherent.
705   fp->_read = read_fn;
706   fp->_write = write_fn;
707   fp->_close = close_fn;
708 
709   return fp;
710 }
711 
funopen(const void * cookie,int (* read_fn)(void *,char *,int),int (* write_fn)(void *,const char *,int),fpos_t (* seek_fn)(void *,fpos_t,int),int (* close_fn)(void *))712 FILE* funopen(const void* cookie,
713               int (*read_fn)(void*, char*, int),
714               int (*write_fn)(void*, const char*, int),
715               fpos_t (*seek_fn)(void*, fpos_t, int),
716               int (*close_fn)(void*)) {
717   FILE* fp = __funopen(cookie, read_fn, write_fn, close_fn);
718   if (fp != nullptr) {
719     fp->_seek = seek_fn;
720   }
721   return fp;
722 }
723 
funopen64(const void * cookie,int (* read_fn)(void *,char *,int),int (* write_fn)(void *,const char *,int),fpos64_t (* seek_fn)(void *,fpos64_t,int),int (* close_fn)(void *))724 FILE* funopen64(const void* cookie,
725                 int (*read_fn)(void*, char*, int),
726                 int (*write_fn)(void*, const char*, int),
727                 fpos64_t (*seek_fn)(void*, fpos64_t, int),
728                 int (*close_fn)(void*)) {
729   FILE* fp = __funopen(cookie, read_fn, write_fn, close_fn);
730   if (fp != nullptr) {
731     _EXT(fp)->_seek64 = seek_fn;
732   }
733   return fp;
734 }
735 
asprintf(char ** s,const char * fmt,...)736 int asprintf(char** s, const char* fmt, ...) {
737   PRINTF_IMPL(vasprintf(s, fmt, ap));
738 }
739 
ctermid(char * s)740 char* ctermid(char* s) {
741   return s ? strcpy(s, _PATH_TTY) : const_cast<char*>(_PATH_TTY);
742 }
743 
dprintf(int fd,const char * fmt,...)744 int dprintf(int fd, const char* fmt, ...) {
745   PRINTF_IMPL(vdprintf(fd, fmt, ap));
746 }
747 
fprintf(FILE * fp,const char * fmt,...)748 int fprintf(FILE* fp, const char* fmt, ...) {
749   CHECK_FP(fp);
750   PRINTF_IMPL(vfprintf(fp, fmt, ap));
751 }
752 
fgetc(FILE * fp)753 int fgetc(FILE* fp) {
754   CHECK_FP(fp);
755   return getc(fp);
756 }
757 
fgetc_unlocked(FILE * fp)758 int fgetc_unlocked(FILE* fp) {
759   CHECK_FP(fp);
760   return getc_unlocked(fp);
761 }
762 
fgets(char * buf,int n,FILE * fp)763 char* fgets(char* buf, int n, FILE* fp) {
764   CHECK_FP(fp);
765   ScopedFileLock sfl(fp);
766   return fgets_unlocked(buf, n, fp);
767 }
768 
769 // Reads at most n-1 characters from the given file.
770 // Stops when a newline has been read, or the count runs out.
771 // Returns first argument, or nullptr if no characters were read.
772 // Does not return nullptr if n == 1.
fgets_unlocked(char * buf,int n,FILE * fp)773 char* fgets_unlocked(char* buf, int n, FILE* fp) {
774   if (n <= 0) __fortify_fatal("fgets: buffer size %d <= 0", n);
775 
776   _SET_ORIENTATION(fp, -1);
777 
778   char* s = buf;
779   n--; // Leave space for NUL.
780   while (n != 0) {
781     // If the buffer is empty, refill it.
782     if (fp->_r <= 0) {
783       if (__srefill(fp)) {
784         // EOF/error: stop with partial or no line.
785         if (s == buf) return nullptr;
786         break;
787       }
788     }
789     size_t len = fp->_r;
790     unsigned char* p = fp->_p;
791 
792     // Scan through at most n bytes of the current buffer,
793     // looking for '\n'.  If found, copy up to and including
794     // newline, and stop.  Otherwise, copy entire chunk and loop.
795     if (len > static_cast<size_t>(n)) len = n;
796     unsigned char* t = static_cast<unsigned char*>(memchr(p, '\n', len));
797     if (t != nullptr) {
798       len = ++t - p;
799       fp->_r -= len;
800       fp->_p = t;
801       memcpy(s, p, len);
802       s[len] = '\0';
803       return buf;
804     }
805     fp->_r -= len;
806     fp->_p += len;
807     memcpy(s, p, len);
808     s += len;
809     n -= len;
810   }
811   *s = '\0';
812   return buf;
813 }
814 
fputc(int c,FILE * fp)815 int fputc(int c, FILE* fp) {
816   CHECK_FP(fp);
817   return putc(c, fp);
818 }
819 
fputc_unlocked(int c,FILE * fp)820 int fputc_unlocked(int c, FILE* fp) {
821   CHECK_FP(fp);
822   return putc_unlocked(c, fp);
823 }
824 
fputs(const char * s,FILE * fp)825 int fputs(const char* s, FILE* fp) {
826   CHECK_FP(fp);
827   ScopedFileLock sfl(fp);
828   return fputs_unlocked(s, fp);
829 }
830 
fputs_unlocked(const char * s,FILE * fp)831 int fputs_unlocked(const char* s, FILE* fp) {
832   CHECK_FP(fp);
833   size_t length = strlen(s);
834   return (fwrite_unlocked(s, 1, length, fp) == length) ? 0 : EOF;
835 }
836 
fscanf(FILE * fp,const char * fmt,...)837 int fscanf(FILE* fp, const char* fmt, ...) {
838   CHECK_FP(fp);
839   PRINTF_IMPL(vfscanf(fp, fmt, ap));
840 }
841 
fwprintf(FILE * fp,const wchar_t * fmt,...)842 int fwprintf(FILE* fp, const wchar_t* fmt, ...) {
843   CHECK_FP(fp);
844   PRINTF_IMPL(vfwprintf(fp, fmt, ap));
845 }
846 
fwscanf(FILE * fp,const wchar_t * fmt,...)847 int fwscanf(FILE* fp, const wchar_t* fmt, ...) {
848   CHECK_FP(fp);
849   PRINTF_IMPL(vfwscanf(fp, fmt, ap));
850 }
851 
getc(FILE * fp)852 int getc(FILE* fp) {
853   CHECK_FP(fp);
854   ScopedFileLock sfl(fp);
855   return getc_unlocked(fp);
856 }
857 
getc_unlocked(FILE * fp)858 int getc_unlocked(FILE* fp) {
859   CHECK_FP(fp);
860   return __sgetc(fp);
861 }
862 
getchar_unlocked()863 int getchar_unlocked() {
864   return getc_unlocked(stdin);
865 }
866 
getchar()867 int getchar() {
868   return getc(stdin);
869 }
870 
getline(char ** buf,size_t * len,FILE * fp)871 ssize_t getline(char** buf, size_t* len, FILE* fp) {
872   CHECK_FP(fp);
873   return getdelim(buf, len, '\n', fp);
874 }
875 
getwc(FILE * fp)876 wint_t getwc(FILE* fp) {
877   CHECK_FP(fp);
878   return fgetwc(fp);
879 }
880 
getwchar()881 wint_t getwchar() {
882   return fgetwc(stdin);
883 }
884 
perror(const char * msg)885 void perror(const char* msg) {
886   if (msg == nullptr) msg = "";
887   fprintf(stderr, "%s%s%m\n", msg, (*msg == '\0') ? "" : ": ");
888 }
889 
printf(const char * fmt,...)890 int printf(const char* fmt, ...) {
891   PRINTF_IMPL(vfprintf(stdout, fmt, ap));
892 }
893 
putc(int c,FILE * fp)894 int putc(int c, FILE* fp) {
895   CHECK_FP(fp);
896   ScopedFileLock sfl(fp);
897   return putc_unlocked(c, fp);
898 }
899 
putc_unlocked(int c,FILE * fp)900 int putc_unlocked(int c, FILE* fp) {
901   CHECK_FP(fp);
902   if (cantwrite(fp)) {
903     errno = EBADF;
904     return EOF;
905   }
906   _SET_ORIENTATION(fp, -1);
907   if (--fp->_w >= 0 || (fp->_w >= fp->_lbfsize && c != '\n')) {
908     return (*fp->_p++ = c);
909   }
910   return (__swbuf(c, fp));
911 }
912 
putchar(int c)913 int putchar(int c) {
914   return putc(c, stdout);
915 }
916 
putchar_unlocked(int c)917 int putchar_unlocked(int c) {
918   return putc_unlocked(c, stdout);
919 }
920 
puts(const char * s)921 int puts(const char* s) {
922   size_t length = strlen(s);
923   ScopedFileLock sfl(stdout);
924   return (fwrite_unlocked(s, 1, length, stdout) == length &&
925           putc_unlocked('\n', stdout) != EOF) ? 0 : EOF;
926 }
927 
putwc(wchar_t wc,FILE * fp)928 wint_t putwc(wchar_t wc, FILE* fp) {
929   CHECK_FP(fp);
930   return fputwc(wc, fp);
931 }
932 
putwchar(wchar_t wc)933 wint_t putwchar(wchar_t wc) {
934   return fputwc(wc, stdout);
935 }
936 
remove(const char * path)937 int remove(const char* path) {
938   if (unlink(path) != -1) return 0;
939   if (errno != EISDIR) return -1;
940   return rmdir(path);
941 }
942 
rewind(FILE * fp)943 void rewind(FILE* fp) {
944   CHECK_FP(fp);
945   ScopedFileLock sfl(fp);
946   fseek(fp, 0, SEEK_SET);
947   clearerr_unlocked(fp);
948 }
949 
scanf(const char * fmt,...)950 int scanf(const char* fmt, ...) {
951   PRINTF_IMPL(vfscanf(stdin, fmt, ap));
952 }
953 
setbuf(FILE * fp,char * buf)954 void setbuf(FILE* fp, char* buf) {
955   CHECK_FP(fp);
956   setbuffer(fp, buf, BUFSIZ);
957 }
958 
setbuffer(FILE * fp,char * buf,int size)959 void setbuffer(FILE* fp, char* buf, int size) {
960   CHECK_FP(fp);
961   setvbuf(fp, buf, buf ? _IOFBF : _IONBF, size);
962 }
963 
setlinebuf(FILE * fp)964 int setlinebuf(FILE* fp) {
965   CHECK_FP(fp);
966   return setvbuf(fp, nullptr, _IOLBF, 0);
967 }
968 
snprintf(char * s,size_t n,const char * fmt,...)969 int snprintf(char* s, size_t n, const char* fmt, ...) {
970   PRINTF_IMPL(vsnprintf(s, n, fmt, ap));
971 }
972 
sprintf(char * s,const char * fmt,...)973 int sprintf(char* s, const char* fmt, ...) {
974   PRINTF_IMPL(vsprintf(s, fmt, ap));
975 }
976 
sscanf(const char * s,const char * fmt,...)977 int sscanf(const char* s, const char* fmt, ...) {
978   PRINTF_IMPL(vsscanf(s, fmt, ap));
979 }
980 
swprintf(wchar_t * s,size_t n,const wchar_t * fmt,...)981 int swprintf(wchar_t* s, size_t n, const wchar_t* fmt, ...) {
982   PRINTF_IMPL(vswprintf(s, n, fmt, ap));
983 }
984 
swscanf(const wchar_t * s,const wchar_t * fmt,...)985 int swscanf(const wchar_t* s, const wchar_t* fmt, ...) {
986   PRINTF_IMPL(vswscanf(s, fmt, ap));
987 }
988 
vfprintf(FILE * fp,const char * fmt,va_list ap)989 int vfprintf(FILE* fp, const char* fmt, va_list ap) {
990   ScopedFileLock sfl(fp);
991   return __vfprintf(fp, fmt, ap);
992 }
993 
vfscanf(FILE * fp,const char * fmt,va_list ap)994 int vfscanf(FILE* fp, const char* fmt, va_list ap) {
995   ScopedFileLock sfl(fp);
996   return __svfscanf(fp, fmt, ap);
997 }
998 
vfwprintf(FILE * fp,const wchar_t * fmt,va_list ap)999 int vfwprintf(FILE* fp, const wchar_t* fmt, va_list ap) {
1000   ScopedFileLock sfl(fp);
1001   return __vfwprintf(fp, fmt, ap);
1002 }
1003 
vfwscanf(FILE * fp,const wchar_t * fmt,va_list ap)1004 int vfwscanf(FILE* fp, const wchar_t* fmt, va_list ap) {
1005   ScopedFileLock sfl(fp);
1006   return __vfwscanf(fp, fmt, ap);
1007 }
1008 
vprintf(const char * fmt,va_list ap)1009 int vprintf(const char* fmt, va_list ap) {
1010   return vfprintf(stdout, fmt, ap);
1011 }
1012 
vscanf(const char * fmt,va_list ap)1013 int vscanf(const char* fmt, va_list ap) {
1014   return vfscanf(stdin, fmt, ap);
1015 }
1016 
vsnprintf(char * s,size_t n,const char * fmt,va_list ap)1017 int vsnprintf(char* s, size_t n, const char* fmt, va_list ap) {
1018   // stdio internals use int rather than size_t.
1019   static_assert(INT_MAX <= SSIZE_MAX, "SSIZE_MAX too large to fit in int");
1020 
1021   __check_count("vsnprintf", "size", n);
1022 
1023   // Stdio internals do not deal correctly with zero length buffer.
1024   char one_byte_buffer[1];
1025   if (n == 0) {
1026     s = one_byte_buffer;
1027     n = 1;
1028   }
1029 
1030   FILE f;
1031   __sfileext fext;
1032   _FILEEXT_SETUP(&f, &fext);
1033   f._file = -1;
1034   f._flags = __SWR | __SSTR;
1035   f._bf._base = f._p = reinterpret_cast<unsigned char*>(s);
1036   f._bf._size = f._w = n - 1;
1037 
1038   int result = __vfprintf(&f, fmt, ap);
1039   *f._p = '\0';
1040   return result;
1041 }
1042 
vsprintf(char * s,const char * fmt,va_list ap)1043 int vsprintf(char* s, const char* fmt, va_list ap) {
1044   return vsnprintf(s, SSIZE_MAX, fmt, ap);
1045 }
1046 
vwprintf(const wchar_t * fmt,va_list ap)1047 int vwprintf(const wchar_t* fmt, va_list ap) {
1048   return vfwprintf(stdout, fmt, ap);
1049 }
1050 
vwscanf(const wchar_t * fmt,va_list ap)1051 int vwscanf(const wchar_t* fmt, va_list ap) {
1052   return vfwscanf(stdin, fmt, ap);
1053 }
1054 
wprintf(const wchar_t * fmt,...)1055 int wprintf(const wchar_t* fmt, ...) {
1056   PRINTF_IMPL(vfwprintf(stdout, fmt, ap));
1057 }
1058 
wscanf(const wchar_t * fmt,...)1059 int wscanf(const wchar_t* fmt, ...) {
1060   PRINTF_IMPL(vfwscanf(stdin, fmt, ap));
1061 }
1062 
fflush_all()1063 static int fflush_all() {
1064   return _fwalk(__sflush_locked);
1065 }
1066 
fflush(FILE * fp)1067 int fflush(FILE* fp) {
1068   if (fp == nullptr) return fflush_all();
1069   ScopedFileLock sfl(fp);
1070   return fflush_unlocked(fp);
1071 }
1072 
fflush_unlocked(FILE * fp)1073 int fflush_unlocked(FILE* fp) {
1074   if (fp == nullptr) return fflush_all();
1075   if ((fp->_flags & (__SWR | __SRW)) == 0) {
1076     errno = EBADF;
1077     return EOF;
1078   }
1079   return __sflush(fp);
1080 }
1081 
fread(void * buf,size_t size,size_t count,FILE * fp)1082 size_t fread(void* buf, size_t size, size_t count, FILE* fp) {
1083   CHECK_FP(fp);
1084   ScopedFileLock sfl(fp);
1085   return fread_unlocked(buf, size, count, fp);
1086 }
1087 
fread_unlocked(void * buf,size_t size,size_t count,FILE * fp)1088 size_t fread_unlocked(void* buf, size_t size, size_t count, FILE* fp) {
1089   CHECK_FP(fp);
1090 
1091   size_t desired_total;
1092   if (__builtin_mul_overflow(size, count, &desired_total)) {
1093     errno = EOVERFLOW;
1094     fp->_flags |= __SERR;
1095     return 0;
1096   }
1097 
1098   size_t total = desired_total;
1099   if (total == 0) return 0;
1100 
1101   _SET_ORIENTATION(fp, -1);
1102 
1103   // TODO: how can this ever happen?!
1104   if (fp->_r < 0) fp->_r = 0;
1105 
1106   // Ensure _bf._size is valid.
1107   if (fp->_bf._base == nullptr) __smakebuf(fp);
1108 
1109   char* dst = static_cast<char*>(buf);
1110 
1111   while (total > 0) {
1112     // Copy data out of the buffer.
1113     size_t buffered_bytes = MIN(static_cast<size_t>(fp->_r), total);
1114     memcpy(dst, fp->_p, buffered_bytes);
1115     fp->_p += buffered_bytes;
1116     fp->_r -= buffered_bytes;
1117     dst += buffered_bytes;
1118     total -= buffered_bytes;
1119 
1120     // Are we done?
1121     if (total == 0) goto out;
1122 
1123     // Do we have so much more to read that we should avoid copying it through the buffer?
1124     if (total > static_cast<size_t>(fp->_bf._size)) break;
1125 
1126     // Less than a buffer to go, so refill the buffer and go around the loop again.
1127     if (__srefill(fp)) goto out;
1128   }
1129 
1130   // Read directly into the caller's buffer.
1131   while (total > 0) {
1132     // The _read function pointer takes an int instead of a size_t.
1133     int chunk_size = MIN(total, INT_MAX);
1134     ssize_t bytes_read = (*fp->_read)(fp->_cookie, dst, chunk_size);
1135     if (bytes_read <= 0) {
1136       fp->_flags |= (bytes_read == 0) ? __SEOF : __SERR;
1137       break;
1138     }
1139     dst += bytes_read;
1140     total -= bytes_read;
1141   }
1142 
1143 out:
1144   return ((desired_total - total) / size);
1145 }
1146 
fwrite(const void * buf,size_t size,size_t count,FILE * fp)1147 size_t fwrite(const void* buf, size_t size, size_t count, FILE* fp) {
1148   CHECK_FP(fp);
1149   ScopedFileLock sfl(fp);
1150   return fwrite_unlocked(buf, size, count, fp);
1151 }
1152 
fwrite_unlocked(const void * buf,size_t size,size_t count,FILE * fp)1153 size_t fwrite_unlocked(const void* buf, size_t size, size_t count, FILE* fp) {
1154   CHECK_FP(fp);
1155 
1156   size_t n;
1157   if (__builtin_mul_overflow(size, count, &n)) {
1158     errno = EOVERFLOW;
1159     fp->_flags |= __SERR;
1160     return 0;
1161   }
1162 
1163   if (n == 0) return 0;
1164 
1165   __siov iov = { .iov_base = const_cast<void*>(buf), .iov_len = n };
1166   __suio uio = { .uio_iov = &iov, .uio_iovcnt = 1, .uio_resid = n };
1167 
1168   _SET_ORIENTATION(fp, -1);
1169 
1170   // The usual case is success (__sfvwrite returns 0); skip the divide if this happens,
1171   // since divides are generally slow.
1172   return (__sfvwrite(fp, &uio) == 0) ? count : ((n - uio.uio_resid) / size);
1173 }
1174 
__popen_fail(int fds[2])1175 static FILE* __popen_fail(int fds[2]) {
1176   ErrnoRestorer errno_restorer;
1177   close(fds[0]);
1178   close(fds[1]);
1179   return nullptr;
1180 }
1181 
popen(const char * cmd,const char * mode)1182 FILE* popen(const char* cmd, const char* mode) {
1183   // Was the request for a socketpair or just a pipe?
1184   int fds[2];
1185   bool bidirectional = false;
1186   if (strchr(mode, '+') != nullptr) {
1187     if (socketpair(AF_LOCAL, SOCK_CLOEXEC | SOCK_STREAM, 0, fds) == -1) return nullptr;
1188     bidirectional = true;
1189     mode = "r+";
1190   } else {
1191     if (pipe2(fds, O_CLOEXEC) == -1) return nullptr;
1192     mode = strrchr(mode, 'r') ? "r" : "w";
1193   }
1194 
1195   // If the parent wants to read, the child's fd needs to be stdout.
1196   int parent, child, desired_child_fd;
1197   if (*mode == 'r') {
1198     parent = 0;
1199     child = 1;
1200     desired_child_fd = STDOUT_FILENO;
1201   } else {
1202     parent = 1;
1203     child = 0;
1204     desired_child_fd = STDIN_FILENO;
1205   }
1206 
1207   // Ensure that the child fd isn't the desired child fd.
1208   if (fds[child] == desired_child_fd) {
1209     int new_fd = fcntl(fds[child], F_DUPFD_CLOEXEC, 0);
1210     if (new_fd == -1) return __popen_fail(fds);
1211     close(fds[child]);
1212     fds[child] = new_fd;
1213   }
1214 
1215   pid_t pid = vfork();
1216   if (pid == -1) return __popen_fail(fds);
1217 
1218   if (pid == 0) {
1219     close(fds[parent]);
1220     // dup2 so that the child fd isn't closed on exec.
1221     if (dup2(fds[child], desired_child_fd) == -1) _exit(127);
1222     close(fds[child]);
1223     if (bidirectional) dup2(STDOUT_FILENO, STDIN_FILENO);
1224     execl(__bionic_get_shell_path(), "sh", "-c", "--", cmd, nullptr);
1225     _exit(127);
1226   }
1227 
1228   FILE* fp = fdopen(fds[parent], mode);
1229   if (fp == nullptr) return __popen_fail(fds);
1230 
1231   close(fds[child]);
1232 
1233   _EXT(fp)->_popen_pid = pid;
1234   return fp;
1235 }
1236 
pclose(FILE * fp)1237 int pclose(FILE* fp) {
1238   CHECK_FP(fp);
1239   return __FILE_close(fp);
1240 }
1241 
flockfile(FILE * fp)1242 void flockfile(FILE* fp) {
1243   CHECK_FP(fp);
1244   pthread_mutex_lock(&_EXT(fp)->_lock);
1245 }
1246 
ftrylockfile(FILE * fp)1247 int ftrylockfile(FILE* fp) {
1248   CHECK_FP(fp);
1249   // The specification for ftrylockfile() says it returns 0 on success,
1250   // or non-zero on error. We don't bother canonicalizing to 0/-1...
1251   return pthread_mutex_trylock(&_EXT(fp)->_lock);
1252 }
1253 
funlockfile(FILE * fp)1254 void funlockfile(FILE* fp) {
1255   CHECK_FP(fp);
1256   pthread_mutex_unlock(&_EXT(fp)->_lock);
1257 }
1258 
1259 namespace {
1260 
1261 namespace phony {
1262 #include <bits/struct_file.h>
1263 }
1264 
1265 static_assert(sizeof(::__sFILE) == sizeof(phony::__sFILE),
1266               "size mismatch between `struct __sFILE` implementation and public stub");
1267 static_assert(alignof(::__sFILE) == alignof(phony::__sFILE),
1268               "alignment mismatch between `struct __sFILE` implementation and public stub");
1269 
1270 }
1271