Home | History | Annotate | Download | only in files
      1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 #include "base/files/file_util.h"
      6 
      7 #include <dirent.h>
      8 #include <errno.h>
      9 #include <fcntl.h>
     10 #include <libgen.h>
     11 #include <limits.h>
     12 #include <stdio.h>
     13 #include <stdlib.h>
     14 #include <string.h>
     15 #include <sys/errno.h>
     16 #include <sys/mman.h>
     17 #include <sys/param.h>
     18 #include <sys/stat.h>
     19 #include <sys/time.h>
     20 #include <sys/types.h>
     21 #include <time.h>
     22 #include <unistd.h>
     23 
     24 #if defined(OS_MACOSX)
     25 #include <AvailabilityMacros.h>
     26 #include "base/mac/foundation_util.h"
     27 #elif !defined(OS_CHROMEOS) && defined(USE_GLIB)
     28 #include <glib.h>  // for g_get_home_dir()
     29 #endif
     30 
     31 #include <fstream>
     32 
     33 #include "base/basictypes.h"
     34 #include "base/files/file_enumerator.h"
     35 #include "base/files/file_path.h"
     36 #include "base/files/scoped_file.h"
     37 #include "base/logging.h"
     38 #include "base/memory/scoped_ptr.h"
     39 #include "base/memory/singleton.h"
     40 #include "base/path_service.h"
     41 #include "base/posix/eintr_wrapper.h"
     42 #include "base/stl_util.h"
     43 #include "base/strings/string_util.h"
     44 #include "base/strings/stringprintf.h"
     45 #include "base/strings/sys_string_conversions.h"
     46 #include "base/strings/utf_string_conversions.h"
     47 #include "base/sys_info.h"
     48 #include "base/threading/thread_restrictions.h"
     49 #include "base/time/time.h"
     50 
     51 #if defined(OS_ANDROID)
     52 #include "base/android/content_uri_utils.h"
     53 #include "base/os_compat_android.h"
     54 #endif
     55 
     56 #if !defined(OS_IOS)
     57 #include <grp.h>
     58 #endif
     59 
     60 namespace base {
     61 
     62 namespace {
     63 
     64 #if defined(OS_BSD) || defined(OS_MACOSX) || defined(OS_NACL)
     65 static int CallStat(const char *path, stat_wrapper_t *sb) {
     66   ThreadRestrictions::AssertIOAllowed();
     67   return stat(path, sb);
     68 }
     69 static int CallLstat(const char *path, stat_wrapper_t *sb) {
     70   ThreadRestrictions::AssertIOAllowed();
     71   return lstat(path, sb);
     72 }
     73 #else  //  defined(OS_BSD) || defined(OS_MACOSX) || defined(OS_NACL)
     74 static int CallStat(const char *path, stat_wrapper_t *sb) {
     75   ThreadRestrictions::AssertIOAllowed();
     76   return stat64(path, sb);
     77 }
     78 static int CallLstat(const char *path, stat_wrapper_t *sb) {
     79   ThreadRestrictions::AssertIOAllowed();
     80   return lstat64(path, sb);
     81 }
     82 #endif  // !(defined(OS_BSD) || defined(OS_MACOSX) || defined(OS_NACL))
     83 
     84 // Helper for NormalizeFilePath(), defined below.
     85 bool RealPath(const FilePath& path, FilePath* real_path) {
     86   ThreadRestrictions::AssertIOAllowed();  // For realpath().
     87   FilePath::CharType buf[PATH_MAX];
     88   if (!realpath(path.value().c_str(), buf))
     89     return false;
     90 
     91   *real_path = FilePath(buf);
     92   return true;
     93 }
     94 
     95 // Helper for VerifyPathControlledByUser.
     96 bool VerifySpecificPathControlledByUser(const FilePath& path,
     97                                         uid_t owner_uid,
     98                                         const std::set<gid_t>& group_gids) {
     99   stat_wrapper_t stat_info;
    100   if (CallLstat(path.value().c_str(), &stat_info) != 0) {
    101     DPLOG(ERROR) << "Failed to get information on path "
    102                  << path.value();
    103     return false;
    104   }
    105 
    106   if (S_ISLNK(stat_info.st_mode)) {
    107     DLOG(ERROR) << "Path " << path.value()
    108                << " is a symbolic link.";
    109     return false;
    110   }
    111 
    112   if (stat_info.st_uid != owner_uid) {
    113     DLOG(ERROR) << "Path " << path.value()
    114                 << " is owned by the wrong user.";
    115     return false;
    116   }
    117 
    118   if ((stat_info.st_mode & S_IWGRP) &&
    119       !ContainsKey(group_gids, stat_info.st_gid)) {
    120     DLOG(ERROR) << "Path " << path.value()
    121                 << " is writable by an unprivileged group.";
    122     return false;
    123   }
    124 
    125   if (stat_info.st_mode & S_IWOTH) {
    126     DLOG(ERROR) << "Path " << path.value()
    127                 << " is writable by any user.";
    128     return false;
    129   }
    130 
    131   return true;
    132 }
    133 
    134 std::string TempFileName() {
    135 #if defined(OS_MACOSX)
    136   return StringPrintf(".%s.XXXXXX", base::mac::BaseBundleID());
    137 #endif
    138 
    139 #if defined(GOOGLE_CHROME_BUILD)
    140   return std::string(".com.google.Chrome.XXXXXX");
    141 #else
    142   return std::string(".org.chromium.Chromium.XXXXXX");
    143 #endif
    144 }
    145 
    146 // Creates and opens a temporary file in |directory|, returning the
    147 // file descriptor. |path| is set to the temporary file path.
    148 // This function does NOT unlink() the file.
    149 int CreateAndOpenFdForTemporaryFile(FilePath directory, FilePath* path) {
    150   ThreadRestrictions::AssertIOAllowed();  // For call to mkstemp().
    151   *path = directory.Append(base::TempFileName());
    152   const std::string& tmpdir_string = path->value();
    153   // this should be OK since mkstemp just replaces characters in place
    154   char* buffer = const_cast<char*>(tmpdir_string.c_str());
    155 
    156   return HANDLE_EINTR(mkstemp(buffer));
    157 }
    158 
    159 #if defined(OS_LINUX)
    160 // Determine if /dev/shm files can be mapped and then mprotect'd PROT_EXEC.
    161 // This depends on the mount options used for /dev/shm, which vary among
    162 // different Linux distributions and possibly local configuration.  It also
    163 // depends on details of kernel--ChromeOS uses the noexec option for /dev/shm
    164 // but its kernel allows mprotect with PROT_EXEC anyway.
    165 bool DetermineDevShmExecutable() {
    166   bool result = false;
    167   FilePath path;
    168 
    169   ScopedFD fd(CreateAndOpenFdForTemporaryFile(FilePath("/dev/shm"), &path));
    170   if (fd.is_valid()) {
    171     DeleteFile(path, false);
    172     long sysconf_result = sysconf(_SC_PAGESIZE);
    173     CHECK_GE(sysconf_result, 0);
    174     size_t pagesize = static_cast<size_t>(sysconf_result);
    175     CHECK_GE(sizeof(pagesize), sizeof(sysconf_result));
    176     void* mapping = mmap(NULL, pagesize, PROT_READ, MAP_SHARED, fd.get(), 0);
    177     if (mapping != MAP_FAILED) {
    178       if (mprotect(mapping, pagesize, PROT_READ | PROT_EXEC) == 0)
    179         result = true;
    180       munmap(mapping, pagesize);
    181     }
    182   }
    183   return result;
    184 }
    185 #endif  // defined(OS_LINUX)
    186 
    187 }  // namespace
    188 
    189 FilePath MakeAbsoluteFilePath(const FilePath& input) {
    190   ThreadRestrictions::AssertIOAllowed();
    191   char full_path[PATH_MAX];
    192   if (realpath(input.value().c_str(), full_path) == NULL)
    193     return FilePath();
    194   return FilePath(full_path);
    195 }
    196 
    197 // TODO(erikkay): The Windows version of this accepts paths like "foo/bar/*"
    198 // which works both with and without the recursive flag.  I'm not sure we need
    199 // that functionality. If not, remove from file_util_win.cc, otherwise add it
    200 // here.
    201 bool DeleteFile(const FilePath& path, bool recursive) {
    202   ThreadRestrictions::AssertIOAllowed();
    203   const char* path_str = path.value().c_str();
    204   stat_wrapper_t file_info;
    205   int test = CallLstat(path_str, &file_info);
    206   if (test != 0) {
    207     // The Windows version defines this condition as success.
    208     bool ret = (errno == ENOENT || errno == ENOTDIR);
    209     return ret;
    210   }
    211   if (!S_ISDIR(file_info.st_mode))
    212     return (unlink(path_str) == 0);
    213   if (!recursive)
    214     return (rmdir(path_str) == 0);
    215 
    216   bool success = true;
    217   std::stack<std::string> directories;
    218   directories.push(path.value());
    219   FileEnumerator traversal(path, true,
    220       FileEnumerator::FILES | FileEnumerator::DIRECTORIES |
    221       FileEnumerator::SHOW_SYM_LINKS);
    222   for (FilePath current = traversal.Next(); success && !current.empty();
    223        current = traversal.Next()) {
    224     if (traversal.GetInfo().IsDirectory())
    225       directories.push(current.value());
    226     else
    227       success = (unlink(current.value().c_str()) == 0);
    228   }
    229 
    230   while (success && !directories.empty()) {
    231     FilePath dir = FilePath(directories.top());
    232     directories.pop();
    233     success = (rmdir(dir.value().c_str()) == 0);
    234   }
    235   return success;
    236 }
    237 
    238 bool ReplaceFile(const FilePath& from_path,
    239                  const FilePath& to_path,
    240                  File::Error* error) {
    241   ThreadRestrictions::AssertIOAllowed();
    242   if (rename(from_path.value().c_str(), to_path.value().c_str()) == 0)
    243     return true;
    244   if (error)
    245     *error = File::OSErrorToFileError(errno);
    246   return false;
    247 }
    248 
    249 bool CopyDirectory(const FilePath& from_path,
    250                    const FilePath& to_path,
    251                    bool recursive) {
    252   ThreadRestrictions::AssertIOAllowed();
    253   // Some old callers of CopyDirectory want it to support wildcards.
    254   // After some discussion, we decided to fix those callers.
    255   // Break loudly here if anyone tries to do this.
    256   DCHECK(to_path.value().find('*') == std::string::npos);
    257   DCHECK(from_path.value().find('*') == std::string::npos);
    258 
    259   if (from_path.value().size() >= PATH_MAX) {
    260     return false;
    261   }
    262 
    263   // This function does not properly handle destinations within the source
    264   FilePath real_to_path = to_path;
    265   if (PathExists(real_to_path)) {
    266     real_to_path = MakeAbsoluteFilePath(real_to_path);
    267     if (real_to_path.empty())
    268       return false;
    269   } else {
    270     real_to_path = MakeAbsoluteFilePath(real_to_path.DirName());
    271     if (real_to_path.empty())
    272       return false;
    273   }
    274   FilePath real_from_path = MakeAbsoluteFilePath(from_path);
    275   if (real_from_path.empty())
    276     return false;
    277   if (real_to_path.value().size() >= real_from_path.value().size() &&
    278       real_to_path.value().compare(0, real_from_path.value().size(),
    279                                    real_from_path.value()) == 0) {
    280     return false;
    281   }
    282 
    283   int traverse_type = FileEnumerator::FILES | FileEnumerator::SHOW_SYM_LINKS;
    284   if (recursive)
    285     traverse_type |= FileEnumerator::DIRECTORIES;
    286   FileEnumerator traversal(from_path, recursive, traverse_type);
    287 
    288   // We have to mimic windows behavior here. |to_path| may not exist yet,
    289   // start the loop with |to_path|.
    290   struct stat from_stat;
    291   FilePath current = from_path;
    292   if (stat(from_path.value().c_str(), &from_stat) < 0) {
    293     DLOG(ERROR) << "CopyDirectory() couldn't stat source directory: "
    294                 << from_path.value() << " errno = " << errno;
    295     return false;
    296   }
    297   struct stat to_path_stat;
    298   FilePath from_path_base = from_path;
    299   if (recursive && stat(to_path.value().c_str(), &to_path_stat) == 0 &&
    300       S_ISDIR(to_path_stat.st_mode)) {
    301     // If the destination already exists and is a directory, then the
    302     // top level of source needs to be copied.
    303     from_path_base = from_path.DirName();
    304   }
    305 
    306   // The Windows version of this function assumes that non-recursive calls
    307   // will always have a directory for from_path.
    308   // TODO(maruel): This is not necessary anymore.
    309   DCHECK(recursive || S_ISDIR(from_stat.st_mode));
    310 
    311   bool success = true;
    312   while (success && !current.empty()) {
    313     // current is the source path, including from_path, so append
    314     // the suffix after from_path to to_path to create the target_path.
    315     FilePath target_path(to_path);
    316     if (from_path_base != current) {
    317       if (!from_path_base.AppendRelativePath(current, &target_path)) {
    318         success = false;
    319         break;
    320       }
    321     }
    322 
    323     if (S_ISDIR(from_stat.st_mode)) {
    324       if (mkdir(target_path.value().c_str(), from_stat.st_mode & 01777) != 0 &&
    325           errno != EEXIST) {
    326         DLOG(ERROR) << "CopyDirectory() couldn't create directory: "
    327                     << target_path.value() << " errno = " << errno;
    328         success = false;
    329       }
    330     } else if (S_ISREG(from_stat.st_mode)) {
    331       if (!CopyFile(current, target_path)) {
    332         DLOG(ERROR) << "CopyDirectory() couldn't create file: "
    333                     << target_path.value();
    334         success = false;
    335       }
    336     } else {
    337       DLOG(WARNING) << "CopyDirectory() skipping non-regular file: "
    338                     << current.value();
    339     }
    340 
    341     current = traversal.Next();
    342     if (!current.empty())
    343       from_stat = traversal.GetInfo().stat();
    344   }
    345 
    346   return success;
    347 }
    348 
    349 bool PathExists(const FilePath& path) {
    350   ThreadRestrictions::AssertIOAllowed();
    351 #if defined(OS_ANDROID)
    352   if (path.IsContentUri()) {
    353     return ContentUriExists(path);
    354   }
    355 #endif
    356   return access(path.value().c_str(), F_OK) == 0;
    357 }
    358 
    359 bool PathIsWritable(const FilePath& path) {
    360   ThreadRestrictions::AssertIOAllowed();
    361   return access(path.value().c_str(), W_OK) == 0;
    362 }
    363 
    364 bool DirectoryExists(const FilePath& path) {
    365   ThreadRestrictions::AssertIOAllowed();
    366   stat_wrapper_t file_info;
    367   if (CallStat(path.value().c_str(), &file_info) == 0)
    368     return S_ISDIR(file_info.st_mode);
    369   return false;
    370 }
    371 
    372 bool ReadFromFD(int fd, char* buffer, size_t bytes) {
    373   size_t total_read = 0;
    374   while (total_read < bytes) {
    375     ssize_t bytes_read =
    376         HANDLE_EINTR(read(fd, buffer + total_read, bytes - total_read));
    377     if (bytes_read <= 0)
    378       break;
    379     total_read += bytes_read;
    380   }
    381   return total_read == bytes;
    382 }
    383 
    384 bool CreateSymbolicLink(const FilePath& target_path,
    385                         const FilePath& symlink_path) {
    386   DCHECK(!symlink_path.empty());
    387   DCHECK(!target_path.empty());
    388   return ::symlink(target_path.value().c_str(),
    389                    symlink_path.value().c_str()) != -1;
    390 }
    391 
    392 bool ReadSymbolicLink(const FilePath& symlink_path, FilePath* target_path) {
    393   DCHECK(!symlink_path.empty());
    394   DCHECK(target_path);
    395   char buf[PATH_MAX];
    396   ssize_t count = ::readlink(symlink_path.value().c_str(), buf, arraysize(buf));
    397 
    398   if (count <= 0) {
    399     target_path->clear();
    400     return false;
    401   }
    402 
    403   *target_path = FilePath(FilePath::StringType(buf, count));
    404   return true;
    405 }
    406 
    407 bool GetPosixFilePermissions(const FilePath& path, int* mode) {
    408   ThreadRestrictions::AssertIOAllowed();
    409   DCHECK(mode);
    410 
    411   stat_wrapper_t file_info;
    412   // Uses stat(), because on symbolic link, lstat() does not return valid
    413   // permission bits in st_mode
    414   if (CallStat(path.value().c_str(), &file_info) != 0)
    415     return false;
    416 
    417   *mode = file_info.st_mode & FILE_PERMISSION_MASK;
    418   return true;
    419 }
    420 
    421 bool SetPosixFilePermissions(const FilePath& path,
    422                              int mode) {
    423   ThreadRestrictions::AssertIOAllowed();
    424   DCHECK((mode & ~FILE_PERMISSION_MASK) == 0);
    425 
    426   // Calls stat() so that we can preserve the higher bits like S_ISGID.
    427   stat_wrapper_t stat_buf;
    428   if (CallStat(path.value().c_str(), &stat_buf) != 0)
    429     return false;
    430 
    431   // Clears the existing permission bits, and adds the new ones.
    432   mode_t updated_mode_bits = stat_buf.st_mode & ~FILE_PERMISSION_MASK;
    433   updated_mode_bits |= mode & FILE_PERMISSION_MASK;
    434 
    435   if (HANDLE_EINTR(chmod(path.value().c_str(), updated_mode_bits)) != 0)
    436     return false;
    437 
    438   return true;
    439 }
    440 
    441 #if !defined(OS_MACOSX)
    442 // This is implemented in file_util_mac.mm for Mac.
    443 bool GetTempDir(FilePath* path) {
    444   const char* tmp = getenv("TMPDIR");
    445   if (tmp) {
    446     *path = FilePath(tmp);
    447   } else {
    448 #if defined(OS_ANDROID)
    449     return PathService::Get(base::DIR_CACHE, path);
    450 #else
    451     *path = FilePath("/tmp");
    452 #endif
    453   }
    454   return true;
    455 }
    456 #endif  // !defined(OS_MACOSX)
    457 
    458 #if !defined(OS_MACOSX)  // Mac implementation is in file_util_mac.mm.
    459 FilePath GetHomeDir() {
    460 #if defined(OS_CHROMEOS)
    461   if (SysInfo::IsRunningOnChromeOS()) {
    462     // On Chrome OS chrome::DIR_USER_DATA is overridden with a primary user
    463     // homedir once it becomes available. Return / as the safe option.
    464     return FilePath("/");
    465   }
    466 #endif
    467 
    468   const char* home_dir = getenv("HOME");
    469   if (home_dir && home_dir[0])
    470     return FilePath(home_dir);
    471 
    472 #if defined(OS_ANDROID)
    473   DLOG(WARNING) << "OS_ANDROID: Home directory lookup not yet implemented.";
    474 #elif defined(USE_GLIB) && !defined(OS_CHROMEOS)
    475   // g_get_home_dir calls getpwent, which can fall through to LDAP calls so
    476   // this may do I/O. However, it should be rare that $HOME is not defined and
    477   // this is typically called from the path service which has no threading
    478   // restrictions. The path service will cache the result which limits the
    479   // badness of blocking on I/O. As a result, we don't have a thread
    480   // restriction here.
    481   home_dir = g_get_home_dir();
    482   if (home_dir && home_dir[0])
    483     return FilePath(home_dir);
    484 #endif
    485 
    486   FilePath rv;
    487   if (GetTempDir(&rv))
    488     return rv;
    489 
    490   // Last resort.
    491   return FilePath("/tmp");
    492 }
    493 #endif  // !defined(OS_MACOSX)
    494 
    495 bool CreateTemporaryFile(FilePath* path) {
    496   ThreadRestrictions::AssertIOAllowed();  // For call to close().
    497   FilePath directory;
    498   if (!GetTempDir(&directory))
    499     return false;
    500   int fd = CreateAndOpenFdForTemporaryFile(directory, path);
    501   if (fd < 0)
    502     return false;
    503   close(fd);
    504   return true;
    505 }
    506 
    507 FILE* CreateAndOpenTemporaryFileInDir(const FilePath& dir, FilePath* path) {
    508   int fd = CreateAndOpenFdForTemporaryFile(dir, path);
    509   if (fd < 0)
    510     return NULL;
    511 
    512   FILE* file = fdopen(fd, "a+");
    513   if (!file)
    514     close(fd);
    515   return file;
    516 }
    517 
    518 bool CreateTemporaryFileInDir(const FilePath& dir, FilePath* temp_file) {
    519   ThreadRestrictions::AssertIOAllowed();  // For call to close().
    520   int fd = CreateAndOpenFdForTemporaryFile(dir, temp_file);
    521   return ((fd >= 0) && !IGNORE_EINTR(close(fd)));
    522 }
    523 
    524 static bool CreateTemporaryDirInDirImpl(const FilePath& base_dir,
    525                                         const FilePath::StringType& name_tmpl,
    526                                         FilePath* new_dir) {
    527   ThreadRestrictions::AssertIOAllowed();  // For call to mkdtemp().
    528   DCHECK(name_tmpl.find("XXXXXX") != FilePath::StringType::npos)
    529       << "Directory name template must contain \"XXXXXX\".";
    530 
    531   FilePath sub_dir = base_dir.Append(name_tmpl);
    532   std::string sub_dir_string = sub_dir.value();
    533 
    534   // this should be OK since mkdtemp just replaces characters in place
    535   char* buffer = const_cast<char*>(sub_dir_string.c_str());
    536   char* dtemp = mkdtemp(buffer);
    537   if (!dtemp) {
    538     DPLOG(ERROR) << "mkdtemp";
    539     return false;
    540   }
    541   *new_dir = FilePath(dtemp);
    542   return true;
    543 }
    544 
    545 bool CreateTemporaryDirInDir(const FilePath& base_dir,
    546                              const FilePath::StringType& prefix,
    547                              FilePath* new_dir) {
    548   FilePath::StringType mkdtemp_template = prefix;
    549   mkdtemp_template.append(FILE_PATH_LITERAL("XXXXXX"));
    550   return CreateTemporaryDirInDirImpl(base_dir, mkdtemp_template, new_dir);
    551 }
    552 
    553 bool CreateNewTempDirectory(const FilePath::StringType& prefix,
    554                             FilePath* new_temp_path) {
    555   FilePath tmpdir;
    556   if (!GetTempDir(&tmpdir))
    557     return false;
    558 
    559   return CreateTemporaryDirInDirImpl(tmpdir, TempFileName(), new_temp_path);
    560 }
    561 
    562 bool CreateDirectoryAndGetError(const FilePath& full_path,
    563                                 File::Error* error) {
    564   ThreadRestrictions::AssertIOAllowed();  // For call to mkdir().
    565   std::vector<FilePath> subpaths;
    566 
    567   // Collect a list of all parent directories.
    568   FilePath last_path = full_path;
    569   subpaths.push_back(full_path);
    570   for (FilePath path = full_path.DirName();
    571        path.value() != last_path.value(); path = path.DirName()) {
    572     subpaths.push_back(path);
    573     last_path = path;
    574   }
    575 
    576   // Iterate through the parents and create the missing ones.
    577   for (std::vector<FilePath>::reverse_iterator i = subpaths.rbegin();
    578        i != subpaths.rend(); ++i) {
    579     if (DirectoryExists(*i))
    580       continue;
    581     if (mkdir(i->value().c_str(), 0700) == 0)
    582       continue;
    583     // Mkdir failed, but it might have failed with EEXIST, or some other error
    584     // due to the the directory appearing out of thin air. This can occur if
    585     // two processes are trying to create the same file system tree at the same
    586     // time. Check to see if it exists and make sure it is a directory.
    587     int saved_errno = errno;
    588     if (!DirectoryExists(*i)) {
    589       if (error)
    590         *error = File::OSErrorToFileError(saved_errno);
    591       return false;
    592     }
    593   }
    594   return true;
    595 }
    596 
    597 bool NormalizeFilePath(const FilePath& path, FilePath* normalized_path) {
    598   FilePath real_path_result;
    599   if (!RealPath(path, &real_path_result))
    600     return false;
    601 
    602   // To be consistant with windows, fail if |real_path_result| is a
    603   // directory.
    604   stat_wrapper_t file_info;
    605   if (CallStat(real_path_result.value().c_str(), &file_info) != 0 ||
    606       S_ISDIR(file_info.st_mode))
    607     return false;
    608 
    609   *normalized_path = real_path_result;
    610   return true;
    611 }
    612 
    613 // TODO(rkc): Refactor GetFileInfo and FileEnumerator to handle symlinks
    614 // correctly. http://code.google.com/p/chromium-os/issues/detail?id=15948
    615 bool IsLink(const FilePath& file_path) {
    616   stat_wrapper_t st;
    617   // If we can't lstat the file, it's safe to assume that the file won't at
    618   // least be a 'followable' link.
    619   if (CallLstat(file_path.value().c_str(), &st) != 0)
    620     return false;
    621 
    622   if (S_ISLNK(st.st_mode))
    623     return true;
    624   else
    625     return false;
    626 }
    627 
    628 bool GetFileInfo(const FilePath& file_path, File::Info* results) {
    629   stat_wrapper_t file_info;
    630 #if defined(OS_ANDROID)
    631   if (file_path.IsContentUri()) {
    632     File file = OpenContentUriForRead(file_path);
    633     if (!file.IsValid())
    634       return false;
    635     return file.GetInfo(results);
    636   } else {
    637 #endif  // defined(OS_ANDROID)
    638     if (CallStat(file_path.value().c_str(), &file_info) != 0)
    639       return false;
    640 #if defined(OS_ANDROID)
    641   }
    642 #endif  // defined(OS_ANDROID)
    643 
    644   results->FromStat(file_info);
    645   return true;
    646 }
    647 
    648 FILE* OpenFile(const FilePath& filename, const char* mode) {
    649   ThreadRestrictions::AssertIOAllowed();
    650   FILE* result = NULL;
    651   do {
    652     result = fopen(filename.value().c_str(), mode);
    653   } while (!result && errno == EINTR);
    654   return result;
    655 }
    656 
    657 // NaCl doesn't implement system calls to open files directly.
    658 #if !defined(OS_NACL)
    659 FILE* FileToFILE(File file, const char* mode) {
    660   FILE* stream = fdopen(file.GetPlatformFile(), mode);
    661   if (stream)
    662     file.TakePlatformFile();
    663   return stream;
    664 }
    665 #endif  // !defined(OS_NACL)
    666 
    667 int ReadFile(const FilePath& filename, char* data, int max_size) {
    668   ThreadRestrictions::AssertIOAllowed();
    669   int fd = HANDLE_EINTR(open(filename.value().c_str(), O_RDONLY));
    670   if (fd < 0)
    671     return -1;
    672 
    673   ssize_t bytes_read = HANDLE_EINTR(read(fd, data, max_size));
    674   if (IGNORE_EINTR(close(fd)) < 0)
    675     return -1;
    676   return bytes_read;
    677 }
    678 
    679 int WriteFile(const FilePath& filename, const char* data, int size) {
    680   ThreadRestrictions::AssertIOAllowed();
    681   int fd = HANDLE_EINTR(creat(filename.value().c_str(), 0640));
    682   if (fd < 0)
    683     return -1;
    684 
    685   int bytes_written = WriteFileDescriptor(fd, data, size);
    686   if (IGNORE_EINTR(close(fd)) < 0)
    687     return -1;
    688   return bytes_written;
    689 }
    690 
    691 int WriteFileDescriptor(const int fd, const char* data, int size) {
    692   // Allow for partial writes.
    693   ssize_t bytes_written_total = 0;
    694   for (ssize_t bytes_written_partial = 0; bytes_written_total < size;
    695        bytes_written_total += bytes_written_partial) {
    696     bytes_written_partial =
    697         HANDLE_EINTR(write(fd, data + bytes_written_total,
    698                            size - bytes_written_total));
    699     if (bytes_written_partial < 0)
    700       return -1;
    701   }
    702 
    703   return bytes_written_total;
    704 }
    705 
    706 int AppendToFile(const FilePath& filename, const char* data, int size) {
    707   ThreadRestrictions::AssertIOAllowed();
    708   int fd = HANDLE_EINTR(open(filename.value().c_str(), O_WRONLY | O_APPEND));
    709   if (fd < 0)
    710     return -1;
    711 
    712   int bytes_written = WriteFileDescriptor(fd, data, size);
    713   if (IGNORE_EINTR(close(fd)) < 0)
    714     return -1;
    715   return bytes_written;
    716 }
    717 
    718 // Gets the current working directory for the process.
    719 bool GetCurrentDirectory(FilePath* dir) {
    720   // getcwd can return ENOENT, which implies it checks against the disk.
    721   ThreadRestrictions::AssertIOAllowed();
    722 
    723   char system_buffer[PATH_MAX] = "";
    724   if (!getcwd(system_buffer, sizeof(system_buffer))) {
    725     NOTREACHED();
    726     return false;
    727   }
    728   *dir = FilePath(system_buffer);
    729   return true;
    730 }
    731 
    732 // Sets the current working directory for the process.
    733 bool SetCurrentDirectory(const FilePath& path) {
    734   ThreadRestrictions::AssertIOAllowed();
    735   int ret = chdir(path.value().c_str());
    736   return !ret;
    737 }
    738 
    739 bool VerifyPathControlledByUser(const FilePath& base,
    740                                 const FilePath& path,
    741                                 uid_t owner_uid,
    742                                 const std::set<gid_t>& group_gids) {
    743   if (base != path && !base.IsParent(path)) {
    744      DLOG(ERROR) << "|base| must be a subdirectory of |path|.  base = \""
    745                  << base.value() << "\", path = \"" << path.value() << "\"";
    746      return false;
    747   }
    748 
    749   std::vector<FilePath::StringType> base_components;
    750   std::vector<FilePath::StringType> path_components;
    751 
    752   base.GetComponents(&base_components);
    753   path.GetComponents(&path_components);
    754 
    755   std::vector<FilePath::StringType>::const_iterator ib, ip;
    756   for (ib = base_components.begin(), ip = path_components.begin();
    757        ib != base_components.end(); ++ib, ++ip) {
    758     // |base| must be a subpath of |path|, so all components should match.
    759     // If these CHECKs fail, look at the test that base is a parent of
    760     // path at the top of this function.
    761     DCHECK(ip != path_components.end());
    762     DCHECK(*ip == *ib);
    763   }
    764 
    765   FilePath current_path = base;
    766   if (!VerifySpecificPathControlledByUser(current_path, owner_uid, group_gids))
    767     return false;
    768 
    769   for (; ip != path_components.end(); ++ip) {
    770     current_path = current_path.Append(*ip);
    771     if (!VerifySpecificPathControlledByUser(
    772             current_path, owner_uid, group_gids))
    773       return false;
    774   }
    775   return true;
    776 }
    777 
    778 #if defined(OS_MACOSX) && !defined(OS_IOS)
    779 bool VerifyPathControlledByAdmin(const FilePath& path) {
    780   const unsigned kRootUid = 0;
    781   const FilePath kFileSystemRoot("/");
    782 
    783   // The name of the administrator group on mac os.
    784   const char* const kAdminGroupNames[] = {
    785     "admin",
    786     "wheel"
    787   };
    788 
    789   // Reading the groups database may touch the file system.
    790   ThreadRestrictions::AssertIOAllowed();
    791 
    792   std::set<gid_t> allowed_group_ids;
    793   for (int i = 0, ie = arraysize(kAdminGroupNames); i < ie; ++i) {
    794     struct group *group_record = getgrnam(kAdminGroupNames[i]);
    795     if (!group_record) {
    796       DPLOG(ERROR) << "Could not get the group ID of group \""
    797                    << kAdminGroupNames[i] << "\".";
    798       continue;
    799     }
    800 
    801     allowed_group_ids.insert(group_record->gr_gid);
    802   }
    803 
    804   return VerifyPathControlledByUser(
    805       kFileSystemRoot, path, kRootUid, allowed_group_ids);
    806 }
    807 #endif  // defined(OS_MACOSX) && !defined(OS_IOS)
    808 
    809 int GetMaximumPathComponentLength(const FilePath& path) {
    810   ThreadRestrictions::AssertIOAllowed();
    811   return pathconf(path.value().c_str(), _PC_NAME_MAX);
    812 }
    813 
    814 #if !defined(OS_ANDROID)
    815 // This is implemented in file_util_android.cc for that platform.
    816 bool GetShmemTempDir(bool executable, FilePath* path) {
    817 #if defined(OS_LINUX)
    818   bool use_dev_shm = true;
    819   if (executable) {
    820     static const bool s_dev_shm_executable = DetermineDevShmExecutable();
    821     use_dev_shm = s_dev_shm_executable;
    822   }
    823   if (use_dev_shm) {
    824     *path = FilePath("/dev/shm");
    825     return true;
    826   }
    827 #endif
    828   return GetTempDir(path);
    829 }
    830 #endif  // !defined(OS_ANDROID)
    831 
    832 // -----------------------------------------------------------------------------
    833 
    834 namespace internal {
    835 
    836 bool MoveUnsafe(const FilePath& from_path, const FilePath& to_path) {
    837   ThreadRestrictions::AssertIOAllowed();
    838   // Windows compatibility: if to_path exists, from_path and to_path
    839   // must be the same type, either both files, or both directories.
    840   stat_wrapper_t to_file_info;
    841   if (CallStat(to_path.value().c_str(), &to_file_info) == 0) {
    842     stat_wrapper_t from_file_info;
    843     if (CallStat(from_path.value().c_str(), &from_file_info) == 0) {
    844       if (S_ISDIR(to_file_info.st_mode) != S_ISDIR(from_file_info.st_mode))
    845         return false;
    846     } else {
    847       return false;
    848     }
    849   }
    850 
    851   if (rename(from_path.value().c_str(), to_path.value().c_str()) == 0)
    852     return true;
    853 
    854   if (!CopyDirectory(from_path, to_path, true))
    855     return false;
    856 
    857   DeleteFile(from_path, true);
    858   return true;
    859 }
    860 
    861 #if !defined(OS_MACOSX)
    862 // Mac has its own implementation, this is for all other Posix systems.
    863 bool CopyFileUnsafe(const FilePath& from_path, const FilePath& to_path) {
    864   ThreadRestrictions::AssertIOAllowed();
    865   int infile = HANDLE_EINTR(open(from_path.value().c_str(), O_RDONLY));
    866   if (infile < 0)
    867     return false;
    868 
    869   int outfile = HANDLE_EINTR(creat(to_path.value().c_str(), 0666));
    870   if (outfile < 0) {
    871     close(infile);
    872     return false;
    873   }
    874 
    875   const size_t kBufferSize = 32768;
    876   std::vector<char> buffer(kBufferSize);
    877   bool result = true;
    878 
    879   while (result) {
    880     ssize_t bytes_read = HANDLE_EINTR(read(infile, &buffer[0], buffer.size()));
    881     if (bytes_read < 0) {
    882       result = false;
    883       break;
    884     }
    885     if (bytes_read == 0)
    886       break;
    887     // Allow for partial writes
    888     ssize_t bytes_written_per_read = 0;
    889     do {
    890       ssize_t bytes_written_partial = HANDLE_EINTR(write(
    891           outfile,
    892           &buffer[bytes_written_per_read],
    893           bytes_read - bytes_written_per_read));
    894       if (bytes_written_partial < 0) {
    895         result = false;
    896         break;
    897       }
    898       bytes_written_per_read += bytes_written_partial;
    899     } while (bytes_written_per_read < bytes_read);
    900   }
    901 
    902   if (IGNORE_EINTR(close(infile)) < 0)
    903     result = false;
    904   if (IGNORE_EINTR(close(outfile)) < 0)
    905     result = false;
    906 
    907   return result;
    908 }
    909 #endif  // !defined(OS_MACOSX)
    910 
    911 }  // namespace internal
    912 }  // namespace base
    913