2016-05-03 22:18:24 +00:00
|
|
|
// Wide character equivalents of various standard unix functions.
|
2005-09-20 13:26:39 +00:00
|
|
|
#include "config.h"
|
|
|
|
|
2016-05-03 22:18:24 +00:00
|
|
|
#include <assert.h>
|
|
|
|
#include <dirent.h>
|
2005-09-20 13:26:39 +00:00
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
2006-06-14 13:22:40 +00:00
|
|
|
#include <libgen.h>
|
2016-05-03 22:18:24 +00:00
|
|
|
#include <limits.h>
|
2012-02-17 23:55:54 +00:00
|
|
|
#include <pthread.h>
|
2016-05-03 22:18:24 +00:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <wchar.h>
|
2012-02-24 20:13:35 +00:00
|
|
|
#include <map>
|
2016-04-21 06:00:54 +00:00
|
|
|
#include <memory>
|
2016-05-03 22:18:24 +00:00
|
|
|
#include <string>
|
2006-02-28 13:17:16 +00:00
|
|
|
|
2005-09-20 13:26:39 +00:00
|
|
|
#include "common.h"
|
2016-04-21 06:00:54 +00:00
|
|
|
#include "fallback.h" // IWYU pragma: keep
|
2016-05-03 22:18:24 +00:00
|
|
|
#include "wutil.h" // IWYU pragma: keep
|
2005-09-20 13:26:39 +00:00
|
|
|
|
2016-04-03 05:19:44 +00:00
|
|
|
const file_id_t kInvalidFileID = {(dev_t)-1LL, (ino_t)-1LL, (uint64_t)-1LL, -1, -1, -1, -1};
|
2014-04-27 20:34:51 +00:00
|
|
|
|
2006-02-02 15:23:56 +00:00
|
|
|
#ifndef PATH_MAX
|
|
|
|
#ifdef MAXPATHLEN
|
|
|
|
#define PATH_MAX MAXPATHLEN
|
|
|
|
#else
|
2016-09-10 21:38:28 +00:00
|
|
|
#define PATH_MAX 4096 // Fallback length of MAXPATHLEN. Hopefully a sane value.
|
2006-02-02 15:23:56 +00:00
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
2016-05-03 22:18:24 +00:00
|
|
|
/// Map used as cache by wgettext.
|
2016-03-18 22:14:16 +00:00
|
|
|
typedef std::map<wcstring, wcstring> wgettext_map_t;
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Lock to protect wgettext.
|
|
|
|
static pthread_mutex_t wgettext_lock;
|
2015-07-25 23:01:43 +00:00
|
|
|
static wgettext_map_t wgettext_map;
|
2006-07-19 22:55:49 +00:00
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Wide character version of fopen(). This sets CLO_EXEC.
|
|
|
|
FILE *wfopen(const wcstring &path, const char *mode) {
|
|
|
|
int permissions = 0, options = 0;
|
|
|
|
size_t idx = 0;
|
|
|
|
switch (mode[idx++]) {
|
|
|
|
case 'r': {
|
|
|
|
permissions = O_RDONLY;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case 'w': {
|
|
|
|
permissions = O_WRONLY;
|
|
|
|
options = O_CREAT | O_TRUNC;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case 'a': {
|
|
|
|
permissions = O_WRONLY;
|
|
|
|
options = O_CREAT | O_APPEND;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default: {
|
|
|
|
errno = EINVAL;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Skip binary.
|
|
|
|
if (mode[idx] == 'b') idx++;
|
|
|
|
|
|
|
|
// Consider append option.
|
|
|
|
if (mode[idx] == '+') permissions = O_RDWR;
|
|
|
|
|
|
|
|
int fd = wopen_cloexec(path, permissions | options, 0666);
|
|
|
|
if (fd < 0) return NULL;
|
|
|
|
FILE *result = fdopen(fd, mode);
|
|
|
|
if (result == NULL) close(fd);
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool set_cloexec(int fd) {
|
|
|
|
int flags = fcntl(fd, F_GETFD, 0);
|
|
|
|
if (flags < 0) {
|
|
|
|
return false;
|
|
|
|
} else if (flags & FD_CLOEXEC) {
|
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
return fcntl(fd, F_SETFD, flags | FD_CLOEXEC) >= 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int wopen_internal(const wcstring &pathname, int flags, mode_t mode, bool cloexec) {
|
|
|
|
ASSERT_IS_NOT_FORKED_CHILD();
|
|
|
|
std::string tmp = wcs2string(pathname);
|
|
|
|
int fd;
|
|
|
|
|
|
|
|
#ifdef O_CLOEXEC
|
|
|
|
// Prefer to use O_CLOEXEC. It has to both be defined and nonzero.
|
|
|
|
if (cloexec) {
|
|
|
|
fd = open(tmp.c_str(), flags | O_CLOEXEC, mode);
|
|
|
|
} else {
|
|
|
|
fd = open(tmp.c_str(), flags, mode);
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
fd = open(tmp.c_str(), flags, mode);
|
|
|
|
if (fd >= 0 && !set_cloexec(fd)) {
|
|
|
|
close(fd);
|
|
|
|
fd = -1;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Wide character version of open() that also sets the close-on-exec flag (atomically when
|
|
|
|
/// possible).
|
|
|
|
int wopen_cloexec(const wcstring &pathname, int flags, mode_t mode) {
|
|
|
|
return wopen_internal(pathname, flags, mode, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool wreaddir_resolving(DIR *dir, const wcstring &dir_path, wcstring &out_name, bool *out_is_dir) {
|
|
|
|
struct dirent *d = readdir(dir); if (!d) return false;
|
2012-11-18 10:23:22 +00:00
|
|
|
|
2012-02-20 10:13:31 +00:00
|
|
|
out_name = str2wcstring(d->d_name);
|
2016-05-03 22:18:24 +00:00
|
|
|
if (out_is_dir) {
|
|
|
|
// The caller cares if this is a directory, so check.
|
2014-07-07 09:45:30 +00:00
|
|
|
bool is_dir = false;
|
2016-05-03 22:18:24 +00:00
|
|
|
|
|
|
|
// We may be able to skip stat, if the readdir can tell us the file type directly.
|
2014-07-07 09:45:30 +00:00
|
|
|
bool check_with_stat = true;
|
2014-12-11 07:24:42 +00:00
|
|
|
#ifdef HAVE_STRUCT_DIRENT_D_TYPE
|
2016-05-03 22:18:24 +00:00
|
|
|
if (d->d_type == DT_DIR) {
|
|
|
|
// Known directory.
|
2012-02-20 10:13:31 +00:00
|
|
|
is_dir = true;
|
2014-07-07 09:45:30 +00:00
|
|
|
check_with_stat = false;
|
2016-05-03 22:18:24 +00:00
|
|
|
} else if (d->d_type == DT_LNK || d->d_type == DT_UNKNOWN) {
|
|
|
|
// We want to treat symlinks to directories as directories. Use stat to resolve it.
|
2014-07-07 09:45:30 +00:00
|
|
|
check_with_stat = true;
|
2016-05-03 22:18:24 +00:00
|
|
|
} else {
|
|
|
|
// Regular file.
|
2014-07-07 09:45:30 +00:00
|
|
|
is_dir = false;
|
|
|
|
check_with_stat = false;
|
|
|
|
}
|
2016-05-03 22:18:24 +00:00
|
|
|
#endif // HAVE_STRUCT_DIRENT_D_TYPE
|
|
|
|
if (check_with_stat) {
|
|
|
|
// We couldn't determine the file type from the dirent; check by stat'ing it.
|
2016-09-10 21:38:28 +00:00
|
|
|
std::string fullpath = wcs2string(dir_path);
|
2012-02-20 10:13:31 +00:00
|
|
|
fullpath.push_back('/');
|
|
|
|
fullpath.append(d->d_name);
|
|
|
|
struct stat buf;
|
2016-05-03 22:18:24 +00:00
|
|
|
if (stat(fullpath.c_str(), &buf) != 0) {
|
2012-02-20 10:13:31 +00:00
|
|
|
is_dir = false;
|
2016-05-03 22:18:24 +00:00
|
|
|
} else {
|
2012-11-19 00:30:30 +00:00
|
|
|
is_dir = !!(S_ISDIR(buf.st_mode));
|
|
|
|
}
|
|
|
|
}
|
2012-02-20 10:13:31 +00:00
|
|
|
*out_is_dir = is_dir;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Wide-character version of readdir()
|
|
|
|
bool wreaddir(DIR *dir, wcstring &out_name) {
|
2012-11-19 00:30:30 +00:00
|
|
|
struct dirent *d = readdir(dir);
|
|
|
|
if (!d) return false;
|
2012-11-18 10:23:22 +00:00
|
|
|
|
2012-02-20 10:13:31 +00:00
|
|
|
out_name = str2wcstring(d->d_name);
|
2012-02-18 02:08:08 +00:00
|
|
|
return true;
|
2005-09-20 13:26:39 +00:00
|
|
|
}
|
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Like wreaddir, but skip items that are known to not be directories. If this requires a stat
|
|
|
|
/// (i.e. the file is a symlink), then return it. Note that this does not guarantee that everything
|
|
|
|
/// returned is a directory, it's just an optimization for cases where we would check for
|
|
|
|
/// directories anyways.
|
2016-05-03 22:18:24 +00:00
|
|
|
bool wreaddir_for_dirs(DIR *dir, wcstring *out_name) {
|
2015-08-08 21:52:04 +00:00
|
|
|
struct dirent *result = NULL;
|
2016-05-03 22:18:24 +00:00
|
|
|
while (result == NULL) {
|
2015-08-08 21:52:04 +00:00
|
|
|
struct dirent *d = readdir(dir);
|
|
|
|
if (!d) break;
|
2016-05-03 22:18:24 +00:00
|
|
|
|
2015-08-08 21:52:04 +00:00
|
|
|
#if HAVE_STRUCT_DIRENT_D_TYPE
|
2016-05-03 22:18:24 +00:00
|
|
|
switch (d->d_type) {
|
2015-08-08 21:52:04 +00:00
|
|
|
case DT_DIR:
|
|
|
|
case DT_LNK:
|
2016-05-03 22:18:24 +00:00
|
|
|
case DT_UNKNOWN: {
|
|
|
|
// These may be directories.
|
2015-08-08 21:52:04 +00:00
|
|
|
result = d;
|
|
|
|
break;
|
2016-05-03 22:18:24 +00:00
|
|
|
}
|
|
|
|
default: {
|
|
|
|
// Nothing else can.
|
2015-08-08 21:52:04 +00:00
|
|
|
break;
|
2016-05-03 22:18:24 +00:00
|
|
|
}
|
2015-08-08 21:52:04 +00:00
|
|
|
}
|
|
|
|
#else
|
2016-05-03 22:18:24 +00:00
|
|
|
// We can't determine if it's a directory or not, so just return it.
|
2015-08-08 21:52:04 +00:00
|
|
|
result = d;
|
|
|
|
#endif
|
|
|
|
}
|
2016-05-03 22:18:24 +00:00
|
|
|
if (result && out_name) {
|
2015-08-08 21:52:04 +00:00
|
|
|
*out_name = str2wcstring(result->d_name);
|
|
|
|
}
|
|
|
|
return result != NULL;
|
|
|
|
}
|
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Wide character version of getcwd().
|
2016-05-03 22:18:24 +00:00
|
|
|
const wcstring wgetcwd() {
|
2016-03-11 02:17:39 +00:00
|
|
|
wcstring retval;
|
2012-11-19 00:30:30 +00:00
|
|
|
|
2016-03-11 02:17:39 +00:00
|
|
|
char *res = getcwd(NULL, 0);
|
2016-05-03 22:18:24 +00:00
|
|
|
if (res) {
|
2016-03-11 02:17:39 +00:00
|
|
|
retval = str2wcstring(res);
|
|
|
|
free(res);
|
2016-05-03 22:18:24 +00:00
|
|
|
} else {
|
2016-03-11 02:17:39 +00:00
|
|
|
debug(0, _(L"getcwd() failed with errno %d/%s"), errno, strerror(errno));
|
|
|
|
retval = wcstring();
|
2012-11-19 00:30:30 +00:00
|
|
|
}
|
2012-11-18 10:23:22 +00:00
|
|
|
|
2016-03-11 02:17:39 +00:00
|
|
|
return retval;
|
2005-09-20 13:26:39 +00:00
|
|
|
}
|
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Wide character version of chdir().
|
2016-05-03 22:18:24 +00:00
|
|
|
int wchdir(const wcstring &dir) {
|
2016-09-10 21:38:28 +00:00
|
|
|
std::string tmp = wcs2string(dir);
|
2012-11-19 00:30:30 +00:00
|
|
|
return chdir(tmp.c_str());
|
2005-09-20 13:26:39 +00:00
|
|
|
}
|
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Wide character version of opendir(). Note that opendir() is guaranteed to set close-on-exec by
|
|
|
|
/// POSIX (hooray).
|
2016-05-03 22:18:24 +00:00
|
|
|
DIR *wopendir(const wcstring &name) {
|
2016-09-10 21:38:28 +00:00
|
|
|
const std::string tmp = wcs2string(name);
|
2011-12-27 03:18:46 +00:00
|
|
|
return opendir(tmp.c_str());
|
2005-09-20 13:26:39 +00:00
|
|
|
}
|
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Wide character version of stat().
|
2016-05-03 22:18:24 +00:00
|
|
|
int wstat(const wcstring &file_name, struct stat *buf) {
|
2016-09-10 21:38:28 +00:00
|
|
|
const std::string tmp = wcs2string(file_name);
|
2011-12-27 03:18:46 +00:00
|
|
|
return stat(tmp.c_str(), buf);
|
2005-09-20 13:26:39 +00:00
|
|
|
}
|
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Wide character version of lstat().
|
2016-05-03 22:18:24 +00:00
|
|
|
int lwstat(const wcstring &file_name, struct stat *buf) {
|
2016-09-10 21:38:28 +00:00
|
|
|
const std::string tmp = wcs2string(file_name);
|
2011-12-27 03:18:46 +00:00
|
|
|
return lstat(tmp.c_str(), buf);
|
2005-09-20 13:26:39 +00:00
|
|
|
}
|
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Wide character version of access().
|
2016-05-03 22:18:24 +00:00
|
|
|
int waccess(const wcstring &file_name, int mode) {
|
2016-09-10 21:38:28 +00:00
|
|
|
const std::string tmp = wcs2string(file_name);
|
2011-12-27 03:18:46 +00:00
|
|
|
return access(tmp.c_str(), mode);
|
2005-09-20 13:26:39 +00:00
|
|
|
}
|
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Wide character version of unlink().
|
2016-05-03 22:18:24 +00:00
|
|
|
int wunlink(const wcstring &file_name) {
|
2016-09-10 21:38:28 +00:00
|
|
|
const std::string tmp = wcs2string(file_name);
|
2012-02-16 08:24:27 +00:00
|
|
|
return unlink(tmp.c_str());
|
|
|
|
}
|
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Wide character version of perror().
|
2016-05-03 22:18:24 +00:00
|
|
|
void wperror(const wchar_t *s) {
|
2012-11-19 00:30:30 +00:00
|
|
|
int e = errno;
|
2016-05-03 22:18:24 +00:00
|
|
|
if (s[0] != L'\0') {
|
2014-04-27 20:34:51 +00:00
|
|
|
fwprintf(stderr, L"%ls: ", s);
|
2012-11-19 00:30:30 +00:00
|
|
|
}
|
|
|
|
fwprintf(stderr, L"%s\n", strerror(e));
|
2005-09-20 13:26:39 +00:00
|
|
|
}
|
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Mark an fd as nonblocking; returns errno or 0 on success.
|
2016-05-03 22:18:24 +00:00
|
|
|
int make_fd_nonblocking(int fd) {
|
2013-04-07 19:40:08 +00:00
|
|
|
int flags = fcntl(fd, F_GETFL, 0);
|
|
|
|
int err = 0;
|
2016-06-02 05:03:27 +00:00
|
|
|
bool nonblocking = flags & O_NONBLOCK;
|
|
|
|
if (!nonblocking) {
|
2013-04-07 19:40:08 +00:00
|
|
|
err = fcntl(fd, F_SETFL, flags | O_NONBLOCK);
|
|
|
|
}
|
|
|
|
return err == -1 ? errno : 0;
|
|
|
|
}
|
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Mark an fd as blocking; returns errno or 0 on success.
|
2016-05-03 22:18:24 +00:00
|
|
|
int make_fd_blocking(int fd) {
|
2013-04-07 19:40:08 +00:00
|
|
|
int flags = fcntl(fd, F_GETFL, 0);
|
|
|
|
int err = 0;
|
2016-06-02 05:03:27 +00:00
|
|
|
bool nonblocking = flags & O_NONBLOCK;
|
|
|
|
if (nonblocking) {
|
2013-04-07 19:40:08 +00:00
|
|
|
err = fcntl(fd, F_SETFL, flags & ~O_NONBLOCK);
|
|
|
|
}
|
|
|
|
return err == -1 ? errno : 0;
|
|
|
|
}
|
|
|
|
|
2016-05-03 22:18:24 +00:00
|
|
|
static inline void safe_append(char *buffer, const char *s, size_t buffsize) {
|
2013-01-10 01:06:20 +00:00
|
|
|
strncat(buffer, s, buffsize - strlen(buffer) - 1);
|
|
|
|
}
|
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Async-safe version of strerror().
|
|
|
|
/// In general, strerror is not async-safe, and therefore we cannot use it directly. So instead we
|
|
|
|
/// have to grub through sys_nerr and sys_errlist directly On GNU toolchain, this will produce a
|
|
|
|
/// deprecation warning from the linker (!!), which appears impossible to suppress!
|
|
|
|
/// XXX Use strerror_r instead!
|
2016-05-03 22:18:24 +00:00
|
|
|
const char *safe_strerror(int err) {
|
2013-05-25 20:42:16 +00:00
|
|
|
#if defined(__UCLIBC__)
|
2016-05-03 22:18:24 +00:00
|
|
|
// uClibc does not have sys_errlist, however, its strerror is believed to be async-safe.
|
|
|
|
// See issue #808.
|
2013-05-25 20:42:16 +00:00
|
|
|
return strerror(err);
|
2014-12-08 00:43:38 +00:00
|
|
|
#elif defined(HAVE__SYS__ERRS) || defined(HAVE_SYS_ERRLIST)
|
|
|
|
#ifdef HAVE_SYS_ERRLIST
|
2016-05-03 22:18:24 +00:00
|
|
|
if (err >= 0 && err < sys_nerr && sys_errlist[err] != NULL) {
|
2013-01-10 01:06:20 +00:00
|
|
|
return sys_errlist[err];
|
|
|
|
}
|
2014-12-08 00:43:38 +00:00
|
|
|
#elif defined(HAVE__SYS__ERRS)
|
|
|
|
extern const char _sys_errs[];
|
|
|
|
extern const int _sys_index[];
|
|
|
|
extern int _sys_num_err;
|
|
|
|
|
|
|
|
if (err >= 0 && err < _sys_num_err) {
|
2016-05-03 22:18:24 +00:00
|
|
|
return &_sys_errs[_sys_index[err]];
|
2014-12-08 00:43:38 +00:00
|
|
|
}
|
2016-05-03 22:18:24 +00:00
|
|
|
#endif // either HAVE__SYS__ERRS or HAVE_SYS_ERRLIST
|
|
|
|
#endif // defined(HAVE__SYS__ERRS) || defined(HAVE_SYS_ERRLIST)
|
2013-01-12 20:55:23 +00:00
|
|
|
|
2016-05-04 22:19:47 +00:00
|
|
|
int saved_err = errno;
|
|
|
|
static char buff[384]; // use a shared buffer for this case
|
|
|
|
char errnum_buff[64];
|
|
|
|
format_long_safe(errnum_buff, err);
|
2013-01-12 20:55:23 +00:00
|
|
|
|
2016-05-04 22:19:47 +00:00
|
|
|
buff[0] = '\0';
|
|
|
|
safe_append(buff, "unknown error (errno was ", sizeof buff);
|
|
|
|
safe_append(buff, errnum_buff, sizeof buff);
|
|
|
|
safe_append(buff, ")", sizeof buff);
|
2013-01-12 20:55:23 +00:00
|
|
|
|
2016-05-04 22:19:47 +00:00
|
|
|
errno = saved_err;
|
|
|
|
return buff;
|
2013-01-10 01:06:20 +00:00
|
|
|
}
|
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Async-safe version of perror().
|
2016-05-03 22:18:24 +00:00
|
|
|
void safe_perror(const char *message) {
|
|
|
|
// Note we cannot use strerror, because on Linux it uses gettext, which is not safe.
|
2013-01-10 01:06:20 +00:00
|
|
|
int err = errno;
|
2013-01-12 20:55:23 +00:00
|
|
|
|
2013-01-10 01:06:20 +00:00
|
|
|
char buff[384];
|
|
|
|
buff[0] = '\0';
|
2013-01-12 20:55:23 +00:00
|
|
|
|
2016-05-03 22:18:24 +00:00
|
|
|
if (message) {
|
2013-01-10 01:06:20 +00:00
|
|
|
safe_append(buff, message, sizeof buff);
|
|
|
|
safe_append(buff, ": ", sizeof buff);
|
|
|
|
}
|
|
|
|
safe_append(buff, safe_strerror(err), sizeof buff);
|
|
|
|
safe_append(buff, "\n", sizeof buff);
|
2013-01-12 20:55:23 +00:00
|
|
|
|
2014-04-28 01:27:34 +00:00
|
|
|
write_ignore(STDERR_FILENO, buff, strlen(buff));
|
2013-01-10 01:06:20 +00:00
|
|
|
errno = err;
|
|
|
|
}
|
|
|
|
|
2006-02-02 15:23:56 +00:00
|
|
|
#ifdef HAVE_REALPATH_NULL
|
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Wide character version of realpath function. Just like the GNU version of realpath, wrealpath
|
|
|
|
/// will accept 0 as the value for the second argument, in which case the result will be allocated
|
|
|
|
/// using malloc, and must be free'd by the user.
|
2016-05-03 22:18:24 +00:00
|
|
|
wchar_t *wrealpath(const wcstring &pathname, wchar_t *resolved_path) {
|
2016-09-10 21:38:28 +00:00
|
|
|
std::string narrow_path = wcs2string(pathname);
|
2012-12-19 21:31:06 +00:00
|
|
|
char *narrow_res = realpath(narrow_path.c_str(), NULL);
|
2012-11-19 00:30:30 +00:00
|
|
|
|
2016-05-03 22:18:24 +00:00
|
|
|
if (!narrow_res) return NULL;
|
2012-11-19 00:30:30 +00:00
|
|
|
|
2012-12-19 21:31:06 +00:00
|
|
|
wchar_t *res;
|
|
|
|
wcstring wide_res = str2wcstring(narrow_res);
|
2016-05-03 22:18:24 +00:00
|
|
|
if (resolved_path) {
|
2012-12-19 21:31:06 +00:00
|
|
|
wcslcpy(resolved_path, wide_res.c_str(), PATH_MAX);
|
2012-11-19 00:30:30 +00:00
|
|
|
res = resolved_path;
|
2016-05-03 22:18:24 +00:00
|
|
|
} else {
|
2012-12-19 21:31:06 +00:00
|
|
|
res = wcsdup(wide_res.c_str());
|
2012-11-19 00:30:30 +00:00
|
|
|
}
|
|
|
|
|
2016-05-19 00:46:13 +00:00
|
|
|
#if __APPLE__ && __DARWIN_C_LEVEL < 200809L
|
2016-05-27 21:41:16 +00:00
|
|
|
// OS X Snow Leopard is broken with respect to the dynamically allocated buffer returned by
|
|
|
|
// realpath(). It's not dynamically allocated so attempting to free that buffer triggers a
|
|
|
|
// malloc/free error. Thus we don't attempt the free in this case.
|
2016-05-19 00:46:13 +00:00
|
|
|
#else
|
2012-11-19 00:30:30 +00:00
|
|
|
free(narrow_res);
|
2016-05-19 00:46:13 +00:00
|
|
|
#endif
|
2012-11-19 00:30:30 +00:00
|
|
|
|
|
|
|
return res;
|
2006-02-02 15:23:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#else
|
|
|
|
|
2016-05-03 22:18:24 +00:00
|
|
|
wchar_t *wrealpath(const wcstring &pathname, wchar_t *resolved_path) {
|
2016-09-10 21:38:28 +00:00
|
|
|
std::string tmp = wcs2string(pathname);
|
2012-11-19 00:30:30 +00:00
|
|
|
char narrow_buff[PATH_MAX];
|
|
|
|
char *narrow_res = realpath(tmp.c_str(), narrow_buff);
|
|
|
|
wchar_t *res;
|
|
|
|
|
2016-05-03 22:18:24 +00:00
|
|
|
if (!narrow_res) return 0;
|
2013-01-04 21:09:01 +00:00
|
|
|
|
2012-12-25 04:55:35 +00:00
|
|
|
const wcstring wide_res = str2wcstring(narrow_res);
|
2016-05-03 22:18:24 +00:00
|
|
|
if (resolved_path) {
|
2012-12-25 04:55:35 +00:00
|
|
|
wcslcpy(resolved_path, wide_res.c_str(), PATH_MAX);
|
2012-11-19 00:30:30 +00:00
|
|
|
res = resolved_path;
|
2016-05-03 22:18:24 +00:00
|
|
|
} else {
|
2012-12-25 04:55:35 +00:00
|
|
|
res = wcsdup(wide_res.c_str());
|
2012-11-19 00:30:30 +00:00
|
|
|
}
|
|
|
|
return res;
|
2006-02-02 15:23:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
2006-06-14 13:22:40 +00:00
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Wide character version of dirname().
|
2016-05-03 22:18:24 +00:00
|
|
|
wcstring wdirname(const wcstring &path) {
|
2011-12-27 03:18:46 +00:00
|
|
|
char *tmp = wcs2str(path.c_str());
|
2012-11-19 00:30:30 +00:00
|
|
|
char *narrow_res = dirname(tmp);
|
2011-12-27 03:18:46 +00:00
|
|
|
wcstring result = format_string(L"%s", narrow_res);
|
|
|
|
free(tmp);
|
|
|
|
return result;
|
2006-06-14 13:22:40 +00:00
|
|
|
}
|
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Wide character version of basename().
|
2016-05-03 22:18:24 +00:00
|
|
|
wcstring wbasename(const wcstring &path) {
|
2011-12-27 03:18:46 +00:00
|
|
|
char *tmp = wcs2str(path.c_str());
|
2012-11-19 00:30:30 +00:00
|
|
|
char *narrow_res = basename(tmp);
|
2011-12-27 03:18:46 +00:00
|
|
|
wcstring result = format_string(L"%s", narrow_res);
|
|
|
|
free(tmp);
|
|
|
|
return result;
|
2006-06-14 13:22:40 +00:00
|
|
|
}
|
|
|
|
|
2016-05-03 22:18:24 +00:00
|
|
|
// Really init wgettext.
|
|
|
|
static void wgettext_really_init() {
|
2012-02-24 20:13:35 +00:00
|
|
|
pthread_mutex_init(&wgettext_lock, NULL);
|
2013-04-08 17:20:56 +00:00
|
|
|
fish_bindtextdomain(PACKAGE_NAME, LOCALEDIR);
|
|
|
|
fish_textdomain(PACKAGE_NAME);
|
2006-07-19 22:55:49 +00:00
|
|
|
}
|
|
|
|
|
2016-05-03 22:18:24 +00:00
|
|
|
/// For wgettext: Internal init function. Automatically called when a translation is first
|
|
|
|
/// requested.
|
|
|
|
static void wgettext_init_if_necessary() {
|
2012-02-17 23:55:54 +00:00
|
|
|
static pthread_once_t once = PTHREAD_ONCE_INIT;
|
|
|
|
pthread_once(&once, wgettext_really_init);
|
|
|
|
}
|
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Wide character wrapper around the gettext function. For historic reasons, unlike the real
|
|
|
|
/// gettext function, wgettext takes care of setting the correct domain, etc. using the textdomain
|
|
|
|
/// and bindtextdomain functions. This should probably be moved out of wgettext, so that wgettext
|
|
|
|
/// will be nothing more than a wrapper around gettext, like all other functions in this file.
|
2016-06-02 05:03:27 +00:00
|
|
|
const wcstring &wgettext(const wchar_t *in) {
|
2016-05-03 22:18:24 +00:00
|
|
|
// Preserve errno across this since this is often used in printing error messages.
|
2012-11-19 00:30:30 +00:00
|
|
|
int err = errno;
|
2016-06-02 05:03:27 +00:00
|
|
|
wcstring key = in;
|
2012-11-18 10:23:22 +00:00
|
|
|
|
2012-02-17 23:55:54 +00:00
|
|
|
wgettext_init_if_necessary();
|
2016-07-21 05:30:58 +00:00
|
|
|
scoped_lock locker(wgettext_lock);
|
2016-03-18 22:14:16 +00:00
|
|
|
wcstring &val = wgettext_map[key];
|
2016-05-03 22:18:24 +00:00
|
|
|
if (val.empty()) {
|
2016-09-10 21:38:28 +00:00
|
|
|
std::string mbs_in = wcs2string(key);
|
2013-04-08 17:20:56 +00:00
|
|
|
char *out = fish_gettext(mbs_in.c_str());
|
2016-03-28 01:01:19 +00:00
|
|
|
val = format_string(L"%s", out);
|
2012-02-24 20:13:35 +00:00
|
|
|
}
|
2012-11-19 00:30:30 +00:00
|
|
|
errno = err;
|
2016-03-18 22:14:16 +00:00
|
|
|
|
2016-05-03 22:18:24 +00:00
|
|
|
// The returned string is stored in the map.
|
|
|
|
// TODO: If we want to shrink the map, this would be a problem.
|
2016-06-02 05:03:27 +00:00
|
|
|
return val;
|
2006-07-19 22:55:49 +00:00
|
|
|
}
|
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Wide character version of mkdir.
|
2016-05-03 22:18:24 +00:00
|
|
|
int wmkdir(const wcstring &name, int mode) {
|
2016-09-10 21:38:28 +00:00
|
|
|
std::string name_narrow = wcs2string(name);
|
2012-11-19 00:30:30 +00:00
|
|
|
return mkdir(name_narrow.c_str(), mode);
|
2006-09-08 14:11:28 +00:00
|
|
|
}
|
2006-10-20 22:33:47 +00:00
|
|
|
|
2016-09-10 21:38:28 +00:00
|
|
|
/// Wide character version of rename.
|
2016-05-03 22:18:24 +00:00
|
|
|
int wrename(const wcstring &old, const wcstring &newv) {
|
2016-09-10 21:38:28 +00:00
|
|
|
std::string old_narrow = wcs2string(old);
|
|
|
|
std::string new_narrow = wcs2string(newv);
|
2012-11-19 00:30:30 +00:00
|
|
|
return rename(old_narrow.c_str(), new_narrow.c_str());
|
2006-10-20 22:33:47 +00:00
|
|
|
}
|
2012-08-04 18:07:42 +00:00
|
|
|
|
2016-05-03 22:18:24 +00:00
|
|
|
file_id_t file_id_t::file_id_from_stat(const struct stat *buf) {
|
2014-04-28 22:14:33 +00:00
|
|
|
assert(buf != NULL);
|
2016-05-03 22:18:24 +00:00
|
|
|
|
2014-04-28 22:14:33 +00:00
|
|
|
file_id_t result = {};
|
|
|
|
result.device = buf->st_dev;
|
|
|
|
result.inode = buf->st_ino;
|
|
|
|
result.size = buf->st_size;
|
|
|
|
result.change_seconds = buf->st_ctime;
|
Attempt to fix the sporadic uvar test failures on Linux
We identify when the universal variable file has changed out from under us by
comparing a bunch of fields from its stat: inode, device, size, high-precision
timestamp, generation. Linux aggressively reuses inodes, and the size may be
the same by coincidence (which is the case in the tests). Also, Linux
officially has nanosecond precision, but in practice it seems to only uses
millisecond precision for storing mtimes. Thus if there are three or more
updates within a millisecond, every field we check may be the same, and we are
vulnerable to the ABA problem. I believe this explains the occasional test
failures.
The solution is to manually set the nanosecond field of the mtime timestamp to
something unlikely to be duplicated, like a random number, or better yet, the
current time (with nanosecond precision). This is more in the spirit of the
timestamp, and it means we're around a million times less likely to collide.
This seems to fix the tests.
2015-11-09 07:48:32 +00:00
|
|
|
result.mod_seconds = buf->st_mtime;
|
2016-05-03 22:18:24 +00:00
|
|
|
|
2014-04-28 22:14:33 +00:00
|
|
|
#if STAT_HAVE_NSEC
|
|
|
|
result.change_nanoseconds = buf->st_ctime_nsec;
|
Attempt to fix the sporadic uvar test failures on Linux
We identify when the universal variable file has changed out from under us by
comparing a bunch of fields from its stat: inode, device, size, high-precision
timestamp, generation. Linux aggressively reuses inodes, and the size may be
the same by coincidence (which is the case in the tests). Also, Linux
officially has nanosecond precision, but in practice it seems to only uses
millisecond precision for storing mtimes. Thus if there are three or more
updates within a millisecond, every field we check may be the same, and we are
vulnerable to the ABA problem. I believe this explains the occasional test
failures.
The solution is to manually set the nanosecond field of the mtime timestamp to
something unlikely to be duplicated, like a random number, or better yet, the
current time (with nanosecond precision). This is more in the spirit of the
timestamp, and it means we're around a million times less likely to collide.
This seems to fix the tests.
2015-11-09 07:48:32 +00:00
|
|
|
result.mod_nanoseconds = buf->st_mtime_nsec;
|
2014-04-28 22:14:33 +00:00
|
|
|
#elif defined(__APPLE__)
|
|
|
|
result.change_nanoseconds = buf->st_ctimespec.tv_nsec;
|
Attempt to fix the sporadic uvar test failures on Linux
We identify when the universal variable file has changed out from under us by
comparing a bunch of fields from its stat: inode, device, size, high-precision
timestamp, generation. Linux aggressively reuses inodes, and the size may be
the same by coincidence (which is the case in the tests). Also, Linux
officially has nanosecond precision, but in practice it seems to only uses
millisecond precision for storing mtimes. Thus if there are three or more
updates within a millisecond, every field we check may be the same, and we are
vulnerable to the ABA problem. I believe this explains the occasional test
failures.
The solution is to manually set the nanosecond field of the mtime timestamp to
something unlikely to be duplicated, like a random number, or better yet, the
current time (with nanosecond precision). This is more in the spirit of the
timestamp, and it means we're around a million times less likely to collide.
This seems to fix the tests.
2015-11-09 07:48:32 +00:00
|
|
|
result.mod_nanoseconds = buf->st_mtimespec.tv_nsec;
|
2014-04-28 22:14:33 +00:00
|
|
|
#elif defined(_BSD_SOURCE) || defined(_SVID_SOURCE) || defined(_XOPEN_SOURCE)
|
|
|
|
result.change_nanoseconds = buf->st_ctim.tv_nsec;
|
Attempt to fix the sporadic uvar test failures on Linux
We identify when the universal variable file has changed out from under us by
comparing a bunch of fields from its stat: inode, device, size, high-precision
timestamp, generation. Linux aggressively reuses inodes, and the size may be
the same by coincidence (which is the case in the tests). Also, Linux
officially has nanosecond precision, but in practice it seems to only uses
millisecond precision for storing mtimes. Thus if there are three or more
updates within a millisecond, every field we check may be the same, and we are
vulnerable to the ABA problem. I believe this explains the occasional test
failures.
The solution is to manually set the nanosecond field of the mtime timestamp to
something unlikely to be duplicated, like a random number, or better yet, the
current time (with nanosecond precision). This is more in the spirit of the
timestamp, and it means we're around a million times less likely to collide.
This seems to fix the tests.
2015-11-09 07:48:32 +00:00
|
|
|
result.mod_nanoseconds = buf->st_mtim.tv_nsec;
|
2014-04-28 22:14:33 +00:00
|
|
|
#else
|
|
|
|
result.change_nanoseconds = 0;
|
Attempt to fix the sporadic uvar test failures on Linux
We identify when the universal variable file has changed out from under us by
comparing a bunch of fields from its stat: inode, device, size, high-precision
timestamp, generation. Linux aggressively reuses inodes, and the size may be
the same by coincidence (which is the case in the tests). Also, Linux
officially has nanosecond precision, but in practice it seems to only uses
millisecond precision for storing mtimes. Thus if there are three or more
updates within a millisecond, every field we check may be the same, and we are
vulnerable to the ABA problem. I believe this explains the occasional test
failures.
The solution is to manually set the nanosecond field of the mtime timestamp to
something unlikely to be duplicated, like a random number, or better yet, the
current time (with nanosecond precision). This is more in the spirit of the
timestamp, and it means we're around a million times less likely to collide.
This seems to fix the tests.
2015-11-09 07:48:32 +00:00
|
|
|
result.mod_nanoseconds = 0;
|
2014-04-28 22:14:33 +00:00
|
|
|
#endif
|
2016-05-03 22:18:24 +00:00
|
|
|
|
2014-04-28 22:14:33 +00:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2016-05-03 22:18:24 +00:00
|
|
|
file_id_t file_id_for_fd(int fd) {
|
2014-04-27 20:34:51 +00:00
|
|
|
file_id_t result = kInvalidFileID;
|
|
|
|
struct stat buf = {};
|
2016-05-03 22:18:24 +00:00
|
|
|
if (0 == fstat(fd, &buf)) {
|
2014-04-28 22:14:33 +00:00
|
|
|
result = file_id_t::file_id_from_stat(&buf);
|
2014-04-27 20:34:51 +00:00
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2016-05-03 22:18:24 +00:00
|
|
|
file_id_t file_id_for_path(const wcstring &path) {
|
2014-04-27 20:34:51 +00:00
|
|
|
file_id_t result = kInvalidFileID;
|
|
|
|
struct stat buf = {};
|
2016-05-03 22:18:24 +00:00
|
|
|
if (0 == wstat(path, &buf)) {
|
2014-04-28 22:14:33 +00:00
|
|
|
result = file_id_t::file_id_from_stat(&buf);
|
2014-04-27 20:34:51 +00:00
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
2014-04-28 22:14:33 +00:00
|
|
|
|
2016-05-03 22:18:24 +00:00
|
|
|
bool file_id_t::operator==(const file_id_t &rhs) const { return this->compare_file_id(rhs) == 0; }
|
2014-04-28 22:14:33 +00:00
|
|
|
|
2016-05-03 22:18:24 +00:00
|
|
|
bool file_id_t::operator!=(const file_id_t &rhs) const { return !(*this == rhs); }
|
2014-04-28 22:14:33 +00:00
|
|
|
|
2016-05-03 22:18:24 +00:00
|
|
|
template <typename T>
|
|
|
|
int compare(T a, T b) {
|
|
|
|
if (a < b) {
|
2014-04-28 22:14:33 +00:00
|
|
|
return -1;
|
2016-05-03 22:18:24 +00:00
|
|
|
} else if (a > b) {
|
2014-04-28 22:14:33 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-05-03 22:18:24 +00:00
|
|
|
int file_id_t::compare_file_id(const file_id_t &rhs) const {
|
|
|
|
// Compare each field, stopping when we get to a non-equal field.
|
2014-04-28 22:14:33 +00:00
|
|
|
int ret = 0;
|
2016-05-03 22:18:24 +00:00
|
|
|
if (!ret) ret = compare(device, rhs.device);
|
|
|
|
if (!ret) ret = compare(inode, rhs.inode);
|
|
|
|
if (!ret) ret = compare(size, rhs.size);
|
|
|
|
if (!ret) ret = compare(change_seconds, rhs.change_seconds);
|
|
|
|
if (!ret) ret = compare(change_nanoseconds, rhs.change_nanoseconds);
|
|
|
|
if (!ret) ret = compare(mod_seconds, rhs.mod_seconds);
|
|
|
|
if (!ret) ret = compare(mod_nanoseconds, rhs.mod_nanoseconds);
|
Attempt to fix the sporadic uvar test failures on Linux
We identify when the universal variable file has changed out from under us by
comparing a bunch of fields from its stat: inode, device, size, high-precision
timestamp, generation. Linux aggressively reuses inodes, and the size may be
the same by coincidence (which is the case in the tests). Also, Linux
officially has nanosecond precision, but in practice it seems to only uses
millisecond precision for storing mtimes. Thus if there are three or more
updates within a millisecond, every field we check may be the same, and we are
vulnerable to the ABA problem. I believe this explains the occasional test
failures.
The solution is to manually set the nanosecond field of the mtime timestamp to
something unlikely to be duplicated, like a random number, or better yet, the
current time (with nanosecond precision). This is more in the spirit of the
timestamp, and it means we're around a million times less likely to collide.
This seems to fix the tests.
2015-11-09 07:48:32 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-05-03 22:18:24 +00:00
|
|
|
bool file_id_t::operator<(const file_id_t &rhs) const { return this->compare_file_id(rhs) < 0; }
|