n = sizeof(out) - s.avail_out;
- k = loop_write(fdt, out, n, false);
+ k = loop_write(fdt, out, n);
if (k < 0)
return k;
"Compressed stream longer than %" PRIu64 " bytes", max_bytes);
if (out_allocsize - offset < frame_size + 4) {
- k = loop_write(fdt, out_buff, offset, false);
+ k = loop_write(fdt, out_buff, offset);
if (k < 0)
return k;
offset = 0;
offset += n;
total_out += n;
- r = loop_write(fdt, out_buff, offset, false);
+ r = loop_write(fdt, out_buff, offset);
if (r < 0)
return r;
max_bytes -= n;
}
- k = loop_write(fdt, out, n, false);
+ k = loop_write(fdt, out, n);
if (k < 0)
return k;
goto cleanup;
}
- r = loop_write(out, buf, produced, false);
+ r = loop_write(out, buf, produced);
if (r < 0)
goto cleanup;
}
if (left < output.pos)
return -EFBIG;
- wrote = loop_write(fdt, output.dst, output.pos, 1);
+ wrote = loop_write_full(fdt, output.dst, output.pos, USEC_INFINITY);
if (wrote < 0)
return wrote;
if (left < output.pos)
return -EFBIG;
- wrote = loop_write(fdt, output.dst, output.pos, 1);
+ wrote = loop_write_full(fdt, output.dst, output.pos, USEC_INFINITY);
if (wrote < 0)
return wrote;
buf->attr = attr;
memcpy(buf->buf, value, size);
- r = loop_write(fd, buf, sizeof(uint32_t) + size, false);
+ r = loop_write(fd, buf, sizeof(uint32_t) + size);
if (r < 0)
goto finish;
#include <stdio.h>
#include <unistd.h>
+#include "errno-util.h"
#include "io-util.h"
#include "string-util.h"
#include "time-util.h"
return 0;
}
-int loop_write(int fd, const void *buf, size_t nbytes, bool do_poll) {
+int loop_write_full(int fd, const void *buf, size_t nbytes, usec_t timeout) {
const uint8_t *p;
+ usec_t end;
+ int r;
assert(fd >= 0);
+ assert(buf || nbytes == 0);
if (nbytes == 0) {
static const dummy_t dummy[0];
assert_cc(sizeof(dummy) == 0);
p = (const void*) dummy; /* Some valid pointer, in case NULL was specified */
} else {
- assert(buf);
-
if (nbytes == SIZE_MAX)
nbytes = strlen(buf);
else if (_unlikely_(nbytes > (size_t) SSIZE_MAX))
p = buf;
}
+ /* When timeout is 0 or USEC_INFINITY this is not used. But we initialize it to a sensible value. */
+ end = timestamp_is_set(timeout) ? usec_add(now(CLOCK_MONOTONIC), timeout) : USEC_INFINITY;
+
do {
ssize_t k;
if (errno == EINTR)
continue;
- if (errno == EAGAIN && do_poll) {
- /* We knowingly ignore any return value here,
- * and expect that any error/EOF is reported
- * via write() */
+ if (errno != EAGAIN || timeout == 0)
+ return -errno;
- (void) fd_wait_for_event(fd, POLLOUT, USEC_INFINITY);
- continue;
+ usec_t wait_for;
+
+ if (timeout == USEC_INFINITY)
+ wait_for = USEC_INFINITY;
+ else {
+ usec_t t = now(CLOCK_MONOTONIC);
+ if (t >= end)
+ return -ETIME;
+
+ wait_for = usec_sub_unsigned(end, t);
}
- return -errno;
+ r = fd_wait_for_event(fd, POLLOUT, wait_for);
+ if (timeout == USEC_INFINITY || ERRNO_IS_NEG_TRANSIENT(r))
+ /* If timeout == USEC_INFINITY we knowingly ignore any return value
+ * here, and expect that any error/EOF is reported via write() */
+ continue;
+ if (r < 0)
+ return r;
+ if (r == 0)
+ return -ETIME;
}
if (_unlikely_(nbytes > 0 && k == 0)) /* Can't really happen */
ssize_t loop_read(int fd, void *buf, size_t nbytes, bool do_poll);
int loop_read_exact(int fd, void *buf, size_t nbytes, bool do_poll);
-int loop_write(int fd, const void *buf, size_t nbytes, bool do_poll);
+
+int loop_write_full(int fd, const void *buf, size_t nbytes, usec_t timeout);
+static inline int loop_write(int fd, const void *buf, size_t nbytes) {
+ return loop_write_full(fd, buf, nbytes, 0);
+}
int pipe_eof(int fd);
if (ioctl(fd, RNDADDENTROPY, info) < 0)
return -errno;
} else {
- r = loop_write(fd, seed, size, false);
+ r = loop_write(fd, seed, size);
if (r < 0)
return r;
}
"\033[r" /* clear scrolling region */
"\033[H" /* move home */
"\033[3J", /* clear screen including scrollback, requires Linux 2.6.40 */
- 10, false);
+ 10);
return 0;
}
xsprintf(cursor_position, "\x1B[%u;%uH", row, column);
- r = loop_write(fd, cursor_position, SIZE_MAX, /* do_poll = */false);
+ r = loop_write(fd, cursor_position, SIZE_MAX);
if (r < 0)
return log_warning_errno(r, "Failed to set cursor position, ignoring: %m");
return log_full_errno(ERRNO_IS_NO_PLYMOUTH(errno) ? LOG_DEBUG : LOG_WARNING, errno,
"Failed to connect to plymouth: %m");
- r = loop_write(fd, plymouth_message, c, /* do_poll = */ false);
+ r = loop_write(fd, plymouth_message, c);
if (r < 0)
return log_full_errno(ERRNO_IS_NO_PLYMOUTH(r) ? LOG_DEBUG : LOG_WARNING, r,
"Failed to write to plymouth: %m");
if (!warned) /* only warn once per seed file */
(void) random_seed_verify_permissions(fd, S_IFREG);
- r = loop_write(fd, buffer, sizeof(buffer), /* do_poll= */ false);
+ r = loop_write(fd, buffer, sizeof(buffer));
if (r < 0) {
log_error_errno(r, "Failed to write random seed file: %m");
goto fail;
return -errno;
}
- r = loop_write(fd, data, size, /* do_poll = */ false);
+ r = loop_write(fd, data, size);
if (r < 0)
return r;
if (nfd < 0)
return nfd;
- r = loop_write(nfd, d, l, /* do_poll= */ false);
+ r = loop_write(nfd, d, l);
if (r < 0) {
(void) unlinkat(c->target_dir_fd, n, 0);
return log_error_errno(r, "Failed to write credential: %m");
if (nfd < 0)
return nfd;
- r = loop_write(nfd, cdata, cdata_len, /* do_poll= */ false);
+ r = loop_write(nfd, cdata, cdata_len);
if (r < 0) {
(void) unlinkat(c->target_dir_fd, cn, 0);
return log_error_errno(r, "Failed to write credential: %m");
if ((size_t) n < sz)
return log_error_errno(SYNTHETIC_ERRNO(EIO), "Short write");
} else {
- r = loop_write(i->output_fd, p, sz, false);
+ r = loop_write(i->output_fd, p, sz);
if (r < 0)
return log_error_errno(r, "Failed to write file: %m");
}
TarImport *i = userdata;
int r;
- r = loop_write(i->tar_fd, p, sz, false);
+ r = loop_write(i->tar_fd, p, sz);
if (r < 0)
return r;
if (sig_file < 0)
return log_error_errno(errno, "Failed to create temporary file: %m");
- r = loop_write(sig_file, signature, signature_size, false);
+ r = loop_write(sig_file, signature, signature_size);
if (r < 0) {
log_error_errno(r, "Failed to write to temporary file: %m");
goto finish;
gpg_pipe[0] = safe_close(gpg_pipe[0]);
- r = loop_write(gpg_pipe[1], payload, payload_size, false);
+ r = loop_write(gpg_pipe[1], payload, payload_size);
if (r < 0) {
log_error_errno(r, "Failed to write to pipe: %m");
goto finish;
if ((size_t) n < sz)
return log_error_errno(SYNTHETIC_ERRNO(EIO), "Short write");
} else {
- r = loop_write(j->disk_fd, p, sz, false);
+ r = loop_write(j->disk_fd, p, sz);
if (r < 0)
return log_error_errno(r, "Failed to write file: %m");
}
if (ioctl(fd, VT_ACTIVATE, free_vt + 1) < 0)
return log_error_errno(errno, "Failed to activate tty: %m");
- r = loop_write(fd, ANSI_BACKGROUND_BLUE ANSI_HOME_CLEAR, SIZE_MAX, /* do_poll = */ false);
+ r = loop_write(fd, ANSI_BACKGROUND_BLUE ANSI_HOME_CLEAR, SIZE_MAX);
if (r < 0)
log_warning_errno(r, "Failed to clear terminal, ignoring: %m");
if (r < 0)
log_warning_errno(r, "Failed to move terminal cursor position, ignoring: %m");
- r = loop_write(fd, "The current boot has failed!", SIZE_MAX, /* do_poll = */false);
+ r = loop_write(fd, "The current boot has failed!", SIZE_MAX);
if (r < 0)
return log_warning_errno(r, "Failed to write to terminal: %m");
if (r < 0)
log_warning_errno(r, "Failed to move terminal cursor position, ignoring: %m");
- r = loop_write(fd, message, SIZE_MAX, /* do_poll = */false);
+ r = loop_write(fd, message, SIZE_MAX);
if (r < 0)
return log_warning_errno(r, "Failed to write emergency message to terminal: %m");
if (r < 0)
log_warning_errno(r, "Failed to move terminal cursor position, ignoring: %m");
- r = loop_write(fd, "Press any key to exit...", SIZE_MAX, /* do_poll = */false);
+ r = loop_write(fd, "Press any key to exit...", SIZE_MAX);
if (r < 0)
return log_warning_errno(r, "Failed to write to terminal: %m");
.fsprg_state_size = htole64(state_size),
};
- r = loop_write(fd, &h, sizeof(h), false);
+ r = loop_write(fd, &h, sizeof(h));
if (r < 0)
return log_error_errno(r, "Failed to write header: %m");
- r = loop_write(fd, state, state_size, false);
+ r = loop_write(fd, state, state_size);
if (r < 0)
return log_error_errno(r, "Failed to write state: %m");
}
buffer[sz - 1] = '\n';
- r = loop_write(fd, buffer, sz, false);
+ r = loop_write(fd, buffer, sz);
if (r < 0)
return r;
header[l++] = '0';
header[l++] = '\n';
- r = loop_write(fd, header, l, false);
+ r = loop_write(fd, header, l);
if (r < 0)
return r;
if (fd < 0)
return log_error_errno(errno, "Failed to create credential file %s: %m", j);
- r = loop_write(fd, arg_credentials[i].data, arg_credentials[i].size, /* do_poll= */ false);
+ r = loop_write(fd, arg_credentials[i].data, arg_credentials[i].size);
if (r < 0)
return log_error_errno(r, "Failed to write credential to file %s: %m", j);
if (lseek(whole_fd, p->offset, SEEK_SET) == (off_t) -1)
return log_error_errno(errno, "Failed to seek to partition %s offset: %m", strna(hint));
- r = loop_write(whole_fd, text, p->new_size, /*do_poll=*/ false);
+ r = loop_write(whole_fd, text, p->new_size);
if (r < 0)
return log_error_errno(r, "Failed to write verity signature to partition %s: %m", strna(hint));
memcpy((uint8_t *)buf + k - l, hash, l);
}
- r = loop_write(seed_fd, buf, (size_t) k, false);
+ r = loop_write(seed_fd, buf, (size_t) k);
if (r < 0)
return log_error_errno(r, "Failed to write new random seed file: %m");
for (size_t i = 0; i < p; i++)
memcpy(buf + 3 * i, "\b \b", 3);
- return loop_write(ttyfd, buf, 3*p, false);
+ return loop_write(ttyfd, buf, 3 * p);
}
static int backspace_string(int ttyfd, const char *str) {
if (!packet)
return -ENOMEM;
- r = loop_write(fd, packet, n + 1, true);
+ r = loop_write_full(fd, packet, n + 1, USEC_INFINITY);
if (r < 0)
return r;
if (asprintf(&packet, "*\002%c%s%n", (int) (strlen(message) + 1), message, &n) < 0)
return -ENOMEM;
- r = loop_write(fd, packet, n+1, true);
+ r = loop_write_full(fd, packet, n + 1, USEC_INFINITY);
if (r < 0)
return r;
use_color = colors_enabled();
if (use_color)
- (void) loop_write(ttyfd, ANSI_HIGHLIGHT, SIZE_MAX, false);
+ (void) loop_write(ttyfd, ANSI_HIGHLIGHT, SIZE_MAX);
- (void) loop_write(ttyfd, message, SIZE_MAX, false);
- (void) loop_write(ttyfd, " ", 1, false);
+ (void) loop_write(ttyfd, message, SIZE_MAX);
+ (void) loop_write(ttyfd, " ", 1);
if (!FLAGS_SET(flags, ASK_PASSWORD_SILENT) && !FLAGS_SET(flags, ASK_PASSWORD_ECHO)) {
if (use_color)
- (void) loop_write(ttyfd, ansi_grey(), SIZE_MAX, false);
- (void) loop_write(ttyfd, PRESS_TAB, SIZE_MAX, false);
+ (void) loop_write(ttyfd, ansi_grey(), SIZE_MAX);
+
+ (void) loop_write(ttyfd, PRESS_TAB, SIZE_MAX);
press_tab_visible = true;
}
if (use_color)
- (void) loop_write(ttyfd, ANSI_NORMAL, SIZE_MAX, false);
+ (void) loop_write(ttyfd, ANSI_NORMAL, SIZE_MAX);
new_termios = old_termios;
new_termios.c_lflag &= ~(ICANON|ECHO);
if (c == 4) { /* C-d also known as EOT */
if (ttyfd >= 0)
- (void) loop_write(ttyfd, SKIPPED, SIZE_MAX, false);
+ (void) loop_write(ttyfd, SKIPPED, SIZE_MAX);
goto skipped;
}
* first key (and only as first key), or ... */
if (ttyfd >= 0)
- (void) loop_write(ttyfd, NO_ECHO, SIZE_MAX, false);
+ (void) loop_write(ttyfd, NO_ECHO, SIZE_MAX);
} else if (ttyfd >= 0)
- (void) loop_write(ttyfd, "\a", 1, false);
+ (void) loop_write(ttyfd, "\a", 1);
} else if (c == '\t' && !FLAGS_SET(flags, ASK_PASSWORD_SILENT)) {
/* ... or by pressing TAB at any time. */
if (ttyfd >= 0)
- (void) loop_write(ttyfd, NO_ECHO, SIZE_MAX, false);
+ (void) loop_write(ttyfd, NO_ECHO, SIZE_MAX);
} else if (p >= sizeof(passphrase)-1) {
/* Reached the size limit */
if (ttyfd >= 0)
- (void) loop_write(ttyfd, "\a", 1, false);
+ (void) loop_write(ttyfd, "\a", 1);
} else {
passphrase[p++] = c;
n = utf8_encoded_valid_unichar(passphrase + codepoint, SIZE_MAX);
if (n >= 0) {
if (FLAGS_SET(flags, ASK_PASSWORD_ECHO))
- (void) loop_write(ttyfd, passphrase + codepoint, n, false);
+ (void) loop_write(ttyfd, passphrase + codepoint, n);
else
- (void) loop_write(
- ttyfd,
- special_glyph(SPECIAL_GLYPH_BULLET),
- SIZE_MAX,
- false);
+ (void) loop_write(ttyfd,
+ special_glyph(SPECIAL_GLYPH_BULLET),
+ SIZE_MAX);
codepoint = p;
}
}
finish:
if (ttyfd >= 0 && reset_tty) {
- (void) loop_write(ttyfd, "\n", 1, false);
+ (void) loop_write(ttyfd, "\n", 1);
(void) tcsetattr(ttyfd, TCSADRAIN, &old_termios);
}
if (r < 0)
goto fail;
- r = loop_write(fd, &buf, sizeof(buf), false);
+ r = loop_write(fd, &buf, sizeof(buf));
if (r < 0)
goto fail;
/* If there were remaining bytes (i.e. read into memory, but not written out yet) from the
* failed copy operation, let's flush them out next. */
- r = loop_write(tmp_fd, remains, remains_size, false);
+ r = loop_write(tmp_fd, remains, remains_size);
if (r < 0)
return r;
}
if (remains_size > 0) {
/* Then, copy in any read but not yet written bytes. */
- r = loop_write(tmp_fd, remains, remains_size, false);
+ r = loop_write(tmp_fd, remains, remains_size);
if (r < 0)
return r;
}
if (r < 0)
fd = r;
else {
- r = loop_write(fds[2*k+1], &class, sizeof(class), false);
+ r = loop_write(fds[2*k+1], &class, sizeof(class));
if (r < 0)
goto inner_fail; /* Propagate the error to the parent */
}
}
}
- r = loop_write(fds[2*k+1], &found, sizeof(found), false);
+ r = loop_write(fds[2*k+1], &found, sizeof(found));
if (r < 0)
goto inner_fail;
* Failure is ignored, because partial output is still useful. */
(void) fcntl(return_pipe[1], F_SETPIPE_SZ, len);
- r = loop_write(return_pipe[1], buf, len, false);
+ r = loop_write(return_pipe[1], buf, len);
if (r == -EAGAIN)
log_warning("Write failed, backtrace will be truncated.");
else if (r < 0)
*
* Otherwise write the machine-id directly to disk. */
if (force_transient) {
- r = loop_write(fd, "uninitialized\n", SIZE_MAX, false);
+ r = loop_write(fd, "uninitialized\n", SIZE_MAX);
if (r < 0)
return log_error_errno(r, "Failed to write uninitialized %s: %m", etc_machine_id);
* secure mode. Thus, start the pager specified through
* envvars only when $SYSTEMD_PAGERSECURE was explicitly set
* as well. */
- r = loop_write(exe_name_pipe[1], pager_args[0], strlen(pager_args[0]) + 1, false);
+ r = loop_write(exe_name_pipe[1], pager_args[0], strlen(pager_args[0]) + 1);
if (r < 0) {
log_error_errno(r, "Failed to write pager name to socket: %m");
_exit(EXIT_FAILURE);
if (use_secure_mode && !STR_IN_SET(pagers[i], "less", "(built-in)"))
continue;
- r = loop_write(exe_name_pipe[1], pagers[i], strlen(pagers[i]) + 1, false);
+ r = loop_write(exe_name_pipe[1], pagers[i], strlen(pagers[i]) + 1);
if (r < 0) {
log_error_errno(r, "Failed to write pager name to socket: %m");
_exit(EXIT_FAILURE);
if (lseek(fd, 0, SEEK_END) == (off_t) -1)
return log_error_errno(errno, "Failed to seek to end of JSON log: %m");
- r = loop_write(fd, f, SIZE_MAX, /* do_poll= */ false);
+ r = loop_write(fd, f, SIZE_MAX);
if (r < 0)
return log_error_errno(r, "Failed to write JSON data to log: %m");
.runlevel = rl,
};
- r = loop_write(fd, &request, sizeof(request), false);
+ r = loop_write(fd, &request, sizeof(request));
if (r < 0)
return log_error_errno(r, "Failed to write to %s: %m", path);
return log_tests_skipped("Filesystem doesn't support hole punching");
assert_se(lseek(fd, blksz, SEEK_CUR) >= 0);
- assert_se(loop_write(fd, buf, blksz, 0) >= 0);
- assert_se(loop_write(fd, buf, blksz, 0) >= 0);
+ assert_se(loop_write(fd, buf, blksz) >= 0);
+ assert_se(loop_write(fd, buf, blksz) >= 0);
assert_se(lseek(fd, 2 * blksz, SEEK_CUR) >= 0);
- assert_se(loop_write(fd, buf, blksz, 0) >= 0);
+ assert_se(loop_write(fd, buf, blksz) >= 0);
assert_se(lseek(fd, 0, SEEK_SET) >= 0);
assert_se(fsync(fd) >= 0);
log_debug("Writing to \"%s\".", path);
- r = loop_write(fd, item_binary_argument(i), item_binary_argument_size(i), /* do_poll= */ false);
+ r = loop_write(fd, item_binary_argument(i), item_binary_argument_size(i));
if (r < 0)
return log_error_errno(r, "Failed to write file \"%s\": %m", path);
assert(worker);
assert(worker->pipe_fd >= 0);
- return loop_write(worker->pipe_fd, &result, sizeof(result), /* do_poll = */ false);
+ return loop_write(worker->pipe_fd, &result, sizeof(result));
}
static int worker_device_monitor_handler(sd_device_monitor *monitor, sd_device *dev, void *userdata) {
if (r < 0)
return log_warning_errno(errno, "Failed to %s UTF-8 kbdmode on %s: %m", enable_disable(utf8), name);
- r = loop_write(fd, utf8 ? "\033%G" : "\033%@", SIZE_MAX, false);
+ r = loop_write(fd, utf8 ? "\033%G" : "\033%@", SIZE_MAX);
if (r < 0)
return log_warning_errno(r, "Failed to %s UTF-8 term processing on %s: %m", enable_disable(utf8), name);