]>
Commit | Line | Data |
---|---|---|
03467c88 | 1 | /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/ |
60918275 | 2 | |
c2f1db8f | 3 | #pragma once |
60918275 | 4 | |
a7334b09 LP |
5 | /*** |
6 | This file is part of systemd. | |
7 | ||
8 | Copyright 2010 Lennart Poettering | |
9 | ||
10 | systemd is free software; you can redistribute it and/or modify it | |
5430f7f2 LP |
11 | under the terms of the GNU Lesser General Public License as published by |
12 | the Free Software Foundation; either version 2.1 of the License, or | |
a7334b09 LP |
13 | (at your option) any later version. |
14 | ||
15 | systemd is distributed in the hope that it will be useful, but | |
16 | WITHOUT ANY WARRANTY; without even the implied warranty of | |
17 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
5430f7f2 | 18 | Lesser General Public License for more details. |
a7334b09 | 19 | |
5430f7f2 | 20 | You should have received a copy of the GNU Lesser General Public License |
a7334b09 LP |
21 | along with systemd; If not, see <http://www.gnu.org/licenses/>. |
22 | ***/ | |
23 | ||
31885cd5 | 24 | #include <alloca.h> |
370c860f | 25 | #include <fcntl.h> |
60918275 LP |
26 | #include <inttypes.h> |
27 | #include <time.h> | |
ec2002f8 | 28 | #include <stdarg.h> |
60918275 | 29 | #include <stdbool.h> |
5cb5a6ff | 30 | #include <stdlib.h> |
80876c20 | 31 | #include <stdio.h> |
82c121a4 | 32 | #include <sched.h> |
8f75a603 | 33 | #include <limits.h> |
25ea79fe | 34 | #include <sys/types.h> |
2c35d880 | 35 | #include <sys/socket.h> |
00dc5d76 | 36 | #include <sys/stat.h> |
3b63d2d3 | 37 | #include <dirent.h> |
7d5e9c0f | 38 | #include <stddef.h> |
79d860fe | 39 | #include <unistd.h> |
d6dd604b | 40 | #include <locale.h> |
5862d652 | 41 | #include <mntent.h> |
0254e944 | 42 | #include <sys/inotify.h> |
c6878637 | 43 | #include <sys/statfs.h> |
60918275 | 44 | |
a838e6a1 | 45 | #include "macro.h" |
dced1557 | 46 | #include "missing.h" |
9a98c7a1 | 47 | #include "time-util.h" |
6482f626 | 48 | #include "formats-util.h" |
871d7de4 | 49 | |
44d8db9e | 50 | /* What is interpreted as whitespace? */ |
4a72ff34 | 51 | #define WHITESPACE " \t\n\r" |
e3e0314b ZJS |
52 | #define NEWLINE "\n\r" |
53 | #define QUOTES "\"\'" | |
54 | #define COMMENTS "#;" | |
55 | #define GLOB_CHARS "*?[" | |
44d8db9e | 56 | |
0ce5a806 MM |
57 | /* What characters are special in the shell? */ |
58 | /* must be escaped outside and inside double-quotes */ | |
59 | #define SHELL_NEED_ESCAPE "\"\\`$" | |
60 | /* can be escaped or double-quoted */ | |
61 | #define SHELL_NEED_QUOTES SHELL_NEED_ESCAPE GLOB_CHARS "'()<>|&;" | |
62 | ||
a7bc2c2a | 63 | #define FORMAT_BYTES_MAX 8 |
8b6c7120 | 64 | |
2e857429 | 65 | size_t page_size(void) _pure_; |
37f85e66 | 66 | #define PAGE_ALIGN(l) ALIGN_TO((l), page_size()) |
67 | ||
60918275 | 68 | #define streq(a,b) (strcmp((a),(b)) == 0) |
3846aeeb | 69 | #define strneq(a, b, n) (strncmp((a), (b), (n)) == 0) |
b43d1d01 TA |
70 | #define strcaseeq(a,b) (strcasecmp((a),(b)) == 0) |
71 | #define strncaseeq(a, b, n) (strncasecmp((a), (b), (n)) == 0) | |
60918275 | 72 | |
44a6b1b6 | 73 | bool streq_ptr(const char *a, const char *b) _pure_; |
c030a850 | 74 | int strcmp_ptr(const char *a, const char *b) _pure_; |
e05797fb | 75 | |
4b8772bf | 76 | #define new(t, n) ((t*) malloc_multiply(sizeof(t), (n))) |
60918275 LP |
77 | |
78 | #define new0(t, n) ((t*) calloc((n), sizeof(t))) | |
79 | ||
0f0dbc46 LP |
80 | #define newa(t, n) ((t*) alloca(sizeof(t)*(n))) |
81 | ||
7629889c LP |
82 | #define newa0(t, n) ((t*) alloca0(sizeof(t)*(n))) |
83 | ||
4b8772bf | 84 | #define newdup(t, p, n) ((t*) memdup_multiply(p, sizeof(t), (n))) |
888c7102 | 85 | |
f80bb1f7 | 86 | #define malloc0(n) (calloc(1, (n))) |
60918275 | 87 | |
97b11eed DH |
88 | static inline void *mfree(void *memory) { |
89 | free(memory); | |
90 | return NULL; | |
91 | } | |
92 | ||
60918275 LP |
93 | static inline const char* yes_no(bool b) { |
94 | return b ? "yes" : "no"; | |
95 | } | |
96 | ||
5232c42e LS |
97 | static inline const char* true_false(bool b) { |
98 | return b ? "true" : "false"; | |
99 | } | |
100 | ||
769d324c LP |
101 | static inline const char* one_zero(bool b) { |
102 | return b ? "1" : "0"; | |
103 | } | |
104 | ||
60918275 LP |
105 | static inline const char* strempty(const char *s) { |
106 | return s ? s : ""; | |
107 | } | |
108 | ||
109 | static inline const char* strnull(const char *s) { | |
110 | return s ? s : "(null)"; | |
111 | } | |
112 | ||
04fd6fe4 LP |
113 | static inline const char *strna(const char *s) { |
114 | return s ? s : "n/a"; | |
115 | } | |
116 | ||
9beb3f4d LP |
117 | static inline bool isempty(const char *p) { |
118 | return !p || !p[0]; | |
119 | } | |
120 | ||
11adc1ae LP |
121 | static inline char *startswith(const char *s, const char *prefix) { |
122 | size_t l; | |
123 | ||
124 | l = strlen(prefix); | |
125 | if (strncmp(s, prefix, l) == 0) | |
126 | return (char*) s + l; | |
127 | ||
df89481a KS |
128 | return NULL; |
129 | } | |
130 | ||
11adc1ae LP |
131 | static inline char *startswith_no_case(const char *s, const char *prefix) { |
132 | size_t l; | |
133 | ||
134 | l = strlen(prefix); | |
135 | if (strncasecmp(s, prefix, l) == 0) | |
136 | return (char*) s + l; | |
137 | ||
df89481a KS |
138 | return NULL; |
139 | } | |
140 | ||
44a6b1b6 | 141 | char *endswith(const char *s, const char *postfix) _pure_; |
d3226d77 | 142 | char *endswith_no_case(const char *s, const char *postfix) _pure_; |
60918275 | 143 | |
5cb36f41 | 144 | char *first_word(const char *s, const char *word) _pure_; |
79d6d816 | 145 | |
42f4e3c4 | 146 | int close_nointr(int fd); |
03e334a1 | 147 | int safe_close(int fd); |
3d94f76c | 148 | void safe_close_pair(int p[]); |
03e334a1 | 149 | |
5b6319dc | 150 | void close_many(const int fds[], unsigned n_fd); |
60918275 | 151 | |
5556b5fe LP |
152 | int parse_size(const char *t, off_t base, off_t *size); |
153 | ||
44a6b1b6 | 154 | int parse_boolean(const char *v) _pure_; |
3ba686c1 | 155 | int parse_pid(const char *s, pid_t* ret_pid); |
034a2a52 | 156 | int parse_uid(const char *s, uid_t* ret_uid); |
a1f686da LP |
157 | #define parse_gid(s, ret_gid) parse_uid(s, ret_gid) |
158 | ||
159 | bool uid_is_valid(uid_t uid); | |
160 | #define gid_is_valid(gid) uid_is_valid(gid) | |
85261803 LP |
161 | |
162 | int safe_atou(const char *s, unsigned *ret_u); | |
163 | int safe_atoi(const char *s, int *ret_i); | |
164 | ||
8f75a603 LP |
165 | int safe_atollu(const char *s, unsigned long long *ret_u); |
166 | int safe_atolli(const char *s, long long int *ret_i); | |
167 | ||
f7900e25 TA |
168 | int safe_atod(const char *s, double *ret_d); |
169 | ||
b914e211 LP |
170 | int safe_atou8(const char *s, uint8_t *ret); |
171 | ||
8507eb20 | 172 | #if LONG_MAX == INT_MAX |
8f75a603 LP |
173 | static inline int safe_atolu(const char *s, unsigned long *ret_u) { |
174 | assert_cc(sizeof(unsigned long) == sizeof(unsigned)); | |
175 | return safe_atou(s, (unsigned*) ret_u); | |
176 | } | |
177 | static inline int safe_atoli(const char *s, long int *ret_u) { | |
178 | assert_cc(sizeof(long int) == sizeof(int)); | |
179 | return safe_atoi(s, (int*) ret_u); | |
180 | } | |
181 | #else | |
182 | static inline int safe_atolu(const char *s, unsigned long *ret_u) { | |
183 | assert_cc(sizeof(unsigned long) == sizeof(unsigned long long)); | |
184 | return safe_atollu(s, (unsigned long long*) ret_u); | |
185 | } | |
186 | static inline int safe_atoli(const char *s, long int *ret_u) { | |
187 | assert_cc(sizeof(long int) == sizeof(long long int)); | |
188 | return safe_atolli(s, (long long int*) ret_u); | |
189 | } | |
190 | #endif | |
191 | ||
a838e6a1 LP |
192 | static inline int safe_atou32(const char *s, uint32_t *ret_u) { |
193 | assert_cc(sizeof(uint32_t) == sizeof(unsigned)); | |
194 | return safe_atou(s, (unsigned*) ret_u); | |
195 | } | |
196 | ||
8f75a603 | 197 | static inline int safe_atoi32(const char *s, int32_t *ret_i) { |
a838e6a1 | 198 | assert_cc(sizeof(int32_t) == sizeof(int)); |
8f75a603 | 199 | return safe_atoi(s, (int*) ret_i); |
a838e6a1 LP |
200 | } |
201 | ||
8f75a603 LP |
202 | static inline int safe_atou64(const char *s, uint64_t *ret_u) { |
203 | assert_cc(sizeof(uint64_t) == sizeof(unsigned long long)); | |
204 | return safe_atollu(s, (unsigned long long*) ret_u); | |
205 | } | |
034c6ed7 | 206 | |
8f75a603 LP |
207 | static inline int safe_atoi64(const char *s, int64_t *ret_i) { |
208 | assert_cc(sizeof(int64_t) == sizeof(long long int)); | |
209 | return safe_atolli(s, (long long int*) ret_i); | |
210 | } | |
034c6ed7 | 211 | |
781fa938 LP |
212 | int safe_atou16(const char *s, uint16_t *ret); |
213 | int safe_atoi16(const char *s, int16_t *ret); | |
214 | ||
a2a5291b | 215 | const char* split(const char **state, size_t *l, const char *separator, bool quoted); |
a41e8209 | 216 | |
034c6ed7 | 217 | #define FOREACH_WORD(word, length, s, state) \ |
bf85c24d | 218 | _FOREACH_WORD(word, length, s, WHITESPACE, false, state) |
65d2ebdc LP |
219 | |
220 | #define FOREACH_WORD_SEPARATOR(word, length, s, separator, state) \ | |
bf85c24d | 221 | _FOREACH_WORD(word, length, s, separator, false, state) |
a41e8209 | 222 | |
034c6ed7 | 223 | #define FOREACH_WORD_QUOTED(word, length, s, state) \ |
bf85c24d SP |
224 | _FOREACH_WORD(word, length, s, WHITESPACE, true, state) |
225 | ||
bf85c24d | 226 | #define _FOREACH_WORD(word, length, s, separator, quoted, state) \ |
a2a5291b | 227 | for ((state) = (s), (word) = split(&(state), &(length), (separator), (quoted)); (word); (word) = split(&(state), &(length), (separator), (quoted))) |
034c6ed7 | 228 | |
44d8db9e | 229 | char *strappend(const char *s, const char *suffix); |
fab56fc5 LP |
230 | char *strnappend(const char *s, const char *suffix, size_t length); |
231 | ||
849958d1 | 232 | int readlinkat_malloc(int fd, const char *p, char **ret); |
87f0e418 | 233 | int readlink_malloc(const char *p, char **r); |
9a67bcf2 | 234 | int readlink_value(const char *p, char **ret); |
2c7108c4 | 235 | int readlink_and_make_absolute(const char *p, char **r); |
83096483 | 236 | int readlink_and_canonicalize(const char *p, char **r); |
87f0e418 | 237 | |
4a72ff34 | 238 | char *strstrip(char *s); |
ee9b5e01 | 239 | char *delete_chars(char *s, const char *bad); |
7072ced8 | 240 | char *truncate_nl(char *s); |
ee9b5e01 | 241 | |
4a72ff34 LP |
242 | char *file_in_same_dir(const char *path, const char *filename); |
243 | ||
c32dd69b LP |
244 | int rmdir_parents(const char *path, const char *stop); |
245 | ||
bcb92f48 CR |
246 | char hexchar(int x) _const_; |
247 | int unhexchar(char c) _const_; | |
248 | char octchar(int x) _const_; | |
249 | int unoctchar(char c) _const_; | |
250 | char decchar(int x) _const_; | |
251 | int undecchar(char c) _const_; | |
919a7f5f TG |
252 | char base32hexchar(int x) _const_; |
253 | int unbase32hexchar(char c) _const_; | |
13a5d76b TG |
254 | char base64char(int x) _const_; |
255 | int unbase64char(char c) _const_; | |
4fe88d28 LP |
256 | |
257 | char *cescape(const char *s); | |
0b452006 | 258 | size_t cescape_char(char c, char *buf); |
527b7a42 LP |
259 | |
260 | typedef enum UnescapeFlags { | |
261 | UNESCAPE_RELAX = 1, | |
262 | } UnescapeFlags; | |
263 | ||
264 | int cunescape(const char *s, UnescapeFlags flags, char **ret); | |
265 | int cunescape_length(const char *s, size_t length, UnescapeFlags flags, char **ret); | |
266 | int cunescape_length_with_prefix(const char *s, size_t length, const char *prefix, UnescapeFlags flags, char **ret); | |
6febfd0d LP |
267 | |
268 | char *xescape(const char *s, const char *bad); | |
269 | ||
4fe88d28 LP |
270 | char *ascii_strlower(char *path); |
271 | ||
44a6b1b6 ZJS |
272 | bool dirent_is_file(const struct dirent *de) _pure_; |
273 | bool dirent_is_file_with_suffix(const struct dirent *de, const char *suffix) _pure_; | |
87d2c1ff | 274 | |
a34bf9db | 275 | bool hidden_file(const char *filename) _pure_; |
c85dc17b | 276 | |
44a6b1b6 | 277 | bool chars_intersect(const char *a, const char *b) _pure_; |
db12775d | 278 | |
f8b69d1d | 279 | /* For basic lookup tables with strictly enumerated entries */ |
b9a5f858 | 280 | #define _DEFINE_STRING_TABLE_LOOKUP_TO_STRING(name,type,scope) \ |
4e240ab0 | 281 | scope const char *name##_to_string(type i) { \ |
1dccbe19 LP |
282 | if (i < 0 || i >= (type) ELEMENTSOF(name##_table)) \ |
283 | return NULL; \ | |
284 | return name##_table[i]; \ | |
b9a5f858 LP |
285 | } |
286 | ||
9cad100e BB |
287 | ssize_t string_table_lookup(const char * const *table, size_t len, const char *key); |
288 | ||
289 | #define _DEFINE_STRING_TABLE_LOOKUP_FROM_STRING(name,type,scope) \ | |
290 | scope inline type name##_from_string(const char *s) { \ | |
291 | return (type)string_table_lookup(name##_table, ELEMENTSOF(name##_table), s); \ | |
b9a5f858 LP |
292 | } |
293 | ||
294 | #define _DEFINE_STRING_TABLE_LOOKUP(name,type,scope) \ | |
295 | _DEFINE_STRING_TABLE_LOOKUP_TO_STRING(name,type,scope) \ | |
296 | _DEFINE_STRING_TABLE_LOOKUP_FROM_STRING(name,type,scope) \ | |
1dccbe19 LP |
297 | struct __useless_struct_to_allow_trailing_semicolon__ |
298 | ||
b9a5f858 LP |
299 | #define DEFINE_STRING_TABLE_LOOKUP(name,type) _DEFINE_STRING_TABLE_LOOKUP(name,type,) |
300 | #define DEFINE_PRIVATE_STRING_TABLE_LOOKUP(name,type) _DEFINE_STRING_TABLE_LOOKUP(name,type,static) | |
301 | #define DEFINE_PRIVATE_STRING_TABLE_LOOKUP_TO_STRING(name,type) _DEFINE_STRING_TABLE_LOOKUP_TO_STRING(name,type,static) | |
302 | #define DEFINE_PRIVATE_STRING_TABLE_LOOKUP_FROM_STRING(name,type) _DEFINE_STRING_TABLE_LOOKUP_FROM_STRING(name,type,static) | |
1dccbe19 | 303 | |
f8b69d1d MS |
304 | /* For string conversions where numbers are also acceptable */ |
305 | #define DEFINE_STRING_TABLE_LOOKUP_WITH_FALLBACK(name,type,max) \ | |
306 | int name##_to_string_alloc(type i, char **str) { \ | |
307 | char *s; \ | |
308 | int r; \ | |
309 | if (i < 0 || i > max) \ | |
310 | return -ERANGE; \ | |
311 | if (i < (type) ELEMENTSOF(name##_table)) { \ | |
312 | s = strdup(name##_table[i]); \ | |
313 | if (!s) \ | |
314 | return log_oom(); \ | |
315 | } else { \ | |
8facc349 | 316 | r = asprintf(&s, "%i", i); \ |
f8b69d1d MS |
317 | if (r < 0) \ |
318 | return log_oom(); \ | |
319 | } \ | |
320 | *str = s; \ | |
321 | return 0; \ | |
322 | } \ | |
323 | type name##_from_string(const char *s) { \ | |
324 | type i; \ | |
325 | unsigned u = 0; \ | |
326 | assert(s); \ | |
327 | for (i = 0; i < (type)ELEMENTSOF(name##_table); i++) \ | |
328 | if (name##_table[i] && \ | |
329 | streq(name##_table[i], s)) \ | |
330 | return i; \ | |
8511dd18 | 331 | if (safe_atou(s, &u) >= 0 && u <= max) \ |
f8b69d1d MS |
332 | return (type) u; \ |
333 | return (type) -1; \ | |
334 | } \ | |
335 | struct __useless_struct_to_allow_trailing_semicolon__ | |
336 | ||
3a0ecb08 LP |
337 | int fd_nonblock(int fd, bool nonblock); |
338 | int fd_cloexec(int fd, bool cloexec); | |
339 | ||
a0d40ac5 LP |
340 | int close_all_fds(const int except[], unsigned n_except); |
341 | ||
42856c10 LP |
342 | bool fstype_is_network(const char *fstype); |
343 | ||
80876c20 LP |
344 | int flush_fd(int fd); |
345 | ||
5a3ab509 | 346 | int fopen_temporary(const char *path, FILE **_f, char **_temp_path); |
8d567588 | 347 | |
eb22ac37 | 348 | ssize_t loop_read(int fd, void *buf, size_t nbytes, bool do_poll); |
a6dcc7e5 | 349 | int loop_read_exact(int fd, void *buf, size_t nbytes, bool do_poll); |
553acb7b | 350 | int loop_write(int fd, const void *buf, size_t nbytes, bool do_poll); |
8d567588 | 351 | |
8407a5d0 LP |
352 | bool is_device_path(const char *path); |
353 | ||
01f78473 | 354 | int dir_is_empty(const char *path); |
844ec79b | 355 | char* dirname_malloc(const char *path); |
01f78473 | 356 | |
f1566e63 | 357 | char* lookup_uid(uid_t uid); |
ef2f1067 | 358 | char* getlogname_malloc(void); |
7c5f152a | 359 | char* getusername_malloc(void); |
fc116c6a | 360 | |
8c6db833 | 361 | int chmod_and_chown(const char *path, mode_t mode, uid_t uid, gid_t gid); |
f4b47811 | 362 | int fchmod_and_fchown(int fd, mode_t mode, uid_t uid, gid_t gid); |
8c6db833 | 363 | |
c6878637 LP |
364 | bool is_temporary_fs(const struct statfs *s) _pure_; |
365 | int fd_is_temporary_fs(int fd); | |
ef2f1067 | 366 | |
1325aa42 LP |
367 | int pipe_eof(int fd); |
368 | ||
4b40bc38 FB |
369 | DEFINE_TRIVIAL_CLEANUP_FUNC(cpu_set_t*, CPU_FREE); |
370 | #define _cleanup_cpu_free_ _cleanup_(CPU_FREEp) | |
371 | ||
82c121a4 LP |
372 | cpu_set_t* cpu_set_malloc(unsigned *ncpus); |
373 | ||
5ffa8c81 ZJS |
374 | #define xsprintf(buf, fmt, ...) assert_se((size_t) snprintf(buf, ELEMENTSOF(buf), fmt, __VA_ARGS__) < ELEMENTSOF(buf)) |
375 | ||
9d9951a4 HH |
376 | int files_same(const char *filea, const char *fileb); |
377 | ||
b4f10a5e LP |
378 | int running_in_chroot(void); |
379 | ||
72f59706 | 380 | char *ellipsize(const char *s, size_t length, unsigned percent); |
f405e86d | 381 | /* bytes columns */ |
72f59706 | 382 | char *ellipsize_mem(const char *s, size_t old_length, size_t new_length, unsigned percent); |
8fe914ec | 383 | |
c38dfac9 | 384 | int touch_file(const char *path, bool parents, usec_t stamp, uid_t uid, gid_t gid, mode_t mode); |
f6144808 LP |
385 | int touch(const char *path); |
386 | ||
919ce0b7 | 387 | noreturn void freeze(void); |
3c14d26c | 388 | |
44a6b1b6 | 389 | bool null_or_empty(struct stat *st) _pure_; |
83096483 | 390 | int null_or_empty_path(const char *fn); |
ed88bcfb | 391 | int null_or_empty_fd(int fd); |
00dc5d76 | 392 | |
a247755d | 393 | DIR *xopendirat(int dirfd, const char *name, int flags); |
3b63d2d3 | 394 | |
e23a0ce8 LP |
395 | char *fstab_node_to_udev_node(const char *p); |
396 | ||
e801700e | 397 | void execute_directories(const char* const* directories, usec_t timeout, char *argv[]); |
83cc030f | 398 | |
05feefe0 LP |
399 | bool nulstr_contains(const char*nulstr, const char *needle); |
400 | ||
a88c8750 TG |
401 | bool plymouth_running(void); |
402 | ||
9beb3f4d LP |
403 | char* strshorten(char *s, size_t l); |
404 | ||
875e1014 | 405 | int symlink_idempotent(const char *from, const char *to); |
6ea832a2 | 406 | |
424a19f8 | 407 | int symlink_atomic(const char *from, const char *to); |
1554afae LP |
408 | int mknod_atomic(const char *path, mode_t mode, dev_t dev); |
409 | int mkfifo_atomic(const char *path, mode_t mode); | |
34ca941c LP |
410 | |
411 | int fchmod_umask(int fd, mode_t mode); | |
412 | ||
44a6b1b6 | 413 | bool display_is_local(const char *display) _pure_; |
4d6d6518 LP |
414 | int socket_from_display(const char *display, char **path); |
415 | ||
d05c5031 | 416 | int get_user_creds(const char **username, uid_t *uid, gid_t *gid, const char **home, const char **shell); |
4b67834e | 417 | int get_group_creds(const char **groupname, gid_t *gid); |
1cccf435 | 418 | |
4468addc | 419 | int in_gid(gid_t gid); |
43673799 LP |
420 | int in_group(const char *name); |
421 | ||
59164be4 | 422 | char* uid_to_name(uid_t uid); |
4468addc | 423 | char* gid_to_name(gid_t gid); |
59164be4 | 424 | |
8092a428 | 425 | int glob_exists(const char *path); |
8d98da3f | 426 | int glob_extend(char ***strv, const char *path); |
8092a428 | 427 | |
83096483 LP |
428 | int dirent_ensure_type(DIR *d, struct dirent *de); |
429 | ||
034a2a52 | 430 | int get_files_in_directory(const char *path, char ***list); |
83096483 | 431 | |
b7def684 | 432 | char *strjoin(const char *x, ...) _sentinel_; |
911a4828 | 433 | |
b636465b LP |
434 | bool is_main_thread(void); |
435 | ||
01f83c1c JT |
436 | static inline bool _pure_ in_charset(const char *s, const char* charset) { |
437 | assert(s); | |
438 | assert(charset); | |
439 | return s[strspn(s, charset)] == '\0'; | |
440 | } | |
ab1f0633 | 441 | |
94959f0f LP |
442 | int block_get_whole_disk(dev_t d, dev_t *ret); |
443 | ||
e23a0ce8 | 444 | #define NULSTR_FOREACH(i, l) \ |
c4e2ceae LP |
445 | for ((i) = (l); (i) && *(i); (i) = strchr((i), 0)+1) |
446 | ||
5c0532d1 LP |
447 | #define NULSTR_FOREACH_PAIR(i, j, l) \ |
448 | for ((i) = (l), (j) = strchr((i), 0)+1; (i) && *(i); (i) = strchr((j), 0)+1, (j) = *(i) ? strchr((i), 0)+1 : (i)) | |
449 | ||
f8b69d1d | 450 | int ioprio_class_to_string_alloc(int i, char **s); |
1dccbe19 LP |
451 | int ioprio_class_from_string(const char *s); |
452 | ||
44a6b1b6 ZJS |
453 | const char *sigchld_code_to_string(int i) _const_; |
454 | int sigchld_code_from_string(const char *s) _pure_; | |
1dccbe19 | 455 | |
f8b69d1d | 456 | int log_facility_unshifted_to_string_alloc(int i, char **s); |
7d76f312 | 457 | int log_facility_unshifted_from_string(const char *s); |
1dccbe19 | 458 | |
f8b69d1d | 459 | int log_level_to_string_alloc(int i, char **s); |
1dccbe19 LP |
460 | int log_level_from_string(const char *s); |
461 | ||
f8b69d1d | 462 | int sched_policy_to_string_alloc(int i, char **s); |
1dccbe19 LP |
463 | int sched_policy_from_string(const char *s); |
464 | ||
44a6b1b6 ZJS |
465 | const char *rlimit_to_string(int i) _const_; |
466 | int rlimit_from_string(const char *s) _pure_; | |
1dccbe19 | 467 | |
f8b69d1d | 468 | int ip_tos_to_string_alloc(int i, char **s); |
4fd5948e LP |
469 | int ip_tos_from_string(const char *s); |
470 | ||
9a0e6896 LP |
471 | extern int saved_argc; |
472 | extern char **saved_argv; | |
473 | ||
65457142 FC |
474 | bool kexec_loaded(void); |
475 | ||
44a6b1b6 | 476 | int prot_from_flags(int flags) _const_; |
87d2c1ff | 477 | |
babfc091 LP |
478 | char *format_bytes(char *buf, size_t l, off_t t); |
479 | ||
8f2d43a0 | 480 | int fd_wait_for_event(int fd, int event, usec_t timeout); |
df50185b | 481 | |
750ef272 | 482 | void* memdup(const void *p, size_t l) _alloc_(2); |
55d7bfc1 | 483 | |
bb99a35a LP |
484 | int fd_inc_sndbuf(int fd, size_t n); |
485 | int fd_inc_rcvbuf(int fd, size_t n); | |
6bb92a16 | 486 | |
9bdc770c | 487 | int fork_agent(pid_t *pid, const int except[], unsigned n_except, const char *path, ...); |
6bb92a16 | 488 | |
68faf98c LP |
489 | int setrlimit_closest(int resource, const struct rlimit *rlim); |
490 | ||
a2e03378 LP |
491 | bool http_url_is_valid(const char *url) _pure_; |
492 | bool documentation_url_is_valid(const char *url) _pure_; | |
49dbfa7b | 493 | |
3d7415f4 LP |
494 | bool http_etag_is_valid(const char *etag); |
495 | ||
9be346c9 | 496 | bool in_initrd(void); |
069cfc85 | 497 | |
7c5f152a | 498 | int get_home_dir(char **ret); |
2cfbd749 | 499 | int get_shell(char **_ret); |
2fbe635a | 500 | |
a740c14c MS |
501 | static inline void freep(void *p) { |
502 | free(*(void**) p); | |
503 | } | |
504 | ||
dfb33a97 | 505 | static inline void closep(int *fd) { |
03e334a1 | 506 | safe_close(*fd); |
dfb33a97 LP |
507 | } |
508 | ||
dfb33a97 LP |
509 | static inline void umaskp(mode_t *u) { |
510 | umask(*u); | |
763c7aa2 ZJS |
511 | } |
512 | ||
3d94f76c LP |
513 | static inline void close_pairp(int (*p)[2]) { |
514 | safe_close_pair(*p); | |
04d39279 LP |
515 | } |
516 | ||
14bf2c9d LP |
517 | DEFINE_TRIVIAL_CLEANUP_FUNC(FILE*, fclose); |
518 | DEFINE_TRIVIAL_CLEANUP_FUNC(FILE*, pclose); | |
519 | DEFINE_TRIVIAL_CLEANUP_FUNC(DIR*, closedir); | |
520 | DEFINE_TRIVIAL_CLEANUP_FUNC(FILE*, endmntent); | |
5862d652 | 521 | |
dfb33a97 | 522 | #define _cleanup_free_ _cleanup_(freep) |
dfb33a97 | 523 | #define _cleanup_close_ _cleanup_(closep) |
dfb33a97 LP |
524 | #define _cleanup_umask_ _cleanup_(umaskp) |
525 | #define _cleanup_globfree_ _cleanup_(globfree) | |
1ca208fb ZJS |
526 | #define _cleanup_fclose_ _cleanup_(fclosep) |
527 | #define _cleanup_pclose_ _cleanup_(pclosep) | |
528 | #define _cleanup_closedir_ _cleanup_(closedirp) | |
5862d652 | 529 | #define _cleanup_endmntent_ _cleanup_(endmntentp) |
3d94f76c | 530 | #define _cleanup_close_pair_ _cleanup_(close_pairp) |
c84a9488 | 531 | |
750ef272 | 532 | _malloc_ _alloc_(1, 2) static inline void *malloc_multiply(size_t a, size_t b) { |
368504f4 | 533 | if (_unlikely_(b != 0 && a > ((size_t) -1) / b)) |
4b8772bf LP |
534 | return NULL; |
535 | ||
536 | return malloc(a * b); | |
537 | } | |
538 | ||
9489490a DH |
539 | _alloc_(2, 3) static inline void *realloc_multiply(void *p, size_t a, size_t b) { |
540 | if (_unlikely_(b != 0 && a > ((size_t) -1) / b)) | |
541 | return NULL; | |
542 | ||
543 | return realloc(p, a * b); | |
544 | } | |
545 | ||
750ef272 | 546 | _alloc_(2, 3) static inline void *memdup_multiply(const void *p, size_t a, size_t b) { |
368504f4 | 547 | if (_unlikely_(b != 0 && a > ((size_t) -1) / b)) |
4b8772bf LP |
548 | return NULL; |
549 | ||
550 | return memdup(p, a * b); | |
551 | } | |
0b507b17 | 552 | |
ae6c3cc0 | 553 | bool filename_is_valid(const char *p) _pure_; |
44a6b1b6 ZJS |
554 | bool path_is_safe(const char *p) _pure_; |
555 | bool string_is_safe(const char *p) _pure_; | |
6294aa76 | 556 | bool string_has_cc(const char *p, const char *ok) _pure_; |
cfbc22ab | 557 | |
e3e0314b ZJS |
558 | /** |
559 | * Check if a string contains any glob patterns. | |
560 | */ | |
561 | _pure_ static inline bool string_is_glob(const char *p) { | |
562 | return !!strpbrk(p, GLOB_CHARS); | |
563 | } | |
564 | ||
a9e12476 KS |
565 | void *xbsearch_r(const void *key, const void *base, size_t nmemb, size_t size, |
566 | int (*compar) (const void *, const void *, void *), | |
567 | void *arg); | |
09017585 | 568 | |
20f56fdd DR |
569 | #define _(String) gettext (String) |
570 | void init_gettext(void); | |
09017585 | 571 | bool is_locale_utf8(void); |
c339d977 MS |
572 | |
573 | typedef enum DrawSpecialChar { | |
6b01f1d3 | 574 | DRAW_TREE_VERTICAL, |
45a5ff0d MS |
575 | DRAW_TREE_BRANCH, |
576 | DRAW_TREE_RIGHT, | |
55c0b89c | 577 | DRAW_TREE_SPACE, |
c339d977 | 578 | DRAW_TRIANGULAR_BULLET, |
3deadb91 | 579 | DRAW_BLACK_CIRCLE, |
6b01f1d3 | 580 | DRAW_ARROW, |
13f8b8cb | 581 | DRAW_DASH, |
c339d977 MS |
582 | _DRAW_SPECIAL_CHAR_MAX |
583 | } DrawSpecialChar; | |
6b01f1d3 | 584 | |
c339d977 | 585 | const char *draw_special_char(DrawSpecialChar ch); |
409bc9c3 LP |
586 | |
587 | char *strreplace(const char *text, const char *old_string, const char *new_string); | |
e8bc0ea2 LP |
588 | |
589 | char *strip_tab_ansi(char **p, size_t *l); | |
240dbaa4 LP |
590 | |
591 | int on_ac_power(void); | |
f74e605f | 592 | |
4cf7ea55 MM |
593 | int search_and_fopen(const char *path, const char *mode, const char *root, const char **search, FILE **_f); |
594 | int search_and_fopen_nulstr(const char *path, const char *mode, const char *root, const char *search, FILE **_f); | |
fabe5c0e | 595 | |
9db11a99 LP |
596 | #define FOREACH_LINE(line, f, on_error) \ |
597 | for (;;) \ | |
f74e605f LP |
598 | if (!fgets(line, sizeof(line), f)) { \ |
599 | if (ferror(f)) { \ | |
600 | on_error; \ | |
601 | } \ | |
602 | break; \ | |
603 | } else | |
9db11a99 LP |
604 | |
605 | #define FOREACH_DIRENT(de, d, on_error) \ | |
606 | for (errno = 0, de = readdir(d);; errno = 0, de = readdir(d)) \ | |
607 | if (!de) { \ | |
8333c77e | 608 | if (errno > 0) { \ |
9db11a99 LP |
609 | on_error; \ |
610 | } \ | |
611 | break; \ | |
a34bf9db | 612 | } else if (hidden_file((de)->d_name)) \ |
9db11a99 LP |
613 | continue; \ |
614 | else | |
cd61c3bf LP |
615 | |
616 | #define FOREACH_DIRENT_ALL(de, d, on_error) \ | |
617 | for (errno = 0, de = readdir(d);; errno = 0, de = readdir(d)) \ | |
618 | if (!de) { \ | |
619 | if (errno > 0) { \ | |
620 | on_error; \ | |
621 | } \ | |
622 | break; \ | |
623 | } else | |
6282c859 MS |
624 | |
625 | static inline void *mempset(void *s, int c, size_t n) { | |
626 | memset(s, c, n); | |
dfb33a97 | 627 | return (uint8_t*)s + n; |
6282c859 | 628 | } |
66e35261 LP |
629 | |
630 | char *hexmem(const void *p, size_t l); | |
30494563 | 631 | int unhexmem(const char *p, size_t l, void **mem, size_t *len); |
2181a7f5 | 632 | |
919a7f5f TG |
633 | char *base32hexmem(const void *p, size_t l, bool padding); |
634 | int unbase32hexmem(const char *p, size_t l, bool padding, void **mem, size_t *len); | |
635 | ||
13a5d76b TG |
636 | char *base64mem(const void *p, size_t l); |
637 | int unbase64mem(const char *p, size_t l, void **mem, size_t *len); | |
638 | ||
a432cb69 | 639 | char *strextend(char **x, ...) _sentinel_; |
9a17484d | 640 | char *strrep(const char *s, unsigned n); |
392d5b37 | 641 | |
ca2d3784 ZJS |
642 | void* greedy_realloc(void **p, size_t *allocated, size_t need, size_t size); |
643 | void* greedy_realloc0(void **p, size_t *allocated, size_t need, size_t size); | |
644 | #define GREEDY_REALLOC(array, allocated, need) \ | |
645 | greedy_realloc((void**) &(array), &(allocated), (need), sizeof((array)[0])) | |
646 | ||
647 | #define GREEDY_REALLOC0(array, allocated, need) \ | |
648 | greedy_realloc0((void**) &(array), &(allocated), (need), sizeof((array)[0])) | |
a1937e67 | 649 | |
5c0d398d | 650 | static inline void _reset_errno_(int *saved_errno) { |
5c0aa72a LP |
651 | errno = *saved_errno; |
652 | } | |
653 | ||
2a371001 | 654 | #define PROTECT_ERRNO _cleanup_(_reset_errno_) __attribute__((unused)) int _saved_errno_ = errno |
5c0d398d | 655 | |
44dd2c6e DH |
656 | static inline int negative_errno(void) { |
657 | /* This helper should be used to shut up gcc if you know 'errno' is | |
658 | * negative. Instead of "return -errno;", use "return negative_errno();" | |
659 | * It will suppress bogus gcc warnings in case it assumes 'errno' might | |
660 | * be 0 and thus the caller's error-handling might not be triggered. */ | |
661 | assert_return(errno > 0, -EINVAL); | |
662 | return -errno; | |
663 | } | |
664 | ||
d6dd604b | 665 | struct _umask_struct_ { |
5c0d398d LP |
666 | mode_t mask; |
667 | bool quit; | |
668 | }; | |
669 | ||
d6dd604b | 670 | static inline void _reset_umask_(struct _umask_struct_ *s) { |
5c0d398d LP |
671 | umask(s->mask); |
672 | }; | |
673 | ||
674 | #define RUN_WITH_UMASK(mask) \ | |
d6dd604b | 675 | for (_cleanup_(_reset_umask_) struct _umask_struct_ _saved_umask_ = { umask(mask), false }; \ |
5c0d398d LP |
676 | !_saved_umask_.quit ; \ |
677 | _saved_umask_.quit = true) | |
144e51ec CR |
678 | |
679 | static inline unsigned u64log2(uint64_t n) { | |
ec417ccc | 680 | #if __SIZEOF_LONG_LONG__ == 8 |
693eb9a2 | 681 | return (n > 1) ? (unsigned) __builtin_clzll(n) ^ 63U : 0; |
ec417ccc LP |
682 | #else |
683 | #error "Wut?" | |
684 | #endif | |
685 | } | |
686 | ||
687 | static inline unsigned u32ctz(uint32_t n) { | |
688 | #if __SIZEOF_INT__ == 4 | |
689 | return __builtin_ctz(n); | |
690 | #else | |
691 | #error "Wut?" | |
692 | #endif | |
144e51ec | 693 | } |
79d860fe | 694 | |
7d328b54 | 695 | static inline unsigned log2i(int x) { |
8fe90522 ZJS |
696 | assert(x > 0); |
697 | ||
698 | return __SIZEOF_INT__ * 8 - __builtin_clz(x) - 1; | |
699 | } | |
700 | ||
b5de6d98 MS |
701 | static inline unsigned log2u(unsigned x) { |
702 | assert(x > 0); | |
703 | ||
704 | return sizeof(unsigned) * 8 - __builtin_clz(x) - 1; | |
705 | } | |
706 | ||
707 | static inline unsigned log2u_round_up(unsigned x) { | |
708 | assert(x > 0); | |
709 | ||
710 | if (x == 1) | |
711 | return 0; | |
712 | ||
713 | return log2u(x - 1) + 1; | |
714 | } | |
715 | ||
79d860fe MP |
716 | static inline bool logind_running(void) { |
717 | return access("/run/systemd/seats/", F_OK) >= 0; | |
718 | } | |
4b73a0c0 | 719 | |
82da66fb LP |
720 | #define DECIMAL_STR_WIDTH(x) \ |
721 | ({ \ | |
722 | typeof(x) _x_ = (x); \ | |
723 | unsigned ans = 1; \ | |
724 | while (_x_ /= 10) \ | |
725 | ans++; \ | |
726 | ans; \ | |
727 | }) | |
75add28a | 728 | |
4b73a0c0 | 729 | int unlink_noerrno(const char *path); |
ed5c5dbd | 730 | |
82da66fb LP |
731 | #define alloca0(n) \ |
732 | ({ \ | |
733 | char *_new_; \ | |
734 | size_t _len_ = n; \ | |
735 | _new_ = alloca(_len_); \ | |
736 | (void *) memset(_new_, 0, _len_); \ | |
ed5c5dbd | 737 | }) |
95d78c7e | 738 | |
257224b0 | 739 | /* It's not clear what alignment glibc/gcc alloca() guarantee, hence provide a guaranteed safe version */ |
95d78c7e DH |
740 | #define alloca_align(size, align) \ |
741 | ({ \ | |
742 | void *_ptr_; \ | |
743 | size_t _mask_ = (align) - 1; \ | |
744 | _ptr_ = alloca((size) + _mask_); \ | |
745 | (void*)(((uintptr_t)_ptr_ + _mask_) & ~_mask_); \ | |
746 | }) | |
747 | ||
748 | #define alloca0_align(size, align) \ | |
749 | ({ \ | |
750 | void *_new_; \ | |
751 | size_t _size_ = (size); \ | |
752 | _new_ = alloca_align(_size_, (align)); \ | |
753 | (void*)memset(_new_, 0, _size_); \ | |
754 | }) | |
66060897 | 755 | |
63c372cb LP |
756 | #define strjoina(a, ...) \ |
757 | ({ \ | |
758 | const char *_appendees_[] = { a, __VA_ARGS__ }; \ | |
759 | char *_d_, *_p_; \ | |
760 | int _len_ = 0; \ | |
761 | unsigned _i_; \ | |
762 | for (_i_ = 0; _i_ < ELEMENTSOF(_appendees_) && _appendees_[_i_]; _i_++) \ | |
763 | _len_ += strlen(_appendees_[_i_]); \ | |
764 | _p_ = _d_ = alloca(_len_ + 1); \ | |
765 | for (_i_ = 0; _i_ < ELEMENTSOF(_appendees_) && _appendees_[_i_]; _i_++) \ | |
766 | _p_ = stpcpy(_p_, _appendees_[_i_]); \ | |
767 | *_p_ = 0; \ | |
768 | _d_; \ | |
f39d4a08 HH |
769 | }) |
770 | ||
44a6b1b6 | 771 | bool id128_is_valid(const char *s) _pure_; |
d4ac85c6 LP |
772 | |
773 | int split_pair(const char *s, const char *sep, char **l, char **r); | |
7ff7394d | 774 | |
74df0fca | 775 | int shall_restore_state(void); |
295edddf | 776 | |
7ff7394d ZJS |
777 | /** |
778 | * Normal qsort requires base to be nonnull. Here were require | |
779 | * that only if nmemb > 0. | |
780 | */ | |
aeb24f30 | 781 | static inline void qsort_safe(void *base, size_t nmemb, size_t size, comparison_fn_t compar) { |
1dbd13d8 | 782 | if (nmemb <= 1) |
aeb24f30 LP |
783 | return; |
784 | ||
785 | assert(base); | |
786 | qsort(base, nmemb, size, compar); | |
7ff7394d | 787 | } |
74df0fca | 788 | |
6e6c21c8 LP |
789 | /* Normal memmem() requires haystack to be nonnull, which is annoying for zero-length buffers */ |
790 | static inline void *memmem_safe(const void *haystack, size_t haystacklen, const void *needle, size_t needlelen) { | |
791 | ||
792 | if (needlelen <= 0) | |
793 | return (void*) haystack; | |
794 | ||
795 | if (haystacklen < needlelen) | |
796 | return NULL; | |
797 | ||
798 | assert(haystack); | |
799 | assert(needle); | |
800 | ||
801 | return memmem(haystack, haystacklen, needle, needlelen); | |
802 | } | |
803 | ||
74df0fca | 804 | int proc_cmdline(char **ret); |
059cb385 | 805 | int parse_proc_cmdline(int (*parse_word)(const char *key, const char *value)); |
1a299299 | 806 | int get_proc_cmdline_key(const char *parameter, char **value); |
bc9fd78c LP |
807 | |
808 | int container_get_leader(const char *machine, pid_t *pid); | |
809 | ||
671c3419 RM |
810 | int namespace_open(pid_t pid, int *pidns_fd, int *mntns_fd, int *netns_fd, int *userns_fd, int *root_fd); |
811 | int namespace_enter(int pidns_fd, int mntns_fd, int netns_fd, int userns_fd, int root_fd); | |
bf108e55 | 812 | |
eff05270 LP |
813 | int getpeercred(int fd, struct ucred *ucred); |
814 | int getpeersec(int fd, char **ret); | |
8e33886e | 815 | |
65b3903f ZJS |
816 | int writev_safe(int fd, const struct iovec *w, int j); |
817 | ||
818 | int mkostemp_safe(char *pattern, int flags); | |
8e33886e | 819 | int open_tmpfile(const char *path, int flags); |
fdb9161c LP |
820 | |
821 | int fd_warn_permissions(const char *path, int fd); | |
6afc95b7 | 822 | |
050f7277 LP |
823 | #ifndef PERSONALITY_INVALID |
824 | /* personality(7) documents that 0xffffffffUL is used for querying the | |
825 | * current personality, hence let's use that here as error | |
826 | * indicator. */ | |
827 | #define PERSONALITY_INVALID 0xffffffffLU | |
828 | #endif | |
829 | ||
ac45f971 LP |
830 | unsigned long personality_from_string(const char *p); |
831 | const char *personality_to_string(unsigned long); | |
1c231f56 LP |
832 | |
833 | uint64_t physical_memory(void); | |
6db615c1 | 834 | |
29bfbcd6 | 835 | void hexdump(FILE *f, const void *p, size_t s); |
370c860f DR |
836 | |
837 | union file_handle_union { | |
c5220a94 MO |
838 | struct file_handle handle; |
839 | char padding[sizeof(struct file_handle) + MAX_HANDLE_SZ]; | |
370c860f | 840 | }; |
2695c5c4 | 841 | #define FILE_HANDLE_INIT { .handle.handle_bytes = MAX_HANDLE_SZ } |
c5220a94 MO |
842 | |
843 | int update_reboot_param_file(const char *param); | |
6d313367 LP |
844 | |
845 | int umount_recursive(const char *target, int flags); | |
d6797c92 LP |
846 | |
847 | int bind_remount_recursive(const char *prefix, bool ro); | |
1b992147 LP |
848 | |
849 | int fflush_and_check(FILE *f); | |
2e78fa79 | 850 | |
14bcf25c LP |
851 | int tempfn_xxxxxx(const char *p, const char *extra, char **ret); |
852 | int tempfn_random(const char *p, const char *extra, char **ret); | |
853 | int tempfn_random_child(const char *p, const char *extra, char **ret); | |
fecc80c1 | 854 | |
45035609 | 855 | int take_password_lock(const char *root); |
5261ba90 | 856 | |
7629889c | 857 | int is_symlink(const char *path); |
be57e297 | 858 | int is_dir(const char *path, bool follow); |
ce5b3ad4 | 859 | int is_device_node(const char *path); |
7629889c | 860 | |
68685607 RM |
861 | typedef enum ExtractFlags { |
862 | EXTRACT_RELAX = 1, | |
863 | EXTRACT_CUNESCAPE = 2, | |
864 | EXTRACT_CUNESCAPE_RELAX = 4, | |
12ba2c44 | 865 | EXTRACT_QUOTES = 8, |
206644ae | 866 | EXTRACT_DONT_COALESCE_SEPARATORS = 16, |
68685607 RM |
867 | } ExtractFlags; |
868 | ||
869 | int extract_first_word(const char **p, char **ret, const char *separators, ExtractFlags flags); | |
870 | int extract_first_word_and_warn(const char **p, char **ret, const char *separators, ExtractFlags flags, const char *unit, const char *filename, unsigned line, const char *rvalue); | |
871 | int extract_many_words(const char **p, const char *separators, ExtractFlags flags, ...) _sentinel_; | |
2928b0a8 | 872 | |
8fb49443 ZJS |
873 | static inline void free_and_replace(char **s, char *v) { |
874 | free(*s); | |
875 | *s = v; | |
876 | } | |
877 | ||
2928b0a8 | 878 | int free_and_strdup(char **p, const char *s); |
605f81a8 | 879 | |
f7c1ad4f LP |
880 | #define INOTIFY_EVENT_MAX (sizeof(struct inotify_event) + NAME_MAX + 1) |
881 | ||
882 | #define FOREACH_INOTIFY_EVENT(e, buffer, sz) \ | |
0254e944 SL |
883 | for ((e) = &buffer.ev; \ |
884 | (uint8_t*) (e) < (uint8_t*) (buffer.raw) + (sz); \ | |
f7c1ad4f | 885 | (e) = (struct inotify_event*) ((uint8_t*) (e) + sizeof(struct inotify_event) + (e)->len)) |
72648326 | 886 | |
0254e944 SL |
887 | union inotify_event_buffer { |
888 | struct inotify_event ev; | |
889 | uint8_t raw[INOTIFY_EVENT_MAX]; | |
890 | }; | |
891 | ||
72648326 | 892 | #define laccess(path, mode) faccessat(AT_FDCWD, (path), (mode), AT_SYMLINK_NOFOLLOW) |
ee451d76 LP |
893 | |
894 | int ptsname_malloc(int fd, char **ret); | |
5f8cc96a LP |
895 | |
896 | int openpt_in_namespace(pid_t pid, int flags); | |
4a4d89b6 | 897 | |
10f9c755 LP |
898 | ssize_t fgetxattrat_fake(int dirfd, const char *filename, const char *attribute, void *value, size_t size, int flags); |
899 | ||
4a4d89b6 LP |
900 | int fd_setcrtime(int fd, usec_t usec); |
901 | int fd_getcrtime(int fd, usec_t *usec); | |
902 | int path_getcrtime(const char *p, usec_t *usec); | |
10f9c755 | 903 | int fd_getcrtime_at(int dirfd, const char *name, usec_t *usec, int flags); |
a354329f LP |
904 | |
905 | int same_fd(int a, int b); | |
11689d2a | 906 | |
1ed8f8c1 LP |
907 | int chattr_fd(int fd, unsigned value, unsigned mask); |
908 | int chattr_path(const char *p, unsigned value, unsigned mask); | |
de45d726 | 909 | |
01b72568 LP |
910 | int read_attr_fd(int fd, unsigned *ret); |
911 | int read_attr_path(const char *p, unsigned *ret); | |
912 | ||
de45d726 | 913 | #define RLIMIT_MAKE_CONST(lim) ((struct rlimit) { lim, lim }) |
ff6a7460 LP |
914 | |
915 | ssize_t sparse_write(int fd, const void *p, size_t sz, size_t run_length); | |
3576d631 LP |
916 | |
917 | void sigkill_wait(pid_t *pid); | |
918 | #define _cleanup_sigkill_wait_ _cleanup_(sigkill_wait) | |
3d7415f4 LP |
919 | |
920 | int syslog_parse_priority(const char **p, int *priority, bool with_facility); | |
1c8da044 LP |
921 | |
922 | void cmsg_close_all(struct msghdr *mh); | |
f85ef957 AC |
923 | |
924 | int rename_noreplace(int olddirfd, const char *oldpath, int newdirfd, const char *newpath); | |
019c7fba | 925 | |
61ee6939 | 926 | char *shell_escape(const char *s, const char *bad); |
019c7fba | 927 | char *shell_maybe_quote(const char *s); |
2ff7b0a5 LP |
928 | |
929 | int parse_mode(const char *s, mode_t *ret); | |
6458ec20 LP |
930 | |
931 | int mount_move_root(const char *path); | |
b4da6d6b LP |
932 | |
933 | int reset_uid_gid(void); | |
7b9c9ab8 WC |
934 | |
935 | int getxattr_malloc(const char *path, const char *name, char **value, bool allow_symlink); | |
936 | int fgetxattr_malloc(int fd, const char *name, char **value); |