blob: eea71454701c6dd5f48c60e2b6d9cd25388971c1 [file] [log] [blame]
Patrick Steinhardte7da9382024-06-14 08:50:23 +02001#define USE_THE_REPOSITORY_VARIABLE
2
Elijah Newrend812c3b2023-04-11 00:41:56 -07003#include "git-compat-util.h"
Elijah Newrend4a4f922023-04-22 20:17:26 +00004#include "date.h"
Elijah Newrena034e912023-05-16 06:34:06 +00005#include "dir.h"
Elijah Newren41771fa2023-02-24 00:09:27 +00006#include "hex.h"
Elijah Newrena034e912023-05-16 06:34:06 +00007#include "object-store-ll.h"
Elijah Newrenc3399322023-05-16 06:33:59 +00008#include "path.h"
Stefan Beller109cd762018-06-28 18:21:51 -07009#include "repository.h"
Martin Koegler355885d2008-02-25 22:46:04 +010010#include "object.h"
Patrick Steinhardt27ab4782022-12-01 15:46:09 +010011#include "attr.h"
Martin Koegler355885d2008-02-25 22:46:04 +010012#include "blob.h"
13#include "tree.h"
14#include "tree-walk.h"
15#include "commit.h"
16#include "tag.h"
17#include "fsck.h"
Johannes Schindelincec097b2014-09-11 16:26:38 +020018#include "refs.h"
Jonathan Niedera2b26ff2020-04-18 20:52:34 -070019#include "url.h"
Jeff Kinga18fcc92014-12-15 18:21:57 -050020#include "utf8.h"
Jeff King159e7b02018-05-02 17:20:08 -040021#include "oidset.h"
Jeff King27387442018-05-14 12:22:48 -040022#include "packfile.h"
Jeff Kinged8b10f2018-05-02 17:25:27 -040023#include "submodule-config.h"
24#include "config.h"
Nguyễn Thái Ngọc Duy3ac68a92018-05-26 15:55:24 +020025#include "help.h"
Jeff King159e7b02018-05-02 17:20:08 -040026
Jeff King0fbcaef2023-08-31 02:20:01 -040027static ssize_t max_tree_entry_len = 4096;
28
Johannes Schindelinf417eed2015-06-22 17:25:14 +020029#define STR(x) #x
Nguyễn Thái Ngọc Duya4a9cc12018-05-26 15:55:25 +020030#define MSG_ID(id, msg_type) { STR(id), NULL, NULL, FSCK_##msg_type },
Johannes Schindelinc99ba492015-06-22 17:25:09 +020031static struct {
Johannes Schindelinf417eed2015-06-22 17:25:14 +020032 const char *id_string;
33 const char *downcased;
Nguyễn Thái Ngọc Duya4a9cc12018-05-26 15:55:25 +020034 const char *camelcased;
Ævar Arnfjörð Bjarmason1b32b592021-03-28 15:15:40 +020035 enum fsck_msg_type msg_type;
Johannes Schindelinc99ba492015-06-22 17:25:09 +020036} msg_id_info[FSCK_MSG_MAX + 1] = {
Ævar Arnfjörð Bjarmason901f2f62021-03-28 15:15:44 +020037 FOREACH_FSCK_MSG_ID(MSG_ID)
Nguyễn Thái Ngọc Duya4a9cc12018-05-26 15:55:25 +020038 { NULL, NULL, NULL, -1 }
Johannes Schindelinc99ba492015-06-22 17:25:09 +020039};
40#undef MSG_ID
Ævar Arnfjörð Bjarmasonb5495022021-03-28 15:15:43 +020041#undef STR
Johannes Schindelinc99ba492015-06-22 17:25:09 +020042
Nguyễn Thái Ngọc Duya46baac2018-05-26 15:55:23 +020043static void prepare_msg_ids(void)
44{
45 int i;
46
47 if (msg_id_info[0].downcased)
48 return;
49
50 /* convert id_string to lower case, without underscores. */
51 for (i = 0; i < FSCK_MSG_MAX; i++) {
52 const char *p = msg_id_info[i].id_string;
53 int len = strlen(p);
54 char *q = xmalloc(len);
55
56 msg_id_info[i].downcased = q;
57 while (*p)
58 if (*p == '_')
59 p++;
60 else
61 *(q)++ = tolower(*(p)++);
62 *q = '\0';
Nguyễn Thái Ngọc Duya4a9cc12018-05-26 15:55:25 +020063
64 p = msg_id_info[i].id_string;
65 q = xmalloc(len);
66 msg_id_info[i].camelcased = q;
67 while (*p) {
68 if (*p == '_') {
69 p++;
70 if (*p)
71 *q++ = *p++;
72 } else {
73 *q++ = tolower(*p++);
74 }
75 }
76 *q = '\0';
Nguyễn Thái Ngọc Duya46baac2018-05-26 15:55:23 +020077 }
78}
79
Johannes Schindelinf417eed2015-06-22 17:25:14 +020080static int parse_msg_id(const char *text)
81{
82 int i;
83
Nguyễn Thái Ngọc Duya46baac2018-05-26 15:55:23 +020084 prepare_msg_ids();
Johannes Schindelinf417eed2015-06-22 17:25:14 +020085
86 for (i = 0; i < FSCK_MSG_MAX; i++)
87 if (!strcmp(text, msg_id_info[i].downcased))
88 return i;
89
90 return -1;
91}
92
Nguyễn Thái Ngọc Duy3ac68a92018-05-26 15:55:24 +020093void list_config_fsck_msg_ids(struct string_list *list, const char *prefix)
94{
95 int i;
96
97 prepare_msg_ids();
98
Nguyễn Thái Ngọc Duy3ac68a92018-05-26 15:55:24 +020099 for (i = 0; i < FSCK_MSG_MAX; i++)
Nguyễn Thái Ngọc Duya4a9cc12018-05-26 15:55:25 +0200100 list_config_item(list, prefix, msg_id_info[i].camelcased);
Nguyễn Thái Ngọc Duy3ac68a92018-05-26 15:55:24 +0200101}
102
Ævar Arnfjörð Bjarmason1b32b592021-03-28 15:15:40 +0200103static enum fsck_msg_type fsck_msg_type(enum fsck_msg_id msg_id,
Johannes Schindelinc99ba492015-06-22 17:25:09 +0200104 struct fsck_options *options)
105{
Johannes Schindelin0282f4d2015-06-22 17:25:25 +0200106 assert(msg_id >= 0 && msg_id < FSCK_MSG_MAX);
107
Ævar Arnfjörð Bjarmasone35d65a2021-03-28 15:15:39 +0200108 if (!options->msg_type) {
Ævar Arnfjörð Bjarmason1b32b592021-03-28 15:15:40 +0200109 enum fsck_msg_type msg_type = msg_id_info[msg_id].msg_type;
Ævar Arnfjörð Bjarmasone35d65a2021-03-28 15:15:39 +0200110
Johannes Schindelin0282f4d2015-06-22 17:25:25 +0200111 if (options->strict && msg_type == FSCK_WARN)
112 msg_type = FSCK_ERROR;
Ævar Arnfjörð Bjarmasone35d65a2021-03-28 15:15:39 +0200113 return msg_type;
Johannes Schindelin0282f4d2015-06-22 17:25:25 +0200114 }
Johannes Schindelinc99ba492015-06-22 17:25:09 +0200115
Ævar Arnfjörð Bjarmasone35d65a2021-03-28 15:15:39 +0200116 return options->msg_type[msg_id];
Johannes Schindelinc99ba492015-06-22 17:25:09 +0200117}
118
Ævar Arnfjörð Bjarmason1b32b592021-03-28 15:15:40 +0200119static enum fsck_msg_type parse_msg_type(const char *str)
Johannes Schindelin0282f4d2015-06-22 17:25:25 +0200120{
121 if (!strcmp(str, "error"))
122 return FSCK_ERROR;
123 else if (!strcmp(str, "warn"))
124 return FSCK_WARN;
Johannes Schindelinefaba7c2015-06-22 17:26:48 +0200125 else if (!strcmp(str, "ignore"))
126 return FSCK_IGNORE;
Johannes Schindelin0282f4d2015-06-22 17:25:25 +0200127 else
128 die("Unknown fsck message type: '%s'", str);
129}
130
Johannes Schindelin5d477a32015-06-22 17:25:31 +0200131int is_valid_msg_type(const char *msg_id, const char *msg_type)
132{
133 if (parse_msg_id(msg_id) < 0)
134 return 0;
135 parse_msg_type(msg_type);
136 return 1;
137}
138
Ævar Arnfjörð Bjarmason53692df2021-03-28 15:15:47 +0200139void fsck_set_msg_type_from_ids(struct fsck_options *options,
140 enum fsck_msg_id msg_id,
141 enum fsck_msg_type msg_type)
142{
143 if (!options->msg_type) {
144 int i;
145 enum fsck_msg_type *severity;
146 ALLOC_ARRAY(severity, FSCK_MSG_MAX);
147 for (i = 0; i < FSCK_MSG_MAX; i++)
148 severity[i] = fsck_msg_type(i, options);
149 options->msg_type = severity;
150 }
151
152 options->msg_type[msg_id] = msg_type;
153}
154
Johannes Schindelin0282f4d2015-06-22 17:25:25 +0200155void fsck_set_msg_type(struct fsck_options *options,
Ævar Arnfjörð Bjarmasonf1abc2d2021-03-28 15:15:36 +0200156 const char *msg_id_str, const char *msg_type_str)
Johannes Schindelin0282f4d2015-06-22 17:25:25 +0200157{
Ævar Arnfjörð Bjarmason1b32b592021-03-28 15:15:40 +0200158 int msg_id = parse_msg_id(msg_id_str);
Jeff King0fbcaef2023-08-31 02:20:01 -0400159 char *to_free = NULL;
160 enum fsck_msg_type msg_type;
Johannes Schindelin0282f4d2015-06-22 17:25:25 +0200161
Ævar Arnfjörð Bjarmasonf1abc2d2021-03-28 15:15:36 +0200162 if (msg_id < 0)
163 die("Unhandled message id: %s", msg_id_str);
Johannes Schindelin0282f4d2015-06-22 17:25:25 +0200164
Jeff King0fbcaef2023-08-31 02:20:01 -0400165 if (msg_id == FSCK_MSG_LARGE_PATHNAME) {
166 const char *colon = strchr(msg_type_str, ':');
167 if (colon) {
168 msg_type_str = to_free =
169 xmemdupz(msg_type_str, colon - msg_type_str);
170 colon++;
171 if (!git_parse_ssize_t(colon, &max_tree_entry_len))
172 die("unable to parse max tree entry len: %s", colon);
173 }
174 }
175 msg_type = parse_msg_type(msg_type_str);
176
Ævar Arnfjörð Bjarmasonf1abc2d2021-03-28 15:15:36 +0200177 if (msg_type != FSCK_ERROR && msg_id_info[msg_id].msg_type == FSCK_FATAL)
178 die("Cannot demote %s to %s", msg_id_str, msg_type_str);
Johannes Schindelinf50c4402015-06-22 17:26:42 +0200179
Ævar Arnfjörð Bjarmason53692df2021-03-28 15:15:47 +0200180 fsck_set_msg_type_from_ids(options, msg_id, msg_type);
Jeff King0fbcaef2023-08-31 02:20:01 -0400181 free(to_free);
Johannes Schindelin0282f4d2015-06-22 17:25:25 +0200182}
183
184void fsck_set_msg_types(struct fsck_options *options, const char *values)
185{
186 char *buf = xstrdup(values), *to_free = buf;
187 int done = 0;
188
189 while (!done) {
190 int len = strcspn(buf, " ,|"), equal;
191
192 done = !buf[len];
193 if (!len) {
194 buf++;
195 continue;
196 }
197 buf[len] = '\0';
198
199 for (equal = 0;
200 equal < len && buf[equal] != '=' && buf[equal] != ':';
201 equal++)
202 buf[equal] = tolower(buf[equal]);
203 buf[equal] = '\0';
204
Johannes Schindelincd94c6f2015-06-22 17:27:18 +0200205 if (!strcmp(buf, "skiplist")) {
206 if (equal == len)
207 die("skiplist requires a path");
Patrick Steinhardtf2c32a62024-06-14 08:50:42 +0200208 oidset_parse_file(&options->skiplist, buf + equal + 1,
209 the_repository->hash_algo);
Johannes Schindelincd94c6f2015-06-22 17:27:18 +0200210 buf += len + 1;
211 continue;
212 }
213
Johannes Schindelin0282f4d2015-06-22 17:25:25 +0200214 if (equal == len)
215 die("Missing '=': '%s'", buf);
216
217 fsck_set_msg_type(options, buf, buf + equal + 1);
218 buf += len + 1;
219 }
220 free(to_free);
221}
222
Jeff Kingf5979372019-10-18 00:58:51 -0400223static int object_on_skiplist(struct fsck_options *opts,
224 const struct object_id *oid)
Ramsay Jonesfb162872018-06-27 19:39:53 +0100225{
Jeff Kingf5979372019-10-18 00:58:51 -0400226 return opts && oid && oidset_contains(&opts->skiplist, oid);
Ramsay Jonesfb162872018-06-27 19:39:53 +0100227}
228
Jeff King38370252019-10-18 00:59:15 -0400229__attribute__((format (printf, 5, 6)))
230static int report(struct fsck_options *options,
231 const struct object_id *oid, enum object_type object_type,
Ævar Arnfjörð Bjarmason35af7542021-03-28 15:15:38 +0200232 enum fsck_msg_id msg_id, const char *fmt, ...)
Johannes Schindelinc99ba492015-06-22 17:25:09 +0200233{
234 va_list ap;
235 struct strbuf sb = STRBUF_INIT;
Ævar Arnfjörð Bjarmason1b32b592021-03-28 15:15:40 +0200236 enum fsck_msg_type msg_type = fsck_msg_type(msg_id, options);
237 int result;
Johannes Schindelinc99ba492015-06-22 17:25:09 +0200238
Johannes Schindelinefaba7c2015-06-22 17:26:48 +0200239 if (msg_type == FSCK_IGNORE)
240 return 0;
241
Jeff King38370252019-10-18 00:59:15 -0400242 if (object_on_skiplist(options, oid))
Johannes Schindelincd94c6f2015-06-22 17:27:18 +0200243 return 0;
244
Johannes Schindelinf50c4402015-06-22 17:26:42 +0200245 if (msg_type == FSCK_FATAL)
246 msg_type = FSCK_ERROR;
Johannes Schindelinf27d05b2015-06-22 17:26:54 +0200247 else if (msg_type == FSCK_INFO)
248 msg_type = FSCK_WARN;
Johannes Schindelinf50c4402015-06-22 17:26:42 +0200249
Ævar Arnfjörð Bjarmason034a7b72021-03-28 15:15:37 +0200250 prepare_msg_ids();
Ævar Arnfjörð Bjarmason35af7542021-03-28 15:15:38 +0200251 strbuf_addf(&sb, "%s: ", msg_id_info[msg_id].camelcased);
Johannes Schindelin71ab8fa2015-06-22 17:25:52 +0200252
Johannes Schindelinc99ba492015-06-22 17:25:09 +0200253 va_start(ap, fmt);
254 strbuf_vaddf(&sb, fmt, ap);
Jeff King38370252019-10-18 00:59:15 -0400255 result = options->error_func(options, oid, object_type,
Ævar Arnfjörð Bjarmason394d5d32021-03-28 15:15:46 +0200256 msg_type, msg_id, sb.buf);
Johannes Schindelinc99ba492015-06-22 17:25:09 +0200257 strbuf_release(&sb);
258 va_end(ap);
259
260 return result;
261}
262
Jeff Kinga59cfb32019-10-18 00:56:13 -0400263void fsck_enable_object_names(struct fsck_options *options)
264{
265 if (!options->object_names)
Jeff King73390292019-10-18 00:57:37 -0400266 options->object_names = kh_init_oid_map();
Jeff Kinga59cfb32019-10-18 00:56:13 -0400267}
268
Jeff King73390292019-10-18 00:57:37 -0400269const char *fsck_get_object_name(struct fsck_options *options,
270 const struct object_id *oid)
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200271{
Jeff King73390292019-10-18 00:57:37 -0400272 khiter_t pos;
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200273 if (!options->object_names)
274 return NULL;
Jeff King73390292019-10-18 00:57:37 -0400275 pos = kh_get_oid_map(options->object_names, *oid);
276 if (pos >= kh_end(options->object_names))
277 return NULL;
278 return kh_value(options->object_names, pos);
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200279}
280
Jeff King73390292019-10-18 00:57:37 -0400281void fsck_put_object_name(struct fsck_options *options,
282 const struct object_id *oid,
Jeff Kinga59cfb32019-10-18 00:56:13 -0400283 const char *fmt, ...)
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200284{
285 va_list ap;
286 struct strbuf buf = STRBUF_INIT;
Jeff King73390292019-10-18 00:57:37 -0400287 khiter_t pos;
288 int hashret;
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200289
290 if (!options->object_names)
291 return;
Jeff King73390292019-10-18 00:57:37 -0400292
293 pos = kh_put_oid_map(options->object_names, *oid, &hashret);
294 if (!hashret)
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200295 return;
296 va_start(ap, fmt);
297 strbuf_vaddf(&buf, fmt, ap);
Jeff King73390292019-10-18 00:57:37 -0400298 kh_value(options->object_names, pos) = strbuf_detach(&buf, NULL);
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200299 va_end(ap);
300}
301
Jeff Kinga59cfb32019-10-18 00:56:13 -0400302const char *fsck_describe_object(struct fsck_options *options,
Jeff King73390292019-10-18 00:57:37 -0400303 const struct object_id *oid)
Johannes Schindelin90cf5902016-07-17 13:00:02 +0200304{
Jeff Kinga59cfb32019-10-18 00:56:13 -0400305 static struct strbuf bufs[] = {
306 STRBUF_INIT, STRBUF_INIT, STRBUF_INIT, STRBUF_INIT
307 };
308 static int b = 0;
309 struct strbuf *buf;
Jeff King73390292019-10-18 00:57:37 -0400310 const char *name = fsck_get_object_name(options, oid);
Johannes Schindelin90cf5902016-07-17 13:00:02 +0200311
Jeff Kinga59cfb32019-10-18 00:56:13 -0400312 buf = bufs + b;
313 b = (b + 1) % ARRAY_SIZE(bufs);
314 strbuf_reset(buf);
Jeff King73390292019-10-18 00:57:37 -0400315 strbuf_addstr(buf, oid_to_hex(oid));
Jeff Kinga59cfb32019-10-18 00:56:13 -0400316 if (name)
317 strbuf_addf(buf, " (%s)", name);
318
319 return buf->buf;
Johannes Schindelin90cf5902016-07-17 13:00:02 +0200320}
321
Johannes Schindelin22410542015-06-22 17:25:00 +0200322static int fsck_walk_tree(struct tree *tree, void *data, struct fsck_options *options)
Martin Koegler355885d2008-02-25 22:46:04 +0100323{
324 struct tree_desc desc;
325 struct name_entry entry;
326 int res = 0;
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200327 const char *name;
Martin Koegler355885d2008-02-25 22:46:04 +0100328
329 if (parse_tree(tree))
330 return -1;
331
Jeff King73390292019-10-18 00:57:37 -0400332 name = fsck_get_object_name(options, &tree->object.oid);
Eric W. Biedermanefed6872023-10-01 21:40:28 -0500333 if (init_tree_desc_gently(&desc, &tree->object.oid,
334 tree->buffer, tree->size, 0))
David Turner8354fa32016-09-27 16:59:51 -0400335 return -1;
336 while (tree_entry_gently(&desc, &entry)) {
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200337 struct object *obj;
Martin Koegler355885d2008-02-25 22:46:04 +0100338 int result;
339
340 if (S_ISGITLINK(entry.mode))
341 continue;
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200342
343 if (S_ISDIR(entry.mode)) {
brian m. carlsonea82b2a2019-01-15 00:39:44 +0000344 obj = (struct object *)lookup_tree(the_repository, &entry.oid);
René Scharfe2720f6d2017-10-05 21:41:26 +0200345 if (name && obj)
Jeff King73390292019-10-18 00:57:37 -0400346 fsck_put_object_name(options, &entry.oid, "%s%s/",
Jeff Kinga59cfb32019-10-18 00:56:13 -0400347 name, entry.path);
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200348 result = options->walk(obj, OBJ_TREE, data, options);
349 }
350 else if (S_ISREG(entry.mode) || S_ISLNK(entry.mode)) {
brian m. carlsonea82b2a2019-01-15 00:39:44 +0000351 obj = (struct object *)lookup_blob(the_repository, &entry.oid);
René Scharfe2720f6d2017-10-05 21:41:26 +0200352 if (name && obj)
Jeff King73390292019-10-18 00:57:37 -0400353 fsck_put_object_name(options, &entry.oid, "%s%s",
Jeff Kinga59cfb32019-10-18 00:56:13 -0400354 name, entry.path);
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200355 result = options->walk(obj, OBJ_BLOB, data, options);
356 }
Martin Koegler355885d2008-02-25 22:46:04 +0100357 else {
Pete Wyckoff82247e92012-04-29 20:28:45 -0400358 result = error("in tree %s: entry %s has bad mode %.6o",
Jeff King73390292019-10-18 00:57:37 -0400359 fsck_describe_object(options, &tree->object.oid),
Jeff Kinga59cfb32019-10-18 00:56:13 -0400360 entry.path, entry.mode);
Martin Koegler355885d2008-02-25 22:46:04 +0100361 }
362 if (result < 0)
363 return result;
364 if (!res)
365 res = result;
366 }
367 return res;
368}
369
Johannes Schindelin22410542015-06-22 17:25:00 +0200370static int fsck_walk_commit(struct commit *commit, void *data, struct fsck_options *options)
Martin Koegler355885d2008-02-25 22:46:04 +0100371{
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200372 int counter = 0, generation = 0, name_prefix_len = 0;
Martin Koegler355885d2008-02-25 22:46:04 +0100373 struct commit_list *parents;
374 int res;
375 int result;
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200376 const char *name;
Martin Koegler355885d2008-02-25 22:46:04 +0100377
Ævar Arnfjörð Bjarmasonecb50912023-03-28 15:58:48 +0200378 if (repo_parse_commit(the_repository, commit))
Martin Koegler355885d2008-02-25 22:46:04 +0100379 return -1;
380
Jeff King73390292019-10-18 00:57:37 -0400381 name = fsck_get_object_name(options, &commit->object.oid);
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200382 if (name)
Jeff King73390292019-10-18 00:57:37 -0400383 fsck_put_object_name(options, get_commit_tree_oid(commit),
Jeff Kinga59cfb32019-10-18 00:56:13 -0400384 "%s:", name);
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200385
Ævar Arnfjörð Bjarmasonecb50912023-03-28 15:58:48 +0200386 result = options->walk((struct object *) repo_get_commit_tree(the_repository, commit),
Derrick Stolee2e27bd72018-04-06 19:09:38 +0000387 OBJ_TREE, data, options);
Martin Koegler355885d2008-02-25 22:46:04 +0100388 if (result < 0)
389 return result;
390 res = result;
391
392 parents = commit->parents;
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200393 if (name && parents) {
394 int len = strlen(name), power;
395
396 if (len && name[len - 1] == '^') {
397 generation = 1;
398 name_prefix_len = len - 1;
399 }
400 else { /* parse ~<generation> suffix */
401 for (generation = 0, power = 1;
402 len && isdigit(name[len - 1]);
403 power *= 10)
404 generation += power * (name[--len] - '0');
405 if (power > 1 && len && name[len - 1] == '~')
406 name_prefix_len = len - 1;
Johannes Schindeline89f8932021-02-10 18:01:30 +0000407 else {
408 /* Maybe a non-first parent, e.g. HEAD^2 */
409 generation = 0;
410 name_prefix_len = len;
411 }
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200412 }
413 }
414
Martin Koegler355885d2008-02-25 22:46:04 +0100415 while (parents) {
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200416 if (name) {
Jeff King73390292019-10-18 00:57:37 -0400417 struct object_id *oid = &parents->item->object.oid;
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200418
Junio C Hamanob84c78382018-10-24 10:25:12 +0900419 if (counter++)
Jeff King73390292019-10-18 00:57:37 -0400420 fsck_put_object_name(options, oid, "%s^%d",
Jeff Kinga59cfb32019-10-18 00:56:13 -0400421 name, counter);
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200422 else if (generation > 0)
Jeff King73390292019-10-18 00:57:37 -0400423 fsck_put_object_name(options, oid, "%.*s~%d",
Jeff Kinga59cfb32019-10-18 00:56:13 -0400424 name_prefix_len, name,
425 generation + 1);
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200426 else
Jeff King73390292019-10-18 00:57:37 -0400427 fsck_put_object_name(options, oid, "%s^", name);
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200428 }
Johannes Schindelin22410542015-06-22 17:25:00 +0200429 result = options->walk((struct object *)parents->item, OBJ_COMMIT, data, options);
Martin Koegler355885d2008-02-25 22:46:04 +0100430 if (result < 0)
431 return result;
432 if (!res)
433 res = result;
434 parents = parents->next;
435 }
436 return res;
437}
438
Johannes Schindelin22410542015-06-22 17:25:00 +0200439static int fsck_walk_tag(struct tag *tag, void *data, struct fsck_options *options)
Martin Koegler355885d2008-02-25 22:46:04 +0100440{
Jeff King73390292019-10-18 00:57:37 -0400441 const char *name = fsck_get_object_name(options, &tag->object.oid);
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200442
Martin Koegler355885d2008-02-25 22:46:04 +0100443 if (parse_tag(tag))
444 return -1;
Johannes Schindelin7b35efd2016-07-17 12:59:49 +0200445 if (name)
Jeff King73390292019-10-18 00:57:37 -0400446 fsck_put_object_name(options, &tag->tagged->oid, "%s", name);
Johannes Schindelin22410542015-06-22 17:25:00 +0200447 return options->walk(tag->tagged, OBJ_ANY, data, options);
Martin Koegler355885d2008-02-25 22:46:04 +0100448}
449
Johannes Schindelin22410542015-06-22 17:25:00 +0200450int fsck_walk(struct object *obj, void *data, struct fsck_options *options)
Martin Koegler355885d2008-02-25 22:46:04 +0100451{
452 if (!obj)
453 return -1;
Jeff Kinga2b22852017-01-25 23:12:07 -0500454
455 if (obj->type == OBJ_NONE)
Stefan Beller109cd762018-06-28 18:21:51 -0700456 parse_object(the_repository, &obj->oid);
Jeff Kinga2b22852017-01-25 23:12:07 -0500457
Martin Koegler355885d2008-02-25 22:46:04 +0100458 switch (obj->type) {
459 case OBJ_BLOB:
460 return 0;
461 case OBJ_TREE:
Johannes Schindelin22410542015-06-22 17:25:00 +0200462 return fsck_walk_tree((struct tree *)obj, data, options);
Martin Koegler355885d2008-02-25 22:46:04 +0100463 case OBJ_COMMIT:
Johannes Schindelin22410542015-06-22 17:25:00 +0200464 return fsck_walk_commit((struct commit *)obj, data, options);
Martin Koegler355885d2008-02-25 22:46:04 +0100465 case OBJ_TAG:
Johannes Schindelin22410542015-06-22 17:25:00 +0200466 return fsck_walk_tag((struct tag *)obj, data, options);
Martin Koegler355885d2008-02-25 22:46:04 +0100467 default:
Jeff Kinga59cfb32019-10-18 00:56:13 -0400468 error("Unknown object type for %s",
Jeff King73390292019-10-18 00:57:37 -0400469 fsck_describe_object(options, &obj->oid));
Martin Koegler355885d2008-02-25 22:46:04 +0100470 return -1;
471 }
472}
Martin Koeglerba002f32008-02-25 22:46:08 +0100473
René Scharfe9068cfb2020-05-10 18:12:16 +0200474struct name_stack {
475 const char **names;
476 size_t nr, alloc;
477};
478
479static void name_stack_push(struct name_stack *stack, const char *name)
480{
481 ALLOC_GROW(stack->names, stack->nr + 1, stack->alloc);
482 stack->names[stack->nr++] = name;
483}
484
485static const char *name_stack_pop(struct name_stack *stack)
486{
487 return stack->nr ? stack->names[--stack->nr] : NULL;
488}
489
490static void name_stack_clear(struct name_stack *stack)
491{
492 FREE_AND_NULL(stack->names);
493 stack->nr = stack->alloc = 0;
494}
495
Martin Koeglerba002f32008-02-25 22:46:08 +0100496/*
497 * The entries in a tree are ordered in the _path_ order,
498 * which means that a directory entry is ordered by adding
499 * a slash to the end of it.
500 *
501 * So a directory called "a" is ordered _after_ a file
502 * called "a.c", because "a/" sorts after "a.c".
503 */
504#define TREE_UNORDERED (-1)
505#define TREE_HAS_DUPS (-2)
506
René Scharfe9068cfb2020-05-10 18:12:16 +0200507static int is_less_than_slash(unsigned char c)
508{
509 return '\0' < c && c < '/';
510}
511
512static int verify_ordered(unsigned mode1, const char *name1,
513 unsigned mode2, const char *name2,
514 struct name_stack *candidates)
Martin Koeglerba002f32008-02-25 22:46:08 +0100515{
516 int len1 = strlen(name1);
517 int len2 = strlen(name2);
518 int len = len1 < len2 ? len1 : len2;
519 unsigned char c1, c2;
520 int cmp;
521
522 cmp = memcmp(name1, name2, len);
523 if (cmp < 0)
524 return 0;
525 if (cmp > 0)
526 return TREE_UNORDERED;
527
528 /*
529 * Ok, the first <len> characters are the same.
530 * Now we need to order the next one, but turn
531 * a '\0' into a '/' for a directory entry.
532 */
533 c1 = name1[len];
534 c2 = name2[len];
535 if (!c1 && !c2)
536 /*
537 * git-write-tree used to write out a nonsense tree that has
538 * entries with the same name, one blob and one tree. Make
539 * sure we do not have duplicate entries.
540 */
541 return TREE_HAS_DUPS;
542 if (!c1 && S_ISDIR(mode1))
543 c1 = '/';
544 if (!c2 && S_ISDIR(mode2))
545 c2 = '/';
René Scharfe9068cfb2020-05-10 18:12:16 +0200546
547 /*
548 * There can be non-consecutive duplicates due to the implicitly
René Scharfe86715592020-05-21 11:52:04 +0200549 * added slash, e.g.:
René Scharfe9068cfb2020-05-10 18:12:16 +0200550 *
551 * foo
552 * foo.bar
553 * foo.bar.baz
554 * foo.bar/
555 * foo/
556 *
557 * Record non-directory candidates (like "foo" and "foo.bar" in
558 * the example) on a stack and check directory candidates (like
559 * foo/" and "foo.bar/") against that stack.
560 */
561 if (!c1 && is_less_than_slash(c2)) {
562 name_stack_push(candidates, name1);
563 } else if (c2 == '/' && is_less_than_slash(c1)) {
564 for (;;) {
565 const char *p;
566 const char *f_name = name_stack_pop(candidates);
567
568 if (!f_name)
569 break;
570 if (!skip_prefix(name2, f_name, &p))
René Scharfefe747042020-05-21 11:52:54 +0200571 continue;
René Scharfe9068cfb2020-05-10 18:12:16 +0200572 if (!*p)
573 return TREE_HAS_DUPS;
574 if (is_less_than_slash(*p)) {
575 name_stack_push(candidates, f_name);
576 break;
577 }
578 }
579 }
580
Martin Koeglerba002f32008-02-25 22:46:08 +0100581 return c1 < c2 ? 0 : TREE_UNORDERED;
582}
583
Jeff King9e1947c2021-05-01 11:41:38 -0400584static int fsck_tree(const struct object_id *tree_oid,
Jeff King23a173a2019-10-18 00:54:12 -0400585 const char *buffer, unsigned long size,
586 struct fsck_options *options)
Martin Koeglerba002f32008-02-25 22:46:08 +0100587{
David Turner8354fa32016-09-27 16:59:51 -0400588 int retval = 0;
Jeff Kingc479d142012-07-28 11:06:29 -0400589 int has_null_sha1 = 0;
Martin Koeglerba002f32008-02-25 22:46:08 +0100590 int has_full_path = 0;
591 int has_empty_name = 0;
Jeff King5d34a432012-11-27 21:27:37 -0500592 int has_dot = 0;
593 int has_dotdot = 0;
Jeff King5c17f512012-11-28 16:35:29 -0500594 int has_dotgit = 0;
Martin Koeglerba002f32008-02-25 22:46:08 +0100595 int has_zero_pad = 0;
596 int has_bad_modes = 0;
597 int has_dup_entries = 0;
598 int not_properly_sorted = 0;
Jeff King0fbcaef2023-08-31 02:20:01 -0400599 int has_large_name = 0;
Martin Koeglerba002f32008-02-25 22:46:08 +0100600 struct tree_desc desc;
601 unsigned o_mode;
602 const char *o_name;
René Scharfe9068cfb2020-05-10 18:12:16 +0200603 struct name_stack df_dup_candidates = { NULL };
Martin Koeglerba002f32008-02-25 22:46:08 +0100604
Eric W. Biedermanefed6872023-10-01 21:40:28 -0500605 if (init_tree_desc_gently(&desc, tree_oid, buffer, size,
606 TREE_DESC_RAW_MODES)) {
Jeff King0282f672021-05-01 11:41:43 -0400607 retval += report(options, tree_oid, OBJ_TREE,
608 FSCK_MSG_BAD_TREE,
609 "cannot be parsed as a tree");
David Turner8354fa32016-09-27 16:59:51 -0400610 return retval;
611 }
Martin Koeglerba002f32008-02-25 22:46:08 +0100612
613 o_mode = 0;
614 o_name = NULL;
Martin Koeglerba002f32008-02-25 22:46:08 +0100615
616 while (desc.size) {
Elijah Newren5ec1e722019-04-05 08:00:12 -0700617 unsigned short mode;
Johannes Schindelin288a74b2019-09-23 08:58:11 +0200618 const char *name, *backslash;
Jeff King9e1947c2021-05-01 11:41:38 -0400619 const struct object_id *entry_oid;
Martin Koeglerba002f32008-02-25 22:46:08 +0100620
Jeff King9e1947c2021-05-01 11:41:38 -0400621 entry_oid = tree_entry_extract(&desc, &name, &mode);
Martin Koeglerba002f32008-02-25 22:46:08 +0100622
Jeff King9e1947c2021-05-01 11:41:38 -0400623 has_null_sha1 |= is_null_oid(entry_oid);
Hiroyuki Sanoeffd12e2014-03-20 08:02:04 +0900624 has_full_path |= !!strchr(name, '/');
625 has_empty_name |= !*name;
626 has_dot |= !strcmp(name, ".");
627 has_dotdot |= !strcmp(name, "..");
Jeff Kinged9c3222018-05-13 12:35:37 -0400628 has_dotgit |= is_hfs_dotgit(name) || is_ntfs_dotgit(name);
Martin Koeglerba002f32008-02-25 22:46:08 +0100629 has_zero_pad |= *(char *)desc.buffer == '0';
Jeff King0fbcaef2023-08-31 02:20:01 -0400630 has_large_name |= tree_entry_len(&desc.entry) > max_tree_entry_len;
Jeff King159e7b02018-05-02 17:20:08 -0400631
Jeff Kingb7b1fca2018-05-04 20:03:35 -0400632 if (is_hfs_dotgitmodules(name) || is_ntfs_dotgitmodules(name)) {
633 if (!S_ISLNK(mode))
Jeff King9e1947c2021-05-01 11:41:38 -0400634 oidset_insert(&options->gitmodules_found,
635 entry_oid);
Jeff Kingb7b1fca2018-05-04 20:03:35 -0400636 else
Jeff King38370252019-10-18 00:59:15 -0400637 retval += report(options,
Jeff King9e1947c2021-05-01 11:41:38 -0400638 tree_oid, OBJ_TREE,
Jeff Kingb7b1fca2018-05-04 20:03:35 -0400639 FSCK_MSG_GITMODULES_SYMLINK,
640 ".gitmodules is a symbolic link");
641 }
Jeff King159e7b02018-05-02 17:20:08 -0400642
Patrick Steinhardtf8587c32022-12-01 15:46:05 +0100643 if (is_hfs_dotgitattributes(name) || is_ntfs_dotgitattributes(name)) {
Patrick Steinhardt27ab4782022-12-01 15:46:09 +0100644 if (!S_ISLNK(mode))
645 oidset_insert(&options->gitattributes_found,
646 entry_oid);
647 else
Patrick Steinhardtf8587c32022-12-01 15:46:05 +0100648 retval += report(options, tree_oid, OBJ_TREE,
649 FSCK_MSG_GITATTRIBUTES_SYMLINK,
650 ".gitattributes is a symlink");
651 }
652
Jeff Kingbb6832d2021-05-03 16:43:25 -0400653 if (S_ISLNK(mode)) {
654 if (is_hfs_dotgitignore(name) ||
655 is_ntfs_dotgitignore(name))
656 retval += report(options, tree_oid, OBJ_TREE,
657 FSCK_MSG_GITIGNORE_SYMLINK,
658 ".gitignore is a symlink");
Jeff Kingbb6832d2021-05-03 16:43:25 -0400659 if (is_hfs_dotmailmap(name) ||
660 is_ntfs_dotmailmap(name))
661 retval += report(options, tree_oid, OBJ_TREE,
662 FSCK_MSG_MAILMAP_SYMLINK,
663 ".mailmap is a symlink");
664 }
665
Johannes Schindelin288a74b2019-09-23 08:58:11 +0200666 if ((backslash = strchr(name, '\\'))) {
667 while (backslash) {
668 backslash++;
669 has_dotgit |= is_ntfs_dotgit(backslash);
Johannes Schindelinbdfef042019-12-04 21:52:10 +0100670 if (is_ntfs_dotgitmodules(backslash)) {
671 if (!S_ISLNK(mode))
Jeff King9e1947c2021-05-01 11:41:38 -0400672 oidset_insert(&options->gitmodules_found,
673 entry_oid);
Johannes Schindelinbdfef042019-12-04 21:52:10 +0100674 else
Jeff King9e1947c2021-05-01 11:41:38 -0400675 retval += report(options, tree_oid, OBJ_TREE,
Johannes Schindelinbdfef042019-12-04 21:52:10 +0100676 FSCK_MSG_GITMODULES_SYMLINK,
677 ".gitmodules is a symbolic link");
678 }
Johannes Schindelin288a74b2019-09-23 08:58:11 +0200679 backslash = strchr(backslash, '\\');
680 }
681 }
682
David Turner8354fa32016-09-27 16:59:51 -0400683 if (update_tree_entry_gently(&desc)) {
Jeff King0282f672021-05-01 11:41:43 -0400684 retval += report(options, tree_oid, OBJ_TREE,
685 FSCK_MSG_BAD_TREE,
686 "cannot be parsed as a tree");
David Turner8354fa32016-09-27 16:59:51 -0400687 break;
688 }
Martin Koeglerba002f32008-02-25 22:46:08 +0100689
690 switch (mode) {
691 /*
692 * Standard modes..
693 */
694 case S_IFREG | 0755:
695 case S_IFREG | 0644:
696 case S_IFLNK:
697 case S_IFDIR:
698 case S_IFGITLINK:
699 break;
700 /*
701 * This is nonstandard, but we had a few of these
702 * early on when we honored the full set of mode
703 * bits..
704 */
705 case S_IFREG | 0664:
Johannes Schindelin22410542015-06-22 17:25:00 +0200706 if (!options->strict)
Martin Koeglerba002f32008-02-25 22:46:08 +0100707 break;
Jeff King1cf01a32017-09-21 02:25:41 -0400708 /* fallthrough */
Martin Koeglerba002f32008-02-25 22:46:08 +0100709 default:
710 has_bad_modes = 1;
711 }
712
713 if (o_name) {
René Scharfe9068cfb2020-05-10 18:12:16 +0200714 switch (verify_ordered(o_mode, o_name, mode, name,
715 &df_dup_candidates)) {
Martin Koeglerba002f32008-02-25 22:46:08 +0100716 case TREE_UNORDERED:
717 not_properly_sorted = 1;
718 break;
719 case TREE_HAS_DUPS:
720 has_dup_entries = 1;
721 break;
722 default:
723 break;
724 }
725 }
726
727 o_mode = mode;
728 o_name = name;
Martin Koeglerba002f32008-02-25 22:46:08 +0100729 }
730
René Scharfe9068cfb2020-05-10 18:12:16 +0200731 name_stack_clear(&df_dup_candidates);
732
Jeff Kingc479d142012-07-28 11:06:29 -0400733 if (has_null_sha1)
Jeff King0282f672021-05-01 11:41:43 -0400734 retval += report(options, tree_oid, OBJ_TREE,
735 FSCK_MSG_NULL_SHA1,
736 "contains entries pointing to null sha1");
Martin Koeglerba002f32008-02-25 22:46:08 +0100737 if (has_full_path)
Jeff King0282f672021-05-01 11:41:43 -0400738 retval += report(options, tree_oid, OBJ_TREE,
739 FSCK_MSG_FULL_PATHNAME,
740 "contains full pathnames");
Martin Koeglerba002f32008-02-25 22:46:08 +0100741 if (has_empty_name)
Jeff King0282f672021-05-01 11:41:43 -0400742 retval += report(options, tree_oid, OBJ_TREE,
743 FSCK_MSG_EMPTY_NAME,
744 "contains empty pathname");
Jeff King5d34a432012-11-27 21:27:37 -0500745 if (has_dot)
Jeff King0282f672021-05-01 11:41:43 -0400746 retval += report(options, tree_oid, OBJ_TREE,
747 FSCK_MSG_HAS_DOT,
748 "contains '.'");
Jeff King5d34a432012-11-27 21:27:37 -0500749 if (has_dotdot)
Jeff King0282f672021-05-01 11:41:43 -0400750 retval += report(options, tree_oid, OBJ_TREE,
751 FSCK_MSG_HAS_DOTDOT,
752 "contains '..'");
Jeff King5c17f512012-11-28 16:35:29 -0500753 if (has_dotgit)
Jeff King0282f672021-05-01 11:41:43 -0400754 retval += report(options, tree_oid, OBJ_TREE,
755 FSCK_MSG_HAS_DOTGIT,
756 "contains '.git'");
Martin Koeglerba002f32008-02-25 22:46:08 +0100757 if (has_zero_pad)
Jeff King0282f672021-05-01 11:41:43 -0400758 retval += report(options, tree_oid, OBJ_TREE,
759 FSCK_MSG_ZERO_PADDED_FILEMODE,
760 "contains zero-padded file modes");
Martin Koeglerba002f32008-02-25 22:46:08 +0100761 if (has_bad_modes)
Jeff King0282f672021-05-01 11:41:43 -0400762 retval += report(options, tree_oid, OBJ_TREE,
763 FSCK_MSG_BAD_FILEMODE,
764 "contains bad file modes");
Martin Koeglerba002f32008-02-25 22:46:08 +0100765 if (has_dup_entries)
Jeff King0282f672021-05-01 11:41:43 -0400766 retval += report(options, tree_oid, OBJ_TREE,
767 FSCK_MSG_DUPLICATE_ENTRIES,
768 "contains duplicate file entries");
Martin Koeglerba002f32008-02-25 22:46:08 +0100769 if (not_properly_sorted)
Jeff King0282f672021-05-01 11:41:43 -0400770 retval += report(options, tree_oid, OBJ_TREE,
771 FSCK_MSG_TREE_NOT_SORTED,
772 "not properly sorted");
Jeff King0fbcaef2023-08-31 02:20:01 -0400773 if (has_large_name)
774 retval += report(options, tree_oid, OBJ_TREE,
775 FSCK_MSG_LARGE_PATHNAME,
776 "contains excessively large pathname");
Martin Koeglerba002f32008-02-25 22:46:08 +0100777 return retval;
778}
779
Jeff King8e430902023-01-19 18:13:29 -0500780/*
781 * Confirm that the headers of a commit or tag object end in a reasonable way,
782 * either with the usual "\n\n" separator, or at least with a trailing newline
783 * on the final header line.
784 *
785 * This property is important for the memory safety of our callers. It allows
786 * them to scan the buffer linewise without constantly checking the remaining
787 * size as long as:
788 *
789 * - they check that there are bytes left in the buffer at the start of any
790 * line (i.e., that the last newline they saw was not the final one we
791 * found here)
792 *
793 * - any intra-line scanning they do will stop at a newline, which will worst
794 * case hit the newline we found here as the end-of-header. This makes it
795 * OK for them to use helpers like parse_oid_hex(), or even skip_prefix().
796 */
Junio C Hamano84d18c02015-06-28 11:18:31 -0700797static int verify_headers(const void *data, unsigned long size,
Jeff Kingcc579002019-10-18 01:00:50 -0400798 const struct object_id *oid, enum object_type type,
799 struct fsck_options *options)
Johannes Schindelin4d0d8972014-09-11 16:26:33 +0200800{
801 const char *buffer = (const char *)data;
802 unsigned long i;
803
804 for (i = 0; i < size; i++) {
805 switch (buffer[i]) {
806 case '\0':
Jeff Kingcc579002019-10-18 01:00:50 -0400807 return report(options, oid, type,
Johannes Schindelinc99ba492015-06-22 17:25:09 +0200808 FSCK_MSG_NUL_IN_HEADER,
809 "unterminated header: NUL at offset %ld", i);
Johannes Schindelin4d0d8972014-09-11 16:26:33 +0200810 case '\n':
811 if (i + 1 < size && buffer[i + 1] == '\n')
812 return 0;
813 }
814 }
815
Junio C Hamano84d18c02015-06-28 11:18:31 -0700816 /*
817 * We did not find double-LF that separates the header
818 * and the body. Not having a body is not a crime but
819 * we do want to see the terminating LF for the last header
820 * line.
821 */
822 if (size && buffer[size - 1] == '\n')
823 return 0;
824
Jeff Kingcc579002019-10-18 01:00:50 -0400825 return report(options, oid, type,
Johannes Schindelinc99ba492015-06-22 17:25:09 +0200826 FSCK_MSG_UNTERMINATED_HEADER, "unterminated header");
Johannes Schindelin4d0d8972014-09-11 16:26:33 +0200827}
828
Jeff King78543992019-10-18 01:00:04 -0400829static int fsck_ident(const char **ident,
830 const struct object_id *oid, enum object_type type,
831 struct fsck_options *options)
Jonathan Niederdaae1922010-04-24 11:06:08 -0500832{
Johannes Schindeline6826e32015-06-22 17:26:03 +0200833 const char *p = *ident;
Jeff Kingd4b8de02014-02-24 02:39:04 -0500834 char *end;
835
Johannes Schindeline6826e32015-06-22 17:26:03 +0200836 *ident = strchrnul(*ident, '\n');
837 if (**ident == '\n')
838 (*ident)++;
839
840 if (*p == '<')
Jeff King78543992019-10-18 01:00:04 -0400841 return report(options, oid, type, FSCK_MSG_MISSING_NAME_BEFORE_EMAIL, "invalid author/committer line - missing space before email");
Johannes Schindeline6826e32015-06-22 17:26:03 +0200842 p += strcspn(p, "<>\n");
843 if (*p == '>')
Jeff King78543992019-10-18 01:00:04 -0400844 return report(options, oid, type, FSCK_MSG_BAD_NAME, "invalid author/committer line - bad name");
Johannes Schindeline6826e32015-06-22 17:26:03 +0200845 if (*p != '<')
Jeff King78543992019-10-18 01:00:04 -0400846 return report(options, oid, type, FSCK_MSG_MISSING_EMAIL, "invalid author/committer line - missing email");
Johannes Schindeline6826e32015-06-22 17:26:03 +0200847 if (p[-1] != ' ')
Jeff King78543992019-10-18 01:00:04 -0400848 return report(options, oid, type, FSCK_MSG_MISSING_SPACE_BEFORE_EMAIL, "invalid author/committer line - missing space before email");
Johannes Schindeline6826e32015-06-22 17:26:03 +0200849 p++;
850 p += strcspn(p, "<>\n");
851 if (*p != '>')
Jeff King78543992019-10-18 01:00:04 -0400852 return report(options, oid, type, FSCK_MSG_BAD_EMAIL, "invalid author/committer line - bad email");
Johannes Schindeline6826e32015-06-22 17:26:03 +0200853 p++;
854 if (*p != ' ')
Jeff King78543992019-10-18 01:00:04 -0400855 return report(options, oid, type, FSCK_MSG_MISSING_SPACE_BEFORE_DATE, "invalid author/committer line - missing space before date");
Johannes Schindeline6826e32015-06-22 17:26:03 +0200856 p++;
Jeff King8e430902023-01-19 18:13:29 -0500857 /*
858 * Our timestamp parser is based on the C strto*() functions, which
859 * will happily eat whitespace, including the newline that is supposed
860 * to prevent us walking past the end of the buffer. So do our own
861 * scan, skipping linear whitespace but not newlines, and then
862 * confirming we found a digit. We _could_ be even more strict here,
863 * as we really expect only a single space, but since we have
864 * traditionally allowed extra whitespace, we'll continue to do so.
865 */
866 while (*p == ' ' || *p == '\t')
867 p++;
868 if (!isdigit(*p))
869 return report(options, oid, type, FSCK_MSG_BAD_DATE,
870 "invalid author/committer line - bad date");
Johannes Schindeline6826e32015-06-22 17:26:03 +0200871 if (*p == '0' && p[1] != ' ')
Jeff King78543992019-10-18 01:00:04 -0400872 return report(options, oid, type, FSCK_MSG_ZERO_PADDED_DATE, "invalid author/committer line - zero-padded date");
Johannes Schindelin1aeb7e72017-04-21 12:45:44 +0200873 if (date_overflows(parse_timestamp(p, &end, 10)))
Jeff King78543992019-10-18 01:00:04 -0400874 return report(options, oid, type, FSCK_MSG_BAD_DATE_OVERFLOW, "invalid author/committer line - date causes integer overflow");
Johannes Schindeline6826e32015-06-22 17:26:03 +0200875 if ((end == p || *end != ' '))
Jeff King78543992019-10-18 01:00:04 -0400876 return report(options, oid, type, FSCK_MSG_BAD_DATE, "invalid author/committer line - bad date");
Johannes Schindeline6826e32015-06-22 17:26:03 +0200877 p = end + 1;
878 if ((*p != '+' && *p != '-') ||
879 !isdigit(p[1]) ||
880 !isdigit(p[2]) ||
881 !isdigit(p[3]) ||
882 !isdigit(p[4]) ||
883 (p[5] != '\n'))
Jeff King78543992019-10-18 01:00:04 -0400884 return report(options, oid, type, FSCK_MSG_BAD_TIMEZONE, "invalid author/committer line - bad time zone");
Johannes Schindeline6826e32015-06-22 17:26:03 +0200885 p += 6;
Jonathan Niederdaae1922010-04-24 11:06:08 -0500886 return 0;
887}
888
Jeff Kingc5b42692019-10-18 01:01:48 -0400889static int fsck_commit(const struct object_id *oid,
890 const char *buffer, unsigned long size,
891 struct fsck_options *options)
Martin Koeglerba002f32008-02-25 22:46:08 +0100892{
Jeff Kingf648ee72019-10-18 01:00:59 -0400893 struct object_id tree_oid, parent_oid;
Jeff Kingec652312019-10-18 00:49:10 -0400894 unsigned author_count;
Jonathan Niederdaae1922010-04-24 11:06:08 -0500895 int err;
Junio C Hamano6d2d7802016-04-14 10:58:22 -0700896 const char *buffer_begin = buffer;
Jeff King8e430902023-01-19 18:13:29 -0500897 const char *buffer_end = buffer + size;
brian m. carlsonc54f5ca2018-05-02 00:25:41 +0000898 const char *p;
Martin Koeglerba002f32008-02-25 22:46:08 +0100899
Jeff King8e430902023-01-19 18:13:29 -0500900 /*
901 * We _must_ stop parsing immediately if this reports failure, as the
902 * memory safety of the rest of the function depends on it. See the
903 * comment above the definition of verify_headers() for more details.
904 */
Jeff Kingc5b42692019-10-18 01:01:48 -0400905 if (verify_headers(buffer, size, oid, OBJ_COMMIT, options))
Johannes Schindelin4d0d8972014-09-11 16:26:33 +0200906 return -1;
907
Jeff King8e430902023-01-19 18:13:29 -0500908 if (buffer >= buffer_end || !skip_prefix(buffer, "tree ", &buffer))
Jeff Kingc5b42692019-10-18 01:01:48 -0400909 return report(options, oid, OBJ_COMMIT, FSCK_MSG_MISSING_TREE, "invalid format - expected 'tree' line");
brian m. carlsonc54f5ca2018-05-02 00:25:41 +0000910 if (parse_oid_hex(buffer, &tree_oid, &p) || *p != '\n') {
Jeff Kingc5b42692019-10-18 01:01:48 -0400911 err = report(options, oid, OBJ_COMMIT, FSCK_MSG_BAD_TREE_SHA1, "invalid 'tree' line format - bad sha1");
Johannes Schindelinb3584762015-06-22 17:26:11 +0200912 if (err)
913 return err;
914 }
brian m. carlsonc54f5ca2018-05-02 00:25:41 +0000915 buffer = p + 1;
Jeff King8e430902023-01-19 18:13:29 -0500916 while (buffer < buffer_end && skip_prefix(buffer, "parent ", &buffer)) {
Jeff Kingf648ee72019-10-18 01:00:59 -0400917 if (parse_oid_hex(buffer, &parent_oid, &p) || *p != '\n') {
Jeff Kingc5b42692019-10-18 01:01:48 -0400918 err = report(options, oid, OBJ_COMMIT, FSCK_MSG_BAD_PARENT_SHA1, "invalid 'parent' line format - bad sha1");
Johannes Schindelinb3584762015-06-22 17:26:11 +0200919 if (err)
920 return err;
921 }
brian m. carlsonc54f5ca2018-05-02 00:25:41 +0000922 buffer = p + 1;
Martin Koeglerba002f32008-02-25 22:46:08 +0100923 }
Johannes Schindelinc9ad1472015-06-22 17:26:23 +0200924 author_count = 0;
Jeff King8e430902023-01-19 18:13:29 -0500925 while (buffer < buffer_end && skip_prefix(buffer, "author ", &buffer)) {
Johannes Schindelinc9ad1472015-06-22 17:26:23 +0200926 author_count++;
Jeff Kingc5b42692019-10-18 01:01:48 -0400927 err = fsck_ident(&buffer, oid, OBJ_COMMIT, options);
Johannes Schindelinc9ad1472015-06-22 17:26:23 +0200928 if (err)
929 return err;
930 }
931 if (author_count < 1)
Jeff Kingc5b42692019-10-18 01:01:48 -0400932 err = report(options, oid, OBJ_COMMIT, FSCK_MSG_MISSING_AUTHOR, "invalid format - expected 'author' line");
Johannes Schindelinc9ad1472015-06-22 17:26:23 +0200933 else if (author_count > 1)
Jeff Kingc5b42692019-10-18 01:01:48 -0400934 err = report(options, oid, OBJ_COMMIT, FSCK_MSG_MULTIPLE_AUTHORS, "invalid format - multiple 'author' lines");
Jonathan Niederdaae1922010-04-24 11:06:08 -0500935 if (err)
936 return err;
Jeff King8e430902023-01-19 18:13:29 -0500937 if (buffer >= buffer_end || !skip_prefix(buffer, "committer ", &buffer))
Jeff Kingc5b42692019-10-18 01:01:48 -0400938 return report(options, oid, OBJ_COMMIT, FSCK_MSG_MISSING_COMMITTER, "invalid format - expected 'committer' line");
939 err = fsck_ident(&buffer, oid, OBJ_COMMIT, options);
Jonathan Niederdaae1922010-04-24 11:06:08 -0500940 if (err)
941 return err;
Junio C Hamano6d2d7802016-04-14 10:58:22 -0700942 if (memchr(buffer_begin, '\0', size)) {
Jeff Kingc5b42692019-10-18 01:01:48 -0400943 err = report(options, oid, OBJ_COMMIT, FSCK_MSG_NUL_IN_COMMIT,
Junio C Hamano6d2d7802016-04-14 10:58:22 -0700944 "NUL byte in the commit object body");
945 if (err)
946 return err;
947 }
Martin Koeglerba002f32008-02-25 22:46:08 +0100948 return 0;
949}
950
Jeff King103fb6d2019-10-18 01:01:26 -0400951static int fsck_tag(const struct object_id *oid, const char *buffer,
Jeff King2175a0c2019-10-18 00:51:19 -0400952 unsigned long size, struct fsck_options *options)
Johannes Schindelincec097b2014-09-11 16:26:38 +0200953{
Jeff Kingf648ee72019-10-18 01:00:59 -0400954 struct object_id tagged_oid;
Ævar Arnfjörð Bjarmasonacf9de42021-01-05 20:42:46 +0100955 int tagged_type;
956 return fsck_tag_standalone(oid, buffer, size, options, &tagged_oid,
957 &tagged_type);
958}
959
960int fsck_tag_standalone(const struct object_id *oid, const char *buffer,
961 unsigned long size, struct fsck_options *options,
962 struct object_id *tagged_oid,
963 int *tagged_type)
964{
Johannes Schindelincec097b2014-09-11 16:26:38 +0200965 int ret = 0;
Jeff King23a173a2019-10-18 00:54:12 -0400966 char *eol;
Johannes Schindelincec097b2014-09-11 16:26:38 +0200967 struct strbuf sb = STRBUF_INIT;
Jeff King8e430902023-01-19 18:13:29 -0500968 const char *buffer_end = buffer + size;
brian m. carlsonc54f5ca2018-05-02 00:25:41 +0000969 const char *p;
Johannes Schindelincec097b2014-09-11 16:26:38 +0200970
Jeff King8e430902023-01-19 18:13:29 -0500971 /*
972 * We _must_ stop parsing immediately if this reports failure, as the
973 * memory safety of the rest of the function depends on it. See the
974 * comment above the definition of verify_headers() for more details.
975 */
Jeff King103fb6d2019-10-18 01:01:26 -0400976 ret = verify_headers(buffer, size, oid, OBJ_TAG, options);
René Scharfe8a272f22015-11-19 17:25:31 +0100977 if (ret)
Johannes Schindelincec097b2014-09-11 16:26:38 +0200978 goto done;
979
Jeff King8e430902023-01-19 18:13:29 -0500980 if (buffer >= buffer_end || !skip_prefix(buffer, "object ", &buffer)) {
Jeff King103fb6d2019-10-18 01:01:26 -0400981 ret = report(options, oid, OBJ_TAG, FSCK_MSG_MISSING_OBJECT, "invalid format - expected 'object' line");
Johannes Schindelincec097b2014-09-11 16:26:38 +0200982 goto done;
983 }
Ævar Arnfjörð Bjarmasonacf9de42021-01-05 20:42:46 +0100984 if (parse_oid_hex(buffer, tagged_oid, &p) || *p != '\n') {
Jeff King103fb6d2019-10-18 01:01:26 -0400985 ret = report(options, oid, OBJ_TAG, FSCK_MSG_BAD_OBJECT_SHA1, "invalid 'object' line format - bad sha1");
Johannes Schindelin7d7d5b02015-06-22 17:26:30 +0200986 if (ret)
987 goto done;
Johannes Schindelincec097b2014-09-11 16:26:38 +0200988 }
brian m. carlsonc54f5ca2018-05-02 00:25:41 +0000989 buffer = p + 1;
Johannes Schindelincec097b2014-09-11 16:26:38 +0200990
Jeff King8e430902023-01-19 18:13:29 -0500991 if (buffer >= buffer_end || !skip_prefix(buffer, "type ", &buffer)) {
Jeff King103fb6d2019-10-18 01:01:26 -0400992 ret = report(options, oid, OBJ_TAG, FSCK_MSG_MISSING_TYPE_ENTRY, "invalid format - expected 'type' line");
Johannes Schindelincec097b2014-09-11 16:26:38 +0200993 goto done;
994 }
Jeff King8e430902023-01-19 18:13:29 -0500995 eol = memchr(buffer, '\n', buffer_end - buffer);
Johannes Schindelincec097b2014-09-11 16:26:38 +0200996 if (!eol) {
Jeff King103fb6d2019-10-18 01:01:26 -0400997 ret = report(options, oid, OBJ_TAG, FSCK_MSG_MISSING_TYPE, "invalid format - unexpected end after 'type' line");
Johannes Schindelincec097b2014-09-11 16:26:38 +0200998 goto done;
999 }
Ævar Arnfjörð Bjarmasonacf9de42021-01-05 20:42:46 +01001000 *tagged_type = type_from_string_gently(buffer, eol - buffer, 1);
1001 if (*tagged_type < 0)
Jeff King103fb6d2019-10-18 01:01:26 -04001002 ret = report(options, oid, OBJ_TAG, FSCK_MSG_BAD_TYPE, "invalid 'type' value");
Johannes Schindelincec097b2014-09-11 16:26:38 +02001003 if (ret)
1004 goto done;
1005 buffer = eol + 1;
1006
Jeff King8e430902023-01-19 18:13:29 -05001007 if (buffer >= buffer_end || !skip_prefix(buffer, "tag ", &buffer)) {
Jeff King103fb6d2019-10-18 01:01:26 -04001008 ret = report(options, oid, OBJ_TAG, FSCK_MSG_MISSING_TAG_ENTRY, "invalid format - expected 'tag' line");
Johannes Schindelincec097b2014-09-11 16:26:38 +02001009 goto done;
1010 }
Jeff King8e430902023-01-19 18:13:29 -05001011 eol = memchr(buffer, '\n', buffer_end - buffer);
Johannes Schindelincec097b2014-09-11 16:26:38 +02001012 if (!eol) {
Jeff King103fb6d2019-10-18 01:01:26 -04001013 ret = report(options, oid, OBJ_TAG, FSCK_MSG_MISSING_TAG, "invalid format - unexpected end after 'type' line");
Johannes Schindelincec097b2014-09-11 16:26:38 +02001014 goto done;
1015 }
1016 strbuf_addf(&sb, "refs/tags/%.*s", (int)(eol - buffer), buffer);
Johannes Schindelinf27d05b2015-06-22 17:26:54 +02001017 if (check_refname_format(sb.buf, 0)) {
Jeff King103fb6d2019-10-18 01:01:26 -04001018 ret = report(options, oid, OBJ_TAG,
Jeff King38370252019-10-18 00:59:15 -04001019 FSCK_MSG_BAD_TAG_NAME,
1020 "invalid 'tag' name: %.*s",
1021 (int)(eol - buffer), buffer);
Johannes Schindelinf27d05b2015-06-22 17:26:54 +02001022 if (ret)
1023 goto done;
1024 }
Johannes Schindelincec097b2014-09-11 16:26:38 +02001025 buffer = eol + 1;
1026
Jeff King8e430902023-01-19 18:13:29 -05001027 if (buffer >= buffer_end || !skip_prefix(buffer, "tagger ", &buffer)) {
Johannes Schindelincec097b2014-09-11 16:26:38 +02001028 /* early tags do not contain 'tagger' lines; warn only */
Jeff King103fb6d2019-10-18 01:01:26 -04001029 ret = report(options, oid, OBJ_TAG, FSCK_MSG_MISSING_TAGGER_ENTRY, "invalid format - expected 'tagger' line");
Johannes Schindelinf27d05b2015-06-22 17:26:54 +02001030 if (ret)
1031 goto done;
1032 }
Johannes Schindelincec097b2014-09-11 16:26:38 +02001033 else
Jeff King103fb6d2019-10-18 01:01:26 -04001034 ret = fsck_ident(&buffer, oid, OBJ_TAG, options);
Johannes Schindelincec097b2014-09-11 16:26:38 +02001035
Jeff King8e430902023-01-19 18:13:29 -05001036 if (buffer < buffer_end && !starts_with(buffer, "\n")) {
Ævar Arnfjörð Bjarmasonacf9de42021-01-05 20:42:46 +01001037 /*
1038 * The verify_headers() check will allow
1039 * e.g. "[...]tagger <tagger>\nsome
1040 * garbage\n\nmessage" to pass, thinking "some
1041 * garbage" could be a custom header. E.g. "mktag"
1042 * doesn't want any unknown headers.
1043 */
1044 ret = report(options, oid, OBJ_TAG, FSCK_MSG_EXTRA_HEADER_ENTRY, "invalid format - extra header(s) after 'tagger'");
1045 if (ret)
1046 goto done;
1047 }
1048
Johannes Schindelincec097b2014-09-11 16:26:38 +02001049done:
1050 strbuf_release(&sb);
Johannes Schindelincec097b2014-09-11 16:26:38 +02001051 return ret;
1052}
1053
Jeff Kinged8b10f2018-05-02 17:25:27 -04001054struct fsck_gitmodules_data {
Jeff King6da40b22019-10-18 00:59:29 -04001055 const struct object_id *oid;
Jeff Kinged8b10f2018-05-02 17:25:27 -04001056 struct fsck_options *options;
1057 int ret;
1058};
1059
Glen Chooa4e7e312023-06-28 19:26:22 +00001060static int fsck_gitmodules_fn(const char *var, const char *value,
1061 const struct config_context *ctx UNUSED,
1062 void *vdata)
Jeff Kinged8b10f2018-05-02 17:25:27 -04001063{
1064 struct fsck_gitmodules_data *data = vdata;
1065 const char *subsection, *key;
Jeff Kingf5914f42020-04-10 15:44:28 -04001066 size_t subsection_len;
Jeff Kinged8b10f2018-05-02 17:25:27 -04001067 char *name;
1068
1069 if (parse_config_key(var, "submodule", &subsection, &subsection_len, &key) < 0 ||
1070 !subsection)
1071 return 0;
1072
1073 name = xmemdupz(subsection, subsection_len);
1074 if (check_submodule_name(name) < 0)
Jeff King38370252019-10-18 00:59:15 -04001075 data->ret |= report(data->options,
Jeff King6da40b22019-10-18 00:59:29 -04001076 data->oid, OBJ_BLOB,
Jeff Kinged8b10f2018-05-02 17:25:27 -04001077 FSCK_MSG_GITMODULES_NAME,
1078 "disallowed submodule name: %s",
1079 name);
Jeff Kinga1241332018-09-24 04:37:17 -04001080 if (!strcmp(key, "url") && value &&
Jeff King07259e72020-03-11 18:48:24 -04001081 check_submodule_url(value) < 0)
Jeff King38370252019-10-18 00:59:15 -04001082 data->ret |= report(data->options,
Jeff King6da40b22019-10-18 00:59:29 -04001083 data->oid, OBJ_BLOB,
Jeff Kinga1241332018-09-24 04:37:17 -04001084 FSCK_MSG_GITMODULES_URL,
1085 "disallowed submodule url: %s",
1086 value);
Jeff King1a7fd1f2018-09-24 04:42:19 -04001087 if (!strcmp(key, "path") && value &&
1088 looks_like_command_line_option(value))
Jeff King38370252019-10-18 00:59:15 -04001089 data->ret |= report(data->options,
Jeff King6da40b22019-10-18 00:59:29 -04001090 data->oid, OBJ_BLOB,
Jeff King1a7fd1f2018-09-24 04:42:19 -04001091 FSCK_MSG_GITMODULES_PATH,
1092 "disallowed submodule path: %s",
1093 value);
Jonathan Niederbb922552019-12-05 01:30:43 -08001094 if (!strcmp(key, "update") && value &&
1095 parse_submodule_update_type(value) == SM_UPDATE_COMMAND)
Junio C Hamano7034cd02019-12-09 22:17:55 -08001096 data->ret |= report(data->options, data->oid, OBJ_BLOB,
Jonathan Niederbb922552019-12-05 01:30:43 -08001097 FSCK_MSG_GITMODULES_UPDATE,
1098 "disallowed submodule update setting: %s",
1099 value);
Jeff Kinged8b10f2018-05-02 17:25:27 -04001100 free(name);
1101
1102 return 0;
1103}
1104
Jeff King6da40b22019-10-18 00:59:29 -04001105static int fsck_blob(const struct object_id *oid, const char *buf,
Jeff King7ac4f3a2018-05-02 15:44:51 -04001106 unsigned long size, struct fsck_options *options)
1107{
Patrick Steinhardtbb3a9262022-12-01 15:45:57 +01001108 int ret = 0;
Jeff Kinged8b10f2018-05-02 17:25:27 -04001109
Jeff King6da40b22019-10-18 00:59:29 -04001110 if (object_on_skiplist(options, oid))
Ramsay Jonesfb162872018-06-27 19:39:53 +01001111 return 0;
1112
Patrick Steinhardtbb3a9262022-12-01 15:45:57 +01001113 if (oidset_contains(&options->gitmodules_found, oid)) {
1114 struct config_options config_opts = { 0 };
1115 struct fsck_gitmodules_data data;
1116
1117 oidset_insert(&options->gitmodules_done, oid);
1118
1119 if (!buf) {
1120 /*
1121 * A missing buffer here is a sign that the caller found the
1122 * blob too gigantic to load into memory. Let's just consider
1123 * that an error.
1124 */
1125 return report(options, oid, OBJ_BLOB,
1126 FSCK_MSG_GITMODULES_LARGE,
1127 ".gitmodules too large to parse");
1128 }
1129
1130 data.oid = oid;
1131 data.options = options;
1132 data.ret = 0;
1133 config_opts.error_action = CONFIG_ERROR_SILENT;
1134 if (git_config_from_mem(fsck_gitmodules_fn, CONFIG_ORIGIN_BLOB,
Glen Choo809d8682023-06-28 19:26:24 +00001135 ".gitmodules", buf, size, &data,
1136 CONFIG_SCOPE_UNKNOWN, &config_opts))
Patrick Steinhardtbb3a9262022-12-01 15:45:57 +01001137 data.ret |= report(options, oid, OBJ_BLOB,
1138 FSCK_MSG_GITMODULES_PARSE,
1139 "could not parse gitmodules blob");
1140 ret |= data.ret;
Jeff Kinged8b10f2018-05-02 17:25:27 -04001141 }
1142
Patrick Steinhardt27ab4782022-12-01 15:46:09 +01001143 if (oidset_contains(&options->gitattributes_found, oid)) {
1144 const char *ptr;
Jeff Kinged8b10f2018-05-02 17:25:27 -04001145
Patrick Steinhardt27ab4782022-12-01 15:46:09 +01001146 oidset_insert(&options->gitattributes_done, oid);
1147
1148 if (!buf || size > ATTR_MAX_FILE_SIZE) {
1149 /*
1150 * A missing buffer here is a sign that the caller found the
1151 * blob too gigantic to load into memory. Let's just consider
1152 * that an error.
1153 */
1154 return report(options, oid, OBJ_BLOB,
1155 FSCK_MSG_GITATTRIBUTES_LARGE,
1156 ".gitattributes too large to parse");
1157 }
1158
1159 for (ptr = buf; *ptr; ) {
1160 const char *eol = strchrnul(ptr, '\n');
1161 if (eol - ptr >= ATTR_MAX_LINE_LENGTH) {
1162 ret |= report(options, oid, OBJ_BLOB,
1163 FSCK_MSG_GITATTRIBUTES_LINE_LENGTH,
1164 ".gitattributes has too long lines to parse");
1165 break;
1166 }
1167
1168 ptr = *eol ? eol + 1 : eol;
1169 }
1170 }
1171
Patrick Steinhardtbb3a9262022-12-01 15:45:57 +01001172 return ret;
Jeff King7ac4f3a2018-05-02 15:44:51 -04001173}
1174
Johannes Schindelin90a398b2014-09-10 15:52:51 +02001175int fsck_object(struct object *obj, void *data, unsigned long size,
Johannes Schindelin22410542015-06-22 17:25:00 +02001176 struct fsck_options *options)
Martin Koeglerba002f32008-02-25 22:46:08 +01001177{
1178 if (!obj)
Jeff King38370252019-10-18 00:59:15 -04001179 return report(options, NULL, OBJ_NONE, FSCK_MSG_BAD_OBJECT_SHA1, "no valid object to fsck");
Martin Koeglerba002f32008-02-25 22:46:08 +01001180
Jeff King35ff3272023-01-18 15:43:53 -05001181 return fsck_buffer(&obj->oid, obj->type, data, size, options);
1182}
Martin Koeglerba002f32008-02-25 22:46:08 +01001183
Jeff King35ff3272023-01-18 15:43:53 -05001184int fsck_buffer(const struct object_id *oid, enum object_type type,
Patrick Steinhardtb5670042024-06-07 08:37:39 +02001185 const void *data, unsigned long size,
Jeff King35ff3272023-01-18 15:43:53 -05001186 struct fsck_options *options)
1187{
1188 if (type == OBJ_BLOB)
1189 return fsck_blob(oid, data, size, options);
1190 if (type == OBJ_TREE)
1191 return fsck_tree(oid, data, size, options);
1192 if (type == OBJ_COMMIT)
1193 return fsck_commit(oid, data, size, options);
1194 if (type == OBJ_TAG)
1195 return fsck_tag(oid, data, size, options);
1196
1197 return report(options, oid, type,
Jeff King38370252019-10-18 00:59:15 -04001198 FSCK_MSG_UNKNOWN_TYPE,
1199 "unknown type '%d' (internal fsck error)",
Jeff King35ff3272023-01-18 15:43:53 -05001200 type);
Martin Koeglerba002f32008-02-25 22:46:08 +01001201}
Martin Koeglerd6ffc8d2008-02-25 22:46:09 +01001202
Johannes Schindelin1cd772c2016-07-17 12:59:57 +02001203int fsck_error_function(struct fsck_options *o,
Jeff King5afc4b12019-10-18 00:58:40 -04001204 const struct object_id *oid,
Jeff King0b4e9012023-07-03 02:44:18 -04001205 enum object_type object_type UNUSED,
Ævar Arnfjörð Bjarmason394d5d32021-03-28 15:15:46 +02001206 enum fsck_msg_type msg_type,
Jeff King0b4e9012023-07-03 02:44:18 -04001207 enum fsck_msg_id msg_id UNUSED,
Ævar Arnfjörð Bjarmason394d5d32021-03-28 15:15:46 +02001208 const char *message)
Martin Koeglerd6ffc8d2008-02-25 22:46:09 +01001209{
Johannes Schindelin0282f4d2015-06-22 17:25:25 +02001210 if (msg_type == FSCK_WARN) {
Jeff King5afc4b12019-10-18 00:58:40 -04001211 warning("object %s: %s", fsck_describe_object(o, oid), message);
Johannes Schindelin0282f4d2015-06-22 17:25:25 +02001212 return 0;
1213 }
Jeff King5afc4b12019-10-18 00:58:40 -04001214 error("object %s: %s", fsck_describe_object(o, oid), message);
Martin Koeglerd6ffc8d2008-02-25 22:46:09 +01001215 return 1;
1216}
Jeff King159e7b02018-05-02 17:20:08 -04001217
Patrick Steinhardta59a8c62022-12-01 15:46:01 +01001218static int fsck_blobs(struct oidset *blobs_found, struct oidset *blobs_done,
1219 enum fsck_msg_id msg_missing, enum fsck_msg_id msg_type,
1220 struct fsck_options *options, const char *blob_type)
Jeff King159e7b02018-05-02 17:20:08 -04001221{
1222 int ret = 0;
1223 struct oidset_iter iter;
1224 const struct object_id *oid;
1225
Patrick Steinhardta59a8c62022-12-01 15:46:01 +01001226 oidset_iter_init(blobs_found, &iter);
Jeff King159e7b02018-05-02 17:20:08 -04001227 while ((oid = oidset_iter_next(&iter))) {
Jeff King159e7b02018-05-02 17:20:08 -04001228 enum object_type type;
1229 unsigned long size;
1230 char *buf;
1231
Patrick Steinhardta59a8c62022-12-01 15:46:01 +01001232 if (oidset_contains(blobs_done, oid))
Jeff King159e7b02018-05-02 17:20:08 -04001233 continue;
1234
Ævar Arnfjörð Bjarmasonbc726bd2023-03-28 15:58:50 +02001235 buf = repo_read_object_file(the_repository, oid, &type, &size);
Jeff King159e7b02018-05-02 17:20:08 -04001236 if (!buf) {
Jeff Kingb8b00f12019-10-18 00:59:54 -04001237 if (is_promisor_object(oid))
Jeff King27387442018-05-14 12:22:48 -04001238 continue;
Jeff King38370252019-10-18 00:59:15 -04001239 ret |= report(options,
Patrick Steinhardta59a8c62022-12-01 15:46:01 +01001240 oid, OBJ_BLOB, msg_missing,
1241 "unable to read %s blob", blob_type);
Jeff King159e7b02018-05-02 17:20:08 -04001242 continue;
1243 }
1244
1245 if (type == OBJ_BLOB)
Jeff Kingb8b00f12019-10-18 00:59:54 -04001246 ret |= fsck_blob(oid, buf, size, options);
Jeff King159e7b02018-05-02 17:20:08 -04001247 else
Patrick Steinhardta59a8c62022-12-01 15:46:01 +01001248 ret |= report(options, oid, type, msg_type,
1249 "non-blob found at %s", blob_type);
Jeff King159e7b02018-05-02 17:20:08 -04001250 free(buf);
1251 }
1252
Patrick Steinhardta59a8c62022-12-01 15:46:01 +01001253 oidset_clear(blobs_found);
1254 oidset_clear(blobs_done);
Jeff King159e7b02018-05-02 17:20:08 -04001255
Patrick Steinhardta59a8c62022-12-01 15:46:01 +01001256 return ret;
1257}
1258
1259int fsck_finish(struct fsck_options *options)
1260{
1261 int ret = 0;
1262
1263 ret |= fsck_blobs(&options->gitmodules_found, &options->gitmodules_done,
1264 FSCK_MSG_GITMODULES_MISSING, FSCK_MSG_GITMODULES_BLOB,
1265 options, ".gitmodules");
Patrick Steinhardt27ab4782022-12-01 15:46:09 +01001266 ret |= fsck_blobs(&options->gitattributes_found, &options->gitattributes_done,
1267 FSCK_MSG_GITATTRIBUTES_MISSING, FSCK_MSG_GITATTRIBUTES_BLOB,
1268 options, ".gitattributes");
Patrick Steinhardta59a8c62022-12-01 15:46:01 +01001269
Jeff King159e7b02018-05-02 17:20:08 -04001270 return ret;
1271}
Ævar Arnfjörð Bjarmason1f3299f2021-01-05 20:42:47 +01001272
Glen Chooa4e7e312023-06-28 19:26:22 +00001273int git_fsck_config(const char *var, const char *value,
1274 const struct config_context *ctx, void *cb)
Ævar Arnfjörð Bjarmason1f3299f2021-01-05 20:42:47 +01001275{
Ævar Arnfjörð Bjarmasonfb79f5b2021-03-17 19:20:36 +01001276 struct fsck_options *options = cb;
Jeff Kingd49cb162023-12-07 02:11:35 -05001277 const char *msg_id;
1278
Ævar Arnfjörð Bjarmason1f3299f2021-01-05 20:42:47 +01001279 if (strcmp(var, "fsck.skiplist") == 0) {
Patrick Steinhardt6073b3b2024-05-27 13:46:15 +02001280 char *path;
Ævar Arnfjörð Bjarmason1f3299f2021-01-05 20:42:47 +01001281 struct strbuf sb = STRBUF_INIT;
1282
1283 if (git_config_pathname(&path, var, value))
1284 return 1;
1285 strbuf_addf(&sb, "skiplist=%s", path);
Patrick Steinhardt6073b3b2024-05-27 13:46:15 +02001286 free(path);
Ævar Arnfjörð Bjarmason1f3299f2021-01-05 20:42:47 +01001287 fsck_set_msg_types(options, sb.buf);
1288 strbuf_release(&sb);
1289 return 0;
1290 }
1291
Jeff Kingd49cb162023-12-07 02:11:35 -05001292 if (skip_prefix(var, "fsck.", &msg_id)) {
1293 if (!value)
1294 return config_error_nonbool(var);
1295 fsck_set_msg_type(options, msg_id, value);
Ævar Arnfjörð Bjarmason1f3299f2021-01-05 20:42:47 +01001296 return 0;
1297 }
1298
Glen Chooa4e7e312023-06-28 19:26:22 +00001299 return git_default_config(var, value, ctx, cb);
Ævar Arnfjörð Bjarmason1f3299f2021-01-05 20:42:47 +01001300}
Ævar Arnfjörð Bjarmason3745e262021-03-28 15:15:51 +02001301
1302/*
1303 * Custom error callbacks that are used in more than one place.
1304 */
1305
1306int fsck_error_cb_print_missing_gitmodules(struct fsck_options *o,
1307 const struct object_id *oid,
1308 enum object_type object_type,
1309 enum fsck_msg_type msg_type,
1310 enum fsck_msg_id msg_id,
1311 const char *message)
1312{
1313 if (msg_id == FSCK_MSG_GITMODULES_MISSING) {
1314 puts(oid_to_hex(oid));
1315 return 0;
1316 }
1317 return fsck_error_function(o, oid, object_type, msg_type, msg_id, message);
1318}