File: | build-scan/../src/tmpfiles/tmpfiles.c |
Warning: | line 1275, column 9 Value stored to 'fd' is never read |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | /* SPDX-License-Identifier: LGPL-2.1+ */ |
2 | |
3 | #include <errno(*__errno_location ()).h> |
4 | #include <fcntl.h> |
5 | #include <fnmatch.h> |
6 | #include <getopt.h> |
7 | #include <glob.h> |
8 | #include <limits.h> |
9 | #include <linux1/fs.h> |
10 | #include <stdbool.h> |
11 | #include <stddef.h> |
12 | #include <stdio.h> |
13 | #include <stdlib.h> |
14 | #include <string.h> |
15 | #include <sys/stat.h> |
16 | #include <sys/xattr.h> |
17 | #include <sysexits.h> |
18 | #include <time.h> |
19 | #include <unistd.h> |
20 | |
21 | #include "sd-path.h" |
22 | |
23 | #include "acl-util.h" |
24 | #include "alloc-util.h" |
25 | #include "btrfs-util.h" |
26 | #include "capability-util.h" |
27 | #include "chattr-util.h" |
28 | #include "conf-files.h" |
29 | #include "copy.h" |
30 | #include "def.h" |
31 | #include "dirent-util.h" |
32 | #include "escape.h" |
33 | #include "fd-util.h" |
34 | #include "fileio.h" |
35 | #include "format-util.h" |
36 | #include "fs-util.h" |
37 | #include "glob-util.h" |
38 | #include "io-util.h" |
39 | #include "label.h" |
40 | #include "log.h" |
41 | #include "macro.h" |
42 | #include "missing.h" |
43 | #include "mkdir.h" |
44 | #include "mount-util.h" |
45 | #include "pager.h" |
46 | #include "parse-util.h" |
47 | #include "path-lookup.h" |
48 | #include "path-util.h" |
49 | #include "rm-rf.h" |
50 | #include "selinux-util.h" |
51 | #include "set.h" |
52 | #include "specifier.h" |
53 | #include "stat-util.h" |
54 | #include "stdio-util.h" |
55 | #include "string-table.h" |
56 | #include "string-util.h" |
57 | #include "strv.h" |
58 | #include "terminal-util.h" |
59 | #include "umask-util.h" |
60 | #include "user-util.h" |
61 | #include "util.h" |
62 | |
63 | /* This reads all files listed in /etc/tmpfiles.d/?*.conf and creates |
64 | * them in the file system. This is intended to be used to create |
65 | * properly owned directories beneath /tmp, /var/tmp, /run, which are |
66 | * volatile and hence need to be recreated on bootup. */ |
67 | |
68 | typedef enum ItemType { |
69 | /* These ones take file names */ |
70 | CREATE_FILE = 'f', |
71 | TRUNCATE_FILE = 'F', |
72 | CREATE_DIRECTORY = 'd', |
73 | TRUNCATE_DIRECTORY = 'D', |
74 | CREATE_SUBVOLUME = 'v', |
75 | CREATE_SUBVOLUME_INHERIT_QUOTA = 'q', |
76 | CREATE_SUBVOLUME_NEW_QUOTA = 'Q', |
77 | CREATE_FIFO = 'p', |
78 | CREATE_SYMLINK = 'L', |
79 | CREATE_CHAR_DEVICE = 'c', |
80 | CREATE_BLOCK_DEVICE = 'b', |
81 | COPY_FILES = 'C', |
82 | |
83 | /* These ones take globs */ |
84 | WRITE_FILE = 'w', |
85 | EMPTY_DIRECTORY = 'e', |
86 | SET_XATTR = 't', |
87 | RECURSIVE_SET_XATTR = 'T', |
88 | SET_ACL = 'a', |
89 | RECURSIVE_SET_ACL = 'A', |
90 | SET_ATTRIBUTE = 'h', |
91 | RECURSIVE_SET_ATTRIBUTE = 'H', |
92 | IGNORE_PATH = 'x', |
93 | IGNORE_DIRECTORY_PATH = 'X', |
94 | REMOVE_PATH = 'r', |
95 | RECURSIVE_REMOVE_PATH = 'R', |
96 | RELABEL_PATH = 'z', |
97 | RECURSIVE_RELABEL_PATH = 'Z', |
98 | ADJUST_MODE = 'm', /* legacy, 'z' is identical to this */ |
99 | } ItemType; |
100 | |
101 | typedef struct Item { |
102 | ItemType type; |
103 | |
104 | char *path; |
105 | char *argument; |
106 | char **xattrs; |
107 | #if HAVE_ACL1 |
108 | acl_t acl_access; |
109 | acl_t acl_default; |
110 | #endif |
111 | uid_t uid; |
112 | gid_t gid; |
113 | mode_t mode; |
114 | usec_t age; |
115 | |
116 | dev_t major_minor; |
117 | unsigned attribute_value; |
118 | unsigned attribute_mask; |
119 | |
120 | bool_Bool uid_set:1; |
121 | bool_Bool gid_set:1; |
122 | bool_Bool mode_set:1; |
123 | bool_Bool age_set:1; |
124 | bool_Bool mask_perms:1; |
125 | bool_Bool attribute_set:1; |
126 | |
127 | bool_Bool keep_first_level:1; |
128 | |
129 | bool_Bool force:1; |
130 | |
131 | bool_Bool done:1; |
132 | } Item; |
133 | |
134 | typedef struct ItemArray { |
135 | Item *items; |
136 | size_t count; |
137 | size_t size; |
138 | } ItemArray; |
139 | |
140 | typedef enum DirectoryType { |
141 | DIRECTORY_RUNTIME = 0, |
142 | DIRECTORY_STATE, |
143 | DIRECTORY_CACHE, |
144 | DIRECTORY_LOGS, |
145 | _DIRECTORY_TYPE_MAX, |
146 | } DirectoryType; |
147 | |
148 | static bool_Bool arg_cat_config = false0; |
149 | static bool_Bool arg_user = false0; |
150 | static bool_Bool arg_create = false0; |
151 | static bool_Bool arg_clean = false0; |
152 | static bool_Bool arg_remove = false0; |
153 | static bool_Bool arg_boot = false0; |
154 | static bool_Bool arg_no_pager = false0; |
155 | |
156 | static char **arg_include_prefixes = NULL((void*)0); |
157 | static char **arg_exclude_prefixes = NULL((void*)0); |
158 | static char *arg_root = NULL((void*)0); |
159 | static char *arg_replace = NULL((void*)0); |
160 | |
161 | #define MAX_DEPTH256 256 |
162 | |
163 | static OrderedHashmap *items = NULL((void*)0), *globs = NULL((void*)0); |
164 | static Set *unix_sockets = NULL((void*)0); |
165 | |
166 | static int specifier_machine_id_safe(char specifier, void *data, void *userdata, char **ret); |
167 | static int specifier_directory(char specifier, void *data, void *userdata, char **ret); |
168 | |
169 | static const Specifier specifier_table[] = { |
170 | { 'm', specifier_machine_id_safe, NULL((void*)0) }, |
171 | { 'b', specifier_boot_id, NULL((void*)0) }, |
172 | { 'H', specifier_host_name, NULL((void*)0) }, |
173 | { 'v', specifier_kernel_release, NULL((void*)0) }, |
174 | |
175 | { 'U', specifier_user_id, NULL((void*)0) }, |
176 | { 'u', specifier_user_name, NULL((void*)0) }, |
177 | { 'h', specifier_user_home, NULL((void*)0) }, |
178 | |
179 | { 't', specifier_directory, UINT_TO_PTR(DIRECTORY_RUNTIME)((void *) ((uintptr_t) (DIRECTORY_RUNTIME))) }, |
180 | { 'S', specifier_directory, UINT_TO_PTR(DIRECTORY_STATE)((void *) ((uintptr_t) (DIRECTORY_STATE))) }, |
181 | { 'C', specifier_directory, UINT_TO_PTR(DIRECTORY_CACHE)((void *) ((uintptr_t) (DIRECTORY_CACHE))) }, |
182 | { 'L', specifier_directory, UINT_TO_PTR(DIRECTORY_LOGS)((void *) ((uintptr_t) (DIRECTORY_LOGS))) }, |
183 | { 'T', specifier_tmp_dir, NULL((void*)0) }, |
184 | { 'V', specifier_var_tmp_dir, NULL((void*)0) }, |
185 | {} |
186 | }; |
187 | |
188 | static int specifier_machine_id_safe(char specifier, void *data, void *userdata, char **ret) { |
189 | int r; |
190 | |
191 | /* If /etc/machine_id is missing or empty (e.g. in a chroot environment) |
192 | * return a recognizable error so that the caller can skip the rule |
193 | * gracefully. */ |
194 | |
195 | r = specifier_machine_id(specifier, data, userdata, ret); |
196 | if (IN_SET(r, -ENOENT, -ENOMEDIUM)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-2, -123})/sizeof(int)]; switch(r) { case -2: case -123: _found = 1; break; default: break; } _found; } )) |
197 | return -ENXIO6; |
198 | |
199 | return r; |
200 | } |
201 | |
202 | static int specifier_directory(char specifier, void *data, void *userdata, char **ret) { |
203 | struct table_entry { |
204 | uint64_t type; |
205 | const char *suffix; |
206 | }; |
207 | |
208 | static const struct table_entry paths_system[] = { |
209 | [DIRECTORY_RUNTIME] = { SD_PATH_SYSTEM_RUNTIME }, |
210 | [DIRECTORY_STATE] = { SD_PATH_SYSTEM_STATE_PRIVATE }, |
211 | [DIRECTORY_CACHE] = { SD_PATH_SYSTEM_STATE_CACHE }, |
212 | [DIRECTORY_LOGS] = { SD_PATH_SYSTEM_STATE_LOGS }, |
213 | }; |
214 | |
215 | static const struct table_entry paths_user[] = { |
216 | [DIRECTORY_RUNTIME] = { SD_PATH_USER_RUNTIME }, |
217 | [DIRECTORY_STATE] = { SD_PATH_USER_CONFIGURATION }, |
218 | [DIRECTORY_CACHE] = { SD_PATH_USER_STATE_CACHE }, |
219 | [DIRECTORY_LOGS] = { SD_PATH_USER_CONFIGURATION, "log" }, |
220 | }; |
221 | |
222 | unsigned i; |
223 | const struct table_entry *paths; |
224 | |
225 | assert_cc(ELEMENTSOF(paths_system) == ELEMENTSOF(paths_user))GCC diagnostic push
; GCC diagnostic ignored "-Wdeclaration-after-statement" ; struct _assert_struct_11 { char x[(__extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(paths_system), typeof( &*(paths_system))), sizeof(paths_system)/sizeof((paths_system )[0]), ((void)0))) == __extension__ (__builtin_choose_expr( ! __builtin_types_compatible_p(typeof(paths_user), typeof(& *(paths_user))), sizeof(paths_user)/sizeof((paths_user)[0]), ( (void)0)))) ? 0 : -1]; }; GCC diagnostic pop ; |
226 | paths = arg_user ? paths_user : paths_system; |
227 | |
228 | i = PTR_TO_UINT(data)((unsigned int) ((uintptr_t) (data))); |
229 | assert(i < ELEMENTSOF(paths_system))do { if ((__builtin_expect(!!(!(i < __extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(paths_system), typeof( &*(paths_system))), sizeof(paths_system)/sizeof((paths_system )[0]), ((void)0))))),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("i < ELEMENTSOF(paths_system)"), "../src/tmpfiles/tmpfiles.c" , 229, __PRETTY_FUNCTION__); } while (0); |
230 | |
231 | return sd_path_home(paths[i].type, paths[i].suffix, ret); |
232 | } |
233 | |
234 | static int log_unresolvable_specifier(const char *filename, unsigned line) { |
235 | static bool_Bool notified = false0; |
236 | |
237 | /* In system mode, this is called when /etc is not fully initialized (e.g. |
238 | * in a chroot environment) where some specifiers are unresolvable. In user |
239 | * mode, this is called when some variables are not defined. These cases are |
240 | * not considered as an error so log at LOG_NOTICE only for the first time |
241 | * and then downgrade this to LOG_DEBUG for the rest. */ |
242 | |
243 | log_full(notified ? LOG_DEBUG : LOG_NOTICE,({ int _level = (((notified ? 7 : 5))), _e = ((0)), _realm = ( LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= (( _level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 246, __func__ , "[%s:%u] Failed to resolve specifier: %s, skipping", filename , line, arg_user ? "Required $XDG_... variable not defined" : "uninitialized /etc detected") : -abs(_e); }) |
244 | "[%s:%u] Failed to resolve specifier: %s, skipping",({ int _level = (((notified ? 7 : 5))), _e = ((0)), _realm = ( LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= (( _level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 246, __func__ , "[%s:%u] Failed to resolve specifier: %s, skipping", filename , line, arg_user ? "Required $XDG_... variable not defined" : "uninitialized /etc detected") : -abs(_e); }) |
245 | filename, line,({ int _level = (((notified ? 7 : 5))), _e = ((0)), _realm = ( LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= (( _level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 246, __func__ , "[%s:%u] Failed to resolve specifier: %s, skipping", filename , line, arg_user ? "Required $XDG_... variable not defined" : "uninitialized /etc detected") : -abs(_e); }) |
246 | arg_user ? "Required $XDG_... variable not defined" : "uninitialized /etc detected")({ int _level = (((notified ? 7 : 5))), _e = ((0)), _realm = ( LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= (( _level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 246, __func__ , "[%s:%u] Failed to resolve specifier: %s, skipping", filename , line, arg_user ? "Required $XDG_... variable not defined" : "uninitialized /etc detected") : -abs(_e); }); |
247 | |
248 | if (!notified) |
249 | log_notice("All rules containing unresolvable specifiers will be skipped.")({ int _level = (((5))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 249, __func__, "All rules containing unresolvable specifiers will be skipped." ) : -abs(_e); }); |
250 | |
251 | notified = true1; |
252 | return 0; |
253 | } |
254 | |
255 | static int user_config_paths(char*** ret) { |
256 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **config_dirs = NULL((void*)0), **data_dirs = NULL((void*)0); |
257 | _cleanup_free___attribute__((cleanup(freep))) char *persistent_config = NULL((void*)0), *runtime_config = NULL((void*)0), *data_home = NULL((void*)0); |
258 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **res = NULL((void*)0); |
259 | int r; |
260 | |
261 | r = xdg_user_dirs(&config_dirs, &data_dirs); |
262 | if (r < 0) |
263 | return r; |
264 | |
265 | r = xdg_user_config_dir(&persistent_config, "/user-tmpfiles.d"); |
266 | if (r < 0 && r != -ENXIO6) |
267 | return r; |
268 | |
269 | r = xdg_user_runtime_dir(&runtime_config, "/user-tmpfiles.d"); |
270 | if (r < 0 && r != -ENXIO6) |
271 | return r; |
272 | |
273 | r = xdg_user_data_dir(&data_home, "/user-tmpfiles.d"); |
274 | if (r < 0 && r != -ENXIO6) |
275 | return r; |
276 | |
277 | r = strv_extend_strv_concat(&res, config_dirs, "/user-tmpfiles.d"); |
278 | if (r < 0) |
279 | return r; |
280 | |
281 | r = strv_extend(&res, persistent_config); |
282 | if (r < 0) |
283 | return r; |
284 | |
285 | r = strv_extend(&res, runtime_config); |
286 | if (r < 0) |
287 | return r; |
288 | |
289 | r = strv_extend(&res, data_home); |
290 | if (r < 0) |
291 | return r; |
292 | |
293 | r = strv_extend_strv_concat(&res, data_dirs, "/user-tmpfiles.d"); |
294 | if (r < 0) |
295 | return r; |
296 | |
297 | r = path_strv_make_absolute_cwd(res); |
298 | if (r < 0) |
299 | return r; |
300 | |
301 | *ret = TAKE_PTR(res)({ typeof(res) _ptr_ = (res); (res) = ((void*)0); _ptr_; }); |
302 | return 0; |
303 | } |
304 | |
305 | static bool_Bool needs_glob(ItemType t) { |
306 | return IN_SET(t,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
307 | WRITE_FILE,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
308 | IGNORE_PATH,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
309 | IGNORE_DIRECTORY_PATH,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
310 | REMOVE_PATH,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
311 | RECURSIVE_REMOVE_PATH,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
312 | EMPTY_DIRECTORY,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
313 | ADJUST_MODE,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
314 | RELABEL_PATH,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
315 | RECURSIVE_RELABEL_PATH,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
316 | SET_XATTR,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
317 | RECURSIVE_SET_XATTR,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
318 | SET_ACL,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
319 | RECURSIVE_SET_ACL,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
320 | SET_ATTRIBUTE,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
321 | RECURSIVE_SET_ATTRIBUTE)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }); |
322 | } |
323 | |
324 | static bool_Bool takes_ownership(ItemType t) { |
325 | return IN_SET(t,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
326 | CREATE_FILE,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
327 | TRUNCATE_FILE,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
328 | CREATE_DIRECTORY,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
329 | EMPTY_DIRECTORY,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
330 | TRUNCATE_DIRECTORY,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
331 | CREATE_SUBVOLUME,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
332 | CREATE_SUBVOLUME_INHERIT_QUOTA,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
333 | CREATE_SUBVOLUME_NEW_QUOTA,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
334 | CREATE_FIFO,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
335 | CREATE_SYMLINK,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
336 | CREATE_CHAR_DEVICE,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
337 | CREATE_BLOCK_DEVICE,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
338 | COPY_FILES,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
339 | WRITE_FILE,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
340 | IGNORE_PATH,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
341 | IGNORE_DIRECTORY_PATH,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
342 | REMOVE_PATH,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
343 | RECURSIVE_REMOVE_PATH)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }); |
344 | } |
345 | |
346 | static struct Item* find_glob(OrderedHashmap *h, const char *match) { |
347 | ItemArray *j; |
348 | Iterator i; |
349 | |
350 | ORDERED_HASHMAP_FOREACH(j, h, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); ordered_hashmap_iterate((h), &( i), (void**)&(j), ((void*)0)); ) { |
351 | unsigned n; |
352 | |
353 | for (n = 0; n < j->count; n++) { |
354 | Item *item = j->items + n; |
355 | |
356 | if (fnmatch(item->path, match, FNM_PATHNAME(1 << 0)|FNM_PERIOD(1 << 2)) == 0) |
357 | return item; |
358 | } |
359 | } |
360 | |
361 | return NULL((void*)0); |
362 | } |
363 | |
364 | static void load_unix_sockets(void) { |
365 | _cleanup_fclose___attribute__((cleanup(fclosep))) FILE *f = NULL((void*)0); |
366 | int r; |
367 | |
368 | if (unix_sockets) |
369 | return; |
370 | |
371 | /* We maintain a cache of the sockets we found in /proc/net/unix to speed things up a little. */ |
372 | |
373 | unix_sockets = set_new(&path_hash_ops)internal_set_new(&path_hash_ops ); |
374 | if (!unix_sockets) { |
375 | log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 375, __func__); |
376 | return; |
377 | } |
378 | |
379 | f = fopen("/proc/net/unix", "re"); |
380 | if (!f) { |
381 | log_full_errno(errno == ENOENT ? LOG_DEBUG : LOG_WARNING, errno,({ int _level = (((*__errno_location ()) == 2 ? 7 : 4)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c" , 382, __func__, "Failed to open /proc/net/unix, ignoring: %m" ) : -abs(_e); }) |
382 | "Failed to open /proc/net/unix, ignoring: %m")({ int _level = (((*__errno_location ()) == 2 ? 7 : 4)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c" , 382, __func__, "Failed to open /proc/net/unix, ignoring: %m" ) : -abs(_e); }); |
383 | goto fail; |
384 | } |
385 | |
386 | /* Skip header */ |
387 | r = read_line(f, LONG_LINE_MAX(1U*1024U*1024U), NULL((void*)0)); |
388 | if (r < 0) { |
389 | log_warning_errno(r, "Failed to skip /proc/net/unix header line: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 389, __func__, "Failed to skip /proc/net/unix header line: %m" ) : -abs(_e); }); |
390 | goto fail; |
391 | } |
392 | if (r == 0) { |
393 | log_warning("Premature end of file reading /proc/net/unix.")({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 393, __func__, "Premature end of file reading /proc/net/unix." ) : -abs(_e); }); |
394 | goto fail; |
395 | } |
396 | |
397 | for (;;) { |
398 | _cleanup_free___attribute__((cleanup(freep))) char *line = NULL((void*)0); |
399 | char *p, *s; |
400 | |
401 | r = read_line(f, LONG_LINE_MAX(1U*1024U*1024U), &line); |
402 | if (r < 0) { |
403 | log_warning_errno(r, "Failed to read /proc/net/unix line, ignoring: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 403, __func__, "Failed to read /proc/net/unix line, ignoring: %m" ) : -abs(_e); }); |
404 | goto fail; |
405 | } |
406 | if (r == 0) /* EOF */ |
407 | break; |
408 | |
409 | p = strchr(line, ':'); |
410 | if (!p) |
411 | continue; |
412 | |
413 | if (strlen(p) < 37) |
414 | continue; |
415 | |
416 | p += 37; |
417 | p += strspn(p, WHITESPACE" \t\n\r"); |
418 | p += strcspn(p, WHITESPACE" \t\n\r"); /* skip one more word */ |
419 | p += strspn(p, WHITESPACE" \t\n\r"); |
420 | |
421 | if (*p != '/') |
422 | continue; |
423 | |
424 | s = strdup(p); |
425 | if (!s) { |
426 | log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 426, __func__); |
427 | goto fail; |
428 | } |
429 | |
430 | path_simplify(s, false0); |
431 | |
432 | r = set_consume(unix_sockets, s); |
433 | if (r < 0 && r != -EEXIST17) { |
434 | log_warning_errno(r, "Failed to add AF_UNIX socket to set, ignoring: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 434, __func__, "Failed to add AF_UNIX socket to set, ignoring: %m" ) : -abs(_e); }); |
435 | goto fail; |
436 | } |
437 | } |
438 | |
439 | return; |
440 | |
441 | fail: |
442 | unix_sockets = set_free_free(unix_sockets); |
443 | } |
444 | |
445 | static bool_Bool unix_socket_alive(const char *fn) { |
446 | assert(fn)do { if ((__builtin_expect(!!(!(fn)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fn"), "../src/tmpfiles/tmpfiles.c", 446 , __PRETTY_FUNCTION__); } while (0); |
447 | |
448 | load_unix_sockets(); |
449 | |
450 | if (unix_sockets) |
451 | return !!set_get(unix_sockets, (char*) fn); |
452 | |
453 | /* We don't know, so assume yes */ |
454 | return true1; |
455 | } |
456 | |
457 | static int dir_is_mount_point(DIR *d, const char *subdir) { |
458 | |
459 | int mount_id_parent, mount_id; |
460 | int r_p, r; |
461 | |
462 | r_p = name_to_handle_at_loop(dirfd(d), ".", NULL((void*)0), &mount_id_parent, 0); |
463 | if (r_p < 0) |
464 | r_p = -errno(*__errno_location ()); |
465 | |
466 | r = name_to_handle_at_loop(dirfd(d), subdir, NULL((void*)0), &mount_id, 0); |
467 | if (r < 0) |
468 | r = -errno(*__errno_location ()); |
469 | |
470 | /* got no handle; make no assumptions, return error */ |
471 | if (r_p < 0 && r < 0) |
472 | return r_p; |
473 | |
474 | /* got both handles; if they differ, it is a mount point */ |
475 | if (r_p >= 0 && r >= 0) |
476 | return mount_id_parent != mount_id; |
477 | |
478 | /* got only one handle; assume different mount points if one |
479 | * of both queries was not supported by the filesystem */ |
480 | if (IN_SET(r_p, -ENOSYS, -EOPNOTSUPP)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-38, -95})/sizeof(int)]; switch(r_p) { case -38: case -95: _found = 1; break; default: break; } _found; } ) || IN_SET(r, -ENOSYS, -EOPNOTSUPP)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-38, -95})/sizeof(int)]; switch(r) { case -38: case -95: _found = 1; break; default: break; } _found; } )) |
481 | return true1; |
482 | |
483 | /* return error */ |
484 | if (r_p < 0) |
485 | return r_p; |
486 | return r; |
487 | } |
488 | |
489 | static DIR* xopendirat_nomod(int dirfd, const char *path) { |
490 | DIR *dir; |
491 | |
492 | dir = xopendirat(dirfd, path, O_NOFOLLOW0400000|O_NOATIME01000000); |
493 | if (dir) |
494 | return dir; |
495 | |
496 | log_debug_errno(errno, "Cannot open %sdirectory \"%s\": %m", dirfd == AT_FDCWD ? "" : "sub", path)({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 496, __func__ , "Cannot open %sdirectory \"%s\": %m", dirfd == -100 ? "" : "sub" , path) : -abs(_e); }); |
497 | if (errno(*__errno_location ()) != EPERM1) |
498 | return NULL((void*)0); |
499 | |
500 | dir = xopendirat(dirfd, path, O_NOFOLLOW0400000); |
501 | if (!dir) |
502 | log_debug_errno(errno, "Cannot open %sdirectory \"%s\": %m", dirfd == AT_FDCWD ? "" : "sub", path)({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 502, __func__ , "Cannot open %sdirectory \"%s\": %m", dirfd == -100 ? "" : "sub" , path) : -abs(_e); }); |
503 | |
504 | return dir; |
505 | } |
506 | |
507 | static DIR* opendir_nomod(const char *path) { |
508 | return xopendirat_nomod(AT_FDCWD-100, path); |
509 | } |
510 | |
511 | static int dir_cleanup( |
512 | Item *i, |
513 | const char *p, |
514 | DIR *d, |
515 | const struct stat *ds, |
516 | usec_t cutoff, |
517 | dev_t rootdev, |
518 | bool_Bool mountpoint, |
519 | int maxdepth, |
520 | bool_Bool keep_this_level) { |
521 | |
522 | struct dirent *dent; |
523 | struct timespec times[2]; |
524 | bool_Bool deleted = false0; |
525 | int r = 0; |
526 | |
527 | FOREACH_DIRENT_ALL(dent, d, break)for ((*__errno_location ()) = 0, dent = readdir(d);; (*__errno_location ()) = 0, dent = readdir(d)) if (!dent) { if ((*__errno_location ()) > 0) { break; } break; } else { |
528 | struct stat s; |
529 | usec_t age; |
530 | _cleanup_free___attribute__((cleanup(freep))) char *sub_path = NULL((void*)0); |
531 | |
532 | if (dot_or_dot_dot(dent->d_name)) |
533 | continue; |
534 | |
535 | if (fstatat(dirfd(d), dent->d_name, &s, AT_SYMLINK_NOFOLLOW0x100) < 0) { |
536 | if (errno(*__errno_location ()) == ENOENT2) |
537 | continue; |
538 | |
539 | /* FUSE, NFS mounts, SELinux might return EACCES */ |
540 | r = log_full_errno(errno == EACCES ? LOG_DEBUG : LOG_ERR, errno,({ int _level = (((*__errno_location ()) == 13 ? 7 : 3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c" , 541, __func__, "stat(%s/%s) failed: %m", p, dent->d_name ) : -abs(_e); }) |
541 | "stat(%s/%s) failed: %m", p, dent->d_name)({ int _level = (((*__errno_location ()) == 13 ? 7 : 3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c" , 541, __func__, "stat(%s/%s) failed: %m", p, dent->d_name ) : -abs(_e); }); |
542 | continue; |
543 | } |
544 | |
545 | /* Stay on the same filesystem */ |
546 | if (s.st_dev != rootdev) { |
547 | log_debug("Ignoring \"%s/%s\": different filesystem.", p, dent->d_name)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 547, __func__, "Ignoring \"%s/%s\": different filesystem." , p, dent->d_name) : -abs(_e); }); |
548 | continue; |
549 | } |
550 | |
551 | /* Try to detect bind mounts of the same filesystem instance; they |
552 | * do not differ in device major/minors. This type of query is not |
553 | * supported on all kernels or filesystem types though. */ |
554 | if (S_ISDIR(s.st_mode)((((s.st_mode)) & 0170000) == (0040000)) && dir_is_mount_point(d, dent->d_name) > 0) { |
555 | log_debug("Ignoring \"%s/%s\": different mount of the same filesystem.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 556, __func__, "Ignoring \"%s/%s\": different mount of the same filesystem." , p, dent->d_name) : -abs(_e); }) |
556 | p, dent->d_name)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 556, __func__, "Ignoring \"%s/%s\": different mount of the same filesystem." , p, dent->d_name) : -abs(_e); }); |
557 | continue; |
558 | } |
559 | |
560 | sub_path = strjoin(p, "/", dent->d_name)strjoin_real((p), "/", dent->d_name, ((void*)0)); |
561 | if (!sub_path) { |
562 | r = log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 562, __func__); |
563 | goto finish; |
564 | } |
565 | |
566 | /* Is there an item configured for this path? */ |
567 | if (ordered_hashmap_get(items, sub_path)) { |
568 | log_debug("Ignoring \"%s\": a separate entry exists.", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 568, __func__, "Ignoring \"%s\": a separate entry exists." , sub_path) : -abs(_e); }); |
569 | continue; |
570 | } |
571 | |
572 | if (find_glob(globs, sub_path)) { |
573 | log_debug("Ignoring \"%s\": a separate glob exists.", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 573, __func__, "Ignoring \"%s\": a separate glob exists." , sub_path) : -abs(_e); }); |
574 | continue; |
575 | } |
576 | |
577 | if (S_ISDIR(s.st_mode)((((s.st_mode)) & 0170000) == (0040000))) { |
578 | |
579 | if (mountpoint && |
580 | streq(dent->d_name, "lost+found")(strcmp((dent->d_name),("lost+found")) == 0) && |
581 | s.st_uid == 0) { |
582 | log_debug("Ignoring \"%s\".", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 582, __func__, "Ignoring \"%s\"." , sub_path) : -abs(_e); }); |
583 | continue; |
584 | } |
585 | |
586 | if (maxdepth <= 0) |
587 | log_warning("Reached max depth on \"%s\".", sub_path)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 587, __func__, "Reached max depth on \"%s\"." , sub_path) : -abs(_e); }); |
588 | else { |
589 | _cleanup_closedir___attribute__((cleanup(closedirp))) DIR *sub_dir; |
590 | int q; |
591 | |
592 | sub_dir = xopendirat_nomod(dirfd(d), dent->d_name); |
593 | if (!sub_dir) { |
594 | if (errno(*__errno_location ()) != ENOENT2) |
595 | r = log_error_errno(errno, "opendir(%s) failed: %m", sub_path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 595, __func__ , "opendir(%s) failed: %m", sub_path) : -abs(_e); }); |
596 | |
597 | continue; |
598 | } |
599 | |
600 | q = dir_cleanup(i, sub_path, sub_dir, &s, cutoff, rootdev, false0, maxdepth-1, false0); |
601 | if (q < 0) |
602 | r = q; |
603 | } |
604 | |
605 | /* Note: if you are wondering why we don't |
606 | * support the sticky bit for excluding |
607 | * directories from cleaning like we do it for |
608 | * other file system objects: well, the sticky |
609 | * bit already has a meaning for directories, |
610 | * so we don't want to overload that. */ |
611 | |
612 | if (keep_this_level) { |
613 | log_debug("Keeping \"%s\".", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 613, __func__, "Keeping \"%s\"." , sub_path) : -abs(_e); }); |
614 | continue; |
615 | } |
616 | |
617 | /* Ignore ctime, we change it when deleting */ |
618 | age = timespec_load(&s.st_mtim); |
619 | if (age >= cutoff) { |
620 | char a[FORMAT_TIMESTAMP_MAX(3+1+10+1+8+1+6+1+6+1)]; |
621 | /* Follows spelling in stat(1). */ |
622 | log_debug("Directory \"%s\": modify time %s is too new.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 624, __func__, "Directory \"%s\": modify time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
623 | sub_path,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 624, __func__, "Directory \"%s\": modify time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
624 | format_timestamp_us(a, sizeof(a), age))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 624, __func__, "Directory \"%s\": modify time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }); |
625 | continue; |
626 | } |
627 | |
628 | age = timespec_load(&s.st_atim); |
629 | if (age >= cutoff) { |
630 | char a[FORMAT_TIMESTAMP_MAX(3+1+10+1+8+1+6+1+6+1)]; |
631 | log_debug("Directory \"%s\": access time %s is too new.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 633, __func__, "Directory \"%s\": access time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
632 | sub_path,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 633, __func__, "Directory \"%s\": access time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
633 | format_timestamp_us(a, sizeof(a), age))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 633, __func__, "Directory \"%s\": access time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }); |
634 | continue; |
635 | } |
636 | |
637 | log_debug("Removing directory \"%s\".", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 637, __func__, "Removing directory \"%s\"." , sub_path) : -abs(_e); }); |
638 | if (unlinkat(dirfd(d), dent->d_name, AT_REMOVEDIR0x200) < 0) |
639 | if (!IN_SET(errno, ENOENT, ENOTEMPTY)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){2, 39})/sizeof(int)]; switch((*__errno_location ())) { case 2: case 39: _found = 1; break; default: break; } _found; })) |
640 | r = log_error_errno(errno, "rmdir(%s): %m", sub_path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 640, __func__ , "rmdir(%s): %m", sub_path) : -abs(_e); }); |
641 | |
642 | } else { |
643 | /* Skip files for which the sticky bit is |
644 | * set. These are semantics we define, and are |
645 | * unknown elsewhere. See XDG_RUNTIME_DIR |
646 | * specification for details. */ |
647 | if (s.st_mode & S_ISVTX01000) { |
648 | log_debug("Skipping \"%s\": sticky bit set.", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 648, __func__, "Skipping \"%s\": sticky bit set." , sub_path) : -abs(_e); }); |
649 | continue; |
650 | } |
651 | |
652 | if (mountpoint && S_ISREG(s.st_mode)((((s.st_mode)) & 0170000) == (0100000))) |
653 | if (s.st_uid == 0 && STR_IN_SET(dent->d_name,(!!strv_find((((char**) ((const char*[]) { ".journal", "aquota.user" , "aquota.group", ((void*)0) }))), (dent->d_name))) |
654 | ".journal",(!!strv_find((((char**) ((const char*[]) { ".journal", "aquota.user" , "aquota.group", ((void*)0) }))), (dent->d_name))) |
655 | "aquota.user",(!!strv_find((((char**) ((const char*[]) { ".journal", "aquota.user" , "aquota.group", ((void*)0) }))), (dent->d_name))) |
656 | "aquota.group")(!!strv_find((((char**) ((const char*[]) { ".journal", "aquota.user" , "aquota.group", ((void*)0) }))), (dent->d_name)))) { |
657 | log_debug("Skipping \"%s\".", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 657, __func__, "Skipping \"%s\"." , sub_path) : -abs(_e); }); |
658 | continue; |
659 | } |
660 | |
661 | /* Ignore sockets that are listed in /proc/net/unix */ |
662 | if (S_ISSOCK(s.st_mode)((((s.st_mode)) & 0170000) == (0140000)) && unix_socket_alive(sub_path)) { |
663 | log_debug("Skipping \"%s\": live socket.", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 663, __func__, "Skipping \"%s\": live socket." , sub_path) : -abs(_e); }); |
664 | continue; |
665 | } |
666 | |
667 | /* Ignore device nodes */ |
668 | if (S_ISCHR(s.st_mode)((((s.st_mode)) & 0170000) == (0020000)) || S_ISBLK(s.st_mode)((((s.st_mode)) & 0170000) == (0060000))) { |
669 | log_debug("Skipping \"%s\": a device.", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 669, __func__, "Skipping \"%s\": a device." , sub_path) : -abs(_e); }); |
670 | continue; |
671 | } |
672 | |
673 | /* Keep files on this level around if this is |
674 | * requested */ |
675 | if (keep_this_level) { |
676 | log_debug("Keeping \"%s\".", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 676, __func__, "Keeping \"%s\"." , sub_path) : -abs(_e); }); |
677 | continue; |
678 | } |
679 | |
680 | age = timespec_load(&s.st_mtim); |
681 | if (age >= cutoff) { |
682 | char a[FORMAT_TIMESTAMP_MAX(3+1+10+1+8+1+6+1+6+1)]; |
683 | /* Follows spelling in stat(1). */ |
684 | log_debug("File \"%s\": modify time %s is too new.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 686, __func__, "File \"%s\": modify time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
685 | sub_path,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 686, __func__, "File \"%s\": modify time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
686 | format_timestamp_us(a, sizeof(a), age))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 686, __func__, "File \"%s\": modify time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }); |
687 | continue; |
688 | } |
689 | |
690 | age = timespec_load(&s.st_atim); |
691 | if (age >= cutoff) { |
692 | char a[FORMAT_TIMESTAMP_MAX(3+1+10+1+8+1+6+1+6+1)]; |
693 | log_debug("File \"%s\": access time %s is too new.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 695, __func__, "File \"%s\": access time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
694 | sub_path,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 695, __func__, "File \"%s\": access time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
695 | format_timestamp_us(a, sizeof(a), age))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 695, __func__, "File \"%s\": access time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }); |
696 | continue; |
697 | } |
698 | |
699 | age = timespec_load(&s.st_ctim); |
700 | if (age >= cutoff) { |
701 | char a[FORMAT_TIMESTAMP_MAX(3+1+10+1+8+1+6+1+6+1)]; |
702 | log_debug("File \"%s\": change time %s is too new.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 704, __func__, "File \"%s\": change time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
703 | sub_path,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 704, __func__, "File \"%s\": change time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
704 | format_timestamp_us(a, sizeof(a), age))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 704, __func__, "File \"%s\": change time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }); |
705 | continue; |
706 | } |
707 | |
708 | log_debug("unlink \"%s\"", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 708, __func__, "unlink \"%s\"" , sub_path) : -abs(_e); }); |
709 | |
710 | if (unlinkat(dirfd(d), dent->d_name, 0) < 0) |
711 | if (errno(*__errno_location ()) != ENOENT2) |
712 | r = log_error_errno(errno, "unlink(%s): %m", sub_path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 712, __func__ , "unlink(%s): %m", sub_path) : -abs(_e); }); |
713 | |
714 | deleted = true1; |
715 | } |
716 | } |
717 | |
718 | finish: |
719 | if (deleted) { |
720 | usec_t age1, age2; |
721 | char a[FORMAT_TIMESTAMP_MAX(3+1+10+1+8+1+6+1+6+1)], b[FORMAT_TIMESTAMP_MAX(3+1+10+1+8+1+6+1+6+1)]; |
722 | |
723 | /* Restore original directory timestamps */ |
724 | times[0] = ds->st_atim; |
725 | times[1] = ds->st_mtim; |
726 | |
727 | age1 = timespec_load(&ds->st_atim); |
728 | age2 = timespec_load(&ds->st_mtim); |
729 | log_debug("Restoring access and modification time on \"%s\": %s, %s",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 732, __func__, "Restoring access and modification time on \"%s\": %s, %s" , p, format_timestamp_us(a, sizeof(a), age1), format_timestamp_us (b, sizeof(b), age2)) : -abs(_e); }) |
730 | p,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 732, __func__, "Restoring access and modification time on \"%s\": %s, %s" , p, format_timestamp_us(a, sizeof(a), age1), format_timestamp_us (b, sizeof(b), age2)) : -abs(_e); }) |
731 | format_timestamp_us(a, sizeof(a), age1),({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 732, __func__, "Restoring access and modification time on \"%s\": %s, %s" , p, format_timestamp_us(a, sizeof(a), age1), format_timestamp_us (b, sizeof(b), age2)) : -abs(_e); }) |
732 | format_timestamp_us(b, sizeof(b), age2))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 732, __func__, "Restoring access and modification time on \"%s\": %s, %s" , p, format_timestamp_us(a, sizeof(a), age1), format_timestamp_us (b, sizeof(b), age2)) : -abs(_e); }); |
733 | if (futimens(dirfd(d), times) < 0) |
734 | log_error_errno(errno, "utimensat(%s): %m", p)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 734, __func__ , "utimensat(%s): %m", p) : -abs(_e); }); |
735 | } |
736 | |
737 | return r; |
738 | } |
739 | |
740 | static bool_Bool dangerous_hardlinks(void) { |
741 | _cleanup_free___attribute__((cleanup(freep))) char *value = NULL((void*)0); |
742 | static int cached = -1; |
743 | int r; |
744 | |
745 | /* Check whether the fs.protected_hardlinks sysctl is on. If we can't determine it we assume its off, as that's |
746 | * what the upstream default is. */ |
747 | |
748 | if (cached >= 0) |
749 | return cached; |
750 | |
751 | r = read_one_line_file("/proc/sys/fs/protected_hardlinks", &value); |
752 | if (r < 0) { |
753 | log_debug_errno(r, "Failed to read fs.protected_hardlinks sysctl: %m")({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 753, __func__, "Failed to read fs.protected_hardlinks sysctl: %m" ) : -abs(_e); }); |
754 | return true1; |
755 | } |
756 | |
757 | r = parse_boolean(value); |
758 | if (r < 0) { |
759 | log_debug_errno(r, "Failed to parse fs.protected_hardlinks sysctl: %m")({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 759, __func__, "Failed to parse fs.protected_hardlinks sysctl: %m" ) : -abs(_e); }); |
760 | return true1; |
761 | } |
762 | |
763 | cached = r == 0; |
764 | return cached; |
765 | } |
766 | |
767 | static bool_Bool hardlink_vulnerable(const struct stat *st) { |
768 | assert(st)do { if ((__builtin_expect(!!(!(st)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("st"), "../src/tmpfiles/tmpfiles.c", 768 , __PRETTY_FUNCTION__); } while (0); |
769 | |
770 | return !S_ISDIR(st->st_mode)((((st->st_mode)) & 0170000) == (0040000)) && st->st_nlink > 1 && dangerous_hardlinks(); |
771 | } |
772 | |
773 | static int fd_set_perms(Item *i, int fd, const struct stat *st) { |
774 | _cleanup_free___attribute__((cleanup(freep))) char *path = NULL((void*)0); |
775 | int r; |
776 | |
777 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 777, __PRETTY_FUNCTION__); } while (0); |
778 | assert(fd)do { if ((__builtin_expect(!!(!(fd)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fd"), "../src/tmpfiles/tmpfiles.c", 778 , __PRETTY_FUNCTION__); } while (0); |
779 | |
780 | r = fd_get_path(fd, &path); |
781 | if (r < 0) |
782 | return r; |
783 | |
784 | if (!i->mode_set && !i->uid_set && !i->gid_set) |
785 | goto shortcut; |
786 | |
787 | if (hardlink_vulnerable(st)) { |
788 | log_error("Refusing to set permissions on hardlinked file %s while the fs.protected_hardlinks sysctl is turned off.", path)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 788, __func__, "Refusing to set permissions on hardlinked file %s while the fs.protected_hardlinks sysctl is turned off." , path) : -abs(_e); }); |
789 | return -EPERM1; |
790 | } |
791 | |
792 | if (i->mode_set) { |
793 | if (S_ISLNK(st->st_mode)((((st->st_mode)) & 0170000) == (0120000))) |
794 | log_debug("Skipping mode fix for symlink %s.", path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 794, __func__, "Skipping mode fix for symlink %s." , path) : -abs(_e); }); |
795 | else { |
796 | mode_t m = i->mode; |
797 | |
798 | if (i->mask_perms) { |
799 | if (!(st->st_mode & 0111)) |
800 | m &= ~0111; |
801 | if (!(st->st_mode & 0222)) |
802 | m &= ~0222; |
803 | if (!(st->st_mode & 0444)) |
804 | m &= ~0444; |
805 | if (!S_ISDIR(st->st_mode)((((st->st_mode)) & 0170000) == (0040000))) |
806 | m &= ~07000; /* remove sticky/sgid/suid bit, unless directory */ |
807 | } |
808 | |
809 | if (m == (st->st_mode & 07777)) |
810 | log_debug("\"%s\" has correct mode %o already.", path, st->st_mode)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 810, __func__, "\"%s\" has correct mode %o already." , path, st->st_mode) : -abs(_e); }); |
811 | else { |
812 | log_debug("Changing \"%s\" to mode %o.", path, m)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 812, __func__, "Changing \"%s\" to mode %o." , path, m) : -abs(_e); }); |
813 | if (fchmod_opath(fd, m) < 0) |
814 | return log_error_errno(errno, "fchmod() of %s failed: %m", path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 814, __func__ , "fchmod() of %s failed: %m", path) : -abs(_e); }); |
815 | } |
816 | } |
817 | } |
818 | |
819 | if ((i->uid_set && i->uid != st->st_uid) || |
820 | (i->gid_set && i->gid != st->st_gid)) { |
821 | log_debug("Changing \"%s\" to owner "UID_FMT":"GID_FMT,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 824, __func__, "Changing \"%s\" to owner " "%" "u"":""%" "u", path, i->uid_set ? i->uid : ((uid_t) -1), i->gid_set ? i->gid : ((gid_t) -1)) : -abs(_e); } ) |
822 | path,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 824, __func__, "Changing \"%s\" to owner " "%" "u"":""%" "u", path, i->uid_set ? i->uid : ((uid_t) -1), i->gid_set ? i->gid : ((gid_t) -1)) : -abs(_e); } ) |
823 | i->uid_set ? i->uid : UID_INVALID,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 824, __func__, "Changing \"%s\" to owner " "%" "u"":""%" "u", path, i->uid_set ? i->uid : ((uid_t) -1), i->gid_set ? i->gid : ((gid_t) -1)) : -abs(_e); } ) |
824 | i->gid_set ? i->gid : GID_INVALID)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 824, __func__, "Changing \"%s\" to owner " "%" "u"":""%" "u", path, i->uid_set ? i->uid : ((uid_t) -1), i->gid_set ? i->gid : ((gid_t) -1)) : -abs(_e); } ); |
825 | |
826 | if (fchownat(fd, |
827 | "", |
828 | i->uid_set ? i->uid : UID_INVALID((uid_t) -1), |
829 | i->gid_set ? i->gid : GID_INVALID((gid_t) -1), |
830 | AT_EMPTY_PATH0x1000) < 0) |
831 | return log_error_errno(errno, "fchownat() of %s failed: %m", path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 831, __func__ , "fchownat() of %s failed: %m", path) : -abs(_e); }); |
832 | } |
833 | |
834 | shortcut: |
835 | return label_fix(path, 0); |
836 | } |
837 | |
838 | static int path_set_perms(Item *i, const char *path) { |
839 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1; |
840 | struct stat st; |
841 | |
842 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 842, __PRETTY_FUNCTION__); } while (0); |
843 | assert(path)do { if ((__builtin_expect(!!(!(path)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("path"), "../src/tmpfiles/tmpfiles.c", 843 , __PRETTY_FUNCTION__); } while (0); |
844 | |
845 | fd = open(path, O_NOFOLLOW0400000|O_CLOEXEC02000000|O_PATH010000000); |
846 | if (fd < 0) { |
847 | int level = LOG_ERR3, r = -errno(*__errno_location ()); |
848 | |
849 | /* Option "e" operates only on existing objects. Do not |
850 | * print errors about non-existent files or directories */ |
851 | if (i->type == EMPTY_DIRECTORY && errno(*__errno_location ()) == ENOENT2) { |
852 | level = LOG_DEBUG7; |
853 | r = 0; |
854 | } |
855 | |
856 | log_full_errno(level, errno, "Adjusting owner and mode for %s failed: %m", path)({ int _level = ((level)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 856, __func__ , "Adjusting owner and mode for %s failed: %m", path) : -abs( _e); }); |
857 | return r; |
858 | } |
859 | |
860 | if (fstat(fd, &st) < 0) |
861 | return log_error_errno(errno, "Failed to fstat() file %s: %m", path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 861, __func__ , "Failed to fstat() file %s: %m", path) : -abs(_e); }); |
862 | |
863 | if (i->type == EMPTY_DIRECTORY && !S_ISDIR(st.st_mode)((((st.st_mode)) & 0170000) == (0040000))) |
864 | return log_error_errno(EEXIST, "'%s' already exists and is not a directory. ", path)({ int _level = ((3)), _e = ((17)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 864, __func__, "'%s' already exists and is not a directory. " , path) : -abs(_e); }); |
865 | |
866 | return fd_set_perms(i, fd, &st); |
867 | } |
868 | |
869 | static int parse_xattrs_from_arg(Item *i) { |
870 | const char *p; |
871 | int r; |
872 | |
873 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 873, __PRETTY_FUNCTION__); } while (0); |
874 | assert(i->argument)do { if ((__builtin_expect(!!(!(i->argument)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i->argument"), "../src/tmpfiles/tmpfiles.c" , 874, __PRETTY_FUNCTION__); } while (0); |
875 | |
876 | p = i->argument; |
877 | |
878 | for (;;) { |
879 | _cleanup_free___attribute__((cleanup(freep))) char *name = NULL((void*)0), *value = NULL((void*)0), *xattr = NULL((void*)0); |
880 | |
881 | r = extract_first_word(&p, &xattr, NULL((void*)0), EXTRACT_QUOTES|EXTRACT_CUNESCAPE); |
882 | if (r < 0) |
883 | log_warning_errno(r, "Failed to parse extended attribute '%s', ignoring: %m", p)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 883, __func__, "Failed to parse extended attribute '%s', ignoring: %m" , p) : -abs(_e); }); |
884 | if (r <= 0) |
885 | break; |
886 | |
887 | r = split_pair(xattr, "=", &name, &value); |
888 | if (r < 0) { |
889 | log_warning_errno(r, "Failed to parse extended attribute, ignoring: %s", xattr)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 889, __func__, "Failed to parse extended attribute, ignoring: %s" , xattr) : -abs(_e); }); |
890 | continue; |
891 | } |
892 | |
893 | if (isempty(name) || isempty(value)) { |
894 | log_warning("Malformed extended attribute found, ignoring: %s", xattr)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 894, __func__, "Malformed extended attribute found, ignoring: %s" , xattr) : -abs(_e); }); |
895 | continue; |
896 | } |
897 | |
898 | if (strv_push_pair(&i->xattrs, name, value) < 0) |
899 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 899, __func__); |
900 | |
901 | name = value = NULL((void*)0); |
902 | } |
903 | |
904 | return 0; |
905 | } |
906 | |
907 | static int fd_set_xattrs(Item *i, int fd, const struct stat *st) { |
908 | char procfs_path[STRLEN("/proc/self/fd/")(sizeof("""/proc/self/fd/""") - 1) + DECIMAL_STR_MAX(int)(2+(sizeof(int) <= 1 ? 3 : sizeof(int) <= 2 ? 5 : sizeof (int) <= 4 ? 10 : sizeof(int) <= 8 ? 20 : sizeof(int[-2 *(sizeof(int) > 8)])))]; |
909 | _cleanup_free___attribute__((cleanup(freep))) char *path = NULL((void*)0); |
910 | char **name, **value; |
911 | int r; |
912 | |
913 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 913, __PRETTY_FUNCTION__); } while (0); |
914 | assert(fd)do { if ((__builtin_expect(!!(!(fd)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fd"), "../src/tmpfiles/tmpfiles.c", 914 , __PRETTY_FUNCTION__); } while (0); |
915 | |
916 | r = fd_get_path(fd, &path); |
917 | if (r < 0) |
918 | return r; |
919 | |
920 | xsprintf(procfs_path, "/proc/self/fd/%i", fd)do { if ((__builtin_expect(!!(!(((size_t) snprintf(procfs_path , __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(procfs_path), typeof(&*(procfs_path))), sizeof(procfs_path )/sizeof((procfs_path)[0]), ((void)0))), "/proc/self/fd/%i", fd ) < (__extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(procfs_path), typeof(&*(procfs_path))), sizeof(procfs_path )/sizeof((procfs_path)[0]), ((void)0))))))),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("xsprintf: " "procfs_path" "[] must be big enough" ), "../src/tmpfiles/tmpfiles.c", 920, __PRETTY_FUNCTION__); } while (0); |
921 | |
922 | STRV_FOREACH_PAIR(name, value, i->xattrs)for ((name) = (i->xattrs), (value) = (name+1); (name) && *(name) && *(value); (name) += 2, (value) = (name + 1 )) { |
923 | log_debug("Setting extended attribute '%s=%s' on %s.", *name, *value, path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 923, __func__, "Setting extended attribute '%s=%s' on %s." , *name, *value, path) : -abs(_e); }); |
924 | if (setxattr(procfs_path, *name, *value, strlen(*value), 0) < 0) |
925 | return log_error_errno(errno, "Setting extended attribute %s=%s on %s failed: %m",({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 926, __func__ , "Setting extended attribute %s=%s on %s failed: %m", *name, *value, path) : -abs(_e); }) |
926 | *name, *value, path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 926, __func__ , "Setting extended attribute %s=%s on %s failed: %m", *name, *value, path) : -abs(_e); }); |
927 | } |
928 | return 0; |
929 | } |
930 | |
931 | static int path_set_xattrs(Item *i, const char *path) { |
932 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1; |
933 | |
934 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 934, __PRETTY_FUNCTION__); } while (0); |
935 | assert(path)do { if ((__builtin_expect(!!(!(path)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("path"), "../src/tmpfiles/tmpfiles.c", 935 , __PRETTY_FUNCTION__); } while (0); |
936 | |
937 | fd = open(path, O_CLOEXEC02000000|O_NOFOLLOW0400000|O_PATH010000000); |
938 | if (fd < 0) |
939 | return log_error_errno(errno, "Cannot open '%s': %m", path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 939, __func__ , "Cannot open '%s': %m", path) : -abs(_e); }); |
940 | |
941 | return fd_set_xattrs(i, fd, NULL((void*)0)); |
942 | } |
943 | |
944 | static int parse_acls_from_arg(Item *item) { |
945 | #if HAVE_ACL1 |
946 | int r; |
947 | |
948 | assert(item)do { if ((__builtin_expect(!!(!(item)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("item"), "../src/tmpfiles/tmpfiles.c", 948 , __PRETTY_FUNCTION__); } while (0); |
949 | |
950 | /* If force (= modify) is set, we will not modify the acl |
951 | * afterwards, so the mask can be added now if necessary. */ |
952 | |
953 | r = parse_acl(item->argument, &item->acl_access, &item->acl_default, !item->force); |
954 | if (r < 0) |
955 | log_warning_errno(r, "Failed to parse ACL \"%s\": %m. Ignoring", item->argument)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 955, __func__, "Failed to parse ACL \"%s\": %m. Ignoring" , item->argument) : -abs(_e); }); |
956 | #else |
957 | log_warning_errno(ENOSYS, "ACLs are not supported. Ignoring")({ int _level = ((4)), _e = ((38)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 957, __func__, "ACLs are not supported. Ignoring" ) : -abs(_e); }); |
958 | #endif |
959 | |
960 | return 0; |
961 | } |
962 | |
963 | #if HAVE_ACL1 |
964 | static int path_set_acl(const char *path, const char *pretty, acl_type_t type, acl_t acl, bool_Bool modify) { |
965 | _cleanup_(acl_free_charpp)__attribute__((cleanup(acl_free_charpp))) char *t = NULL((void*)0); |
966 | _cleanup_(acl_freep)__attribute__((cleanup(acl_freep))) acl_t dup = NULL((void*)0); |
967 | int r; |
968 | |
969 | /* Returns 0 for success, positive error if already warned, |
970 | * negative error otherwise. */ |
971 | |
972 | if (modify) { |
973 | r = acls_for_file(path, type, acl, &dup); |
974 | if (r < 0) |
975 | return r; |
976 | |
977 | r = calc_acl_mask_if_needed(&dup); |
978 | if (r < 0) |
979 | return r; |
980 | } else { |
981 | dup = acl_dup(acl); |
982 | if (!dup) |
983 | return -errno(*__errno_location ()); |
984 | |
985 | /* the mask was already added earlier if needed */ |
986 | } |
987 | |
988 | r = add_base_acls_if_needed(&dup, path); |
989 | if (r < 0) |
990 | return r; |
991 | |
992 | t = acl_to_any_text(dup, NULL((void*)0), ',', TEXT_ABBREVIATE0x10); |
993 | log_debug("Setting %s ACL %s on %s.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 995, __func__, "Setting %s ACL %s on %s." , type == (0x8000) ? "access" : "default", strna(t), pretty) : -abs(_e); }) |
994 | type == ACL_TYPE_ACCESS ? "access" : "default",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 995, __func__, "Setting %s ACL %s on %s." , type == (0x8000) ? "access" : "default", strna(t), pretty) : -abs(_e); }) |
995 | strna(t), pretty)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 995, __func__, "Setting %s ACL %s on %s." , type == (0x8000) ? "access" : "default", strna(t), pretty) : -abs(_e); }); |
996 | |
997 | r = acl_set_file(path, type, dup); |
998 | if (r < 0) |
999 | /* Return positive to indicate we already warned */ |
1000 | return -log_error_errno(errno,({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1003, __func__ , "Setting %s ACL \"%s\" on %s failed: %m", type == (0x8000) ? "access" : "default", strna(t), pretty) : -abs(_e); }) |
1001 | "Setting %s ACL \"%s\" on %s failed: %m",({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1003, __func__ , "Setting %s ACL \"%s\" on %s failed: %m", type == (0x8000) ? "access" : "default", strna(t), pretty) : -abs(_e); }) |
1002 | type == ACL_TYPE_ACCESS ? "access" : "default",({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1003, __func__ , "Setting %s ACL \"%s\" on %s failed: %m", type == (0x8000) ? "access" : "default", strna(t), pretty) : -abs(_e); }) |
1003 | strna(t), pretty)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1003, __func__ , "Setting %s ACL \"%s\" on %s failed: %m", type == (0x8000) ? "access" : "default", strna(t), pretty) : -abs(_e); }); |
1004 | |
1005 | return 0; |
1006 | } |
1007 | #endif |
1008 | |
1009 | static int fd_set_acls(Item *item, int fd, const struct stat *st) { |
1010 | int r = 0; |
1011 | #if HAVE_ACL1 |
1012 | char procfs_path[STRLEN("/proc/self/fd/")(sizeof("""/proc/self/fd/""") - 1) + DECIMAL_STR_MAX(int)(2+(sizeof(int) <= 1 ? 3 : sizeof(int) <= 2 ? 5 : sizeof (int) <= 4 ? 10 : sizeof(int) <= 8 ? 20 : sizeof(int[-2 *(sizeof(int) > 8)])))]; |
1013 | _cleanup_free___attribute__((cleanup(freep))) char *path = NULL((void*)0); |
1014 | |
1015 | assert(item)do { if ((__builtin_expect(!!(!(item)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("item"), "../src/tmpfiles/tmpfiles.c", 1015 , __PRETTY_FUNCTION__); } while (0); |
1016 | assert(fd)do { if ((__builtin_expect(!!(!(fd)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fd"), "../src/tmpfiles/tmpfiles.c", 1016 , __PRETTY_FUNCTION__); } while (0); |
1017 | assert(st)do { if ((__builtin_expect(!!(!(st)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("st"), "../src/tmpfiles/tmpfiles.c", 1017 , __PRETTY_FUNCTION__); } while (0); |
1018 | |
1019 | r = fd_get_path(fd, &path); |
1020 | if (r < 0) |
1021 | return r; |
1022 | |
1023 | if (hardlink_vulnerable(st)) { |
1024 | log_error("Refusing to set ACLs on hardlinked file %s while the fs.protected_hardlinks sysctl is turned off.", path)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1024, __func__, "Refusing to set ACLs on hardlinked file %s while the fs.protected_hardlinks sysctl is turned off." , path) : -abs(_e); }); |
1025 | return -EPERM1; |
1026 | } |
1027 | |
1028 | if (S_ISLNK(st->st_mode)((((st->st_mode)) & 0170000) == (0120000))) { |
1029 | log_debug("Skipping ACL fix for symlink %s.", path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1029, __func__, "Skipping ACL fix for symlink %s." , path) : -abs(_e); }); |
1030 | return 0; |
1031 | } |
1032 | |
1033 | xsprintf(procfs_path, "/proc/self/fd/%i", fd)do { if ((__builtin_expect(!!(!(((size_t) snprintf(procfs_path , __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(procfs_path), typeof(&*(procfs_path))), sizeof(procfs_path )/sizeof((procfs_path)[0]), ((void)0))), "/proc/self/fd/%i", fd ) < (__extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(procfs_path), typeof(&*(procfs_path))), sizeof(procfs_path )/sizeof((procfs_path)[0]), ((void)0))))))),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("xsprintf: " "procfs_path" "[] must be big enough" ), "../src/tmpfiles/tmpfiles.c", 1033, __PRETTY_FUNCTION__); } while (0); |
1034 | |
1035 | if (item->acl_access) |
1036 | r = path_set_acl(procfs_path, path, ACL_TYPE_ACCESS(0x8000), item->acl_access, item->force); |
1037 | |
1038 | if (r == 0 && item->acl_default) |
1039 | r = path_set_acl(procfs_path, path, ACL_TYPE_DEFAULT(0x4000), item->acl_default, item->force); |
1040 | |
1041 | if (r > 0) |
1042 | return -r; /* already warned */ |
1043 | if (r == -EOPNOTSUPP95) { |
1044 | log_debug_errno(r, "ACLs not supported by file system at %s", path)({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1044, __func__, "ACLs not supported by file system at %s" , path) : -abs(_e); }); |
1045 | return 0; |
1046 | } |
1047 | if (r < 0) |
1048 | return log_error_errno(r, "ACL operation on \"%s\" failed: %m", path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1048, __func__, "ACL operation on \"%s\" failed: %m" , path) : -abs(_e); }); |
1049 | #endif |
1050 | return r; |
1051 | } |
1052 | |
1053 | static int path_set_acls(Item *item, const char *path) { |
1054 | int r = 0; |
1055 | #ifdef HAVE_ACL1 |
1056 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1; |
1057 | struct stat st; |
1058 | |
1059 | assert(item)do { if ((__builtin_expect(!!(!(item)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("item"), "../src/tmpfiles/tmpfiles.c", 1059 , __PRETTY_FUNCTION__); } while (0); |
1060 | assert(path)do { if ((__builtin_expect(!!(!(path)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("path"), "../src/tmpfiles/tmpfiles.c", 1060 , __PRETTY_FUNCTION__); } while (0); |
1061 | |
1062 | fd = open(path, O_NOFOLLOW0400000|O_CLOEXEC02000000|O_PATH010000000); |
1063 | if (fd < 0) |
1064 | return log_error_errno(errno, "Adjusting ACL of %s failed: %m", path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1064, __func__ , "Adjusting ACL of %s failed: %m", path) : -abs(_e); }); |
1065 | |
1066 | if (fstat(fd, &st) < 0) |
1067 | return log_error_errno(errno, "Failed to fstat() file %s: %m", path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1067, __func__ , "Failed to fstat() file %s: %m", path) : -abs(_e); }); |
1068 | |
1069 | r = fd_set_acls(item, fd, &st); |
1070 | #endif |
1071 | return r; |
1072 | } |
1073 | |
1074 | #define ATTRIBUTES_ALL(0x00000080 | 0x00000008 | 0x00010000 | 0x00000020 | 0x00000004 | 0x00000040 | 0x00080000 | 0x00000010 | 0x00004000 | 0x00000001 | 0x00000002 | 0x00008000 | 0x00020000 | 0x00800000) \ |
1075 | (FS_NOATIME_FL0x00000080 | \ |
1076 | FS_SYNC_FL0x00000008 | \ |
1077 | FS_DIRSYNC_FL0x00010000 | \ |
1078 | FS_APPEND_FL0x00000020 | \ |
1079 | FS_COMPR_FL0x00000004 | \ |
1080 | FS_NODUMP_FL0x00000040 | \ |
1081 | FS_EXTENT_FL0x00080000 | \ |
1082 | FS_IMMUTABLE_FL0x00000010 | \ |
1083 | FS_JOURNAL_DATA_FL0x00004000 | \ |
1084 | FS_SECRM_FL0x00000001 | \ |
1085 | FS_UNRM_FL0x00000002 | \ |
1086 | FS_NOTAIL_FL0x00008000 | \ |
1087 | FS_TOPDIR_FL0x00020000 | \ |
1088 | FS_NOCOW_FL0x00800000) |
1089 | |
1090 | static int parse_attribute_from_arg(Item *item) { |
1091 | |
1092 | static const struct { |
1093 | char character; |
1094 | unsigned value; |
1095 | } attributes[] = { |
1096 | { 'A', FS_NOATIME_FL0x00000080 }, /* do not update atime */ |
1097 | { 'S', FS_SYNC_FL0x00000008 }, /* Synchronous updates */ |
1098 | { 'D', FS_DIRSYNC_FL0x00010000 }, /* dirsync behaviour (directories only) */ |
1099 | { 'a', FS_APPEND_FL0x00000020 }, /* writes to file may only append */ |
1100 | { 'c', FS_COMPR_FL0x00000004 }, /* Compress file */ |
1101 | { 'd', FS_NODUMP_FL0x00000040 }, /* do not dump file */ |
1102 | { 'e', FS_EXTENT_FL0x00080000 }, /* Extents */ |
1103 | { 'i', FS_IMMUTABLE_FL0x00000010 }, /* Immutable file */ |
1104 | { 'j', FS_JOURNAL_DATA_FL0x00004000 }, /* Reserved for ext3 */ |
1105 | { 's', FS_SECRM_FL0x00000001 }, /* Secure deletion */ |
1106 | { 'u', FS_UNRM_FL0x00000002 }, /* Undelete */ |
1107 | { 't', FS_NOTAIL_FL0x00008000 }, /* file tail should not be merged */ |
1108 | { 'T', FS_TOPDIR_FL0x00020000 }, /* Top of directory hierarchies */ |
1109 | { 'C', FS_NOCOW_FL0x00800000 }, /* Do not cow file */ |
1110 | }; |
1111 | |
1112 | enum { |
1113 | MODE_ADD, |
1114 | MODE_DEL, |
1115 | MODE_SET |
1116 | } mode = MODE_ADD; |
1117 | |
1118 | unsigned value = 0, mask = 0; |
1119 | const char *p; |
1120 | |
1121 | assert(item)do { if ((__builtin_expect(!!(!(item)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("item"), "../src/tmpfiles/tmpfiles.c", 1121 , __PRETTY_FUNCTION__); } while (0); |
1122 | |
1123 | p = item->argument; |
1124 | if (p) { |
1125 | if (*p == '+') { |
1126 | mode = MODE_ADD; |
1127 | p++; |
1128 | } else if (*p == '-') { |
1129 | mode = MODE_DEL; |
1130 | p++; |
1131 | } else if (*p == '=') { |
1132 | mode = MODE_SET; |
1133 | p++; |
1134 | } |
1135 | } |
1136 | |
1137 | if (isempty(p) && mode != MODE_SET) { |
1138 | log_error("Setting file attribute on '%s' needs an attribute specification.", item->path)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1138, __func__, "Setting file attribute on '%s' needs an attribute specification." , item->path) : -abs(_e); }); |
1139 | return -EINVAL22; |
1140 | } |
1141 | |
1142 | for (; p && *p ; p++) { |
1143 | unsigned i, v; |
1144 | |
1145 | for (i = 0; i < ELEMENTSOF(attributes)__extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(attributes), typeof(&*(attributes))), sizeof(attributes )/sizeof((attributes)[0]), ((void)0))); i++) |
1146 | if (*p == attributes[i].character) |
1147 | break; |
1148 | |
1149 | if (i >= ELEMENTSOF(attributes)__extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(attributes), typeof(&*(attributes))), sizeof(attributes )/sizeof((attributes)[0]), ((void)0)))) { |
1150 | log_error("Unknown file attribute '%c' on '%s'.", *p, item->path)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1150, __func__, "Unknown file attribute '%c' on '%s'." , *p, item->path) : -abs(_e); }); |
1151 | return -EINVAL22; |
1152 | } |
1153 | |
1154 | v = attributes[i].value; |
1155 | |
1156 | SET_FLAG(value, v, IN_SET(mode, MODE_ADD, MODE_SET))(value) = (({ _Bool _found = 0; static __attribute__ ((unused )) char _static_assert__macros_need_to_be_extended[20 - sizeof ((int[]){MODE_ADD, MODE_SET})/sizeof(int)]; switch(mode) { case MODE_ADD: case MODE_SET: _found = 1; break; default: break; } _found; })) ? ((value) | (v)) : ((value) & ~(v)); |
1157 | |
1158 | mask |= v; |
1159 | } |
1160 | |
1161 | if (mode == MODE_SET) |
1162 | mask |= ATTRIBUTES_ALL(0x00000080 | 0x00000008 | 0x00010000 | 0x00000020 | 0x00000004 | 0x00000040 | 0x00080000 | 0x00000010 | 0x00004000 | 0x00000001 | 0x00000002 | 0x00008000 | 0x00020000 | 0x00800000); |
1163 | |
1164 | assert(mask != 0)do { if ((__builtin_expect(!!(!(mask != 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("mask != 0"), "../src/tmpfiles/tmpfiles.c" , 1164, __PRETTY_FUNCTION__); } while (0); |
1165 | |
1166 | item->attribute_mask = mask; |
1167 | item->attribute_value = value; |
1168 | item->attribute_set = true1; |
1169 | |
1170 | return 0; |
1171 | } |
1172 | |
1173 | static int fd_set_attribute(Item *item, int fd, const struct stat *st) { |
1174 | _cleanup_close___attribute__((cleanup(closep))) int procfs_fd = -1; |
1175 | _cleanup_free___attribute__((cleanup(freep))) char *path = NULL((void*)0); |
1176 | unsigned f; |
1177 | int r; |
1178 | |
1179 | if (!item->attribute_set || item->attribute_mask == 0) |
1180 | return 0; |
1181 | |
1182 | r = fd_get_path(fd, &path); |
1183 | if (r < 0) |
1184 | return r; |
1185 | |
1186 | /* Issuing the file attribute ioctls on device nodes is not |
1187 | * safe, as that will be delivered to the drivers, not the |
1188 | * file system containing the device node. */ |
1189 | if (!S_ISREG(st->st_mode)((((st->st_mode)) & 0170000) == (0100000)) && !S_ISDIR(st->st_mode)((((st->st_mode)) & 0170000) == (0040000))) { |
1190 | log_error("Setting file flags is only supported on regular files and directories, cannot set on '%s'.", path)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1190, __func__, "Setting file flags is only supported on regular files and directories, cannot set on '%s'." , path) : -abs(_e); }); |
1191 | return -EINVAL22; |
1192 | } |
1193 | |
1194 | f = item->attribute_value & item->attribute_mask; |
1195 | |
1196 | /* Mask away directory-specific flags */ |
1197 | if (!S_ISDIR(st->st_mode)((((st->st_mode)) & 0170000) == (0040000))) |
1198 | f &= ~FS_DIRSYNC_FL0x00010000; |
1199 | |
1200 | procfs_fd = fd_reopen(fd, O_RDONLY00|O_CLOEXEC02000000|O_NOATIME01000000); |
1201 | if (procfs_fd < 0) |
1202 | return -errno(*__errno_location ()); |
1203 | |
1204 | r = chattr_fd(procfs_fd, f, item->attribute_mask); |
1205 | if (r < 0) |
1206 | log_full_errno(IN_SET(r, -ENOTTY, -EOPNOTSUPP) ? LOG_DEBUG : LOG_WARNING,({ int _level = ((({ _Bool _found = 0; static __attribute__ ( (unused)) char _static_assert__macros_need_to_be_extended[20 - sizeof((int[]){-25, -95})/sizeof(int)]; switch(r) { case -25 : case -95: _found = 1; break; default: break; } _found; }) ? 7 : 4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c" , 1209, __func__, "Cannot set file attribute for '%s', value=0x%08x, mask=0x%08x: %m" , path, item->attribute_value, item->attribute_mask) : - abs(_e); }) |
1207 | r,({ int _level = ((({ _Bool _found = 0; static __attribute__ ( (unused)) char _static_assert__macros_need_to_be_extended[20 - sizeof((int[]){-25, -95})/sizeof(int)]; switch(r) { case -25 : case -95: _found = 1; break; default: break; } _found; }) ? 7 : 4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c" , 1209, __func__, "Cannot set file attribute for '%s', value=0x%08x, mask=0x%08x: %m" , path, item->attribute_value, item->attribute_mask) : - abs(_e); }) |
1208 | "Cannot set file attribute for '%s', value=0x%08x, mask=0x%08x: %m",({ int _level = ((({ _Bool _found = 0; static __attribute__ ( (unused)) char _static_assert__macros_need_to_be_extended[20 - sizeof((int[]){-25, -95})/sizeof(int)]; switch(r) { case -25 : case -95: _found = 1; break; default: break; } _found; }) ? 7 : 4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c" , 1209, __func__, "Cannot set file attribute for '%s', value=0x%08x, mask=0x%08x: %m" , path, item->attribute_value, item->attribute_mask) : - abs(_e); }) |
1209 | path, item->attribute_value, item->attribute_mask)({ int _level = ((({ _Bool _found = 0; static __attribute__ ( (unused)) char _static_assert__macros_need_to_be_extended[20 - sizeof((int[]){-25, -95})/sizeof(int)]; switch(r) { case -25 : case -95: _found = 1; break; default: break; } _found; }) ? 7 : 4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c" , 1209, __func__, "Cannot set file attribute for '%s', value=0x%08x, mask=0x%08x: %m" , path, item->attribute_value, item->attribute_mask) : - abs(_e); }); |
1210 | |
1211 | return 0; |
1212 | } |
1213 | |
1214 | static int path_set_attribute(Item *item, const char *path) { |
1215 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1; |
1216 | struct stat st; |
1217 | |
1218 | if (!item->attribute_set || item->attribute_mask == 0) |
1219 | return 0; |
1220 | |
1221 | fd = open(path, O_CLOEXEC02000000|O_NOFOLLOW0400000|O_PATH010000000); |
1222 | if (fd < 0) |
1223 | return log_error_errno(errno, "Cannot open '%s': %m", path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1223, __func__ , "Cannot open '%s': %m", path) : -abs(_e); }); |
1224 | |
1225 | if (fstat(fd, &st) < 0) |
1226 | return log_error_errno(errno, "Cannot stat '%s': %m", path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1226, __func__ , "Cannot stat '%s': %m", path) : -abs(_e); }); |
1227 | |
1228 | return fd_set_attribute(item, fd, &st); |
1229 | } |
1230 | |
1231 | static int write_one_file(Item *i, const char *path) { |
1232 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1; |
1233 | int flags, r = 0; |
1234 | struct stat st; |
1235 | |
1236 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 1236 , __PRETTY_FUNCTION__); } while (0); |
1237 | assert(path)do { if ((__builtin_expect(!!(!(path)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("path"), "../src/tmpfiles/tmpfiles.c", 1237 , __PRETTY_FUNCTION__); } while (0); |
1238 | |
1239 | flags = i->type == CREATE_FILE ? O_CREAT0100|O_EXCL0200|O_NOFOLLOW0400000 : |
1240 | i->type == TRUNCATE_FILE ? O_CREAT0100|O_TRUNC01000|O_NOFOLLOW0400000 : 0; |
1241 | |
1242 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) { |
1243 | mac_selinux_create_file_prepare(path, S_IFREG0100000); |
1244 | fd = open(path, flags|O_NONBLOCK04000|O_CLOEXEC02000000|O_WRONLY01|O_NOCTTY0400, i->mode); |
1245 | mac_selinux_create_file_clear(); |
1246 | } |
1247 | |
1248 | if (fd < 0) { |
1249 | if (i->type == WRITE_FILE && errno(*__errno_location ()) == ENOENT2) { |
1250 | log_debug_errno(errno, "Not writing missing file \"%s\": %m", path)({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1250, __func__ , "Not writing missing file \"%s\": %m", path) : -abs(_e); }); |
1251 | return 0; |
1252 | } |
1253 | if (i->type == CREATE_FILE && errno(*__errno_location ()) == EEXIST17) { |
1254 | log_debug_errno(errno, "Not writing to pre-existing file \"%s\": %m", path)({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1254, __func__ , "Not writing to pre-existing file \"%s\": %m", path) : -abs (_e); }); |
1255 | goto done; |
1256 | } |
1257 | |
1258 | r = -errno(*__errno_location ()); |
1259 | if (!i->argument && errno(*__errno_location ()) == EROFS30 && stat(path, &st) == 0 && |
1260 | (i->type == CREATE_FILE || st.st_size == 0)) |
1261 | goto check_mode; |
1262 | |
1263 | return log_error_errno(r, "Failed to create file %s: %m", path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1263, __func__, "Failed to create file %s: %m" , path) : -abs(_e); }); |
1264 | } |
1265 | |
1266 | if (i->argument) { |
1267 | log_debug("%s to \"%s\".", i->type == CREATE_FILE ? "Appending" : "Writing", path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1267, __func__, "%s to \"%s\"." , i->type == CREATE_FILE ? "Appending" : "Writing", path) : -abs(_e); }); |
1268 | |
1269 | r = loop_write(fd, i->argument, strlen(i->argument), false0); |
1270 | if (r < 0) |
1271 | return log_error_errno(r, "Failed to write file \"%s\": %m", path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1271, __func__, "Failed to write file \"%s\": %m" , path) : -abs(_e); }); |
1272 | } else |
1273 | log_debug("\"%s\" has been created.", path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1273, __func__, "\"%s\" has been created." , path) : -abs(_e); }); |
1274 | |
1275 | fd = safe_close(fd); |
Value stored to 'fd' is never read | |
1276 | |
1277 | done: |
1278 | if (stat(path, &st) < 0) |
1279 | return log_error_errno(errno, "stat(%s) failed: %m", path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1279, __func__ , "stat(%s) failed: %m", path) : -abs(_e); }); |
1280 | |
1281 | check_mode: |
1282 | if (!S_ISREG(st.st_mode)((((st.st_mode)) & 0170000) == (0100000))) { |
1283 | log_error("%s is not a file.", path)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1283, __func__, "%s is not a file." , path) : -abs(_e); }); |
1284 | return -EEXIST17; |
1285 | } |
1286 | |
1287 | r = path_set_perms(i, path); |
1288 | if (r < 0) |
1289 | return r; |
1290 | |
1291 | return 0; |
1292 | } |
1293 | |
1294 | typedef int (*action_t)(Item *, const char *); |
1295 | typedef int (*fdaction_t)(Item *, int fd, const struct stat *st); |
1296 | |
1297 | static int item_do(Item *i, int fd, const struct stat *st, fdaction_t action) { |
1298 | int r = 0, q; |
1299 | |
1300 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 1300 , __PRETTY_FUNCTION__); } while (0); |
1301 | assert(fd >= 0)do { if ((__builtin_expect(!!(!(fd >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fd >= 0"), "../src/tmpfiles/tmpfiles.c" , 1301, __PRETTY_FUNCTION__); } while (0); |
1302 | assert(st)do { if ((__builtin_expect(!!(!(st)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("st"), "../src/tmpfiles/tmpfiles.c", 1302 , __PRETTY_FUNCTION__); } while (0); |
1303 | |
1304 | /* This returns the first error we run into, but nevertheless |
1305 | * tries to go on */ |
1306 | r = action(i, fd, st); |
1307 | |
1308 | if (S_ISDIR(st->st_mode)((((st->st_mode)) & 0170000) == (0040000))) { |
1309 | char procfs_path[STRLEN("/proc/self/fd/")(sizeof("""/proc/self/fd/""") - 1) + DECIMAL_STR_MAX(int)(2+(sizeof(int) <= 1 ? 3 : sizeof(int) <= 2 ? 5 : sizeof (int) <= 4 ? 10 : sizeof(int) <= 8 ? 20 : sizeof(int[-2 *(sizeof(int) > 8)])))]; |
1310 | _cleanup_closedir___attribute__((cleanup(closedirp))) DIR *d = NULL((void*)0); |
1311 | struct dirent *de; |
1312 | |
1313 | /* The passed 'fd' was opened with O_PATH. We need to convert |
1314 | * it into a 'regular' fd before reading the directory content. */ |
1315 | xsprintf(procfs_path, "/proc/self/fd/%i", fd)do { if ((__builtin_expect(!!(!(((size_t) snprintf(procfs_path , __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(procfs_path), typeof(&*(procfs_path))), sizeof(procfs_path )/sizeof((procfs_path)[0]), ((void)0))), "/proc/self/fd/%i", fd ) < (__extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(procfs_path), typeof(&*(procfs_path))), sizeof(procfs_path )/sizeof((procfs_path)[0]), ((void)0))))))),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("xsprintf: " "procfs_path" "[] must be big enough" ), "../src/tmpfiles/tmpfiles.c", 1315, __PRETTY_FUNCTION__); } while (0); |
1316 | |
1317 | d = opendir(procfs_path); |
1318 | if (!d) { |
1319 | r = r ?: -errno(*__errno_location ()); |
1320 | goto finish; |
1321 | } |
1322 | |
1323 | FOREACH_DIRENT_ALL(de, d, q = -errno; goto finish)for ((*__errno_location ()) = 0, de = readdir(d);; (*__errno_location ()) = 0, de = readdir(d)) if (!de) { if ((*__errno_location ( )) > 0) { q = -(*__errno_location ()); goto finish; } break ; } else { |
1324 | struct stat de_st; |
1325 | int de_fd; |
1326 | |
1327 | if (dot_or_dot_dot(de->d_name)) |
1328 | continue; |
1329 | |
1330 | de_fd = openat(fd, de->d_name, O_NOFOLLOW0400000|O_CLOEXEC02000000|O_PATH010000000); |
1331 | if (de_fd >= 0 && fstat(de_fd, &de_st) >= 0) |
1332 | /* pass ownership of dirent fd over */ |
1333 | q = item_do(i, de_fd, &de_st, action); |
1334 | else |
1335 | q = -errno(*__errno_location ()); |
1336 | |
1337 | if (q < 0 && r == 0) |
1338 | r = q; |
1339 | } |
1340 | } |
1341 | finish: |
1342 | safe_close(fd); |
1343 | return r; |
1344 | } |
1345 | |
1346 | static int glob_item(Item *i, action_t action) { |
1347 | _cleanup_globfree___attribute__((cleanup(globfree))) glob_t g = { |
1348 | .gl_opendir = (void *(*)(const char *)) opendir_nomod, |
1349 | }; |
1350 | int r = 0, k; |
1351 | char **fn; |
1352 | |
1353 | k = safe_glob(i->path, GLOB_NOSORT(1 << 2)|GLOB_BRACE(1 << 10), &g); |
1354 | if (k < 0 && k != -ENOENT2) |
1355 | return log_error_errno(k, "glob(%s) failed: %m", i->path)({ int _level = ((3)), _e = ((k)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1355, __func__, "glob(%s) failed: %m" , i->path) : -abs(_e); }); |
1356 | |
1357 | STRV_FOREACH(fn, g.gl_pathv)for ((fn) = (g.gl_pathv); (fn) && *(fn); (fn)++) { |
1358 | k = action(i, *fn); |
1359 | if (k < 0 && r == 0) |
1360 | r = k; |
1361 | } |
1362 | |
1363 | return r; |
1364 | } |
1365 | |
1366 | static int glob_item_recursively(Item *i, fdaction_t action) { |
1367 | _cleanup_globfree___attribute__((cleanup(globfree))) glob_t g = { |
1368 | .gl_opendir = (void *(*)(const char *)) opendir_nomod, |
1369 | }; |
1370 | int r = 0, k; |
1371 | char **fn; |
1372 | |
1373 | k = safe_glob(i->path, GLOB_NOSORT(1 << 2)|GLOB_BRACE(1 << 10), &g); |
1374 | if (k < 0 && k != -ENOENT2) |
1375 | return log_error_errno(k, "glob(%s) failed: %m", i->path)({ int _level = ((3)), _e = ((k)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1375, __func__, "glob(%s) failed: %m" , i->path) : -abs(_e); }); |
1376 | |
1377 | STRV_FOREACH(fn, g.gl_pathv)for ((fn) = (g.gl_pathv); (fn) && *(fn); (fn)++) { |
1378 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1; |
1379 | struct stat st; |
1380 | |
1381 | /* Make sure we won't trigger/follow file object (such as |
1382 | * device nodes, automounts, ...) pointed out by 'fn' with |
1383 | * O_PATH. Note, when O_PATH is used, flags other than |
1384 | * O_CLOEXEC, O_DIRECTORY, and O_NOFOLLOW are ignored. */ |
1385 | |
1386 | fd = open(*fn, O_CLOEXEC02000000|O_NOFOLLOW0400000|O_PATH010000000); |
1387 | if (fd < 0) { |
1388 | r = r ?: -errno(*__errno_location ()); |
1389 | continue; |
1390 | } |
1391 | |
1392 | if (fstat(fd, &st) < 0) { |
1393 | r = r ?: -errno(*__errno_location ()); |
1394 | continue; |
1395 | } |
1396 | |
1397 | k = item_do(i, fd, &st, action); |
1398 | if (k < 0 && r == 0) |
1399 | r = k; |
1400 | |
1401 | /* we passed fd ownership to the previous call */ |
1402 | fd = -1; |
1403 | } |
1404 | |
1405 | return r; |
1406 | } |
1407 | |
1408 | typedef enum { |
1409 | CREATION_NORMAL, |
1410 | CREATION_EXISTING, |
1411 | CREATION_FORCE, |
1412 | _CREATION_MODE_MAX, |
1413 | _CREATION_MODE_INVALID = -1 |
1414 | } CreationMode; |
1415 | |
1416 | static const char *creation_mode_verb_table[_CREATION_MODE_MAX] = { |
1417 | [CREATION_NORMAL] = "Created", |
1418 | [CREATION_EXISTING] = "Found existing", |
1419 | [CREATION_FORCE] = "Created replacement", |
1420 | }; |
1421 | |
1422 | DEFINE_PRIVATE_STRING_TABLE_LOOKUP_TO_STRING(creation_mode_verb, CreationMode)static const char *creation_mode_verb_to_string(CreationMode i ) { if (i < 0 || i >= (CreationMode) __extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(creation_mode_verb_table ), typeof(&*(creation_mode_verb_table))), sizeof(creation_mode_verb_table )/sizeof((creation_mode_verb_table)[0]), ((void)0)))) return ( (void*)0); return creation_mode_verb_table[i]; }; |
1423 | |
1424 | static int create_item(Item *i) { |
1425 | struct stat st; |
1426 | int r = 0; |
1427 | int q = 0; |
1428 | CreationMode creation; |
1429 | |
1430 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 1430 , __PRETTY_FUNCTION__); } while (0); |
1431 | |
1432 | log_debug("Running create action for entry %c %s", (char) i->type, i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1432, __func__, "Running create action for entry %c %s" , (char) i->type, i->path) : -abs(_e); }); |
1433 | |
1434 | switch (i->type) { |
1435 | |
1436 | case IGNORE_PATH: |
1437 | case IGNORE_DIRECTORY_PATH: |
1438 | case REMOVE_PATH: |
1439 | case RECURSIVE_REMOVE_PATH: |
1440 | return 0; |
1441 | |
1442 | case CREATE_FILE: |
1443 | case TRUNCATE_FILE: |
1444 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) |
1445 | (void) mkdir_parents_label(i->path, 0755); |
1446 | |
1447 | r = write_one_file(i, i->path); |
1448 | if (r < 0) |
1449 | return r; |
1450 | break; |
1451 | |
1452 | case COPY_FILES: |
1453 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) |
1454 | (void) mkdir_parents_label(i->path, 0755); |
1455 | |
1456 | log_debug("Copying tree \"%s\" to \"%s\".", i->argument, i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1456, __func__, "Copying tree \"%s\" to \"%s\"." , i->argument, i->path) : -abs(_e); }); |
1457 | r = copy_tree(i->argument, i->path, |
1458 | i->uid_set ? i->uid : UID_INVALID((uid_t) -1), |
1459 | i->gid_set ? i->gid : GID_INVALID((gid_t) -1), |
1460 | COPY_REFLINK); |
1461 | |
1462 | if (r == -EROFS30 && stat(i->path, &st) == 0) |
1463 | r = -EEXIST17; |
1464 | |
1465 | if (r < 0) { |
1466 | struct stat a, b; |
1467 | |
1468 | if (r != -EEXIST17) |
1469 | return log_error_errno(r, "Failed to copy files to %s: %m", i->path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1469, __func__, "Failed to copy files to %s: %m" , i->path) : -abs(_e); }); |
1470 | |
1471 | if (stat(i->argument, &a) < 0) |
1472 | return log_error_errno(errno, "stat(%s) failed: %m", i->argument)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1472, __func__ , "stat(%s) failed: %m", i->argument) : -abs(_e); }); |
1473 | |
1474 | if (stat(i->path, &b) < 0) |
1475 | return log_error_errno(errno, "stat(%s) failed: %m", i->path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1475, __func__ , "stat(%s) failed: %m", i->path) : -abs(_e); }); |
1476 | |
1477 | if ((a.st_mode ^ b.st_mode) & S_IFMT0170000) { |
1478 | log_debug("Can't copy to %s, file exists already and is of different type", i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1478, __func__, "Can't copy to %s, file exists already and is of different type" , i->path) : -abs(_e); }); |
1479 | return 0; |
1480 | } |
1481 | } |
1482 | |
1483 | r = path_set_perms(i, i->path); |
1484 | if (r < 0) |
1485 | return r; |
1486 | |
1487 | break; |
1488 | |
1489 | case WRITE_FILE: |
1490 | r = glob_item(i, write_one_file); |
1491 | if (r < 0) |
1492 | return r; |
1493 | |
1494 | break; |
1495 | |
1496 | case CREATE_DIRECTORY: |
1497 | case TRUNCATE_DIRECTORY: |
1498 | case CREATE_SUBVOLUME: |
1499 | case CREATE_SUBVOLUME_INHERIT_QUOTA: |
1500 | case CREATE_SUBVOLUME_NEW_QUOTA: |
1501 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) |
1502 | (void) mkdir_parents_label(i->path, 0755); |
1503 | |
1504 | if (IN_SET(i->type, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA, CREATE_SUBVOLUME_NEW_QUOTA)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA})/sizeof(int)]; switch(i->type ) { case CREATE_SUBVOLUME: case CREATE_SUBVOLUME_INHERIT_QUOTA : case CREATE_SUBVOLUME_NEW_QUOTA: _found = 1; break; default : break; } _found; })) { |
1505 | |
1506 | if (btrfs_is_subvol(empty_to_root(arg_root)) <= 0) |
1507 | |
1508 | /* Don't create a subvolume unless the |
1509 | * root directory is one, too. We do |
1510 | * this under the assumption that if |
1511 | * the root directory is just a plain |
1512 | * directory (i.e. very light-weight), |
1513 | * we shouldn't try to split it up |
1514 | * into subvolumes (i.e. more |
1515 | * heavy-weight). Thus, chroot() |
1516 | * environments and suchlike will get |
1517 | * a full brtfs subvolume set up below |
1518 | * their tree only if they |
1519 | * specifically set up a btrfs |
1520 | * subvolume for the root dir too. */ |
1521 | |
1522 | r = -ENOTTY25; |
1523 | else { |
1524 | RUN_WITH_UMASK((~i->mode) & 0777)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask((~i->mode) & 0777), 0 }; !_saved_umask_ .quit ; _saved_umask_.quit = 1) |
1525 | r = btrfs_subvol_make(i->path); |
1526 | } |
1527 | } else |
1528 | r = 0; |
1529 | |
1530 | if (IN_SET(i->type, CREATE_DIRECTORY, TRUNCATE_DIRECTORY)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_DIRECTORY, TRUNCATE_DIRECTORY})/sizeof (int)]; switch(i->type) { case CREATE_DIRECTORY: case TRUNCATE_DIRECTORY : _found = 1; break; default: break; } _found; }) || r == -ENOTTY25) |
1531 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) |
1532 | r = mkdir_label(i->path, i->mode); |
1533 | |
1534 | if (r < 0) { |
1535 | int k; |
1536 | |
1537 | if (!IN_SET(r, -EEXIST, -EROFS)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-17, -30})/sizeof(int)]; switch(r) { case -17: case -30: _found = 1; break; default: break; } _found; } )) |
1538 | return log_error_errno(r, "Failed to create directory or subvolume \"%s\": %m", i->path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1538, __func__, "Failed to create directory or subvolume \"%s\": %m" , i->path) : -abs(_e); }); |
1539 | |
1540 | k = is_dir(i->path, false0); |
1541 | if (k == -ENOENT2 && r == -EROFS30) |
1542 | return log_error_errno(r, "%s does not exist and cannot be created as the file system is read-only.", i->path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1542, __func__, "%s does not exist and cannot be created as the file system is read-only." , i->path) : -abs(_e); }); |
1543 | if (k < 0) |
1544 | return log_error_errno(k, "Failed to check if %s exists: %m", i->path)({ int _level = ((3)), _e = ((k)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1544, __func__, "Failed to check if %s exists: %m" , i->path) : -abs(_e); }); |
1545 | if (!k) { |
1546 | log_warning("\"%s\" already exists and is not a directory.", i->path)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1546, __func__, "\"%s\" already exists and is not a directory." , i->path) : -abs(_e); }); |
1547 | return 0; |
1548 | } |
1549 | |
1550 | creation = CREATION_EXISTING; |
1551 | } else |
1552 | creation = CREATION_NORMAL; |
1553 | |
1554 | log_debug("%s directory \"%s\".", creation_mode_verb_to_string(creation), i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1554, __func__, "%s directory \"%s\"." , creation_mode_verb_to_string(creation), i->path) : -abs( _e); }); |
1555 | |
1556 | if (IN_SET(i->type, CREATE_SUBVOLUME_NEW_QUOTA, CREATE_SUBVOLUME_INHERIT_QUOTA)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_SUBVOLUME_NEW_QUOTA, CREATE_SUBVOLUME_INHERIT_QUOTA })/sizeof(int)]; switch(i->type) { case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_SUBVOLUME_INHERIT_QUOTA: _found = 1; break; default : break; } _found; })) { |
1557 | r = btrfs_subvol_auto_qgroup(i->path, 0, i->type == CREATE_SUBVOLUME_NEW_QUOTA); |
1558 | if (r == -ENOTTY25) |
1559 | log_debug_errno(r, "Couldn't adjust quota for subvolume \"%s\" (unsupported fs or dir not a subvolume): %m", i->path)({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1559, __func__, "Couldn't adjust quota for subvolume \"%s\" (unsupported fs or dir not a subvolume): %m" , i->path) : -abs(_e); }); |
1560 | else if (r == -EROFS30) |
1561 | log_debug_errno(r, "Couldn't adjust quota for subvolume \"%s\" (fs is read-only).", i->path)({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1561, __func__, "Couldn't adjust quota for subvolume \"%s\" (fs is read-only)." , i->path) : -abs(_e); }); |
1562 | else if (r == -ENOPROTOOPT92) |
1563 | log_debug_errno(r, "Couldn't adjust quota for subvolume \"%s\" (quota support is disabled).", i->path)({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1563, __func__, "Couldn't adjust quota for subvolume \"%s\" (quota support is disabled)." , i->path) : -abs(_e); }); |
1564 | else if (r < 0) |
1565 | q = log_error_errno(r, "Failed to adjust quota for subvolume \"%s\": %m", i->path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1565, __func__, "Failed to adjust quota for subvolume \"%s\": %m" , i->path) : -abs(_e); }); |
1566 | else if (r > 0) |
1567 | log_debug("Adjusted quota for subvolume \"%s\".", i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1567, __func__, "Adjusted quota for subvolume \"%s\"." , i->path) : -abs(_e); }); |
1568 | else if (r == 0) |
1569 | log_debug("Quota for subvolume \"%s\" already in place, no change made.", i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1569, __func__, "Quota for subvolume \"%s\" already in place, no change made." , i->path) : -abs(_e); }); |
1570 | } |
1571 | |
1572 | _fallthrough_; |
1573 | case EMPTY_DIRECTORY: |
1574 | r = glob_item(i, path_set_perms); |
1575 | if (q < 0) |
1576 | return q; |
1577 | if (r < 0) |
1578 | return r; |
1579 | |
1580 | break; |
1581 | |
1582 | case CREATE_FIFO: |
1583 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) { |
1584 | (void) mkdir_parents_label(i->path, 0755); |
1585 | |
1586 | mac_selinux_create_file_prepare(i->path, S_IFIFO0010000); |
1587 | r = mkfifo(i->path, i->mode); |
1588 | mac_selinux_create_file_clear(); |
1589 | } |
1590 | |
1591 | if (r < 0) { |
1592 | if (errno(*__errno_location ()) != EEXIST17) |
1593 | return log_error_errno(errno, "Failed to create fifo %s: %m", i->path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1593, __func__ , "Failed to create fifo %s: %m", i->path) : -abs(_e); }); |
1594 | |
1595 | if (lstat(i->path, &st) < 0) |
1596 | return log_error_errno(errno, "stat(%s) failed: %m", i->path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1596, __func__ , "stat(%s) failed: %m", i->path) : -abs(_e); }); |
1597 | |
1598 | if (!S_ISFIFO(st.st_mode)((((st.st_mode)) & 0170000) == (0010000))) { |
1599 | |
1600 | if (i->force) { |
1601 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) { |
1602 | mac_selinux_create_file_prepare(i->path, S_IFIFO0010000); |
1603 | r = mkfifo_atomic(i->path, i->mode); |
1604 | mac_selinux_create_file_clear(); |
1605 | } |
1606 | |
1607 | if (r < 0) |
1608 | return log_error_errno(r, "Failed to create fifo %s: %m", i->path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1608, __func__, "Failed to create fifo %s: %m" , i->path) : -abs(_e); }); |
1609 | creation = CREATION_FORCE; |
1610 | } else { |
1611 | log_warning("\"%s\" already exists and is not a fifo.", i->path)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1611, __func__, "\"%s\" already exists and is not a fifo." , i->path) : -abs(_e); }); |
1612 | return 0; |
1613 | } |
1614 | } else |
1615 | creation = CREATION_EXISTING; |
1616 | } else |
1617 | creation = CREATION_NORMAL; |
1618 | log_debug("%s fifo \"%s\".", creation_mode_verb_to_string(creation), i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1618, __func__, "%s fifo \"%s\"." , creation_mode_verb_to_string(creation), i->path) : -abs( _e); }); |
1619 | |
1620 | r = path_set_perms(i, i->path); |
1621 | if (r < 0) |
1622 | return r; |
1623 | |
1624 | break; |
1625 | |
1626 | case CREATE_SYMLINK: { |
1627 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) |
1628 | (void) mkdir_parents_label(i->path, 0755); |
1629 | |
1630 | mac_selinux_create_file_prepare(i->path, S_IFLNK0120000); |
1631 | r = symlink(i->argument, i->path); |
1632 | mac_selinux_create_file_clear(); |
1633 | |
1634 | if (r < 0) { |
1635 | _cleanup_free___attribute__((cleanup(freep))) char *x = NULL((void*)0); |
1636 | |
1637 | if (errno(*__errno_location ()) != EEXIST17) |
1638 | return log_error_errno(errno, "symlink(%s, %s) failed: %m", i->argument, i->path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1638, __func__ , "symlink(%s, %s) failed: %m", i->argument, i->path) : -abs(_e); }); |
1639 | |
1640 | r = readlink_malloc(i->path, &x); |
1641 | if (r < 0 || !streq(i->argument, x)(strcmp((i->argument),(x)) == 0)) { |
1642 | |
1643 | if (i->force) { |
1644 | mac_selinux_create_file_prepare(i->path, S_IFLNK0120000); |
1645 | r = symlink_atomic(i->argument, i->path); |
1646 | mac_selinux_create_file_clear(); |
1647 | |
1648 | if (IN_SET(r, -EISDIR, -EEXIST, -ENOTEMPTY)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-21, -17, -39})/sizeof(int)]; switch(r) { case -21: case -17: case -39: _found = 1; break; default: break ; } _found; })) { |
1649 | r = rm_rf(i->path, REMOVE_ROOT|REMOVE_PHYSICAL); |
1650 | if (r < 0) |
1651 | return log_error_errno(r, "rm -fr %s failed: %m", i->path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1651, __func__, "rm -fr %s failed: %m" , i->path) : -abs(_e); }); |
1652 | |
1653 | mac_selinux_create_file_prepare(i->path, S_IFLNK0120000); |
1654 | r = symlink(i->argument, i->path) < 0 ? -errno(*__errno_location ()) : 0; |
1655 | mac_selinux_create_file_clear(); |
1656 | } |
1657 | if (r < 0) |
1658 | return log_error_errno(r, "symlink(%s, %s) failed: %m", i->argument, i->path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1658, __func__, "symlink(%s, %s) failed: %m" , i->argument, i->path) : -abs(_e); }); |
1659 | |
1660 | creation = CREATION_FORCE; |
1661 | } else { |
1662 | log_debug("\"%s\" is not a symlink or does not point to the correct path.", i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1662, __func__, "\"%s\" is not a symlink or does not point to the correct path." , i->path) : -abs(_e); }); |
1663 | return 0; |
1664 | } |
1665 | } else |
1666 | creation = CREATION_EXISTING; |
1667 | } else |
1668 | |
1669 | creation = CREATION_NORMAL; |
1670 | log_debug("%s symlink \"%s\".", creation_mode_verb_to_string(creation), i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1670, __func__, "%s symlink \"%s\"." , creation_mode_verb_to_string(creation), i->path) : -abs( _e); }); |
1671 | break; |
1672 | } |
1673 | |
1674 | case CREATE_BLOCK_DEVICE: |
1675 | case CREATE_CHAR_DEVICE: { |
1676 | mode_t file_type; |
1677 | |
1678 | if (have_effective_cap(CAP_MKNOD27) == 0) { |
1679 | /* In a container we lack CAP_MKNOD. We |
1680 | shouldn't attempt to create the device node in |
1681 | that case to avoid noise, and we don't support |
1682 | virtualized devices in containers anyway. */ |
1683 | |
1684 | log_debug("We lack CAP_MKNOD, skipping creation of device node %s.", i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1684, __func__, "We lack CAP_MKNOD, skipping creation of device node %s." , i->path) : -abs(_e); }); |
1685 | return 0; |
1686 | } |
1687 | |
1688 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) |
1689 | (void) mkdir_parents_label(i->path, 0755); |
1690 | |
1691 | file_type = i->type == CREATE_BLOCK_DEVICE ? S_IFBLK0060000 : S_IFCHR0020000; |
1692 | |
1693 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) { |
1694 | mac_selinux_create_file_prepare(i->path, file_type); |
1695 | r = mknod(i->path, i->mode | file_type, i->major_minor); |
1696 | mac_selinux_create_file_clear(); |
1697 | } |
1698 | |
1699 | if (r < 0) { |
1700 | if (errno(*__errno_location ()) == EPERM1) { |
1701 | log_debug("We lack permissions, possibly because of cgroup configuration; "({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1702, __func__, "We lack permissions, possibly because of cgroup configuration; " "skipping creation of device node %s.", i->path) : -abs(_e ); }) |
1702 | "skipping creation of device node %s.", i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1702, __func__, "We lack permissions, possibly because of cgroup configuration; " "skipping creation of device node %s.", i->path) : -abs(_e ); }); |
1703 | return 0; |
1704 | } |
1705 | |
1706 | if (errno(*__errno_location ()) != EEXIST17) |
1707 | return log_error_errno(errno, "Failed to create device node %s: %m", i->path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1707, __func__ , "Failed to create device node %s: %m", i->path) : -abs(_e ); }); |
1708 | |
1709 | if (lstat(i->path, &st) < 0) |
1710 | return log_error_errno(errno, "stat(%s) failed: %m", i->path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1710, __func__ , "stat(%s) failed: %m", i->path) : -abs(_e); }); |
1711 | |
1712 | if ((st.st_mode & S_IFMT0170000) != file_type) { |
1713 | |
1714 | if (i->force) { |
1715 | |
1716 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) { |
1717 | mac_selinux_create_file_prepare(i->path, file_type); |
1718 | r = mknod_atomic(i->path, i->mode | file_type, i->major_minor); |
1719 | mac_selinux_create_file_clear(); |
1720 | } |
1721 | |
1722 | if (r < 0) |
1723 | return log_error_errno(r, "Failed to create device node \"%s\": %m", i->path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1723, __func__, "Failed to create device node \"%s\": %m" , i->path) : -abs(_e); }); |
1724 | creation = CREATION_FORCE; |
1725 | } else { |
1726 | log_debug("%s is not a device node.", i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1726, __func__, "%s is not a device node." , i->path) : -abs(_e); }); |
1727 | return 0; |
1728 | } |
1729 | } else |
1730 | creation = CREATION_EXISTING; |
1731 | } else |
1732 | creation = CREATION_NORMAL; |
1733 | |
1734 | log_debug("%s %s device node \"%s\" %u:%u.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1737, __func__, "%s %s device node \"%s\" %u:%u." , creation_mode_verb_to_string(creation), i->type == CREATE_BLOCK_DEVICE ? "block" : "char", i->path, gnu_dev_major (i->mode), gnu_dev_minor (i->mode)) : -abs(_e); }) |
1735 | creation_mode_verb_to_string(creation),({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1737, __func__, "%s %s device node \"%s\" %u:%u." , creation_mode_verb_to_string(creation), i->type == CREATE_BLOCK_DEVICE ? "block" : "char", i->path, gnu_dev_major (i->mode), gnu_dev_minor (i->mode)) : -abs(_e); }) |
1736 | i->type == CREATE_BLOCK_DEVICE ? "block" : "char",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1737, __func__, "%s %s device node \"%s\" %u:%u." , creation_mode_verb_to_string(creation), i->type == CREATE_BLOCK_DEVICE ? "block" : "char", i->path, gnu_dev_major (i->mode), gnu_dev_minor (i->mode)) : -abs(_e); }) |
1737 | i->path, major(i->mode), minor(i->mode))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1737, __func__, "%s %s device node \"%s\" %u:%u." , creation_mode_verb_to_string(creation), i->type == CREATE_BLOCK_DEVICE ? "block" : "char", i->path, gnu_dev_major (i->mode), gnu_dev_minor (i->mode)) : -abs(_e); }); |
1738 | |
1739 | r = path_set_perms(i, i->path); |
1740 | if (r < 0) |
1741 | return r; |
1742 | |
1743 | break; |
1744 | } |
1745 | |
1746 | case ADJUST_MODE: |
1747 | case RELABEL_PATH: |
1748 | r = glob_item(i, path_set_perms); |
1749 | if (r < 0) |
1750 | return r; |
1751 | break; |
1752 | |
1753 | case RECURSIVE_RELABEL_PATH: |
1754 | r = glob_item_recursively(i, fd_set_perms); |
1755 | if (r < 0) |
1756 | return r; |
1757 | break; |
1758 | |
1759 | case SET_XATTR: |
1760 | r = glob_item(i, path_set_xattrs); |
1761 | if (r < 0) |
1762 | return r; |
1763 | break; |
1764 | |
1765 | case RECURSIVE_SET_XATTR: |
1766 | r = glob_item_recursively(i, fd_set_xattrs); |
1767 | if (r < 0) |
1768 | return r; |
1769 | break; |
1770 | |
1771 | case SET_ACL: |
1772 | r = glob_item(i, path_set_acls); |
1773 | if (r < 0) |
1774 | return r; |
1775 | break; |
1776 | |
1777 | case RECURSIVE_SET_ACL: |
1778 | r = glob_item_recursively(i, fd_set_acls); |
1779 | if (r < 0) |
1780 | return r; |
1781 | break; |
1782 | |
1783 | case SET_ATTRIBUTE: |
1784 | r = glob_item(i, path_set_attribute); |
1785 | if (r < 0) |
1786 | return r; |
1787 | break; |
1788 | |
1789 | case RECURSIVE_SET_ATTRIBUTE: |
1790 | r = glob_item_recursively(i, fd_set_attribute); |
1791 | if (r < 0) |
1792 | return r; |
1793 | break; |
1794 | } |
1795 | |
1796 | return 0; |
1797 | } |
1798 | |
1799 | static int remove_item_instance(Item *i, const char *instance) { |
1800 | int r; |
1801 | |
1802 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 1802 , __PRETTY_FUNCTION__); } while (0); |
1803 | |
1804 | switch (i->type) { |
1805 | |
1806 | case REMOVE_PATH: |
1807 | if (remove(instance) < 0 && errno(*__errno_location ()) != ENOENT2) |
1808 | return log_error_errno(errno, "rm(%s): %m", instance)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1808, __func__ , "rm(%s): %m", instance) : -abs(_e); }); |
1809 | |
1810 | break; |
1811 | |
1812 | case TRUNCATE_DIRECTORY: |
1813 | case RECURSIVE_REMOVE_PATH: |
1814 | /* FIXME: we probably should use dir_cleanup() here |
1815 | * instead of rm_rf() so that 'x' is honoured. */ |
1816 | log_debug("rm -rf \"%s\"", instance)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1816, __func__, "rm -rf \"%s\"" , instance) : -abs(_e); }); |
1817 | r = rm_rf(instance, (i->type == RECURSIVE_REMOVE_PATH ? REMOVE_ROOT|REMOVE_SUBVOLUME : 0) | REMOVE_PHYSICAL); |
1818 | if (r < 0 && r != -ENOENT2) |
1819 | return log_error_errno(r, "rm_rf(%s): %m", instance)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1819, __func__, "rm_rf(%s): %m" , instance) : -abs(_e); }); |
1820 | |
1821 | break; |
1822 | |
1823 | default: |
1824 | assert_not_reached("wut?")do { log_assert_failed_unreachable_realm(LOG_REALM_SYSTEMD, ( "wut?"), "../src/tmpfiles/tmpfiles.c", 1824, __PRETTY_FUNCTION__ ); } while (0); |
1825 | } |
1826 | |
1827 | return 0; |
1828 | } |
1829 | |
1830 | static int remove_item(Item *i) { |
1831 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 1831 , __PRETTY_FUNCTION__); } while (0); |
1832 | |
1833 | log_debug("Running remove action for entry %c %s", (char) i->type, i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1833, __func__, "Running remove action for entry %c %s" , (char) i->type, i->path) : -abs(_e); }); |
1834 | |
1835 | switch (i->type) { |
1836 | |
1837 | case REMOVE_PATH: |
1838 | case TRUNCATE_DIRECTORY: |
1839 | case RECURSIVE_REMOVE_PATH: |
1840 | return glob_item(i, remove_item_instance); |
1841 | |
1842 | default: |
1843 | return 0; |
1844 | } |
1845 | } |
1846 | |
1847 | static int clean_item_instance(Item *i, const char* instance) { |
1848 | _cleanup_closedir___attribute__((cleanup(closedirp))) DIR *d = NULL((void*)0); |
1849 | struct stat s, ps; |
1850 | bool_Bool mountpoint; |
1851 | usec_t cutoff, n; |
1852 | char timestamp[FORMAT_TIMESTAMP_MAX(3+1+10+1+8+1+6+1+6+1)]; |
1853 | |
1854 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 1854 , __PRETTY_FUNCTION__); } while (0); |
1855 | |
1856 | if (!i->age_set) |
1857 | return 0; |
1858 | |
1859 | n = now(CLOCK_REALTIME0); |
1860 | if (n < i->age) |
1861 | return 0; |
1862 | |
1863 | cutoff = n - i->age; |
1864 | |
1865 | d = opendir_nomod(instance); |
1866 | if (!d) { |
1867 | if (IN_SET(errno, ENOENT, ENOTDIR)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){2, 20})/sizeof(int)]; switch((*__errno_location ())) { case 2: case 20: _found = 1; break; default: break; } _found; })) { |
1868 | log_debug_errno(errno, "Directory \"%s\": %m", instance)({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1868, __func__ , "Directory \"%s\": %m", instance) : -abs(_e); }); |
1869 | return 0; |
1870 | } |
1871 | |
1872 | return log_error_errno(errno, "Failed to open directory %s: %m", instance)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1872, __func__ , "Failed to open directory %s: %m", instance) : -abs(_e); }); |
1873 | } |
1874 | |
1875 | if (fstat(dirfd(d), &s) < 0) |
1876 | return log_error_errno(errno, "stat(%s) failed: %m", i->path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1876, __func__ , "stat(%s) failed: %m", i->path) : -abs(_e); }); |
1877 | |
1878 | if (!S_ISDIR(s.st_mode)((((s.st_mode)) & 0170000) == (0040000))) { |
1879 | log_error("%s is not a directory.", i->path)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1879, __func__, "%s is not a directory." , i->path) : -abs(_e); }); |
1880 | return -ENOTDIR20; |
1881 | } |
1882 | |
1883 | if (fstatat(dirfd(d), "..", &ps, AT_SYMLINK_NOFOLLOW0x100) != 0) |
1884 | return log_error_errno(errno, "stat(%s/..) failed: %m", i->path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1884, __func__ , "stat(%s/..) failed: %m", i->path) : -abs(_e); }); |
1885 | |
1886 | mountpoint = s.st_dev != ps.st_dev || s.st_ino == ps.st_ino; |
1887 | |
1888 | log_debug("Cleanup threshold for %s \"%s\" is %s",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1891, __func__, "Cleanup threshold for %s \"%s\" is %s" , mountpoint ? "mount point" : "directory", instance, format_timestamp_us (timestamp, sizeof(timestamp), cutoff)) : -abs(_e); }) |
1889 | mountpoint ? "mount point" : "directory",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1891, __func__, "Cleanup threshold for %s \"%s\" is %s" , mountpoint ? "mount point" : "directory", instance, format_timestamp_us (timestamp, sizeof(timestamp), cutoff)) : -abs(_e); }) |
1890 | instance,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1891, __func__, "Cleanup threshold for %s \"%s\" is %s" , mountpoint ? "mount point" : "directory", instance, format_timestamp_us (timestamp, sizeof(timestamp), cutoff)) : -abs(_e); }) |
1891 | format_timestamp_us(timestamp, sizeof(timestamp), cutoff))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1891, __func__, "Cleanup threshold for %s \"%s\" is %s" , mountpoint ? "mount point" : "directory", instance, format_timestamp_us (timestamp, sizeof(timestamp), cutoff)) : -abs(_e); }); |
1892 | |
1893 | return dir_cleanup(i, instance, d, &s, cutoff, s.st_dev, mountpoint, |
1894 | MAX_DEPTH256, i->keep_first_level); |
1895 | } |
1896 | |
1897 | static int clean_item(Item *i) { |
1898 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 1898 , __PRETTY_FUNCTION__); } while (0); |
1899 | |
1900 | log_debug("Running clean action for entry %c %s", (char) i->type, i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1900, __func__, "Running clean action for entry %c %s" , (char) i->type, i->path) : -abs(_e); }); |
1901 | |
1902 | switch (i->type) { |
1903 | case CREATE_DIRECTORY: |
1904 | case CREATE_SUBVOLUME: |
1905 | case CREATE_SUBVOLUME_INHERIT_QUOTA: |
1906 | case CREATE_SUBVOLUME_NEW_QUOTA: |
1907 | case TRUNCATE_DIRECTORY: |
1908 | case IGNORE_PATH: |
1909 | case COPY_FILES: |
1910 | clean_item_instance(i, i->path); |
1911 | return 0; |
1912 | case EMPTY_DIRECTORY: |
1913 | case IGNORE_DIRECTORY_PATH: |
1914 | return glob_item(i, clean_item_instance); |
1915 | default: |
1916 | return 0; |
1917 | } |
1918 | } |
1919 | |
1920 | static int process_item_array(ItemArray *array); |
1921 | |
1922 | static int process_item(Item *i) { |
1923 | int r, q, p, t = 0; |
1924 | _cleanup_free___attribute__((cleanup(freep))) char *prefix = NULL((void*)0); |
1925 | |
1926 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 1926 , __PRETTY_FUNCTION__); } while (0); |
1927 | |
1928 | if (i->done) |
1929 | return 0; |
1930 | |
1931 | i->done = true1; |
1932 | |
1933 | prefix = malloc(strlen(i->path) + 1); |
1934 | if (!prefix) |
1935 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 1935, __func__); |
1936 | |
1937 | PATH_FOREACH_PREFIX(prefix, i->path)for (char *_slash = ({ path_simplify(strcpy(prefix, i->path ), 0); (strcmp((prefix),("/")) == 0) ? ((void*)0) : strrchr(prefix , '/'); }); _slash && ((*_slash = 0), 1); _slash = strrchr ((prefix), '/')) { |
1938 | ItemArray *j; |
1939 | |
1940 | j = ordered_hashmap_get(items, prefix); |
1941 | if (j) { |
1942 | int s; |
1943 | |
1944 | s = process_item_array(j); |
1945 | if (s < 0 && t == 0) |
1946 | t = s; |
1947 | } |
1948 | } |
1949 | |
1950 | if (chase_symlinks(i->path, NULL((void*)0), CHASE_NO_AUTOFS, NULL((void*)0)) == -EREMOTE66) |
1951 | return t; |
1952 | |
1953 | r = arg_create ? create_item(i) : 0; |
1954 | q = arg_remove ? remove_item(i) : 0; |
1955 | p = arg_clean ? clean_item(i) : 0; |
1956 | |
1957 | return t < 0 ? t : |
1958 | r < 0 ? r : |
1959 | q < 0 ? q : |
1960 | p; |
1961 | } |
1962 | |
1963 | static int process_item_array(ItemArray *array) { |
1964 | unsigned n; |
1965 | int r = 0, k; |
1966 | |
1967 | assert(array)do { if ((__builtin_expect(!!(!(array)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("array"), "../src/tmpfiles/tmpfiles.c", 1967 , __PRETTY_FUNCTION__); } while (0); |
1968 | |
1969 | for (n = 0; n < array->count; n++) { |
1970 | k = process_item(array->items + n); |
1971 | if (k < 0 && r == 0) |
1972 | r = k; |
1973 | } |
1974 | |
1975 | return r; |
1976 | } |
1977 | |
1978 | static void item_free_contents(Item *i) { |
1979 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 1979 , __PRETTY_FUNCTION__); } while (0); |
1980 | free(i->path); |
1981 | free(i->argument); |
1982 | strv_free(i->xattrs); |
1983 | |
1984 | #if HAVE_ACL1 |
1985 | acl_free(i->acl_access); |
1986 | acl_free(i->acl_default); |
1987 | #endif |
1988 | } |
1989 | |
1990 | static void item_array_free(ItemArray *a) { |
1991 | unsigned n; |
1992 | |
1993 | if (!a) |
1994 | return; |
1995 | |
1996 | for (n = 0; n < a->count; n++) |
1997 | item_free_contents(a->items + n); |
1998 | free(a->items); |
1999 | free(a); |
2000 | } |
2001 | |
2002 | static int item_compare(const void *a, const void *b) { |
2003 | const Item *x = a, *y = b; |
2004 | |
2005 | /* Make sure that the ownership taking item is put first, so |
2006 | * that we first create the node, and then can adjust it */ |
2007 | |
2008 | if (takes_ownership(x->type) && !takes_ownership(y->type)) |
2009 | return -1; |
2010 | if (!takes_ownership(x->type) && takes_ownership(y->type)) |
2011 | return 1; |
2012 | |
2013 | return (int) x->type - (int) y->type; |
2014 | } |
2015 | |
2016 | static bool_Bool item_compatible(Item *a, Item *b) { |
2017 | assert(a)do { if ((__builtin_expect(!!(!(a)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("a"), "../src/tmpfiles/tmpfiles.c", 2017 , __PRETTY_FUNCTION__); } while (0); |
2018 | assert(b)do { if ((__builtin_expect(!!(!(b)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("b"), "../src/tmpfiles/tmpfiles.c", 2018 , __PRETTY_FUNCTION__); } while (0); |
2019 | assert(streq(a->path, b->path))do { if ((__builtin_expect(!!(!((strcmp((a->path),(b->path )) == 0))),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("streq(a->path, b->path)" ), "../src/tmpfiles/tmpfiles.c", 2019, __PRETTY_FUNCTION__); } while (0); |
2020 | |
2021 | if (takes_ownership(a->type) && takes_ownership(b->type)) |
2022 | /* check if the items are the same */ |
2023 | return streq_ptr(a->argument, b->argument) && |
2024 | |
2025 | a->uid_set == b->uid_set && |
2026 | a->uid == b->uid && |
2027 | |
2028 | a->gid_set == b->gid_set && |
2029 | a->gid == b->gid && |
2030 | |
2031 | a->mode_set == b->mode_set && |
2032 | a->mode == b->mode && |
2033 | |
2034 | a->age_set == b->age_set && |
2035 | a->age == b->age && |
2036 | |
2037 | a->mask_perms == b->mask_perms && |
2038 | |
2039 | a->keep_first_level == b->keep_first_level && |
2040 | |
2041 | a->major_minor == b->major_minor; |
2042 | |
2043 | return true1; |
2044 | } |
2045 | |
2046 | static bool_Bool should_include_path(const char *path) { |
2047 | char **prefix; |
2048 | |
2049 | STRV_FOREACH(prefix, arg_exclude_prefixes)for ((prefix) = (arg_exclude_prefixes); (prefix) && * (prefix); (prefix)++) |
2050 | if (path_startswith(path, *prefix)) { |
2051 | log_debug("Entry \"%s\" matches exclude prefix \"%s\", skipping.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2052, __func__, "Entry \"%s\" matches exclude prefix \"%s\", skipping." , path, *prefix) : -abs(_e); }) |
2052 | path, *prefix)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2052, __func__, "Entry \"%s\" matches exclude prefix \"%s\", skipping." , path, *prefix) : -abs(_e); }); |
2053 | return false0; |
2054 | } |
2055 | |
2056 | STRV_FOREACH(prefix, arg_include_prefixes)for ((prefix) = (arg_include_prefixes); (prefix) && * (prefix); (prefix)++) |
2057 | if (path_startswith(path, *prefix)) { |
2058 | log_debug("Entry \"%s\" matches include prefix \"%s\".", path, *prefix)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2058, __func__, "Entry \"%s\" matches include prefix \"%s\"." , path, *prefix) : -abs(_e); }); |
2059 | return true1; |
2060 | } |
2061 | |
2062 | /* no matches, so we should include this path only if we |
2063 | * have no whitelist at all */ |
2064 | if (strv_isempty(arg_include_prefixes)) |
2065 | return true1; |
2066 | |
2067 | log_debug("Entry \"%s\" does not match any include prefix, skipping.", path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2067, __func__, "Entry \"%s\" does not match any include prefix, skipping." , path) : -abs(_e); }); |
2068 | return false0; |
2069 | } |
2070 | |
2071 | static int specifier_expansion_from_arg(Item *i) { |
2072 | _cleanup_free___attribute__((cleanup(freep))) char *unescaped = NULL((void*)0), *resolved = NULL((void*)0); |
2073 | char **xattr; |
2074 | int r; |
2075 | |
2076 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 2076 , __PRETTY_FUNCTION__); } while (0); |
2077 | |
2078 | if (i->argument == NULL((void*)0)) |
2079 | return 0; |
2080 | |
2081 | switch (i->type) { |
2082 | case COPY_FILES: |
2083 | case CREATE_SYMLINK: |
2084 | case CREATE_FILE: |
2085 | case TRUNCATE_FILE: |
2086 | case WRITE_FILE: |
2087 | r = cunescape(i->argument, 0, &unescaped); |
2088 | if (r < 0) |
2089 | return log_error_errno(r, "Failed to unescape parameter to write: %s", i->argument)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2089, __func__, "Failed to unescape parameter to write: %s" , i->argument) : -abs(_e); }); |
2090 | |
2091 | r = specifier_printf(unescaped, specifier_table, NULL((void*)0), &resolved); |
2092 | if (r < 0) |
2093 | return r; |
2094 | |
2095 | free_and_replace(i->argument, resolved)({ free(i->argument); (i->argument) = (resolved); (resolved ) = ((void*)0); 0; }); |
2096 | break; |
2097 | |
2098 | case SET_XATTR: |
2099 | case RECURSIVE_SET_XATTR: |
2100 | assert(i->xattrs)do { if ((__builtin_expect(!!(!(i->xattrs)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i->xattrs"), "../src/tmpfiles/tmpfiles.c" , 2100, __PRETTY_FUNCTION__); } while (0); |
2101 | |
2102 | STRV_FOREACH (xattr, i->xattrs)for ((xattr) = (i->xattrs); (xattr) && *(xattr); ( xattr)++) { |
2103 | r = specifier_printf(*xattr, specifier_table, NULL((void*)0), &resolved); |
2104 | if (r < 0) |
2105 | return r; |
2106 | |
2107 | free_and_replace(*xattr, resolved)({ free(*xattr); (*xattr) = (resolved); (resolved) = ((void*) 0); 0; }); |
2108 | } |
2109 | break; |
2110 | |
2111 | default: |
2112 | break; |
2113 | } |
2114 | return 0; |
2115 | } |
2116 | |
2117 | static int patch_var_run(const char *fname, unsigned line, char **path) { |
2118 | const char *k; |
2119 | char *n; |
2120 | |
2121 | assert(path)do { if ((__builtin_expect(!!(!(path)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("path"), "../src/tmpfiles/tmpfiles.c", 2121 , __PRETTY_FUNCTION__); } while (0); |
2122 | assert(*path)do { if ((__builtin_expect(!!(!(*path)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("*path"), "../src/tmpfiles/tmpfiles.c", 2122 , __PRETTY_FUNCTION__); } while (0); |
2123 | |
2124 | /* Optionally rewrites lines referencing /var/run/, to use /run/ instead. Why bother? tmpfiles merges lines in |
2125 | * some cases and detects conflicts in others. If files/directories are specified through two equivalent lines |
2126 | * this is problematic as neither case will be detected. Ideally we'd detect these cases by resolving symlinks |
2127 | * early, but that's precisely not what we can do here as this code very likely is running very early on, at a |
2128 | * time where the paths in question are not available yet, or even more importantly, our own tmpfiles rules |
2129 | * might create the paths that are intermediary to the listed paths. We can't really cover the generic case, |
2130 | * but the least we can do is cover the specific case of /var/run vs. /run, as /var/run is a legacy name for |
2131 | * /run only, and we explicitly document that and require that on systemd systems the former is a symlink to |
2132 | * the latter. Moreover files below this path are by far the primary usecase for tmpfiles.d/. */ |
2133 | |
2134 | k = path_startswith(*path, "/var/run/"); |
2135 | if (isempty(k)) /* Don't complain about other paths than /var/run, and not about /var/run itself either. */ |
2136 | return 0; |
2137 | |
2138 | n = strjoin("/run/", k)strjoin_real(("/run/"), k, ((void*)0)); |
2139 | if (!n) |
2140 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2140, __func__); |
2141 | |
2142 | /* Also log about this briefly. We do so at LOG_NOTICE level, as we fixed up the situation automatically, hence |
2143 | * there's no immediate need for action by the user. However, in the interest of making things less confusing |
2144 | * to the user, let's still inform the user that these snippets should really be updated. */ |
2145 | |
2146 | log_notice("[%s:%u] Line references path below legacy directory /var/run/, updating %s → %s; please update the tmpfiles.d/ drop-in file accordingly.", fname, line, *path, n)({ int _level = (((5))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2146, __func__, "[%s:%u] Line references path below legacy directory /var/run/, updating %s → %s; please update the tmpfiles.d/ drop-in file accordingly." , fname, line, *path, n) : -abs(_e); }); |
2147 | |
2148 | free(*path); |
2149 | *path = n; |
2150 | |
2151 | return 0; |
2152 | } |
2153 | |
2154 | static int parse_line(const char *fname, unsigned line, const char *buffer, bool_Bool *invalid_config) { |
2155 | |
2156 | _cleanup_free___attribute__((cleanup(freep))) char *action = NULL((void*)0), *mode = NULL((void*)0), *user = NULL((void*)0), *group = NULL((void*)0), *age = NULL((void*)0), *path = NULL((void*)0); |
2157 | _cleanup_(item_free_contents)__attribute__((cleanup(item_free_contents))) Item i = {}; |
2158 | ItemArray *existing; |
2159 | OrderedHashmap *h; |
2160 | int r, pos; |
2161 | bool_Bool force = false0, boot = false0; |
2162 | |
2163 | assert(fname)do { if ((__builtin_expect(!!(!(fname)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fname"), "../src/tmpfiles/tmpfiles.c", 2163 , __PRETTY_FUNCTION__); } while (0); |
2164 | assert(line >= 1)do { if ((__builtin_expect(!!(!(line >= 1)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("line >= 1"), "../src/tmpfiles/tmpfiles.c" , 2164, __PRETTY_FUNCTION__); } while (0); |
2165 | assert(buffer)do { if ((__builtin_expect(!!(!(buffer)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("buffer"), "../src/tmpfiles/tmpfiles.c", 2165, __PRETTY_FUNCTION__); } while (0); |
2166 | |
2167 | r = extract_many_words( |
2168 | &buffer, |
2169 | NULL((void*)0), |
2170 | EXTRACT_QUOTES, |
2171 | &action, |
2172 | &path, |
2173 | &mode, |
2174 | &user, |
2175 | &group, |
2176 | &age, |
2177 | NULL((void*)0)); |
2178 | if (r < 0) { |
2179 | if (IN_SET(r, -EINVAL, -EBADSLT)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-22, -57})/sizeof(int)]; switch(r) { case -22: case -57: _found = 1; break; default: break; } _found; } )) |
2180 | /* invalid quoting and such or an unknown specifier */ |
2181 | *invalid_config = true1; |
2182 | return log_error_errno(r, "[%s:%u] Failed to parse line: %m", fname, line)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2182, __func__, "[%s:%u] Failed to parse line: %m" , fname, line) : -abs(_e); }); |
2183 | } else if (r < 2) { |
2184 | *invalid_config = true1; |
2185 | log_error("[%s:%u] Syntax error.", fname, line)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2185, __func__, "[%s:%u] Syntax error." , fname, line) : -abs(_e); }); |
2186 | return -EIO5; |
2187 | } |
2188 | |
2189 | if (!isempty(buffer) && !streq(buffer, "-")(strcmp((buffer),("-")) == 0)) { |
2190 | i.argument = strdup(buffer); |
2191 | if (!i.argument) |
2192 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2192, __func__); |
2193 | } |
2194 | |
2195 | if (isempty(action)) { |
2196 | *invalid_config = true1; |
2197 | log_error("[%s:%u] Command too short '%s'.", fname, line, action)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2197, __func__, "[%s:%u] Command too short '%s'." , fname, line, action) : -abs(_e); }); |
2198 | return -EINVAL22; |
2199 | } |
2200 | |
2201 | for (pos = 1; action[pos]; pos++) { |
2202 | if (action[pos] == '!' && !boot) |
2203 | boot = true1; |
2204 | else if (action[pos] == '+' && !force) |
2205 | force = true1; |
2206 | else { |
2207 | *invalid_config = true1; |
2208 | log_error("[%s:%u] Unknown modifiers in command '%s'",({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2209, __func__, "[%s:%u] Unknown modifiers in command '%s'" , fname, line, action) : -abs(_e); }) |
2209 | fname, line, action)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2209, __func__, "[%s:%u] Unknown modifiers in command '%s'" , fname, line, action) : -abs(_e); }); |
2210 | return -EINVAL22; |
2211 | } |
2212 | } |
2213 | |
2214 | if (boot && !arg_boot) { |
2215 | log_debug("Ignoring entry %s \"%s\" because --boot is not specified.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2216, __func__, "Ignoring entry %s \"%s\" because --boot is not specified." , action, path) : -abs(_e); }) |
2216 | action, path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2216, __func__, "Ignoring entry %s \"%s\" because --boot is not specified." , action, path) : -abs(_e); }); |
2217 | return 0; |
2218 | } |
2219 | |
2220 | i.type = action[0]; |
2221 | i.force = force; |
2222 | |
2223 | r = specifier_printf(path, specifier_table, NULL((void*)0), &i.path); |
2224 | if (r == -ENXIO6) |
2225 | return log_unresolvable_specifier(fname, line); |
2226 | if (r < 0) { |
2227 | if (IN_SET(r, -EINVAL, -EBADSLT)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-22, -57})/sizeof(int)]; switch(r) { case -22: case -57: _found = 1; break; default: break; } _found; } )) |
2228 | *invalid_config = true1; |
2229 | return log_error_errno(r, "[%s:%u] Failed to replace specifiers: %s", fname, line, path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2229, __func__, "[%s:%u] Failed to replace specifiers: %s" , fname, line, path) : -abs(_e); }); |
2230 | } |
2231 | |
2232 | r = patch_var_run(fname, line, &i.path); |
2233 | if (r < 0) |
2234 | return r; |
2235 | |
2236 | switch (i.type) { |
2237 | |
2238 | case CREATE_DIRECTORY: |
2239 | case CREATE_SUBVOLUME: |
2240 | case CREATE_SUBVOLUME_INHERIT_QUOTA: |
2241 | case CREATE_SUBVOLUME_NEW_QUOTA: |
2242 | case EMPTY_DIRECTORY: |
2243 | case TRUNCATE_DIRECTORY: |
2244 | case CREATE_FIFO: |
2245 | case IGNORE_PATH: |
2246 | case IGNORE_DIRECTORY_PATH: |
2247 | case REMOVE_PATH: |
2248 | case RECURSIVE_REMOVE_PATH: |
2249 | case ADJUST_MODE: |
2250 | case RELABEL_PATH: |
2251 | case RECURSIVE_RELABEL_PATH: |
2252 | if (i.argument) |
2253 | log_warning("[%s:%u] %c lines don't take argument fields, ignoring.", fname, line, i.type)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2253, __func__, "[%s:%u] %c lines don't take argument fields, ignoring." , fname, line, i.type) : -abs(_e); }); |
2254 | |
2255 | break; |
2256 | |
2257 | case CREATE_FILE: |
2258 | case TRUNCATE_FILE: |
2259 | break; |
2260 | |
2261 | case CREATE_SYMLINK: |
2262 | if (!i.argument) { |
2263 | i.argument = strappend("/usr/share/factory/", i.path); |
2264 | if (!i.argument) |
2265 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2265, __func__); |
2266 | } |
2267 | break; |
2268 | |
2269 | case WRITE_FILE: |
2270 | if (!i.argument) { |
2271 | *invalid_config = true1; |
2272 | log_error("[%s:%u] Write file requires argument.", fname, line)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2272, __func__, "[%s:%u] Write file requires argument." , fname, line) : -abs(_e); }); |
2273 | return -EBADMSG74; |
2274 | } |
2275 | break; |
2276 | |
2277 | case COPY_FILES: |
2278 | if (!i.argument) { |
2279 | i.argument = strappend("/usr/share/factory/", i.path); |
2280 | if (!i.argument) |
2281 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2281, __func__); |
2282 | } else if (!path_is_absolute(i.argument)) { |
2283 | *invalid_config = true1; |
2284 | log_error("[%s:%u] Source path is not absolute.", fname, line)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2284, __func__, "[%s:%u] Source path is not absolute." , fname, line) : -abs(_e); }); |
2285 | return -EBADMSG74; |
2286 | } |
2287 | |
2288 | path_simplify(i.argument, false0); |
2289 | break; |
2290 | |
2291 | case CREATE_CHAR_DEVICE: |
2292 | case CREATE_BLOCK_DEVICE: { |
2293 | unsigned major, minor; |
2294 | |
2295 | if (!i.argument) { |
2296 | *invalid_config = true1; |
2297 | log_error("[%s:%u] Device file requires argument.", fname, line)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2297, __func__, "[%s:%u] Device file requires argument." , fname, line) : -abs(_e); }); |
2298 | return -EBADMSG74; |
2299 | } |
2300 | |
2301 | if (sscanf(i.argument, "%u:%u", &major, &minor) != 2) { |
2302 | *invalid_config = true1; |
2303 | log_error("[%s:%u] Can't parse device file major/minor '%s'.", fname, line, i.argument)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2303, __func__, "[%s:%u] Can't parse device file major/minor '%s'." , fname, line, i.argument) : -abs(_e); }); |
2304 | return -EBADMSG74; |
2305 | } |
2306 | |
2307 | i.major_minor = makedev(major, minor)gnu_dev_makedev (major, minor); |
2308 | break; |
2309 | } |
2310 | |
2311 | case SET_XATTR: |
2312 | case RECURSIVE_SET_XATTR: |
2313 | if (!i.argument) { |
2314 | *invalid_config = true1; |
2315 | log_error("[%s:%u] Set extended attribute requires argument.", fname, line)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2315, __func__, "[%s:%u] Set extended attribute requires argument." , fname, line) : -abs(_e); }); |
2316 | return -EBADMSG74; |
2317 | } |
2318 | r = parse_xattrs_from_arg(&i); |
2319 | if (r < 0) |
2320 | return r; |
2321 | break; |
2322 | |
2323 | case SET_ACL: |
2324 | case RECURSIVE_SET_ACL: |
2325 | if (!i.argument) { |
2326 | *invalid_config = true1; |
2327 | log_error("[%s:%u] Set ACLs requires argument.", fname, line)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2327, __func__, "[%s:%u] Set ACLs requires argument." , fname, line) : -abs(_e); }); |
2328 | return -EBADMSG74; |
2329 | } |
2330 | r = parse_acls_from_arg(&i); |
2331 | if (r < 0) |
2332 | return r; |
2333 | break; |
2334 | |
2335 | case SET_ATTRIBUTE: |
2336 | case RECURSIVE_SET_ATTRIBUTE: |
2337 | if (!i.argument) { |
2338 | *invalid_config = true1; |
2339 | log_error("[%s:%u] Set file attribute requires argument.", fname, line)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2339, __func__, "[%s:%u] Set file attribute requires argument." , fname, line) : -abs(_e); }); |
2340 | return -EBADMSG74; |
2341 | } |
2342 | r = parse_attribute_from_arg(&i); |
2343 | if (IN_SET(r, -EINVAL, -EBADSLT)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-22, -57})/sizeof(int)]; switch(r) { case -22: case -57: _found = 1; break; default: break; } _found; } )) |
2344 | *invalid_config = true1; |
2345 | if (r < 0) |
2346 | return r; |
2347 | break; |
2348 | |
2349 | default: |
2350 | log_error("[%s:%u] Unknown command type '%c'.", fname, line, (char) i.type)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2350, __func__, "[%s:%u] Unknown command type '%c'." , fname, line, (char) i.type) : -abs(_e); }); |
2351 | *invalid_config = true1; |
2352 | return -EBADMSG74; |
2353 | } |
2354 | |
2355 | if (!path_is_absolute(i.path)) { |
2356 | log_error("[%s:%u] Path '%s' not absolute.", fname, line, i.path)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2356, __func__, "[%s:%u] Path '%s' not absolute." , fname, line, i.path) : -abs(_e); }); |
2357 | *invalid_config = true1; |
2358 | return -EBADMSG74; |
2359 | } |
2360 | |
2361 | path_simplify(i.path, false0); |
2362 | |
2363 | if (!should_include_path(i.path)) |
2364 | return 0; |
2365 | |
2366 | r = specifier_expansion_from_arg(&i); |
2367 | if (r == -ENXIO6) |
2368 | return log_unresolvable_specifier(fname, line); |
2369 | if (r < 0) { |
2370 | if (IN_SET(r, -EINVAL, -EBADSLT)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-22, -57})/sizeof(int)]; switch(r) { case -22: case -57: _found = 1; break; default: break; } _found; } )) |
2371 | *invalid_config = true1; |
2372 | return log_error_errno(r, "[%s:%u] Failed to substitute specifiers in argument: %m",({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2373, __func__, "[%s:%u] Failed to substitute specifiers in argument: %m" , fname, line) : -abs(_e); }) |
2373 | fname, line)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2373, __func__, "[%s:%u] Failed to substitute specifiers in argument: %m" , fname, line) : -abs(_e); }); |
2374 | } |
2375 | |
2376 | if (arg_root) { |
2377 | char *p; |
2378 | |
2379 | p = prefix_root(arg_root, i.path); |
2380 | if (!p) |
2381 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2381, __func__); |
2382 | |
2383 | free(i.path); |
2384 | i.path = p; |
2385 | } |
2386 | |
2387 | if (!isempty(user) && !streq(user, "-")(strcmp((user),("-")) == 0)) { |
2388 | const char *u = user; |
2389 | |
2390 | r = get_user_creds(&u, &i.uid, NULL((void*)0), NULL((void*)0), NULL((void*)0)); |
2391 | if (r < 0) { |
2392 | *invalid_config = true1; |
2393 | return log_error_errno(r, "[%s:%u] Unknown user '%s'.", fname, line, user)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2393, __func__, "[%s:%u] Unknown user '%s'." , fname, line, user) : -abs(_e); }); |
2394 | } |
2395 | |
2396 | i.uid_set = true1; |
2397 | } |
2398 | |
2399 | if (!isempty(group) && !streq(group, "-")(strcmp((group),("-")) == 0)) { |
2400 | const char *g = group; |
2401 | |
2402 | r = get_group_creds(&g, &i.gid); |
2403 | if (r < 0) { |
2404 | *invalid_config = true1; |
2405 | log_error("[%s:%u] Unknown group '%s'.", fname, line, group)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2405, __func__, "[%s:%u] Unknown group '%s'." , fname, line, group) : -abs(_e); }); |
2406 | return r; |
2407 | } |
2408 | |
2409 | i.gid_set = true1; |
2410 | } |
2411 | |
2412 | if (!isempty(mode) && !streq(mode, "-")(strcmp((mode),("-")) == 0)) { |
2413 | const char *mm = mode; |
2414 | unsigned m; |
2415 | |
2416 | if (*mm == '~') { |
2417 | i.mask_perms = true1; |
2418 | mm++; |
2419 | } |
2420 | |
2421 | if (parse_mode(mm, &m) < 0) { |
2422 | *invalid_config = true1; |
2423 | log_error("[%s:%u] Invalid mode '%s'.", fname, line, mode)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2423, __func__, "[%s:%u] Invalid mode '%s'." , fname, line, mode) : -abs(_e); }); |
2424 | return -EBADMSG74; |
2425 | } |
2426 | |
2427 | i.mode = m; |
2428 | i.mode_set = true1; |
2429 | } else |
2430 | i.mode = IN_SET(i.type, CREATE_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA, CREATE_SUBVOLUME_NEW_QUOTA)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME , CREATE_SUBVOLUME_INHERIT_QUOTA, CREATE_SUBVOLUME_NEW_QUOTA} )/sizeof(int)]; switch(i.type) { case CREATE_DIRECTORY: case TRUNCATE_DIRECTORY : case CREATE_SUBVOLUME: case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA: _found = 1; break; default: break; } _found; }) ? 0755 : 0644; |
2431 | |
2432 | if (!isempty(age) && !streq(age, "-")(strcmp((age),("-")) == 0)) { |
2433 | const char *a = age; |
2434 | |
2435 | if (*a == '~') { |
2436 | i.keep_first_level = true1; |
2437 | a++; |
2438 | } |
2439 | |
2440 | if (parse_sec(a, &i.age) < 0) { |
2441 | *invalid_config = true1; |
2442 | log_error("[%s:%u] Invalid age '%s'.", fname, line, age)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2442, __func__, "[%s:%u] Invalid age '%s'." , fname, line, age) : -abs(_e); }); |
2443 | return -EBADMSG74; |
2444 | } |
2445 | |
2446 | i.age_set = true1; |
2447 | } |
2448 | |
2449 | h = needs_glob(i.type) ? globs : items; |
2450 | |
2451 | existing = ordered_hashmap_get(h, i.path); |
2452 | if (existing) { |
2453 | unsigned n; |
2454 | |
2455 | for (n = 0; n < existing->count; n++) { |
2456 | if (!item_compatible(existing->items + n, &i)) { |
2457 | log_notice("[%s:%u] Duplicate line for path \"%s\", ignoring.",({ int _level = (((5))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2458, __func__, "[%s:%u] Duplicate line for path \"%s\", ignoring." , fname, line, i.path) : -abs(_e); }) |
2458 | fname, line, i.path)({ int _level = (((5))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2458, __func__, "[%s:%u] Duplicate line for path \"%s\", ignoring." , fname, line, i.path) : -abs(_e); }); |
2459 | return 0; |
2460 | } |
2461 | } |
2462 | } else { |
2463 | existing = new0(ItemArray, 1)((ItemArray*) calloc((1), sizeof(ItemArray))); |
2464 | if (!existing) |
2465 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2465, __func__); |
2466 | |
2467 | r = ordered_hashmap_put(h, i.path, existing); |
2468 | if (r < 0) |
2469 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2469, __func__); |
2470 | } |
2471 | |
2472 | if (!GREEDY_REALLOC(existing->items, existing->size, existing->count + 1)greedy_realloc((void**) &(existing->items), &(existing ->size), (existing->count + 1), sizeof((existing->items )[0]))) |
2473 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2473, __func__); |
2474 | |
2475 | memcpy(existing->items + existing->count++, &i, sizeof(i)); |
2476 | |
2477 | /* Sort item array, to enforce stable ordering of application */ |
2478 | qsort_safe(existing->items, existing->count, sizeof(Item), item_compare); |
2479 | |
2480 | zero(i)(({ size_t _l_ = (sizeof(i)); void *_x_ = (&(i)); _l_ == 0 ? _x_ : memset(_x_, 0, _l_); })); |
2481 | return 0; |
2482 | } |
2483 | |
2484 | static int cat_config(char **config_dirs, char **args) { |
2485 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **files = NULL((void*)0); |
2486 | int r; |
2487 | |
2488 | r = conf_files_list_with_replacement(arg_root, config_dirs, arg_replace, &files, NULL((void*)0)); |
2489 | if (r < 0) |
2490 | return r; |
2491 | |
2492 | return cat_files(NULL((void*)0), files, 0); |
2493 | } |
2494 | |
2495 | static void help(void) { |
2496 | printf("%s [OPTIONS...] [CONFIGURATION FILE...]\n\n" |
2497 | "Creates, deletes and cleans up volatile and temporary files and directories.\n\n" |
2498 | " -h --help Show this help\n" |
2499 | " --user Execute user configuration\n" |
2500 | " --version Show package version\n" |
2501 | " --cat-config Show configuration files\n" |
2502 | " --create Create marked files/directories\n" |
2503 | " --clean Clean up marked directories\n" |
2504 | " --remove Remove marked files/directories\n" |
2505 | " --boot Execute actions only safe at boot\n" |
2506 | " --prefix=PATH Only apply rules with the specified prefix\n" |
2507 | " --exclude-prefix=PATH Ignore rules with the specified prefix\n" |
2508 | " --root=PATH Operate on an alternate filesystem root\n" |
2509 | " --replace=PATH Treat arguments as replacement for PATH\n" |
2510 | " --no-pager Do not pipe output into a pager\n" |
2511 | , program_invocation_short_name); |
2512 | } |
2513 | |
2514 | static int parse_argv(int argc, char *argv[]) { |
2515 | |
2516 | enum { |
2517 | ARG_VERSION = 0x100, |
2518 | ARG_CAT_CONFIG, |
2519 | ARG_USER, |
2520 | ARG_CREATE, |
2521 | ARG_CLEAN, |
2522 | ARG_REMOVE, |
2523 | ARG_BOOT, |
2524 | ARG_PREFIX, |
2525 | ARG_EXCLUDE_PREFIX, |
2526 | ARG_ROOT, |
2527 | ARG_REPLACE, |
2528 | ARG_NO_PAGER, |
2529 | }; |
2530 | |
2531 | static const struct option options[] = { |
2532 | { "help", no_argument0, NULL((void*)0), 'h' }, |
2533 | { "user", no_argument0, NULL((void*)0), ARG_USER }, |
2534 | { "version", no_argument0, NULL((void*)0), ARG_VERSION }, |
2535 | { "cat-config", no_argument0, NULL((void*)0), ARG_CAT_CONFIG }, |
2536 | { "create", no_argument0, NULL((void*)0), ARG_CREATE }, |
2537 | { "clean", no_argument0, NULL((void*)0), ARG_CLEAN }, |
2538 | { "remove", no_argument0, NULL((void*)0), ARG_REMOVE }, |
2539 | { "boot", no_argument0, NULL((void*)0), ARG_BOOT }, |
2540 | { "prefix", required_argument1, NULL((void*)0), ARG_PREFIX }, |
2541 | { "exclude-prefix", required_argument1, NULL((void*)0), ARG_EXCLUDE_PREFIX }, |
2542 | { "root", required_argument1, NULL((void*)0), ARG_ROOT }, |
2543 | { "replace", required_argument1, NULL((void*)0), ARG_REPLACE }, |
2544 | { "no-pager", no_argument0, NULL((void*)0), ARG_NO_PAGER }, |
2545 | {} |
2546 | }; |
2547 | |
2548 | int c, r; |
2549 | |
2550 | assert(argc >= 0)do { if ((__builtin_expect(!!(!(argc >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("argc >= 0"), "../src/tmpfiles/tmpfiles.c" , 2550, __PRETTY_FUNCTION__); } while (0); |
2551 | assert(argv)do { if ((__builtin_expect(!!(!(argv)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("argv"), "../src/tmpfiles/tmpfiles.c", 2551 , __PRETTY_FUNCTION__); } while (0); |
2552 | |
2553 | while ((c = getopt_long(argc, argv, "h", options, NULL((void*)0))) >= 0) |
2554 | |
2555 | switch (c) { |
2556 | |
2557 | case 'h': |
2558 | help(); |
2559 | return 0; |
2560 | |
2561 | case ARG_VERSION: |
2562 | return version(); |
2563 | |
2564 | case ARG_CAT_CONFIG: |
2565 | arg_cat_config = true1; |
2566 | break; |
2567 | |
2568 | case ARG_USER: |
2569 | arg_user = true1; |
2570 | break; |
2571 | |
2572 | case ARG_CREATE: |
2573 | arg_create = true1; |
2574 | break; |
2575 | |
2576 | case ARG_CLEAN: |
2577 | arg_clean = true1; |
2578 | break; |
2579 | |
2580 | case ARG_REMOVE: |
2581 | arg_remove = true1; |
2582 | break; |
2583 | |
2584 | case ARG_BOOT: |
2585 | arg_boot = true1; |
2586 | break; |
2587 | |
2588 | case ARG_PREFIX: |
2589 | if (strv_push(&arg_include_prefixes, optarg) < 0) |
2590 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2590, __func__); |
2591 | break; |
2592 | |
2593 | case ARG_EXCLUDE_PREFIX: |
2594 | if (strv_push(&arg_exclude_prefixes, optarg) < 0) |
2595 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2595, __func__); |
2596 | break; |
2597 | |
2598 | case ARG_ROOT: |
2599 | r = parse_path_argument_and_warn(optarg, true1, &arg_root); |
2600 | if (r < 0) |
2601 | return r; |
2602 | break; |
2603 | |
2604 | case ARG_REPLACE: |
2605 | if (!path_is_absolute(optarg) || |
2606 | !endswith(optarg, ".conf")) { |
2607 | log_error("The argument to --replace= must an absolute path to a config file")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2607, __func__, "The argument to --replace= must an absolute path to a config file" ) : -abs(_e); }); |
2608 | return -EINVAL22; |
2609 | } |
2610 | |
2611 | arg_replace = optarg; |
2612 | break; |
2613 | |
2614 | case ARG_NO_PAGER: |
2615 | arg_no_pager = true1; |
2616 | break; |
2617 | |
2618 | case '?': |
2619 | return -EINVAL22; |
2620 | |
2621 | default: |
2622 | assert_not_reached("Unhandled option")do { log_assert_failed_unreachable_realm(LOG_REALM_SYSTEMD, ( "Unhandled option"), "../src/tmpfiles/tmpfiles.c", 2622, __PRETTY_FUNCTION__ ); } while (0); |
2623 | } |
2624 | |
2625 | if (!arg_clean && !arg_create && !arg_remove && !arg_cat_config) { |
2626 | log_error("You need to specify at least one of --clean, --create or --remove.")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2626, __func__, "You need to specify at least one of --clean, --create or --remove." ) : -abs(_e); }); |
2627 | return -EINVAL22; |
2628 | } |
2629 | |
2630 | if (arg_replace && arg_cat_config) { |
2631 | log_error("Option --replace= is not supported with --cat-config")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2631, __func__, "Option --replace= is not supported with --cat-config" ) : -abs(_e); }); |
2632 | return -EINVAL22; |
2633 | } |
2634 | |
2635 | if (arg_replace && optind >= argc) { |
2636 | log_error("When --replace= is given, some configuration items must be specified")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2636, __func__, "When --replace= is given, some configuration items must be specified" ) : -abs(_e); }); |
2637 | return -EINVAL22; |
2638 | } |
2639 | |
2640 | return 1; |
2641 | } |
2642 | |
2643 | static int read_config_file(char **config_dirs, const char *fn, bool_Bool ignore_enoent, bool_Bool *invalid_config) { |
2644 | _cleanup_fclose___attribute__((cleanup(fclosep))) FILE *_f = NULL((void*)0); |
2645 | FILE *f; |
2646 | char line[LINE_MAX2048]; |
2647 | Iterator iterator; |
2648 | unsigned v = 0; |
2649 | Item *i; |
2650 | int r = 0; |
2651 | |
2652 | assert(fn)do { if ((__builtin_expect(!!(!(fn)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fn"), "../src/tmpfiles/tmpfiles.c", 2652 , __PRETTY_FUNCTION__); } while (0); |
2653 | |
2654 | if (streq(fn, "-")(strcmp((fn),("-")) == 0)) { |
2655 | log_debug("Reading config from stdin…")({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2655, __func__, "Reading config from stdin…" ) : -abs(_e); }); |
2656 | fn = "<stdin>"; |
2657 | f = stdinstdin; |
2658 | } else { |
2659 | r = search_and_fopen(fn, "re", arg_root, (const char**) config_dirs, &_f); |
2660 | if (r < 0) { |
2661 | if (ignore_enoent && r == -ENOENT2) { |
2662 | log_debug_errno(r, "Failed to open \"%s\", ignoring: %m", fn)({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2662, __func__, "Failed to open \"%s\", ignoring: %m" , fn) : -abs(_e); }); |
2663 | return 0; |
2664 | } |
2665 | |
2666 | return log_error_errno(r, "Failed to open '%s': %m", fn)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2666, __func__, "Failed to open '%s': %m" , fn) : -abs(_e); }); |
2667 | } |
2668 | log_debug("Reading config file \"%s\"…", fn)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2668, __func__, "Reading config file \"%s\"…" , fn) : -abs(_e); }); |
2669 | f = _f; |
2670 | } |
2671 | |
2672 | FOREACH_LINE(line, f, break)for (;;) if (!fgets(line, sizeof(line), f)) { if (ferror(f)) { break; } break; } else { |
2673 | char *l; |
2674 | int k; |
2675 | bool_Bool invalid_line = false0; |
2676 | |
2677 | v++; |
2678 | |
2679 | l = strstrip(line); |
2680 | if (IN_SET(*l, 0, '#')({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){0, '#'})/sizeof(int)]; switch(*l) { case 0: case '#': _found = 1; break; default: break; } _found; })) |
2681 | continue; |
2682 | |
2683 | k = parse_line(fn, v, l, &invalid_line); |
2684 | if (k < 0) { |
2685 | if (invalid_line) |
2686 | /* Allow reporting with a special code if the caller requested this */ |
2687 | *invalid_config = true1; |
2688 | else if (r == 0) |
2689 | /* The first error becomes our return value */ |
2690 | r = k; |
2691 | } |
2692 | } |
2693 | |
2694 | /* we have to determine age parameter for each entry of type X */ |
2695 | ORDERED_HASHMAP_FOREACH(i, globs, iterator)for ((iterator) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), .next_key = ((void*)0) }); ordered_hashmap_iterate((globs ), &(iterator), (void**)&(i), ((void*)0)); ) { |
2696 | Iterator iter; |
2697 | Item *j, *candidate_item = NULL((void*)0); |
2698 | |
2699 | if (i->type != IGNORE_DIRECTORY_PATH) |
2700 | continue; |
2701 | |
2702 | ORDERED_HASHMAP_FOREACH(j, items, iter)for ((iter) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1) , .next_key = ((void*)0) }); ordered_hashmap_iterate((items), &(iter), (void**)&(j), ((void*)0)); ) { |
2703 | if (!IN_SET(j->type, CREATE_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA, CREATE_SUBVOLUME_NEW_QUOTA)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME , CREATE_SUBVOLUME_INHERIT_QUOTA, CREATE_SUBVOLUME_NEW_QUOTA} )/sizeof(int)]; switch(j->type) { case CREATE_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME: case CREATE_SUBVOLUME_INHERIT_QUOTA : case CREATE_SUBVOLUME_NEW_QUOTA: _found = 1; break; default : break; } _found; })) |
2704 | continue; |
2705 | |
2706 | if (path_equal(j->path, i->path)) { |
2707 | candidate_item = j; |
2708 | break; |
2709 | } |
2710 | |
2711 | if ((!candidate_item && path_startswith(i->path, j->path)) || |
2712 | (candidate_item && path_startswith(j->path, candidate_item->path) && (fnmatch(i->path, j->path, FNM_PATHNAME(1 << 0) | FNM_PERIOD(1 << 2)) == 0))) |
2713 | candidate_item = j; |
2714 | } |
2715 | |
2716 | if (candidate_item && candidate_item->age_set) { |
2717 | i->age = candidate_item->age; |
2718 | i->age_set = true1; |
2719 | } |
2720 | } |
2721 | |
2722 | if (ferror(f)) { |
2723 | log_error_errno(errno, "Failed to read from file %s: %m", fn)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 2723, __func__ , "Failed to read from file %s: %m", fn) : -abs(_e); }); |
2724 | if (r == 0) |
2725 | r = -EIO5; |
2726 | } |
2727 | |
2728 | return r; |
2729 | } |
2730 | |
2731 | static int parse_arguments(char **config_dirs, char **args, bool_Bool *invalid_config) { |
2732 | char **arg; |
2733 | int r; |
2734 | |
2735 | STRV_FOREACH(arg, args)for ((arg) = (args); (arg) && *(arg); (arg)++) { |
2736 | r = read_config_file(config_dirs, *arg, false0, invalid_config); |
2737 | if (r < 0) |
2738 | return r; |
2739 | } |
2740 | |
2741 | return 0; |
2742 | } |
2743 | |
2744 | static int read_config_files(char **config_dirs, char **args, bool_Bool *invalid_config) { |
2745 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **files = NULL((void*)0); |
2746 | _cleanup_free___attribute__((cleanup(freep))) char *p = NULL((void*)0); |
2747 | char **f; |
2748 | int r; |
2749 | |
2750 | r = conf_files_list_with_replacement(arg_root, config_dirs, arg_replace, &files, &p); |
2751 | if (r < 0) |
2752 | return r; |
2753 | |
2754 | STRV_FOREACH(f, files)for ((f) = (files); (f) && *(f); (f)++) |
2755 | if (p && path_equal(*f, p)) { |
2756 | log_debug("Parsing arguments at position \"%s\"…", *f)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2756, __func__, "Parsing arguments at position \"%s\"…" , *f) : -abs(_e); }); |
2757 | |
2758 | r = parse_arguments(config_dirs, args, invalid_config); |
2759 | if (r < 0) |
2760 | return r; |
2761 | } else |
2762 | /* Just warn, ignore result otherwise. |
2763 | * read_config_file() has some debug output, so no need to print anything. */ |
2764 | (void) read_config_file(config_dirs, *f, true1, invalid_config); |
2765 | |
2766 | return 0; |
2767 | } |
2768 | |
2769 | int main(int argc, char *argv[]) { |
2770 | int r, k, r_process = 0; |
2771 | ItemArray *a; |
2772 | Iterator iterator; |
2773 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **config_dirs = NULL((void*)0); |
2774 | bool_Bool invalid_config = false0; |
2775 | |
2776 | r = parse_argv(argc, argv); |
2777 | if (r <= 0) |
2778 | goto finish; |
2779 | |
2780 | log_set_target(LOG_TARGET_AUTO); |
2781 | log_parse_environment()log_parse_environment_realm(LOG_REALM_SYSTEMD); |
2782 | log_open(); |
2783 | |
2784 | if (arg_user) { |
2785 | r = user_config_paths(&config_dirs); |
2786 | if (r < 0) { |
2787 | log_error_errno(r, "Failed to initialize configuration directory list: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2787, __func__, "Failed to initialize configuration directory list: %m" ) : -abs(_e); }); |
2788 | goto finish; |
2789 | } |
2790 | } else { |
2791 | config_dirs = strv_split_nulstr(CONF_PATHS_NULSTR("tmpfiles.d")"/etc/" "tmpfiles.d" "\0" "/run/" "tmpfiles.d" "\0" "/usr/local/lib/" "tmpfiles.d" "\0" "/usr/lib/" "tmpfiles.d" "\0"); |
2792 | if (!config_dirs) { |
2793 | r = log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2793, __func__); |
2794 | goto finish; |
2795 | } |
2796 | } |
2797 | |
2798 | if (DEBUG_LOGGING(__builtin_expect(!!(log_get_max_level_realm(LOG_REALM_SYSTEMD ) >= 7),0))) { |
2799 | _cleanup_free___attribute__((cleanup(freep))) char *t = NULL((void*)0); |
2800 | |
2801 | t = strv_join(config_dirs, "\n\t"); |
2802 | if (t) |
2803 | log_debug("Looking for configuration files in (higher priority first):\n\t%s", t)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2803, __func__, "Looking for configuration files in (higher priority first):\n\t%s" , t) : -abs(_e); }); |
2804 | } |
2805 | |
2806 | if (arg_cat_config) { |
2807 | (void) pager_open(arg_no_pager, false0); |
2808 | |
2809 | r = cat_config(config_dirs, argv + optind); |
2810 | goto finish; |
2811 | } |
2812 | |
2813 | umask(0022); |
2814 | |
2815 | mac_selinux_init(); |
2816 | |
2817 | items = ordered_hashmap_new(&string_hash_ops)internal_ordered_hashmap_new(&string_hash_ops ); |
2818 | globs = ordered_hashmap_new(&string_hash_ops)internal_ordered_hashmap_new(&string_hash_ops ); |
2819 | |
2820 | if (!items || !globs) { |
2821 | r = log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2821, __func__); |
2822 | goto finish; |
2823 | } |
2824 | |
2825 | /* If command line arguments are specified along with --replace, read all |
2826 | * configuration files and insert the positional arguments at the specified |
2827 | * place. Otherwise, if command line arguments are specified, execute just |
2828 | * them, and finally, without --replace= or any positional arguments, just |
2829 | * read configuration and execute it. |
2830 | */ |
2831 | if (arg_replace || optind >= argc) |
2832 | r = read_config_files(config_dirs, argv + optind, &invalid_config); |
2833 | else |
2834 | r = parse_arguments(config_dirs, argv + optind, &invalid_config); |
2835 | if (r < 0) |
2836 | goto finish; |
2837 | |
2838 | /* The non-globbing ones usually create things, hence we apply |
2839 | * them first */ |
2840 | ORDERED_HASHMAP_FOREACH(a, items, iterator)for ((iterator) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), .next_key = ((void*)0) }); ordered_hashmap_iterate((items ), &(iterator), (void**)&(a), ((void*)0)); ) { |
2841 | k = process_item_array(a); |
2842 | if (k < 0 && r_process == 0) |
2843 | r_process = k; |
2844 | } |
2845 | |
2846 | /* The globbing ones usually alter things, hence we apply them |
2847 | * second. */ |
2848 | ORDERED_HASHMAP_FOREACH(a, globs, iterator)for ((iterator) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), .next_key = ((void*)0) }); ordered_hashmap_iterate((globs ), &(iterator), (void**)&(a), ((void*)0)); ) { |
2849 | k = process_item_array(a); |
2850 | if (k < 0 && r_process == 0) |
2851 | r_process = k; |
2852 | } |
2853 | |
2854 | finish: |
2855 | pager_close(); |
2856 | |
2857 | ordered_hashmap_free_with_destructor(items, item_array_free)({ ({ void *_item; while ((_item = ordered_hashmap_steal_first (items))) item_array_free(_item); }); ordered_hashmap_free(items ); }); |
2858 | ordered_hashmap_free_with_destructor(globs, item_array_free)({ ({ void *_item; while ((_item = ordered_hashmap_steal_first (globs))) item_array_free(_item); }); ordered_hashmap_free(globs ); }); |
2859 | |
2860 | free(arg_include_prefixes); |
2861 | free(arg_exclude_prefixes); |
2862 | free(arg_root); |
2863 | |
2864 | set_free_free(unix_sockets); |
2865 | |
2866 | mac_selinux_finish(); |
2867 | |
2868 | if (r < 0 || ERRNO_IS_RESOURCE(-r_process)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){12, 24, 23})/sizeof(int)]; switch(-r_process ) { case 12: case 24: case 23: _found = 1; break; default: break ; } _found; })) |
2869 | return EXIT_FAILURE1; |
2870 | else if (invalid_config) |
2871 | return EX_DATAERR65; |
2872 | else if (r_process < 0) |
2873 | return EX_CANTCREAT73; |
2874 | else |
2875 | return EXIT_SUCCESS0; |
2876 | } |