| File: | build-scan/../src/tmpfiles/tmpfiles.c |
| Warning: | line 1275, column 9 Value stored to 'fd' is never read |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
| 1 | /* SPDX-License-Identifier: LGPL-2.1+ */ |
| 2 | |
| 3 | #include <errno(*__errno_location ()).h> |
| 4 | #include <fcntl.h> |
| 5 | #include <fnmatch.h> |
| 6 | #include <getopt.h> |
| 7 | #include <glob.h> |
| 8 | #include <limits.h> |
| 9 | #include <linux1/fs.h> |
| 10 | #include <stdbool.h> |
| 11 | #include <stddef.h> |
| 12 | #include <stdio.h> |
| 13 | #include <stdlib.h> |
| 14 | #include <string.h> |
| 15 | #include <sys/stat.h> |
| 16 | #include <sys/xattr.h> |
| 17 | #include <sysexits.h> |
| 18 | #include <time.h> |
| 19 | #include <unistd.h> |
| 20 | |
| 21 | #include "sd-path.h" |
| 22 | |
| 23 | #include "acl-util.h" |
| 24 | #include "alloc-util.h" |
| 25 | #include "btrfs-util.h" |
| 26 | #include "capability-util.h" |
| 27 | #include "chattr-util.h" |
| 28 | #include "conf-files.h" |
| 29 | #include "copy.h" |
| 30 | #include "def.h" |
| 31 | #include "dirent-util.h" |
| 32 | #include "escape.h" |
| 33 | #include "fd-util.h" |
| 34 | #include "fileio.h" |
| 35 | #include "format-util.h" |
| 36 | #include "fs-util.h" |
| 37 | #include "glob-util.h" |
| 38 | #include "io-util.h" |
| 39 | #include "label.h" |
| 40 | #include "log.h" |
| 41 | #include "macro.h" |
| 42 | #include "missing.h" |
| 43 | #include "mkdir.h" |
| 44 | #include "mount-util.h" |
| 45 | #include "pager.h" |
| 46 | #include "parse-util.h" |
| 47 | #include "path-lookup.h" |
| 48 | #include "path-util.h" |
| 49 | #include "rm-rf.h" |
| 50 | #include "selinux-util.h" |
| 51 | #include "set.h" |
| 52 | #include "specifier.h" |
| 53 | #include "stat-util.h" |
| 54 | #include "stdio-util.h" |
| 55 | #include "string-table.h" |
| 56 | #include "string-util.h" |
| 57 | #include "strv.h" |
| 58 | #include "terminal-util.h" |
| 59 | #include "umask-util.h" |
| 60 | #include "user-util.h" |
| 61 | #include "util.h" |
| 62 | |
| 63 | /* This reads all files listed in /etc/tmpfiles.d/?*.conf and creates |
| 64 | * them in the file system. This is intended to be used to create |
| 65 | * properly owned directories beneath /tmp, /var/tmp, /run, which are |
| 66 | * volatile and hence need to be recreated on bootup. */ |
| 67 | |
| 68 | typedef enum ItemType { |
| 69 | /* These ones take file names */ |
| 70 | CREATE_FILE = 'f', |
| 71 | TRUNCATE_FILE = 'F', |
| 72 | CREATE_DIRECTORY = 'd', |
| 73 | TRUNCATE_DIRECTORY = 'D', |
| 74 | CREATE_SUBVOLUME = 'v', |
| 75 | CREATE_SUBVOLUME_INHERIT_QUOTA = 'q', |
| 76 | CREATE_SUBVOLUME_NEW_QUOTA = 'Q', |
| 77 | CREATE_FIFO = 'p', |
| 78 | CREATE_SYMLINK = 'L', |
| 79 | CREATE_CHAR_DEVICE = 'c', |
| 80 | CREATE_BLOCK_DEVICE = 'b', |
| 81 | COPY_FILES = 'C', |
| 82 | |
| 83 | /* These ones take globs */ |
| 84 | WRITE_FILE = 'w', |
| 85 | EMPTY_DIRECTORY = 'e', |
| 86 | SET_XATTR = 't', |
| 87 | RECURSIVE_SET_XATTR = 'T', |
| 88 | SET_ACL = 'a', |
| 89 | RECURSIVE_SET_ACL = 'A', |
| 90 | SET_ATTRIBUTE = 'h', |
| 91 | RECURSIVE_SET_ATTRIBUTE = 'H', |
| 92 | IGNORE_PATH = 'x', |
| 93 | IGNORE_DIRECTORY_PATH = 'X', |
| 94 | REMOVE_PATH = 'r', |
| 95 | RECURSIVE_REMOVE_PATH = 'R', |
| 96 | RELABEL_PATH = 'z', |
| 97 | RECURSIVE_RELABEL_PATH = 'Z', |
| 98 | ADJUST_MODE = 'm', /* legacy, 'z' is identical to this */ |
| 99 | } ItemType; |
| 100 | |
| 101 | typedef struct Item { |
| 102 | ItemType type; |
| 103 | |
| 104 | char *path; |
| 105 | char *argument; |
| 106 | char **xattrs; |
| 107 | #if HAVE_ACL1 |
| 108 | acl_t acl_access; |
| 109 | acl_t acl_default; |
| 110 | #endif |
| 111 | uid_t uid; |
| 112 | gid_t gid; |
| 113 | mode_t mode; |
| 114 | usec_t age; |
| 115 | |
| 116 | dev_t major_minor; |
| 117 | unsigned attribute_value; |
| 118 | unsigned attribute_mask; |
| 119 | |
| 120 | bool_Bool uid_set:1; |
| 121 | bool_Bool gid_set:1; |
| 122 | bool_Bool mode_set:1; |
| 123 | bool_Bool age_set:1; |
| 124 | bool_Bool mask_perms:1; |
| 125 | bool_Bool attribute_set:1; |
| 126 | |
| 127 | bool_Bool keep_first_level:1; |
| 128 | |
| 129 | bool_Bool force:1; |
| 130 | |
| 131 | bool_Bool done:1; |
| 132 | } Item; |
| 133 | |
| 134 | typedef struct ItemArray { |
| 135 | Item *items; |
| 136 | size_t count; |
| 137 | size_t size; |
| 138 | } ItemArray; |
| 139 | |
| 140 | typedef enum DirectoryType { |
| 141 | DIRECTORY_RUNTIME = 0, |
| 142 | DIRECTORY_STATE, |
| 143 | DIRECTORY_CACHE, |
| 144 | DIRECTORY_LOGS, |
| 145 | _DIRECTORY_TYPE_MAX, |
| 146 | } DirectoryType; |
| 147 | |
| 148 | static bool_Bool arg_cat_config = false0; |
| 149 | static bool_Bool arg_user = false0; |
| 150 | static bool_Bool arg_create = false0; |
| 151 | static bool_Bool arg_clean = false0; |
| 152 | static bool_Bool arg_remove = false0; |
| 153 | static bool_Bool arg_boot = false0; |
| 154 | static bool_Bool arg_no_pager = false0; |
| 155 | |
| 156 | static char **arg_include_prefixes = NULL((void*)0); |
| 157 | static char **arg_exclude_prefixes = NULL((void*)0); |
| 158 | static char *arg_root = NULL((void*)0); |
| 159 | static char *arg_replace = NULL((void*)0); |
| 160 | |
| 161 | #define MAX_DEPTH256 256 |
| 162 | |
| 163 | static OrderedHashmap *items = NULL((void*)0), *globs = NULL((void*)0); |
| 164 | static Set *unix_sockets = NULL((void*)0); |
| 165 | |
| 166 | static int specifier_machine_id_safe(char specifier, void *data, void *userdata, char **ret); |
| 167 | static int specifier_directory(char specifier, void *data, void *userdata, char **ret); |
| 168 | |
| 169 | static const Specifier specifier_table[] = { |
| 170 | { 'm', specifier_machine_id_safe, NULL((void*)0) }, |
| 171 | { 'b', specifier_boot_id, NULL((void*)0) }, |
| 172 | { 'H', specifier_host_name, NULL((void*)0) }, |
| 173 | { 'v', specifier_kernel_release, NULL((void*)0) }, |
| 174 | |
| 175 | { 'U', specifier_user_id, NULL((void*)0) }, |
| 176 | { 'u', specifier_user_name, NULL((void*)0) }, |
| 177 | { 'h', specifier_user_home, NULL((void*)0) }, |
| 178 | |
| 179 | { 't', specifier_directory, UINT_TO_PTR(DIRECTORY_RUNTIME)((void *) ((uintptr_t) (DIRECTORY_RUNTIME))) }, |
| 180 | { 'S', specifier_directory, UINT_TO_PTR(DIRECTORY_STATE)((void *) ((uintptr_t) (DIRECTORY_STATE))) }, |
| 181 | { 'C', specifier_directory, UINT_TO_PTR(DIRECTORY_CACHE)((void *) ((uintptr_t) (DIRECTORY_CACHE))) }, |
| 182 | { 'L', specifier_directory, UINT_TO_PTR(DIRECTORY_LOGS)((void *) ((uintptr_t) (DIRECTORY_LOGS))) }, |
| 183 | { 'T', specifier_tmp_dir, NULL((void*)0) }, |
| 184 | { 'V', specifier_var_tmp_dir, NULL((void*)0) }, |
| 185 | {} |
| 186 | }; |
| 187 | |
| 188 | static int specifier_machine_id_safe(char specifier, void *data, void *userdata, char **ret) { |
| 189 | int r; |
| 190 | |
| 191 | /* If /etc/machine_id is missing or empty (e.g. in a chroot environment) |
| 192 | * return a recognizable error so that the caller can skip the rule |
| 193 | * gracefully. */ |
| 194 | |
| 195 | r = specifier_machine_id(specifier, data, userdata, ret); |
| 196 | if (IN_SET(r, -ENOENT, -ENOMEDIUM)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-2, -123})/sizeof(int)]; switch(r) { case -2: case -123: _found = 1; break; default: break; } _found; } )) |
| 197 | return -ENXIO6; |
| 198 | |
| 199 | return r; |
| 200 | } |
| 201 | |
| 202 | static int specifier_directory(char specifier, void *data, void *userdata, char **ret) { |
| 203 | struct table_entry { |
| 204 | uint64_t type; |
| 205 | const char *suffix; |
| 206 | }; |
| 207 | |
| 208 | static const struct table_entry paths_system[] = { |
| 209 | [DIRECTORY_RUNTIME] = { SD_PATH_SYSTEM_RUNTIME }, |
| 210 | [DIRECTORY_STATE] = { SD_PATH_SYSTEM_STATE_PRIVATE }, |
| 211 | [DIRECTORY_CACHE] = { SD_PATH_SYSTEM_STATE_CACHE }, |
| 212 | [DIRECTORY_LOGS] = { SD_PATH_SYSTEM_STATE_LOGS }, |
| 213 | }; |
| 214 | |
| 215 | static const struct table_entry paths_user[] = { |
| 216 | [DIRECTORY_RUNTIME] = { SD_PATH_USER_RUNTIME }, |
| 217 | [DIRECTORY_STATE] = { SD_PATH_USER_CONFIGURATION }, |
| 218 | [DIRECTORY_CACHE] = { SD_PATH_USER_STATE_CACHE }, |
| 219 | [DIRECTORY_LOGS] = { SD_PATH_USER_CONFIGURATION, "log" }, |
| 220 | }; |
| 221 | |
| 222 | unsigned i; |
| 223 | const struct table_entry *paths; |
| 224 | |
| 225 | assert_cc(ELEMENTSOF(paths_system) == ELEMENTSOF(paths_user))GCC diagnostic push
; GCC diagnostic ignored "-Wdeclaration-after-statement" ; struct _assert_struct_11 { char x[(__extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(paths_system), typeof( &*(paths_system))), sizeof(paths_system)/sizeof((paths_system )[0]), ((void)0))) == __extension__ (__builtin_choose_expr( ! __builtin_types_compatible_p(typeof(paths_user), typeof(& *(paths_user))), sizeof(paths_user)/sizeof((paths_user)[0]), ( (void)0)))) ? 0 : -1]; }; GCC diagnostic pop ; |
| 226 | paths = arg_user ? paths_user : paths_system; |
| 227 | |
| 228 | i = PTR_TO_UINT(data)((unsigned int) ((uintptr_t) (data))); |
| 229 | assert(i < ELEMENTSOF(paths_system))do { if ((__builtin_expect(!!(!(i < __extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(paths_system), typeof( &*(paths_system))), sizeof(paths_system)/sizeof((paths_system )[0]), ((void)0))))),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("i < ELEMENTSOF(paths_system)"), "../src/tmpfiles/tmpfiles.c" , 229, __PRETTY_FUNCTION__); } while (0); |
| 230 | |
| 231 | return sd_path_home(paths[i].type, paths[i].suffix, ret); |
| 232 | } |
| 233 | |
| 234 | static int log_unresolvable_specifier(const char *filename, unsigned line) { |
| 235 | static bool_Bool notified = false0; |
| 236 | |
| 237 | /* In system mode, this is called when /etc is not fully initialized (e.g. |
| 238 | * in a chroot environment) where some specifiers are unresolvable. In user |
| 239 | * mode, this is called when some variables are not defined. These cases are |
| 240 | * not considered as an error so log at LOG_NOTICE only for the first time |
| 241 | * and then downgrade this to LOG_DEBUG for the rest. */ |
| 242 | |
| 243 | log_full(notified ? LOG_DEBUG : LOG_NOTICE,({ int _level = (((notified ? 7 : 5))), _e = ((0)), _realm = ( LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= (( _level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 246, __func__ , "[%s:%u] Failed to resolve specifier: %s, skipping", filename , line, arg_user ? "Required $XDG_... variable not defined" : "uninitialized /etc detected") : -abs(_e); }) |
| 244 | "[%s:%u] Failed to resolve specifier: %s, skipping",({ int _level = (((notified ? 7 : 5))), _e = ((0)), _realm = ( LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= (( _level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 246, __func__ , "[%s:%u] Failed to resolve specifier: %s, skipping", filename , line, arg_user ? "Required $XDG_... variable not defined" : "uninitialized /etc detected") : -abs(_e); }) |
| 245 | filename, line,({ int _level = (((notified ? 7 : 5))), _e = ((0)), _realm = ( LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= (( _level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 246, __func__ , "[%s:%u] Failed to resolve specifier: %s, skipping", filename , line, arg_user ? "Required $XDG_... variable not defined" : "uninitialized /etc detected") : -abs(_e); }) |
| 246 | arg_user ? "Required $XDG_... variable not defined" : "uninitialized /etc detected")({ int _level = (((notified ? 7 : 5))), _e = ((0)), _realm = ( LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= (( _level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 246, __func__ , "[%s:%u] Failed to resolve specifier: %s, skipping", filename , line, arg_user ? "Required $XDG_... variable not defined" : "uninitialized /etc detected") : -abs(_e); }); |
| 247 | |
| 248 | if (!notified) |
| 249 | log_notice("All rules containing unresolvable specifiers will be skipped.")({ int _level = (((5))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 249, __func__, "All rules containing unresolvable specifiers will be skipped." ) : -abs(_e); }); |
| 250 | |
| 251 | notified = true1; |
| 252 | return 0; |
| 253 | } |
| 254 | |
| 255 | static int user_config_paths(char*** ret) { |
| 256 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **config_dirs = NULL((void*)0), **data_dirs = NULL((void*)0); |
| 257 | _cleanup_free___attribute__((cleanup(freep))) char *persistent_config = NULL((void*)0), *runtime_config = NULL((void*)0), *data_home = NULL((void*)0); |
| 258 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **res = NULL((void*)0); |
| 259 | int r; |
| 260 | |
| 261 | r = xdg_user_dirs(&config_dirs, &data_dirs); |
| 262 | if (r < 0) |
| 263 | return r; |
| 264 | |
| 265 | r = xdg_user_config_dir(&persistent_config, "/user-tmpfiles.d"); |
| 266 | if (r < 0 && r != -ENXIO6) |
| 267 | return r; |
| 268 | |
| 269 | r = xdg_user_runtime_dir(&runtime_config, "/user-tmpfiles.d"); |
| 270 | if (r < 0 && r != -ENXIO6) |
| 271 | return r; |
| 272 | |
| 273 | r = xdg_user_data_dir(&data_home, "/user-tmpfiles.d"); |
| 274 | if (r < 0 && r != -ENXIO6) |
| 275 | return r; |
| 276 | |
| 277 | r = strv_extend_strv_concat(&res, config_dirs, "/user-tmpfiles.d"); |
| 278 | if (r < 0) |
| 279 | return r; |
| 280 | |
| 281 | r = strv_extend(&res, persistent_config); |
| 282 | if (r < 0) |
| 283 | return r; |
| 284 | |
| 285 | r = strv_extend(&res, runtime_config); |
| 286 | if (r < 0) |
| 287 | return r; |
| 288 | |
| 289 | r = strv_extend(&res, data_home); |
| 290 | if (r < 0) |
| 291 | return r; |
| 292 | |
| 293 | r = strv_extend_strv_concat(&res, data_dirs, "/user-tmpfiles.d"); |
| 294 | if (r < 0) |
| 295 | return r; |
| 296 | |
| 297 | r = path_strv_make_absolute_cwd(res); |
| 298 | if (r < 0) |
| 299 | return r; |
| 300 | |
| 301 | *ret = TAKE_PTR(res)({ typeof(res) _ptr_ = (res); (res) = ((void*)0); _ptr_; }); |
| 302 | return 0; |
| 303 | } |
| 304 | |
| 305 | static bool_Bool needs_glob(ItemType t) { |
| 306 | return IN_SET(t,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
| 307 | WRITE_FILE,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
| 308 | IGNORE_PATH,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
| 309 | IGNORE_DIRECTORY_PATH,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
| 310 | REMOVE_PATH,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
| 311 | RECURSIVE_REMOVE_PATH,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
| 312 | EMPTY_DIRECTORY,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
| 313 | ADJUST_MODE,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
| 314 | RELABEL_PATH,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
| 315 | RECURSIVE_RELABEL_PATH,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
| 316 | SET_XATTR,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
| 317 | RECURSIVE_SET_XATTR,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
| 318 | SET_ACL,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
| 319 | RECURSIVE_SET_ACL,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
| 320 | SET_ATTRIBUTE,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }) |
| 321 | RECURSIVE_SET_ATTRIBUTE)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH, EMPTY_DIRECTORY, ADJUST_MODE , RELABEL_PATH, RECURSIVE_RELABEL_PATH, SET_XATTR, RECURSIVE_SET_XATTR , SET_ACL, RECURSIVE_SET_ACL, SET_ATTRIBUTE, RECURSIVE_SET_ATTRIBUTE })/sizeof(int)]; switch(t) { case WRITE_FILE: case IGNORE_PATH : case IGNORE_DIRECTORY_PATH: case REMOVE_PATH: case RECURSIVE_REMOVE_PATH : case EMPTY_DIRECTORY: case ADJUST_MODE: case RELABEL_PATH: case RECURSIVE_RELABEL_PATH: case SET_XATTR: case RECURSIVE_SET_XATTR : case SET_ACL: case RECURSIVE_SET_ACL: case SET_ATTRIBUTE: case RECURSIVE_SET_ATTRIBUTE: _found = 1; break; default: break; } _found; }); |
| 322 | } |
| 323 | |
| 324 | static bool_Bool takes_ownership(ItemType t) { |
| 325 | return IN_SET(t,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
| 326 | CREATE_FILE,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
| 327 | TRUNCATE_FILE,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
| 328 | CREATE_DIRECTORY,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
| 329 | EMPTY_DIRECTORY,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
| 330 | TRUNCATE_DIRECTORY,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
| 331 | CREATE_SUBVOLUME,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
| 332 | CREATE_SUBVOLUME_INHERIT_QUOTA,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
| 333 | CREATE_SUBVOLUME_NEW_QUOTA,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
| 334 | CREATE_FIFO,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
| 335 | CREATE_SYMLINK,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
| 336 | CREATE_CHAR_DEVICE,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
| 337 | CREATE_BLOCK_DEVICE,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
| 338 | COPY_FILES,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
| 339 | WRITE_FILE,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
| 340 | IGNORE_PATH,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
| 341 | IGNORE_DIRECTORY_PATH,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
| 342 | REMOVE_PATH,({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }) |
| 343 | RECURSIVE_REMOVE_PATH)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_FILE, TRUNCATE_FILE, CREATE_DIRECTORY , EMPTY_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA, CREATE_FIFO, CREATE_SYMLINK, CREATE_CHAR_DEVICE , CREATE_BLOCK_DEVICE, COPY_FILES, WRITE_FILE, IGNORE_PATH, IGNORE_DIRECTORY_PATH , REMOVE_PATH, RECURSIVE_REMOVE_PATH})/sizeof(int)]; switch(t ) { case CREATE_FILE: case TRUNCATE_FILE: case CREATE_DIRECTORY : case EMPTY_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME : case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_FIFO: case CREATE_SYMLINK: case CREATE_CHAR_DEVICE : case CREATE_BLOCK_DEVICE: case COPY_FILES: case WRITE_FILE: case IGNORE_PATH: case IGNORE_DIRECTORY_PATH: case REMOVE_PATH : case RECURSIVE_REMOVE_PATH: _found = 1; break; default: break ; } _found; }); |
| 344 | } |
| 345 | |
| 346 | static struct Item* find_glob(OrderedHashmap *h, const char *match) { |
| 347 | ItemArray *j; |
| 348 | Iterator i; |
| 349 | |
| 350 | ORDERED_HASHMAP_FOREACH(j, h, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); ordered_hashmap_iterate((h), &( i), (void**)&(j), ((void*)0)); ) { |
| 351 | unsigned n; |
| 352 | |
| 353 | for (n = 0; n < j->count; n++) { |
| 354 | Item *item = j->items + n; |
| 355 | |
| 356 | if (fnmatch(item->path, match, FNM_PATHNAME(1 << 0)|FNM_PERIOD(1 << 2)) == 0) |
| 357 | return item; |
| 358 | } |
| 359 | } |
| 360 | |
| 361 | return NULL((void*)0); |
| 362 | } |
| 363 | |
| 364 | static void load_unix_sockets(void) { |
| 365 | _cleanup_fclose___attribute__((cleanup(fclosep))) FILE *f = NULL((void*)0); |
| 366 | int r; |
| 367 | |
| 368 | if (unix_sockets) |
| 369 | return; |
| 370 | |
| 371 | /* We maintain a cache of the sockets we found in /proc/net/unix to speed things up a little. */ |
| 372 | |
| 373 | unix_sockets = set_new(&path_hash_ops)internal_set_new(&path_hash_ops ); |
| 374 | if (!unix_sockets) { |
| 375 | log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 375, __func__); |
| 376 | return; |
| 377 | } |
| 378 | |
| 379 | f = fopen("/proc/net/unix", "re"); |
| 380 | if (!f) { |
| 381 | log_full_errno(errno == ENOENT ? LOG_DEBUG : LOG_WARNING, errno,({ int _level = (((*__errno_location ()) == 2 ? 7 : 4)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c" , 382, __func__, "Failed to open /proc/net/unix, ignoring: %m" ) : -abs(_e); }) |
| 382 | "Failed to open /proc/net/unix, ignoring: %m")({ int _level = (((*__errno_location ()) == 2 ? 7 : 4)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c" , 382, __func__, "Failed to open /proc/net/unix, ignoring: %m" ) : -abs(_e); }); |
| 383 | goto fail; |
| 384 | } |
| 385 | |
| 386 | /* Skip header */ |
| 387 | r = read_line(f, LONG_LINE_MAX(1U*1024U*1024U), NULL((void*)0)); |
| 388 | if (r < 0) { |
| 389 | log_warning_errno(r, "Failed to skip /proc/net/unix header line: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 389, __func__, "Failed to skip /proc/net/unix header line: %m" ) : -abs(_e); }); |
| 390 | goto fail; |
| 391 | } |
| 392 | if (r == 0) { |
| 393 | log_warning("Premature end of file reading /proc/net/unix.")({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 393, __func__, "Premature end of file reading /proc/net/unix." ) : -abs(_e); }); |
| 394 | goto fail; |
| 395 | } |
| 396 | |
| 397 | for (;;) { |
| 398 | _cleanup_free___attribute__((cleanup(freep))) char *line = NULL((void*)0); |
| 399 | char *p, *s; |
| 400 | |
| 401 | r = read_line(f, LONG_LINE_MAX(1U*1024U*1024U), &line); |
| 402 | if (r < 0) { |
| 403 | log_warning_errno(r, "Failed to read /proc/net/unix line, ignoring: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 403, __func__, "Failed to read /proc/net/unix line, ignoring: %m" ) : -abs(_e); }); |
| 404 | goto fail; |
| 405 | } |
| 406 | if (r == 0) /* EOF */ |
| 407 | break; |
| 408 | |
| 409 | p = strchr(line, ':'); |
| 410 | if (!p) |
| 411 | continue; |
| 412 | |
| 413 | if (strlen(p) < 37) |
| 414 | continue; |
| 415 | |
| 416 | p += 37; |
| 417 | p += strspn(p, WHITESPACE" \t\n\r"); |
| 418 | p += strcspn(p, WHITESPACE" \t\n\r"); /* skip one more word */ |
| 419 | p += strspn(p, WHITESPACE" \t\n\r"); |
| 420 | |
| 421 | if (*p != '/') |
| 422 | continue; |
| 423 | |
| 424 | s = strdup(p); |
| 425 | if (!s) { |
| 426 | log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 426, __func__); |
| 427 | goto fail; |
| 428 | } |
| 429 | |
| 430 | path_simplify(s, false0); |
| 431 | |
| 432 | r = set_consume(unix_sockets, s); |
| 433 | if (r < 0 && r != -EEXIST17) { |
| 434 | log_warning_errno(r, "Failed to add AF_UNIX socket to set, ignoring: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 434, __func__, "Failed to add AF_UNIX socket to set, ignoring: %m" ) : -abs(_e); }); |
| 435 | goto fail; |
| 436 | } |
| 437 | } |
| 438 | |
| 439 | return; |
| 440 | |
| 441 | fail: |
| 442 | unix_sockets = set_free_free(unix_sockets); |
| 443 | } |
| 444 | |
| 445 | static bool_Bool unix_socket_alive(const char *fn) { |
| 446 | assert(fn)do { if ((__builtin_expect(!!(!(fn)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fn"), "../src/tmpfiles/tmpfiles.c", 446 , __PRETTY_FUNCTION__); } while (0); |
| 447 | |
| 448 | load_unix_sockets(); |
| 449 | |
| 450 | if (unix_sockets) |
| 451 | return !!set_get(unix_sockets, (char*) fn); |
| 452 | |
| 453 | /* We don't know, so assume yes */ |
| 454 | return true1; |
| 455 | } |
| 456 | |
| 457 | static int dir_is_mount_point(DIR *d, const char *subdir) { |
| 458 | |
| 459 | int mount_id_parent, mount_id; |
| 460 | int r_p, r; |
| 461 | |
| 462 | r_p = name_to_handle_at_loop(dirfd(d), ".", NULL((void*)0), &mount_id_parent, 0); |
| 463 | if (r_p < 0) |
| 464 | r_p = -errno(*__errno_location ()); |
| 465 | |
| 466 | r = name_to_handle_at_loop(dirfd(d), subdir, NULL((void*)0), &mount_id, 0); |
| 467 | if (r < 0) |
| 468 | r = -errno(*__errno_location ()); |
| 469 | |
| 470 | /* got no handle; make no assumptions, return error */ |
| 471 | if (r_p < 0 && r < 0) |
| 472 | return r_p; |
| 473 | |
| 474 | /* got both handles; if they differ, it is a mount point */ |
| 475 | if (r_p >= 0 && r >= 0) |
| 476 | return mount_id_parent != mount_id; |
| 477 | |
| 478 | /* got only one handle; assume different mount points if one |
| 479 | * of both queries was not supported by the filesystem */ |
| 480 | if (IN_SET(r_p, -ENOSYS, -EOPNOTSUPP)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-38, -95})/sizeof(int)]; switch(r_p) { case -38: case -95: _found = 1; break; default: break; } _found; } ) || IN_SET(r, -ENOSYS, -EOPNOTSUPP)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-38, -95})/sizeof(int)]; switch(r) { case -38: case -95: _found = 1; break; default: break; } _found; } )) |
| 481 | return true1; |
| 482 | |
| 483 | /* return error */ |
| 484 | if (r_p < 0) |
| 485 | return r_p; |
| 486 | return r; |
| 487 | } |
| 488 | |
| 489 | static DIR* xopendirat_nomod(int dirfd, const char *path) { |
| 490 | DIR *dir; |
| 491 | |
| 492 | dir = xopendirat(dirfd, path, O_NOFOLLOW0400000|O_NOATIME01000000); |
| 493 | if (dir) |
| 494 | return dir; |
| 495 | |
| 496 | log_debug_errno(errno, "Cannot open %sdirectory \"%s\": %m", dirfd == AT_FDCWD ? "" : "sub", path)({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 496, __func__ , "Cannot open %sdirectory \"%s\": %m", dirfd == -100 ? "" : "sub" , path) : -abs(_e); }); |
| 497 | if (errno(*__errno_location ()) != EPERM1) |
| 498 | return NULL((void*)0); |
| 499 | |
| 500 | dir = xopendirat(dirfd, path, O_NOFOLLOW0400000); |
| 501 | if (!dir) |
| 502 | log_debug_errno(errno, "Cannot open %sdirectory \"%s\": %m", dirfd == AT_FDCWD ? "" : "sub", path)({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 502, __func__ , "Cannot open %sdirectory \"%s\": %m", dirfd == -100 ? "" : "sub" , path) : -abs(_e); }); |
| 503 | |
| 504 | return dir; |
| 505 | } |
| 506 | |
| 507 | static DIR* opendir_nomod(const char *path) { |
| 508 | return xopendirat_nomod(AT_FDCWD-100, path); |
| 509 | } |
| 510 | |
| 511 | static int dir_cleanup( |
| 512 | Item *i, |
| 513 | const char *p, |
| 514 | DIR *d, |
| 515 | const struct stat *ds, |
| 516 | usec_t cutoff, |
| 517 | dev_t rootdev, |
| 518 | bool_Bool mountpoint, |
| 519 | int maxdepth, |
| 520 | bool_Bool keep_this_level) { |
| 521 | |
| 522 | struct dirent *dent; |
| 523 | struct timespec times[2]; |
| 524 | bool_Bool deleted = false0; |
| 525 | int r = 0; |
| 526 | |
| 527 | FOREACH_DIRENT_ALL(dent, d, break)for ((*__errno_location ()) = 0, dent = readdir(d);; (*__errno_location ()) = 0, dent = readdir(d)) if (!dent) { if ((*__errno_location ()) > 0) { break; } break; } else { |
| 528 | struct stat s; |
| 529 | usec_t age; |
| 530 | _cleanup_free___attribute__((cleanup(freep))) char *sub_path = NULL((void*)0); |
| 531 | |
| 532 | if (dot_or_dot_dot(dent->d_name)) |
| 533 | continue; |
| 534 | |
| 535 | if (fstatat(dirfd(d), dent->d_name, &s, AT_SYMLINK_NOFOLLOW0x100) < 0) { |
| 536 | if (errno(*__errno_location ()) == ENOENT2) |
| 537 | continue; |
| 538 | |
| 539 | /* FUSE, NFS mounts, SELinux might return EACCES */ |
| 540 | r = log_full_errno(errno == EACCES ? LOG_DEBUG : LOG_ERR, errno,({ int _level = (((*__errno_location ()) == 13 ? 7 : 3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c" , 541, __func__, "stat(%s/%s) failed: %m", p, dent->d_name ) : -abs(_e); }) |
| 541 | "stat(%s/%s) failed: %m", p, dent->d_name)({ int _level = (((*__errno_location ()) == 13 ? 7 : 3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c" , 541, __func__, "stat(%s/%s) failed: %m", p, dent->d_name ) : -abs(_e); }); |
| 542 | continue; |
| 543 | } |
| 544 | |
| 545 | /* Stay on the same filesystem */ |
| 546 | if (s.st_dev != rootdev) { |
| 547 | log_debug("Ignoring \"%s/%s\": different filesystem.", p, dent->d_name)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 547, __func__, "Ignoring \"%s/%s\": different filesystem." , p, dent->d_name) : -abs(_e); }); |
| 548 | continue; |
| 549 | } |
| 550 | |
| 551 | /* Try to detect bind mounts of the same filesystem instance; they |
| 552 | * do not differ in device major/minors. This type of query is not |
| 553 | * supported on all kernels or filesystem types though. */ |
| 554 | if (S_ISDIR(s.st_mode)((((s.st_mode)) & 0170000) == (0040000)) && dir_is_mount_point(d, dent->d_name) > 0) { |
| 555 | log_debug("Ignoring \"%s/%s\": different mount of the same filesystem.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 556, __func__, "Ignoring \"%s/%s\": different mount of the same filesystem." , p, dent->d_name) : -abs(_e); }) |
| 556 | p, dent->d_name)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 556, __func__, "Ignoring \"%s/%s\": different mount of the same filesystem." , p, dent->d_name) : -abs(_e); }); |
| 557 | continue; |
| 558 | } |
| 559 | |
| 560 | sub_path = strjoin(p, "/", dent->d_name)strjoin_real((p), "/", dent->d_name, ((void*)0)); |
| 561 | if (!sub_path) { |
| 562 | r = log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 562, __func__); |
| 563 | goto finish; |
| 564 | } |
| 565 | |
| 566 | /* Is there an item configured for this path? */ |
| 567 | if (ordered_hashmap_get(items, sub_path)) { |
| 568 | log_debug("Ignoring \"%s\": a separate entry exists.", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 568, __func__, "Ignoring \"%s\": a separate entry exists." , sub_path) : -abs(_e); }); |
| 569 | continue; |
| 570 | } |
| 571 | |
| 572 | if (find_glob(globs, sub_path)) { |
| 573 | log_debug("Ignoring \"%s\": a separate glob exists.", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 573, __func__, "Ignoring \"%s\": a separate glob exists." , sub_path) : -abs(_e); }); |
| 574 | continue; |
| 575 | } |
| 576 | |
| 577 | if (S_ISDIR(s.st_mode)((((s.st_mode)) & 0170000) == (0040000))) { |
| 578 | |
| 579 | if (mountpoint && |
| 580 | streq(dent->d_name, "lost+found")(strcmp((dent->d_name),("lost+found")) == 0) && |
| 581 | s.st_uid == 0) { |
| 582 | log_debug("Ignoring \"%s\".", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 582, __func__, "Ignoring \"%s\"." , sub_path) : -abs(_e); }); |
| 583 | continue; |
| 584 | } |
| 585 | |
| 586 | if (maxdepth <= 0) |
| 587 | log_warning("Reached max depth on \"%s\".", sub_path)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 587, __func__, "Reached max depth on \"%s\"." , sub_path) : -abs(_e); }); |
| 588 | else { |
| 589 | _cleanup_closedir___attribute__((cleanup(closedirp))) DIR *sub_dir; |
| 590 | int q; |
| 591 | |
| 592 | sub_dir = xopendirat_nomod(dirfd(d), dent->d_name); |
| 593 | if (!sub_dir) { |
| 594 | if (errno(*__errno_location ()) != ENOENT2) |
| 595 | r = log_error_errno(errno, "opendir(%s) failed: %m", sub_path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 595, __func__ , "opendir(%s) failed: %m", sub_path) : -abs(_e); }); |
| 596 | |
| 597 | continue; |
| 598 | } |
| 599 | |
| 600 | q = dir_cleanup(i, sub_path, sub_dir, &s, cutoff, rootdev, false0, maxdepth-1, false0); |
| 601 | if (q < 0) |
| 602 | r = q; |
| 603 | } |
| 604 | |
| 605 | /* Note: if you are wondering why we don't |
| 606 | * support the sticky bit for excluding |
| 607 | * directories from cleaning like we do it for |
| 608 | * other file system objects: well, the sticky |
| 609 | * bit already has a meaning for directories, |
| 610 | * so we don't want to overload that. */ |
| 611 | |
| 612 | if (keep_this_level) { |
| 613 | log_debug("Keeping \"%s\".", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 613, __func__, "Keeping \"%s\"." , sub_path) : -abs(_e); }); |
| 614 | continue; |
| 615 | } |
| 616 | |
| 617 | /* Ignore ctime, we change it when deleting */ |
| 618 | age = timespec_load(&s.st_mtim); |
| 619 | if (age >= cutoff) { |
| 620 | char a[FORMAT_TIMESTAMP_MAX(3+1+10+1+8+1+6+1+6+1)]; |
| 621 | /* Follows spelling in stat(1). */ |
| 622 | log_debug("Directory \"%s\": modify time %s is too new.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 624, __func__, "Directory \"%s\": modify time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
| 623 | sub_path,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 624, __func__, "Directory \"%s\": modify time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
| 624 | format_timestamp_us(a, sizeof(a), age))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 624, __func__, "Directory \"%s\": modify time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }); |
| 625 | continue; |
| 626 | } |
| 627 | |
| 628 | age = timespec_load(&s.st_atim); |
| 629 | if (age >= cutoff) { |
| 630 | char a[FORMAT_TIMESTAMP_MAX(3+1+10+1+8+1+6+1+6+1)]; |
| 631 | log_debug("Directory \"%s\": access time %s is too new.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 633, __func__, "Directory \"%s\": access time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
| 632 | sub_path,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 633, __func__, "Directory \"%s\": access time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
| 633 | format_timestamp_us(a, sizeof(a), age))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 633, __func__, "Directory \"%s\": access time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }); |
| 634 | continue; |
| 635 | } |
| 636 | |
| 637 | log_debug("Removing directory \"%s\".", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 637, __func__, "Removing directory \"%s\"." , sub_path) : -abs(_e); }); |
| 638 | if (unlinkat(dirfd(d), dent->d_name, AT_REMOVEDIR0x200) < 0) |
| 639 | if (!IN_SET(errno, ENOENT, ENOTEMPTY)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){2, 39})/sizeof(int)]; switch((*__errno_location ())) { case 2: case 39: _found = 1; break; default: break; } _found; })) |
| 640 | r = log_error_errno(errno, "rmdir(%s): %m", sub_path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 640, __func__ , "rmdir(%s): %m", sub_path) : -abs(_e); }); |
| 641 | |
| 642 | } else { |
| 643 | /* Skip files for which the sticky bit is |
| 644 | * set. These are semantics we define, and are |
| 645 | * unknown elsewhere. See XDG_RUNTIME_DIR |
| 646 | * specification for details. */ |
| 647 | if (s.st_mode & S_ISVTX01000) { |
| 648 | log_debug("Skipping \"%s\": sticky bit set.", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 648, __func__, "Skipping \"%s\": sticky bit set." , sub_path) : -abs(_e); }); |
| 649 | continue; |
| 650 | } |
| 651 | |
| 652 | if (mountpoint && S_ISREG(s.st_mode)((((s.st_mode)) & 0170000) == (0100000))) |
| 653 | if (s.st_uid == 0 && STR_IN_SET(dent->d_name,(!!strv_find((((char**) ((const char*[]) { ".journal", "aquota.user" , "aquota.group", ((void*)0) }))), (dent->d_name))) |
| 654 | ".journal",(!!strv_find((((char**) ((const char*[]) { ".journal", "aquota.user" , "aquota.group", ((void*)0) }))), (dent->d_name))) |
| 655 | "aquota.user",(!!strv_find((((char**) ((const char*[]) { ".journal", "aquota.user" , "aquota.group", ((void*)0) }))), (dent->d_name))) |
| 656 | "aquota.group")(!!strv_find((((char**) ((const char*[]) { ".journal", "aquota.user" , "aquota.group", ((void*)0) }))), (dent->d_name)))) { |
| 657 | log_debug("Skipping \"%s\".", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 657, __func__, "Skipping \"%s\"." , sub_path) : -abs(_e); }); |
| 658 | continue; |
| 659 | } |
| 660 | |
| 661 | /* Ignore sockets that are listed in /proc/net/unix */ |
| 662 | if (S_ISSOCK(s.st_mode)((((s.st_mode)) & 0170000) == (0140000)) && unix_socket_alive(sub_path)) { |
| 663 | log_debug("Skipping \"%s\": live socket.", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 663, __func__, "Skipping \"%s\": live socket." , sub_path) : -abs(_e); }); |
| 664 | continue; |
| 665 | } |
| 666 | |
| 667 | /* Ignore device nodes */ |
| 668 | if (S_ISCHR(s.st_mode)((((s.st_mode)) & 0170000) == (0020000)) || S_ISBLK(s.st_mode)((((s.st_mode)) & 0170000) == (0060000))) { |
| 669 | log_debug("Skipping \"%s\": a device.", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 669, __func__, "Skipping \"%s\": a device." , sub_path) : -abs(_e); }); |
| 670 | continue; |
| 671 | } |
| 672 | |
| 673 | /* Keep files on this level around if this is |
| 674 | * requested */ |
| 675 | if (keep_this_level) { |
| 676 | log_debug("Keeping \"%s\".", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 676, __func__, "Keeping \"%s\"." , sub_path) : -abs(_e); }); |
| 677 | continue; |
| 678 | } |
| 679 | |
| 680 | age = timespec_load(&s.st_mtim); |
| 681 | if (age >= cutoff) { |
| 682 | char a[FORMAT_TIMESTAMP_MAX(3+1+10+1+8+1+6+1+6+1)]; |
| 683 | /* Follows spelling in stat(1). */ |
| 684 | log_debug("File \"%s\": modify time %s is too new.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 686, __func__, "File \"%s\": modify time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
| 685 | sub_path,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 686, __func__, "File \"%s\": modify time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
| 686 | format_timestamp_us(a, sizeof(a), age))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 686, __func__, "File \"%s\": modify time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }); |
| 687 | continue; |
| 688 | } |
| 689 | |
| 690 | age = timespec_load(&s.st_atim); |
| 691 | if (age >= cutoff) { |
| 692 | char a[FORMAT_TIMESTAMP_MAX(3+1+10+1+8+1+6+1+6+1)]; |
| 693 | log_debug("File \"%s\": access time %s is too new.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 695, __func__, "File \"%s\": access time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
| 694 | sub_path,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 695, __func__, "File \"%s\": access time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
| 695 | format_timestamp_us(a, sizeof(a), age))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 695, __func__, "File \"%s\": access time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }); |
| 696 | continue; |
| 697 | } |
| 698 | |
| 699 | age = timespec_load(&s.st_ctim); |
| 700 | if (age >= cutoff) { |
| 701 | char a[FORMAT_TIMESTAMP_MAX(3+1+10+1+8+1+6+1+6+1)]; |
| 702 | log_debug("File \"%s\": change time %s is too new.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 704, __func__, "File \"%s\": change time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
| 703 | sub_path,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 704, __func__, "File \"%s\": change time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }) |
| 704 | format_timestamp_us(a, sizeof(a), age))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 704, __func__, "File \"%s\": change time %s is too new." , sub_path, format_timestamp_us(a, sizeof(a), age)) : -abs(_e ); }); |
| 705 | continue; |
| 706 | } |
| 707 | |
| 708 | log_debug("unlink \"%s\"", sub_path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 708, __func__, "unlink \"%s\"" , sub_path) : -abs(_e); }); |
| 709 | |
| 710 | if (unlinkat(dirfd(d), dent->d_name, 0) < 0) |
| 711 | if (errno(*__errno_location ()) != ENOENT2) |
| 712 | r = log_error_errno(errno, "unlink(%s): %m", sub_path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 712, __func__ , "unlink(%s): %m", sub_path) : -abs(_e); }); |
| 713 | |
| 714 | deleted = true1; |
| 715 | } |
| 716 | } |
| 717 | |
| 718 | finish: |
| 719 | if (deleted) { |
| 720 | usec_t age1, age2; |
| 721 | char a[FORMAT_TIMESTAMP_MAX(3+1+10+1+8+1+6+1+6+1)], b[FORMAT_TIMESTAMP_MAX(3+1+10+1+8+1+6+1+6+1)]; |
| 722 | |
| 723 | /* Restore original directory timestamps */ |
| 724 | times[0] = ds->st_atim; |
| 725 | times[1] = ds->st_mtim; |
| 726 | |
| 727 | age1 = timespec_load(&ds->st_atim); |
| 728 | age2 = timespec_load(&ds->st_mtim); |
| 729 | log_debug("Restoring access and modification time on \"%s\": %s, %s",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 732, __func__, "Restoring access and modification time on \"%s\": %s, %s" , p, format_timestamp_us(a, sizeof(a), age1), format_timestamp_us (b, sizeof(b), age2)) : -abs(_e); }) |
| 730 | p,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 732, __func__, "Restoring access and modification time on \"%s\": %s, %s" , p, format_timestamp_us(a, sizeof(a), age1), format_timestamp_us (b, sizeof(b), age2)) : -abs(_e); }) |
| 731 | format_timestamp_us(a, sizeof(a), age1),({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 732, __func__, "Restoring access and modification time on \"%s\": %s, %s" , p, format_timestamp_us(a, sizeof(a), age1), format_timestamp_us (b, sizeof(b), age2)) : -abs(_e); }) |
| 732 | format_timestamp_us(b, sizeof(b), age2))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 732, __func__, "Restoring access and modification time on \"%s\": %s, %s" , p, format_timestamp_us(a, sizeof(a), age1), format_timestamp_us (b, sizeof(b), age2)) : -abs(_e); }); |
| 733 | if (futimens(dirfd(d), times) < 0) |
| 734 | log_error_errno(errno, "utimensat(%s): %m", p)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 734, __func__ , "utimensat(%s): %m", p) : -abs(_e); }); |
| 735 | } |
| 736 | |
| 737 | return r; |
| 738 | } |
| 739 | |
| 740 | static bool_Bool dangerous_hardlinks(void) { |
| 741 | _cleanup_free___attribute__((cleanup(freep))) char *value = NULL((void*)0); |
| 742 | static int cached = -1; |
| 743 | int r; |
| 744 | |
| 745 | /* Check whether the fs.protected_hardlinks sysctl is on. If we can't determine it we assume its off, as that's |
| 746 | * what the upstream default is. */ |
| 747 | |
| 748 | if (cached >= 0) |
| 749 | return cached; |
| 750 | |
| 751 | r = read_one_line_file("/proc/sys/fs/protected_hardlinks", &value); |
| 752 | if (r < 0) { |
| 753 | log_debug_errno(r, "Failed to read fs.protected_hardlinks sysctl: %m")({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 753, __func__, "Failed to read fs.protected_hardlinks sysctl: %m" ) : -abs(_e); }); |
| 754 | return true1; |
| 755 | } |
| 756 | |
| 757 | r = parse_boolean(value); |
| 758 | if (r < 0) { |
| 759 | log_debug_errno(r, "Failed to parse fs.protected_hardlinks sysctl: %m")({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 759, __func__, "Failed to parse fs.protected_hardlinks sysctl: %m" ) : -abs(_e); }); |
| 760 | return true1; |
| 761 | } |
| 762 | |
| 763 | cached = r == 0; |
| 764 | return cached; |
| 765 | } |
| 766 | |
| 767 | static bool_Bool hardlink_vulnerable(const struct stat *st) { |
| 768 | assert(st)do { if ((__builtin_expect(!!(!(st)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("st"), "../src/tmpfiles/tmpfiles.c", 768 , __PRETTY_FUNCTION__); } while (0); |
| 769 | |
| 770 | return !S_ISDIR(st->st_mode)((((st->st_mode)) & 0170000) == (0040000)) && st->st_nlink > 1 && dangerous_hardlinks(); |
| 771 | } |
| 772 | |
| 773 | static int fd_set_perms(Item *i, int fd, const struct stat *st) { |
| 774 | _cleanup_free___attribute__((cleanup(freep))) char *path = NULL((void*)0); |
| 775 | int r; |
| 776 | |
| 777 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 777, __PRETTY_FUNCTION__); } while (0); |
| 778 | assert(fd)do { if ((__builtin_expect(!!(!(fd)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fd"), "../src/tmpfiles/tmpfiles.c", 778 , __PRETTY_FUNCTION__); } while (0); |
| 779 | |
| 780 | r = fd_get_path(fd, &path); |
| 781 | if (r < 0) |
| 782 | return r; |
| 783 | |
| 784 | if (!i->mode_set && !i->uid_set && !i->gid_set) |
| 785 | goto shortcut; |
| 786 | |
| 787 | if (hardlink_vulnerable(st)) { |
| 788 | log_error("Refusing to set permissions on hardlinked file %s while the fs.protected_hardlinks sysctl is turned off.", path)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 788, __func__, "Refusing to set permissions on hardlinked file %s while the fs.protected_hardlinks sysctl is turned off." , path) : -abs(_e); }); |
| 789 | return -EPERM1; |
| 790 | } |
| 791 | |
| 792 | if (i->mode_set) { |
| 793 | if (S_ISLNK(st->st_mode)((((st->st_mode)) & 0170000) == (0120000))) |
| 794 | log_debug("Skipping mode fix for symlink %s.", path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 794, __func__, "Skipping mode fix for symlink %s." , path) : -abs(_e); }); |
| 795 | else { |
| 796 | mode_t m = i->mode; |
| 797 | |
| 798 | if (i->mask_perms) { |
| 799 | if (!(st->st_mode & 0111)) |
| 800 | m &= ~0111; |
| 801 | if (!(st->st_mode & 0222)) |
| 802 | m &= ~0222; |
| 803 | if (!(st->st_mode & 0444)) |
| 804 | m &= ~0444; |
| 805 | if (!S_ISDIR(st->st_mode)((((st->st_mode)) & 0170000) == (0040000))) |
| 806 | m &= ~07000; /* remove sticky/sgid/suid bit, unless directory */ |
| 807 | } |
| 808 | |
| 809 | if (m == (st->st_mode & 07777)) |
| 810 | log_debug("\"%s\" has correct mode %o already.", path, st->st_mode)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 810, __func__, "\"%s\" has correct mode %o already." , path, st->st_mode) : -abs(_e); }); |
| 811 | else { |
| 812 | log_debug("Changing \"%s\" to mode %o.", path, m)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 812, __func__, "Changing \"%s\" to mode %o." , path, m) : -abs(_e); }); |
| 813 | if (fchmod_opath(fd, m) < 0) |
| 814 | return log_error_errno(errno, "fchmod() of %s failed: %m", path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 814, __func__ , "fchmod() of %s failed: %m", path) : -abs(_e); }); |
| 815 | } |
| 816 | } |
| 817 | } |
| 818 | |
| 819 | if ((i->uid_set && i->uid != st->st_uid) || |
| 820 | (i->gid_set && i->gid != st->st_gid)) { |
| 821 | log_debug("Changing \"%s\" to owner "UID_FMT":"GID_FMT,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 824, __func__, "Changing \"%s\" to owner " "%" "u"":""%" "u", path, i->uid_set ? i->uid : ((uid_t) -1), i->gid_set ? i->gid : ((gid_t) -1)) : -abs(_e); } ) |
| 822 | path,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 824, __func__, "Changing \"%s\" to owner " "%" "u"":""%" "u", path, i->uid_set ? i->uid : ((uid_t) -1), i->gid_set ? i->gid : ((gid_t) -1)) : -abs(_e); } ) |
| 823 | i->uid_set ? i->uid : UID_INVALID,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 824, __func__, "Changing \"%s\" to owner " "%" "u"":""%" "u", path, i->uid_set ? i->uid : ((uid_t) -1), i->gid_set ? i->gid : ((gid_t) -1)) : -abs(_e); } ) |
| 824 | i->gid_set ? i->gid : GID_INVALID)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 824, __func__, "Changing \"%s\" to owner " "%" "u"":""%" "u", path, i->uid_set ? i->uid : ((uid_t) -1), i->gid_set ? i->gid : ((gid_t) -1)) : -abs(_e); } ); |
| 825 | |
| 826 | if (fchownat(fd, |
| 827 | "", |
| 828 | i->uid_set ? i->uid : UID_INVALID((uid_t) -1), |
| 829 | i->gid_set ? i->gid : GID_INVALID((gid_t) -1), |
| 830 | AT_EMPTY_PATH0x1000) < 0) |
| 831 | return log_error_errno(errno, "fchownat() of %s failed: %m", path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 831, __func__ , "fchownat() of %s failed: %m", path) : -abs(_e); }); |
| 832 | } |
| 833 | |
| 834 | shortcut: |
| 835 | return label_fix(path, 0); |
| 836 | } |
| 837 | |
| 838 | static int path_set_perms(Item *i, const char *path) { |
| 839 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1; |
| 840 | struct stat st; |
| 841 | |
| 842 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 842, __PRETTY_FUNCTION__); } while (0); |
| 843 | assert(path)do { if ((__builtin_expect(!!(!(path)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("path"), "../src/tmpfiles/tmpfiles.c", 843 , __PRETTY_FUNCTION__); } while (0); |
| 844 | |
| 845 | fd = open(path, O_NOFOLLOW0400000|O_CLOEXEC02000000|O_PATH010000000); |
| 846 | if (fd < 0) { |
| 847 | int level = LOG_ERR3, r = -errno(*__errno_location ()); |
| 848 | |
| 849 | /* Option "e" operates only on existing objects. Do not |
| 850 | * print errors about non-existent files or directories */ |
| 851 | if (i->type == EMPTY_DIRECTORY && errno(*__errno_location ()) == ENOENT2) { |
| 852 | level = LOG_DEBUG7; |
| 853 | r = 0; |
| 854 | } |
| 855 | |
| 856 | log_full_errno(level, errno, "Adjusting owner and mode for %s failed: %m", path)({ int _level = ((level)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 856, __func__ , "Adjusting owner and mode for %s failed: %m", path) : -abs( _e); }); |
| 857 | return r; |
| 858 | } |
| 859 | |
| 860 | if (fstat(fd, &st) < 0) |
| 861 | return log_error_errno(errno, "Failed to fstat() file %s: %m", path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 861, __func__ , "Failed to fstat() file %s: %m", path) : -abs(_e); }); |
| 862 | |
| 863 | if (i->type == EMPTY_DIRECTORY && !S_ISDIR(st.st_mode)((((st.st_mode)) & 0170000) == (0040000))) |
| 864 | return log_error_errno(EEXIST, "'%s' already exists and is not a directory. ", path)({ int _level = ((3)), _e = ((17)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 864, __func__, "'%s' already exists and is not a directory. " , path) : -abs(_e); }); |
| 865 | |
| 866 | return fd_set_perms(i, fd, &st); |
| 867 | } |
| 868 | |
| 869 | static int parse_xattrs_from_arg(Item *i) { |
| 870 | const char *p; |
| 871 | int r; |
| 872 | |
| 873 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 873, __PRETTY_FUNCTION__); } while (0); |
| 874 | assert(i->argument)do { if ((__builtin_expect(!!(!(i->argument)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i->argument"), "../src/tmpfiles/tmpfiles.c" , 874, __PRETTY_FUNCTION__); } while (0); |
| 875 | |
| 876 | p = i->argument; |
| 877 | |
| 878 | for (;;) { |
| 879 | _cleanup_free___attribute__((cleanup(freep))) char *name = NULL((void*)0), *value = NULL((void*)0), *xattr = NULL((void*)0); |
| 880 | |
| 881 | r = extract_first_word(&p, &xattr, NULL((void*)0), EXTRACT_QUOTES|EXTRACT_CUNESCAPE); |
| 882 | if (r < 0) |
| 883 | log_warning_errno(r, "Failed to parse extended attribute '%s', ignoring: %m", p)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 883, __func__, "Failed to parse extended attribute '%s', ignoring: %m" , p) : -abs(_e); }); |
| 884 | if (r <= 0) |
| 885 | break; |
| 886 | |
| 887 | r = split_pair(xattr, "=", &name, &value); |
| 888 | if (r < 0) { |
| 889 | log_warning_errno(r, "Failed to parse extended attribute, ignoring: %s", xattr)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 889, __func__, "Failed to parse extended attribute, ignoring: %s" , xattr) : -abs(_e); }); |
| 890 | continue; |
| 891 | } |
| 892 | |
| 893 | if (isempty(name) || isempty(value)) { |
| 894 | log_warning("Malformed extended attribute found, ignoring: %s", xattr)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 894, __func__, "Malformed extended attribute found, ignoring: %s" , xattr) : -abs(_e); }); |
| 895 | continue; |
| 896 | } |
| 897 | |
| 898 | if (strv_push_pair(&i->xattrs, name, value) < 0) |
| 899 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 899, __func__); |
| 900 | |
| 901 | name = value = NULL((void*)0); |
| 902 | } |
| 903 | |
| 904 | return 0; |
| 905 | } |
| 906 | |
| 907 | static int fd_set_xattrs(Item *i, int fd, const struct stat *st) { |
| 908 | char procfs_path[STRLEN("/proc/self/fd/")(sizeof("""/proc/self/fd/""") - 1) + DECIMAL_STR_MAX(int)(2+(sizeof(int) <= 1 ? 3 : sizeof(int) <= 2 ? 5 : sizeof (int) <= 4 ? 10 : sizeof(int) <= 8 ? 20 : sizeof(int[-2 *(sizeof(int) > 8)])))]; |
| 909 | _cleanup_free___attribute__((cleanup(freep))) char *path = NULL((void*)0); |
| 910 | char **name, **value; |
| 911 | int r; |
| 912 | |
| 913 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 913, __PRETTY_FUNCTION__); } while (0); |
| 914 | assert(fd)do { if ((__builtin_expect(!!(!(fd)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fd"), "../src/tmpfiles/tmpfiles.c", 914 , __PRETTY_FUNCTION__); } while (0); |
| 915 | |
| 916 | r = fd_get_path(fd, &path); |
| 917 | if (r < 0) |
| 918 | return r; |
| 919 | |
| 920 | xsprintf(procfs_path, "/proc/self/fd/%i", fd)do { if ((__builtin_expect(!!(!(((size_t) snprintf(procfs_path , __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(procfs_path), typeof(&*(procfs_path))), sizeof(procfs_path )/sizeof((procfs_path)[0]), ((void)0))), "/proc/self/fd/%i", fd ) < (__extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(procfs_path), typeof(&*(procfs_path))), sizeof(procfs_path )/sizeof((procfs_path)[0]), ((void)0))))))),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("xsprintf: " "procfs_path" "[] must be big enough" ), "../src/tmpfiles/tmpfiles.c", 920, __PRETTY_FUNCTION__); } while (0); |
| 921 | |
| 922 | STRV_FOREACH_PAIR(name, value, i->xattrs)for ((name) = (i->xattrs), (value) = (name+1); (name) && *(name) && *(value); (name) += 2, (value) = (name + 1 )) { |
| 923 | log_debug("Setting extended attribute '%s=%s' on %s.", *name, *value, path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 923, __func__, "Setting extended attribute '%s=%s' on %s." , *name, *value, path) : -abs(_e); }); |
| 924 | if (setxattr(procfs_path, *name, *value, strlen(*value), 0) < 0) |
| 925 | return log_error_errno(errno, "Setting extended attribute %s=%s on %s failed: %m",({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 926, __func__ , "Setting extended attribute %s=%s on %s failed: %m", *name, *value, path) : -abs(_e); }) |
| 926 | *name, *value, path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 926, __func__ , "Setting extended attribute %s=%s on %s failed: %m", *name, *value, path) : -abs(_e); }); |
| 927 | } |
| 928 | return 0; |
| 929 | } |
| 930 | |
| 931 | static int path_set_xattrs(Item *i, const char *path) { |
| 932 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1; |
| 933 | |
| 934 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 934, __PRETTY_FUNCTION__); } while (0); |
| 935 | assert(path)do { if ((__builtin_expect(!!(!(path)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("path"), "../src/tmpfiles/tmpfiles.c", 935 , __PRETTY_FUNCTION__); } while (0); |
| 936 | |
| 937 | fd = open(path, O_CLOEXEC02000000|O_NOFOLLOW0400000|O_PATH010000000); |
| 938 | if (fd < 0) |
| 939 | return log_error_errno(errno, "Cannot open '%s': %m", path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 939, __func__ , "Cannot open '%s': %m", path) : -abs(_e); }); |
| 940 | |
| 941 | return fd_set_xattrs(i, fd, NULL((void*)0)); |
| 942 | } |
| 943 | |
| 944 | static int parse_acls_from_arg(Item *item) { |
| 945 | #if HAVE_ACL1 |
| 946 | int r; |
| 947 | |
| 948 | assert(item)do { if ((__builtin_expect(!!(!(item)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("item"), "../src/tmpfiles/tmpfiles.c", 948 , __PRETTY_FUNCTION__); } while (0); |
| 949 | |
| 950 | /* If force (= modify) is set, we will not modify the acl |
| 951 | * afterwards, so the mask can be added now if necessary. */ |
| 952 | |
| 953 | r = parse_acl(item->argument, &item->acl_access, &item->acl_default, !item->force); |
| 954 | if (r < 0) |
| 955 | log_warning_errno(r, "Failed to parse ACL \"%s\": %m. Ignoring", item->argument)({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 955, __func__, "Failed to parse ACL \"%s\": %m. Ignoring" , item->argument) : -abs(_e); }); |
| 956 | #else |
| 957 | log_warning_errno(ENOSYS, "ACLs are not supported. Ignoring")({ int _level = ((4)), _e = ((38)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 957, __func__, "ACLs are not supported. Ignoring" ) : -abs(_e); }); |
| 958 | #endif |
| 959 | |
| 960 | return 0; |
| 961 | } |
| 962 | |
| 963 | #if HAVE_ACL1 |
| 964 | static int path_set_acl(const char *path, const char *pretty, acl_type_t type, acl_t acl, bool_Bool modify) { |
| 965 | _cleanup_(acl_free_charpp)__attribute__((cleanup(acl_free_charpp))) char *t = NULL((void*)0); |
| 966 | _cleanup_(acl_freep)__attribute__((cleanup(acl_freep))) acl_t dup = NULL((void*)0); |
| 967 | int r; |
| 968 | |
| 969 | /* Returns 0 for success, positive error if already warned, |
| 970 | * negative error otherwise. */ |
| 971 | |
| 972 | if (modify) { |
| 973 | r = acls_for_file(path, type, acl, &dup); |
| 974 | if (r < 0) |
| 975 | return r; |
| 976 | |
| 977 | r = calc_acl_mask_if_needed(&dup); |
| 978 | if (r < 0) |
| 979 | return r; |
| 980 | } else { |
| 981 | dup = acl_dup(acl); |
| 982 | if (!dup) |
| 983 | return -errno(*__errno_location ()); |
| 984 | |
| 985 | /* the mask was already added earlier if needed */ |
| 986 | } |
| 987 | |
| 988 | r = add_base_acls_if_needed(&dup, path); |
| 989 | if (r < 0) |
| 990 | return r; |
| 991 | |
| 992 | t = acl_to_any_text(dup, NULL((void*)0), ',', TEXT_ABBREVIATE0x10); |
| 993 | log_debug("Setting %s ACL %s on %s.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 995, __func__, "Setting %s ACL %s on %s." , type == (0x8000) ? "access" : "default", strna(t), pretty) : -abs(_e); }) |
| 994 | type == ACL_TYPE_ACCESS ? "access" : "default",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 995, __func__, "Setting %s ACL %s on %s." , type == (0x8000) ? "access" : "default", strna(t), pretty) : -abs(_e); }) |
| 995 | strna(t), pretty)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 995, __func__, "Setting %s ACL %s on %s." , type == (0x8000) ? "access" : "default", strna(t), pretty) : -abs(_e); }); |
| 996 | |
| 997 | r = acl_set_file(path, type, dup); |
| 998 | if (r < 0) |
| 999 | /* Return positive to indicate we already warned */ |
| 1000 | return -log_error_errno(errno,({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1003, __func__ , "Setting %s ACL \"%s\" on %s failed: %m", type == (0x8000) ? "access" : "default", strna(t), pretty) : -abs(_e); }) |
| 1001 | "Setting %s ACL \"%s\" on %s failed: %m",({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1003, __func__ , "Setting %s ACL \"%s\" on %s failed: %m", type == (0x8000) ? "access" : "default", strna(t), pretty) : -abs(_e); }) |
| 1002 | type == ACL_TYPE_ACCESS ? "access" : "default",({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1003, __func__ , "Setting %s ACL \"%s\" on %s failed: %m", type == (0x8000) ? "access" : "default", strna(t), pretty) : -abs(_e); }) |
| 1003 | strna(t), pretty)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1003, __func__ , "Setting %s ACL \"%s\" on %s failed: %m", type == (0x8000) ? "access" : "default", strna(t), pretty) : -abs(_e); }); |
| 1004 | |
| 1005 | return 0; |
| 1006 | } |
| 1007 | #endif |
| 1008 | |
| 1009 | static int fd_set_acls(Item *item, int fd, const struct stat *st) { |
| 1010 | int r = 0; |
| 1011 | #if HAVE_ACL1 |
| 1012 | char procfs_path[STRLEN("/proc/self/fd/")(sizeof("""/proc/self/fd/""") - 1) + DECIMAL_STR_MAX(int)(2+(sizeof(int) <= 1 ? 3 : sizeof(int) <= 2 ? 5 : sizeof (int) <= 4 ? 10 : sizeof(int) <= 8 ? 20 : sizeof(int[-2 *(sizeof(int) > 8)])))]; |
| 1013 | _cleanup_free___attribute__((cleanup(freep))) char *path = NULL((void*)0); |
| 1014 | |
| 1015 | assert(item)do { if ((__builtin_expect(!!(!(item)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("item"), "../src/tmpfiles/tmpfiles.c", 1015 , __PRETTY_FUNCTION__); } while (0); |
| 1016 | assert(fd)do { if ((__builtin_expect(!!(!(fd)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fd"), "../src/tmpfiles/tmpfiles.c", 1016 , __PRETTY_FUNCTION__); } while (0); |
| 1017 | assert(st)do { if ((__builtin_expect(!!(!(st)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("st"), "../src/tmpfiles/tmpfiles.c", 1017 , __PRETTY_FUNCTION__); } while (0); |
| 1018 | |
| 1019 | r = fd_get_path(fd, &path); |
| 1020 | if (r < 0) |
| 1021 | return r; |
| 1022 | |
| 1023 | if (hardlink_vulnerable(st)) { |
| 1024 | log_error("Refusing to set ACLs on hardlinked file %s while the fs.protected_hardlinks sysctl is turned off.", path)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1024, __func__, "Refusing to set ACLs on hardlinked file %s while the fs.protected_hardlinks sysctl is turned off." , path) : -abs(_e); }); |
| 1025 | return -EPERM1; |
| 1026 | } |
| 1027 | |
| 1028 | if (S_ISLNK(st->st_mode)((((st->st_mode)) & 0170000) == (0120000))) { |
| 1029 | log_debug("Skipping ACL fix for symlink %s.", path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1029, __func__, "Skipping ACL fix for symlink %s." , path) : -abs(_e); }); |
| 1030 | return 0; |
| 1031 | } |
| 1032 | |
| 1033 | xsprintf(procfs_path, "/proc/self/fd/%i", fd)do { if ((__builtin_expect(!!(!(((size_t) snprintf(procfs_path , __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(procfs_path), typeof(&*(procfs_path))), sizeof(procfs_path )/sizeof((procfs_path)[0]), ((void)0))), "/proc/self/fd/%i", fd ) < (__extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(procfs_path), typeof(&*(procfs_path))), sizeof(procfs_path )/sizeof((procfs_path)[0]), ((void)0))))))),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("xsprintf: " "procfs_path" "[] must be big enough" ), "../src/tmpfiles/tmpfiles.c", 1033, __PRETTY_FUNCTION__); } while (0); |
| 1034 | |
| 1035 | if (item->acl_access) |
| 1036 | r = path_set_acl(procfs_path, path, ACL_TYPE_ACCESS(0x8000), item->acl_access, item->force); |
| 1037 | |
| 1038 | if (r == 0 && item->acl_default) |
| 1039 | r = path_set_acl(procfs_path, path, ACL_TYPE_DEFAULT(0x4000), item->acl_default, item->force); |
| 1040 | |
| 1041 | if (r > 0) |
| 1042 | return -r; /* already warned */ |
| 1043 | if (r == -EOPNOTSUPP95) { |
| 1044 | log_debug_errno(r, "ACLs not supported by file system at %s", path)({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1044, __func__, "ACLs not supported by file system at %s" , path) : -abs(_e); }); |
| 1045 | return 0; |
| 1046 | } |
| 1047 | if (r < 0) |
| 1048 | return log_error_errno(r, "ACL operation on \"%s\" failed: %m", path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1048, __func__, "ACL operation on \"%s\" failed: %m" , path) : -abs(_e); }); |
| 1049 | #endif |
| 1050 | return r; |
| 1051 | } |
| 1052 | |
| 1053 | static int path_set_acls(Item *item, const char *path) { |
| 1054 | int r = 0; |
| 1055 | #ifdef HAVE_ACL1 |
| 1056 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1; |
| 1057 | struct stat st; |
| 1058 | |
| 1059 | assert(item)do { if ((__builtin_expect(!!(!(item)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("item"), "../src/tmpfiles/tmpfiles.c", 1059 , __PRETTY_FUNCTION__); } while (0); |
| 1060 | assert(path)do { if ((__builtin_expect(!!(!(path)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("path"), "../src/tmpfiles/tmpfiles.c", 1060 , __PRETTY_FUNCTION__); } while (0); |
| 1061 | |
| 1062 | fd = open(path, O_NOFOLLOW0400000|O_CLOEXEC02000000|O_PATH010000000); |
| 1063 | if (fd < 0) |
| 1064 | return log_error_errno(errno, "Adjusting ACL of %s failed: %m", path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1064, __func__ , "Adjusting ACL of %s failed: %m", path) : -abs(_e); }); |
| 1065 | |
| 1066 | if (fstat(fd, &st) < 0) |
| 1067 | return log_error_errno(errno, "Failed to fstat() file %s: %m", path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1067, __func__ , "Failed to fstat() file %s: %m", path) : -abs(_e); }); |
| 1068 | |
| 1069 | r = fd_set_acls(item, fd, &st); |
| 1070 | #endif |
| 1071 | return r; |
| 1072 | } |
| 1073 | |
| 1074 | #define ATTRIBUTES_ALL(0x00000080 | 0x00000008 | 0x00010000 | 0x00000020 | 0x00000004 | 0x00000040 | 0x00080000 | 0x00000010 | 0x00004000 | 0x00000001 | 0x00000002 | 0x00008000 | 0x00020000 | 0x00800000) \ |
| 1075 | (FS_NOATIME_FL0x00000080 | \ |
| 1076 | FS_SYNC_FL0x00000008 | \ |
| 1077 | FS_DIRSYNC_FL0x00010000 | \ |
| 1078 | FS_APPEND_FL0x00000020 | \ |
| 1079 | FS_COMPR_FL0x00000004 | \ |
| 1080 | FS_NODUMP_FL0x00000040 | \ |
| 1081 | FS_EXTENT_FL0x00080000 | \ |
| 1082 | FS_IMMUTABLE_FL0x00000010 | \ |
| 1083 | FS_JOURNAL_DATA_FL0x00004000 | \ |
| 1084 | FS_SECRM_FL0x00000001 | \ |
| 1085 | FS_UNRM_FL0x00000002 | \ |
| 1086 | FS_NOTAIL_FL0x00008000 | \ |
| 1087 | FS_TOPDIR_FL0x00020000 | \ |
| 1088 | FS_NOCOW_FL0x00800000) |
| 1089 | |
| 1090 | static int parse_attribute_from_arg(Item *item) { |
| 1091 | |
| 1092 | static const struct { |
| 1093 | char character; |
| 1094 | unsigned value; |
| 1095 | } attributes[] = { |
| 1096 | { 'A', FS_NOATIME_FL0x00000080 }, /* do not update atime */ |
| 1097 | { 'S', FS_SYNC_FL0x00000008 }, /* Synchronous updates */ |
| 1098 | { 'D', FS_DIRSYNC_FL0x00010000 }, /* dirsync behaviour (directories only) */ |
| 1099 | { 'a', FS_APPEND_FL0x00000020 }, /* writes to file may only append */ |
| 1100 | { 'c', FS_COMPR_FL0x00000004 }, /* Compress file */ |
| 1101 | { 'd', FS_NODUMP_FL0x00000040 }, /* do not dump file */ |
| 1102 | { 'e', FS_EXTENT_FL0x00080000 }, /* Extents */ |
| 1103 | { 'i', FS_IMMUTABLE_FL0x00000010 }, /* Immutable file */ |
| 1104 | { 'j', FS_JOURNAL_DATA_FL0x00004000 }, /* Reserved for ext3 */ |
| 1105 | { 's', FS_SECRM_FL0x00000001 }, /* Secure deletion */ |
| 1106 | { 'u', FS_UNRM_FL0x00000002 }, /* Undelete */ |
| 1107 | { 't', FS_NOTAIL_FL0x00008000 }, /* file tail should not be merged */ |
| 1108 | { 'T', FS_TOPDIR_FL0x00020000 }, /* Top of directory hierarchies */ |
| 1109 | { 'C', FS_NOCOW_FL0x00800000 }, /* Do not cow file */ |
| 1110 | }; |
| 1111 | |
| 1112 | enum { |
| 1113 | MODE_ADD, |
| 1114 | MODE_DEL, |
| 1115 | MODE_SET |
| 1116 | } mode = MODE_ADD; |
| 1117 | |
| 1118 | unsigned value = 0, mask = 0; |
| 1119 | const char *p; |
| 1120 | |
| 1121 | assert(item)do { if ((__builtin_expect(!!(!(item)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("item"), "../src/tmpfiles/tmpfiles.c", 1121 , __PRETTY_FUNCTION__); } while (0); |
| 1122 | |
| 1123 | p = item->argument; |
| 1124 | if (p) { |
| 1125 | if (*p == '+') { |
| 1126 | mode = MODE_ADD; |
| 1127 | p++; |
| 1128 | } else if (*p == '-') { |
| 1129 | mode = MODE_DEL; |
| 1130 | p++; |
| 1131 | } else if (*p == '=') { |
| 1132 | mode = MODE_SET; |
| 1133 | p++; |
| 1134 | } |
| 1135 | } |
| 1136 | |
| 1137 | if (isempty(p) && mode != MODE_SET) { |
| 1138 | log_error("Setting file attribute on '%s' needs an attribute specification.", item->path)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1138, __func__, "Setting file attribute on '%s' needs an attribute specification." , item->path) : -abs(_e); }); |
| 1139 | return -EINVAL22; |
| 1140 | } |
| 1141 | |
| 1142 | for (; p && *p ; p++) { |
| 1143 | unsigned i, v; |
| 1144 | |
| 1145 | for (i = 0; i < ELEMENTSOF(attributes)__extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(attributes), typeof(&*(attributes))), sizeof(attributes )/sizeof((attributes)[0]), ((void)0))); i++) |
| 1146 | if (*p == attributes[i].character) |
| 1147 | break; |
| 1148 | |
| 1149 | if (i >= ELEMENTSOF(attributes)__extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(attributes), typeof(&*(attributes))), sizeof(attributes )/sizeof((attributes)[0]), ((void)0)))) { |
| 1150 | log_error("Unknown file attribute '%c' on '%s'.", *p, item->path)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1150, __func__, "Unknown file attribute '%c' on '%s'." , *p, item->path) : -abs(_e); }); |
| 1151 | return -EINVAL22; |
| 1152 | } |
| 1153 | |
| 1154 | v = attributes[i].value; |
| 1155 | |
| 1156 | SET_FLAG(value, v, IN_SET(mode, MODE_ADD, MODE_SET))(value) = (({ _Bool _found = 0; static __attribute__ ((unused )) char _static_assert__macros_need_to_be_extended[20 - sizeof ((int[]){MODE_ADD, MODE_SET})/sizeof(int)]; switch(mode) { case MODE_ADD: case MODE_SET: _found = 1; break; default: break; } _found; })) ? ((value) | (v)) : ((value) & ~(v)); |
| 1157 | |
| 1158 | mask |= v; |
| 1159 | } |
| 1160 | |
| 1161 | if (mode == MODE_SET) |
| 1162 | mask |= ATTRIBUTES_ALL(0x00000080 | 0x00000008 | 0x00010000 | 0x00000020 | 0x00000004 | 0x00000040 | 0x00080000 | 0x00000010 | 0x00004000 | 0x00000001 | 0x00000002 | 0x00008000 | 0x00020000 | 0x00800000); |
| 1163 | |
| 1164 | assert(mask != 0)do { if ((__builtin_expect(!!(!(mask != 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("mask != 0"), "../src/tmpfiles/tmpfiles.c" , 1164, __PRETTY_FUNCTION__); } while (0); |
| 1165 | |
| 1166 | item->attribute_mask = mask; |
| 1167 | item->attribute_value = value; |
| 1168 | item->attribute_set = true1; |
| 1169 | |
| 1170 | return 0; |
| 1171 | } |
| 1172 | |
| 1173 | static int fd_set_attribute(Item *item, int fd, const struct stat *st) { |
| 1174 | _cleanup_close___attribute__((cleanup(closep))) int procfs_fd = -1; |
| 1175 | _cleanup_free___attribute__((cleanup(freep))) char *path = NULL((void*)0); |
| 1176 | unsigned f; |
| 1177 | int r; |
| 1178 | |
| 1179 | if (!item->attribute_set || item->attribute_mask == 0) |
| 1180 | return 0; |
| 1181 | |
| 1182 | r = fd_get_path(fd, &path); |
| 1183 | if (r < 0) |
| 1184 | return r; |
| 1185 | |
| 1186 | /* Issuing the file attribute ioctls on device nodes is not |
| 1187 | * safe, as that will be delivered to the drivers, not the |
| 1188 | * file system containing the device node. */ |
| 1189 | if (!S_ISREG(st->st_mode)((((st->st_mode)) & 0170000) == (0100000)) && !S_ISDIR(st->st_mode)((((st->st_mode)) & 0170000) == (0040000))) { |
| 1190 | log_error("Setting file flags is only supported on regular files and directories, cannot set on '%s'.", path)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1190, __func__, "Setting file flags is only supported on regular files and directories, cannot set on '%s'." , path) : -abs(_e); }); |
| 1191 | return -EINVAL22; |
| 1192 | } |
| 1193 | |
| 1194 | f = item->attribute_value & item->attribute_mask; |
| 1195 | |
| 1196 | /* Mask away directory-specific flags */ |
| 1197 | if (!S_ISDIR(st->st_mode)((((st->st_mode)) & 0170000) == (0040000))) |
| 1198 | f &= ~FS_DIRSYNC_FL0x00010000; |
| 1199 | |
| 1200 | procfs_fd = fd_reopen(fd, O_RDONLY00|O_CLOEXEC02000000|O_NOATIME01000000); |
| 1201 | if (procfs_fd < 0) |
| 1202 | return -errno(*__errno_location ()); |
| 1203 | |
| 1204 | r = chattr_fd(procfs_fd, f, item->attribute_mask); |
| 1205 | if (r < 0) |
| 1206 | log_full_errno(IN_SET(r, -ENOTTY, -EOPNOTSUPP) ? LOG_DEBUG : LOG_WARNING,({ int _level = ((({ _Bool _found = 0; static __attribute__ ( (unused)) char _static_assert__macros_need_to_be_extended[20 - sizeof((int[]){-25, -95})/sizeof(int)]; switch(r) { case -25 : case -95: _found = 1; break; default: break; } _found; }) ? 7 : 4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c" , 1209, __func__, "Cannot set file attribute for '%s', value=0x%08x, mask=0x%08x: %m" , path, item->attribute_value, item->attribute_mask) : - abs(_e); }) |
| 1207 | r,({ int _level = ((({ _Bool _found = 0; static __attribute__ ( (unused)) char _static_assert__macros_need_to_be_extended[20 - sizeof((int[]){-25, -95})/sizeof(int)]; switch(r) { case -25 : case -95: _found = 1; break; default: break; } _found; }) ? 7 : 4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c" , 1209, __func__, "Cannot set file attribute for '%s', value=0x%08x, mask=0x%08x: %m" , path, item->attribute_value, item->attribute_mask) : - abs(_e); }) |
| 1208 | "Cannot set file attribute for '%s', value=0x%08x, mask=0x%08x: %m",({ int _level = ((({ _Bool _found = 0; static __attribute__ ( (unused)) char _static_assert__macros_need_to_be_extended[20 - sizeof((int[]){-25, -95})/sizeof(int)]; switch(r) { case -25 : case -95: _found = 1; break; default: break; } _found; }) ? 7 : 4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c" , 1209, __func__, "Cannot set file attribute for '%s', value=0x%08x, mask=0x%08x: %m" , path, item->attribute_value, item->attribute_mask) : - abs(_e); }) |
| 1209 | path, item->attribute_value, item->attribute_mask)({ int _level = ((({ _Bool _found = 0; static __attribute__ ( (unused)) char _static_assert__macros_need_to_be_extended[20 - sizeof((int[]){-25, -95})/sizeof(int)]; switch(r) { case -25 : case -95: _found = 1; break; default: break; } _found; }) ? 7 : 4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c" , 1209, __func__, "Cannot set file attribute for '%s', value=0x%08x, mask=0x%08x: %m" , path, item->attribute_value, item->attribute_mask) : - abs(_e); }); |
| 1210 | |
| 1211 | return 0; |
| 1212 | } |
| 1213 | |
| 1214 | static int path_set_attribute(Item *item, const char *path) { |
| 1215 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1; |
| 1216 | struct stat st; |
| 1217 | |
| 1218 | if (!item->attribute_set || item->attribute_mask == 0) |
| 1219 | return 0; |
| 1220 | |
| 1221 | fd = open(path, O_CLOEXEC02000000|O_NOFOLLOW0400000|O_PATH010000000); |
| 1222 | if (fd < 0) |
| 1223 | return log_error_errno(errno, "Cannot open '%s': %m", path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1223, __func__ , "Cannot open '%s': %m", path) : -abs(_e); }); |
| 1224 | |
| 1225 | if (fstat(fd, &st) < 0) |
| 1226 | return log_error_errno(errno, "Cannot stat '%s': %m", path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1226, __func__ , "Cannot stat '%s': %m", path) : -abs(_e); }); |
| 1227 | |
| 1228 | return fd_set_attribute(item, fd, &st); |
| 1229 | } |
| 1230 | |
| 1231 | static int write_one_file(Item *i, const char *path) { |
| 1232 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1; |
| 1233 | int flags, r = 0; |
| 1234 | struct stat st; |
| 1235 | |
| 1236 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 1236 , __PRETTY_FUNCTION__); } while (0); |
| 1237 | assert(path)do { if ((__builtin_expect(!!(!(path)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("path"), "../src/tmpfiles/tmpfiles.c", 1237 , __PRETTY_FUNCTION__); } while (0); |
| 1238 | |
| 1239 | flags = i->type == CREATE_FILE ? O_CREAT0100|O_EXCL0200|O_NOFOLLOW0400000 : |
| 1240 | i->type == TRUNCATE_FILE ? O_CREAT0100|O_TRUNC01000|O_NOFOLLOW0400000 : 0; |
| 1241 | |
| 1242 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) { |
| 1243 | mac_selinux_create_file_prepare(path, S_IFREG0100000); |
| 1244 | fd = open(path, flags|O_NONBLOCK04000|O_CLOEXEC02000000|O_WRONLY01|O_NOCTTY0400, i->mode); |
| 1245 | mac_selinux_create_file_clear(); |
| 1246 | } |
| 1247 | |
| 1248 | if (fd < 0) { |
| 1249 | if (i->type == WRITE_FILE && errno(*__errno_location ()) == ENOENT2) { |
| 1250 | log_debug_errno(errno, "Not writing missing file \"%s\": %m", path)({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1250, __func__ , "Not writing missing file \"%s\": %m", path) : -abs(_e); }); |
| 1251 | return 0; |
| 1252 | } |
| 1253 | if (i->type == CREATE_FILE && errno(*__errno_location ()) == EEXIST17) { |
| 1254 | log_debug_errno(errno, "Not writing to pre-existing file \"%s\": %m", path)({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1254, __func__ , "Not writing to pre-existing file \"%s\": %m", path) : -abs (_e); }); |
| 1255 | goto done; |
| 1256 | } |
| 1257 | |
| 1258 | r = -errno(*__errno_location ()); |
| 1259 | if (!i->argument && errno(*__errno_location ()) == EROFS30 && stat(path, &st) == 0 && |
| 1260 | (i->type == CREATE_FILE || st.st_size == 0)) |
| 1261 | goto check_mode; |
| 1262 | |
| 1263 | return log_error_errno(r, "Failed to create file %s: %m", path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1263, __func__, "Failed to create file %s: %m" , path) : -abs(_e); }); |
| 1264 | } |
| 1265 | |
| 1266 | if (i->argument) { |
| 1267 | log_debug("%s to \"%s\".", i->type == CREATE_FILE ? "Appending" : "Writing", path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1267, __func__, "%s to \"%s\"." , i->type == CREATE_FILE ? "Appending" : "Writing", path) : -abs(_e); }); |
| 1268 | |
| 1269 | r = loop_write(fd, i->argument, strlen(i->argument), false0); |
| 1270 | if (r < 0) |
| 1271 | return log_error_errno(r, "Failed to write file \"%s\": %m", path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1271, __func__, "Failed to write file \"%s\": %m" , path) : -abs(_e); }); |
| 1272 | } else |
| 1273 | log_debug("\"%s\" has been created.", path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1273, __func__, "\"%s\" has been created." , path) : -abs(_e); }); |
| 1274 | |
| 1275 | fd = safe_close(fd); |
Value stored to 'fd' is never read | |
| 1276 | |
| 1277 | done: |
| 1278 | if (stat(path, &st) < 0) |
| 1279 | return log_error_errno(errno, "stat(%s) failed: %m", path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1279, __func__ , "stat(%s) failed: %m", path) : -abs(_e); }); |
| 1280 | |
| 1281 | check_mode: |
| 1282 | if (!S_ISREG(st.st_mode)((((st.st_mode)) & 0170000) == (0100000))) { |
| 1283 | log_error("%s is not a file.", path)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1283, __func__, "%s is not a file." , path) : -abs(_e); }); |
| 1284 | return -EEXIST17; |
| 1285 | } |
| 1286 | |
| 1287 | r = path_set_perms(i, path); |
| 1288 | if (r < 0) |
| 1289 | return r; |
| 1290 | |
| 1291 | return 0; |
| 1292 | } |
| 1293 | |
| 1294 | typedef int (*action_t)(Item *, const char *); |
| 1295 | typedef int (*fdaction_t)(Item *, int fd, const struct stat *st); |
| 1296 | |
| 1297 | static int item_do(Item *i, int fd, const struct stat *st, fdaction_t action) { |
| 1298 | int r = 0, q; |
| 1299 | |
| 1300 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 1300 , __PRETTY_FUNCTION__); } while (0); |
| 1301 | assert(fd >= 0)do { if ((__builtin_expect(!!(!(fd >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fd >= 0"), "../src/tmpfiles/tmpfiles.c" , 1301, __PRETTY_FUNCTION__); } while (0); |
| 1302 | assert(st)do { if ((__builtin_expect(!!(!(st)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("st"), "../src/tmpfiles/tmpfiles.c", 1302 , __PRETTY_FUNCTION__); } while (0); |
| 1303 | |
| 1304 | /* This returns the first error we run into, but nevertheless |
| 1305 | * tries to go on */ |
| 1306 | r = action(i, fd, st); |
| 1307 | |
| 1308 | if (S_ISDIR(st->st_mode)((((st->st_mode)) & 0170000) == (0040000))) { |
| 1309 | char procfs_path[STRLEN("/proc/self/fd/")(sizeof("""/proc/self/fd/""") - 1) + DECIMAL_STR_MAX(int)(2+(sizeof(int) <= 1 ? 3 : sizeof(int) <= 2 ? 5 : sizeof (int) <= 4 ? 10 : sizeof(int) <= 8 ? 20 : sizeof(int[-2 *(sizeof(int) > 8)])))]; |
| 1310 | _cleanup_closedir___attribute__((cleanup(closedirp))) DIR *d = NULL((void*)0); |
| 1311 | struct dirent *de; |
| 1312 | |
| 1313 | /* The passed 'fd' was opened with O_PATH. We need to convert |
| 1314 | * it into a 'regular' fd before reading the directory content. */ |
| 1315 | xsprintf(procfs_path, "/proc/self/fd/%i", fd)do { if ((__builtin_expect(!!(!(((size_t) snprintf(procfs_path , __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(procfs_path), typeof(&*(procfs_path))), sizeof(procfs_path )/sizeof((procfs_path)[0]), ((void)0))), "/proc/self/fd/%i", fd ) < (__extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(procfs_path), typeof(&*(procfs_path))), sizeof(procfs_path )/sizeof((procfs_path)[0]), ((void)0))))))),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("xsprintf: " "procfs_path" "[] must be big enough" ), "../src/tmpfiles/tmpfiles.c", 1315, __PRETTY_FUNCTION__); } while (0); |
| 1316 | |
| 1317 | d = opendir(procfs_path); |
| 1318 | if (!d) { |
| 1319 | r = r ?: -errno(*__errno_location ()); |
| 1320 | goto finish; |
| 1321 | } |
| 1322 | |
| 1323 | FOREACH_DIRENT_ALL(de, d, q = -errno; goto finish)for ((*__errno_location ()) = 0, de = readdir(d);; (*__errno_location ()) = 0, de = readdir(d)) if (!de) { if ((*__errno_location ( )) > 0) { q = -(*__errno_location ()); goto finish; } break ; } else { |
| 1324 | struct stat de_st; |
| 1325 | int de_fd; |
| 1326 | |
| 1327 | if (dot_or_dot_dot(de->d_name)) |
| 1328 | continue; |
| 1329 | |
| 1330 | de_fd = openat(fd, de->d_name, O_NOFOLLOW0400000|O_CLOEXEC02000000|O_PATH010000000); |
| 1331 | if (de_fd >= 0 && fstat(de_fd, &de_st) >= 0) |
| 1332 | /* pass ownership of dirent fd over */ |
| 1333 | q = item_do(i, de_fd, &de_st, action); |
| 1334 | else |
| 1335 | q = -errno(*__errno_location ()); |
| 1336 | |
| 1337 | if (q < 0 && r == 0) |
| 1338 | r = q; |
| 1339 | } |
| 1340 | } |
| 1341 | finish: |
| 1342 | safe_close(fd); |
| 1343 | return r; |
| 1344 | } |
| 1345 | |
| 1346 | static int glob_item(Item *i, action_t action) { |
| 1347 | _cleanup_globfree___attribute__((cleanup(globfree))) glob_t g = { |
| 1348 | .gl_opendir = (void *(*)(const char *)) opendir_nomod, |
| 1349 | }; |
| 1350 | int r = 0, k; |
| 1351 | char **fn; |
| 1352 | |
| 1353 | k = safe_glob(i->path, GLOB_NOSORT(1 << 2)|GLOB_BRACE(1 << 10), &g); |
| 1354 | if (k < 0 && k != -ENOENT2) |
| 1355 | return log_error_errno(k, "glob(%s) failed: %m", i->path)({ int _level = ((3)), _e = ((k)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1355, __func__, "glob(%s) failed: %m" , i->path) : -abs(_e); }); |
| 1356 | |
| 1357 | STRV_FOREACH(fn, g.gl_pathv)for ((fn) = (g.gl_pathv); (fn) && *(fn); (fn)++) { |
| 1358 | k = action(i, *fn); |
| 1359 | if (k < 0 && r == 0) |
| 1360 | r = k; |
| 1361 | } |
| 1362 | |
| 1363 | return r; |
| 1364 | } |
| 1365 | |
| 1366 | static int glob_item_recursively(Item *i, fdaction_t action) { |
| 1367 | _cleanup_globfree___attribute__((cleanup(globfree))) glob_t g = { |
| 1368 | .gl_opendir = (void *(*)(const char *)) opendir_nomod, |
| 1369 | }; |
| 1370 | int r = 0, k; |
| 1371 | char **fn; |
| 1372 | |
| 1373 | k = safe_glob(i->path, GLOB_NOSORT(1 << 2)|GLOB_BRACE(1 << 10), &g); |
| 1374 | if (k < 0 && k != -ENOENT2) |
| 1375 | return log_error_errno(k, "glob(%s) failed: %m", i->path)({ int _level = ((3)), _e = ((k)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1375, __func__, "glob(%s) failed: %m" , i->path) : -abs(_e); }); |
| 1376 | |
| 1377 | STRV_FOREACH(fn, g.gl_pathv)for ((fn) = (g.gl_pathv); (fn) && *(fn); (fn)++) { |
| 1378 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1; |
| 1379 | struct stat st; |
| 1380 | |
| 1381 | /* Make sure we won't trigger/follow file object (such as |
| 1382 | * device nodes, automounts, ...) pointed out by 'fn' with |
| 1383 | * O_PATH. Note, when O_PATH is used, flags other than |
| 1384 | * O_CLOEXEC, O_DIRECTORY, and O_NOFOLLOW are ignored. */ |
| 1385 | |
| 1386 | fd = open(*fn, O_CLOEXEC02000000|O_NOFOLLOW0400000|O_PATH010000000); |
| 1387 | if (fd < 0) { |
| 1388 | r = r ?: -errno(*__errno_location ()); |
| 1389 | continue; |
| 1390 | } |
| 1391 | |
| 1392 | if (fstat(fd, &st) < 0) { |
| 1393 | r = r ?: -errno(*__errno_location ()); |
| 1394 | continue; |
| 1395 | } |
| 1396 | |
| 1397 | k = item_do(i, fd, &st, action); |
| 1398 | if (k < 0 && r == 0) |
| 1399 | r = k; |
| 1400 | |
| 1401 | /* we passed fd ownership to the previous call */ |
| 1402 | fd = -1; |
| 1403 | } |
| 1404 | |
| 1405 | return r; |
| 1406 | } |
| 1407 | |
| 1408 | typedef enum { |
| 1409 | CREATION_NORMAL, |
| 1410 | CREATION_EXISTING, |
| 1411 | CREATION_FORCE, |
| 1412 | _CREATION_MODE_MAX, |
| 1413 | _CREATION_MODE_INVALID = -1 |
| 1414 | } CreationMode; |
| 1415 | |
| 1416 | static const char *creation_mode_verb_table[_CREATION_MODE_MAX] = { |
| 1417 | [CREATION_NORMAL] = "Created", |
| 1418 | [CREATION_EXISTING] = "Found existing", |
| 1419 | [CREATION_FORCE] = "Created replacement", |
| 1420 | }; |
| 1421 | |
| 1422 | DEFINE_PRIVATE_STRING_TABLE_LOOKUP_TO_STRING(creation_mode_verb, CreationMode)static const char *creation_mode_verb_to_string(CreationMode i ) { if (i < 0 || i >= (CreationMode) __extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(creation_mode_verb_table ), typeof(&*(creation_mode_verb_table))), sizeof(creation_mode_verb_table )/sizeof((creation_mode_verb_table)[0]), ((void)0)))) return ( (void*)0); return creation_mode_verb_table[i]; }; |
| 1423 | |
| 1424 | static int create_item(Item *i) { |
| 1425 | struct stat st; |
| 1426 | int r = 0; |
| 1427 | int q = 0; |
| 1428 | CreationMode creation; |
| 1429 | |
| 1430 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 1430 , __PRETTY_FUNCTION__); } while (0); |
| 1431 | |
| 1432 | log_debug("Running create action for entry %c %s", (char) i->type, i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1432, __func__, "Running create action for entry %c %s" , (char) i->type, i->path) : -abs(_e); }); |
| 1433 | |
| 1434 | switch (i->type) { |
| 1435 | |
| 1436 | case IGNORE_PATH: |
| 1437 | case IGNORE_DIRECTORY_PATH: |
| 1438 | case REMOVE_PATH: |
| 1439 | case RECURSIVE_REMOVE_PATH: |
| 1440 | return 0; |
| 1441 | |
| 1442 | case CREATE_FILE: |
| 1443 | case TRUNCATE_FILE: |
| 1444 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) |
| 1445 | (void) mkdir_parents_label(i->path, 0755); |
| 1446 | |
| 1447 | r = write_one_file(i, i->path); |
| 1448 | if (r < 0) |
| 1449 | return r; |
| 1450 | break; |
| 1451 | |
| 1452 | case COPY_FILES: |
| 1453 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) |
| 1454 | (void) mkdir_parents_label(i->path, 0755); |
| 1455 | |
| 1456 | log_debug("Copying tree \"%s\" to \"%s\".", i->argument, i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1456, __func__, "Copying tree \"%s\" to \"%s\"." , i->argument, i->path) : -abs(_e); }); |
| 1457 | r = copy_tree(i->argument, i->path, |
| 1458 | i->uid_set ? i->uid : UID_INVALID((uid_t) -1), |
| 1459 | i->gid_set ? i->gid : GID_INVALID((gid_t) -1), |
| 1460 | COPY_REFLINK); |
| 1461 | |
| 1462 | if (r == -EROFS30 && stat(i->path, &st) == 0) |
| 1463 | r = -EEXIST17; |
| 1464 | |
| 1465 | if (r < 0) { |
| 1466 | struct stat a, b; |
| 1467 | |
| 1468 | if (r != -EEXIST17) |
| 1469 | return log_error_errno(r, "Failed to copy files to %s: %m", i->path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1469, __func__, "Failed to copy files to %s: %m" , i->path) : -abs(_e); }); |
| 1470 | |
| 1471 | if (stat(i->argument, &a) < 0) |
| 1472 | return log_error_errno(errno, "stat(%s) failed: %m", i->argument)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1472, __func__ , "stat(%s) failed: %m", i->argument) : -abs(_e); }); |
| 1473 | |
| 1474 | if (stat(i->path, &b) < 0) |
| 1475 | return log_error_errno(errno, "stat(%s) failed: %m", i->path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1475, __func__ , "stat(%s) failed: %m", i->path) : -abs(_e); }); |
| 1476 | |
| 1477 | if ((a.st_mode ^ b.st_mode) & S_IFMT0170000) { |
| 1478 | log_debug("Can't copy to %s, file exists already and is of different type", i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1478, __func__, "Can't copy to %s, file exists already and is of different type" , i->path) : -abs(_e); }); |
| 1479 | return 0; |
| 1480 | } |
| 1481 | } |
| 1482 | |
| 1483 | r = path_set_perms(i, i->path); |
| 1484 | if (r < 0) |
| 1485 | return r; |
| 1486 | |
| 1487 | break; |
| 1488 | |
| 1489 | case WRITE_FILE: |
| 1490 | r = glob_item(i, write_one_file); |
| 1491 | if (r < 0) |
| 1492 | return r; |
| 1493 | |
| 1494 | break; |
| 1495 | |
| 1496 | case CREATE_DIRECTORY: |
| 1497 | case TRUNCATE_DIRECTORY: |
| 1498 | case CREATE_SUBVOLUME: |
| 1499 | case CREATE_SUBVOLUME_INHERIT_QUOTA: |
| 1500 | case CREATE_SUBVOLUME_NEW_QUOTA: |
| 1501 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) |
| 1502 | (void) mkdir_parents_label(i->path, 0755); |
| 1503 | |
| 1504 | if (IN_SET(i->type, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA, CREATE_SUBVOLUME_NEW_QUOTA)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA , CREATE_SUBVOLUME_NEW_QUOTA})/sizeof(int)]; switch(i->type ) { case CREATE_SUBVOLUME: case CREATE_SUBVOLUME_INHERIT_QUOTA : case CREATE_SUBVOLUME_NEW_QUOTA: _found = 1; break; default : break; } _found; })) { |
| 1505 | |
| 1506 | if (btrfs_is_subvol(empty_to_root(arg_root)) <= 0) |
| 1507 | |
| 1508 | /* Don't create a subvolume unless the |
| 1509 | * root directory is one, too. We do |
| 1510 | * this under the assumption that if |
| 1511 | * the root directory is just a plain |
| 1512 | * directory (i.e. very light-weight), |
| 1513 | * we shouldn't try to split it up |
| 1514 | * into subvolumes (i.e. more |
| 1515 | * heavy-weight). Thus, chroot() |
| 1516 | * environments and suchlike will get |
| 1517 | * a full brtfs subvolume set up below |
| 1518 | * their tree only if they |
| 1519 | * specifically set up a btrfs |
| 1520 | * subvolume for the root dir too. */ |
| 1521 | |
| 1522 | r = -ENOTTY25; |
| 1523 | else { |
| 1524 | RUN_WITH_UMASK((~i->mode) & 0777)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask((~i->mode) & 0777), 0 }; !_saved_umask_ .quit ; _saved_umask_.quit = 1) |
| 1525 | r = btrfs_subvol_make(i->path); |
| 1526 | } |
| 1527 | } else |
| 1528 | r = 0; |
| 1529 | |
| 1530 | if (IN_SET(i->type, CREATE_DIRECTORY, TRUNCATE_DIRECTORY)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_DIRECTORY, TRUNCATE_DIRECTORY})/sizeof (int)]; switch(i->type) { case CREATE_DIRECTORY: case TRUNCATE_DIRECTORY : _found = 1; break; default: break; } _found; }) || r == -ENOTTY25) |
| 1531 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) |
| 1532 | r = mkdir_label(i->path, i->mode); |
| 1533 | |
| 1534 | if (r < 0) { |
| 1535 | int k; |
| 1536 | |
| 1537 | if (!IN_SET(r, -EEXIST, -EROFS)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-17, -30})/sizeof(int)]; switch(r) { case -17: case -30: _found = 1; break; default: break; } _found; } )) |
| 1538 | return log_error_errno(r, "Failed to create directory or subvolume \"%s\": %m", i->path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1538, __func__, "Failed to create directory or subvolume \"%s\": %m" , i->path) : -abs(_e); }); |
| 1539 | |
| 1540 | k = is_dir(i->path, false0); |
| 1541 | if (k == -ENOENT2 && r == -EROFS30) |
| 1542 | return log_error_errno(r, "%s does not exist and cannot be created as the file system is read-only.", i->path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1542, __func__, "%s does not exist and cannot be created as the file system is read-only." , i->path) : -abs(_e); }); |
| 1543 | if (k < 0) |
| 1544 | return log_error_errno(k, "Failed to check if %s exists: %m", i->path)({ int _level = ((3)), _e = ((k)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1544, __func__, "Failed to check if %s exists: %m" , i->path) : -abs(_e); }); |
| 1545 | if (!k) { |
| 1546 | log_warning("\"%s\" already exists and is not a directory.", i->path)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1546, __func__, "\"%s\" already exists and is not a directory." , i->path) : -abs(_e); }); |
| 1547 | return 0; |
| 1548 | } |
| 1549 | |
| 1550 | creation = CREATION_EXISTING; |
| 1551 | } else |
| 1552 | creation = CREATION_NORMAL; |
| 1553 | |
| 1554 | log_debug("%s directory \"%s\".", creation_mode_verb_to_string(creation), i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1554, __func__, "%s directory \"%s\"." , creation_mode_verb_to_string(creation), i->path) : -abs( _e); }); |
| 1555 | |
| 1556 | if (IN_SET(i->type, CREATE_SUBVOLUME_NEW_QUOTA, CREATE_SUBVOLUME_INHERIT_QUOTA)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_SUBVOLUME_NEW_QUOTA, CREATE_SUBVOLUME_INHERIT_QUOTA })/sizeof(int)]; switch(i->type) { case CREATE_SUBVOLUME_NEW_QUOTA : case CREATE_SUBVOLUME_INHERIT_QUOTA: _found = 1; break; default : break; } _found; })) { |
| 1557 | r = btrfs_subvol_auto_qgroup(i->path, 0, i->type == CREATE_SUBVOLUME_NEW_QUOTA); |
| 1558 | if (r == -ENOTTY25) |
| 1559 | log_debug_errno(r, "Couldn't adjust quota for subvolume \"%s\" (unsupported fs or dir not a subvolume): %m", i->path)({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1559, __func__, "Couldn't adjust quota for subvolume \"%s\" (unsupported fs or dir not a subvolume): %m" , i->path) : -abs(_e); }); |
| 1560 | else if (r == -EROFS30) |
| 1561 | log_debug_errno(r, "Couldn't adjust quota for subvolume \"%s\" (fs is read-only).", i->path)({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1561, __func__, "Couldn't adjust quota for subvolume \"%s\" (fs is read-only)." , i->path) : -abs(_e); }); |
| 1562 | else if (r == -ENOPROTOOPT92) |
| 1563 | log_debug_errno(r, "Couldn't adjust quota for subvolume \"%s\" (quota support is disabled).", i->path)({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1563, __func__, "Couldn't adjust quota for subvolume \"%s\" (quota support is disabled)." , i->path) : -abs(_e); }); |
| 1564 | else if (r < 0) |
| 1565 | q = log_error_errno(r, "Failed to adjust quota for subvolume \"%s\": %m", i->path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1565, __func__, "Failed to adjust quota for subvolume \"%s\": %m" , i->path) : -abs(_e); }); |
| 1566 | else if (r > 0) |
| 1567 | log_debug("Adjusted quota for subvolume \"%s\".", i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1567, __func__, "Adjusted quota for subvolume \"%s\"." , i->path) : -abs(_e); }); |
| 1568 | else if (r == 0) |
| 1569 | log_debug("Quota for subvolume \"%s\" already in place, no change made.", i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1569, __func__, "Quota for subvolume \"%s\" already in place, no change made." , i->path) : -abs(_e); }); |
| 1570 | } |
| 1571 | |
| 1572 | _fallthrough_; |
| 1573 | case EMPTY_DIRECTORY: |
| 1574 | r = glob_item(i, path_set_perms); |
| 1575 | if (q < 0) |
| 1576 | return q; |
| 1577 | if (r < 0) |
| 1578 | return r; |
| 1579 | |
| 1580 | break; |
| 1581 | |
| 1582 | case CREATE_FIFO: |
| 1583 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) { |
| 1584 | (void) mkdir_parents_label(i->path, 0755); |
| 1585 | |
| 1586 | mac_selinux_create_file_prepare(i->path, S_IFIFO0010000); |
| 1587 | r = mkfifo(i->path, i->mode); |
| 1588 | mac_selinux_create_file_clear(); |
| 1589 | } |
| 1590 | |
| 1591 | if (r < 0) { |
| 1592 | if (errno(*__errno_location ()) != EEXIST17) |
| 1593 | return log_error_errno(errno, "Failed to create fifo %s: %m", i->path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1593, __func__ , "Failed to create fifo %s: %m", i->path) : -abs(_e); }); |
| 1594 | |
| 1595 | if (lstat(i->path, &st) < 0) |
| 1596 | return log_error_errno(errno, "stat(%s) failed: %m", i->path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1596, __func__ , "stat(%s) failed: %m", i->path) : -abs(_e); }); |
| 1597 | |
| 1598 | if (!S_ISFIFO(st.st_mode)((((st.st_mode)) & 0170000) == (0010000))) { |
| 1599 | |
| 1600 | if (i->force) { |
| 1601 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) { |
| 1602 | mac_selinux_create_file_prepare(i->path, S_IFIFO0010000); |
| 1603 | r = mkfifo_atomic(i->path, i->mode); |
| 1604 | mac_selinux_create_file_clear(); |
| 1605 | } |
| 1606 | |
| 1607 | if (r < 0) |
| 1608 | return log_error_errno(r, "Failed to create fifo %s: %m", i->path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1608, __func__, "Failed to create fifo %s: %m" , i->path) : -abs(_e); }); |
| 1609 | creation = CREATION_FORCE; |
| 1610 | } else { |
| 1611 | log_warning("\"%s\" already exists and is not a fifo.", i->path)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1611, __func__, "\"%s\" already exists and is not a fifo." , i->path) : -abs(_e); }); |
| 1612 | return 0; |
| 1613 | } |
| 1614 | } else |
| 1615 | creation = CREATION_EXISTING; |
| 1616 | } else |
| 1617 | creation = CREATION_NORMAL; |
| 1618 | log_debug("%s fifo \"%s\".", creation_mode_verb_to_string(creation), i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1618, __func__, "%s fifo \"%s\"." , creation_mode_verb_to_string(creation), i->path) : -abs( _e); }); |
| 1619 | |
| 1620 | r = path_set_perms(i, i->path); |
| 1621 | if (r < 0) |
| 1622 | return r; |
| 1623 | |
| 1624 | break; |
| 1625 | |
| 1626 | case CREATE_SYMLINK: { |
| 1627 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) |
| 1628 | (void) mkdir_parents_label(i->path, 0755); |
| 1629 | |
| 1630 | mac_selinux_create_file_prepare(i->path, S_IFLNK0120000); |
| 1631 | r = symlink(i->argument, i->path); |
| 1632 | mac_selinux_create_file_clear(); |
| 1633 | |
| 1634 | if (r < 0) { |
| 1635 | _cleanup_free___attribute__((cleanup(freep))) char *x = NULL((void*)0); |
| 1636 | |
| 1637 | if (errno(*__errno_location ()) != EEXIST17) |
| 1638 | return log_error_errno(errno, "symlink(%s, %s) failed: %m", i->argument, i->path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1638, __func__ , "symlink(%s, %s) failed: %m", i->argument, i->path) : -abs(_e); }); |
| 1639 | |
| 1640 | r = readlink_malloc(i->path, &x); |
| 1641 | if (r < 0 || !streq(i->argument, x)(strcmp((i->argument),(x)) == 0)) { |
| 1642 | |
| 1643 | if (i->force) { |
| 1644 | mac_selinux_create_file_prepare(i->path, S_IFLNK0120000); |
| 1645 | r = symlink_atomic(i->argument, i->path); |
| 1646 | mac_selinux_create_file_clear(); |
| 1647 | |
| 1648 | if (IN_SET(r, -EISDIR, -EEXIST, -ENOTEMPTY)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-21, -17, -39})/sizeof(int)]; switch(r) { case -21: case -17: case -39: _found = 1; break; default: break ; } _found; })) { |
| 1649 | r = rm_rf(i->path, REMOVE_ROOT|REMOVE_PHYSICAL); |
| 1650 | if (r < 0) |
| 1651 | return log_error_errno(r, "rm -fr %s failed: %m", i->path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1651, __func__, "rm -fr %s failed: %m" , i->path) : -abs(_e); }); |
| 1652 | |
| 1653 | mac_selinux_create_file_prepare(i->path, S_IFLNK0120000); |
| 1654 | r = symlink(i->argument, i->path) < 0 ? -errno(*__errno_location ()) : 0; |
| 1655 | mac_selinux_create_file_clear(); |
| 1656 | } |
| 1657 | if (r < 0) |
| 1658 | return log_error_errno(r, "symlink(%s, %s) failed: %m", i->argument, i->path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1658, __func__, "symlink(%s, %s) failed: %m" , i->argument, i->path) : -abs(_e); }); |
| 1659 | |
| 1660 | creation = CREATION_FORCE; |
| 1661 | } else { |
| 1662 | log_debug("\"%s\" is not a symlink or does not point to the correct path.", i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1662, __func__, "\"%s\" is not a symlink or does not point to the correct path." , i->path) : -abs(_e); }); |
| 1663 | return 0; |
| 1664 | } |
| 1665 | } else |
| 1666 | creation = CREATION_EXISTING; |
| 1667 | } else |
| 1668 | |
| 1669 | creation = CREATION_NORMAL; |
| 1670 | log_debug("%s symlink \"%s\".", creation_mode_verb_to_string(creation), i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1670, __func__, "%s symlink \"%s\"." , creation_mode_verb_to_string(creation), i->path) : -abs( _e); }); |
| 1671 | break; |
| 1672 | } |
| 1673 | |
| 1674 | case CREATE_BLOCK_DEVICE: |
| 1675 | case CREATE_CHAR_DEVICE: { |
| 1676 | mode_t file_type; |
| 1677 | |
| 1678 | if (have_effective_cap(CAP_MKNOD27) == 0) { |
| 1679 | /* In a container we lack CAP_MKNOD. We |
| 1680 | shouldn't attempt to create the device node in |
| 1681 | that case to avoid noise, and we don't support |
| 1682 | virtualized devices in containers anyway. */ |
| 1683 | |
| 1684 | log_debug("We lack CAP_MKNOD, skipping creation of device node %s.", i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1684, __func__, "We lack CAP_MKNOD, skipping creation of device node %s." , i->path) : -abs(_e); }); |
| 1685 | return 0; |
| 1686 | } |
| 1687 | |
| 1688 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) |
| 1689 | (void) mkdir_parents_label(i->path, 0755); |
| 1690 | |
| 1691 | file_type = i->type == CREATE_BLOCK_DEVICE ? S_IFBLK0060000 : S_IFCHR0020000; |
| 1692 | |
| 1693 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) { |
| 1694 | mac_selinux_create_file_prepare(i->path, file_type); |
| 1695 | r = mknod(i->path, i->mode | file_type, i->major_minor); |
| 1696 | mac_selinux_create_file_clear(); |
| 1697 | } |
| 1698 | |
| 1699 | if (r < 0) { |
| 1700 | if (errno(*__errno_location ()) == EPERM1) { |
| 1701 | log_debug("We lack permissions, possibly because of cgroup configuration; "({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1702, __func__, "We lack permissions, possibly because of cgroup configuration; " "skipping creation of device node %s.", i->path) : -abs(_e ); }) |
| 1702 | "skipping creation of device node %s.", i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1702, __func__, "We lack permissions, possibly because of cgroup configuration; " "skipping creation of device node %s.", i->path) : -abs(_e ); }); |
| 1703 | return 0; |
| 1704 | } |
| 1705 | |
| 1706 | if (errno(*__errno_location ()) != EEXIST17) |
| 1707 | return log_error_errno(errno, "Failed to create device node %s: %m", i->path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1707, __func__ , "Failed to create device node %s: %m", i->path) : -abs(_e ); }); |
| 1708 | |
| 1709 | if (lstat(i->path, &st) < 0) |
| 1710 | return log_error_errno(errno, "stat(%s) failed: %m", i->path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1710, __func__ , "stat(%s) failed: %m", i->path) : -abs(_e); }); |
| 1711 | |
| 1712 | if ((st.st_mode & S_IFMT0170000) != file_type) { |
| 1713 | |
| 1714 | if (i->force) { |
| 1715 | |
| 1716 | RUN_WITH_UMASK(0000)for (__attribute__((cleanup(_reset_umask_))) struct _umask_struct_ _saved_umask_ = { umask(0000), 0 }; !_saved_umask_.quit ; _saved_umask_ .quit = 1) { |
| 1717 | mac_selinux_create_file_prepare(i->path, file_type); |
| 1718 | r = mknod_atomic(i->path, i->mode | file_type, i->major_minor); |
| 1719 | mac_selinux_create_file_clear(); |
| 1720 | } |
| 1721 | |
| 1722 | if (r < 0) |
| 1723 | return log_error_errno(r, "Failed to create device node \"%s\": %m", i->path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1723, __func__, "Failed to create device node \"%s\": %m" , i->path) : -abs(_e); }); |
| 1724 | creation = CREATION_FORCE; |
| 1725 | } else { |
| 1726 | log_debug("%s is not a device node.", i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1726, __func__, "%s is not a device node." , i->path) : -abs(_e); }); |
| 1727 | return 0; |
| 1728 | } |
| 1729 | } else |
| 1730 | creation = CREATION_EXISTING; |
| 1731 | } else |
| 1732 | creation = CREATION_NORMAL; |
| 1733 | |
| 1734 | log_debug("%s %s device node \"%s\" %u:%u.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1737, __func__, "%s %s device node \"%s\" %u:%u." , creation_mode_verb_to_string(creation), i->type == CREATE_BLOCK_DEVICE ? "block" : "char", i->path, gnu_dev_major (i->mode), gnu_dev_minor (i->mode)) : -abs(_e); }) |
| 1735 | creation_mode_verb_to_string(creation),({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1737, __func__, "%s %s device node \"%s\" %u:%u." , creation_mode_verb_to_string(creation), i->type == CREATE_BLOCK_DEVICE ? "block" : "char", i->path, gnu_dev_major (i->mode), gnu_dev_minor (i->mode)) : -abs(_e); }) |
| 1736 | i->type == CREATE_BLOCK_DEVICE ? "block" : "char",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1737, __func__, "%s %s device node \"%s\" %u:%u." , creation_mode_verb_to_string(creation), i->type == CREATE_BLOCK_DEVICE ? "block" : "char", i->path, gnu_dev_major (i->mode), gnu_dev_minor (i->mode)) : -abs(_e); }) |
| 1737 | i->path, major(i->mode), minor(i->mode))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1737, __func__, "%s %s device node \"%s\" %u:%u." , creation_mode_verb_to_string(creation), i->type == CREATE_BLOCK_DEVICE ? "block" : "char", i->path, gnu_dev_major (i->mode), gnu_dev_minor (i->mode)) : -abs(_e); }); |
| 1738 | |
| 1739 | r = path_set_perms(i, i->path); |
| 1740 | if (r < 0) |
| 1741 | return r; |
| 1742 | |
| 1743 | break; |
| 1744 | } |
| 1745 | |
| 1746 | case ADJUST_MODE: |
| 1747 | case RELABEL_PATH: |
| 1748 | r = glob_item(i, path_set_perms); |
| 1749 | if (r < 0) |
| 1750 | return r; |
| 1751 | break; |
| 1752 | |
| 1753 | case RECURSIVE_RELABEL_PATH: |
| 1754 | r = glob_item_recursively(i, fd_set_perms); |
| 1755 | if (r < 0) |
| 1756 | return r; |
| 1757 | break; |
| 1758 | |
| 1759 | case SET_XATTR: |
| 1760 | r = glob_item(i, path_set_xattrs); |
| 1761 | if (r < 0) |
| 1762 | return r; |
| 1763 | break; |
| 1764 | |
| 1765 | case RECURSIVE_SET_XATTR: |
| 1766 | r = glob_item_recursively(i, fd_set_xattrs); |
| 1767 | if (r < 0) |
| 1768 | return r; |
| 1769 | break; |
| 1770 | |
| 1771 | case SET_ACL: |
| 1772 | r = glob_item(i, path_set_acls); |
| 1773 | if (r < 0) |
| 1774 | return r; |
| 1775 | break; |
| 1776 | |
| 1777 | case RECURSIVE_SET_ACL: |
| 1778 | r = glob_item_recursively(i, fd_set_acls); |
| 1779 | if (r < 0) |
| 1780 | return r; |
| 1781 | break; |
| 1782 | |
| 1783 | case SET_ATTRIBUTE: |
| 1784 | r = glob_item(i, path_set_attribute); |
| 1785 | if (r < 0) |
| 1786 | return r; |
| 1787 | break; |
| 1788 | |
| 1789 | case RECURSIVE_SET_ATTRIBUTE: |
| 1790 | r = glob_item_recursively(i, fd_set_attribute); |
| 1791 | if (r < 0) |
| 1792 | return r; |
| 1793 | break; |
| 1794 | } |
| 1795 | |
| 1796 | return 0; |
| 1797 | } |
| 1798 | |
| 1799 | static int remove_item_instance(Item *i, const char *instance) { |
| 1800 | int r; |
| 1801 | |
| 1802 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 1802 , __PRETTY_FUNCTION__); } while (0); |
| 1803 | |
| 1804 | switch (i->type) { |
| 1805 | |
| 1806 | case REMOVE_PATH: |
| 1807 | if (remove(instance) < 0 && errno(*__errno_location ()) != ENOENT2) |
| 1808 | return log_error_errno(errno, "rm(%s): %m", instance)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1808, __func__ , "rm(%s): %m", instance) : -abs(_e); }); |
| 1809 | |
| 1810 | break; |
| 1811 | |
| 1812 | case TRUNCATE_DIRECTORY: |
| 1813 | case RECURSIVE_REMOVE_PATH: |
| 1814 | /* FIXME: we probably should use dir_cleanup() here |
| 1815 | * instead of rm_rf() so that 'x' is honoured. */ |
| 1816 | log_debug("rm -rf \"%s\"", instance)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1816, __func__, "rm -rf \"%s\"" , instance) : -abs(_e); }); |
| 1817 | r = rm_rf(instance, (i->type == RECURSIVE_REMOVE_PATH ? REMOVE_ROOT|REMOVE_SUBVOLUME : 0) | REMOVE_PHYSICAL); |
| 1818 | if (r < 0 && r != -ENOENT2) |
| 1819 | return log_error_errno(r, "rm_rf(%s): %m", instance)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1819, __func__, "rm_rf(%s): %m" , instance) : -abs(_e); }); |
| 1820 | |
| 1821 | break; |
| 1822 | |
| 1823 | default: |
| 1824 | assert_not_reached("wut?")do { log_assert_failed_unreachable_realm(LOG_REALM_SYSTEMD, ( "wut?"), "../src/tmpfiles/tmpfiles.c", 1824, __PRETTY_FUNCTION__ ); } while (0); |
| 1825 | } |
| 1826 | |
| 1827 | return 0; |
| 1828 | } |
| 1829 | |
| 1830 | static int remove_item(Item *i) { |
| 1831 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 1831 , __PRETTY_FUNCTION__); } while (0); |
| 1832 | |
| 1833 | log_debug("Running remove action for entry %c %s", (char) i->type, i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1833, __func__, "Running remove action for entry %c %s" , (char) i->type, i->path) : -abs(_e); }); |
| 1834 | |
| 1835 | switch (i->type) { |
| 1836 | |
| 1837 | case REMOVE_PATH: |
| 1838 | case TRUNCATE_DIRECTORY: |
| 1839 | case RECURSIVE_REMOVE_PATH: |
| 1840 | return glob_item(i, remove_item_instance); |
| 1841 | |
| 1842 | default: |
| 1843 | return 0; |
| 1844 | } |
| 1845 | } |
| 1846 | |
| 1847 | static int clean_item_instance(Item *i, const char* instance) { |
| 1848 | _cleanup_closedir___attribute__((cleanup(closedirp))) DIR *d = NULL((void*)0); |
| 1849 | struct stat s, ps; |
| 1850 | bool_Bool mountpoint; |
| 1851 | usec_t cutoff, n; |
| 1852 | char timestamp[FORMAT_TIMESTAMP_MAX(3+1+10+1+8+1+6+1+6+1)]; |
| 1853 | |
| 1854 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 1854 , __PRETTY_FUNCTION__); } while (0); |
| 1855 | |
| 1856 | if (!i->age_set) |
| 1857 | return 0; |
| 1858 | |
| 1859 | n = now(CLOCK_REALTIME0); |
| 1860 | if (n < i->age) |
| 1861 | return 0; |
| 1862 | |
| 1863 | cutoff = n - i->age; |
| 1864 | |
| 1865 | d = opendir_nomod(instance); |
| 1866 | if (!d) { |
| 1867 | if (IN_SET(errno, ENOENT, ENOTDIR)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){2, 20})/sizeof(int)]; switch((*__errno_location ())) { case 2: case 20: _found = 1; break; default: break; } _found; })) { |
| 1868 | log_debug_errno(errno, "Directory \"%s\": %m", instance)({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1868, __func__ , "Directory \"%s\": %m", instance) : -abs(_e); }); |
| 1869 | return 0; |
| 1870 | } |
| 1871 | |
| 1872 | return log_error_errno(errno, "Failed to open directory %s: %m", instance)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1872, __func__ , "Failed to open directory %s: %m", instance) : -abs(_e); }); |
| 1873 | } |
| 1874 | |
| 1875 | if (fstat(dirfd(d), &s) < 0) |
| 1876 | return log_error_errno(errno, "stat(%s) failed: %m", i->path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1876, __func__ , "stat(%s) failed: %m", i->path) : -abs(_e); }); |
| 1877 | |
| 1878 | if (!S_ISDIR(s.st_mode)((((s.st_mode)) & 0170000) == (0040000))) { |
| 1879 | log_error("%s is not a directory.", i->path)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1879, __func__, "%s is not a directory." , i->path) : -abs(_e); }); |
| 1880 | return -ENOTDIR20; |
| 1881 | } |
| 1882 | |
| 1883 | if (fstatat(dirfd(d), "..", &ps, AT_SYMLINK_NOFOLLOW0x100) != 0) |
| 1884 | return log_error_errno(errno, "stat(%s/..) failed: %m", i->path)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 1884, __func__ , "stat(%s/..) failed: %m", i->path) : -abs(_e); }); |
| 1885 | |
| 1886 | mountpoint = s.st_dev != ps.st_dev || s.st_ino == ps.st_ino; |
| 1887 | |
| 1888 | log_debug("Cleanup threshold for %s \"%s\" is %s",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1891, __func__, "Cleanup threshold for %s \"%s\" is %s" , mountpoint ? "mount point" : "directory", instance, format_timestamp_us (timestamp, sizeof(timestamp), cutoff)) : -abs(_e); }) |
| 1889 | mountpoint ? "mount point" : "directory",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1891, __func__, "Cleanup threshold for %s \"%s\" is %s" , mountpoint ? "mount point" : "directory", instance, format_timestamp_us (timestamp, sizeof(timestamp), cutoff)) : -abs(_e); }) |
| 1890 | instance,({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1891, __func__, "Cleanup threshold for %s \"%s\" is %s" , mountpoint ? "mount point" : "directory", instance, format_timestamp_us (timestamp, sizeof(timestamp), cutoff)) : -abs(_e); }) |
| 1891 | format_timestamp_us(timestamp, sizeof(timestamp), cutoff))({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1891, __func__, "Cleanup threshold for %s \"%s\" is %s" , mountpoint ? "mount point" : "directory", instance, format_timestamp_us (timestamp, sizeof(timestamp), cutoff)) : -abs(_e); }); |
| 1892 | |
| 1893 | return dir_cleanup(i, instance, d, &s, cutoff, s.st_dev, mountpoint, |
| 1894 | MAX_DEPTH256, i->keep_first_level); |
| 1895 | } |
| 1896 | |
| 1897 | static int clean_item(Item *i) { |
| 1898 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 1898 , __PRETTY_FUNCTION__); } while (0); |
| 1899 | |
| 1900 | log_debug("Running clean action for entry %c %s", (char) i->type, i->path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 1900, __func__, "Running clean action for entry %c %s" , (char) i->type, i->path) : -abs(_e); }); |
| 1901 | |
| 1902 | switch (i->type) { |
| 1903 | case CREATE_DIRECTORY: |
| 1904 | case CREATE_SUBVOLUME: |
| 1905 | case CREATE_SUBVOLUME_INHERIT_QUOTA: |
| 1906 | case CREATE_SUBVOLUME_NEW_QUOTA: |
| 1907 | case TRUNCATE_DIRECTORY: |
| 1908 | case IGNORE_PATH: |
| 1909 | case COPY_FILES: |
| 1910 | clean_item_instance(i, i->path); |
| 1911 | return 0; |
| 1912 | case EMPTY_DIRECTORY: |
| 1913 | case IGNORE_DIRECTORY_PATH: |
| 1914 | return glob_item(i, clean_item_instance); |
| 1915 | default: |
| 1916 | return 0; |
| 1917 | } |
| 1918 | } |
| 1919 | |
| 1920 | static int process_item_array(ItemArray *array); |
| 1921 | |
| 1922 | static int process_item(Item *i) { |
| 1923 | int r, q, p, t = 0; |
| 1924 | _cleanup_free___attribute__((cleanup(freep))) char *prefix = NULL((void*)0); |
| 1925 | |
| 1926 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 1926 , __PRETTY_FUNCTION__); } while (0); |
| 1927 | |
| 1928 | if (i->done) |
| 1929 | return 0; |
| 1930 | |
| 1931 | i->done = true1; |
| 1932 | |
| 1933 | prefix = malloc(strlen(i->path) + 1); |
| 1934 | if (!prefix) |
| 1935 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 1935, __func__); |
| 1936 | |
| 1937 | PATH_FOREACH_PREFIX(prefix, i->path)for (char *_slash = ({ path_simplify(strcpy(prefix, i->path ), 0); (strcmp((prefix),("/")) == 0) ? ((void*)0) : strrchr(prefix , '/'); }); _slash && ((*_slash = 0), 1); _slash = strrchr ((prefix), '/')) { |
| 1938 | ItemArray *j; |
| 1939 | |
| 1940 | j = ordered_hashmap_get(items, prefix); |
| 1941 | if (j) { |
| 1942 | int s; |
| 1943 | |
| 1944 | s = process_item_array(j); |
| 1945 | if (s < 0 && t == 0) |
| 1946 | t = s; |
| 1947 | } |
| 1948 | } |
| 1949 | |
| 1950 | if (chase_symlinks(i->path, NULL((void*)0), CHASE_NO_AUTOFS, NULL((void*)0)) == -EREMOTE66) |
| 1951 | return t; |
| 1952 | |
| 1953 | r = arg_create ? create_item(i) : 0; |
| 1954 | q = arg_remove ? remove_item(i) : 0; |
| 1955 | p = arg_clean ? clean_item(i) : 0; |
| 1956 | |
| 1957 | return t < 0 ? t : |
| 1958 | r < 0 ? r : |
| 1959 | q < 0 ? q : |
| 1960 | p; |
| 1961 | } |
| 1962 | |
| 1963 | static int process_item_array(ItemArray *array) { |
| 1964 | unsigned n; |
| 1965 | int r = 0, k; |
| 1966 | |
| 1967 | assert(array)do { if ((__builtin_expect(!!(!(array)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("array"), "../src/tmpfiles/tmpfiles.c", 1967 , __PRETTY_FUNCTION__); } while (0); |
| 1968 | |
| 1969 | for (n = 0; n < array->count; n++) { |
| 1970 | k = process_item(array->items + n); |
| 1971 | if (k < 0 && r == 0) |
| 1972 | r = k; |
| 1973 | } |
| 1974 | |
| 1975 | return r; |
| 1976 | } |
| 1977 | |
| 1978 | static void item_free_contents(Item *i) { |
| 1979 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 1979 , __PRETTY_FUNCTION__); } while (0); |
| 1980 | free(i->path); |
| 1981 | free(i->argument); |
| 1982 | strv_free(i->xattrs); |
| 1983 | |
| 1984 | #if HAVE_ACL1 |
| 1985 | acl_free(i->acl_access); |
| 1986 | acl_free(i->acl_default); |
| 1987 | #endif |
| 1988 | } |
| 1989 | |
| 1990 | static void item_array_free(ItemArray *a) { |
| 1991 | unsigned n; |
| 1992 | |
| 1993 | if (!a) |
| 1994 | return; |
| 1995 | |
| 1996 | for (n = 0; n < a->count; n++) |
| 1997 | item_free_contents(a->items + n); |
| 1998 | free(a->items); |
| 1999 | free(a); |
| 2000 | } |
| 2001 | |
| 2002 | static int item_compare(const void *a, const void *b) { |
| 2003 | const Item *x = a, *y = b; |
| 2004 | |
| 2005 | /* Make sure that the ownership taking item is put first, so |
| 2006 | * that we first create the node, and then can adjust it */ |
| 2007 | |
| 2008 | if (takes_ownership(x->type) && !takes_ownership(y->type)) |
| 2009 | return -1; |
| 2010 | if (!takes_ownership(x->type) && takes_ownership(y->type)) |
| 2011 | return 1; |
| 2012 | |
| 2013 | return (int) x->type - (int) y->type; |
| 2014 | } |
| 2015 | |
| 2016 | static bool_Bool item_compatible(Item *a, Item *b) { |
| 2017 | assert(a)do { if ((__builtin_expect(!!(!(a)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("a"), "../src/tmpfiles/tmpfiles.c", 2017 , __PRETTY_FUNCTION__); } while (0); |
| 2018 | assert(b)do { if ((__builtin_expect(!!(!(b)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("b"), "../src/tmpfiles/tmpfiles.c", 2018 , __PRETTY_FUNCTION__); } while (0); |
| 2019 | assert(streq(a->path, b->path))do { if ((__builtin_expect(!!(!((strcmp((a->path),(b->path )) == 0))),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("streq(a->path, b->path)" ), "../src/tmpfiles/tmpfiles.c", 2019, __PRETTY_FUNCTION__); } while (0); |
| 2020 | |
| 2021 | if (takes_ownership(a->type) && takes_ownership(b->type)) |
| 2022 | /* check if the items are the same */ |
| 2023 | return streq_ptr(a->argument, b->argument) && |
| 2024 | |
| 2025 | a->uid_set == b->uid_set && |
| 2026 | a->uid == b->uid && |
| 2027 | |
| 2028 | a->gid_set == b->gid_set && |
| 2029 | a->gid == b->gid && |
| 2030 | |
| 2031 | a->mode_set == b->mode_set && |
| 2032 | a->mode == b->mode && |
| 2033 | |
| 2034 | a->age_set == b->age_set && |
| 2035 | a->age == b->age && |
| 2036 | |
| 2037 | a->mask_perms == b->mask_perms && |
| 2038 | |
| 2039 | a->keep_first_level == b->keep_first_level && |
| 2040 | |
| 2041 | a->major_minor == b->major_minor; |
| 2042 | |
| 2043 | return true1; |
| 2044 | } |
| 2045 | |
| 2046 | static bool_Bool should_include_path(const char *path) { |
| 2047 | char **prefix; |
| 2048 | |
| 2049 | STRV_FOREACH(prefix, arg_exclude_prefixes)for ((prefix) = (arg_exclude_prefixes); (prefix) && * (prefix); (prefix)++) |
| 2050 | if (path_startswith(path, *prefix)) { |
| 2051 | log_debug("Entry \"%s\" matches exclude prefix \"%s\", skipping.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2052, __func__, "Entry \"%s\" matches exclude prefix \"%s\", skipping." , path, *prefix) : -abs(_e); }) |
| 2052 | path, *prefix)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2052, __func__, "Entry \"%s\" matches exclude prefix \"%s\", skipping." , path, *prefix) : -abs(_e); }); |
| 2053 | return false0; |
| 2054 | } |
| 2055 | |
| 2056 | STRV_FOREACH(prefix, arg_include_prefixes)for ((prefix) = (arg_include_prefixes); (prefix) && * (prefix); (prefix)++) |
| 2057 | if (path_startswith(path, *prefix)) { |
| 2058 | log_debug("Entry \"%s\" matches include prefix \"%s\".", path, *prefix)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2058, __func__, "Entry \"%s\" matches include prefix \"%s\"." , path, *prefix) : -abs(_e); }); |
| 2059 | return true1; |
| 2060 | } |
| 2061 | |
| 2062 | /* no matches, so we should include this path only if we |
| 2063 | * have no whitelist at all */ |
| 2064 | if (strv_isempty(arg_include_prefixes)) |
| 2065 | return true1; |
| 2066 | |
| 2067 | log_debug("Entry \"%s\" does not match any include prefix, skipping.", path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2067, __func__, "Entry \"%s\" does not match any include prefix, skipping." , path) : -abs(_e); }); |
| 2068 | return false0; |
| 2069 | } |
| 2070 | |
| 2071 | static int specifier_expansion_from_arg(Item *i) { |
| 2072 | _cleanup_free___attribute__((cleanup(freep))) char *unescaped = NULL((void*)0), *resolved = NULL((void*)0); |
| 2073 | char **xattr; |
| 2074 | int r; |
| 2075 | |
| 2076 | assert(i)do { if ((__builtin_expect(!!(!(i)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i"), "../src/tmpfiles/tmpfiles.c", 2076 , __PRETTY_FUNCTION__); } while (0); |
| 2077 | |
| 2078 | if (i->argument == NULL((void*)0)) |
| 2079 | return 0; |
| 2080 | |
| 2081 | switch (i->type) { |
| 2082 | case COPY_FILES: |
| 2083 | case CREATE_SYMLINK: |
| 2084 | case CREATE_FILE: |
| 2085 | case TRUNCATE_FILE: |
| 2086 | case WRITE_FILE: |
| 2087 | r = cunescape(i->argument, 0, &unescaped); |
| 2088 | if (r < 0) |
| 2089 | return log_error_errno(r, "Failed to unescape parameter to write: %s", i->argument)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2089, __func__, "Failed to unescape parameter to write: %s" , i->argument) : -abs(_e); }); |
| 2090 | |
| 2091 | r = specifier_printf(unescaped, specifier_table, NULL((void*)0), &resolved); |
| 2092 | if (r < 0) |
| 2093 | return r; |
| 2094 | |
| 2095 | free_and_replace(i->argument, resolved)({ free(i->argument); (i->argument) = (resolved); (resolved ) = ((void*)0); 0; }); |
| 2096 | break; |
| 2097 | |
| 2098 | case SET_XATTR: |
| 2099 | case RECURSIVE_SET_XATTR: |
| 2100 | assert(i->xattrs)do { if ((__builtin_expect(!!(!(i->xattrs)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("i->xattrs"), "../src/tmpfiles/tmpfiles.c" , 2100, __PRETTY_FUNCTION__); } while (0); |
| 2101 | |
| 2102 | STRV_FOREACH (xattr, i->xattrs)for ((xattr) = (i->xattrs); (xattr) && *(xattr); ( xattr)++) { |
| 2103 | r = specifier_printf(*xattr, specifier_table, NULL((void*)0), &resolved); |
| 2104 | if (r < 0) |
| 2105 | return r; |
| 2106 | |
| 2107 | free_and_replace(*xattr, resolved)({ free(*xattr); (*xattr) = (resolved); (resolved) = ((void*) 0); 0; }); |
| 2108 | } |
| 2109 | break; |
| 2110 | |
| 2111 | default: |
| 2112 | break; |
| 2113 | } |
| 2114 | return 0; |
| 2115 | } |
| 2116 | |
| 2117 | static int patch_var_run(const char *fname, unsigned line, char **path) { |
| 2118 | const char *k; |
| 2119 | char *n; |
| 2120 | |
| 2121 | assert(path)do { if ((__builtin_expect(!!(!(path)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("path"), "../src/tmpfiles/tmpfiles.c", 2121 , __PRETTY_FUNCTION__); } while (0); |
| 2122 | assert(*path)do { if ((__builtin_expect(!!(!(*path)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("*path"), "../src/tmpfiles/tmpfiles.c", 2122 , __PRETTY_FUNCTION__); } while (0); |
| 2123 | |
| 2124 | /* Optionally rewrites lines referencing /var/run/, to use /run/ instead. Why bother? tmpfiles merges lines in |
| 2125 | * some cases and detects conflicts in others. If files/directories are specified through two equivalent lines |
| 2126 | * this is problematic as neither case will be detected. Ideally we'd detect these cases by resolving symlinks |
| 2127 | * early, but that's precisely not what we can do here as this code very likely is running very early on, at a |
| 2128 | * time where the paths in question are not available yet, or even more importantly, our own tmpfiles rules |
| 2129 | * might create the paths that are intermediary to the listed paths. We can't really cover the generic case, |
| 2130 | * but the least we can do is cover the specific case of /var/run vs. /run, as /var/run is a legacy name for |
| 2131 | * /run only, and we explicitly document that and require that on systemd systems the former is a symlink to |
| 2132 | * the latter. Moreover files below this path are by far the primary usecase for tmpfiles.d/. */ |
| 2133 | |
| 2134 | k = path_startswith(*path, "/var/run/"); |
| 2135 | if (isempty(k)) /* Don't complain about other paths than /var/run, and not about /var/run itself either. */ |
| 2136 | return 0; |
| 2137 | |
| 2138 | n = strjoin("/run/", k)strjoin_real(("/run/"), k, ((void*)0)); |
| 2139 | if (!n) |
| 2140 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2140, __func__); |
| 2141 | |
| 2142 | /* Also log about this briefly. We do so at LOG_NOTICE level, as we fixed up the situation automatically, hence |
| 2143 | * there's no immediate need for action by the user. However, in the interest of making things less confusing |
| 2144 | * to the user, let's still inform the user that these snippets should really be updated. */ |
| 2145 | |
| 2146 | log_notice("[%s:%u] Line references path below legacy directory /var/run/, updating %s → %s; please update the tmpfiles.d/ drop-in file accordingly.", fname, line, *path, n)({ int _level = (((5))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2146, __func__, "[%s:%u] Line references path below legacy directory /var/run/, updating %s → %s; please update the tmpfiles.d/ drop-in file accordingly." , fname, line, *path, n) : -abs(_e); }); |
| 2147 | |
| 2148 | free(*path); |
| 2149 | *path = n; |
| 2150 | |
| 2151 | return 0; |
| 2152 | } |
| 2153 | |
| 2154 | static int parse_line(const char *fname, unsigned line, const char *buffer, bool_Bool *invalid_config) { |
| 2155 | |
| 2156 | _cleanup_free___attribute__((cleanup(freep))) char *action = NULL((void*)0), *mode = NULL((void*)0), *user = NULL((void*)0), *group = NULL((void*)0), *age = NULL((void*)0), *path = NULL((void*)0); |
| 2157 | _cleanup_(item_free_contents)__attribute__((cleanup(item_free_contents))) Item i = {}; |
| 2158 | ItemArray *existing; |
| 2159 | OrderedHashmap *h; |
| 2160 | int r, pos; |
| 2161 | bool_Bool force = false0, boot = false0; |
| 2162 | |
| 2163 | assert(fname)do { if ((__builtin_expect(!!(!(fname)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fname"), "../src/tmpfiles/tmpfiles.c", 2163 , __PRETTY_FUNCTION__); } while (0); |
| 2164 | assert(line >= 1)do { if ((__builtin_expect(!!(!(line >= 1)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("line >= 1"), "../src/tmpfiles/tmpfiles.c" , 2164, __PRETTY_FUNCTION__); } while (0); |
| 2165 | assert(buffer)do { if ((__builtin_expect(!!(!(buffer)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("buffer"), "../src/tmpfiles/tmpfiles.c", 2165, __PRETTY_FUNCTION__); } while (0); |
| 2166 | |
| 2167 | r = extract_many_words( |
| 2168 | &buffer, |
| 2169 | NULL((void*)0), |
| 2170 | EXTRACT_QUOTES, |
| 2171 | &action, |
| 2172 | &path, |
| 2173 | &mode, |
| 2174 | &user, |
| 2175 | &group, |
| 2176 | &age, |
| 2177 | NULL((void*)0)); |
| 2178 | if (r < 0) { |
| 2179 | if (IN_SET(r, -EINVAL, -EBADSLT)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-22, -57})/sizeof(int)]; switch(r) { case -22: case -57: _found = 1; break; default: break; } _found; } )) |
| 2180 | /* invalid quoting and such or an unknown specifier */ |
| 2181 | *invalid_config = true1; |
| 2182 | return log_error_errno(r, "[%s:%u] Failed to parse line: %m", fname, line)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2182, __func__, "[%s:%u] Failed to parse line: %m" , fname, line) : -abs(_e); }); |
| 2183 | } else if (r < 2) { |
| 2184 | *invalid_config = true1; |
| 2185 | log_error("[%s:%u] Syntax error.", fname, line)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2185, __func__, "[%s:%u] Syntax error." , fname, line) : -abs(_e); }); |
| 2186 | return -EIO5; |
| 2187 | } |
| 2188 | |
| 2189 | if (!isempty(buffer) && !streq(buffer, "-")(strcmp((buffer),("-")) == 0)) { |
| 2190 | i.argument = strdup(buffer); |
| 2191 | if (!i.argument) |
| 2192 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2192, __func__); |
| 2193 | } |
| 2194 | |
| 2195 | if (isempty(action)) { |
| 2196 | *invalid_config = true1; |
| 2197 | log_error("[%s:%u] Command too short '%s'.", fname, line, action)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2197, __func__, "[%s:%u] Command too short '%s'." , fname, line, action) : -abs(_e); }); |
| 2198 | return -EINVAL22; |
| 2199 | } |
| 2200 | |
| 2201 | for (pos = 1; action[pos]; pos++) { |
| 2202 | if (action[pos] == '!' && !boot) |
| 2203 | boot = true1; |
| 2204 | else if (action[pos] == '+' && !force) |
| 2205 | force = true1; |
| 2206 | else { |
| 2207 | *invalid_config = true1; |
| 2208 | log_error("[%s:%u] Unknown modifiers in command '%s'",({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2209, __func__, "[%s:%u] Unknown modifiers in command '%s'" , fname, line, action) : -abs(_e); }) |
| 2209 | fname, line, action)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2209, __func__, "[%s:%u] Unknown modifiers in command '%s'" , fname, line, action) : -abs(_e); }); |
| 2210 | return -EINVAL22; |
| 2211 | } |
| 2212 | } |
| 2213 | |
| 2214 | if (boot && !arg_boot) { |
| 2215 | log_debug("Ignoring entry %s \"%s\" because --boot is not specified.",({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2216, __func__, "Ignoring entry %s \"%s\" because --boot is not specified." , action, path) : -abs(_e); }) |
| 2216 | action, path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2216, __func__, "Ignoring entry %s \"%s\" because --boot is not specified." , action, path) : -abs(_e); }); |
| 2217 | return 0; |
| 2218 | } |
| 2219 | |
| 2220 | i.type = action[0]; |
| 2221 | i.force = force; |
| 2222 | |
| 2223 | r = specifier_printf(path, specifier_table, NULL((void*)0), &i.path); |
| 2224 | if (r == -ENXIO6) |
| 2225 | return log_unresolvable_specifier(fname, line); |
| 2226 | if (r < 0) { |
| 2227 | if (IN_SET(r, -EINVAL, -EBADSLT)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-22, -57})/sizeof(int)]; switch(r) { case -22: case -57: _found = 1; break; default: break; } _found; } )) |
| 2228 | *invalid_config = true1; |
| 2229 | return log_error_errno(r, "[%s:%u] Failed to replace specifiers: %s", fname, line, path)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2229, __func__, "[%s:%u] Failed to replace specifiers: %s" , fname, line, path) : -abs(_e); }); |
| 2230 | } |
| 2231 | |
| 2232 | r = patch_var_run(fname, line, &i.path); |
| 2233 | if (r < 0) |
| 2234 | return r; |
| 2235 | |
| 2236 | switch (i.type) { |
| 2237 | |
| 2238 | case CREATE_DIRECTORY: |
| 2239 | case CREATE_SUBVOLUME: |
| 2240 | case CREATE_SUBVOLUME_INHERIT_QUOTA: |
| 2241 | case CREATE_SUBVOLUME_NEW_QUOTA: |
| 2242 | case EMPTY_DIRECTORY: |
| 2243 | case TRUNCATE_DIRECTORY: |
| 2244 | case CREATE_FIFO: |
| 2245 | case IGNORE_PATH: |
| 2246 | case IGNORE_DIRECTORY_PATH: |
| 2247 | case REMOVE_PATH: |
| 2248 | case RECURSIVE_REMOVE_PATH: |
| 2249 | case ADJUST_MODE: |
| 2250 | case RELABEL_PATH: |
| 2251 | case RECURSIVE_RELABEL_PATH: |
| 2252 | if (i.argument) |
| 2253 | log_warning("[%s:%u] %c lines don't take argument fields, ignoring.", fname, line, i.type)({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2253, __func__, "[%s:%u] %c lines don't take argument fields, ignoring." , fname, line, i.type) : -abs(_e); }); |
| 2254 | |
| 2255 | break; |
| 2256 | |
| 2257 | case CREATE_FILE: |
| 2258 | case TRUNCATE_FILE: |
| 2259 | break; |
| 2260 | |
| 2261 | case CREATE_SYMLINK: |
| 2262 | if (!i.argument) { |
| 2263 | i.argument = strappend("/usr/share/factory/", i.path); |
| 2264 | if (!i.argument) |
| 2265 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2265, __func__); |
| 2266 | } |
| 2267 | break; |
| 2268 | |
| 2269 | case WRITE_FILE: |
| 2270 | if (!i.argument) { |
| 2271 | *invalid_config = true1; |
| 2272 | log_error("[%s:%u] Write file requires argument.", fname, line)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2272, __func__, "[%s:%u] Write file requires argument." , fname, line) : -abs(_e); }); |
| 2273 | return -EBADMSG74; |
| 2274 | } |
| 2275 | break; |
| 2276 | |
| 2277 | case COPY_FILES: |
| 2278 | if (!i.argument) { |
| 2279 | i.argument = strappend("/usr/share/factory/", i.path); |
| 2280 | if (!i.argument) |
| 2281 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2281, __func__); |
| 2282 | } else if (!path_is_absolute(i.argument)) { |
| 2283 | *invalid_config = true1; |
| 2284 | log_error("[%s:%u] Source path is not absolute.", fname, line)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2284, __func__, "[%s:%u] Source path is not absolute." , fname, line) : -abs(_e); }); |
| 2285 | return -EBADMSG74; |
| 2286 | } |
| 2287 | |
| 2288 | path_simplify(i.argument, false0); |
| 2289 | break; |
| 2290 | |
| 2291 | case CREATE_CHAR_DEVICE: |
| 2292 | case CREATE_BLOCK_DEVICE: { |
| 2293 | unsigned major, minor; |
| 2294 | |
| 2295 | if (!i.argument) { |
| 2296 | *invalid_config = true1; |
| 2297 | log_error("[%s:%u] Device file requires argument.", fname, line)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2297, __func__, "[%s:%u] Device file requires argument." , fname, line) : -abs(_e); }); |
| 2298 | return -EBADMSG74; |
| 2299 | } |
| 2300 | |
| 2301 | if (sscanf(i.argument, "%u:%u", &major, &minor) != 2) { |
| 2302 | *invalid_config = true1; |
| 2303 | log_error("[%s:%u] Can't parse device file major/minor '%s'.", fname, line, i.argument)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2303, __func__, "[%s:%u] Can't parse device file major/minor '%s'." , fname, line, i.argument) : -abs(_e); }); |
| 2304 | return -EBADMSG74; |
| 2305 | } |
| 2306 | |
| 2307 | i.major_minor = makedev(major, minor)gnu_dev_makedev (major, minor); |
| 2308 | break; |
| 2309 | } |
| 2310 | |
| 2311 | case SET_XATTR: |
| 2312 | case RECURSIVE_SET_XATTR: |
| 2313 | if (!i.argument) { |
| 2314 | *invalid_config = true1; |
| 2315 | log_error("[%s:%u] Set extended attribute requires argument.", fname, line)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2315, __func__, "[%s:%u] Set extended attribute requires argument." , fname, line) : -abs(_e); }); |
| 2316 | return -EBADMSG74; |
| 2317 | } |
| 2318 | r = parse_xattrs_from_arg(&i); |
| 2319 | if (r < 0) |
| 2320 | return r; |
| 2321 | break; |
| 2322 | |
| 2323 | case SET_ACL: |
| 2324 | case RECURSIVE_SET_ACL: |
| 2325 | if (!i.argument) { |
| 2326 | *invalid_config = true1; |
| 2327 | log_error("[%s:%u] Set ACLs requires argument.", fname, line)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2327, __func__, "[%s:%u] Set ACLs requires argument." , fname, line) : -abs(_e); }); |
| 2328 | return -EBADMSG74; |
| 2329 | } |
| 2330 | r = parse_acls_from_arg(&i); |
| 2331 | if (r < 0) |
| 2332 | return r; |
| 2333 | break; |
| 2334 | |
| 2335 | case SET_ATTRIBUTE: |
| 2336 | case RECURSIVE_SET_ATTRIBUTE: |
| 2337 | if (!i.argument) { |
| 2338 | *invalid_config = true1; |
| 2339 | log_error("[%s:%u] Set file attribute requires argument.", fname, line)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2339, __func__, "[%s:%u] Set file attribute requires argument." , fname, line) : -abs(_e); }); |
| 2340 | return -EBADMSG74; |
| 2341 | } |
| 2342 | r = parse_attribute_from_arg(&i); |
| 2343 | if (IN_SET(r, -EINVAL, -EBADSLT)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-22, -57})/sizeof(int)]; switch(r) { case -22: case -57: _found = 1; break; default: break; } _found; } )) |
| 2344 | *invalid_config = true1; |
| 2345 | if (r < 0) |
| 2346 | return r; |
| 2347 | break; |
| 2348 | |
| 2349 | default: |
| 2350 | log_error("[%s:%u] Unknown command type '%c'.", fname, line, (char) i.type)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2350, __func__, "[%s:%u] Unknown command type '%c'." , fname, line, (char) i.type) : -abs(_e); }); |
| 2351 | *invalid_config = true1; |
| 2352 | return -EBADMSG74; |
| 2353 | } |
| 2354 | |
| 2355 | if (!path_is_absolute(i.path)) { |
| 2356 | log_error("[%s:%u] Path '%s' not absolute.", fname, line, i.path)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2356, __func__, "[%s:%u] Path '%s' not absolute." , fname, line, i.path) : -abs(_e); }); |
| 2357 | *invalid_config = true1; |
| 2358 | return -EBADMSG74; |
| 2359 | } |
| 2360 | |
| 2361 | path_simplify(i.path, false0); |
| 2362 | |
| 2363 | if (!should_include_path(i.path)) |
| 2364 | return 0; |
| 2365 | |
| 2366 | r = specifier_expansion_from_arg(&i); |
| 2367 | if (r == -ENXIO6) |
| 2368 | return log_unresolvable_specifier(fname, line); |
| 2369 | if (r < 0) { |
| 2370 | if (IN_SET(r, -EINVAL, -EBADSLT)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-22, -57})/sizeof(int)]; switch(r) { case -22: case -57: _found = 1; break; default: break; } _found; } )) |
| 2371 | *invalid_config = true1; |
| 2372 | return log_error_errno(r, "[%s:%u] Failed to substitute specifiers in argument: %m",({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2373, __func__, "[%s:%u] Failed to substitute specifiers in argument: %m" , fname, line) : -abs(_e); }) |
| 2373 | fname, line)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2373, __func__, "[%s:%u] Failed to substitute specifiers in argument: %m" , fname, line) : -abs(_e); }); |
| 2374 | } |
| 2375 | |
| 2376 | if (arg_root) { |
| 2377 | char *p; |
| 2378 | |
| 2379 | p = prefix_root(arg_root, i.path); |
| 2380 | if (!p) |
| 2381 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2381, __func__); |
| 2382 | |
| 2383 | free(i.path); |
| 2384 | i.path = p; |
| 2385 | } |
| 2386 | |
| 2387 | if (!isempty(user) && !streq(user, "-")(strcmp((user),("-")) == 0)) { |
| 2388 | const char *u = user; |
| 2389 | |
| 2390 | r = get_user_creds(&u, &i.uid, NULL((void*)0), NULL((void*)0), NULL((void*)0)); |
| 2391 | if (r < 0) { |
| 2392 | *invalid_config = true1; |
| 2393 | return log_error_errno(r, "[%s:%u] Unknown user '%s'.", fname, line, user)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2393, __func__, "[%s:%u] Unknown user '%s'." , fname, line, user) : -abs(_e); }); |
| 2394 | } |
| 2395 | |
| 2396 | i.uid_set = true1; |
| 2397 | } |
| 2398 | |
| 2399 | if (!isempty(group) && !streq(group, "-")(strcmp((group),("-")) == 0)) { |
| 2400 | const char *g = group; |
| 2401 | |
| 2402 | r = get_group_creds(&g, &i.gid); |
| 2403 | if (r < 0) { |
| 2404 | *invalid_config = true1; |
| 2405 | log_error("[%s:%u] Unknown group '%s'.", fname, line, group)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2405, __func__, "[%s:%u] Unknown group '%s'." , fname, line, group) : -abs(_e); }); |
| 2406 | return r; |
| 2407 | } |
| 2408 | |
| 2409 | i.gid_set = true1; |
| 2410 | } |
| 2411 | |
| 2412 | if (!isempty(mode) && !streq(mode, "-")(strcmp((mode),("-")) == 0)) { |
| 2413 | const char *mm = mode; |
| 2414 | unsigned m; |
| 2415 | |
| 2416 | if (*mm == '~') { |
| 2417 | i.mask_perms = true1; |
| 2418 | mm++; |
| 2419 | } |
| 2420 | |
| 2421 | if (parse_mode(mm, &m) < 0) { |
| 2422 | *invalid_config = true1; |
| 2423 | log_error("[%s:%u] Invalid mode '%s'.", fname, line, mode)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2423, __func__, "[%s:%u] Invalid mode '%s'." , fname, line, mode) : -abs(_e); }); |
| 2424 | return -EBADMSG74; |
| 2425 | } |
| 2426 | |
| 2427 | i.mode = m; |
| 2428 | i.mode_set = true1; |
| 2429 | } else |
| 2430 | i.mode = IN_SET(i.type, CREATE_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA, CREATE_SUBVOLUME_NEW_QUOTA)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME , CREATE_SUBVOLUME_INHERIT_QUOTA, CREATE_SUBVOLUME_NEW_QUOTA} )/sizeof(int)]; switch(i.type) { case CREATE_DIRECTORY: case TRUNCATE_DIRECTORY : case CREATE_SUBVOLUME: case CREATE_SUBVOLUME_INHERIT_QUOTA: case CREATE_SUBVOLUME_NEW_QUOTA: _found = 1; break; default: break; } _found; }) ? 0755 : 0644; |
| 2431 | |
| 2432 | if (!isempty(age) && !streq(age, "-")(strcmp((age),("-")) == 0)) { |
| 2433 | const char *a = age; |
| 2434 | |
| 2435 | if (*a == '~') { |
| 2436 | i.keep_first_level = true1; |
| 2437 | a++; |
| 2438 | } |
| 2439 | |
| 2440 | if (parse_sec(a, &i.age) < 0) { |
| 2441 | *invalid_config = true1; |
| 2442 | log_error("[%s:%u] Invalid age '%s'.", fname, line, age)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2442, __func__, "[%s:%u] Invalid age '%s'." , fname, line, age) : -abs(_e); }); |
| 2443 | return -EBADMSG74; |
| 2444 | } |
| 2445 | |
| 2446 | i.age_set = true1; |
| 2447 | } |
| 2448 | |
| 2449 | h = needs_glob(i.type) ? globs : items; |
| 2450 | |
| 2451 | existing = ordered_hashmap_get(h, i.path); |
| 2452 | if (existing) { |
| 2453 | unsigned n; |
| 2454 | |
| 2455 | for (n = 0; n < existing->count; n++) { |
| 2456 | if (!item_compatible(existing->items + n, &i)) { |
| 2457 | log_notice("[%s:%u] Duplicate line for path \"%s\", ignoring.",({ int _level = (((5))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2458, __func__, "[%s:%u] Duplicate line for path \"%s\", ignoring." , fname, line, i.path) : -abs(_e); }) |
| 2458 | fname, line, i.path)({ int _level = (((5))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2458, __func__, "[%s:%u] Duplicate line for path \"%s\", ignoring." , fname, line, i.path) : -abs(_e); }); |
| 2459 | return 0; |
| 2460 | } |
| 2461 | } |
| 2462 | } else { |
| 2463 | existing = new0(ItemArray, 1)((ItemArray*) calloc((1), sizeof(ItemArray))); |
| 2464 | if (!existing) |
| 2465 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2465, __func__); |
| 2466 | |
| 2467 | r = ordered_hashmap_put(h, i.path, existing); |
| 2468 | if (r < 0) |
| 2469 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2469, __func__); |
| 2470 | } |
| 2471 | |
| 2472 | if (!GREEDY_REALLOC(existing->items, existing->size, existing->count + 1)greedy_realloc((void**) &(existing->items), &(existing ->size), (existing->count + 1), sizeof((existing->items )[0]))) |
| 2473 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2473, __func__); |
| 2474 | |
| 2475 | memcpy(existing->items + existing->count++, &i, sizeof(i)); |
| 2476 | |
| 2477 | /* Sort item array, to enforce stable ordering of application */ |
| 2478 | qsort_safe(existing->items, existing->count, sizeof(Item), item_compare); |
| 2479 | |
| 2480 | zero(i)(({ size_t _l_ = (sizeof(i)); void *_x_ = (&(i)); _l_ == 0 ? _x_ : memset(_x_, 0, _l_); })); |
| 2481 | return 0; |
| 2482 | } |
| 2483 | |
| 2484 | static int cat_config(char **config_dirs, char **args) { |
| 2485 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **files = NULL((void*)0); |
| 2486 | int r; |
| 2487 | |
| 2488 | r = conf_files_list_with_replacement(arg_root, config_dirs, arg_replace, &files, NULL((void*)0)); |
| 2489 | if (r < 0) |
| 2490 | return r; |
| 2491 | |
| 2492 | return cat_files(NULL((void*)0), files, 0); |
| 2493 | } |
| 2494 | |
| 2495 | static void help(void) { |
| 2496 | printf("%s [OPTIONS...] [CONFIGURATION FILE...]\n\n" |
| 2497 | "Creates, deletes and cleans up volatile and temporary files and directories.\n\n" |
| 2498 | " -h --help Show this help\n" |
| 2499 | " --user Execute user configuration\n" |
| 2500 | " --version Show package version\n" |
| 2501 | " --cat-config Show configuration files\n" |
| 2502 | " --create Create marked files/directories\n" |
| 2503 | " --clean Clean up marked directories\n" |
| 2504 | " --remove Remove marked files/directories\n" |
| 2505 | " --boot Execute actions only safe at boot\n" |
| 2506 | " --prefix=PATH Only apply rules with the specified prefix\n" |
| 2507 | " --exclude-prefix=PATH Ignore rules with the specified prefix\n" |
| 2508 | " --root=PATH Operate on an alternate filesystem root\n" |
| 2509 | " --replace=PATH Treat arguments as replacement for PATH\n" |
| 2510 | " --no-pager Do not pipe output into a pager\n" |
| 2511 | , program_invocation_short_name); |
| 2512 | } |
| 2513 | |
| 2514 | static int parse_argv(int argc, char *argv[]) { |
| 2515 | |
| 2516 | enum { |
| 2517 | ARG_VERSION = 0x100, |
| 2518 | ARG_CAT_CONFIG, |
| 2519 | ARG_USER, |
| 2520 | ARG_CREATE, |
| 2521 | ARG_CLEAN, |
| 2522 | ARG_REMOVE, |
| 2523 | ARG_BOOT, |
| 2524 | ARG_PREFIX, |
| 2525 | ARG_EXCLUDE_PREFIX, |
| 2526 | ARG_ROOT, |
| 2527 | ARG_REPLACE, |
| 2528 | ARG_NO_PAGER, |
| 2529 | }; |
| 2530 | |
| 2531 | static const struct option options[] = { |
| 2532 | { "help", no_argument0, NULL((void*)0), 'h' }, |
| 2533 | { "user", no_argument0, NULL((void*)0), ARG_USER }, |
| 2534 | { "version", no_argument0, NULL((void*)0), ARG_VERSION }, |
| 2535 | { "cat-config", no_argument0, NULL((void*)0), ARG_CAT_CONFIG }, |
| 2536 | { "create", no_argument0, NULL((void*)0), ARG_CREATE }, |
| 2537 | { "clean", no_argument0, NULL((void*)0), ARG_CLEAN }, |
| 2538 | { "remove", no_argument0, NULL((void*)0), ARG_REMOVE }, |
| 2539 | { "boot", no_argument0, NULL((void*)0), ARG_BOOT }, |
| 2540 | { "prefix", required_argument1, NULL((void*)0), ARG_PREFIX }, |
| 2541 | { "exclude-prefix", required_argument1, NULL((void*)0), ARG_EXCLUDE_PREFIX }, |
| 2542 | { "root", required_argument1, NULL((void*)0), ARG_ROOT }, |
| 2543 | { "replace", required_argument1, NULL((void*)0), ARG_REPLACE }, |
| 2544 | { "no-pager", no_argument0, NULL((void*)0), ARG_NO_PAGER }, |
| 2545 | {} |
| 2546 | }; |
| 2547 | |
| 2548 | int c, r; |
| 2549 | |
| 2550 | assert(argc >= 0)do { if ((__builtin_expect(!!(!(argc >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("argc >= 0"), "../src/tmpfiles/tmpfiles.c" , 2550, __PRETTY_FUNCTION__); } while (0); |
| 2551 | assert(argv)do { if ((__builtin_expect(!!(!(argv)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("argv"), "../src/tmpfiles/tmpfiles.c", 2551 , __PRETTY_FUNCTION__); } while (0); |
| 2552 | |
| 2553 | while ((c = getopt_long(argc, argv, "h", options, NULL((void*)0))) >= 0) |
| 2554 | |
| 2555 | switch (c) { |
| 2556 | |
| 2557 | case 'h': |
| 2558 | help(); |
| 2559 | return 0; |
| 2560 | |
| 2561 | case ARG_VERSION: |
| 2562 | return version(); |
| 2563 | |
| 2564 | case ARG_CAT_CONFIG: |
| 2565 | arg_cat_config = true1; |
| 2566 | break; |
| 2567 | |
| 2568 | case ARG_USER: |
| 2569 | arg_user = true1; |
| 2570 | break; |
| 2571 | |
| 2572 | case ARG_CREATE: |
| 2573 | arg_create = true1; |
| 2574 | break; |
| 2575 | |
| 2576 | case ARG_CLEAN: |
| 2577 | arg_clean = true1; |
| 2578 | break; |
| 2579 | |
| 2580 | case ARG_REMOVE: |
| 2581 | arg_remove = true1; |
| 2582 | break; |
| 2583 | |
| 2584 | case ARG_BOOT: |
| 2585 | arg_boot = true1; |
| 2586 | break; |
| 2587 | |
| 2588 | case ARG_PREFIX: |
| 2589 | if (strv_push(&arg_include_prefixes, optarg) < 0) |
| 2590 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2590, __func__); |
| 2591 | break; |
| 2592 | |
| 2593 | case ARG_EXCLUDE_PREFIX: |
| 2594 | if (strv_push(&arg_exclude_prefixes, optarg) < 0) |
| 2595 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2595, __func__); |
| 2596 | break; |
| 2597 | |
| 2598 | case ARG_ROOT: |
| 2599 | r = parse_path_argument_and_warn(optarg, true1, &arg_root); |
| 2600 | if (r < 0) |
| 2601 | return r; |
| 2602 | break; |
| 2603 | |
| 2604 | case ARG_REPLACE: |
| 2605 | if (!path_is_absolute(optarg) || |
| 2606 | !endswith(optarg, ".conf")) { |
| 2607 | log_error("The argument to --replace= must an absolute path to a config file")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2607, __func__, "The argument to --replace= must an absolute path to a config file" ) : -abs(_e); }); |
| 2608 | return -EINVAL22; |
| 2609 | } |
| 2610 | |
| 2611 | arg_replace = optarg; |
| 2612 | break; |
| 2613 | |
| 2614 | case ARG_NO_PAGER: |
| 2615 | arg_no_pager = true1; |
| 2616 | break; |
| 2617 | |
| 2618 | case '?': |
| 2619 | return -EINVAL22; |
| 2620 | |
| 2621 | default: |
| 2622 | assert_not_reached("Unhandled option")do { log_assert_failed_unreachable_realm(LOG_REALM_SYSTEMD, ( "Unhandled option"), "../src/tmpfiles/tmpfiles.c", 2622, __PRETTY_FUNCTION__ ); } while (0); |
| 2623 | } |
| 2624 | |
| 2625 | if (!arg_clean && !arg_create && !arg_remove && !arg_cat_config) { |
| 2626 | log_error("You need to specify at least one of --clean, --create or --remove.")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2626, __func__, "You need to specify at least one of --clean, --create or --remove." ) : -abs(_e); }); |
| 2627 | return -EINVAL22; |
| 2628 | } |
| 2629 | |
| 2630 | if (arg_replace && arg_cat_config) { |
| 2631 | log_error("Option --replace= is not supported with --cat-config")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2631, __func__, "Option --replace= is not supported with --cat-config" ) : -abs(_e); }); |
| 2632 | return -EINVAL22; |
| 2633 | } |
| 2634 | |
| 2635 | if (arg_replace && optind >= argc) { |
| 2636 | log_error("When --replace= is given, some configuration items must be specified")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2636, __func__, "When --replace= is given, some configuration items must be specified" ) : -abs(_e); }); |
| 2637 | return -EINVAL22; |
| 2638 | } |
| 2639 | |
| 2640 | return 1; |
| 2641 | } |
| 2642 | |
| 2643 | static int read_config_file(char **config_dirs, const char *fn, bool_Bool ignore_enoent, bool_Bool *invalid_config) { |
| 2644 | _cleanup_fclose___attribute__((cleanup(fclosep))) FILE *_f = NULL((void*)0); |
| 2645 | FILE *f; |
| 2646 | char line[LINE_MAX2048]; |
| 2647 | Iterator iterator; |
| 2648 | unsigned v = 0; |
| 2649 | Item *i; |
| 2650 | int r = 0; |
| 2651 | |
| 2652 | assert(fn)do { if ((__builtin_expect(!!(!(fn)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("fn"), "../src/tmpfiles/tmpfiles.c", 2652 , __PRETTY_FUNCTION__); } while (0); |
| 2653 | |
| 2654 | if (streq(fn, "-")(strcmp((fn),("-")) == 0)) { |
| 2655 | log_debug("Reading config from stdin…")({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2655, __func__, "Reading config from stdin…" ) : -abs(_e); }); |
| 2656 | fn = "<stdin>"; |
| 2657 | f = stdinstdin; |
| 2658 | } else { |
| 2659 | r = search_and_fopen(fn, "re", arg_root, (const char**) config_dirs, &_f); |
| 2660 | if (r < 0) { |
| 2661 | if (ignore_enoent && r == -ENOENT2) { |
| 2662 | log_debug_errno(r, "Failed to open \"%s\", ignoring: %m", fn)({ int _level = ((7)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2662, __func__, "Failed to open \"%s\", ignoring: %m" , fn) : -abs(_e); }); |
| 2663 | return 0; |
| 2664 | } |
| 2665 | |
| 2666 | return log_error_errno(r, "Failed to open '%s': %m", fn)({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2666, __func__, "Failed to open '%s': %m" , fn) : -abs(_e); }); |
| 2667 | } |
| 2668 | log_debug("Reading config file \"%s\"…", fn)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2668, __func__, "Reading config file \"%s\"…" , fn) : -abs(_e); }); |
| 2669 | f = _f; |
| 2670 | } |
| 2671 | |
| 2672 | FOREACH_LINE(line, f, break)for (;;) if (!fgets(line, sizeof(line), f)) { if (ferror(f)) { break; } break; } else { |
| 2673 | char *l; |
| 2674 | int k; |
| 2675 | bool_Bool invalid_line = false0; |
| 2676 | |
| 2677 | v++; |
| 2678 | |
| 2679 | l = strstrip(line); |
| 2680 | if (IN_SET(*l, 0, '#')({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){0, '#'})/sizeof(int)]; switch(*l) { case 0: case '#': _found = 1; break; default: break; } _found; })) |
| 2681 | continue; |
| 2682 | |
| 2683 | k = parse_line(fn, v, l, &invalid_line); |
| 2684 | if (k < 0) { |
| 2685 | if (invalid_line) |
| 2686 | /* Allow reporting with a special code if the caller requested this */ |
| 2687 | *invalid_config = true1; |
| 2688 | else if (r == 0) |
| 2689 | /* The first error becomes our return value */ |
| 2690 | r = k; |
| 2691 | } |
| 2692 | } |
| 2693 | |
| 2694 | /* we have to determine age parameter for each entry of type X */ |
| 2695 | ORDERED_HASHMAP_FOREACH(i, globs, iterator)for ((iterator) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), .next_key = ((void*)0) }); ordered_hashmap_iterate((globs ), &(iterator), (void**)&(i), ((void*)0)); ) { |
| 2696 | Iterator iter; |
| 2697 | Item *j, *candidate_item = NULL((void*)0); |
| 2698 | |
| 2699 | if (i->type != IGNORE_DIRECTORY_PATH) |
| 2700 | continue; |
| 2701 | |
| 2702 | ORDERED_HASHMAP_FOREACH(j, items, iter)for ((iter) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1) , .next_key = ((void*)0) }); ordered_hashmap_iterate((items), &(iter), (void**)&(j), ((void*)0)); ) { |
| 2703 | if (!IN_SET(j->type, CREATE_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME, CREATE_SUBVOLUME_INHERIT_QUOTA, CREATE_SUBVOLUME_NEW_QUOTA)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){CREATE_DIRECTORY, TRUNCATE_DIRECTORY, CREATE_SUBVOLUME , CREATE_SUBVOLUME_INHERIT_QUOTA, CREATE_SUBVOLUME_NEW_QUOTA} )/sizeof(int)]; switch(j->type) { case CREATE_DIRECTORY: case TRUNCATE_DIRECTORY: case CREATE_SUBVOLUME: case CREATE_SUBVOLUME_INHERIT_QUOTA : case CREATE_SUBVOLUME_NEW_QUOTA: _found = 1; break; default : break; } _found; })) |
| 2704 | continue; |
| 2705 | |
| 2706 | if (path_equal(j->path, i->path)) { |
| 2707 | candidate_item = j; |
| 2708 | break; |
| 2709 | } |
| 2710 | |
| 2711 | if ((!candidate_item && path_startswith(i->path, j->path)) || |
| 2712 | (candidate_item && path_startswith(j->path, candidate_item->path) && (fnmatch(i->path, j->path, FNM_PATHNAME(1 << 0) | FNM_PERIOD(1 << 2)) == 0))) |
| 2713 | candidate_item = j; |
| 2714 | } |
| 2715 | |
| 2716 | if (candidate_item && candidate_item->age_set) { |
| 2717 | i->age = candidate_item->age; |
| 2718 | i->age_set = true1; |
| 2719 | } |
| 2720 | } |
| 2721 | |
| 2722 | if (ferror(f)) { |
| 2723 | log_error_errno(errno, "Failed to read from file %s: %m", fn)({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tmpfiles/tmpfiles.c", 2723, __func__ , "Failed to read from file %s: %m", fn) : -abs(_e); }); |
| 2724 | if (r == 0) |
| 2725 | r = -EIO5; |
| 2726 | } |
| 2727 | |
| 2728 | return r; |
| 2729 | } |
| 2730 | |
| 2731 | static int parse_arguments(char **config_dirs, char **args, bool_Bool *invalid_config) { |
| 2732 | char **arg; |
| 2733 | int r; |
| 2734 | |
| 2735 | STRV_FOREACH(arg, args)for ((arg) = (args); (arg) && *(arg); (arg)++) { |
| 2736 | r = read_config_file(config_dirs, *arg, false0, invalid_config); |
| 2737 | if (r < 0) |
| 2738 | return r; |
| 2739 | } |
| 2740 | |
| 2741 | return 0; |
| 2742 | } |
| 2743 | |
| 2744 | static int read_config_files(char **config_dirs, char **args, bool_Bool *invalid_config) { |
| 2745 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **files = NULL((void*)0); |
| 2746 | _cleanup_free___attribute__((cleanup(freep))) char *p = NULL((void*)0); |
| 2747 | char **f; |
| 2748 | int r; |
| 2749 | |
| 2750 | r = conf_files_list_with_replacement(arg_root, config_dirs, arg_replace, &files, &p); |
| 2751 | if (r < 0) |
| 2752 | return r; |
| 2753 | |
| 2754 | STRV_FOREACH(f, files)for ((f) = (files); (f) && *(f); (f)++) |
| 2755 | if (p && path_equal(*f, p)) { |
| 2756 | log_debug("Parsing arguments at position \"%s\"…", *f)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2756, __func__, "Parsing arguments at position \"%s\"…" , *f) : -abs(_e); }); |
| 2757 | |
| 2758 | r = parse_arguments(config_dirs, args, invalid_config); |
| 2759 | if (r < 0) |
| 2760 | return r; |
| 2761 | } else |
| 2762 | /* Just warn, ignore result otherwise. |
| 2763 | * read_config_file() has some debug output, so no need to print anything. */ |
| 2764 | (void) read_config_file(config_dirs, *f, true1, invalid_config); |
| 2765 | |
| 2766 | return 0; |
| 2767 | } |
| 2768 | |
| 2769 | int main(int argc, char *argv[]) { |
| 2770 | int r, k, r_process = 0; |
| 2771 | ItemArray *a; |
| 2772 | Iterator iterator; |
| 2773 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **config_dirs = NULL((void*)0); |
| 2774 | bool_Bool invalid_config = false0; |
| 2775 | |
| 2776 | r = parse_argv(argc, argv); |
| 2777 | if (r <= 0) |
| 2778 | goto finish; |
| 2779 | |
| 2780 | log_set_target(LOG_TARGET_AUTO); |
| 2781 | log_parse_environment()log_parse_environment_realm(LOG_REALM_SYSTEMD); |
| 2782 | log_open(); |
| 2783 | |
| 2784 | if (arg_user) { |
| 2785 | r = user_config_paths(&config_dirs); |
| 2786 | if (r < 0) { |
| 2787 | log_error_errno(r, "Failed to initialize configuration directory list: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2787, __func__, "Failed to initialize configuration directory list: %m" ) : -abs(_e); }); |
| 2788 | goto finish; |
| 2789 | } |
| 2790 | } else { |
| 2791 | config_dirs = strv_split_nulstr(CONF_PATHS_NULSTR("tmpfiles.d")"/etc/" "tmpfiles.d" "\0" "/run/" "tmpfiles.d" "\0" "/usr/local/lib/" "tmpfiles.d" "\0" "/usr/lib/" "tmpfiles.d" "\0"); |
| 2792 | if (!config_dirs) { |
| 2793 | r = log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2793, __func__); |
| 2794 | goto finish; |
| 2795 | } |
| 2796 | } |
| 2797 | |
| 2798 | if (DEBUG_LOGGING(__builtin_expect(!!(log_get_max_level_realm(LOG_REALM_SYSTEMD ) >= 7),0))) { |
| 2799 | _cleanup_free___attribute__((cleanup(freep))) char *t = NULL((void*)0); |
| 2800 | |
| 2801 | t = strv_join(config_dirs, "\n\t"); |
| 2802 | if (t) |
| 2803 | log_debug("Looking for configuration files in (higher priority first):\n\t%s", t)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tmpfiles/tmpfiles.c", 2803, __func__, "Looking for configuration files in (higher priority first):\n\t%s" , t) : -abs(_e); }); |
| 2804 | } |
| 2805 | |
| 2806 | if (arg_cat_config) { |
| 2807 | (void) pager_open(arg_no_pager, false0); |
| 2808 | |
| 2809 | r = cat_config(config_dirs, argv + optind); |
| 2810 | goto finish; |
| 2811 | } |
| 2812 | |
| 2813 | umask(0022); |
| 2814 | |
| 2815 | mac_selinux_init(); |
| 2816 | |
| 2817 | items = ordered_hashmap_new(&string_hash_ops)internal_ordered_hashmap_new(&string_hash_ops ); |
| 2818 | globs = ordered_hashmap_new(&string_hash_ops)internal_ordered_hashmap_new(&string_hash_ops ); |
| 2819 | |
| 2820 | if (!items || !globs) { |
| 2821 | r = log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tmpfiles/tmpfiles.c" , 2821, __func__); |
| 2822 | goto finish; |
| 2823 | } |
| 2824 | |
| 2825 | /* If command line arguments are specified along with --replace, read all |
| 2826 | * configuration files and insert the positional arguments at the specified |
| 2827 | * place. Otherwise, if command line arguments are specified, execute just |
| 2828 | * them, and finally, without --replace= or any positional arguments, just |
| 2829 | * read configuration and execute it. |
| 2830 | */ |
| 2831 | if (arg_replace || optind >= argc) |
| 2832 | r = read_config_files(config_dirs, argv + optind, &invalid_config); |
| 2833 | else |
| 2834 | r = parse_arguments(config_dirs, argv + optind, &invalid_config); |
| 2835 | if (r < 0) |
| 2836 | goto finish; |
| 2837 | |
| 2838 | /* The non-globbing ones usually create things, hence we apply |
| 2839 | * them first */ |
| 2840 | ORDERED_HASHMAP_FOREACH(a, items, iterator)for ((iterator) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), .next_key = ((void*)0) }); ordered_hashmap_iterate((items ), &(iterator), (void**)&(a), ((void*)0)); ) { |
| 2841 | k = process_item_array(a); |
| 2842 | if (k < 0 && r_process == 0) |
| 2843 | r_process = k; |
| 2844 | } |
| 2845 | |
| 2846 | /* The globbing ones usually alter things, hence we apply them |
| 2847 | * second. */ |
| 2848 | ORDERED_HASHMAP_FOREACH(a, globs, iterator)for ((iterator) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), .next_key = ((void*)0) }); ordered_hashmap_iterate((globs ), &(iterator), (void**)&(a), ((void*)0)); ) { |
| 2849 | k = process_item_array(a); |
| 2850 | if (k < 0 && r_process == 0) |
| 2851 | r_process = k; |
| 2852 | } |
| 2853 | |
| 2854 | finish: |
| 2855 | pager_close(); |
| 2856 | |
| 2857 | ordered_hashmap_free_with_destructor(items, item_array_free)({ ({ void *_item; while ((_item = ordered_hashmap_steal_first (items))) item_array_free(_item); }); ordered_hashmap_free(items ); }); |
| 2858 | ordered_hashmap_free_with_destructor(globs, item_array_free)({ ({ void *_item; while ((_item = ordered_hashmap_steal_first (globs))) item_array_free(_item); }); ordered_hashmap_free(globs ); }); |
| 2859 | |
| 2860 | free(arg_include_prefixes); |
| 2861 | free(arg_exclude_prefixes); |
| 2862 | free(arg_root); |
| 2863 | |
| 2864 | set_free_free(unix_sockets); |
| 2865 | |
| 2866 | mac_selinux_finish(); |
| 2867 | |
| 2868 | if (r < 0 || ERRNO_IS_RESOURCE(-r_process)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){12, 24, 23})/sizeof(int)]; switch(-r_process ) { case 12: case 24: case 23: _found = 1; break; default: break ; } _found; })) |
| 2869 | return EXIT_FAILURE1; |
| 2870 | else if (invalid_config) |
| 2871 | return EX_DATAERR65; |
| 2872 | else if (r_process < 0) |
| 2873 | return EX_CANTCREAT73; |
| 2874 | else |
| 2875 | return EXIT_SUCCESS0; |
| 2876 | } |