File: | build-scan/../src/tty-ask-password-agent/tty-ask-password-agent.c |
Warning: | line 105, column 24 Potential leak of memory pointed to by 'packet' |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | /* SPDX-License-Identifier: LGPL-2.1+ */ | |||
2 | /*** | |||
3 | Copyright © 2015 Werner Fink | |||
4 | ***/ | |||
5 | ||||
6 | #include <errno(*__errno_location ()).h> | |||
7 | #include <fcntl.h> | |||
8 | #include <getopt.h> | |||
9 | #include <poll.h> | |||
10 | #include <signal.h> | |||
11 | #include <stdbool.h> | |||
12 | #include <stddef.h> | |||
13 | #include <string.h> | |||
14 | #include <sys/inotify.h> | |||
15 | #include <sys/prctl.h> | |||
16 | #include <sys/signalfd.h> | |||
17 | #include <sys/socket.h> | |||
18 | #include <sys/wait.h> | |||
19 | #include <sys/un.h> | |||
20 | #include <unistd.h> | |||
21 | ||||
22 | #include "alloc-util.h" | |||
23 | #include "ask-password-api.h" | |||
24 | #include "conf-parser.h" | |||
25 | #include "def.h" | |||
26 | #include "dirent-util.h" | |||
27 | #include "exit-status.h" | |||
28 | #include "fd-util.h" | |||
29 | #include "fileio.h" | |||
30 | #include "hashmap.h" | |||
31 | #include "io-util.h" | |||
32 | #include "macro.h" | |||
33 | #include "mkdir.h" | |||
34 | #include "path-util.h" | |||
35 | #include "process-util.h" | |||
36 | #include "signal-util.h" | |||
37 | #include "socket-util.h" | |||
38 | #include "string-util.h" | |||
39 | #include "strv.h" | |||
40 | #include "terminal-util.h" | |||
41 | #include "util.h" | |||
42 | #include "utmp-wtmp.h" | |||
43 | ||||
44 | static enum { | |||
45 | ACTION_LIST, | |||
46 | ACTION_QUERY, | |||
47 | ACTION_WATCH, | |||
48 | ACTION_WALL | |||
49 | } arg_action = ACTION_QUERY; | |||
50 | ||||
51 | static bool_Bool arg_plymouth = false0; | |||
52 | static bool_Bool arg_console = false0; | |||
53 | static const char *arg_device = NULL((void*)0); | |||
54 | ||||
55 | static int ask_password_plymouth( | |||
56 | const char *message, | |||
57 | usec_t until, | |||
58 | AskPasswordFlags flags, | |||
59 | const char *flag_file, | |||
60 | char ***ret) { | |||
61 | ||||
62 | static const union sockaddr_union sa = PLYMOUTH_SOCKET{ .un.sun_family = 1, .un.sun_path = "\0/org/freedesktop/plymouthd" , }; | |||
63 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1, notify = -1; | |||
64 | _cleanup_free___attribute__((cleanup(freep))) char *packet = NULL((void*)0); | |||
65 | ssize_t k; | |||
66 | int r, n; | |||
67 | struct pollfd pollfd[2] = {}; | |||
68 | char buffer[LINE_MAX2048]; | |||
69 | size_t p = 0; | |||
70 | enum { | |||
71 | POLL_SOCKET, | |||
72 | POLL_INOTIFY | |||
73 | }; | |||
74 | ||||
75 | assert(ret)do { if ((__builtin_expect(!!(!(ret)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("ret"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 75, __PRETTY_FUNCTION__); } while (0); | |||
| ||||
76 | ||||
77 | if (flag_file) { | |||
78 | notify = inotify_init1(IN_CLOEXECIN_CLOEXEC|IN_NONBLOCKIN_NONBLOCK); | |||
79 | if (notify < 0) | |||
80 | return -errno(*__errno_location ()); | |||
81 | ||||
82 | r = inotify_add_watch(notify, flag_file, IN_ATTRIB0x00000004); /* for the link count */ | |||
83 | if (r < 0) | |||
84 | return -errno(*__errno_location ()); | |||
85 | } | |||
86 | ||||
87 | fd = socket(AF_UNIX1, SOCK_STREAMSOCK_STREAM|SOCK_CLOEXECSOCK_CLOEXEC|SOCK_NONBLOCKSOCK_NONBLOCK, 0); | |||
88 | if (fd < 0) | |||
89 | return -errno(*__errno_location ()); | |||
90 | ||||
91 | r = connect(fd, &sa.sa, SOCKADDR_UN_LEN(sa.un)({ const struct sockaddr_un *_sa = &(sa.un); do { if ((__builtin_expect (!!(!(_sa->sun_family == 1)),0))) log_assert_failed_realm( LOG_REALM_SYSTEMD, ("_sa->sun_family == AF_UNIX"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 91, __PRETTY_FUNCTION__); } while (0); __builtin_offsetof(struct sockaddr_un, sun_path) + (_sa->sun_path[0] == 0 ? 1 + strnlen (_sa->sun_path+1, sizeof(_sa->sun_path)-1) : strnlen(_sa ->sun_path, sizeof(_sa->sun_path))); })); | |||
92 | if (r < 0) | |||
93 | return -errno(*__errno_location ()); | |||
94 | ||||
95 | if (flags & ASK_PASSWORD_ACCEPT_CACHED) { | |||
96 | packet = strdup("c"); | |||
97 | n = 1; | |||
98 | } else if (asprintf(&packet, "*\002%c%s%n", (int) (strlen(message) + 1), message, &n) < 0) | |||
99 | packet = NULL((void*)0); | |||
100 | if (!packet) | |||
101 | return -ENOMEM12; | |||
102 | ||||
103 | r = loop_write(fd, packet, n + 1, true1); | |||
104 | if (r < 0) | |||
105 | return r; | |||
| ||||
106 | ||||
107 | pollfd[POLL_SOCKET].fd = fd; | |||
108 | pollfd[POLL_SOCKET].events = POLLIN0x001; | |||
109 | pollfd[POLL_INOTIFY].fd = notify; | |||
110 | pollfd[POLL_INOTIFY].events = POLLIN0x001; | |||
111 | ||||
112 | for (;;) { | |||
113 | int sleep_for = -1, j; | |||
114 | ||||
115 | if (until > 0) { | |||
116 | usec_t y; | |||
117 | ||||
118 | y = now(CLOCK_MONOTONIC1); | |||
119 | ||||
120 | if (y > until) { | |||
121 | r = -ETIME62; | |||
122 | goto finish; | |||
123 | } | |||
124 | ||||
125 | sleep_for = (int) ((until - y) / USEC_PER_MSEC((usec_t) 1000ULL)); | |||
126 | } | |||
127 | ||||
128 | if (flag_file && access(flag_file, F_OK0) < 0) { | |||
129 | r = -errno(*__errno_location ()); | |||
130 | goto finish; | |||
131 | } | |||
132 | ||||
133 | j = poll(pollfd, notify >= 0 ? 2 : 1, sleep_for); | |||
134 | if (j < 0) { | |||
135 | if (errno(*__errno_location ()) == EINTR4) | |||
136 | continue; | |||
137 | ||||
138 | r = -errno(*__errno_location ()); | |||
139 | goto finish; | |||
140 | } else if (j == 0) { | |||
141 | r = -ETIME62; | |||
142 | goto finish; | |||
143 | } | |||
144 | ||||
145 | if (notify >= 0 && pollfd[POLL_INOTIFY].revents != 0) | |||
146 | (void) flush_fd(notify); | |||
147 | ||||
148 | if (pollfd[POLL_SOCKET].revents == 0) | |||
149 | continue; | |||
150 | ||||
151 | k = read(fd, buffer + p, sizeof(buffer) - p); | |||
152 | if (k < 0) { | |||
153 | if (IN_SET(errno, EINTR, EAGAIN)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){4, 11})/sizeof(int)]; switch((*__errno_location ())) { case 4: case 11: _found = 1; break; default: break; } _found; })) | |||
154 | continue; | |||
155 | ||||
156 | r = -errno(*__errno_location ()); | |||
157 | goto finish; | |||
158 | } else if (k == 0) { | |||
159 | r = -EIO5; | |||
160 | goto finish; | |||
161 | } | |||
162 | ||||
163 | p += k; | |||
164 | ||||
165 | if (p < 1) | |||
166 | continue; | |||
167 | ||||
168 | if (buffer[0] == 5) { | |||
169 | ||||
170 | if (flags & ASK_PASSWORD_ACCEPT_CACHED) { | |||
171 | /* Hmm, first try with cached | |||
172 | * passwords failed, so let's retry | |||
173 | * with a normal password request */ | |||
174 | packet = mfree(packet); | |||
175 | ||||
176 | if (asprintf(&packet, "*\002%c%s%n", (int) (strlen(message) + 1), message, &n) < 0) { | |||
177 | r = -ENOMEM12; | |||
178 | goto finish; | |||
179 | } | |||
180 | ||||
181 | r = loop_write(fd, packet, n+1, true1); | |||
182 | if (r < 0) | |||
183 | goto finish; | |||
184 | ||||
185 | flags &= ~ASK_PASSWORD_ACCEPT_CACHED; | |||
186 | p = 0; | |||
187 | continue; | |||
188 | } | |||
189 | ||||
190 | /* No password, because UI not shown */ | |||
191 | r = -ENOENT2; | |||
192 | goto finish; | |||
193 | ||||
194 | } else if (IN_SET(buffer[0], 2, 9)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){2, 9})/sizeof(int)]; switch(buffer[0]) { case 2: case 9: _found = 1; break; default: break; } _found; })) { | |||
195 | uint32_t size; | |||
196 | char **l; | |||
197 | ||||
198 | /* One or more answers */ | |||
199 | if (p < 5) | |||
200 | continue; | |||
201 | ||||
202 | memcpy(&size, buffer+1, sizeof(size)); | |||
203 | size = le32toh(size)__uint32_identity (size); | |||
204 | if (size + 5 > sizeof(buffer)) { | |||
205 | r = -EIO5; | |||
206 | goto finish; | |||
207 | } | |||
208 | ||||
209 | if (p-5 < size) | |||
210 | continue; | |||
211 | ||||
212 | l = strv_parse_nulstr(buffer + 5, size); | |||
213 | if (!l) { | |||
214 | r = -ENOMEM12; | |||
215 | goto finish; | |||
216 | } | |||
217 | ||||
218 | *ret = l; | |||
219 | break; | |||
220 | ||||
221 | } else { | |||
222 | /* Unknown packet */ | |||
223 | r = -EIO5; | |||
224 | goto finish; | |||
225 | } | |||
226 | } | |||
227 | ||||
228 | r = 0; | |||
229 | ||||
230 | finish: | |||
231 | explicit_bzero(buffer, sizeof(buffer)); | |||
232 | return r; | |||
233 | } | |||
234 | ||||
235 | static int send_passwords(const char *socket_name, char **passwords) { | |||
236 | _cleanup_free___attribute__((cleanup(freep))) char *packet = NULL((void*)0); | |||
237 | _cleanup_close___attribute__((cleanup(closep))) int socket_fd = -1; | |||
238 | union sockaddr_union sa = { .un.sun_family = AF_UNIX1 }; | |||
239 | size_t packet_length = 1; | |||
240 | char **p, *d; | |||
241 | ssize_t n; | |||
242 | int r; | |||
243 | ||||
244 | assert(socket_name)do { if ((__builtin_expect(!!(!(socket_name)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("socket_name"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 244, __PRETTY_FUNCTION__); } while (0); | |||
245 | ||||
246 | STRV_FOREACH(p, passwords)for ((p) = (passwords); (p) && *(p); (p)++) | |||
247 | packet_length += strlen(*p) + 1; | |||
248 | ||||
249 | packet = new(char, packet_length)((char*) malloc_multiply(sizeof(char), (packet_length))); | |||
250 | if (!packet) | |||
251 | return -ENOMEM12; | |||
252 | ||||
253 | packet[0] = '+'; | |||
254 | ||||
255 | d = packet + 1; | |||
256 | STRV_FOREACH(p, passwords)for ((p) = (passwords); (p) && *(p); (p)++) | |||
257 | d = stpcpy(d, *p) + 1; | |||
258 | ||||
259 | socket_fd = socket(AF_UNIX1, SOCK_DGRAMSOCK_DGRAM|SOCK_CLOEXECSOCK_CLOEXEC, 0); | |||
260 | if (socket_fd < 0) { | |||
261 | r = log_debug_errno(errno, "socket(): %m")({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 261, __func__, "socket(): %m") : -abs(_e); }); | |||
262 | goto finish; | |||
263 | } | |||
264 | ||||
265 | strncpy(sa.un.sun_path, socket_name, sizeof(sa.un.sun_path)); | |||
266 | ||||
267 | n = sendto(socket_fd, packet, packet_length, MSG_NOSIGNALMSG_NOSIGNAL, &sa.sa, SOCKADDR_UN_LEN(sa.un)({ const struct sockaddr_un *_sa = &(sa.un); do { if ((__builtin_expect (!!(!(_sa->sun_family == 1)),0))) log_assert_failed_realm( LOG_REALM_SYSTEMD, ("_sa->sun_family == AF_UNIX"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 267, __PRETTY_FUNCTION__); } while (0); __builtin_offsetof( struct sockaddr_un, sun_path) + (_sa->sun_path[0] == 0 ? 1 + strnlen(_sa->sun_path+1, sizeof(_sa->sun_path)-1) : strnlen (_sa->sun_path, sizeof(_sa->sun_path))); })); | |||
268 | if (n < 0) { | |||
269 | r = log_debug_errno(errno, "sendto(): %m")({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 269, __func__, "sendto(): %m") : -abs(_e); }); | |||
270 | goto finish; | |||
271 | } | |||
272 | ||||
273 | r = (int) n; | |||
274 | ||||
275 | finish: | |||
276 | explicit_bzero(packet, packet_length); | |||
277 | return r; | |||
278 | } | |||
279 | ||||
280 | static int parse_password(const char *filename, char **wall) { | |||
281 | _cleanup_free___attribute__((cleanup(freep))) char *socket_name = NULL((void*)0), *message = NULL((void*)0); | |||
282 | bool_Bool accept_cached = false0, echo = false0; | |||
283 | uint64_t not_after = 0; | |||
284 | unsigned pid = 0; | |||
285 | ||||
286 | const ConfigTableItem items[] = { | |||
287 | { "Ask", "Socket", config_parse_string, 0, &socket_name }, | |||
288 | { "Ask", "NotAfter", config_parse_uint64, 0, ¬_after }, | |||
289 | { "Ask", "Message", config_parse_string, 0, &message }, | |||
290 | { "Ask", "PID", config_parse_unsigned, 0, &pid }, | |||
291 | { "Ask", "AcceptCached", config_parse_bool, 0, &accept_cached }, | |||
292 | { "Ask", "Echo", config_parse_bool, 0, &echo }, | |||
293 | {} | |||
294 | }; | |||
295 | ||||
296 | int r; | |||
297 | ||||
298 | assert(filename)do { if ((__builtin_expect(!!(!(filename)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("filename"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 298, __PRETTY_FUNCTION__); } while (0); | |||
299 | ||||
300 | r = config_parse(NULL((void*)0), filename, NULL((void*)0), | |||
301 | NULL((void*)0), | |||
302 | config_item_table_lookup, items, | |||
303 | CONFIG_PARSE_RELAXED|CONFIG_PARSE_WARN, NULL((void*)0)); | |||
304 | if (r < 0) | |||
305 | return r; | |||
306 | ||||
307 | if (!socket_name) { | |||
308 | log_error("Invalid password file %s", filename)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 308 , __func__, "Invalid password file %s", filename) : -abs(_e); }); | |||
309 | return -EBADMSG74; | |||
310 | } | |||
311 | ||||
312 | if (not_after > 0 && now(CLOCK_MONOTONIC1) > not_after) | |||
313 | return 0; | |||
314 | ||||
315 | if (pid > 0 && !pid_is_alive(pid)) | |||
316 | return 0; | |||
317 | ||||
318 | if (arg_action == ACTION_LIST) | |||
319 | printf("'%s' (PID %u)\n", message, pid); | |||
320 | ||||
321 | else if (arg_action == ACTION_WALL) { | |||
322 | char *_wall; | |||
323 | ||||
324 | if (asprintf(&_wall, | |||
325 | "%s%sPassword entry required for \'%s\' (PID %u).\r\n" | |||
326 | "Please enter password with the systemd-tty-ask-password-agent tool!", | |||
327 | strempty(*wall), | |||
328 | *wall ? "\r\n\r\n" : "", | |||
329 | message, | |||
330 | pid) < 0) | |||
331 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 331, __func__); | |||
332 | ||||
333 | free(*wall); | |||
334 | *wall = _wall; | |||
335 | ||||
336 | } else { | |||
337 | _cleanup_strv_free_erase___attribute__((cleanup(strv_free_erasep))) char **passwords = NULL((void*)0); | |||
338 | ||||
339 | assert(IN_SET(arg_action, ACTION_QUERY, ACTION_WATCH))do { if ((__builtin_expect(!!(!(({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended[20 - sizeof((int[]){ACTION_QUERY, ACTION_WATCH})/sizeof(int)]; switch (arg_action) { case ACTION_QUERY: case ACTION_WATCH: _found = 1; break; default: break; } _found; }))),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("IN_SET(arg_action, ACTION_QUERY, ACTION_WATCH)" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 339 , __PRETTY_FUNCTION__); } while (0); | |||
340 | ||||
341 | if (access(socket_name, W_OK2) < 0) { | |||
342 | if (arg_action == ACTION_QUERY) | |||
343 | log_info("Not querying '%s' (PID %u), lacking privileges.", message, pid)({ int _level = (((6))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 343 , __func__, "Not querying '%s' (PID %u), lacking privileges." , message, pid) : -abs(_e); }); | |||
344 | ||||
345 | return 0; | |||
346 | } | |||
347 | ||||
348 | if (arg_plymouth) | |||
349 | r = ask_password_plymouth(message, not_after, accept_cached ? ASK_PASSWORD_ACCEPT_CACHED : 0, filename, &passwords); | |||
350 | else { | |||
351 | char *password = NULL((void*)0); | |||
352 | int tty_fd = -1; | |||
353 | ||||
354 | if (arg_console) { | |||
355 | const char *con = arg_device ?: "/dev/console"; | |||
356 | ||||
357 | tty_fd = acquire_terminal(con, ACQUIRE_TERMINAL_WAIT, USEC_INFINITY((usec_t) -1)); | |||
358 | if (tty_fd < 0) | |||
359 | return log_error_errno(tty_fd, "Failed to acquire %s: %m", con)({ int _level = ((3)), _e = ((tty_fd)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 359 , __func__, "Failed to acquire %s: %m", con) : -abs(_e); }); | |||
360 | ||||
361 | r = reset_terminal_fd(tty_fd, true1); | |||
362 | if (r < 0) | |||
363 | log_warning_errno(r, "Failed to reset terminal, ignoring: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 363 , __func__, "Failed to reset terminal, ignoring: %m") : -abs( _e); }); | |||
364 | } | |||
365 | ||||
366 | r = ask_password_tty(tty_fd, message, NULL((void*)0), not_after, | |||
367 | (echo ? ASK_PASSWORD_ECHO : 0) | | |||
368 | (arg_console ? ASK_PASSWORD_CONSOLE_COLOR : 0), | |||
369 | filename, &password); | |||
370 | ||||
371 | if (arg_console) { | |||
372 | tty_fd = safe_close(tty_fd); | |||
373 | release_terminal(); | |||
374 | } | |||
375 | ||||
376 | if (r >= 0) | |||
377 | r = strv_push(&passwords, password); | |||
378 | ||||
379 | if (r < 0) | |||
380 | string_free_erase(password); | |||
381 | } | |||
382 | ||||
383 | /* If the query went away, that's OK */ | |||
384 | if (IN_SET(r, -ETIME, -ENOENT)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-62, -2})/sizeof(int)]; switch(r) { case -62: case -2: _found = 1; break; default: break; } _found; } )) | |||
385 | return 0; | |||
386 | ||||
387 | if (r < 0) | |||
388 | return log_error_errno(r, "Failed to query password: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 388 , __func__, "Failed to query password: %m") : -abs(_e); }); | |||
389 | ||||
390 | r = send_passwords(socket_name, passwords); | |||
391 | if (r < 0) | |||
392 | return log_error_errno(r, "Failed to send: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 392 , __func__, "Failed to send: %m") : -abs(_e); }); | |||
393 | } | |||
394 | ||||
395 | return 0; | |||
396 | } | |||
397 | ||||
398 | static int wall_tty_block(void) { | |||
399 | _cleanup_free___attribute__((cleanup(freep))) char *p = NULL((void*)0); | |||
400 | dev_t devnr; | |||
401 | int fd, r; | |||
402 | ||||
403 | r = get_ctty_devnr(0, &devnr); | |||
404 | if (r == -ENXIO6) /* We have no controlling tty */ | |||
405 | return -ENOTTY25; | |||
406 | if (r < 0) | |||
407 | return log_error_errno(r, "Failed to get controlling TTY: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 407 , __func__, "Failed to get controlling TTY: %m") : -abs(_e); } ); | |||
408 | ||||
409 | if (asprintf(&p, "/run/systemd/ask-password-block/%u:%u", major(devnr)gnu_dev_major (devnr), minor(devnr)gnu_dev_minor (devnr)) < 0) | |||
410 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 410, __func__); | |||
411 | ||||
412 | (void) mkdir_parents_label(p, 0700); | |||
413 | (void) mkfifo(p, 0600); | |||
414 | ||||
415 | fd = open(p, O_RDONLY00|O_CLOEXEC02000000|O_NONBLOCK04000|O_NOCTTY0400); | |||
416 | if (fd < 0) | |||
417 | return log_debug_errno(errno, "Failed to open %s: %m", p)({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 417, __func__, "Failed to open %s: %m", p) : -abs(_e); }); | |||
418 | ||||
419 | return fd; | |||
420 | } | |||
421 | ||||
422 | static bool_Bool wall_tty_match(const char *path, void *userdata) { | |||
423 | _cleanup_free___attribute__((cleanup(freep))) char *p = NULL((void*)0); | |||
424 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1; | |||
425 | struct stat st; | |||
426 | ||||
427 | if (!path_is_absolute(path)) | |||
428 | path = strjoina("/dev/", path)({ const char *_appendees_[] = { "/dev/", path }; char *_d_, * _p_; size_t _len_ = 0; size_t _i_; for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p(typeof (_appendees_), typeof(&*(_appendees_))), sizeof(_appendees_ )/sizeof((_appendees_)[0]), ((void)0))) && _appendees_ [_i_]; _i_++) _len_ += strlen(_appendees_[_i_]); _p_ = _d_ = __builtin_alloca (_len_ + 1); for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(_appendees_), typeof(& *(_appendees_))), sizeof(_appendees_)/sizeof((_appendees_)[0] ), ((void)0))) && _appendees_[_i_]; _i_++) _p_ = stpcpy (_p_, _appendees_[_i_]); *_p_ = 0; _d_; }); | |||
429 | ||||
430 | if (lstat(path, &st) < 0) { | |||
431 | log_debug_errno(errno, "Failed to stat %s: %m", path)({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 431, __func__, "Failed to stat %s: %m", path) : -abs(_e); } ); | |||
432 | return true1; | |||
433 | } | |||
434 | ||||
435 | if (!S_ISCHR(st.st_mode)((((st.st_mode)) & 0170000) == (0020000))) { | |||
436 | log_debug("%s is not a character device.", path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 436 , __func__, "%s is not a character device.", path) : -abs(_e) ; }); | |||
437 | return true1; | |||
438 | } | |||
439 | ||||
440 | /* We use named pipes to ensure that wall messages suggesting | |||
441 | * password entry are not printed over password prompts | |||
442 | * already shown. We use the fact here that opening a pipe in | |||
443 | * non-blocking mode for write-only will succeed only if | |||
444 | * there's some writer behind it. Using pipes has the | |||
445 | * advantage that the block will automatically go away if the | |||
446 | * process dies. */ | |||
447 | ||||
448 | if (asprintf(&p, "/run/systemd/ask-password-block/%u:%u", major(st.st_rdev)gnu_dev_major (st.st_rdev), minor(st.st_rdev)gnu_dev_minor (st.st_rdev)) < 0) { | |||
449 | log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 449, __func__); | |||
450 | return true1; | |||
451 | } | |||
452 | ||||
453 | fd = open(p, O_WRONLY01|O_CLOEXEC02000000|O_NONBLOCK04000|O_NOCTTY0400); | |||
454 | if (fd < 0) { | |||
455 | log_debug_errno(errno, "Failed to open the wall pipe: %m")({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 455, __func__, "Failed to open the wall pipe: %m") : -abs(_e ); }); | |||
456 | return 1; | |||
457 | } | |||
458 | ||||
459 | /* What, we managed to open the pipe? Then this tty is filtered. */ | |||
460 | return 0; | |||
461 | } | |||
462 | ||||
463 | static int show_passwords(void) { | |||
464 | _cleanup_closedir___attribute__((cleanup(closedirp))) DIR *d; | |||
465 | struct dirent *de; | |||
466 | int r = 0; | |||
467 | ||||
468 | d = opendir("/run/systemd/ask-password"); | |||
469 | if (!d) { | |||
470 | if (errno(*__errno_location ()) == ENOENT2) | |||
471 | return 0; | |||
472 | ||||
473 | return log_error_errno(errno, "Failed to open /run/systemd/ask-password: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 473, __func__, "Failed to open /run/systemd/ask-password: %m" ) : -abs(_e); }); | |||
474 | } | |||
475 | ||||
476 | FOREACH_DIRENT_ALL(de, d, return log_error_errno(errno, "Failed to read directory: %m"))for ((*__errno_location ()) = 0, de = readdir(d);; (*__errno_location ()) = 0, de = readdir(d)) if (!de) { if ((*__errno_location ( )) > 0) { return ({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 476, __func__, "Failed to read directory: %m") : -abs(_e); } ); } break; } else { | |||
477 | _cleanup_free___attribute__((cleanup(freep))) char *p = NULL((void*)0), *wall = NULL((void*)0); | |||
478 | int q; | |||
479 | ||||
480 | /* We only support /dev on tmpfs, hence we can rely on | |||
481 | * d_type to be reliable */ | |||
482 | ||||
483 | if (de->d_type != DT_REGDT_REG) | |||
484 | continue; | |||
485 | ||||
486 | if (hidden_or_backup_file(de->d_name)) | |||
487 | continue; | |||
488 | ||||
489 | if (!startswith(de->d_name, "ask.")) | |||
490 | continue; | |||
491 | ||||
492 | p = strappend("/run/systemd/ask-password/", de->d_name); | |||
493 | if (!p) | |||
494 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 494, __func__); | |||
495 | ||||
496 | q = parse_password(p, &wall); | |||
497 | if (q < 0 && r == 0) | |||
498 | r = q; | |||
499 | ||||
500 | if (wall) | |||
501 | (void) utmp_wall(wall, NULL((void*)0), NULL((void*)0), wall_tty_match, NULL((void*)0)); | |||
502 | } | |||
503 | ||||
504 | return r; | |||
505 | } | |||
506 | ||||
507 | static int watch_passwords(void) { | |||
508 | enum { | |||
509 | FD_INOTIFY, | |||
510 | FD_SIGNAL, | |||
511 | _FD_MAX | |||
512 | }; | |||
513 | ||||
514 | _cleanup_close___attribute__((cleanup(closep))) int notify = -1, signal_fd = -1, tty_block_fd = -1; | |||
515 | struct pollfd pollfd[_FD_MAX] = {}; | |||
516 | sigset_t mask; | |||
517 | int r; | |||
518 | ||||
519 | tty_block_fd = wall_tty_block(); | |||
520 | ||||
521 | (void) mkdir_p_label("/run/systemd/ask-password", 0755); | |||
522 | ||||
523 | notify = inotify_init1(IN_CLOEXECIN_CLOEXEC); | |||
524 | if (notify < 0) | |||
525 | return log_error_errno(errno, "Failed to allocate directory watch: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 525, __func__, "Failed to allocate directory watch: %m") : - abs(_e); }); | |||
526 | ||||
527 | if (inotify_add_watch(notify, "/run/systemd/ask-password", IN_CLOSE_WRITE0x00000008|IN_MOVED_TO0x00000080) < 0) | |||
528 | return log_error_errno(errno, "Failed to add /run/systemd/ask-password to directory watch: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 528, __func__, "Failed to add /run/systemd/ask-password to directory watch: %m" ) : -abs(_e); }); | |||
529 | ||||
530 | assert_se(sigemptyset(&mask) >= 0)do { if ((__builtin_expect(!!(!(sigemptyset(&mask) >= 0 )),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("sigemptyset(&mask) >= 0" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 530 , __PRETTY_FUNCTION__); } while (0); | |||
531 | assert_se(sigset_add_many(&mask, SIGINT, SIGTERM, -1) >= 0)do { if ((__builtin_expect(!!(!(sigset_add_many(&mask, 2, 15, -1) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("sigset_add_many(&mask, SIGINT, SIGTERM, -1) >= 0") , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 531 , __PRETTY_FUNCTION__); } while (0); | |||
532 | assert_se(sigprocmask(SIG_SETMASK, &mask, NULL) >= 0)do { if ((__builtin_expect(!!(!(sigprocmask(2, &mask, ((void *)0)) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("sigprocmask(SIG_SETMASK, &mask, NULL) >= 0"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 532, __PRETTY_FUNCTION__); } while (0); | |||
533 | ||||
534 | signal_fd = signalfd(-1, &mask, SFD_NONBLOCKSFD_NONBLOCK|SFD_CLOEXECSFD_CLOEXEC); | |||
535 | if (signal_fd < 0) | |||
536 | return log_error_errno(errno, "Failed to allocate signal file descriptor: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 536, __func__, "Failed to allocate signal file descriptor: %m" ) : -abs(_e); }); | |||
537 | ||||
538 | pollfd[FD_INOTIFY].fd = notify; | |||
539 | pollfd[FD_INOTIFY].events = POLLIN0x001; | |||
540 | pollfd[FD_SIGNAL].fd = signal_fd; | |||
541 | pollfd[FD_SIGNAL].events = POLLIN0x001; | |||
542 | ||||
543 | for (;;) { | |||
544 | r = show_passwords(); | |||
545 | if (r < 0) | |||
546 | log_error_errno(r, "Failed to show password: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 546 , __func__, "Failed to show password: %m") : -abs(_e); }); | |||
547 | ||||
548 | if (poll(pollfd, _FD_MAX, -1) < 0) { | |||
549 | if (errno(*__errno_location ()) == EINTR4) | |||
550 | continue; | |||
551 | ||||
552 | return -errno(*__errno_location ()); | |||
553 | } | |||
554 | ||||
555 | if (pollfd[FD_INOTIFY].revents != 0) | |||
556 | (void) flush_fd(notify); | |||
557 | ||||
558 | if (pollfd[FD_SIGNAL].revents != 0) | |||
559 | break; | |||
560 | } | |||
561 | ||||
562 | return 0; | |||
563 | } | |||
564 | ||||
565 | static void help(void) { | |||
566 | printf("%s [OPTIONS...]\n\n" | |||
567 | "Process system password requests.\n\n" | |||
568 | " -h --help Show this help\n" | |||
569 | " --version Show package version\n" | |||
570 | " --list Show pending password requests\n" | |||
571 | " --query Process pending password requests\n" | |||
572 | " --watch Continuously process password requests\n" | |||
573 | " --wall Continuously forward password requests to wall\n" | |||
574 | " --plymouth Ask question with Plymouth instead of on TTY\n" | |||
575 | " --console Ask question on /dev/console instead of current TTY\n", | |||
576 | program_invocation_short_name); | |||
577 | } | |||
578 | ||||
579 | static int parse_argv(int argc, char *argv[]) { | |||
580 | ||||
581 | enum { | |||
582 | ARG_LIST = 0x100, | |||
583 | ARG_QUERY, | |||
584 | ARG_WATCH, | |||
585 | ARG_WALL, | |||
586 | ARG_PLYMOUTH, | |||
587 | ARG_CONSOLE, | |||
588 | ARG_VERSION | |||
589 | }; | |||
590 | ||||
591 | static const struct option options[] = { | |||
592 | { "help", no_argument0, NULL((void*)0), 'h' }, | |||
593 | { "version", no_argument0, NULL((void*)0), ARG_VERSION }, | |||
594 | { "list", no_argument0, NULL((void*)0), ARG_LIST }, | |||
595 | { "query", no_argument0, NULL((void*)0), ARG_QUERY }, | |||
596 | { "watch", no_argument0, NULL((void*)0), ARG_WATCH }, | |||
597 | { "wall", no_argument0, NULL((void*)0), ARG_WALL }, | |||
598 | { "plymouth", no_argument0, NULL((void*)0), ARG_PLYMOUTH }, | |||
599 | { "console", optional_argument2, NULL((void*)0), ARG_CONSOLE }, | |||
600 | {} | |||
601 | }; | |||
602 | ||||
603 | int c; | |||
604 | ||||
605 | assert(argc >= 0)do { if ((__builtin_expect(!!(!(argc >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("argc >= 0"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 605, __PRETTY_FUNCTION__); } while (0); | |||
606 | assert(argv)do { if ((__builtin_expect(!!(!(argv)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("argv"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 606, __PRETTY_FUNCTION__); } while (0); | |||
607 | ||||
608 | while ((c = getopt_long(argc, argv, "h", options, NULL((void*)0))) >= 0) | |||
609 | ||||
610 | switch (c) { | |||
611 | ||||
612 | case 'h': | |||
613 | help(); | |||
614 | return 0; | |||
615 | ||||
616 | case ARG_VERSION: | |||
617 | return version(); | |||
618 | ||||
619 | case ARG_LIST: | |||
620 | arg_action = ACTION_LIST; | |||
621 | break; | |||
622 | ||||
623 | case ARG_QUERY: | |||
624 | arg_action = ACTION_QUERY; | |||
625 | break; | |||
626 | ||||
627 | case ARG_WATCH: | |||
628 | arg_action = ACTION_WATCH; | |||
629 | break; | |||
630 | ||||
631 | case ARG_WALL: | |||
632 | arg_action = ACTION_WALL; | |||
633 | break; | |||
634 | ||||
635 | case ARG_PLYMOUTH: | |||
636 | arg_plymouth = true1; | |||
637 | break; | |||
638 | ||||
639 | case ARG_CONSOLE: | |||
640 | arg_console = true1; | |||
641 | if (optarg) { | |||
642 | ||||
643 | if (isempty(optarg)) { | |||
644 | log_error("Empty console device path is not allowed.")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 644 , __func__, "Empty console device path is not allowed.") : -abs (_e); }); | |||
645 | return -EINVAL22; | |||
646 | } | |||
647 | ||||
648 | arg_device = optarg; | |||
649 | } | |||
650 | break; | |||
651 | ||||
652 | case '?': | |||
653 | return -EINVAL22; | |||
654 | ||||
655 | default: | |||
656 | assert_not_reached("Unhandled option")do { log_assert_failed_unreachable_realm(LOG_REALM_SYSTEMD, ( "Unhandled option"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 656, __PRETTY_FUNCTION__); } while (0); | |||
657 | } | |||
658 | ||||
659 | if (optind != argc) { | |||
660 | log_error("%s takes no arguments.", program_invocation_short_name)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 660 , __func__, "%s takes no arguments.", program_invocation_short_name ) : -abs(_e); }); | |||
661 | return -EINVAL22; | |||
662 | } | |||
663 | ||||
664 | if (arg_plymouth || arg_console) { | |||
665 | ||||
666 | if (!IN_SET(arg_action, ACTION_QUERY, ACTION_WATCH)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){ACTION_QUERY, ACTION_WATCH})/sizeof(int) ]; switch(arg_action) { case ACTION_QUERY: case ACTION_WATCH: _found = 1; break; default: break; } _found; })) { | |||
667 | log_error("Options --query and --watch conflict.")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 667 , __func__, "Options --query and --watch conflict.") : -abs(_e ); }); | |||
668 | return -EINVAL22; | |||
669 | } | |||
670 | ||||
671 | if (arg_plymouth && arg_console) { | |||
672 | log_error("Options --plymouth and --console conflict.")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 672 , __func__, "Options --plymouth and --console conflict.") : - abs(_e); }); | |||
673 | return -EINVAL22; | |||
674 | } | |||
675 | } | |||
676 | ||||
677 | return 1; | |||
678 | } | |||
679 | ||||
680 | /* | |||
681 | * To be able to ask on all terminal devices of /dev/console | |||
682 | * the devices are collected. If more than one device is found, | |||
683 | * then on each of the terminals a inquiring task is forked. | |||
684 | * Every task has its own session and its own controlling terminal. | |||
685 | * If one of the tasks does handle a password, the remaining tasks | |||
686 | * will be terminated. | |||
687 | */ | |||
688 | static int ask_on_this_console(const char *tty, pid_t *ret_pid, int argc, char *argv[]) { | |||
689 | struct sigaction sig = { | |||
690 | .sa_handler__sigaction_handler.sa_handler = nop_signal_handler, | |||
691 | .sa_flags = SA_NOCLDSTOP1 | SA_RESTART0x10000000, | |||
692 | }; | |||
693 | pid_t pid; | |||
694 | int r; | |||
695 | ||||
696 | assert_se(sigprocmask_many(SIG_UNBLOCK, NULL, SIGHUP, SIGCHLD, -1) >= 0)do { if ((__builtin_expect(!!(!(sigprocmask_many(1, ((void*)0 ), 1, 17, -1) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("sigprocmask_many(SIG_UNBLOCK, NULL, SIGHUP, SIGCHLD, -1) >= 0" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 696 , __PRETTY_FUNCTION__); } while (0); | |||
697 | ||||
698 | assert_se(sigemptyset(&sig.sa_mask) >= 0)do { if ((__builtin_expect(!!(!(sigemptyset(&sig.sa_mask) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("sigemptyset(&sig.sa_mask) >= 0" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 698 , __PRETTY_FUNCTION__); } while (0); | |||
699 | assert_se(sigaction(SIGCHLD, &sig, NULL) >= 0)do { if ((__builtin_expect(!!(!(sigaction(17, &sig, ((void *)0)) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("sigaction(SIGCHLD, &sig, NULL) >= 0"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 699, __PRETTY_FUNCTION__); } while (0); | |||
700 | ||||
701 | sig.sa_handler__sigaction_handler.sa_handler = SIG_DFL((__sighandler_t) 0); | |||
702 | assert_se(sigaction(SIGHUP, &sig, NULL) >= 0)do { if ((__builtin_expect(!!(!(sigaction(1, &sig, ((void *)0)) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("sigaction(SIGHUP, &sig, NULL) >= 0"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 702, __PRETTY_FUNCTION__); } while (0); | |||
703 | ||||
704 | r = safe_fork("(sd-passwd)", FORK_RESET_SIGNALS|FORK_LOG, &pid); | |||
705 | if (r < 0) | |||
706 | return r; | |||
707 | if (r == 0) { | |||
708 | int ac; | |||
709 | ||||
710 | assert_se(prctl(PR_SET_PDEATHSIG, SIGHUP) >= 0)do { if ((__builtin_expect(!!(!(prctl(1, 1) >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("prctl(PR_SET_PDEATHSIG, SIGHUP) >= 0" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 710 , __PRETTY_FUNCTION__); } while (0); | |||
711 | ||||
712 | for (ac = 0; ac < argc; ac++) { | |||
713 | if (streq(argv[ac], "--console")(strcmp((argv[ac]),("--console")) == 0)) { | |||
714 | argv[ac] = strjoina("--console=", tty)({ const char *_appendees_[] = { "--console=", tty }; char *_d_ , *_p_; size_t _len_ = 0; size_t _i_; for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p(typeof (_appendees_), typeof(&*(_appendees_))), sizeof(_appendees_ )/sizeof((_appendees_)[0]), ((void)0))) && _appendees_ [_i_]; _i_++) _len_ += strlen(_appendees_[_i_]); _p_ = _d_ = __builtin_alloca (_len_ + 1); for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(_appendees_), typeof(& *(_appendees_))), sizeof(_appendees_)/sizeof((_appendees_)[0] ), ((void)0))) && _appendees_[_i_]; _i_++) _p_ = stpcpy (_p_, _appendees_[_i_]); *_p_ = 0; _d_; }); | |||
715 | break; | |||
716 | } | |||
717 | } | |||
718 | ||||
719 | assert(ac < argc)do { if ((__builtin_expect(!!(!(ac < argc)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("ac < argc"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 719, __PRETTY_FUNCTION__); } while (0); | |||
720 | ||||
721 | execv(SYSTEMD_TTY_ASK_PASSWORD_AGENT_BINARY_PATH"/usr/bin/systemd-tty-ask-password-agent", argv); | |||
722 | _exit(EXIT_FAILURE1); | |||
723 | } | |||
724 | ||||
725 | *ret_pid = pid; | |||
726 | return 0; | |||
727 | } | |||
728 | ||||
729 | static void terminate_agents(Set *pids) { | |||
730 | struct timespec ts; | |||
731 | siginfo_t status = {}; | |||
732 | sigset_t set; | |||
733 | Iterator i; | |||
734 | void *p; | |||
735 | int r, signum; | |||
736 | ||||
737 | /* | |||
738 | * Request termination of the remaining processes as those | |||
739 | * are not required anymore. | |||
740 | */ | |||
741 | SET_FOREACH(p, pids, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); set_iterate((pids), &(i), (void **)&(p)); ) | |||
742 | (void) kill(PTR_TO_PID(p), SIGTERM15); | |||
743 | ||||
744 | /* | |||
745 | * Collect the processes which have go away. | |||
746 | */ | |||
747 | assert_se(sigemptyset(&set) >= 0)do { if ((__builtin_expect(!!(!(sigemptyset(&set) >= 0 )),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("sigemptyset(&set) >= 0" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 747 , __PRETTY_FUNCTION__); } while (0); | |||
748 | assert_se(sigaddset(&set, SIGCHLD) >= 0)do { if ((__builtin_expect(!!(!(sigaddset(&set, 17) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("sigaddset(&set, SIGCHLD) >= 0" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 748 , __PRETTY_FUNCTION__); } while (0); | |||
749 | timespec_store(&ts, 50 * USEC_PER_MSEC((usec_t) 1000ULL)); | |||
750 | ||||
751 | while (!set_isempty(pids)) { | |||
752 | ||||
753 | zero(status)(({ size_t _l_ = (sizeof(status)); void *_x_ = (&(status) ); _l_ == 0 ? _x_ : memset(_x_, 0, _l_); })); | |||
754 | r = waitid(P_ALL, 0, &status, WEXITED4|WNOHANG1); | |||
755 | if (r < 0 && errno(*__errno_location ()) == EINTR4) | |||
756 | continue; | |||
757 | ||||
758 | if (r == 0 && status.si_pid_sifields._kill.si_pid > 0) { | |||
759 | set_remove(pids, PID_TO_PTR(status.si_pid_sifields._kill.si_pid)); | |||
760 | continue; | |||
761 | } | |||
762 | ||||
763 | signum = sigtimedwait(&set, NULL((void*)0), &ts); | |||
764 | if (signum < 0) { | |||
765 | if (errno(*__errno_location ()) != EAGAIN11) | |||
766 | log_error_errno(errno, "sigtimedwait() failed: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 766, __func__, "sigtimedwait() failed: %m") : -abs(_e); }); | |||
767 | break; | |||
768 | } | |||
769 | assert(signum == SIGCHLD)do { if ((__builtin_expect(!!(!(signum == 17)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("signum == SIGCHLD"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 769, __PRETTY_FUNCTION__); } while (0); | |||
770 | } | |||
771 | ||||
772 | /* | |||
773 | * Kill hanging processes. | |||
774 | */ | |||
775 | SET_FOREACH(p, pids, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); set_iterate((pids), &(i), (void **)&(p)); ) { | |||
776 | log_warning("Failed to terminate child %d, killing it", PTR_TO_PID(p))({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 776 , __func__, "Failed to terminate child %d, killing it", PTR_TO_PID (p)) : -abs(_e); }); | |||
777 | (void) kill(PTR_TO_PID(p), SIGKILL9); | |||
778 | } | |||
779 | } | |||
780 | ||||
781 | static int ask_on_consoles(int argc, char *argv[]) { | |||
782 | _cleanup_set_free___attribute__((cleanup(set_freep))) Set *pids = NULL((void*)0); | |||
783 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **consoles = NULL((void*)0); | |||
784 | siginfo_t status = {}; | |||
785 | char **tty; | |||
786 | pid_t pid; | |||
787 | int r; | |||
788 | ||||
789 | r = get_kernel_consoles(&consoles); | |||
790 | if (r < 0) | |||
791 | return log_error_errno(r, "Failed to determine devices of /dev/console: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 791 , __func__, "Failed to determine devices of /dev/console: %m" ) : -abs(_e); }); | |||
792 | ||||
793 | pids = set_new(NULL)internal_set_new(((void*)0) ); | |||
794 | if (!pids) | |||
795 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 795, __func__); | |||
796 | ||||
797 | /* Start an agent on each console. */ | |||
798 | STRV_FOREACH(tty, consoles)for ((tty) = (consoles); (tty) && *(tty); (tty)++) { | |||
799 | r = ask_on_this_console(*tty, &pid, argc, argv); | |||
800 | if (r < 0) | |||
801 | return r; | |||
802 | ||||
803 | if (set_put(pids, PID_TO_PTR(pid)) < 0) | |||
804 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 804, __func__); | |||
805 | } | |||
806 | ||||
807 | /* Wait for an agent to exit. */ | |||
808 | for (;;) { | |||
809 | zero(status)(({ size_t _l_ = (sizeof(status)); void *_x_ = (&(status) ); _l_ == 0 ? _x_ : memset(_x_, 0, _l_); })); | |||
810 | ||||
811 | if (waitid(P_ALL, 0, &status, WEXITED4) < 0) { | |||
812 | if (errno(*__errno_location ()) == EINTR4) | |||
813 | continue; | |||
814 | ||||
815 | return log_error_errno(errno, "waitid() failed: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 815, __func__, "waitid() failed: %m") : -abs(_e); }); | |||
816 | } | |||
817 | ||||
818 | set_remove(pids, PID_TO_PTR(status.si_pid_sifields._kill.si_pid)); | |||
819 | break; | |||
820 | } | |||
821 | ||||
822 | if (!is_clean_exit(status.si_code, status.si_status_sifields._sigchld.si_status, EXIT_CLEAN_DAEMON, NULL((void*)0))) | |||
823 | log_error("Password agent failed with: %d", status.si_status)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 823 , __func__, "Password agent failed with: %d", status._sifields ._sigchld.si_status) : -abs(_e); }); | |||
824 | ||||
825 | terminate_agents(pids); | |||
826 | return 0; | |||
827 | } | |||
828 | ||||
829 | int main(int argc, char *argv[]) { | |||
830 | int r; | |||
831 | ||||
832 | log_set_target(LOG_TARGET_AUTO); | |||
833 | log_parse_environment()log_parse_environment_realm(LOG_REALM_SYSTEMD); | |||
834 | log_open(); | |||
835 | ||||
836 | umask(0022); | |||
837 | ||||
838 | r = parse_argv(argc, argv); | |||
839 | if (r <= 0) | |||
840 | goto finish; | |||
841 | ||||
842 | if (arg_console && !arg_device) | |||
843 | /* | |||
844 | * Spawn for each console device a separate process. | |||
845 | */ | |||
846 | r = ask_on_consoles(argc, argv); | |||
847 | else { | |||
848 | ||||
849 | if (arg_device) { | |||
850 | /* | |||
851 | * Later on, a controlling terminal will be acquired, | |||
852 | * therefore the current process has to become a session | |||
853 | * leader and should not have a controlling terminal already. | |||
854 | */ | |||
855 | (void) setsid(); | |||
856 | (void) release_terminal(); | |||
857 | } | |||
858 | ||||
859 | if (IN_SET(arg_action, ACTION_WATCH, ACTION_WALL)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){ACTION_WATCH, ACTION_WALL})/sizeof(int)] ; switch(arg_action) { case ACTION_WATCH: case ACTION_WALL: _found = 1; break; default: break; } _found; })) | |||
860 | r = watch_passwords(); | |||
861 | else | |||
862 | r = show_passwords(); | |||
863 | } | |||
864 | ||||
865 | finish: | |||
866 | return r < 0 ? EXIT_FAILURE1 : EXIT_SUCCESS0; | |||
867 | } |