| File: | build-scan/../src/tty-ask-password-agent/tty-ask-password-agent.c |
| Warning: | line 519, column 9 Value stored to 'tty_block_fd' is never read |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
| 1 | /* SPDX-License-Identifier: LGPL-2.1+ */ |
| 2 | /*** |
| 3 | Copyright © 2015 Werner Fink |
| 4 | ***/ |
| 5 | |
| 6 | #include <errno(*__errno_location ()).h> |
| 7 | #include <fcntl.h> |
| 8 | #include <getopt.h> |
| 9 | #include <poll.h> |
| 10 | #include <signal.h> |
| 11 | #include <stdbool.h> |
| 12 | #include <stddef.h> |
| 13 | #include <string.h> |
| 14 | #include <sys/inotify.h> |
| 15 | #include <sys/prctl.h> |
| 16 | #include <sys/signalfd.h> |
| 17 | #include <sys/socket.h> |
| 18 | #include <sys/wait.h> |
| 19 | #include <sys/un.h> |
| 20 | #include <unistd.h> |
| 21 | |
| 22 | #include "alloc-util.h" |
| 23 | #include "ask-password-api.h" |
| 24 | #include "conf-parser.h" |
| 25 | #include "def.h" |
| 26 | #include "dirent-util.h" |
| 27 | #include "exit-status.h" |
| 28 | #include "fd-util.h" |
| 29 | #include "fileio.h" |
| 30 | #include "hashmap.h" |
| 31 | #include "io-util.h" |
| 32 | #include "macro.h" |
| 33 | #include "mkdir.h" |
| 34 | #include "path-util.h" |
| 35 | #include "process-util.h" |
| 36 | #include "signal-util.h" |
| 37 | #include "socket-util.h" |
| 38 | #include "string-util.h" |
| 39 | #include "strv.h" |
| 40 | #include "terminal-util.h" |
| 41 | #include "util.h" |
| 42 | #include "utmp-wtmp.h" |
| 43 | |
| 44 | static enum { |
| 45 | ACTION_LIST, |
| 46 | ACTION_QUERY, |
| 47 | ACTION_WATCH, |
| 48 | ACTION_WALL |
| 49 | } arg_action = ACTION_QUERY; |
| 50 | |
| 51 | static bool_Bool arg_plymouth = false0; |
| 52 | static bool_Bool arg_console = false0; |
| 53 | static const char *arg_device = NULL((void*)0); |
| 54 | |
| 55 | static int ask_password_plymouth( |
| 56 | const char *message, |
| 57 | usec_t until, |
| 58 | AskPasswordFlags flags, |
| 59 | const char *flag_file, |
| 60 | char ***ret) { |
| 61 | |
| 62 | static const union sockaddr_union sa = PLYMOUTH_SOCKET{ .un.sun_family = 1, .un.sun_path = "\0/org/freedesktop/plymouthd" , }; |
| 63 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1, notify = -1; |
| 64 | _cleanup_free___attribute__((cleanup(freep))) char *packet = NULL((void*)0); |
| 65 | ssize_t k; |
| 66 | int r, n; |
| 67 | struct pollfd pollfd[2] = {}; |
| 68 | char buffer[LINE_MAX2048]; |
| 69 | size_t p = 0; |
| 70 | enum { |
| 71 | POLL_SOCKET, |
| 72 | POLL_INOTIFY |
| 73 | }; |
| 74 | |
| 75 | assert(ret)do { if ((__builtin_expect(!!(!(ret)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("ret"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 75, __PRETTY_FUNCTION__); } while (0); |
| 76 | |
| 77 | if (flag_file) { |
| 78 | notify = inotify_init1(IN_CLOEXECIN_CLOEXEC|IN_NONBLOCKIN_NONBLOCK); |
| 79 | if (notify < 0) |
| 80 | return -errno(*__errno_location ()); |
| 81 | |
| 82 | r = inotify_add_watch(notify, flag_file, IN_ATTRIB0x00000004); /* for the link count */ |
| 83 | if (r < 0) |
| 84 | return -errno(*__errno_location ()); |
| 85 | } |
| 86 | |
| 87 | fd = socket(AF_UNIX1, SOCK_STREAMSOCK_STREAM|SOCK_CLOEXECSOCK_CLOEXEC|SOCK_NONBLOCKSOCK_NONBLOCK, 0); |
| 88 | if (fd < 0) |
| 89 | return -errno(*__errno_location ()); |
| 90 | |
| 91 | r = connect(fd, &sa.sa, SOCKADDR_UN_LEN(sa.un)({ const struct sockaddr_un *_sa = &(sa.un); do { if ((__builtin_expect (!!(!(_sa->sun_family == 1)),0))) log_assert_failed_realm( LOG_REALM_SYSTEMD, ("_sa->sun_family == AF_UNIX"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 91, __PRETTY_FUNCTION__); } while (0); __builtin_offsetof(struct sockaddr_un, sun_path) + (_sa->sun_path[0] == 0 ? 1 + strnlen (_sa->sun_path+1, sizeof(_sa->sun_path)-1) : strnlen(_sa ->sun_path, sizeof(_sa->sun_path))); })); |
| 92 | if (r < 0) |
| 93 | return -errno(*__errno_location ()); |
| 94 | |
| 95 | if (flags & ASK_PASSWORD_ACCEPT_CACHED) { |
| 96 | packet = strdup("c"); |
| 97 | n = 1; |
| 98 | } else if (asprintf(&packet, "*\002%c%s%n", (int) (strlen(message) + 1), message, &n) < 0) |
| 99 | packet = NULL((void*)0); |
| 100 | if (!packet) |
| 101 | return -ENOMEM12; |
| 102 | |
| 103 | r = loop_write(fd, packet, n + 1, true1); |
| 104 | if (r < 0) |
| 105 | return r; |
| 106 | |
| 107 | pollfd[POLL_SOCKET].fd = fd; |
| 108 | pollfd[POLL_SOCKET].events = POLLIN0x001; |
| 109 | pollfd[POLL_INOTIFY].fd = notify; |
| 110 | pollfd[POLL_INOTIFY].events = POLLIN0x001; |
| 111 | |
| 112 | for (;;) { |
| 113 | int sleep_for = -1, j; |
| 114 | |
| 115 | if (until > 0) { |
| 116 | usec_t y; |
| 117 | |
| 118 | y = now(CLOCK_MONOTONIC1); |
| 119 | |
| 120 | if (y > until) { |
| 121 | r = -ETIME62; |
| 122 | goto finish; |
| 123 | } |
| 124 | |
| 125 | sleep_for = (int) ((until - y) / USEC_PER_MSEC((usec_t) 1000ULL)); |
| 126 | } |
| 127 | |
| 128 | if (flag_file && access(flag_file, F_OK0) < 0) { |
| 129 | r = -errno(*__errno_location ()); |
| 130 | goto finish; |
| 131 | } |
| 132 | |
| 133 | j = poll(pollfd, notify >= 0 ? 2 : 1, sleep_for); |
| 134 | if (j < 0) { |
| 135 | if (errno(*__errno_location ()) == EINTR4) |
| 136 | continue; |
| 137 | |
| 138 | r = -errno(*__errno_location ()); |
| 139 | goto finish; |
| 140 | } else if (j == 0) { |
| 141 | r = -ETIME62; |
| 142 | goto finish; |
| 143 | } |
| 144 | |
| 145 | if (notify >= 0 && pollfd[POLL_INOTIFY].revents != 0) |
| 146 | (void) flush_fd(notify); |
| 147 | |
| 148 | if (pollfd[POLL_SOCKET].revents == 0) |
| 149 | continue; |
| 150 | |
| 151 | k = read(fd, buffer + p, sizeof(buffer) - p); |
| 152 | if (k < 0) { |
| 153 | if (IN_SET(errno, EINTR, EAGAIN)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){4, 11})/sizeof(int)]; switch((*__errno_location ())) { case 4: case 11: _found = 1; break; default: break; } _found; })) |
| 154 | continue; |
| 155 | |
| 156 | r = -errno(*__errno_location ()); |
| 157 | goto finish; |
| 158 | } else if (k == 0) { |
| 159 | r = -EIO5; |
| 160 | goto finish; |
| 161 | } |
| 162 | |
| 163 | p += k; |
| 164 | |
| 165 | if (p < 1) |
| 166 | continue; |
| 167 | |
| 168 | if (buffer[0] == 5) { |
| 169 | |
| 170 | if (flags & ASK_PASSWORD_ACCEPT_CACHED) { |
| 171 | /* Hmm, first try with cached |
| 172 | * passwords failed, so let's retry |
| 173 | * with a normal password request */ |
| 174 | packet = mfree(packet); |
| 175 | |
| 176 | if (asprintf(&packet, "*\002%c%s%n", (int) (strlen(message) + 1), message, &n) < 0) { |
| 177 | r = -ENOMEM12; |
| 178 | goto finish; |
| 179 | } |
| 180 | |
| 181 | r = loop_write(fd, packet, n+1, true1); |
| 182 | if (r < 0) |
| 183 | goto finish; |
| 184 | |
| 185 | flags &= ~ASK_PASSWORD_ACCEPT_CACHED; |
| 186 | p = 0; |
| 187 | continue; |
| 188 | } |
| 189 | |
| 190 | /* No password, because UI not shown */ |
| 191 | r = -ENOENT2; |
| 192 | goto finish; |
| 193 | |
| 194 | } else if (IN_SET(buffer[0], 2, 9)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){2, 9})/sizeof(int)]; switch(buffer[0]) { case 2: case 9: _found = 1; break; default: break; } _found; })) { |
| 195 | uint32_t size; |
| 196 | char **l; |
| 197 | |
| 198 | /* One or more answers */ |
| 199 | if (p < 5) |
| 200 | continue; |
| 201 | |
| 202 | memcpy(&size, buffer+1, sizeof(size)); |
| 203 | size = le32toh(size)__uint32_identity (size); |
| 204 | if (size + 5 > sizeof(buffer)) { |
| 205 | r = -EIO5; |
| 206 | goto finish; |
| 207 | } |
| 208 | |
| 209 | if (p-5 < size) |
| 210 | continue; |
| 211 | |
| 212 | l = strv_parse_nulstr(buffer + 5, size); |
| 213 | if (!l) { |
| 214 | r = -ENOMEM12; |
| 215 | goto finish; |
| 216 | } |
| 217 | |
| 218 | *ret = l; |
| 219 | break; |
| 220 | |
| 221 | } else { |
| 222 | /* Unknown packet */ |
| 223 | r = -EIO5; |
| 224 | goto finish; |
| 225 | } |
| 226 | } |
| 227 | |
| 228 | r = 0; |
| 229 | |
| 230 | finish: |
| 231 | explicit_bzero(buffer, sizeof(buffer)); |
| 232 | return r; |
| 233 | } |
| 234 | |
| 235 | static int send_passwords(const char *socket_name, char **passwords) { |
| 236 | _cleanup_free___attribute__((cleanup(freep))) char *packet = NULL((void*)0); |
| 237 | _cleanup_close___attribute__((cleanup(closep))) int socket_fd = -1; |
| 238 | union sockaddr_union sa = { .un.sun_family = AF_UNIX1 }; |
| 239 | size_t packet_length = 1; |
| 240 | char **p, *d; |
| 241 | ssize_t n; |
| 242 | int r; |
| 243 | |
| 244 | assert(socket_name)do { if ((__builtin_expect(!!(!(socket_name)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("socket_name"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 244, __PRETTY_FUNCTION__); } while (0); |
| 245 | |
| 246 | STRV_FOREACH(p, passwords)for ((p) = (passwords); (p) && *(p); (p)++) |
| 247 | packet_length += strlen(*p) + 1; |
| 248 | |
| 249 | packet = new(char, packet_length)((char*) malloc_multiply(sizeof(char), (packet_length))); |
| 250 | if (!packet) |
| 251 | return -ENOMEM12; |
| 252 | |
| 253 | packet[0] = '+'; |
| 254 | |
| 255 | d = packet + 1; |
| 256 | STRV_FOREACH(p, passwords)for ((p) = (passwords); (p) && *(p); (p)++) |
| 257 | d = stpcpy(d, *p) + 1; |
| 258 | |
| 259 | socket_fd = socket(AF_UNIX1, SOCK_DGRAMSOCK_DGRAM|SOCK_CLOEXECSOCK_CLOEXEC, 0); |
| 260 | if (socket_fd < 0) { |
| 261 | r = log_debug_errno(errno, "socket(): %m")({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 261, __func__, "socket(): %m") : -abs(_e); }); |
| 262 | goto finish; |
| 263 | } |
| 264 | |
| 265 | strncpy(sa.un.sun_path, socket_name, sizeof(sa.un.sun_path)); |
| 266 | |
| 267 | n = sendto(socket_fd, packet, packet_length, MSG_NOSIGNALMSG_NOSIGNAL, &sa.sa, SOCKADDR_UN_LEN(sa.un)({ const struct sockaddr_un *_sa = &(sa.un); do { if ((__builtin_expect (!!(!(_sa->sun_family == 1)),0))) log_assert_failed_realm( LOG_REALM_SYSTEMD, ("_sa->sun_family == AF_UNIX"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 267, __PRETTY_FUNCTION__); } while (0); __builtin_offsetof( struct sockaddr_un, sun_path) + (_sa->sun_path[0] == 0 ? 1 + strnlen(_sa->sun_path+1, sizeof(_sa->sun_path)-1) : strnlen (_sa->sun_path, sizeof(_sa->sun_path))); })); |
| 268 | if (n < 0) { |
| 269 | r = log_debug_errno(errno, "sendto(): %m")({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 269, __func__, "sendto(): %m") : -abs(_e); }); |
| 270 | goto finish; |
| 271 | } |
| 272 | |
| 273 | r = (int) n; |
| 274 | |
| 275 | finish: |
| 276 | explicit_bzero(packet, packet_length); |
| 277 | return r; |
| 278 | } |
| 279 | |
| 280 | static int parse_password(const char *filename, char **wall) { |
| 281 | _cleanup_free___attribute__((cleanup(freep))) char *socket_name = NULL((void*)0), *message = NULL((void*)0); |
| 282 | bool_Bool accept_cached = false0, echo = false0; |
| 283 | uint64_t not_after = 0; |
| 284 | unsigned pid = 0; |
| 285 | |
| 286 | const ConfigTableItem items[] = { |
| 287 | { "Ask", "Socket", config_parse_string, 0, &socket_name }, |
| 288 | { "Ask", "NotAfter", config_parse_uint64, 0, ¬_after }, |
| 289 | { "Ask", "Message", config_parse_string, 0, &message }, |
| 290 | { "Ask", "PID", config_parse_unsigned, 0, &pid }, |
| 291 | { "Ask", "AcceptCached", config_parse_bool, 0, &accept_cached }, |
| 292 | { "Ask", "Echo", config_parse_bool, 0, &echo }, |
| 293 | {} |
| 294 | }; |
| 295 | |
| 296 | int r; |
| 297 | |
| 298 | assert(filename)do { if ((__builtin_expect(!!(!(filename)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("filename"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 298, __PRETTY_FUNCTION__); } while (0); |
| 299 | |
| 300 | r = config_parse(NULL((void*)0), filename, NULL((void*)0), |
| 301 | NULL((void*)0), |
| 302 | config_item_table_lookup, items, |
| 303 | CONFIG_PARSE_RELAXED|CONFIG_PARSE_WARN, NULL((void*)0)); |
| 304 | if (r < 0) |
| 305 | return r; |
| 306 | |
| 307 | if (!socket_name) { |
| 308 | log_error("Invalid password file %s", filename)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 308 , __func__, "Invalid password file %s", filename) : -abs(_e); }); |
| 309 | return -EBADMSG74; |
| 310 | } |
| 311 | |
| 312 | if (not_after > 0 && now(CLOCK_MONOTONIC1) > not_after) |
| 313 | return 0; |
| 314 | |
| 315 | if (pid > 0 && !pid_is_alive(pid)) |
| 316 | return 0; |
| 317 | |
| 318 | if (arg_action == ACTION_LIST) |
| 319 | printf("'%s' (PID %u)\n", message, pid); |
| 320 | |
| 321 | else if (arg_action == ACTION_WALL) { |
| 322 | char *_wall; |
| 323 | |
| 324 | if (asprintf(&_wall, |
| 325 | "%s%sPassword entry required for \'%s\' (PID %u).\r\n" |
| 326 | "Please enter password with the systemd-tty-ask-password-agent tool!", |
| 327 | strempty(*wall), |
| 328 | *wall ? "\r\n\r\n" : "", |
| 329 | message, |
| 330 | pid) < 0) |
| 331 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 331, __func__); |
| 332 | |
| 333 | free(*wall); |
| 334 | *wall = _wall; |
| 335 | |
| 336 | } else { |
| 337 | _cleanup_strv_free_erase___attribute__((cleanup(strv_free_erasep))) char **passwords = NULL((void*)0); |
| 338 | |
| 339 | assert(IN_SET(arg_action, ACTION_QUERY, ACTION_WATCH))do { if ((__builtin_expect(!!(!(({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended[20 - sizeof((int[]){ACTION_QUERY, ACTION_WATCH})/sizeof(int)]; switch (arg_action) { case ACTION_QUERY: case ACTION_WATCH: _found = 1; break; default: break; } _found; }))),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("IN_SET(arg_action, ACTION_QUERY, ACTION_WATCH)" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 339 , __PRETTY_FUNCTION__); } while (0); |
| 340 | |
| 341 | if (access(socket_name, W_OK2) < 0) { |
| 342 | if (arg_action == ACTION_QUERY) |
| 343 | log_info("Not querying '%s' (PID %u), lacking privileges.", message, pid)({ int _level = (((6))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 343 , __func__, "Not querying '%s' (PID %u), lacking privileges." , message, pid) : -abs(_e); }); |
| 344 | |
| 345 | return 0; |
| 346 | } |
| 347 | |
| 348 | if (arg_plymouth) |
| 349 | r = ask_password_plymouth(message, not_after, accept_cached ? ASK_PASSWORD_ACCEPT_CACHED : 0, filename, &passwords); |
| 350 | else { |
| 351 | char *password = NULL((void*)0); |
| 352 | int tty_fd = -1; |
| 353 | |
| 354 | if (arg_console) { |
| 355 | const char *con = arg_device ?: "/dev/console"; |
| 356 | |
| 357 | tty_fd = acquire_terminal(con, ACQUIRE_TERMINAL_WAIT, USEC_INFINITY((usec_t) -1)); |
| 358 | if (tty_fd < 0) |
| 359 | return log_error_errno(tty_fd, "Failed to acquire %s: %m", con)({ int _level = ((3)), _e = ((tty_fd)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 359 , __func__, "Failed to acquire %s: %m", con) : -abs(_e); }); |
| 360 | |
| 361 | r = reset_terminal_fd(tty_fd, true1); |
| 362 | if (r < 0) |
| 363 | log_warning_errno(r, "Failed to reset terminal, ignoring: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 363 , __func__, "Failed to reset terminal, ignoring: %m") : -abs( _e); }); |
| 364 | } |
| 365 | |
| 366 | r = ask_password_tty(tty_fd, message, NULL((void*)0), not_after, |
| 367 | (echo ? ASK_PASSWORD_ECHO : 0) | |
| 368 | (arg_console ? ASK_PASSWORD_CONSOLE_COLOR : 0), |
| 369 | filename, &password); |
| 370 | |
| 371 | if (arg_console) { |
| 372 | tty_fd = safe_close(tty_fd); |
| 373 | release_terminal(); |
| 374 | } |
| 375 | |
| 376 | if (r >= 0) |
| 377 | r = strv_push(&passwords, password); |
| 378 | |
| 379 | if (r < 0) |
| 380 | string_free_erase(password); |
| 381 | } |
| 382 | |
| 383 | /* If the query went away, that's OK */ |
| 384 | if (IN_SET(r, -ETIME, -ENOENT)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-62, -2})/sizeof(int)]; switch(r) { case -62: case -2: _found = 1; break; default: break; } _found; } )) |
| 385 | return 0; |
| 386 | |
| 387 | if (r < 0) |
| 388 | return log_error_errno(r, "Failed to query password: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 388 , __func__, "Failed to query password: %m") : -abs(_e); }); |
| 389 | |
| 390 | r = send_passwords(socket_name, passwords); |
| 391 | if (r < 0) |
| 392 | return log_error_errno(r, "Failed to send: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 392 , __func__, "Failed to send: %m") : -abs(_e); }); |
| 393 | } |
| 394 | |
| 395 | return 0; |
| 396 | } |
| 397 | |
| 398 | static int wall_tty_block(void) { |
| 399 | _cleanup_free___attribute__((cleanup(freep))) char *p = NULL((void*)0); |
| 400 | dev_t devnr; |
| 401 | int fd, r; |
| 402 | |
| 403 | r = get_ctty_devnr(0, &devnr); |
| 404 | if (r == -ENXIO6) /* We have no controlling tty */ |
| 405 | return -ENOTTY25; |
| 406 | if (r < 0) |
| 407 | return log_error_errno(r, "Failed to get controlling TTY: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 407 , __func__, "Failed to get controlling TTY: %m") : -abs(_e); } ); |
| 408 | |
| 409 | if (asprintf(&p, "/run/systemd/ask-password-block/%u:%u", major(devnr)gnu_dev_major (devnr), minor(devnr)gnu_dev_minor (devnr)) < 0) |
| 410 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 410, __func__); |
| 411 | |
| 412 | (void) mkdir_parents_label(p, 0700); |
| 413 | (void) mkfifo(p, 0600); |
| 414 | |
| 415 | fd = open(p, O_RDONLY00|O_CLOEXEC02000000|O_NONBLOCK04000|O_NOCTTY0400); |
| 416 | if (fd < 0) |
| 417 | return log_debug_errno(errno, "Failed to open %s: %m", p)({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 417, __func__, "Failed to open %s: %m", p) : -abs(_e); }); |
| 418 | |
| 419 | return fd; |
| 420 | } |
| 421 | |
| 422 | static bool_Bool wall_tty_match(const char *path, void *userdata) { |
| 423 | _cleanup_free___attribute__((cleanup(freep))) char *p = NULL((void*)0); |
| 424 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1; |
| 425 | struct stat st; |
| 426 | |
| 427 | if (!path_is_absolute(path)) |
| 428 | path = strjoina("/dev/", path)({ const char *_appendees_[] = { "/dev/", path }; char *_d_, * _p_; size_t _len_ = 0; size_t _i_; for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p(typeof (_appendees_), typeof(&*(_appendees_))), sizeof(_appendees_ )/sizeof((_appendees_)[0]), ((void)0))) && _appendees_ [_i_]; _i_++) _len_ += strlen(_appendees_[_i_]); _p_ = _d_ = __builtin_alloca (_len_ + 1); for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(_appendees_), typeof(& *(_appendees_))), sizeof(_appendees_)/sizeof((_appendees_)[0] ), ((void)0))) && _appendees_[_i_]; _i_++) _p_ = stpcpy (_p_, _appendees_[_i_]); *_p_ = 0; _d_; }); |
| 429 | |
| 430 | if (lstat(path, &st) < 0) { |
| 431 | log_debug_errno(errno, "Failed to stat %s: %m", path)({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 431, __func__, "Failed to stat %s: %m", path) : -abs(_e); } ); |
| 432 | return true1; |
| 433 | } |
| 434 | |
| 435 | if (!S_ISCHR(st.st_mode)((((st.st_mode)) & 0170000) == (0020000))) { |
| 436 | log_debug("%s is not a character device.", path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 436 , __func__, "%s is not a character device.", path) : -abs(_e) ; }); |
| 437 | return true1; |
| 438 | } |
| 439 | |
| 440 | /* We use named pipes to ensure that wall messages suggesting |
| 441 | * password entry are not printed over password prompts |
| 442 | * already shown. We use the fact here that opening a pipe in |
| 443 | * non-blocking mode for write-only will succeed only if |
| 444 | * there's some writer behind it. Using pipes has the |
| 445 | * advantage that the block will automatically go away if the |
| 446 | * process dies. */ |
| 447 | |
| 448 | if (asprintf(&p, "/run/systemd/ask-password-block/%u:%u", major(st.st_rdev)gnu_dev_major (st.st_rdev), minor(st.st_rdev)gnu_dev_minor (st.st_rdev)) < 0) { |
| 449 | log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 449, __func__); |
| 450 | return true1; |
| 451 | } |
| 452 | |
| 453 | fd = open(p, O_WRONLY01|O_CLOEXEC02000000|O_NONBLOCK04000|O_NOCTTY0400); |
| 454 | if (fd < 0) { |
| 455 | log_debug_errno(errno, "Failed to open the wall pipe: %m")({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 455, __func__, "Failed to open the wall pipe: %m") : -abs(_e ); }); |
| 456 | return 1; |
| 457 | } |
| 458 | |
| 459 | /* What, we managed to open the pipe? Then this tty is filtered. */ |
| 460 | return 0; |
| 461 | } |
| 462 | |
| 463 | static int show_passwords(void) { |
| 464 | _cleanup_closedir___attribute__((cleanup(closedirp))) DIR *d; |
| 465 | struct dirent *de; |
| 466 | int r = 0; |
| 467 | |
| 468 | d = opendir("/run/systemd/ask-password"); |
| 469 | if (!d) { |
| 470 | if (errno(*__errno_location ()) == ENOENT2) |
| 471 | return 0; |
| 472 | |
| 473 | return log_error_errno(errno, "Failed to open /run/systemd/ask-password: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 473, __func__, "Failed to open /run/systemd/ask-password: %m" ) : -abs(_e); }); |
| 474 | } |
| 475 | |
| 476 | FOREACH_DIRENT_ALL(de, d, return log_error_errno(errno, "Failed to read directory: %m"))for ((*__errno_location ()) = 0, de = readdir(d);; (*__errno_location ()) = 0, de = readdir(d)) if (!de) { if ((*__errno_location ( )) > 0) { return ({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 476, __func__, "Failed to read directory: %m") : -abs(_e); } ); } break; } else { |
| 477 | _cleanup_free___attribute__((cleanup(freep))) char *p = NULL((void*)0), *wall = NULL((void*)0); |
| 478 | int q; |
| 479 | |
| 480 | /* We only support /dev on tmpfs, hence we can rely on |
| 481 | * d_type to be reliable */ |
| 482 | |
| 483 | if (de->d_type != DT_REGDT_REG) |
| 484 | continue; |
| 485 | |
| 486 | if (hidden_or_backup_file(de->d_name)) |
| 487 | continue; |
| 488 | |
| 489 | if (!startswith(de->d_name, "ask.")) |
| 490 | continue; |
| 491 | |
| 492 | p = strappend("/run/systemd/ask-password/", de->d_name); |
| 493 | if (!p) |
| 494 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 494, __func__); |
| 495 | |
| 496 | q = parse_password(p, &wall); |
| 497 | if (q < 0 && r == 0) |
| 498 | r = q; |
| 499 | |
| 500 | if (wall) |
| 501 | (void) utmp_wall(wall, NULL((void*)0), NULL((void*)0), wall_tty_match, NULL((void*)0)); |
| 502 | } |
| 503 | |
| 504 | return r; |
| 505 | } |
| 506 | |
| 507 | static int watch_passwords(void) { |
| 508 | enum { |
| 509 | FD_INOTIFY, |
| 510 | FD_SIGNAL, |
| 511 | _FD_MAX |
| 512 | }; |
| 513 | |
| 514 | _cleanup_close___attribute__((cleanup(closep))) int notify = -1, signal_fd = -1, tty_block_fd = -1; |
| 515 | struct pollfd pollfd[_FD_MAX] = {}; |
| 516 | sigset_t mask; |
| 517 | int r; |
| 518 | |
| 519 | tty_block_fd = wall_tty_block(); |
Value stored to 'tty_block_fd' is never read | |
| 520 | |
| 521 | (void) mkdir_p_label("/run/systemd/ask-password", 0755); |
| 522 | |
| 523 | notify = inotify_init1(IN_CLOEXECIN_CLOEXEC); |
| 524 | if (notify < 0) |
| 525 | return log_error_errno(errno, "Failed to allocate directory watch: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 525, __func__, "Failed to allocate directory watch: %m") : - abs(_e); }); |
| 526 | |
| 527 | if (inotify_add_watch(notify, "/run/systemd/ask-password", IN_CLOSE_WRITE0x00000008|IN_MOVED_TO0x00000080) < 0) |
| 528 | return log_error_errno(errno, "Failed to add /run/systemd/ask-password to directory watch: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 528, __func__, "Failed to add /run/systemd/ask-password to directory watch: %m" ) : -abs(_e); }); |
| 529 | |
| 530 | assert_se(sigemptyset(&mask) >= 0)do { if ((__builtin_expect(!!(!(sigemptyset(&mask) >= 0 )),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("sigemptyset(&mask) >= 0" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 530 , __PRETTY_FUNCTION__); } while (0); |
| 531 | assert_se(sigset_add_many(&mask, SIGINT, SIGTERM, -1) >= 0)do { if ((__builtin_expect(!!(!(sigset_add_many(&mask, 2, 15, -1) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("sigset_add_many(&mask, SIGINT, SIGTERM, -1) >= 0") , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 531 , __PRETTY_FUNCTION__); } while (0); |
| 532 | assert_se(sigprocmask(SIG_SETMASK, &mask, NULL) >= 0)do { if ((__builtin_expect(!!(!(sigprocmask(2, &mask, ((void *)0)) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("sigprocmask(SIG_SETMASK, &mask, NULL) >= 0"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 532, __PRETTY_FUNCTION__); } while (0); |
| 533 | |
| 534 | signal_fd = signalfd(-1, &mask, SFD_NONBLOCKSFD_NONBLOCK|SFD_CLOEXECSFD_CLOEXEC); |
| 535 | if (signal_fd < 0) |
| 536 | return log_error_errno(errno, "Failed to allocate signal file descriptor: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 536, __func__, "Failed to allocate signal file descriptor: %m" ) : -abs(_e); }); |
| 537 | |
| 538 | pollfd[FD_INOTIFY].fd = notify; |
| 539 | pollfd[FD_INOTIFY].events = POLLIN0x001; |
| 540 | pollfd[FD_SIGNAL].fd = signal_fd; |
| 541 | pollfd[FD_SIGNAL].events = POLLIN0x001; |
| 542 | |
| 543 | for (;;) { |
| 544 | r = show_passwords(); |
| 545 | if (r < 0) |
| 546 | log_error_errno(r, "Failed to show password: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 546 , __func__, "Failed to show password: %m") : -abs(_e); }); |
| 547 | |
| 548 | if (poll(pollfd, _FD_MAX, -1) < 0) { |
| 549 | if (errno(*__errno_location ()) == EINTR4) |
| 550 | continue; |
| 551 | |
| 552 | return -errno(*__errno_location ()); |
| 553 | } |
| 554 | |
| 555 | if (pollfd[FD_INOTIFY].revents != 0) |
| 556 | (void) flush_fd(notify); |
| 557 | |
| 558 | if (pollfd[FD_SIGNAL].revents != 0) |
| 559 | break; |
| 560 | } |
| 561 | |
| 562 | return 0; |
| 563 | } |
| 564 | |
| 565 | static void help(void) { |
| 566 | printf("%s [OPTIONS...]\n\n" |
| 567 | "Process system password requests.\n\n" |
| 568 | " -h --help Show this help\n" |
| 569 | " --version Show package version\n" |
| 570 | " --list Show pending password requests\n" |
| 571 | " --query Process pending password requests\n" |
| 572 | " --watch Continuously process password requests\n" |
| 573 | " --wall Continuously forward password requests to wall\n" |
| 574 | " --plymouth Ask question with Plymouth instead of on TTY\n" |
| 575 | " --console Ask question on /dev/console instead of current TTY\n", |
| 576 | program_invocation_short_name); |
| 577 | } |
| 578 | |
| 579 | static int parse_argv(int argc, char *argv[]) { |
| 580 | |
| 581 | enum { |
| 582 | ARG_LIST = 0x100, |
| 583 | ARG_QUERY, |
| 584 | ARG_WATCH, |
| 585 | ARG_WALL, |
| 586 | ARG_PLYMOUTH, |
| 587 | ARG_CONSOLE, |
| 588 | ARG_VERSION |
| 589 | }; |
| 590 | |
| 591 | static const struct option options[] = { |
| 592 | { "help", no_argument0, NULL((void*)0), 'h' }, |
| 593 | { "version", no_argument0, NULL((void*)0), ARG_VERSION }, |
| 594 | { "list", no_argument0, NULL((void*)0), ARG_LIST }, |
| 595 | { "query", no_argument0, NULL((void*)0), ARG_QUERY }, |
| 596 | { "watch", no_argument0, NULL((void*)0), ARG_WATCH }, |
| 597 | { "wall", no_argument0, NULL((void*)0), ARG_WALL }, |
| 598 | { "plymouth", no_argument0, NULL((void*)0), ARG_PLYMOUTH }, |
| 599 | { "console", optional_argument2, NULL((void*)0), ARG_CONSOLE }, |
| 600 | {} |
| 601 | }; |
| 602 | |
| 603 | int c; |
| 604 | |
| 605 | assert(argc >= 0)do { if ((__builtin_expect(!!(!(argc >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("argc >= 0"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 605, __PRETTY_FUNCTION__); } while (0); |
| 606 | assert(argv)do { if ((__builtin_expect(!!(!(argv)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("argv"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 606, __PRETTY_FUNCTION__); } while (0); |
| 607 | |
| 608 | while ((c = getopt_long(argc, argv, "h", options, NULL((void*)0))) >= 0) |
| 609 | |
| 610 | switch (c) { |
| 611 | |
| 612 | case 'h': |
| 613 | help(); |
| 614 | return 0; |
| 615 | |
| 616 | case ARG_VERSION: |
| 617 | return version(); |
| 618 | |
| 619 | case ARG_LIST: |
| 620 | arg_action = ACTION_LIST; |
| 621 | break; |
| 622 | |
| 623 | case ARG_QUERY: |
| 624 | arg_action = ACTION_QUERY; |
| 625 | break; |
| 626 | |
| 627 | case ARG_WATCH: |
| 628 | arg_action = ACTION_WATCH; |
| 629 | break; |
| 630 | |
| 631 | case ARG_WALL: |
| 632 | arg_action = ACTION_WALL; |
| 633 | break; |
| 634 | |
| 635 | case ARG_PLYMOUTH: |
| 636 | arg_plymouth = true1; |
| 637 | break; |
| 638 | |
| 639 | case ARG_CONSOLE: |
| 640 | arg_console = true1; |
| 641 | if (optarg) { |
| 642 | |
| 643 | if (isempty(optarg)) { |
| 644 | log_error("Empty console device path is not allowed.")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 644 , __func__, "Empty console device path is not allowed.") : -abs (_e); }); |
| 645 | return -EINVAL22; |
| 646 | } |
| 647 | |
| 648 | arg_device = optarg; |
| 649 | } |
| 650 | break; |
| 651 | |
| 652 | case '?': |
| 653 | return -EINVAL22; |
| 654 | |
| 655 | default: |
| 656 | assert_not_reached("Unhandled option")do { log_assert_failed_unreachable_realm(LOG_REALM_SYSTEMD, ( "Unhandled option"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 656, __PRETTY_FUNCTION__); } while (0); |
| 657 | } |
| 658 | |
| 659 | if (optind != argc) { |
| 660 | log_error("%s takes no arguments.", program_invocation_short_name)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 660 , __func__, "%s takes no arguments.", program_invocation_short_name ) : -abs(_e); }); |
| 661 | return -EINVAL22; |
| 662 | } |
| 663 | |
| 664 | if (arg_plymouth || arg_console) { |
| 665 | |
| 666 | if (!IN_SET(arg_action, ACTION_QUERY, ACTION_WATCH)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){ACTION_QUERY, ACTION_WATCH})/sizeof(int) ]; switch(arg_action) { case ACTION_QUERY: case ACTION_WATCH: _found = 1; break; default: break; } _found; })) { |
| 667 | log_error("Options --query and --watch conflict.")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 667 , __func__, "Options --query and --watch conflict.") : -abs(_e ); }); |
| 668 | return -EINVAL22; |
| 669 | } |
| 670 | |
| 671 | if (arg_plymouth && arg_console) { |
| 672 | log_error("Options --plymouth and --console conflict.")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 672 , __func__, "Options --plymouth and --console conflict.") : - abs(_e); }); |
| 673 | return -EINVAL22; |
| 674 | } |
| 675 | } |
| 676 | |
| 677 | return 1; |
| 678 | } |
| 679 | |
| 680 | /* |
| 681 | * To be able to ask on all terminal devices of /dev/console |
| 682 | * the devices are collected. If more than one device is found, |
| 683 | * then on each of the terminals a inquiring task is forked. |
| 684 | * Every task has its own session and its own controlling terminal. |
| 685 | * If one of the tasks does handle a password, the remaining tasks |
| 686 | * will be terminated. |
| 687 | */ |
| 688 | static int ask_on_this_console(const char *tty, pid_t *ret_pid, int argc, char *argv[]) { |
| 689 | struct sigaction sig = { |
| 690 | .sa_handler__sigaction_handler.sa_handler = nop_signal_handler, |
| 691 | .sa_flags = SA_NOCLDSTOP1 | SA_RESTART0x10000000, |
| 692 | }; |
| 693 | pid_t pid; |
| 694 | int r; |
| 695 | |
| 696 | assert_se(sigprocmask_many(SIG_UNBLOCK, NULL, SIGHUP, SIGCHLD, -1) >= 0)do { if ((__builtin_expect(!!(!(sigprocmask_many(1, ((void*)0 ), 1, 17, -1) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("sigprocmask_many(SIG_UNBLOCK, NULL, SIGHUP, SIGCHLD, -1) >= 0" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 696 , __PRETTY_FUNCTION__); } while (0); |
| 697 | |
| 698 | assert_se(sigemptyset(&sig.sa_mask) >= 0)do { if ((__builtin_expect(!!(!(sigemptyset(&sig.sa_mask) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("sigemptyset(&sig.sa_mask) >= 0" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 698 , __PRETTY_FUNCTION__); } while (0); |
| 699 | assert_se(sigaction(SIGCHLD, &sig, NULL) >= 0)do { if ((__builtin_expect(!!(!(sigaction(17, &sig, ((void *)0)) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("sigaction(SIGCHLD, &sig, NULL) >= 0"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 699, __PRETTY_FUNCTION__); } while (0); |
| 700 | |
| 701 | sig.sa_handler__sigaction_handler.sa_handler = SIG_DFL((__sighandler_t) 0); |
| 702 | assert_se(sigaction(SIGHUP, &sig, NULL) >= 0)do { if ((__builtin_expect(!!(!(sigaction(1, &sig, ((void *)0)) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("sigaction(SIGHUP, &sig, NULL) >= 0"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 702, __PRETTY_FUNCTION__); } while (0); |
| 703 | |
| 704 | r = safe_fork("(sd-passwd)", FORK_RESET_SIGNALS|FORK_LOG, &pid); |
| 705 | if (r < 0) |
| 706 | return r; |
| 707 | if (r == 0) { |
| 708 | int ac; |
| 709 | |
| 710 | assert_se(prctl(PR_SET_PDEATHSIG, SIGHUP) >= 0)do { if ((__builtin_expect(!!(!(prctl(1, 1) >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("prctl(PR_SET_PDEATHSIG, SIGHUP) >= 0" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 710 , __PRETTY_FUNCTION__); } while (0); |
| 711 | |
| 712 | for (ac = 0; ac < argc; ac++) { |
| 713 | if (streq(argv[ac], "--console")(strcmp((argv[ac]),("--console")) == 0)) { |
| 714 | argv[ac] = strjoina("--console=", tty)({ const char *_appendees_[] = { "--console=", tty }; char *_d_ , *_p_; size_t _len_ = 0; size_t _i_; for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p(typeof (_appendees_), typeof(&*(_appendees_))), sizeof(_appendees_ )/sizeof((_appendees_)[0]), ((void)0))) && _appendees_ [_i_]; _i_++) _len_ += strlen(_appendees_[_i_]); _p_ = _d_ = __builtin_alloca (_len_ + 1); for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(_appendees_), typeof(& *(_appendees_))), sizeof(_appendees_)/sizeof((_appendees_)[0] ), ((void)0))) && _appendees_[_i_]; _i_++) _p_ = stpcpy (_p_, _appendees_[_i_]); *_p_ = 0; _d_; }); |
| 715 | break; |
| 716 | } |
| 717 | } |
| 718 | |
| 719 | assert(ac < argc)do { if ((__builtin_expect(!!(!(ac < argc)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("ac < argc"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 719, __PRETTY_FUNCTION__); } while (0); |
| 720 | |
| 721 | execv(SYSTEMD_TTY_ASK_PASSWORD_AGENT_BINARY_PATH"/usr/bin/systemd-tty-ask-password-agent", argv); |
| 722 | _exit(EXIT_FAILURE1); |
| 723 | } |
| 724 | |
| 725 | *ret_pid = pid; |
| 726 | return 0; |
| 727 | } |
| 728 | |
| 729 | static void terminate_agents(Set *pids) { |
| 730 | struct timespec ts; |
| 731 | siginfo_t status = {}; |
| 732 | sigset_t set; |
| 733 | Iterator i; |
| 734 | void *p; |
| 735 | int r, signum; |
| 736 | |
| 737 | /* |
| 738 | * Request termination of the remaining processes as those |
| 739 | * are not required anymore. |
| 740 | */ |
| 741 | SET_FOREACH(p, pids, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); set_iterate((pids), &(i), (void **)&(p)); ) |
| 742 | (void) kill(PTR_TO_PID(p), SIGTERM15); |
| 743 | |
| 744 | /* |
| 745 | * Collect the processes which have go away. |
| 746 | */ |
| 747 | assert_se(sigemptyset(&set) >= 0)do { if ((__builtin_expect(!!(!(sigemptyset(&set) >= 0 )),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("sigemptyset(&set) >= 0" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 747 , __PRETTY_FUNCTION__); } while (0); |
| 748 | assert_se(sigaddset(&set, SIGCHLD) >= 0)do { if ((__builtin_expect(!!(!(sigaddset(&set, 17) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("sigaddset(&set, SIGCHLD) >= 0" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 748 , __PRETTY_FUNCTION__); } while (0); |
| 749 | timespec_store(&ts, 50 * USEC_PER_MSEC((usec_t) 1000ULL)); |
| 750 | |
| 751 | while (!set_isempty(pids)) { |
| 752 | |
| 753 | zero(status)(({ size_t _l_ = (sizeof(status)); void *_x_ = (&(status) ); _l_ == 0 ? _x_ : memset(_x_, 0, _l_); })); |
| 754 | r = waitid(P_ALL, 0, &status, WEXITED4|WNOHANG1); |
| 755 | if (r < 0 && errno(*__errno_location ()) == EINTR4) |
| 756 | continue; |
| 757 | |
| 758 | if (r == 0 && status.si_pid_sifields._kill.si_pid > 0) { |
| 759 | set_remove(pids, PID_TO_PTR(status.si_pid_sifields._kill.si_pid)); |
| 760 | continue; |
| 761 | } |
| 762 | |
| 763 | signum = sigtimedwait(&set, NULL((void*)0), &ts); |
| 764 | if (signum < 0) { |
| 765 | if (errno(*__errno_location ()) != EAGAIN11) |
| 766 | log_error_errno(errno, "sigtimedwait() failed: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 766, __func__, "sigtimedwait() failed: %m") : -abs(_e); }); |
| 767 | break; |
| 768 | } |
| 769 | assert(signum == SIGCHLD)do { if ((__builtin_expect(!!(!(signum == 17)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("signum == SIGCHLD"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 769, __PRETTY_FUNCTION__); } while (0); |
| 770 | } |
| 771 | |
| 772 | /* |
| 773 | * Kill hanging processes. |
| 774 | */ |
| 775 | SET_FOREACH(p, pids, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); set_iterate((pids), &(i), (void **)&(p)); ) { |
| 776 | log_warning("Failed to terminate child %d, killing it", PTR_TO_PID(p))({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 776 , __func__, "Failed to terminate child %d, killing it", PTR_TO_PID (p)) : -abs(_e); }); |
| 777 | (void) kill(PTR_TO_PID(p), SIGKILL9); |
| 778 | } |
| 779 | } |
| 780 | |
| 781 | static int ask_on_consoles(int argc, char *argv[]) { |
| 782 | _cleanup_set_free___attribute__((cleanup(set_freep))) Set *pids = NULL((void*)0); |
| 783 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **consoles = NULL((void*)0); |
| 784 | siginfo_t status = {}; |
| 785 | char **tty; |
| 786 | pid_t pid; |
| 787 | int r; |
| 788 | |
| 789 | r = get_kernel_consoles(&consoles); |
| 790 | if (r < 0) |
| 791 | return log_error_errno(r, "Failed to determine devices of /dev/console: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 791 , __func__, "Failed to determine devices of /dev/console: %m" ) : -abs(_e); }); |
| 792 | |
| 793 | pids = set_new(NULL)internal_set_new(((void*)0) ); |
| 794 | if (!pids) |
| 795 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 795, __func__); |
| 796 | |
| 797 | /* Start an agent on each console. */ |
| 798 | STRV_FOREACH(tty, consoles)for ((tty) = (consoles); (tty) && *(tty); (tty)++) { |
| 799 | r = ask_on_this_console(*tty, &pid, argc, argv); |
| 800 | if (r < 0) |
| 801 | return r; |
| 802 | |
| 803 | if (set_put(pids, PID_TO_PTR(pid)) < 0) |
| 804 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 804, __func__); |
| 805 | } |
| 806 | |
| 807 | /* Wait for an agent to exit. */ |
| 808 | for (;;) { |
| 809 | zero(status)(({ size_t _l_ = (sizeof(status)); void *_x_ = (&(status) ); _l_ == 0 ? _x_ : memset(_x_, 0, _l_); })); |
| 810 | |
| 811 | if (waitid(P_ALL, 0, &status, WEXITED4) < 0) { |
| 812 | if (errno(*__errno_location ()) == EINTR4) |
| 813 | continue; |
| 814 | |
| 815 | return log_error_errno(errno, "waitid() failed: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 815, __func__, "waitid() failed: %m") : -abs(_e); }); |
| 816 | } |
| 817 | |
| 818 | set_remove(pids, PID_TO_PTR(status.si_pid_sifields._kill.si_pid)); |
| 819 | break; |
| 820 | } |
| 821 | |
| 822 | if (!is_clean_exit(status.si_code, status.si_status_sifields._sigchld.si_status, EXIT_CLEAN_DAEMON, NULL((void*)0))) |
| 823 | log_error("Password agent failed with: %d", status.si_status)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 823 , __func__, "Password agent failed with: %d", status._sifields ._sigchld.si_status) : -abs(_e); }); |
| 824 | |
| 825 | terminate_agents(pids); |
| 826 | return 0; |
| 827 | } |
| 828 | |
| 829 | int main(int argc, char *argv[]) { |
| 830 | int r; |
| 831 | |
| 832 | log_set_target(LOG_TARGET_AUTO); |
| 833 | log_parse_environment()log_parse_environment_realm(LOG_REALM_SYSTEMD); |
| 834 | log_open(); |
| 835 | |
| 836 | umask(0022); |
| 837 | |
| 838 | r = parse_argv(argc, argv); |
| 839 | if (r <= 0) |
| 840 | goto finish; |
| 841 | |
| 842 | if (arg_console && !arg_device) |
| 843 | /* |
| 844 | * Spawn for each console device a separate process. |
| 845 | */ |
| 846 | r = ask_on_consoles(argc, argv); |
| 847 | else { |
| 848 | |
| 849 | if (arg_device) { |
| 850 | /* |
| 851 | * Later on, a controlling terminal will be acquired, |
| 852 | * therefore the current process has to become a session |
| 853 | * leader and should not have a controlling terminal already. |
| 854 | */ |
| 855 | (void) setsid(); |
| 856 | (void) release_terminal(); |
| 857 | } |
| 858 | |
| 859 | if (IN_SET(arg_action, ACTION_WATCH, ACTION_WALL)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){ACTION_WATCH, ACTION_WALL})/sizeof(int)] ; switch(arg_action) { case ACTION_WATCH: case ACTION_WALL: _found = 1; break; default: break; } _found; })) |
| 860 | r = watch_passwords(); |
| 861 | else |
| 862 | r = show_passwords(); |
| 863 | } |
| 864 | |
| 865 | finish: |
| 866 | return r < 0 ? EXIT_FAILURE1 : EXIT_SUCCESS0; |
| 867 | } |