| File: | build-scan/../src/tty-ask-password-agent/tty-ask-password-agent.c |
| Warning: | line 277, column 9 Potential leak of memory pointed to by 'packet' |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
| 1 | /* SPDX-License-Identifier: LGPL-2.1+ */ | ||||
| 2 | /*** | ||||
| 3 | Copyright © 2015 Werner Fink | ||||
| 4 | ***/ | ||||
| 5 | |||||
| 6 | #include <errno(*__errno_location ()).h> | ||||
| 7 | #include <fcntl.h> | ||||
| 8 | #include <getopt.h> | ||||
| 9 | #include <poll.h> | ||||
| 10 | #include <signal.h> | ||||
| 11 | #include <stdbool.h> | ||||
| 12 | #include <stddef.h> | ||||
| 13 | #include <string.h> | ||||
| 14 | #include <sys/inotify.h> | ||||
| 15 | #include <sys/prctl.h> | ||||
| 16 | #include <sys/signalfd.h> | ||||
| 17 | #include <sys/socket.h> | ||||
| 18 | #include <sys/wait.h> | ||||
| 19 | #include <sys/un.h> | ||||
| 20 | #include <unistd.h> | ||||
| 21 | |||||
| 22 | #include "alloc-util.h" | ||||
| 23 | #include "ask-password-api.h" | ||||
| 24 | #include "conf-parser.h" | ||||
| 25 | #include "def.h" | ||||
| 26 | #include "dirent-util.h" | ||||
| 27 | #include "exit-status.h" | ||||
| 28 | #include "fd-util.h" | ||||
| 29 | #include "fileio.h" | ||||
| 30 | #include "hashmap.h" | ||||
| 31 | #include "io-util.h" | ||||
| 32 | #include "macro.h" | ||||
| 33 | #include "mkdir.h" | ||||
| 34 | #include "path-util.h" | ||||
| 35 | #include "process-util.h" | ||||
| 36 | #include "signal-util.h" | ||||
| 37 | #include "socket-util.h" | ||||
| 38 | #include "string-util.h" | ||||
| 39 | #include "strv.h" | ||||
| 40 | #include "terminal-util.h" | ||||
| 41 | #include "util.h" | ||||
| 42 | #include "utmp-wtmp.h" | ||||
| 43 | |||||
| 44 | static enum { | ||||
| 45 | ACTION_LIST, | ||||
| 46 | ACTION_QUERY, | ||||
| 47 | ACTION_WATCH, | ||||
| 48 | ACTION_WALL | ||||
| 49 | } arg_action = ACTION_QUERY; | ||||
| 50 | |||||
| 51 | static bool_Bool arg_plymouth = false0; | ||||
| 52 | static bool_Bool arg_console = false0; | ||||
| 53 | static const char *arg_device = NULL((void*)0); | ||||
| 54 | |||||
| 55 | static int ask_password_plymouth( | ||||
| 56 | const char *message, | ||||
| 57 | usec_t until, | ||||
| 58 | AskPasswordFlags flags, | ||||
| 59 | const char *flag_file, | ||||
| 60 | char ***ret) { | ||||
| 61 | |||||
| 62 | static const union sockaddr_union sa = PLYMOUTH_SOCKET{ .un.sun_family = 1, .un.sun_path = "\0/org/freedesktop/plymouthd" , }; | ||||
| 63 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1, notify = -1; | ||||
| 64 | _cleanup_free___attribute__((cleanup(freep))) char *packet = NULL((void*)0); | ||||
| 65 | ssize_t k; | ||||
| 66 | int r, n; | ||||
| 67 | struct pollfd pollfd[2] = {}; | ||||
| 68 | char buffer[LINE_MAX2048]; | ||||
| 69 | size_t p = 0; | ||||
| 70 | enum { | ||||
| 71 | POLL_SOCKET, | ||||
| 72 | POLL_INOTIFY | ||||
| 73 | }; | ||||
| 74 | |||||
| 75 | assert(ret)do { if ((__builtin_expect(!!(!(ret)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("ret"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 75, __PRETTY_FUNCTION__); } while (0); | ||||
| 76 | |||||
| 77 | if (flag_file) { | ||||
| 78 | notify = inotify_init1(IN_CLOEXECIN_CLOEXEC|IN_NONBLOCKIN_NONBLOCK); | ||||
| 79 | if (notify < 0) | ||||
| 80 | return -errno(*__errno_location ()); | ||||
| 81 | |||||
| 82 | r = inotify_add_watch(notify, flag_file, IN_ATTRIB0x00000004); /* for the link count */ | ||||
| 83 | if (r < 0) | ||||
| 84 | return -errno(*__errno_location ()); | ||||
| 85 | } | ||||
| 86 | |||||
| 87 | fd = socket(AF_UNIX1, SOCK_STREAMSOCK_STREAM|SOCK_CLOEXECSOCK_CLOEXEC|SOCK_NONBLOCKSOCK_NONBLOCK, 0); | ||||
| 88 | if (fd < 0) | ||||
| 89 | return -errno(*__errno_location ()); | ||||
| 90 | |||||
| 91 | r = connect(fd, &sa.sa, SOCKADDR_UN_LEN(sa.un)({ const struct sockaddr_un *_sa = &(sa.un); do { if ((__builtin_expect (!!(!(_sa->sun_family == 1)),0))) log_assert_failed_realm( LOG_REALM_SYSTEMD, ("_sa->sun_family == AF_UNIX"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 91, __PRETTY_FUNCTION__); } while (0); __builtin_offsetof(struct sockaddr_un, sun_path) + (_sa->sun_path[0] == 0 ? 1 + strnlen (_sa->sun_path+1, sizeof(_sa->sun_path)-1) : strnlen(_sa ->sun_path, sizeof(_sa->sun_path))); })); | ||||
| 92 | if (r < 0) | ||||
| 93 | return -errno(*__errno_location ()); | ||||
| 94 | |||||
| 95 | if (flags & ASK_PASSWORD_ACCEPT_CACHED) { | ||||
| 96 | packet = strdup("c"); | ||||
| 97 | n = 1; | ||||
| 98 | } else if (asprintf(&packet, "*\002%c%s%n", (int) (strlen(message) + 1), message, &n) < 0) | ||||
| 99 | packet = NULL((void*)0); | ||||
| 100 | if (!packet) | ||||
| 101 | return -ENOMEM12; | ||||
| 102 | |||||
| 103 | r = loop_write(fd, packet, n + 1, true1); | ||||
| 104 | if (r < 0) | ||||
| 105 | return r; | ||||
| 106 | |||||
| 107 | pollfd[POLL_SOCKET].fd = fd; | ||||
| 108 | pollfd[POLL_SOCKET].events = POLLIN0x001; | ||||
| 109 | pollfd[POLL_INOTIFY].fd = notify; | ||||
| 110 | pollfd[POLL_INOTIFY].events = POLLIN0x001; | ||||
| 111 | |||||
| 112 | for (;;) { | ||||
| 113 | int sleep_for = -1, j; | ||||
| 114 | |||||
| 115 | if (until > 0) { | ||||
| 116 | usec_t y; | ||||
| 117 | |||||
| 118 | y = now(CLOCK_MONOTONIC1); | ||||
| 119 | |||||
| 120 | if (y > until) { | ||||
| 121 | r = -ETIME62; | ||||
| 122 | goto finish; | ||||
| 123 | } | ||||
| 124 | |||||
| 125 | sleep_for = (int) ((until - y) / USEC_PER_MSEC((usec_t) 1000ULL)); | ||||
| 126 | } | ||||
| 127 | |||||
| 128 | if (flag_file && access(flag_file, F_OK0) < 0) { | ||||
| 129 | r = -errno(*__errno_location ()); | ||||
| 130 | goto finish; | ||||
| 131 | } | ||||
| 132 | |||||
| 133 | j = poll(pollfd, notify >= 0 ? 2 : 1, sleep_for); | ||||
| 134 | if (j < 0) { | ||||
| 135 | if (errno(*__errno_location ()) == EINTR4) | ||||
| 136 | continue; | ||||
| 137 | |||||
| 138 | r = -errno(*__errno_location ()); | ||||
| 139 | goto finish; | ||||
| 140 | } else if (j == 0) { | ||||
| 141 | r = -ETIME62; | ||||
| 142 | goto finish; | ||||
| 143 | } | ||||
| 144 | |||||
| 145 | if (notify >= 0 && pollfd[POLL_INOTIFY].revents != 0) | ||||
| 146 | (void) flush_fd(notify); | ||||
| 147 | |||||
| 148 | if (pollfd[POLL_SOCKET].revents == 0) | ||||
| 149 | continue; | ||||
| 150 | |||||
| 151 | k = read(fd, buffer + p, sizeof(buffer) - p); | ||||
| 152 | if (k < 0) { | ||||
| 153 | if (IN_SET(errno, EINTR, EAGAIN)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){4, 11})/sizeof(int)]; switch((*__errno_location ())) { case 4: case 11: _found = 1; break; default: break; } _found; })) | ||||
| 154 | continue; | ||||
| 155 | |||||
| 156 | r = -errno(*__errno_location ()); | ||||
| 157 | goto finish; | ||||
| 158 | } else if (k == 0) { | ||||
| 159 | r = -EIO5; | ||||
| 160 | goto finish; | ||||
| 161 | } | ||||
| 162 | |||||
| 163 | p += k; | ||||
| 164 | |||||
| 165 | if (p < 1) | ||||
| 166 | continue; | ||||
| 167 | |||||
| 168 | if (buffer[0] == 5) { | ||||
| 169 | |||||
| 170 | if (flags & ASK_PASSWORD_ACCEPT_CACHED) { | ||||
| 171 | /* Hmm, first try with cached | ||||
| 172 | * passwords failed, so let's retry | ||||
| 173 | * with a normal password request */ | ||||
| 174 | packet = mfree(packet); | ||||
| 175 | |||||
| 176 | if (asprintf(&packet, "*\002%c%s%n", (int) (strlen(message) + 1), message, &n) < 0) { | ||||
| 177 | r = -ENOMEM12; | ||||
| 178 | goto finish; | ||||
| 179 | } | ||||
| 180 | |||||
| 181 | r = loop_write(fd, packet, n+1, true1); | ||||
| 182 | if (r < 0) | ||||
| 183 | goto finish; | ||||
| 184 | |||||
| 185 | flags &= ~ASK_PASSWORD_ACCEPT_CACHED; | ||||
| 186 | p = 0; | ||||
| 187 | continue; | ||||
| 188 | } | ||||
| 189 | |||||
| 190 | /* No password, because UI not shown */ | ||||
| 191 | r = -ENOENT2; | ||||
| 192 | goto finish; | ||||
| 193 | |||||
| 194 | } else if (IN_SET(buffer[0], 2, 9)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){2, 9})/sizeof(int)]; switch(buffer[0]) { case 2: case 9: _found = 1; break; default: break; } _found; })) { | ||||
| 195 | uint32_t size; | ||||
| 196 | char **l; | ||||
| 197 | |||||
| 198 | /* One or more answers */ | ||||
| 199 | if (p < 5) | ||||
| 200 | continue; | ||||
| 201 | |||||
| 202 | memcpy(&size, buffer+1, sizeof(size)); | ||||
| 203 | size = le32toh(size)__uint32_identity (size); | ||||
| 204 | if (size + 5 > sizeof(buffer)) { | ||||
| 205 | r = -EIO5; | ||||
| 206 | goto finish; | ||||
| 207 | } | ||||
| 208 | |||||
| 209 | if (p-5 < size) | ||||
| 210 | continue; | ||||
| 211 | |||||
| 212 | l = strv_parse_nulstr(buffer + 5, size); | ||||
| 213 | if (!l) { | ||||
| 214 | r = -ENOMEM12; | ||||
| 215 | goto finish; | ||||
| 216 | } | ||||
| 217 | |||||
| 218 | *ret = l; | ||||
| 219 | break; | ||||
| 220 | |||||
| 221 | } else { | ||||
| 222 | /* Unknown packet */ | ||||
| 223 | r = -EIO5; | ||||
| 224 | goto finish; | ||||
| 225 | } | ||||
| 226 | } | ||||
| 227 | |||||
| 228 | r = 0; | ||||
| 229 | |||||
| 230 | finish: | ||||
| 231 | explicit_bzero(buffer, sizeof(buffer)); | ||||
| 232 | return r; | ||||
| 233 | } | ||||
| 234 | |||||
| 235 | static int send_passwords(const char *socket_name, char **passwords) { | ||||
| 236 | _cleanup_free___attribute__((cleanup(freep))) char *packet = NULL((void*)0); | ||||
| 237 | _cleanup_close___attribute__((cleanup(closep))) int socket_fd = -1; | ||||
| 238 | union sockaddr_union sa = { .un.sun_family = AF_UNIX1 }; | ||||
| 239 | size_t packet_length = 1; | ||||
| 240 | char **p, *d; | ||||
| 241 | ssize_t n; | ||||
| 242 | int r; | ||||
| 243 | |||||
| 244 | assert(socket_name)do { if ((__builtin_expect(!!(!(socket_name)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("socket_name"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 244, __PRETTY_FUNCTION__); } while (0); | ||||
| 245 | |||||
| 246 | STRV_FOREACH(p, passwords)for ((p) = (passwords); (p) && *(p); (p)++) | ||||
| 247 | packet_length += strlen(*p) + 1; | ||||
| 248 | |||||
| 249 | packet = new(char, packet_length)((char*) malloc_multiply(sizeof(char), (packet_length))); | ||||
| 250 | if (!packet) | ||||
| 251 | return -ENOMEM12; | ||||
| 252 | |||||
| 253 | packet[0] = '+'; | ||||
| 254 | |||||
| 255 | d = packet + 1; | ||||
| 256 | STRV_FOREACH(p, passwords)for ((p) = (passwords); (p) && *(p); (p)++) | ||||
| 257 | d = stpcpy(d, *p) + 1; | ||||
| 258 | |||||
| 259 | socket_fd = socket(AF_UNIX1, SOCK_DGRAMSOCK_DGRAM|SOCK_CLOEXECSOCK_CLOEXEC, 0); | ||||
| 260 | if (socket_fd < 0) { | ||||
| 261 | r = log_debug_errno(errno, "socket(): %m")({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 261, __func__, "socket(): %m") : -abs(_e); }); | ||||
| 262 | goto finish; | ||||
| 263 | } | ||||
| 264 | |||||
| 265 | strncpy(sa.un.sun_path, socket_name, sizeof(sa.un.sun_path)); | ||||
| 266 | |||||
| 267 | n = sendto(socket_fd, packet, packet_length, MSG_NOSIGNALMSG_NOSIGNAL, &sa.sa, SOCKADDR_UN_LEN(sa.un)({ const struct sockaddr_un *_sa = &(sa.un); do { if ((__builtin_expect (!!(!(_sa->sun_family == 1)),0))) log_assert_failed_realm( LOG_REALM_SYSTEMD, ("_sa->sun_family == AF_UNIX"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 267, __PRETTY_FUNCTION__); } while (0); __builtin_offsetof( struct sockaddr_un, sun_path) + (_sa->sun_path[0] == 0 ? 1 + strnlen(_sa->sun_path+1, sizeof(_sa->sun_path)-1) : strnlen (_sa->sun_path, sizeof(_sa->sun_path))); })); | ||||
| 268 | if (n < 0) { | ||||
| 269 | r = log_debug_errno(errno, "sendto(): %m")({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 269, __func__, "sendto(): %m") : -abs(_e); }); | ||||
| 270 | goto finish; | ||||
| 271 | } | ||||
| 272 | |||||
| 273 | r = (int) n; | ||||
| 274 | |||||
| 275 | finish: | ||||
| 276 | explicit_bzero(packet, packet_length); | ||||
| 277 | return r; | ||||
| |||||
| 278 | } | ||||
| 279 | |||||
| 280 | static int parse_password(const char *filename, char **wall) { | ||||
| 281 | _cleanup_free___attribute__((cleanup(freep))) char *socket_name = NULL((void*)0), *message = NULL((void*)0); | ||||
| 282 | bool_Bool accept_cached = false0, echo = false0; | ||||
| 283 | uint64_t not_after = 0; | ||||
| 284 | unsigned pid = 0; | ||||
| 285 | |||||
| 286 | const ConfigTableItem items[] = { | ||||
| 287 | { "Ask", "Socket", config_parse_string, 0, &socket_name }, | ||||
| 288 | { "Ask", "NotAfter", config_parse_uint64, 0, ¬_after }, | ||||
| 289 | { "Ask", "Message", config_parse_string, 0, &message }, | ||||
| 290 | { "Ask", "PID", config_parse_unsigned, 0, &pid }, | ||||
| 291 | { "Ask", "AcceptCached", config_parse_bool, 0, &accept_cached }, | ||||
| 292 | { "Ask", "Echo", config_parse_bool, 0, &echo }, | ||||
| 293 | {} | ||||
| 294 | }; | ||||
| 295 | |||||
| 296 | int r; | ||||
| 297 | |||||
| 298 | assert(filename)do { if ((__builtin_expect(!!(!(filename)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("filename"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 298, __PRETTY_FUNCTION__); } while (0); | ||||
| 299 | |||||
| 300 | r = config_parse(NULL((void*)0), filename, NULL((void*)0), | ||||
| 301 | NULL((void*)0), | ||||
| 302 | config_item_table_lookup, items, | ||||
| 303 | CONFIG_PARSE_RELAXED|CONFIG_PARSE_WARN, NULL((void*)0)); | ||||
| 304 | if (r < 0) | ||||
| 305 | return r; | ||||
| 306 | |||||
| 307 | if (!socket_name) { | ||||
| 308 | log_error("Invalid password file %s", filename)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 308 , __func__, "Invalid password file %s", filename) : -abs(_e); }); | ||||
| 309 | return -EBADMSG74; | ||||
| 310 | } | ||||
| 311 | |||||
| 312 | if (not_after > 0 && now(CLOCK_MONOTONIC1) > not_after) | ||||
| 313 | return 0; | ||||
| 314 | |||||
| 315 | if (pid > 0 && !pid_is_alive(pid)) | ||||
| 316 | return 0; | ||||
| 317 | |||||
| 318 | if (arg_action
| ||||
| 319 | printf("'%s' (PID %u)\n", message, pid); | ||||
| 320 | |||||
| 321 | else if (arg_action
| ||||
| 322 | char *_wall; | ||||
| 323 | |||||
| 324 | if (asprintf(&_wall, | ||||
| 325 | "%s%sPassword entry required for \'%s\' (PID %u).\r\n" | ||||
| 326 | "Please enter password with the systemd-tty-ask-password-agent tool!", | ||||
| 327 | strempty(*wall), | ||||
| 328 | *wall ? "\r\n\r\n" : "", | ||||
| 329 | message, | ||||
| 330 | pid) < 0) | ||||
| 331 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 331, __func__); | ||||
| 332 | |||||
| 333 | free(*wall); | ||||
| 334 | *wall = _wall; | ||||
| 335 | |||||
| 336 | } else { | ||||
| 337 | _cleanup_strv_free_erase___attribute__((cleanup(strv_free_erasep))) char **passwords = NULL((void*)0); | ||||
| 338 | |||||
| 339 | assert(IN_SET(arg_action, ACTION_QUERY, ACTION_WATCH))do { if ((__builtin_expect(!!(!(({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended[20 - sizeof((int[]){ACTION_QUERY, ACTION_WATCH})/sizeof(int)]; switch (arg_action) { case ACTION_QUERY: case ACTION_WATCH: _found = 1; break; default: break; } _found; }))),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("IN_SET(arg_action, ACTION_QUERY, ACTION_WATCH)" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 339 , __PRETTY_FUNCTION__); } while (0); | ||||
| 340 | |||||
| 341 | if (access(socket_name, W_OK2) < 0) { | ||||
| 342 | if (arg_action == ACTION_QUERY) | ||||
| 343 | log_info("Not querying '%s' (PID %u), lacking privileges.", message, pid)({ int _level = (((6))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 343 , __func__, "Not querying '%s' (PID %u), lacking privileges." , message, pid) : -abs(_e); }); | ||||
| 344 | |||||
| 345 | return 0; | ||||
| 346 | } | ||||
| 347 | |||||
| 348 | if (arg_plymouth
| ||||
| 349 | r = ask_password_plymouth(message, not_after, accept_cached ? ASK_PASSWORD_ACCEPT_CACHED : 0, filename, &passwords); | ||||
| 350 | else { | ||||
| 351 | char *password = NULL((void*)0); | ||||
| 352 | int tty_fd = -1; | ||||
| 353 | |||||
| 354 | if (arg_console
| ||||
| 355 | const char *con = arg_device ?: "/dev/console"; | ||||
| 356 | |||||
| 357 | tty_fd = acquire_terminal(con, ACQUIRE_TERMINAL_WAIT, USEC_INFINITY((usec_t) -1)); | ||||
| 358 | if (tty_fd < 0) | ||||
| 359 | return log_error_errno(tty_fd, "Failed to acquire %s: %m", con)({ int _level = ((3)), _e = ((tty_fd)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 359 , __func__, "Failed to acquire %s: %m", con) : -abs(_e); }); | ||||
| 360 | |||||
| 361 | r = reset_terminal_fd(tty_fd, true1); | ||||
| 362 | if (r < 0) | ||||
| 363 | log_warning_errno(r, "Failed to reset terminal, ignoring: %m")({ int _level = ((4)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 363 , __func__, "Failed to reset terminal, ignoring: %m") : -abs( _e); }); | ||||
| 364 | } | ||||
| 365 | |||||
| 366 | r = ask_password_tty(tty_fd, message, NULL((void*)0), not_after, | ||||
| 367 | (echo ? ASK_PASSWORD_ECHO : 0) | | ||||
| 368 | (arg_console
| ||||
| 369 | filename, &password); | ||||
| 370 | |||||
| 371 | if (arg_console
| ||||
| 372 | tty_fd = safe_close(tty_fd); | ||||
| 373 | release_terminal(); | ||||
| 374 | } | ||||
| 375 | |||||
| 376 | if (r >= 0) | ||||
| 377 | r = strv_push(&passwords, password); | ||||
| 378 | |||||
| 379 | if (r < 0) | ||||
| 380 | string_free_erase(password); | ||||
| 381 | } | ||||
| 382 | |||||
| 383 | /* If the query went away, that's OK */ | ||||
| 384 | if (IN_SET(r, -ETIME, -ENOENT)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){-62, -2})/sizeof(int)]; switch(r) { case -62: case -2: _found = 1; break; default: break; } _found; } )) | ||||
| 385 | return 0; | ||||
| 386 | |||||
| 387 | if (r
| ||||
| 388 | return log_error_errno(r, "Failed to query password: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 388 , __func__, "Failed to query password: %m") : -abs(_e); }); | ||||
| 389 | |||||
| 390 | r = send_passwords(socket_name, passwords); | ||||
| 391 | if (r < 0) | ||||
| 392 | return log_error_errno(r, "Failed to send: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 392 , __func__, "Failed to send: %m") : -abs(_e); }); | ||||
| 393 | } | ||||
| 394 | |||||
| 395 | return 0; | ||||
| 396 | } | ||||
| 397 | |||||
| 398 | static int wall_tty_block(void) { | ||||
| 399 | _cleanup_free___attribute__((cleanup(freep))) char *p = NULL((void*)0); | ||||
| 400 | dev_t devnr; | ||||
| 401 | int fd, r; | ||||
| 402 | |||||
| 403 | r = get_ctty_devnr(0, &devnr); | ||||
| 404 | if (r == -ENXIO6) /* We have no controlling tty */ | ||||
| 405 | return -ENOTTY25; | ||||
| 406 | if (r < 0) | ||||
| 407 | return log_error_errno(r, "Failed to get controlling TTY: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 407 , __func__, "Failed to get controlling TTY: %m") : -abs(_e); } ); | ||||
| 408 | |||||
| 409 | if (asprintf(&p, "/run/systemd/ask-password-block/%u:%u", major(devnr)gnu_dev_major (devnr), minor(devnr)gnu_dev_minor (devnr)) < 0) | ||||
| 410 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 410, __func__); | ||||
| 411 | |||||
| 412 | (void) mkdir_parents_label(p, 0700); | ||||
| 413 | (void) mkfifo(p, 0600); | ||||
| 414 | |||||
| 415 | fd = open(p, O_RDONLY00|O_CLOEXEC02000000|O_NONBLOCK04000|O_NOCTTY0400); | ||||
| 416 | if (fd < 0) | ||||
| 417 | return log_debug_errno(errno, "Failed to open %s: %m", p)({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 417, __func__, "Failed to open %s: %m", p) : -abs(_e); }); | ||||
| 418 | |||||
| 419 | return fd; | ||||
| 420 | } | ||||
| 421 | |||||
| 422 | static bool_Bool wall_tty_match(const char *path, void *userdata) { | ||||
| 423 | _cleanup_free___attribute__((cleanup(freep))) char *p = NULL((void*)0); | ||||
| 424 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1; | ||||
| 425 | struct stat st; | ||||
| 426 | |||||
| 427 | if (!path_is_absolute(path)) | ||||
| 428 | path = strjoina("/dev/", path)({ const char *_appendees_[] = { "/dev/", path }; char *_d_, * _p_; size_t _len_ = 0; size_t _i_; for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p(typeof (_appendees_), typeof(&*(_appendees_))), sizeof(_appendees_ )/sizeof((_appendees_)[0]), ((void)0))) && _appendees_ [_i_]; _i_++) _len_ += strlen(_appendees_[_i_]); _p_ = _d_ = __builtin_alloca (_len_ + 1); for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(_appendees_), typeof(& *(_appendees_))), sizeof(_appendees_)/sizeof((_appendees_)[0] ), ((void)0))) && _appendees_[_i_]; _i_++) _p_ = stpcpy (_p_, _appendees_[_i_]); *_p_ = 0; _d_; }); | ||||
| 429 | |||||
| 430 | if (lstat(path, &st) < 0) { | ||||
| 431 | log_debug_errno(errno, "Failed to stat %s: %m", path)({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 431, __func__, "Failed to stat %s: %m", path) : -abs(_e); } ); | ||||
| 432 | return true1; | ||||
| 433 | } | ||||
| 434 | |||||
| 435 | if (!S_ISCHR(st.st_mode)((((st.st_mode)) & 0170000) == (0020000))) { | ||||
| 436 | log_debug("%s is not a character device.", path)({ int _level = (((7))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 436 , __func__, "%s is not a character device.", path) : -abs(_e) ; }); | ||||
| 437 | return true1; | ||||
| 438 | } | ||||
| 439 | |||||
| 440 | /* We use named pipes to ensure that wall messages suggesting | ||||
| 441 | * password entry are not printed over password prompts | ||||
| 442 | * already shown. We use the fact here that opening a pipe in | ||||
| 443 | * non-blocking mode for write-only will succeed only if | ||||
| 444 | * there's some writer behind it. Using pipes has the | ||||
| 445 | * advantage that the block will automatically go away if the | ||||
| 446 | * process dies. */ | ||||
| 447 | |||||
| 448 | if (asprintf(&p, "/run/systemd/ask-password-block/%u:%u", major(st.st_rdev)gnu_dev_major (st.st_rdev), minor(st.st_rdev)gnu_dev_minor (st.st_rdev)) < 0) { | ||||
| 449 | log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 449, __func__); | ||||
| 450 | return true1; | ||||
| 451 | } | ||||
| 452 | |||||
| 453 | fd = open(p, O_WRONLY01|O_CLOEXEC02000000|O_NONBLOCK04000|O_NOCTTY0400); | ||||
| 454 | if (fd < 0) { | ||||
| 455 | log_debug_errno(errno, "Failed to open the wall pipe: %m")({ int _level = ((7)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 455, __func__, "Failed to open the wall pipe: %m") : -abs(_e ); }); | ||||
| 456 | return 1; | ||||
| 457 | } | ||||
| 458 | |||||
| 459 | /* What, we managed to open the pipe? Then this tty is filtered. */ | ||||
| 460 | return 0; | ||||
| 461 | } | ||||
| 462 | |||||
| 463 | static int show_passwords(void) { | ||||
| 464 | _cleanup_closedir___attribute__((cleanup(closedirp))) DIR *d; | ||||
| 465 | struct dirent *de; | ||||
| 466 | int r = 0; | ||||
| 467 | |||||
| 468 | d = opendir("/run/systemd/ask-password"); | ||||
| 469 | if (!d) { | ||||
| 470 | if (errno(*__errno_location ()) == ENOENT2) | ||||
| 471 | return 0; | ||||
| 472 | |||||
| 473 | return log_error_errno(errno, "Failed to open /run/systemd/ask-password: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 473, __func__, "Failed to open /run/systemd/ask-password: %m" ) : -abs(_e); }); | ||||
| 474 | } | ||||
| 475 | |||||
| 476 | FOREACH_DIRENT_ALL(de, d, return log_error_errno(errno, "Failed to read directory: %m"))for ((*__errno_location ()) = 0, de = readdir(d);; (*__errno_location ()) = 0, de = readdir(d)) if (!de) { if ((*__errno_location ( )) > 0) { return ({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm (_realm) >= ((_level) & 0x07)) ? log_internal_realm((( _realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 476, __func__, "Failed to read directory: %m") : -abs(_e); } ); } break; } else { | ||||
| 477 | _cleanup_free___attribute__((cleanup(freep))) char *p = NULL((void*)0), *wall = NULL((void*)0); | ||||
| 478 | int q; | ||||
| 479 | |||||
| 480 | /* We only support /dev on tmpfs, hence we can rely on | ||||
| 481 | * d_type to be reliable */ | ||||
| 482 | |||||
| 483 | if (de->d_type != DT_REGDT_REG) | ||||
| 484 | continue; | ||||
| 485 | |||||
| 486 | if (hidden_or_backup_file(de->d_name)) | ||||
| 487 | continue; | ||||
| 488 | |||||
| 489 | if (!startswith(de->d_name, "ask.")) | ||||
| 490 | continue; | ||||
| 491 | |||||
| 492 | p = strappend("/run/systemd/ask-password/", de->d_name); | ||||
| 493 | if (!p) | ||||
| 494 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 494, __func__); | ||||
| 495 | |||||
| 496 | q = parse_password(p, &wall); | ||||
| 497 | if (q < 0 && r == 0) | ||||
| 498 | r = q; | ||||
| 499 | |||||
| 500 | if (wall) | ||||
| 501 | (void) utmp_wall(wall, NULL((void*)0), NULL((void*)0), wall_tty_match, NULL((void*)0)); | ||||
| 502 | } | ||||
| 503 | |||||
| 504 | return r; | ||||
| 505 | } | ||||
| 506 | |||||
| 507 | static int watch_passwords(void) { | ||||
| 508 | enum { | ||||
| 509 | FD_INOTIFY, | ||||
| 510 | FD_SIGNAL, | ||||
| 511 | _FD_MAX | ||||
| 512 | }; | ||||
| 513 | |||||
| 514 | _cleanup_close___attribute__((cleanup(closep))) int notify = -1, signal_fd = -1, tty_block_fd = -1; | ||||
| 515 | struct pollfd pollfd[_FD_MAX] = {}; | ||||
| 516 | sigset_t mask; | ||||
| 517 | int r; | ||||
| 518 | |||||
| 519 | tty_block_fd = wall_tty_block(); | ||||
| 520 | |||||
| 521 | (void) mkdir_p_label("/run/systemd/ask-password", 0755); | ||||
| 522 | |||||
| 523 | notify = inotify_init1(IN_CLOEXECIN_CLOEXEC); | ||||
| 524 | if (notify < 0) | ||||
| 525 | return log_error_errno(errno, "Failed to allocate directory watch: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 525, __func__, "Failed to allocate directory watch: %m") : - abs(_e); }); | ||||
| 526 | |||||
| 527 | if (inotify_add_watch(notify, "/run/systemd/ask-password", IN_CLOSE_WRITE0x00000008|IN_MOVED_TO0x00000080) < 0) | ||||
| 528 | return log_error_errno(errno, "Failed to add /run/systemd/ask-password to directory watch: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 528, __func__, "Failed to add /run/systemd/ask-password to directory watch: %m" ) : -abs(_e); }); | ||||
| 529 | |||||
| 530 | assert_se(sigemptyset(&mask) >= 0)do { if ((__builtin_expect(!!(!(sigemptyset(&mask) >= 0 )),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("sigemptyset(&mask) >= 0" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 530 , __PRETTY_FUNCTION__); } while (0); | ||||
| 531 | assert_se(sigset_add_many(&mask, SIGINT, SIGTERM, -1) >= 0)do { if ((__builtin_expect(!!(!(sigset_add_many(&mask, 2, 15, -1) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("sigset_add_many(&mask, SIGINT, SIGTERM, -1) >= 0") , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 531 , __PRETTY_FUNCTION__); } while (0); | ||||
| 532 | assert_se(sigprocmask(SIG_SETMASK, &mask, NULL) >= 0)do { if ((__builtin_expect(!!(!(sigprocmask(2, &mask, ((void *)0)) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("sigprocmask(SIG_SETMASK, &mask, NULL) >= 0"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 532, __PRETTY_FUNCTION__); } while (0); | ||||
| 533 | |||||
| 534 | signal_fd = signalfd(-1, &mask, SFD_NONBLOCKSFD_NONBLOCK|SFD_CLOEXECSFD_CLOEXEC); | ||||
| 535 | if (signal_fd < 0) | ||||
| 536 | return log_error_errno(errno, "Failed to allocate signal file descriptor: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 536, __func__, "Failed to allocate signal file descriptor: %m" ) : -abs(_e); }); | ||||
| 537 | |||||
| 538 | pollfd[FD_INOTIFY].fd = notify; | ||||
| 539 | pollfd[FD_INOTIFY].events = POLLIN0x001; | ||||
| 540 | pollfd[FD_SIGNAL].fd = signal_fd; | ||||
| 541 | pollfd[FD_SIGNAL].events = POLLIN0x001; | ||||
| 542 | |||||
| 543 | for (;;) { | ||||
| 544 | r = show_passwords(); | ||||
| 545 | if (r < 0) | ||||
| 546 | log_error_errno(r, "Failed to show password: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 546 , __func__, "Failed to show password: %m") : -abs(_e); }); | ||||
| 547 | |||||
| 548 | if (poll(pollfd, _FD_MAX, -1) < 0) { | ||||
| 549 | if (errno(*__errno_location ()) == EINTR4) | ||||
| 550 | continue; | ||||
| 551 | |||||
| 552 | return -errno(*__errno_location ()); | ||||
| 553 | } | ||||
| 554 | |||||
| 555 | if (pollfd[FD_INOTIFY].revents != 0) | ||||
| 556 | (void) flush_fd(notify); | ||||
| 557 | |||||
| 558 | if (pollfd[FD_SIGNAL].revents != 0) | ||||
| 559 | break; | ||||
| 560 | } | ||||
| 561 | |||||
| 562 | return 0; | ||||
| 563 | } | ||||
| 564 | |||||
| 565 | static void help(void) { | ||||
| 566 | printf("%s [OPTIONS...]\n\n" | ||||
| 567 | "Process system password requests.\n\n" | ||||
| 568 | " -h --help Show this help\n" | ||||
| 569 | " --version Show package version\n" | ||||
| 570 | " --list Show pending password requests\n" | ||||
| 571 | " --query Process pending password requests\n" | ||||
| 572 | " --watch Continuously process password requests\n" | ||||
| 573 | " --wall Continuously forward password requests to wall\n" | ||||
| 574 | " --plymouth Ask question with Plymouth instead of on TTY\n" | ||||
| 575 | " --console Ask question on /dev/console instead of current TTY\n", | ||||
| 576 | program_invocation_short_name); | ||||
| 577 | } | ||||
| 578 | |||||
| 579 | static int parse_argv(int argc, char *argv[]) { | ||||
| 580 | |||||
| 581 | enum { | ||||
| 582 | ARG_LIST = 0x100, | ||||
| 583 | ARG_QUERY, | ||||
| 584 | ARG_WATCH, | ||||
| 585 | ARG_WALL, | ||||
| 586 | ARG_PLYMOUTH, | ||||
| 587 | ARG_CONSOLE, | ||||
| 588 | ARG_VERSION | ||||
| 589 | }; | ||||
| 590 | |||||
| 591 | static const struct option options[] = { | ||||
| 592 | { "help", no_argument0, NULL((void*)0), 'h' }, | ||||
| 593 | { "version", no_argument0, NULL((void*)0), ARG_VERSION }, | ||||
| 594 | { "list", no_argument0, NULL((void*)0), ARG_LIST }, | ||||
| 595 | { "query", no_argument0, NULL((void*)0), ARG_QUERY }, | ||||
| 596 | { "watch", no_argument0, NULL((void*)0), ARG_WATCH }, | ||||
| 597 | { "wall", no_argument0, NULL((void*)0), ARG_WALL }, | ||||
| 598 | { "plymouth", no_argument0, NULL((void*)0), ARG_PLYMOUTH }, | ||||
| 599 | { "console", optional_argument2, NULL((void*)0), ARG_CONSOLE }, | ||||
| 600 | {} | ||||
| 601 | }; | ||||
| 602 | |||||
| 603 | int c; | ||||
| 604 | |||||
| 605 | assert(argc >= 0)do { if ((__builtin_expect(!!(!(argc >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("argc >= 0"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 605, __PRETTY_FUNCTION__); } while (0); | ||||
| 606 | assert(argv)do { if ((__builtin_expect(!!(!(argv)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("argv"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 606, __PRETTY_FUNCTION__); } while (0); | ||||
| 607 | |||||
| 608 | while ((c = getopt_long(argc, argv, "h", options, NULL((void*)0))) >= 0) | ||||
| 609 | |||||
| 610 | switch (c) { | ||||
| 611 | |||||
| 612 | case 'h': | ||||
| 613 | help(); | ||||
| 614 | return 0; | ||||
| 615 | |||||
| 616 | case ARG_VERSION: | ||||
| 617 | return version(); | ||||
| 618 | |||||
| 619 | case ARG_LIST: | ||||
| 620 | arg_action = ACTION_LIST; | ||||
| 621 | break; | ||||
| 622 | |||||
| 623 | case ARG_QUERY: | ||||
| 624 | arg_action = ACTION_QUERY; | ||||
| 625 | break; | ||||
| 626 | |||||
| 627 | case ARG_WATCH: | ||||
| 628 | arg_action = ACTION_WATCH; | ||||
| 629 | break; | ||||
| 630 | |||||
| 631 | case ARG_WALL: | ||||
| 632 | arg_action = ACTION_WALL; | ||||
| 633 | break; | ||||
| 634 | |||||
| 635 | case ARG_PLYMOUTH: | ||||
| 636 | arg_plymouth = true1; | ||||
| 637 | break; | ||||
| 638 | |||||
| 639 | case ARG_CONSOLE: | ||||
| 640 | arg_console = true1; | ||||
| 641 | if (optarg) { | ||||
| 642 | |||||
| 643 | if (isempty(optarg)) { | ||||
| 644 | log_error("Empty console device path is not allowed.")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 644 , __func__, "Empty console device path is not allowed.") : -abs (_e); }); | ||||
| 645 | return -EINVAL22; | ||||
| 646 | } | ||||
| 647 | |||||
| 648 | arg_device = optarg; | ||||
| 649 | } | ||||
| 650 | break; | ||||
| 651 | |||||
| 652 | case '?': | ||||
| 653 | return -EINVAL22; | ||||
| 654 | |||||
| 655 | default: | ||||
| 656 | assert_not_reached("Unhandled option")do { log_assert_failed_unreachable_realm(LOG_REALM_SYSTEMD, ( "Unhandled option"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 656, __PRETTY_FUNCTION__); } while (0); | ||||
| 657 | } | ||||
| 658 | |||||
| 659 | if (optind != argc) { | ||||
| 660 | log_error("%s takes no arguments.", program_invocation_short_name)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 660 , __func__, "%s takes no arguments.", program_invocation_short_name ) : -abs(_e); }); | ||||
| 661 | return -EINVAL22; | ||||
| 662 | } | ||||
| 663 | |||||
| 664 | if (arg_plymouth || arg_console) { | ||||
| 665 | |||||
| 666 | if (!IN_SET(arg_action, ACTION_QUERY, ACTION_WATCH)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){ACTION_QUERY, ACTION_WATCH})/sizeof(int) ]; switch(arg_action) { case ACTION_QUERY: case ACTION_WATCH: _found = 1; break; default: break; } _found; })) { | ||||
| 667 | log_error("Options --query and --watch conflict.")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 667 , __func__, "Options --query and --watch conflict.") : -abs(_e ); }); | ||||
| 668 | return -EINVAL22; | ||||
| 669 | } | ||||
| 670 | |||||
| 671 | if (arg_plymouth && arg_console) { | ||||
| 672 | log_error("Options --plymouth and --console conflict.")({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 672 , __func__, "Options --plymouth and --console conflict.") : - abs(_e); }); | ||||
| 673 | return -EINVAL22; | ||||
| 674 | } | ||||
| 675 | } | ||||
| 676 | |||||
| 677 | return 1; | ||||
| 678 | } | ||||
| 679 | |||||
| 680 | /* | ||||
| 681 | * To be able to ask on all terminal devices of /dev/console | ||||
| 682 | * the devices are collected. If more than one device is found, | ||||
| 683 | * then on each of the terminals a inquiring task is forked. | ||||
| 684 | * Every task has its own session and its own controlling terminal. | ||||
| 685 | * If one of the tasks does handle a password, the remaining tasks | ||||
| 686 | * will be terminated. | ||||
| 687 | */ | ||||
| 688 | static int ask_on_this_console(const char *tty, pid_t *ret_pid, int argc, char *argv[]) { | ||||
| 689 | struct sigaction sig = { | ||||
| 690 | .sa_handler__sigaction_handler.sa_handler = nop_signal_handler, | ||||
| 691 | .sa_flags = SA_NOCLDSTOP1 | SA_RESTART0x10000000, | ||||
| 692 | }; | ||||
| 693 | pid_t pid; | ||||
| 694 | int r; | ||||
| 695 | |||||
| 696 | assert_se(sigprocmask_many(SIG_UNBLOCK, NULL, SIGHUP, SIGCHLD, -1) >= 0)do { if ((__builtin_expect(!!(!(sigprocmask_many(1, ((void*)0 ), 1, 17, -1) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("sigprocmask_many(SIG_UNBLOCK, NULL, SIGHUP, SIGCHLD, -1) >= 0" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 696 , __PRETTY_FUNCTION__); } while (0); | ||||
| 697 | |||||
| 698 | assert_se(sigemptyset(&sig.sa_mask) >= 0)do { if ((__builtin_expect(!!(!(sigemptyset(&sig.sa_mask) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("sigemptyset(&sig.sa_mask) >= 0" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 698 , __PRETTY_FUNCTION__); } while (0); | ||||
| 699 | assert_se(sigaction(SIGCHLD, &sig, NULL) >= 0)do { if ((__builtin_expect(!!(!(sigaction(17, &sig, ((void *)0)) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("sigaction(SIGCHLD, &sig, NULL) >= 0"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 699, __PRETTY_FUNCTION__); } while (0); | ||||
| 700 | |||||
| 701 | sig.sa_handler__sigaction_handler.sa_handler = SIG_DFL((__sighandler_t) 0); | ||||
| 702 | assert_se(sigaction(SIGHUP, &sig, NULL) >= 0)do { if ((__builtin_expect(!!(!(sigaction(1, &sig, ((void *)0)) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD , ("sigaction(SIGHUP, &sig, NULL) >= 0"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 702, __PRETTY_FUNCTION__); } while (0); | ||||
| 703 | |||||
| 704 | r = safe_fork("(sd-passwd)", FORK_RESET_SIGNALS|FORK_LOG, &pid); | ||||
| 705 | if (r < 0) | ||||
| 706 | return r; | ||||
| 707 | if (r == 0) { | ||||
| 708 | int ac; | ||||
| 709 | |||||
| 710 | assert_se(prctl(PR_SET_PDEATHSIG, SIGHUP) >= 0)do { if ((__builtin_expect(!!(!(prctl(1, 1) >= 0)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("prctl(PR_SET_PDEATHSIG, SIGHUP) >= 0" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 710 , __PRETTY_FUNCTION__); } while (0); | ||||
| 711 | |||||
| 712 | for (ac = 0; ac < argc; ac++) { | ||||
| 713 | if (streq(argv[ac], "--console")(strcmp((argv[ac]),("--console")) == 0)) { | ||||
| 714 | argv[ac] = strjoina("--console=", tty)({ const char *_appendees_[] = { "--console=", tty }; char *_d_ , *_p_; size_t _len_ = 0; size_t _i_; for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p(typeof (_appendees_), typeof(&*(_appendees_))), sizeof(_appendees_ )/sizeof((_appendees_)[0]), ((void)0))) && _appendees_ [_i_]; _i_++) _len_ += strlen(_appendees_[_i_]); _p_ = _d_ = __builtin_alloca (_len_ + 1); for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(_appendees_), typeof(& *(_appendees_))), sizeof(_appendees_)/sizeof((_appendees_)[0] ), ((void)0))) && _appendees_[_i_]; _i_++) _p_ = stpcpy (_p_, _appendees_[_i_]); *_p_ = 0; _d_; }); | ||||
| 715 | break; | ||||
| 716 | } | ||||
| 717 | } | ||||
| 718 | |||||
| 719 | assert(ac < argc)do { if ((__builtin_expect(!!(!(ac < argc)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("ac < argc"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 719, __PRETTY_FUNCTION__); } while (0); | ||||
| 720 | |||||
| 721 | execv(SYSTEMD_TTY_ASK_PASSWORD_AGENT_BINARY_PATH"/usr/bin/systemd-tty-ask-password-agent", argv); | ||||
| 722 | _exit(EXIT_FAILURE1); | ||||
| 723 | } | ||||
| 724 | |||||
| 725 | *ret_pid = pid; | ||||
| 726 | return 0; | ||||
| 727 | } | ||||
| 728 | |||||
| 729 | static void terminate_agents(Set *pids) { | ||||
| 730 | struct timespec ts; | ||||
| 731 | siginfo_t status = {}; | ||||
| 732 | sigset_t set; | ||||
| 733 | Iterator i; | ||||
| 734 | void *p; | ||||
| 735 | int r, signum; | ||||
| 736 | |||||
| 737 | /* | ||||
| 738 | * Request termination of the remaining processes as those | ||||
| 739 | * are not required anymore. | ||||
| 740 | */ | ||||
| 741 | SET_FOREACH(p, pids, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); set_iterate((pids), &(i), (void **)&(p)); ) | ||||
| 742 | (void) kill(PTR_TO_PID(p), SIGTERM15); | ||||
| 743 | |||||
| 744 | /* | ||||
| 745 | * Collect the processes which have go away. | ||||
| 746 | */ | ||||
| 747 | assert_se(sigemptyset(&set) >= 0)do { if ((__builtin_expect(!!(!(sigemptyset(&set) >= 0 )),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("sigemptyset(&set) >= 0" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 747 , __PRETTY_FUNCTION__); } while (0); | ||||
| 748 | assert_se(sigaddset(&set, SIGCHLD) >= 0)do { if ((__builtin_expect(!!(!(sigaddset(&set, 17) >= 0)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("sigaddset(&set, SIGCHLD) >= 0" ), "../src/tty-ask-password-agent/tty-ask-password-agent.c", 748 , __PRETTY_FUNCTION__); } while (0); | ||||
| 749 | timespec_store(&ts, 50 * USEC_PER_MSEC((usec_t) 1000ULL)); | ||||
| 750 | |||||
| 751 | while (!set_isempty(pids)) { | ||||
| 752 | |||||
| 753 | zero(status)(({ size_t _l_ = (sizeof(status)); void *_x_ = (&(status) ); _l_ == 0 ? _x_ : memset(_x_, 0, _l_); })); | ||||
| 754 | r = waitid(P_ALL, 0, &status, WEXITED4|WNOHANG1); | ||||
| 755 | if (r < 0 && errno(*__errno_location ()) == EINTR4) | ||||
| 756 | continue; | ||||
| 757 | |||||
| 758 | if (r == 0 && status.si_pid_sifields._kill.si_pid > 0) { | ||||
| 759 | set_remove(pids, PID_TO_PTR(status.si_pid_sifields._kill.si_pid)); | ||||
| 760 | continue; | ||||
| 761 | } | ||||
| 762 | |||||
| 763 | signum = sigtimedwait(&set, NULL((void*)0), &ts); | ||||
| 764 | if (signum < 0) { | ||||
| 765 | if (errno(*__errno_location ()) != EAGAIN11) | ||||
| 766 | log_error_errno(errno, "sigtimedwait() failed: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 766, __func__, "sigtimedwait() failed: %m") : -abs(_e); }); | ||||
| 767 | break; | ||||
| 768 | } | ||||
| 769 | assert(signum == SIGCHLD)do { if ((__builtin_expect(!!(!(signum == 17)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("signum == SIGCHLD"), "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 769, __PRETTY_FUNCTION__); } while (0); | ||||
| 770 | } | ||||
| 771 | |||||
| 772 | /* | ||||
| 773 | * Kill hanging processes. | ||||
| 774 | */ | ||||
| 775 | SET_FOREACH(p, pids, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); set_iterate((pids), &(i), (void **)&(p)); ) { | ||||
| 776 | log_warning("Failed to terminate child %d, killing it", PTR_TO_PID(p))({ int _level = (((4))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 776 , __func__, "Failed to terminate child %d, killing it", PTR_TO_PID (p)) : -abs(_e); }); | ||||
| 777 | (void) kill(PTR_TO_PID(p), SIGKILL9); | ||||
| 778 | } | ||||
| 779 | } | ||||
| 780 | |||||
| 781 | static int ask_on_consoles(int argc, char *argv[]) { | ||||
| 782 | _cleanup_set_free___attribute__((cleanup(set_freep))) Set *pids = NULL((void*)0); | ||||
| 783 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **consoles = NULL((void*)0); | ||||
| 784 | siginfo_t status = {}; | ||||
| 785 | char **tty; | ||||
| 786 | pid_t pid; | ||||
| 787 | int r; | ||||
| 788 | |||||
| 789 | r = get_kernel_consoles(&consoles); | ||||
| 790 | if (r < 0) | ||||
| 791 | return log_error_errno(r, "Failed to determine devices of /dev/console: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 791 , __func__, "Failed to determine devices of /dev/console: %m" ) : -abs(_e); }); | ||||
| 792 | |||||
| 793 | pids = set_new(NULL)internal_set_new(((void*)0) ); | ||||
| 794 | if (!pids) | ||||
| 795 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 795, __func__); | ||||
| 796 | |||||
| 797 | /* Start an agent on each console. */ | ||||
| 798 | STRV_FOREACH(tty, consoles)for ((tty) = (consoles); (tty) && *(tty); (tty)++) { | ||||
| 799 | r = ask_on_this_console(*tty, &pid, argc, argv); | ||||
| 800 | if (r < 0) | ||||
| 801 | return r; | ||||
| 802 | |||||
| 803 | if (set_put(pids, PID_TO_PTR(pid)) < 0) | ||||
| 804 | return log_oom()log_oom_internal(LOG_REALM_SYSTEMD, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 804, __func__); | ||||
| 805 | } | ||||
| 806 | |||||
| 807 | /* Wait for an agent to exit. */ | ||||
| 808 | for (;;) { | ||||
| 809 | zero(status)(({ size_t _l_ = (sizeof(status)); void *_x_ = (&(status) ); _l_ == 0 ? _x_ : memset(_x_, 0, _l_); })); | ||||
| 810 | |||||
| 811 | if (waitid(P_ALL, 0, &status, WEXITED4) < 0) { | ||||
| 812 | if (errno(*__errno_location ()) == EINTR4) | ||||
| 813 | continue; | ||||
| 814 | |||||
| 815 | return log_error_errno(errno, "waitid() failed: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/tty-ask-password-agent/tty-ask-password-agent.c" , 815, __func__, "waitid() failed: %m") : -abs(_e); }); | ||||
| 816 | } | ||||
| 817 | |||||
| 818 | set_remove(pids, PID_TO_PTR(status.si_pid_sifields._kill.si_pid)); | ||||
| 819 | break; | ||||
| 820 | } | ||||
| 821 | |||||
| 822 | if (!is_clean_exit(status.si_code, status.si_status_sifields._sigchld.si_status, EXIT_CLEAN_DAEMON, NULL((void*)0))) | ||||
| 823 | log_error("Password agent failed with: %d", status.si_status)({ int _level = (((3))), _e = ((0)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/tty-ask-password-agent/tty-ask-password-agent.c", 823 , __func__, "Password agent failed with: %d", status._sifields ._sigchld.si_status) : -abs(_e); }); | ||||
| 824 | |||||
| 825 | terminate_agents(pids); | ||||
| 826 | return 0; | ||||
| 827 | } | ||||
| 828 | |||||
| 829 | int main(int argc, char *argv[]) { | ||||
| 830 | int r; | ||||
| 831 | |||||
| 832 | log_set_target(LOG_TARGET_AUTO); | ||||
| 833 | log_parse_environment()log_parse_environment_realm(LOG_REALM_SYSTEMD); | ||||
| 834 | log_open(); | ||||
| 835 | |||||
| 836 | umask(0022); | ||||
| 837 | |||||
| 838 | r = parse_argv(argc, argv); | ||||
| 839 | if (r
| ||||
| |||||
| 840 | goto finish; | ||||
| 841 | |||||
| 842 | if (arg_console
| ||||
| 843 | /* | ||||
| 844 | * Spawn for each console device a separate process. | ||||
| 845 | */ | ||||
| 846 | r = ask_on_consoles(argc, argv); | ||||
| 847 | else { | ||||
| 848 | |||||
| 849 | if (arg_device
| ||||
| 850 | /* | ||||
| 851 | * Later on, a controlling terminal will be acquired, | ||||
| 852 | * therefore the current process has to become a session | ||||
| 853 | * leader and should not have a controlling terminal already. | ||||
| 854 | */ | ||||
| 855 | (void) setsid(); | ||||
| 856 | (void) release_terminal(); | ||||
| 857 | } | ||||
| 858 | |||||
| 859 | if (IN_SET(arg_action, ACTION_WATCH, ACTION_WALL)({ _Bool _found = 0; static __attribute__ ((unused)) char _static_assert__macros_need_to_be_extended [20 - sizeof((int[]){ACTION_WATCH, ACTION_WALL})/sizeof(int)] ; switch(arg_action) { case ACTION_WATCH: case ACTION_WALL: _found = 1; break; default: break; } _found; })) | ||||
| 860 | r = watch_passwords(); | ||||
| 861 | else | ||||
| 862 | r = show_passwords(); | ||||
| 863 | } | ||||
| 864 | |||||
| 865 | finish: | ||||
| 866 | return r < 0 ? EXIT_FAILURE1 : EXIT_SUCCESS0; | ||||
| 867 | } |
| 1 | /* SPDX-License-Identifier: LGPL-2.1+ */ |
| 2 | #pragma once |
| 3 | |
| 4 | #include <alloca.h> |
| 5 | #include <stddef.h> |
| 6 | #include <stdlib.h> |
| 7 | #include <string.h> |
| 8 | |
| 9 | #include "macro.h" |
| 10 | |
| 11 | #define new(t, n)((t*) malloc_multiply(sizeof(t), (n))) ((t*) malloc_multiply(sizeof(t), (n))) |
| 12 | |
| 13 | #define new0(t, n)((t*) calloc((n), sizeof(t))) ((t*) calloc((n), sizeof(t))) |
| 14 | |
| 15 | #define newa(t, n)({ do { if ((__builtin_expect(!!(!(!size_multiply_overflow(sizeof (t), n))),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("!size_multiply_overflow(sizeof(t), n)" ), "../src/basic/alloc-util.h", 15, __PRETTY_FUNCTION__); } while (0); (t*) __builtin_alloca (sizeof(t)*(n)); }) \ |
| 16 | ({ \ |
| 17 | assert(!size_multiply_overflow(sizeof(t), n))do { if ((__builtin_expect(!!(!(!size_multiply_overflow(sizeof (t), n))),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("!size_multiply_overflow(sizeof(t), n)" ), "../src/basic/alloc-util.h", 17, __PRETTY_FUNCTION__); } while (0); \ |
| 18 | (t*) alloca(sizeof(t)*(n))__builtin_alloca (sizeof(t)*(n)); \ |
| 19 | }) |
| 20 | |
| 21 | #define newa0(t, n)({ do { if ((__builtin_expect(!!(!(!size_multiply_overflow(sizeof (t), n))),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("!size_multiply_overflow(sizeof(t), n)" ), "../src/basic/alloc-util.h", 21, __PRETTY_FUNCTION__); } while (0); (t*) ({ char *_new_; size_t _len_ = sizeof(t)*(n); _new_ = __builtin_alloca (_len_); (void *) memset(_new_, 0, _len_) ; }); }) \ |
| 22 | ({ \ |
| 23 | assert(!size_multiply_overflow(sizeof(t), n))do { if ((__builtin_expect(!!(!(!size_multiply_overflow(sizeof (t), n))),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("!size_multiply_overflow(sizeof(t), n)" ), "../src/basic/alloc-util.h", 23, __PRETTY_FUNCTION__); } while (0); \ |
| 24 | (t*) alloca0(sizeof(t)*(n))({ char *_new_; size_t _len_ = sizeof(t)*(n); _new_ = __builtin_alloca (_len_); (void *) memset(_new_, 0, _len_); }); \ |
| 25 | }) |
| 26 | |
| 27 | #define newdup(t, p, n)((t*) memdup_multiply(p, sizeof(t), (n))) ((t*) memdup_multiply(p, sizeof(t), (n))) |
| 28 | |
| 29 | #define newdup_suffix0(t, p, n)((t*) memdup_suffix0_multiply(p, sizeof(t), (n))) ((t*) memdup_suffix0_multiply(p, sizeof(t), (n))) |
| 30 | |
| 31 | #define malloc0(n)(calloc(1, (n))) (calloc(1, (n))) |
| 32 | |
| 33 | static inline void *mfree(void *memory) { |
| 34 | free(memory); |
| 35 | return NULL((void*)0); |
| 36 | } |
| 37 | |
| 38 | #define free_and_replace(a, b)({ free(a); (a) = (b); (b) = ((void*)0); 0; }) \ |
| 39 | ({ \ |
| 40 | free(a); \ |
| 41 | (a) = (b); \ |
| 42 | (b) = NULL((void*)0); \ |
| 43 | 0; \ |
| 44 | }) |
| 45 | |
| 46 | void* memdup(const void *p, size_t l) _alloc_(2); |
| 47 | void* memdup_suffix0(const void *p, size_t l) _alloc_(2); |
| 48 | |
| 49 | static inline void freep(void *p) { |
| 50 | free(*(void**) p); |
| 51 | } |
| 52 | |
| 53 | #define _cleanup_free___attribute__((cleanup(freep))) _cleanup_(freep)__attribute__((cleanup(freep))) |
| 54 | |
| 55 | static inline bool_Bool size_multiply_overflow(size_t size, size_t need) { |
| 56 | return _unlikely_(need != 0 && size > (SIZE_MAX / need))(__builtin_expect(!!(need != 0 && size > ((18446744073709551615UL ) / need)),0)); |
| 57 | } |
| 58 | |
| 59 | _malloc___attribute__ ((malloc)) _alloc_(1, 2) static inline void *malloc_multiply(size_t size, size_t need) { |
| 60 | if (size_multiply_overflow(size, need)) |
| 61 | return NULL((void*)0); |
| 62 | |
| 63 | return malloc(size * need); |
| 64 | } |
| 65 | |
| 66 | #if !HAVE_REALLOCARRAY1 |
| 67 | _alloc_(2, 3) static inline void *reallocarray(void *p, size_t need, size_t size) { |
| 68 | if (size_multiply_overflow(size, need)) |
| 69 | return NULL((void*)0); |
| 70 | |
| 71 | return realloc(p, size * need); |
| 72 | } |
| 73 | #endif |
| 74 | |
| 75 | _alloc_(2, 3) static inline void *memdup_multiply(const void *p, size_t size, size_t need) { |
| 76 | if (size_multiply_overflow(size, need)) |
| 77 | return NULL((void*)0); |
| 78 | |
| 79 | return memdup(p, size * need); |
| 80 | } |
| 81 | |
| 82 | _alloc_(2, 3) static inline void *memdup_suffix0_multiply(const void *p, size_t size, size_t need) { |
| 83 | if (size_multiply_overflow(size, need)) |
| 84 | return NULL((void*)0); |
| 85 | |
| 86 | return memdup_suffix0(p, size * need); |
| 87 | } |
| 88 | |
| 89 | void* greedy_realloc(void **p, size_t *allocated, size_t need, size_t size); |
| 90 | void* greedy_realloc0(void **p, size_t *allocated, size_t need, size_t size); |
| 91 | |
| 92 | #define GREEDY_REALLOC(array, allocated, need)greedy_realloc((void**) &(array), &(allocated), (need ), sizeof((array)[0])) \ |
| 93 | greedy_realloc((void**) &(array), &(allocated), (need), sizeof((array)[0])) |
| 94 | |
| 95 | #define GREEDY_REALLOC0(array, allocated, need)greedy_realloc0((void**) &(array), &(allocated), (need ), sizeof((array)[0])) \ |
| 96 | greedy_realloc0((void**) &(array), &(allocated), (need), sizeof((array)[0])) |
| 97 | |
| 98 | #define alloca0(n)({ char *_new_; size_t _len_ = n; _new_ = __builtin_alloca (_len_ ); (void *) memset(_new_, 0, _len_); }) \ |
| 99 | ({ \ |
| 100 | char *_new_; \ |
| 101 | size_t _len_ = n; \ |
| 102 | _new_ = alloca(_len_)__builtin_alloca (_len_); \ |
| 103 | (void *) memset(_new_, 0, _len_); \ |
| 104 | }) |
| 105 | |
| 106 | /* It's not clear what alignment glibc/gcc alloca() guarantee, hence provide a guaranteed safe version */ |
| 107 | #define alloca_align(size, align)({ void *_ptr_; size_t _mask_ = (align) - 1; _ptr_ = __builtin_alloca ((size) + _mask_); (void*)(((uintptr_t)_ptr_ + _mask_) & ~_mask_); }) \ |
| 108 | ({ \ |
| 109 | void *_ptr_; \ |
| 110 | size_t _mask_ = (align) - 1; \ |
| 111 | _ptr_ = alloca((size) + _mask_)__builtin_alloca ((size) + _mask_); \ |
| 112 | (void*)(((uintptr_t)_ptr_ + _mask_) & ~_mask_); \ |
| 113 | }) |
| 114 | |
| 115 | #define alloca0_align(size, align)({ void *_new_; size_t _size_ = (size); _new_ = ({ void *_ptr_ ; size_t _mask_ = ((align)) - 1; _ptr_ = __builtin_alloca ((_size_ ) + _mask_); (void*)(((uintptr_t)_ptr_ + _mask_) & ~_mask_ ); }); (void*)memset(_new_, 0, _size_); }) \ |
| 116 | ({ \ |
| 117 | void *_new_; \ |
| 118 | size_t _size_ = (size); \ |
| 119 | _new_ = alloca_align(_size_, (align))({ void *_ptr_; size_t _mask_ = ((align)) - 1; _ptr_ = __builtin_alloca ((_size_) + _mask_); (void*)(((uintptr_t)_ptr_ + _mask_) & ~_mask_); }); \ |
| 120 | (void*)memset(_new_, 0, _size_); \ |
| 121 | }) |
| 122 | |
| 123 | /* Takes inspiration from Rusts's Option::take() method: reads and returns a pointer, but at the same time resets it to |
| 124 | * NULL. See: https://doc.rust-lang.org/std/option/enum.Option.html#method.take */ |
| 125 | #define TAKE_PTR(ptr)({ typeof(ptr) _ptr_ = (ptr); (ptr) = ((void*)0); _ptr_; }) \ |
| 126 | ({ \ |
| 127 | typeof(ptr) _ptr_ = (ptr); \ |
| 128 | (ptr) = NULL((void*)0); \ |
| 129 | _ptr_; \ |
| 130 | }) |