1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
12 #include <sys/types.h>
15 #include "alloc-util.h"
16 #include "chase-symlinks.h"
20 #include "hexdecoct.h"
24 #include "parse-util.h"
25 #include "path-util.h"
26 #include "socket-util.h"
27 #include "stdio-util.h"
28 #include "string-util.h"
29 #include "sync-util.h"
30 #include "tmpfile-util.h"
32 /* The maximum size of the file we'll read in one go in read_full_file() (64M). */
33 #define READ_FULL_BYTES_MAX (64U*1024U*1024U - 1U)
35 /* The maximum size of virtual files (i.e. procfs, sysfs, and other virtual "API" files) we'll read in one go
36 * in read_virtual_file(). Note that this limit is different (and much lower) than the READ_FULL_BYTES_MAX
37 * limit. This reflects the fact that we use different strategies for reading virtual and regular files:
38 * virtual files we generally have to read in a single read() syscall since the kernel doesn't support
39 * continuation read()s for them. Thankfully they are somewhat size constrained. Thus we can allocate the
40 * full potential buffer in advance. Regular files OTOH can be much larger, and there we grow the allocations
41 * exponentially in a loop. We use a size limit of 4M-2 because 4M-1 is the maximum buffer that /proc/sys/
42 * allows us to read() (larger reads will fail with ENOMEM), and we want to read one extra byte so that we
44 #define READ_VIRTUAL_BYTES_MAX (4U*1024U*1024U - 2U)
46 int fopen_unlocked(const char *path
, const char *options
, FILE **ret
) {
49 FILE *f
= fopen(path
, options
);
53 (void) __fsetlocking(f
, FSETLOCKING_BYCALLER
);
59 int fdopen_unlocked(int fd
, const char *options
, FILE **ret
) {
62 FILE *f
= fdopen(fd
, options
);
66 (void) __fsetlocking(f
, FSETLOCKING_BYCALLER
);
72 int take_fdopen_unlocked(int *fd
, const char *options
, FILE **ret
) {
77 r
= fdopen_unlocked(*fd
, options
, ret
);
86 FILE* take_fdopen(int *fd
, const char *options
) {
89 FILE *f
= fdopen(*fd
, options
);
98 DIR* take_fdopendir(int *dfd
) {
101 DIR *d
= fdopendir(*dfd
);
110 FILE* open_memstream_unlocked(char **ptr
, size_t *sizeloc
) {
111 FILE *f
= open_memstream(ptr
, sizeloc
);
115 (void) __fsetlocking(f
, FSETLOCKING_BYCALLER
);
120 FILE* fmemopen_unlocked(void *buf
, size_t size
, const char *mode
) {
121 FILE *f
= fmemopen(buf
, size
, mode
);
125 (void) __fsetlocking(f
, FSETLOCKING_BYCALLER
);
130 int write_string_stream_ts(
133 WriteStringFileFlags flags
,
134 const struct timespec
*ts
) {
146 /* If we shall set the timestamp we need the fd. But fmemopen() streams generally don't have
147 * an fd. Let's fail early in that case. */
153 if (flags
& WRITE_STRING_FILE_SUPPRESS_REDUNDANT_VIRTUAL
) {
154 _cleanup_free_
char *t
= NULL
;
156 /* If value to be written is same as that of the existing value, then suppress the write. */
164 /* Read an additional byte to detect cases where the prefix matches but the rest
165 * doesn't. Also, 0 returned by read_virtual_file_fd() means the read was truncated and
166 * it won't be equal to the new value. */
167 if (read_virtual_file_fd(fd
, strlen(line
)+1, &t
, NULL
) > 0 &&
168 streq_skip_trailing_chars(line
, t
, NEWLINE
)) {
169 log_debug("No change in value '%s', suppressing write", line
);
173 if (lseek(fd
, 0, SEEK_SET
) < 0)
177 needs_nl
= !(flags
& WRITE_STRING_FILE_AVOID_NEWLINE
) && !endswith(line
, "\n");
179 if (needs_nl
&& (flags
& WRITE_STRING_FILE_DISABLE_BUFFER
)) {
180 /* If STDIO buffering was disabled, then let's append the newline character to the string
181 * itself, so that the write goes out in one go, instead of two */
183 line
= strjoina(line
, "\n");
187 if (fputs(line
, f
) == EOF
)
191 if (fputc('\n', f
) == EOF
)
194 if (flags
& WRITE_STRING_FILE_SYNC
)
195 r
= fflush_sync_and_check(f
);
197 r
= fflush_and_check(f
);
202 const struct timespec twice
[2] = {*ts
, *ts
};
205 if (futimens(fd
, twice
) < 0)
212 static int write_string_file_atomic(
215 WriteStringFileFlags flags
,
216 const struct timespec
*ts
) {
218 _cleanup_fclose_
FILE *f
= NULL
;
219 _cleanup_free_
char *p
= NULL
;
225 /* Note that we'd really like to use O_TMPFILE here, but can't really, since we want replacement
226 * semantics here, and O_TMPFILE can't offer that. i.e. rename() replaces but linkat() doesn't. */
228 r
= fopen_temporary(fn
, &f
, &p
);
232 r
= write_string_stream_ts(f
, line
, flags
, ts
);
236 r
= fchmod_umask(fileno(f
), FLAGS_SET(flags
, WRITE_STRING_FILE_MODE_0600
) ? 0600 : 0644);
240 if (rename(p
, fn
) < 0) {
245 if (FLAGS_SET(flags
, WRITE_STRING_FILE_SYNC
)) {
246 /* Sync the rename, too */
247 r
= fsync_directory_of_file(fileno(f
));
259 int write_string_file_ts(
262 WriteStringFileFlags flags
,
263 const struct timespec
*ts
) {
265 _cleanup_fclose_
FILE *f
= NULL
;
271 /* We don't know how to verify whether the file contents was already on-disk. */
272 assert(!((flags
& WRITE_STRING_FILE_VERIFY_ON_FAILURE
) && (flags
& WRITE_STRING_FILE_SYNC
)));
274 if (flags
& WRITE_STRING_FILE_MKDIR_0755
) {
275 r
= mkdir_parents(fn
, 0755);
280 if (flags
& WRITE_STRING_FILE_ATOMIC
) {
281 assert(flags
& WRITE_STRING_FILE_CREATE
);
283 r
= write_string_file_atomic(fn
, line
, flags
, ts
);
291 /* We manually build our own version of fopen(..., "we") that works without O_CREAT and with O_NOFOLLOW if needed. */
292 fd
= open(fn
, O_CLOEXEC
|O_NOCTTY
|
293 (FLAGS_SET(flags
, WRITE_STRING_FILE_NOFOLLOW
) ? O_NOFOLLOW
: 0) |
294 (FLAGS_SET(flags
, WRITE_STRING_FILE_CREATE
) ? O_CREAT
: 0) |
295 (FLAGS_SET(flags
, WRITE_STRING_FILE_TRUNCATE
) ? O_TRUNC
: 0) |
296 (FLAGS_SET(flags
, WRITE_STRING_FILE_SUPPRESS_REDUNDANT_VIRTUAL
) ? O_RDWR
: O_WRONLY
),
297 (FLAGS_SET(flags
, WRITE_STRING_FILE_MODE_0600
) ? 0600 : 0666));
303 r
= fdopen_unlocked(fd
, "w", &f
);
309 if (flags
& WRITE_STRING_FILE_DISABLE_BUFFER
)
310 setvbuf(f
, NULL
, _IONBF
, 0);
312 r
= write_string_stream_ts(f
, line
, flags
, ts
);
319 if (!(flags
& WRITE_STRING_FILE_VERIFY_ON_FAILURE
))
324 /* OK, the operation failed, but let's see if the right
325 * contents in place already. If so, eat up the error. */
327 q
= verify_file(fn
, line
, !(flags
& WRITE_STRING_FILE_AVOID_NEWLINE
) || (flags
& WRITE_STRING_FILE_VERIFY_IGNORE_NEWLINE
));
334 int write_string_filef(
336 WriteStringFileFlags flags
,
337 const char *format
, ...) {
339 _cleanup_free_
char *p
= NULL
;
343 va_start(ap
, format
);
344 r
= vasprintf(&p
, format
, ap
);
350 return write_string_file(fn
, p
, flags
);
353 int read_one_line_file(const char *fn
, char **line
) {
354 _cleanup_fclose_
FILE *f
= NULL
;
360 r
= fopen_unlocked(fn
, "re", &f
);
364 return read_line(f
, LONG_LINE_MAX
, line
);
367 int verify_file(const char *fn
, const char *blob
, bool accept_extra_nl
) {
368 _cleanup_fclose_
FILE *f
= NULL
;
369 _cleanup_free_
char *buf
= NULL
;
378 if (accept_extra_nl
&& endswith(blob
, "\n"))
379 accept_extra_nl
= false;
381 buf
= malloc(l
+ accept_extra_nl
+ 1);
385 r
= fopen_unlocked(fn
, "re", &f
);
389 /* We try to read one byte more than we need, so that we know whether we hit eof */
391 k
= fread(buf
, 1, l
+ accept_extra_nl
+ 1, f
);
393 return errno_or_else(EIO
);
395 if (k
!= l
&& k
!= l
+ accept_extra_nl
)
397 if (memcmp(buf
, blob
, l
) != 0)
399 if (k
> l
&& buf
[l
] != '\n')
405 int read_virtual_file_fd(int fd
, size_t max_size
, char **ret_contents
, size_t *ret_size
) {
406 _cleanup_free_
char *buf
= NULL
;
409 bool truncated
= false;
411 /* Virtual filesystems such as sysfs or procfs use kernfs, and kernfs can work with two sorts of
412 * virtual files. One sort uses "seq_file", and the results of the first read are buffered for the
413 * second read. The other sort uses "raw" reads which always go direct to the device. In the latter
414 * case, the content of the virtual file must be retrieved with a single read otherwise a second read
415 * might get the new value instead of finding EOF immediately. That's the reason why the usage of
416 * fread(3) is prohibited in this case as it always performs a second call to read(2) looking for
417 * EOF. See issue #13585.
419 * max_size specifies a limit on the bytes read. If max_size is SIZE_MAX, the full file is read. If
420 * the full file is too large to read, an error is returned. For other values of max_size, *partial
421 * contents* may be returned. (Though the read is still done using one syscall.) Returns 0 on
422 * partial success, 1 if untruncated contents were read. */
425 assert(max_size
<= READ_VIRTUAL_BYTES_MAX
|| max_size
== SIZE_MAX
);
427 /* Limit the number of attempts to read the number of bytes returned by fstat(). */
433 if (fstat(fd
, &st
) < 0)
436 if (!S_ISREG(st
.st_mode
))
439 /* Be prepared for files from /proc which generally report a file size of 0. */
440 assert_cc(READ_VIRTUAL_BYTES_MAX
< SSIZE_MAX
);
441 if (st
.st_size
> 0 && n_retries
> 1) {
442 /* Let's use the file size if we have more than 1 attempt left. On the last attempt
443 * we'll ignore the file size */
445 if (st
.st_size
> SSIZE_MAX
) { /* Avoid overflow with 32-bit size_t and 64-bit off_t. */
447 if (max_size
== SIZE_MAX
)
452 size
= MIN((size_t) st
.st_size
, max_size
);
454 if (size
> READ_VIRTUAL_BYTES_MAX
)
459 } else if (n_retries
> 1) {
460 /* Files in /proc are generally smaller than the page size so let's start with
461 * a page size buffer from malloc and only use the max buffer on the final try. */
462 size
= MIN3(page_size() - 1, READ_VIRTUAL_BYTES_MAX
, max_size
);
465 size
= MIN(READ_VIRTUAL_BYTES_MAX
, max_size
);
469 buf
= malloc(size
+ 1);
473 /* Use a bigger allocation if we got it anyway, but not more than the limit. */
474 size
= MIN3(MALLOC_SIZEOF_SAFE(buf
) - 1, max_size
, READ_VIRTUAL_BYTES_MAX
);
479 /* Read one more byte so we can detect whether the content of the
480 * file has already changed or the guessed size for files from /proc
481 * wasn't large enough . */
482 k
= read(fd
, buf
, size
+ 1);
492 /* Consider a short read as EOF */
496 /* If a maximum size is specified and we already read more we know the file is larger, and
497 * can handle this as truncation case. Note that if the size of what we read equals the
498 * maximum size then this doesn't mean truncation, the file might or might not end on that
499 * byte. We need to rerun the loop in that case, with a larger buffer size, so that we read
500 * at least one more byte to be able to distinguish EOF from truncation. */
501 if (max_size
!= SIZE_MAX
&& n
> max_size
) {
502 n
= size
; /* Make sure we never use more than what we sized the buffer for (so that
503 * we have one free byte in it for the trailing NUL we add below).*/
508 /* We have no further attempts left? Then the file is apparently larger than our limits. Give up. */
512 /* Hmm... either we read too few bytes from /proc or less likely the content of the file
513 * might have been changed (and is now bigger) while we were processing, let's try again
514 * either with the new file size. */
516 if (lseek(fd
, 0, SEEK_SET
) < 0)
524 /* Safety check: if the caller doesn't want to know the size of what we just read it will
525 * rely on the trailing NUL byte. But if there's an embedded NUL byte, then we should refuse
526 * operation as otherwise there'd be ambiguity about what we just read. */
527 if (!ret_size
&& memchr(buf
, 0, n
))
533 /* Return rest of the buffer to libc */
534 p
= realloc(buf
, n
+ 1);
541 *ret_contents
= TAKE_PTR(buf
);
550 int read_virtual_file_at(
552 const char *filename
,
557 _cleanup_close_
int fd
= -1;
559 assert(dir_fd
>= 0 || dir_fd
== AT_FDCWD
);
562 if (dir_fd
== AT_FDCWD
)
565 return read_virtual_file_fd(dir_fd
, max_size
, ret_contents
, ret_size
);
568 fd
= openat(dir_fd
, filename
, O_RDONLY
| O_NOCTTY
| O_CLOEXEC
);
572 return read_virtual_file_fd(fd
, max_size
, ret_contents
, ret_size
);
575 int read_full_stream_full(
577 const char *filename
,
580 ReadFullFileFlags flags
,
584 _cleanup_free_
char *buf
= NULL
;
585 size_t n
, n_next
= 0, l
;
589 assert(ret_contents
);
590 assert(!FLAGS_SET(flags
, READ_FULL_FILE_UNBASE64
| READ_FULL_FILE_UNHEX
));
591 assert(size
!= SIZE_MAX
|| !FLAGS_SET(flags
, READ_FULL_FILE_FAIL_WHEN_LARGER
));
593 if (offset
!= UINT64_MAX
&& offset
> LONG_MAX
) /* fseek() can only deal with "long" offsets */
597 if (fd
>= 0) { /* If the FILE* object is backed by an fd (as opposed to memory or such, see
598 * fmemopen()), let's optimize our buffering */
601 if (fstat(fd
, &st
) < 0)
604 if (S_ISREG(st
.st_mode
)) {
606 /* Try to start with the right file size if we shall read the file in full. Note
607 * that we increase the size to read here by one, so that the first read attempt
608 * already makes us notice the EOF. If the reported size of the file is zero, we
609 * avoid this logic however, since quite likely it might be a virtual file in procfs
610 * that all report a zero file size. */
612 if (st
.st_size
> 0 &&
613 (size
== SIZE_MAX
|| FLAGS_SET(flags
, READ_FULL_FILE_FAIL_WHEN_LARGER
))) {
616 LESS_BY((uint64_t) st
.st_size
, offset
== UINT64_MAX
? 0 : offset
);
618 if (rsize
< SIZE_MAX
) /* overflow check */
622 if (flags
& READ_FULL_FILE_WARN_WORLD_READABLE
)
623 (void) warn_file_is_world_accessible(filename
, &st
, NULL
, 0);
627 /* If we don't know how much to read, figure it out now. If we shall read a part of the file, then
628 * allocate the requested size. If we shall load the full file start with LINE_MAX. Note that if
629 * READ_FULL_FILE_FAIL_WHEN_LARGER we consider the specified size a safety limit, and thus also start
630 * with LINE_MAX, under assumption the file is most likely much shorter. */
632 n_next
= size
!= SIZE_MAX
&& !FLAGS_SET(flags
, READ_FULL_FILE_FAIL_WHEN_LARGER
) ? size
: LINE_MAX
;
634 /* Never read more than we need to determine that our own limit is hit */
635 if (n_next
> READ_FULL_BYTES_MAX
)
636 n_next
= READ_FULL_BYTES_MAX
+ 1;
638 if (offset
!= UINT64_MAX
&& fseek(f
, offset
, SEEK_SET
) < 0)
646 /* If we shall fail when reading overly large data, then read exactly one byte more than the
647 * specified size at max, since that'll tell us if there's anymore data beyond the limit*/
648 if (FLAGS_SET(flags
, READ_FULL_FILE_FAIL_WHEN_LARGER
) && n_next
> size
)
651 if (flags
& READ_FULL_FILE_SECURE
) {
652 t
= malloc(n_next
+ 1);
657 memcpy_safe(t
, buf
, n
);
658 explicit_bzero_safe(buf
, n
);
661 t
= realloc(buf
, n_next
+ 1);
667 /* Unless a size has been explicitly specified, try to read as much as fits into the memory
668 * we allocated (minus 1, to leave one byte for the safety NUL byte) */
669 n
= size
== SIZE_MAX
? MALLOC_SIZEOF_SAFE(buf
) - 1 : n_next
;
672 k
= fread(buf
+ l
, 1, n
- l
, f
);
678 r
= errno_or_else(EIO
);
684 if (size
!= SIZE_MAX
&& !FLAGS_SET(flags
, READ_FULL_FILE_FAIL_WHEN_LARGER
)) { /* If we got asked to read some specific size, we already sized the buffer right, hence leave */
689 assert(k
> 0); /* we can't have read zero bytes because that would have been EOF */
691 if (FLAGS_SET(flags
, READ_FULL_FILE_FAIL_WHEN_LARGER
) && l
> size
) {
696 if (n
>= READ_FULL_BYTES_MAX
) {
701 n_next
= MIN(n
* 2, READ_FULL_BYTES_MAX
);
704 if (flags
& (READ_FULL_FILE_UNBASE64
| READ_FULL_FILE_UNHEX
)) {
705 _cleanup_free_
void *decoded
= NULL
;
709 if (flags
& READ_FULL_FILE_UNBASE64
)
710 r
= unbase64mem_full(buf
, l
, flags
& READ_FULL_FILE_SECURE
, &decoded
, &decoded_size
);
712 r
= unhexmem_full(buf
, l
, flags
& READ_FULL_FILE_SECURE
, &decoded
, &decoded_size
);
716 if (flags
& READ_FULL_FILE_SECURE
)
717 explicit_bzero_safe(buf
, n
);
718 free_and_replace(buf
, decoded
);
719 n
= l
= decoded_size
;
723 /* Safety check: if the caller doesn't want to know the size of what we just read it will rely on the
724 * trailing NUL byte. But if there's an embedded NUL byte, then we should refuse operation as otherwise
725 * there'd be ambiguity about what we just read. */
727 if (memchr(buf
, 0, l
)) {
734 *ret_contents
= TAKE_PTR(buf
);
742 if (flags
& READ_FULL_FILE_SECURE
)
743 explicit_bzero_safe(buf
, n
);
748 int read_full_file_full(
750 const char *filename
,
753 ReadFullFileFlags flags
,
754 const char *bind_name
,
758 _cleanup_fclose_
FILE *f
= NULL
;
762 assert(ret_contents
);
764 r
= xfopenat(dir_fd
, filename
, "re", 0, &f
);
766 _cleanup_close_
int dfd
= -1, sk
= -1;
767 union sockaddr_union sa
;
769 /* ENXIO is what Linux returns if we open a node that is an AF_UNIX socket */
773 /* If this is enabled, let's try to connect to it */
774 if (!FLAGS_SET(flags
, READ_FULL_FILE_CONNECT_SOCKET
))
777 /* Seeking is not supported on AF_UNIX sockets */
778 if (offset
!= UINT64_MAX
)
781 if (dir_fd
== AT_FDCWD
)
782 r
= sockaddr_un_set_path(&sa
.un
, filename
);
784 /* If we shall operate relative to some directory, then let's use O_PATH first to
785 * open the socket inode, and then connect to it via /proc/self/fd/. We have to do
786 * this since there's not connectat() that takes a directory fd as first arg. */
788 dfd
= openat(dir_fd
, filename
, O_PATH
|O_CLOEXEC
);
792 r
= sockaddr_un_set_path(&sa
.un
, FORMAT_PROC_FD_PATH(dfd
));
797 sk
= socket(AF_UNIX
, SOCK_STREAM
|SOCK_CLOEXEC
, 0);
802 /* If the caller specified a socket name to bind to, do so before connecting. This is
803 * useful to communicate some minor, short meta-information token from the client to
805 union sockaddr_union bsa
;
807 r
= sockaddr_un_set_path(&bsa
.un
, bind_name
);
811 if (bind(sk
, &bsa
.sa
, r
) < 0)
815 if (connect(sk
, &sa
.sa
, SOCKADDR_UN_LEN(sa
.un
)) < 0)
816 return errno
== ENOTSOCK
? -ENXIO
: -errno
; /* propagate original error if this is
817 * not a socket after all */
819 if (shutdown(sk
, SHUT_WR
) < 0)
829 (void) __fsetlocking(f
, FSETLOCKING_BYCALLER
);
831 return read_full_stream_full(f
, filename
, offset
, size
, flags
, ret_contents
, ret_size
);
834 int executable_is_script(const char *path
, char **interpreter
) {
835 _cleanup_free_
char *line
= NULL
;
842 r
= read_one_line_file(path
, &line
);
843 if (r
== -ENOBUFS
) /* First line overly long? if so, then it's not a script */
848 if (!startswith(line
, "#!"))
851 ans
= strstrip(line
+ 2);
852 len
= strcspn(ans
, " \t");
857 ans
= strndup(ans
, len
);
866 * Retrieve one field from a file like /proc/self/status. pattern
867 * should not include whitespace or the delimiter (':'). pattern matches only
868 * the beginning of a line. Whitespace before ':' is skipped. Whitespace and
869 * zeros after the ':' will be skipped. field must be freed afterwards.
870 * terminator specifies the terminating characters of the field value (not
871 * included in the value).
873 int get_proc_field(const char *filename
, const char *pattern
, const char *terminator
, char **field
) {
874 _cleanup_free_
char *status
= NULL
;
884 r
= read_full_virtual_file(filename
, &status
, NULL
);
894 t
= strstr(t
, pattern
);
898 /* Check that pattern occurs in beginning of line. */
899 pattern_ok
= (t
== status
|| t
[-1] == '\n');
901 t
+= strlen(pattern
);
903 } while (!pattern_ok
);
905 t
+= strspn(t
, " \t");
914 t
+= strspn(t
, " \t");
916 /* Also skip zeros, because when this is used for
917 * capabilities, we don't want the zeros. This way the
918 * same capability set always maps to the same string,
919 * irrespective of the total capability set size. For
920 * other numbers it shouldn't matter. */
922 /* Back off one char if there's nothing but whitespace
924 if (!*t
|| isspace(*t
))
928 len
= strcspn(t
, terminator
);
938 DIR *xopendirat(int fd
, const char *name
, int flags
) {
942 assert(!(flags
& O_CREAT
));
944 if (fd
== AT_FDCWD
&& flags
== 0)
945 return opendir(name
);
947 nfd
= openat(fd
, name
, O_RDONLY
|O_NONBLOCK
|O_DIRECTORY
|O_CLOEXEC
|flags
, 0);
960 int fopen_mode_to_flags(const char *mode
) {
966 if ((p
= startswith(mode
, "r+")))
968 else if ((p
= startswith(mode
, "r")))
970 else if ((p
= startswith(mode
, "w+")))
971 flags
= O_RDWR
|O_CREAT
|O_TRUNC
;
972 else if ((p
= startswith(mode
, "w")))
973 flags
= O_WRONLY
|O_CREAT
|O_TRUNC
;
974 else if ((p
= startswith(mode
, "a+")))
975 flags
= O_RDWR
|O_CREAT
|O_APPEND
;
976 else if ((p
= startswith(mode
, "a")))
977 flags
= O_WRONLY
|O_CREAT
|O_APPEND
;
981 for (; *p
!= 0; p
++) {
994 /* ignore this here, fdopen() might care later though */
997 case 'c': /* not sure what to do about this one */
1006 int xfopenat(int dir_fd
, const char *path
, const char *mode
, int flags
, FILE **ret
) {
1009 /* A combination of fopen() with openat() */
1011 if (dir_fd
== AT_FDCWD
&& flags
== 0) {
1012 f
= fopen(path
, mode
);
1018 mode_flags
= fopen_mode_to_flags(mode
);
1022 fd
= openat(dir_fd
, path
, mode_flags
| flags
);
1026 f
= fdopen(fd
, mode
);
1037 static int search_and_fopen_internal(
1051 if (!path_strv_resolve_uniq(search
, root
))
1054 STRV_FOREACH(i
, search
) {
1055 _cleanup_free_
char *p
= NULL
;
1058 p
= path_join(root
, *i
, path
);
1065 *ret_path
= path_simplify(TAKE_PTR(p
));
1071 if (errno
!= ENOENT
)
1078 int search_and_fopen(
1079 const char *filename
,
1082 const char **search
,
1086 _cleanup_strv_free_
char **copy
= NULL
;
1092 if (path_is_absolute(filename
)) {
1093 _cleanup_fclose_
FILE *f
= NULL
;
1095 f
= fopen(filename
, mode
);
1102 p
= strdup(filename
);
1106 *ret_path
= path_simplify(p
);
1113 copy
= strv_copy((char**) search
);
1117 return search_and_fopen_internal(filename
, mode
, root
, copy
, ret
, ret_path
);
1120 int search_and_fopen_nulstr(
1121 const char *filename
,
1128 _cleanup_strv_free_
char **s
= NULL
;
1130 if (path_is_absolute(filename
)) {
1131 _cleanup_fclose_
FILE *f
= NULL
;
1133 f
= fopen(filename
, mode
);
1140 p
= strdup(filename
);
1144 *ret_path
= path_simplify(p
);
1151 s
= strv_split_nulstr(search
);
1155 return search_and_fopen_internal(filename
, mode
, root
, s
, ret
, ret_path
);
1158 int fflush_and_check(FILE *f
) {
1165 return errno_or_else(EIO
);
1170 int fflush_sync_and_check(FILE *f
) {
1175 r
= fflush_and_check(f
);
1179 /* Not all file streams have an fd associated (think: fmemopen()), let's handle this gracefully and
1180 * assume that in that case we need no explicit syncing */
1192 int write_timestamp_file_atomic(const char *fn
, usec_t n
) {
1193 char ln
[DECIMAL_STR_MAX(n
)+2];
1195 /* Creates a "timestamp" file, that contains nothing but a
1196 * usec_t timestamp, formatted in ASCII. */
1198 if (!timestamp_is_set(n
))
1201 xsprintf(ln
, USEC_FMT
"\n", n
);
1203 return write_string_file(fn
, ln
, WRITE_STRING_FILE_CREATE
|WRITE_STRING_FILE_ATOMIC
);
1206 int read_timestamp_file(const char *fn
, usec_t
*ret
) {
1207 _cleanup_free_
char *ln
= NULL
;
1211 r
= read_one_line_file(fn
, &ln
);
1215 r
= safe_atou64(ln
, &t
);
1219 if (!timestamp_is_set(t
))
1226 int fputs_with_space(FILE *f
, const char *s
, const char *separator
, bool *space
) {
1231 /* Outputs the specified string with fputs(), but optionally prefixes it with a separator. The *space parameter
1232 * when specified shall initially point to a boolean variable initialized to false. It is set to true after the
1233 * first invocation. This call is supposed to be use in loops, where a separator shall be inserted between each
1234 * element, but not before the first one. */
1244 r
= fputs(separator
, f
);
1255 /* A bitmask of the EOL markers we know */
1256 typedef enum EndOfLineMarker
{
1258 EOL_ZERO
= 1 << 0, /* \0 (aka NUL) */
1259 EOL_TEN
= 1 << 1, /* \n (aka NL, aka LF) */
1260 EOL_THIRTEEN
= 1 << 2, /* \r (aka CR) */
1263 static EndOfLineMarker
categorize_eol(char c
, ReadLineFlags flags
) {
1265 if (!IN_SET(flags
, READ_LINE_ONLY_NUL
)) {
1269 return EOL_THIRTEEN
;
1278 DEFINE_TRIVIAL_CLEANUP_FUNC_FULL(FILE*, funlockfile
, NULL
);
1280 int read_line_full(FILE *f
, size_t limit
, ReadLineFlags flags
, char **ret
) {
1281 _cleanup_free_
char *buffer
= NULL
;
1282 size_t n
= 0, count
= 0;
1287 /* Something like a bounded version of getline().
1289 * Considers EOF, \n, \r and \0 end of line delimiters (or combinations of these), and does not include these
1290 * delimiters in the string returned. Specifically, recognizes the following combinations of markers as line
1303 * Returns the number of bytes read from the files (i.e. including delimiters — this hence usually differs from
1304 * the number of characters in the returned string). When EOF is hit, 0 is returned.
1306 * The input parameter limit is the maximum numbers of characters in the returned string, i.e. excluding
1307 * delimiters. If the limit is hit we fail and return -ENOBUFS.
1309 * If a line shall be skipped ret may be initialized as NULL. */
1312 if (!GREEDY_REALLOC(buffer
, 1))
1317 _unused_
_cleanup_(funlockfilep
) FILE *flocked
= f
;
1318 EndOfLineMarker previous_eol
= EOL_NONE
;
1322 EndOfLineMarker eol
;
1328 if (count
>= INT_MAX
) /* We couldn't return the counter anymore as "int", hence refuse this */
1331 r
= safe_fgetc(f
, &c
);
1334 if (r
== 0) /* EOF is definitely EOL */
1337 eol
= categorize_eol(c
, flags
);
1339 if (FLAGS_SET(previous_eol
, EOL_ZERO
) ||
1340 (eol
== EOL_NONE
&& previous_eol
!= EOL_NONE
) ||
1341 (eol
!= EOL_NONE
&& (previous_eol
& eol
) != 0)) {
1342 /* Previous char was a NUL? This is not an EOL, but the previous char was? This type of
1343 * EOL marker has been seen right before? In either of these three cases we are
1344 * done. But first, let's put this character back in the queue. (Note that we have to
1345 * cast this to (unsigned char) here as ungetc() expects a positive 'int', and if we
1346 * are on an architecture where 'char' equals 'signed char' we need to ensure we don't
1347 * pass a negative value here. That said, to complicate things further ungetc() is
1348 * actually happy with most negative characters and implicitly casts them back to
1349 * positive ones as needed, except for \xff (aka -1, aka EOF), which it refuses. What a
1351 assert_se(ungetc((unsigned char) c
, f
) != EOF
);
1357 if (eol
!= EOL_NONE
) {
1358 /* If we are on a tty, we can't shouldn't wait for more input, because that
1359 * generally means waiting for the user, interactively. In the case of a TTY
1360 * we expect only \n as the single EOL marker, so we are in the lucky
1361 * position that there is no need to wait. We check this condition last, to
1362 * avoid isatty() check if not necessary. */
1364 if ((flags
& (READ_LINE_IS_A_TTY
|READ_LINE_NOT_A_TTY
)) == 0) {
1368 if (fd
< 0) /* Maybe an fmemopen() stream? Handle this gracefully,
1369 * and don't call isatty() on an invalid fd */
1370 flags
|= READ_LINE_NOT_A_TTY
;
1372 flags
|= isatty(fd
) ? READ_LINE_IS_A_TTY
: READ_LINE_NOT_A_TTY
;
1374 if (FLAGS_SET(flags
, READ_LINE_IS_A_TTY
))
1378 if (eol
!= EOL_NONE
) {
1379 previous_eol
|= eol
;
1384 if (!GREEDY_REALLOC(buffer
, n
+ 2))
1397 *ret
= TAKE_PTR(buffer
);
1403 int safe_fgetc(FILE *f
, char *ret
) {
1408 /* A safer version of plain fgetc(): let's propagate the error that happened while reading as such, and
1409 * separate the EOF condition from the byte read, to avoid those confusion signed/unsigned issues fgetc()
1416 return errno_or_else(EIO
);
1430 int warn_file_is_world_accessible(const char *filename
, struct stat
*st
, const char *unit
, unsigned line
) {
1437 if (stat(filename
, &_st
) < 0)
1442 if ((st
->st_mode
& S_IRWXO
) == 0)
1446 log_syntax(unit
, LOG_WARNING
, filename
, line
, 0,
1447 "%s has %04o mode that is too permissive, please adjust the ownership and access mode.",
1448 filename
, st
->st_mode
& 07777);
1450 log_warning("%s has %04o mode that is too permissive, please adjust the ownership and access mode.",
1451 filename
, st
->st_mode
& 07777);