]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/basic/stat-util.c
ssh-generator: generate /etc/issue.d/ with VSOCK ssh info data (#37819)
[thirdparty/systemd.git] / src / basic / stat-util.c
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
8fcde012
LP
2
3#include <fcntl.h>
8fcde012
LP
4#include <sys/statvfs.h>
5#include <unistd.h>
6
846b3bd6 7#include "alloc-util.h"
f461a28d 8#include "chase.h"
8fcde012 9#include "dirent-util.h"
f4351959 10#include "errno-util.h"
8fcde012 11#include "fd-util.h"
659d1924
ILG
12#include "filesystems.h"
13#include "fs-util.h"
ddfdf86f 14#include "hash-funcs.h"
93a1f792 15#include "log.h"
f5947a5e 16#include "missing_magic.h"
f663a15a 17#include "mountpoint-util.h"
0c15577a
DDM
18#include "path-util.h"
19#include "siphash24.h"
8fcde012
LP
20#include "stat-util.h"
21#include "string-util.h"
0c15577a 22#include "time-util.h"
8fcde012 23
2560dcbf
MY
24static int verify_stat_at(
25 int fd,
26 const char *path,
27 bool follow,
28 int (*verify_func)(const struct stat *st),
29 bool verify) {
8fcde012 30
2560dcbf
MY
31 struct stat st;
32 int r;
33
34 assert(fd >= 0 || fd == AT_FDCWD);
35 assert(!isempty(path) || !follow);
36 assert(verify_func);
8fcde012 37
2560dcbf
MY
38 if (fstatat(fd, strempty(path), &st,
39 (isempty(path) ? AT_EMPTY_PATH : 0) | (follow ? 0 : AT_SYMLINK_NOFOLLOW)) < 0)
8fcde012
LP
40 return -errno;
41
2560dcbf
MY
42 r = verify_func(&st);
43 return verify ? r : r >= 0;
8fcde012
LP
44}
45
2560dcbf
MY
46int stat_verify_regular(const struct stat *st) {
47 assert(st);
48
49 /* Checks whether the specified stat() structure refers to a regular file. If not returns an
50 * appropriate error code. */
8fcde012 51
2560dcbf
MY
52 if (S_ISDIR(st->st_mode))
53 return -EISDIR;
8fcde012 54
2560dcbf
MY
55 if (S_ISLNK(st->st_mode))
56 return -ELOOP;
57
58 if (!S_ISREG(st->st_mode))
59 return -EBADFD;
8fcde012 60
2560dcbf 61 return 0;
a12e4ade
FB
62}
63
2560dcbf
MY
64int verify_regular_at(int fd, const char *path, bool follow) {
65 return verify_stat_at(fd, path, follow, stat_verify_regular, true);
66}
8fcde012 67
2560dcbf
MY
68int fd_verify_regular(int fd) {
69 assert(fd >= 0);
70 return verify_regular_at(fd, NULL, false);
71}
8fcde012 72
2560dcbf
MY
73int stat_verify_directory(const struct stat *st) {
74 assert(st);
75
76 if (S_ISLNK(st->st_mode))
77 return -ELOOP;
78
79 if (!S_ISDIR(st->st_mode))
80 return -ENOTDIR;
81
82 return 0;
83}
84
85int fd_verify_directory(int fd) {
86 assert(fd >= 0);
87 return verify_stat_at(fd, NULL, false, stat_verify_directory, true);
88}
89
90int is_dir_at(int fd, const char *path, bool follow) {
91 return verify_stat_at(fd, path, follow, stat_verify_directory, false);
92}
93
94int is_dir(const char *path, bool follow) {
95 assert(!isempty(path));
96 return is_dir_at(AT_FDCWD, path, follow);
97}
98
99int stat_verify_symlink(const struct stat *st) {
100 assert(st);
101
102 if (S_ISDIR(st->st_mode))
103 return -EISDIR;
104
105 if (!S_ISLNK(st->st_mode))
106 return -ENOLINK;
107
108 return 0;
109}
110
111int is_symlink(const char *path) {
112 assert(!isempty(path));
113 return verify_stat_at(AT_FDCWD, path, false, stat_verify_symlink, false);
114}
115
116int stat_verify_linked(const struct stat *st) {
117 assert(st);
118
119 if (st->st_nlink <= 0)
120 return -EIDRM; /* recognizable error. */
121
122 return 0;
123}
124
125int fd_verify_linked(int fd) {
126 assert(fd >= 0);
127 return verify_stat_at(fd, NULL, false, stat_verify_linked, true);
128}
129
130int stat_verify_device_node(const struct stat *st) {
131 assert(st);
132
133 if (S_ISLNK(st->st_mode))
134 return -ELOOP;
135
136 if (S_ISDIR(st->st_mode))
137 return -EISDIR;
138
139 if (!S_ISBLK(st->st_mode) && !S_ISCHR(st->st_mode))
140 return -ENOTTY;
141
142 return 0;
143}
8fcde012 144
2560dcbf
MY
145int is_device_node(const char *path) {
146 assert(!isempty(path));
147 return verify_stat_at(AT_FDCWD, path, false, stat_verify_device_node, false);
8fcde012
LP
148}
149
db55bbf2 150int dir_is_empty_at(int dir_fd, const char *path, bool ignore_hidden_or_backup) {
254d1313 151 _cleanup_close_ int fd = -EBADF;
db55bbf2
LP
152 struct dirent *buf;
153 size_t m;
8fcde012 154
e4722385
MY
155 fd = xopenat(dir_fd, path, O_DIRECTORY|O_CLOEXEC);
156 if (fd < 0)
157 return fd;
d7c1a15e 158
db55bbf2
LP
159 /* Allocate space for at least 3 full dirents, since every dir has at least two entries ("." +
160 * ".."), and only once we have seen if there's a third we know whether the dir is empty or not. If
161 * 'ignore_hidden_or_backup' is true we'll allocate a bit more, since we might skip over a bunch of
162 * entries that we end up ignoring. */
163 m = (ignore_hidden_or_backup ? 16 : 3) * DIRENT_SIZE_MAX;
164 buf = alloca(m);
165
166 for (;;) {
167 struct dirent *de;
168 ssize_t n;
169
43aacae8 170 n = getdents64(fd, buf, m);
db55bbf2
LP
171 if (n < 0)
172 return -errno;
173 if (n == 0)
174 break;
8fcde012 175
db55bbf2
LP
176 assert((size_t) n <= m);
177 msan_unpoison(buf, n);
0dbce03c 178
db55bbf2
LP
179 FOREACH_DIRENT_IN_BUFFER(de, buf, n)
180 if (!(ignore_hidden_or_backup ? hidden_or_backup_file(de->d_name) : dot_or_dot_dot(de->d_name)))
181 return 0;
182 }
8fcde012
LP
183
184 return 1;
185}
186
9d0fed7b 187bool stat_may_be_dev_null(struct stat *st) {
8fcde012
LP
188 assert(st);
189
29da4193
LP
190 /* We don't want to hardcode the major/minor of /dev/null, hence we do a simpler "is this a character
191 * device node?" check. */
8fcde012 192
9d0fed7b
YW
193 return S_ISCHR(st->st_mode);
194}
195
196bool stat_is_empty(struct stat *st) {
197 assert(st);
8fcde012 198
9d0fed7b 199 return S_ISREG(st->st_mode) && st->st_size <= 0;
8fcde012
LP
200}
201
48542eac 202int null_or_empty_path_with_root(const char *fn, const char *root) {
8fcde012 203 struct stat st;
48542eac 204 int r;
8fcde012
LP
205
206 assert(fn);
207
48542eac
ZJS
208 /* A symlink to /dev/null or an empty file?
209 * When looking under root_dir, we can't expect /dev/ to be mounted,
210 * so let's see if the path is a (possibly dangling) symlink to /dev/null. */
211
1934242b 212 if (path_equal(path_startswith(fn, root ?: "/"), "dev/null"))
29da4193
LP
213 return true;
214
f461a28d 215 r = chase_and_stat(fn, root, CHASE_PREFIX_ROOT, NULL, &st);
48542eac
ZJS
216 if (r < 0)
217 return r;
8fcde012
LP
218
219 return null_or_empty(&st);
220}
221
d30d4488 222int fd_is_read_only_fs(int fd) {
8fcde012
LP
223 struct statvfs st;
224
dc1752ea 225 assert(fd >= 0);
8fcde012 226
dc1752ea 227 if (fstatvfs(fd, &st) < 0)
8fcde012
LP
228 return -errno;
229
230 if (st.f_flag & ST_RDONLY)
231 return true;
232
dc1752ea
YW
233 /* On NFS, fstatvfs() might not reflect whether we can actually write to the remote share. Let's try
234 * again with access(W_OK) which is more reliable, at least sometimes. */
235 if (access_fd(fd, W_OK) == -EROFS)
8fcde012
LP
236 return true;
237
238 return false;
239}
240
dc1752ea 241int path_is_read_only_fs(const char *path) {
a5937dcf 242 _cleanup_close_ int fd = -EBADF;
dc1752ea
YW
243
244 assert(path);
245
246 fd = open(path, O_CLOEXEC | O_PATH);
247 if (fd < 0)
248 return -errno;
249
250 return fd_is_read_only_fs(fd);
251}
252
563e6846 253int inode_same_at(int fda, const char *filea, int fdb, const char *fileb, int flags) {
f663a15a
LP
254 struct stat sta, stb;
255 int r;
8fcde012 256
676ade31 257 assert(fda >= 0 || fda == AT_FDCWD);
676ade31 258 assert(fdb >= 0 || fdb == AT_FDCWD);
f663a15a
LP
259 assert((flags & ~(AT_EMPTY_PATH|AT_SYMLINK_NOFOLLOW|AT_NO_AUTOMOUNT)) == 0);
260
261 /* Refuse an unset filea or fileb early unless AT_EMPTY_PATH is set */
262 if ((isempty(filea) || isempty(fileb)) && !FLAGS_SET(flags, AT_EMPTY_PATH))
263 return -EINVAL;
264
265 /* Shortcut: comparing the same fd with itself means we can return true */
266 if (fda >= 0 && fda == fdb && isempty(filea) && isempty(fileb) && FLAGS_SET(flags, AT_SYMLINK_NOFOLLOW))
267 return true;
268
269 _cleanup_close_ int pin_a = -EBADF, pin_b = -EBADF;
270 if (!FLAGS_SET(flags, AT_NO_AUTOMOUNT)) {
271 /* Let's try to use the name_to_handle_at() AT_HANDLE_FID API to identify identical
272 * inodes. We have to issue multiple calls on the same file for that (first, to acquire the
273 * FID, and then to check if .st_dev is actually the same). Hence let's pin the inode in
274 * between via O_PATH, unless we already have an fd for it. */
275
276 if (!isempty(filea)) {
277 pin_a = openat(fda, filea, O_PATH|O_CLOEXEC|(FLAGS_SET(flags, AT_SYMLINK_NOFOLLOW) ? O_NOFOLLOW : 0));
278 if (pin_a < 0)
279 return -errno;
280
281 fda = pin_a;
282 filea = NULL;
283 flags |= AT_EMPTY_PATH;
284 }
285
286 if (!isempty(fileb)) {
287 pin_b = openat(fdb, fileb, O_PATH|O_CLOEXEC|(FLAGS_SET(flags, AT_SYMLINK_NOFOLLOW) ? O_NOFOLLOW : 0));
288 if (pin_b < 0)
289 return -errno;
290
291 fdb = pin_b;
292 fileb = NULL;
293 flags |= AT_EMPTY_PATH;
294 }
295
4b11087b 296 int ntha_flags = at_flags_normalize_follow(flags) & (AT_EMPTY_PATH|AT_SYMLINK_FOLLOW);
f663a15a
LP
297 _cleanup_free_ struct file_handle *ha = NULL, *hb = NULL;
298 int mntida = -1, mntidb = -1;
299
300 r = name_to_handle_at_try_fid(
301 fda,
302 filea,
303 &ha,
304 &mntida,
305 ntha_flags);
306 if (r < 0) {
307 if (is_name_to_handle_at_fatal_error(r))
308 return r;
309
310 goto fallback;
311 }
312
313 r = name_to_handle_at_try_fid(
314 fdb,
315 fileb,
316 &hb,
317 &mntidb,
318 ntha_flags);
319 if (r < 0) {
320 if (is_name_to_handle_at_fatal_error(r))
321 return r;
322
323 goto fallback;
324 }
325
326 /* Now compare the two file handles */
327 if (!file_handle_equal(ha, hb))
328 return false;
329
330 /* If the file handles are the same and they come from the same mount ID? Great, then we are
331 * good, they are definitely the same */
332 if (mntida == mntidb)
333 return true;
334
335 /* File handles are the same, they are not on the same mount id. This might either be because
336 * they are on two entirely different file systems, that just happen to have the same FIDs
337 * (because they originally where created off the same disk images), or it could be because
338 * they are located on two distinct bind mounts of the same fs. To check that, let's look at
339 * .st_rdev of the inode. We simply reuse the fallback codepath for that, since it checks
340 * exactly that (it checks slightly more, but we don't care.) */
341 }
8fcde012 342
f663a15a
LP
343fallback:
344 if (fstatat(fda, strempty(filea), &sta, flags) < 0)
345 return log_debug_errno(errno, "Cannot stat %s: %m", strna(filea));
8fcde012 346
f663a15a
LP
347 if (fstatat(fdb, strempty(fileb), &stb, flags) < 0)
348 return log_debug_errno(errno, "Cannot stat %s: %m", strna(fileb));
8fcde012 349
f663a15a 350 return stat_inode_same(&sta, &stb);
8fcde012
LP
351}
352
353bool is_fs_type(const struct statfs *s, statfs_f_type_t magic_value) {
354 assert(s);
355 assert_cc(sizeof(statfs_f_type_t) >= sizeof(s->f_type));
356
357 return F_TYPE_EQUAL(s->f_type, magic_value);
358}
359
b196e17e 360int is_fs_type_at(int dir_fd, const char *path, statfs_f_type_t magic_value) {
6d965610 361 struct statfs s;
b196e17e 362 int r;
8fcde012 363
b196e17e
DDM
364 r = xstatfsat(dir_fd, path, &s);
365 if (r < 0)
366 return r;
8fcde012 367
6d965610 368 return is_fs_type(&s, magic_value);
8fcde012
LP
369}
370
371bool is_temporary_fs(const struct statfs *s) {
659d1924 372 return fs_in_group(s, FILESYSTEM_SET_TEMPORARY);
77f9fa3b
LP
373}
374
375bool is_network_fs(const struct statfs *s) {
659d1924 376 return fs_in_group(s, FILESYSTEM_SET_NETWORK);
8fcde012
LP
377}
378
379int fd_is_temporary_fs(int fd) {
380 struct statfs s;
381
382 if (fstatfs(fd, &s) < 0)
383 return -errno;
384
385 return is_temporary_fs(&s);
386}
ffeb8285 387
77f9fa3b
LP
388int fd_is_network_fs(int fd) {
389 struct statfs s;
390
391 if (fstatfs(fd, &s) < 0)
392 return -errno;
393
394 return is_network_fs(&s);
395}
396
ffeb8285 397int path_is_temporary_fs(const char *path) {
15308e50 398 struct statfs s;
ffeb8285 399
15308e50 400 if (statfs(path, &s) < 0)
ffeb8285
LP
401 return -errno;
402
15308e50 403 return is_temporary_fs(&s);
ffeb8285 404}
3cc44114 405
4e247216
YW
406int path_is_network_fs(const char *path) {
407 struct statfs s;
408
409 if (statfs(path, &s) < 0)
410 return -errno;
411
412 return is_network_fs(&s);
413}
414
883fff25
LP
415int proc_mounted(void) {
416 int r;
417
418 /* A quick check of procfs is properly mounted */
419
420 r = path_is_fs_type("/proc/", PROC_SUPER_MAGIC);
421 if (r == -ENOENT) /* not mounted at all */
422 return false;
423
424 return r;
425}
fee5c52a 426
38db6211
LP
427bool stat_inode_same(const struct stat *a, const struct stat *b) {
428
429 /* Returns if the specified stat structure references the same (though possibly modified) inode. Does
430 * a thorough check, comparing inode nr, backing device and if the inode is still of the same type. */
431
1c248d7f 432 return stat_is_set(a) && stat_is_set(b) &&
38db6211
LP
433 ((a->st_mode ^ b->st_mode) & S_IFMT) == 0 && /* same inode type */
434 a->st_dev == b->st_dev &&
435 a->st_ino == b->st_ino;
436}
437
fee5c52a
LP
438bool stat_inode_unmodified(const struct stat *a, const struct stat *b) {
439
440 /* Returns if the specified stat structures reference the same, unmodified inode. This check tries to
441 * be reasonably careful when detecting changes: we check both inode and mtime, to cater for file
442 * systems where mtimes are fixed to 0 (think: ostree/nixos type installations). We also check file
443 * size, backing device, inode type and if this refers to a device not the major/minor.
444 *
445 * Note that we don't care if file attributes such as ownership or access mode change, this here is
446 * about contents of the file. The purpose here is to detect file contents changes, and nothing
447 * else. */
448
38db6211 449 return stat_inode_same(a, b) &&
a59b0a9f
MS
450 a->st_mtim.tv_sec == b->st_mtim.tv_sec &&
451 a->st_mtim.tv_nsec == b->st_mtim.tv_nsec &&
fee5c52a 452 (!S_ISREG(a->st_mode) || a->st_size == b->st_size) && /* if regular file, compare file size */
fee5c52a
LP
453 (!(S_ISCHR(a->st_mode) || S_ISBLK(a->st_mode)) || a->st_rdev == b->st_rdev); /* if device node, also compare major/minor, because we can */
454}
ca194a2a 455
2bd315fb
LP
456bool statx_inode_same(const struct statx *a, const struct statx *b) {
457
458 /* Same as stat_inode_same() but for struct statx */
459
1c248d7f 460 return statx_is_set(a) && statx_is_set(b) &&
2bd315fb 461 FLAGS_SET(a->stx_mask, STATX_TYPE|STATX_INO) && FLAGS_SET(b->stx_mask, STATX_TYPE|STATX_INO) &&
2bd315fb
LP
462 ((a->stx_mode ^ b->stx_mode) & S_IFMT) == 0 &&
463 a->stx_dev_major == b->stx_dev_major &&
464 a->stx_dev_minor == b->stx_dev_minor &&
465 a->stx_ino == b->stx_ino;
466}
467
4424e6c8
YW
468bool statx_mount_same(const struct statx *a, const struct statx *b) {
469 if (!statx_is_set(a) || !statx_is_set(b))
52f19d96
LP
470 return false;
471
472 /* if we have the mount ID, that's all we need */
473 if (FLAGS_SET(a->stx_mask, STATX_MNT_ID) && FLAGS_SET(b->stx_mask, STATX_MNT_ID))
474 return a->stx_mnt_id == b->stx_mnt_id;
475
476 /* Otherwise, major/minor of backing device must match */
477 return a->stx_dev_major == b->stx_dev_major &&
478 a->stx_dev_minor == b->stx_dev_minor;
479}
480
6eec59f9
DDM
481int xstatfsat(int dir_fd, const char *path, struct statfs *ret) {
482 _cleanup_close_ int fd = -EBADF;
483
484 assert(dir_fd >= 0 || dir_fd == AT_FDCWD);
6eec59f9
DDM
485 assert(ret);
486
99d704c6
YW
487 if (!isempty(path)) {
488 fd = xopenat(dir_fd, path, O_PATH|O_CLOEXEC|O_NOCTTY);
489 if (fd < 0)
490 return fd;
491 dir_fd = fd;
492 }
6eec59f9 493
99d704c6 494 return RET_NERRNO(fstatfs(dir_fd, ret));
6eec59f9
DDM
495}
496
0c15577a
DDM
497usec_t statx_timestamp_load(const struct statx_timestamp *ts) {
498 return timespec_load(&(const struct timespec) { .tv_sec = ts->tv_sec, .tv_nsec = ts->tv_nsec });
499}
500nsec_t statx_timestamp_load_nsec(const struct statx_timestamp *ts) {
501 return timespec_load_nsec(&(const struct timespec) { .tv_sec = ts->tv_sec, .tv_nsec = ts->tv_nsec });
502}
503
ddfdf86f 504void inode_hash_func(const struct stat *q, struct siphash *state) {
c01a5c05
YW
505 siphash24_compress_typesafe(q->st_dev, state);
506 siphash24_compress_typesafe(q->st_ino, state);
ddfdf86f
DDM
507}
508
509int inode_compare_func(const struct stat *a, const struct stat *b) {
510 int r;
511
512 r = CMP(a->st_dev, b->st_dev);
513 if (r != 0)
514 return r;
515
516 return CMP(a->st_ino, b->st_ino);
517}
518
519DEFINE_HASH_OPS_WITH_KEY_DESTRUCTOR(inode_hash_ops, struct stat, inode_hash_func, inode_compare_func, free);
d83ce136
LP
520
521const char* inode_type_to_string(mode_t m) {
522
523 /* Returns a short string for the inode type. We use the same name as the underlying macros for each
524 * inode type. */
525
526 switch (m & S_IFMT) {
527 case S_IFREG:
528 return "reg";
529 case S_IFDIR:
530 return "dir";
e83fbf4b
LP
531 case S_IFLNK:
532 return "lnk";
d83ce136
LP
533 case S_IFCHR:
534 return "chr";
535 case S_IFBLK:
536 return "blk";
537 case S_IFIFO:
538 return "fifo";
539 case S_IFSOCK:
540 return "sock";
541 }
542
f03caa0d 543 /* Note anonymous inodes in the kernel will have a zero type. Hence fstat() of an eventfd() will
7cff2b79 544 * return an .st_mode where we'll return NULL here! */
d83ce136
LP
545 return NULL;
546}
cc037880
LP
547
548mode_t inode_type_from_string(const char *s) {
549 if (!s)
550 return MODE_INVALID;
551
552 if (streq(s, "reg"))
553 return S_IFREG;
554 if (streq(s, "dir"))
555 return S_IFDIR;
556 if (streq(s, "lnk"))
557 return S_IFLNK;
558 if (streq(s, "chr"))
559 return S_IFCHR;
560 if (streq(s, "blk"))
561 return S_IFBLK;
562 if (streq(s, "fifo"))
563 return S_IFIFO;
564 if (streq(s, "sock"))
565 return S_IFSOCK;
566
567 return MODE_INVALID;
568}