| /* SPDX-License-Identifier: LGPL-2.1-or-later */ |
| |
| #include <errno.h> |
| #include <fcntl.h> |
| #include <sys/mman.h> |
| |
| #include "alloc-util.h" |
| #include "build.h" |
| #include "dirent-util.h" |
| #include "env-file.h" |
| #include "env-util.h" |
| #include "fd-util.h" |
| #include "fileio.h" |
| #include "hostname-util.h" |
| #include "log.h" |
| #include "macro.h" |
| #include "parse-util.h" |
| #include "stat-util.h" |
| #include "string-util.h" |
| #include "util.h" |
| #include "virt.h" |
| |
| int saved_argc = 0; |
| char **saved_argv = NULL; |
| static int saved_in_initrd = -1; |
| |
| bool kexec_loaded(void) { |
| _cleanup_free_ char *s = NULL; |
| |
| if (read_one_line_file("/sys/kernel/kexec_loaded", &s) < 0) |
| return false; |
| |
| return s[0] == '1'; |
| } |
| |
| int prot_from_flags(int flags) { |
| |
| switch (flags & O_ACCMODE) { |
| |
| case O_RDONLY: |
| return PROT_READ; |
| |
| case O_WRONLY: |
| return PROT_WRITE; |
| |
| case O_RDWR: |
| return PROT_READ|PROT_WRITE; |
| |
| default: |
| return -EINVAL; |
| } |
| } |
| |
| bool in_initrd(void) { |
| int r; |
| const char *e; |
| bool lenient = false; |
| |
| if (saved_in_initrd >= 0) |
| return saved_in_initrd; |
| |
| /* We have two checks here: |
| * |
| * 1. the flag file /etc/initrd-release must exist |
| * 2. the root file system must be a memory file system |
| * |
| * The second check is extra paranoia, since misdetecting an |
| * initrd can have bad consequences due the initrd |
| * emptying when transititioning to the main systemd. |
| * |
| * If env var $SYSTEMD_IN_INITRD is not set or set to "auto", |
| * both checks are used. If it's set to "lenient", only check |
| * 1 is used. If set to a boolean value, then the boolean |
| * value is returned. |
| */ |
| |
| e = secure_getenv("SYSTEMD_IN_INITRD"); |
| if (e) { |
| if (streq(e, "lenient")) |
| lenient = true; |
| else if (!streq(e, "auto")) { |
| r = parse_boolean(e); |
| if (r >= 0) { |
| saved_in_initrd = r > 0; |
| return saved_in_initrd; |
| } |
| log_debug_errno(r, "Failed to parse $SYSTEMD_IN_INITRD, ignoring: %m"); |
| } |
| } |
| |
| if (!lenient) { |
| r = path_is_temporary_fs("/"); |
| if (r < 0) |
| log_debug_errno(r, "Couldn't determine if / is a temporary file system: %m"); |
| |
| saved_in_initrd = r > 0; |
| } |
| |
| r = access("/etc/initrd-release", F_OK); |
| if (r >= 0) { |
| if (saved_in_initrd == 0) |
| log_debug("/etc/initrd-release exists, but it's not an initrd."); |
| else |
| saved_in_initrd = 1; |
| } else { |
| if (errno != ENOENT) |
| log_debug_errno(errno, "Failed to test if /etc/initrd-release exists: %m"); |
| saved_in_initrd = 0; |
| } |
| |
| return saved_in_initrd; |
| } |
| |
| void in_initrd_force(bool value) { |
| saved_in_initrd = value; |
| } |
| |
| int on_ac_power(void) { |
| bool found_offline = false, found_online = false; |
| _cleanup_closedir_ DIR *d = NULL; |
| struct dirent *de; |
| |
| d = opendir("/sys/class/power_supply"); |
| if (!d) |
| return errno == ENOENT ? true : -errno; |
| |
| FOREACH_DIRENT(de, d, return -errno) { |
| _cleanup_close_ int fd = -1, device = -1; |
| char contents[6]; |
| ssize_t n; |
| |
| device = openat(dirfd(d), de->d_name, O_DIRECTORY|O_RDONLY|O_CLOEXEC|O_NOCTTY); |
| if (device < 0) { |
| if (IN_SET(errno, ENOENT, ENOTDIR)) |
| continue; |
| |
| return -errno; |
| } |
| |
| fd = openat(device, "type", O_RDONLY|O_CLOEXEC|O_NOCTTY); |
| if (fd < 0) { |
| if (errno == ENOENT) |
| continue; |
| |
| return -errno; |
| } |
| |
| n = read(fd, contents, sizeof(contents)); |
| if (n < 0) |
| return -errno; |
| |
| if (n != 6 || memcmp(contents, "Mains\n", 6)) |
| continue; |
| |
| safe_close(fd); |
| fd = openat(device, "online", O_RDONLY|O_CLOEXEC|O_NOCTTY); |
| if (fd < 0) { |
| if (errno == ENOENT) |
| continue; |
| |
| return -errno; |
| } |
| |
| n = read(fd, contents, sizeof(contents)); |
| if (n < 0) |
| return -errno; |
| |
| if (n != 2 || contents[1] != '\n') |
| return -EIO; |
| |
| if (contents[0] == '1') { |
| found_online = true; |
| break; |
| } else if (contents[0] == '0') |
| found_offline = true; |
| else |
| return -EIO; |
| } |
| |
| return found_online || !found_offline; |
| } |
| |
| int container_get_leader(const char *machine, pid_t *pid) { |
| _cleanup_free_ char *s = NULL, *class = NULL; |
| const char *p; |
| pid_t leader; |
| int r; |
| |
| assert(machine); |
| assert(pid); |
| |
| if (streq(machine, ".host")) { |
| *pid = 1; |
| return 0; |
| } |
| |
| if (!hostname_is_valid(machine, 0)) |
| return -EINVAL; |
| |
| p = strjoina("/run/systemd/machines/", machine); |
| r = parse_env_file(NULL, p, |
| "LEADER", &s, |
| "CLASS", &class); |
| if (r == -ENOENT) |
| return -EHOSTDOWN; |
| if (r < 0) |
| return r; |
| if (!s) |
| return -EIO; |
| |
| if (!streq_ptr(class, "container")) |
| return -EIO; |
| |
| r = parse_pid(s, &leader); |
| if (r < 0) |
| return r; |
| if (leader <= 1) |
| return -EIO; |
| |
| *pid = leader; |
| return 0; |
| } |
| |
| int version(void) { |
| #ifndef GOOGLE3_BLAZE_BUILD |
| printf("systemd " STRINGIFY(PROJECT_VERSION) " (" GIT_VERSION ")\n%s\n", |
| systemd_features); |
| #endif // GOOGLE3_BLAZE_BUILD |
| return 0; |
| } |
| |
| /* Turn off core dumps but only if we're running outside of a container. */ |
| void disable_coredumps(void) { |
| int r; |
| |
| if (detect_container() > 0) |
| return; |
| |
| r = write_string_file("/proc/sys/kernel/core_pattern", "|/bin/false", WRITE_STRING_FILE_DISABLE_BUFFER); |
| if (r < 0) |
| log_debug_errno(r, "Failed to turn off coredumps, ignoring: %m"); |
| } |