mirror of
https://github.com/morgan9e/systemd
synced 2026-04-14 08:25:20 +09:00
Let's also add support for "uki-url", which was added at the same time to
the spec as "uki".
Follow-up for: 4a94a1b83f
2043 lines
71 KiB
C
2043 lines
71 KiB
C
/* SPDX-License-Identifier: LGPL-2.1-or-later */
|
|
|
|
#include <fnmatch.h>
|
|
#include <unistd.h>
|
|
|
|
#include "sd-json.h"
|
|
|
|
#include "alloc-util.h"
|
|
#include "bootspec.h"
|
|
#include "bootspec-fundamental.h"
|
|
#include "chase.h"
|
|
#include "devnum-util.h"
|
|
#include "dirent-util.h"
|
|
#include "efi-loader.h"
|
|
#include "efivars.h"
|
|
#include "env-file.h"
|
|
#include "extract-word.h"
|
|
#include "fd-util.h"
|
|
#include "fileio.h"
|
|
#include "find-esp.h"
|
|
#include "log.h"
|
|
#include "parse-util.h"
|
|
#include "path-util.h"
|
|
#include "pe-binary.h"
|
|
#include "pretty-print.h"
|
|
#include "recurse-dir.h"
|
|
#include "set.h"
|
|
#include "sort-util.h"
|
|
#include "stat-util.h"
|
|
#include "string-table.h"
|
|
#include "string-util.h"
|
|
#include "strv.h"
|
|
#include "uki.h"
|
|
|
|
static const char* const boot_entry_type_description_table[_BOOT_ENTRY_TYPE_MAX] = {
|
|
[BOOT_ENTRY_TYPE1] = "Boot Loader Specification Type #1 (.conf)",
|
|
[BOOT_ENTRY_TYPE2] = "Boot Loader Specification Type #2 (UKI, .efi)",
|
|
[BOOT_ENTRY_LOADER] = "Reported by Boot Loader",
|
|
[BOOT_ENTRY_AUTO] = "Automatic",
|
|
};
|
|
|
|
DEFINE_STRING_TABLE_LOOKUP_TO_STRING(boot_entry_type_description, BootEntryType);
|
|
|
|
static const char* const boot_entry_type_table[_BOOT_ENTRY_TYPE_MAX] = {
|
|
[BOOT_ENTRY_TYPE1] = "type1",
|
|
[BOOT_ENTRY_TYPE2] = "type2",
|
|
[BOOT_ENTRY_LOADER] = "loader",
|
|
[BOOT_ENTRY_AUTO] = "auto",
|
|
};
|
|
|
|
DEFINE_STRING_TABLE_LOOKUP(boot_entry_type, BootEntryType);
|
|
|
|
static const char* const boot_entry_source_description_table[_BOOT_ENTRY_SOURCE_MAX] = {
|
|
[BOOT_ENTRY_ESP] = "EFI System Partition",
|
|
[BOOT_ENTRY_XBOOTLDR] = "Extended Boot Loader Partition",
|
|
};
|
|
|
|
DEFINE_STRING_TABLE_LOOKUP_TO_STRING(boot_entry_source_description, BootEntrySource);
|
|
|
|
static const char* const boot_entry_source_table[_BOOT_ENTRY_SOURCE_MAX] = {
|
|
[BOOT_ENTRY_ESP] = "esp",
|
|
[BOOT_ENTRY_XBOOTLDR] = "xbootldr",
|
|
};
|
|
|
|
DEFINE_STRING_TABLE_LOOKUP_TO_STRING(boot_entry_source, BootEntrySource);
|
|
|
|
static void boot_entry_addons_done(BootEntryAddons *addons) {
|
|
assert(addons);
|
|
|
|
FOREACH_ARRAY(addon, addons->items, addons->n_items) {
|
|
free(addon->cmdline);
|
|
free(addon->location);
|
|
}
|
|
addons->items = mfree(addons->items);
|
|
addons->n_items = 0;
|
|
}
|
|
|
|
static void boot_entry_free(BootEntry *entry) {
|
|
assert(entry);
|
|
|
|
free(entry->id);
|
|
free(entry->id_old);
|
|
free(entry->id_without_profile);
|
|
free(entry->path);
|
|
free(entry->root);
|
|
free(entry->title);
|
|
free(entry->show_title);
|
|
free(entry->sort_key);
|
|
free(entry->version);
|
|
free(entry->machine_id);
|
|
free(entry->architecture);
|
|
strv_free(entry->options);
|
|
boot_entry_addons_done(&entry->local_addons);
|
|
free(entry->kernel);
|
|
free(entry->efi);
|
|
free(entry->uki);
|
|
free(entry->uki_url);
|
|
strv_free(entry->initrd);
|
|
free(entry->device_tree);
|
|
strv_free(entry->device_tree_overlay);
|
|
}
|
|
|
|
static int mangle_path(
|
|
const char *fname,
|
|
unsigned line,
|
|
const char *field,
|
|
const char *p,
|
|
char **ret) {
|
|
|
|
_cleanup_free_ char *c = NULL;
|
|
|
|
assert(field);
|
|
assert(p);
|
|
assert(ret);
|
|
|
|
/* Spec leaves open if prefixed with "/" or not, let's normalize that */
|
|
c = path_make_absolute(p, "/");
|
|
if (!c)
|
|
return -ENOMEM;
|
|
|
|
/* We only reference files, never directories */
|
|
if (endswith(c, "/")) {
|
|
log_syntax(NULL, LOG_WARNING, fname, line, 0, "Path in field '%s' has trailing slash, ignoring: %s", field, c);
|
|
*ret = NULL;
|
|
return 0;
|
|
}
|
|
|
|
/* Remove duplicate "/" */
|
|
path_simplify(c);
|
|
|
|
/* No ".." or "." or so */
|
|
if (!path_is_normalized(c)) {
|
|
log_syntax(NULL, LOG_WARNING, fname, line, 0, "Path in field '%s' is not normalized, ignoring: %s", field, c);
|
|
*ret = NULL;
|
|
return 0;
|
|
}
|
|
|
|
*ret = TAKE_PTR(c);
|
|
return 1;
|
|
}
|
|
|
|
static int parse_path_one(
|
|
const char *fname,
|
|
unsigned line,
|
|
const char *field,
|
|
char **s,
|
|
const char *p) {
|
|
|
|
_cleanup_free_ char *c = NULL;
|
|
int r;
|
|
|
|
assert(field);
|
|
assert(s);
|
|
assert(p);
|
|
|
|
r = mangle_path(fname, line, field, p, &c);
|
|
if (r <= 0)
|
|
return r;
|
|
|
|
return free_and_replace(*s, c);
|
|
}
|
|
|
|
static int parse_path_strv(
|
|
const char *fname,
|
|
unsigned line,
|
|
const char *field,
|
|
char ***s,
|
|
const char *p) {
|
|
|
|
char *c;
|
|
int r;
|
|
|
|
assert(field);
|
|
assert(s);
|
|
assert(p);
|
|
|
|
r = mangle_path(fname, line, field, p, &c);
|
|
if (r <= 0)
|
|
return r;
|
|
|
|
return strv_consume(s, c);
|
|
}
|
|
|
|
static int parse_path_many(
|
|
const char *fname,
|
|
unsigned line,
|
|
const char *field,
|
|
char ***s,
|
|
const char *p) {
|
|
|
|
_cleanup_strv_free_ char **l = NULL, **f = NULL;
|
|
int r;
|
|
|
|
l = strv_split(p, NULL);
|
|
if (!l)
|
|
return -ENOMEM;
|
|
|
|
STRV_FOREACH(i, l) {
|
|
char *c;
|
|
|
|
r = mangle_path(fname, line, field, *i, &c);
|
|
if (r < 0)
|
|
return r;
|
|
if (r == 0)
|
|
continue;
|
|
|
|
r = strv_consume(&f, c);
|
|
if (r < 0)
|
|
return r;
|
|
}
|
|
|
|
return strv_extend_strv_consume(s, TAKE_PTR(f), /* filter_duplicates= */ false);
|
|
}
|
|
|
|
static int parse_tries(const char *fname, const char **p, unsigned *ret) {
|
|
_cleanup_free_ char *d = NULL;
|
|
unsigned tries;
|
|
size_t n;
|
|
int r;
|
|
|
|
assert(fname);
|
|
assert(p);
|
|
assert(*p);
|
|
assert(ret);
|
|
|
|
n = strspn(*p, DIGITS);
|
|
if (n == 0) {
|
|
*ret = UINT_MAX;
|
|
return 0;
|
|
}
|
|
|
|
d = strndup(*p, n);
|
|
if (!d)
|
|
return log_oom();
|
|
|
|
r = safe_atou_full(d, 10, &tries);
|
|
if (r >= 0 && tries > INT_MAX) /* sd-boot allows INT_MAX, let's use the same limit */
|
|
r = -ERANGE;
|
|
if (r < 0)
|
|
return log_error_errno(r, "Failed to parse tries counter of filename '%s': %m", fname);
|
|
|
|
*p = *p + n;
|
|
*ret = tries;
|
|
return 1;
|
|
}
|
|
|
|
int boot_filename_extract_tries(
|
|
const char *fname,
|
|
char **ret_stripped,
|
|
unsigned *ret_tries_left,
|
|
unsigned *ret_tries_done) {
|
|
|
|
unsigned tries_left = UINT_MAX, tries_done = UINT_MAX;
|
|
_cleanup_free_ char *stripped = NULL;
|
|
const char *p, *suffix, *m;
|
|
int r;
|
|
|
|
assert(fname);
|
|
assert(ret_stripped);
|
|
assert(ret_tries_left);
|
|
assert(ret_tries_done);
|
|
|
|
/* Be liberal with suffix, only insist on a dot. After all we want to cover any capitalization here
|
|
* (vfat is case insensitive after all), and at least .efi and .conf as suffix. */
|
|
suffix = strrchr(fname, '.');
|
|
if (!suffix)
|
|
goto nothing;
|
|
|
|
p = m = memrchr(fname, '+', suffix - fname);
|
|
if (!p)
|
|
goto nothing;
|
|
p++;
|
|
|
|
r = parse_tries(fname, &p, &tries_left);
|
|
if (r < 0)
|
|
return r;
|
|
if (r == 0)
|
|
goto nothing;
|
|
|
|
if (*p == '-') {
|
|
p++;
|
|
|
|
r = parse_tries(fname, &p, &tries_done);
|
|
if (r < 0)
|
|
return r;
|
|
if (r == 0)
|
|
goto nothing;
|
|
}
|
|
|
|
if (p != suffix)
|
|
goto nothing;
|
|
|
|
stripped = strndup(fname, m - fname);
|
|
if (!stripped)
|
|
return log_oom();
|
|
|
|
if (!strextend(&stripped, suffix))
|
|
return log_oom();
|
|
|
|
*ret_stripped = TAKE_PTR(stripped);
|
|
*ret_tries_left = tries_left;
|
|
*ret_tries_done = tries_done;
|
|
|
|
return 0;
|
|
|
|
nothing:
|
|
stripped = strdup(fname);
|
|
if (!stripped)
|
|
return log_oom();
|
|
|
|
*ret_stripped = TAKE_PTR(stripped);
|
|
*ret_tries_left = *ret_tries_done = UINT_MAX;
|
|
return 0;
|
|
}
|
|
|
|
static int boot_entry_load_type1(
|
|
FILE *f,
|
|
const char *root,
|
|
const BootEntrySource source,
|
|
const char *dir,
|
|
const char *fname,
|
|
BootEntry *ret) {
|
|
|
|
_cleanup_(boot_entry_free) BootEntry tmp = BOOT_ENTRY_INIT(BOOT_ENTRY_TYPE1, source);
|
|
char *c;
|
|
int r;
|
|
|
|
assert(f);
|
|
assert(root);
|
|
assert(dir);
|
|
assert(fname);
|
|
assert(ret);
|
|
|
|
/* Loads a Type #1 boot menu entry from the specified FILE* object */
|
|
|
|
r = boot_filename_extract_tries(fname, &tmp.id, &tmp.tries_left, &tmp.tries_done);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (!efi_loader_entry_name_valid(tmp.id))
|
|
return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Invalid loader entry name: %s", fname);
|
|
|
|
c = endswith_no_case(tmp.id, ".conf");
|
|
if (!c)
|
|
return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Invalid loader entry file suffix: %s", fname);
|
|
|
|
tmp.id_old = strndup(tmp.id, c - tmp.id); /* Without .conf suffix */
|
|
if (!tmp.id_old)
|
|
return log_oom();
|
|
|
|
tmp.path = path_join(dir, fname);
|
|
if (!tmp.path)
|
|
return log_oom();
|
|
|
|
tmp.root = strdup(root);
|
|
if (!tmp.root)
|
|
return log_oom();
|
|
|
|
for (unsigned line = 1;; line++) {
|
|
_cleanup_free_ char *buf = NULL, *field = NULL;
|
|
|
|
r = read_stripped_line(f, LONG_LINE_MAX, &buf);
|
|
if (r == -ENOBUFS)
|
|
return log_syntax(NULL, LOG_ERR, tmp.path, line, r, "Line too long.");
|
|
if (r < 0)
|
|
return log_syntax(NULL, LOG_ERR, tmp.path, line, r, "Error while reading: %m");
|
|
if (r == 0)
|
|
break;
|
|
|
|
if (IN_SET(buf[0], '#', '\0'))
|
|
continue;
|
|
|
|
const char *p = buf;
|
|
r = extract_first_word(&p, &field, NULL, 0);
|
|
if (r < 0) {
|
|
log_syntax(NULL, LOG_WARNING, tmp.path, line, r, "Failed to parse, ignoring line: %m");
|
|
continue;
|
|
}
|
|
if (r == 0) {
|
|
log_syntax(NULL, LOG_WARNING, tmp.path, line, 0, "Bad syntax, ignoring line.");
|
|
continue;
|
|
}
|
|
|
|
if (isempty(p)) {
|
|
/* Some fields can reasonably have an empty value. In other cases warn. */
|
|
if (!STR_IN_SET(field, "options", "devicetree-overlay"))
|
|
log_syntax(NULL, LOG_WARNING, tmp.path, line, 0, "Field '%s' without value, ignoring line.", field);
|
|
|
|
continue;
|
|
}
|
|
|
|
if (streq(field, "title"))
|
|
r = free_and_strdup(&tmp.title, p);
|
|
else if (streq(field, "sort-key"))
|
|
r = free_and_strdup(&tmp.sort_key, p);
|
|
else if (streq(field, "version"))
|
|
r = free_and_strdup(&tmp.version, p);
|
|
else if (streq(field, "machine-id"))
|
|
r = free_and_strdup(&tmp.machine_id, p);
|
|
else if (streq(field, "architecture"))
|
|
r = free_and_strdup(&tmp.architecture, p);
|
|
else if (streq(field, "options"))
|
|
r = strv_extend(&tmp.options, p);
|
|
else if (streq(field, "linux"))
|
|
r = parse_path_one(tmp.path, line, field, &tmp.kernel, p);
|
|
else if (streq(field, "efi"))
|
|
r = parse_path_one(tmp.path, line, field, &tmp.efi, p);
|
|
else if (streq(field, "uki"))
|
|
r = parse_path_one(tmp.path, line, field, &tmp.uki, p);
|
|
else if (streq(field, "uki-url"))
|
|
r = free_and_strdup(&tmp.uki_url, p);
|
|
else if (streq(field, "profile"))
|
|
r = safe_atou_full(p, 10, &tmp.profile);
|
|
else if (streq(field, "initrd"))
|
|
r = parse_path_strv(tmp.path, line, field, &tmp.initrd, p);
|
|
else if (streq(field, "devicetree"))
|
|
r = parse_path_one(tmp.path, line, field, &tmp.device_tree, p);
|
|
else if (streq(field, "devicetree-overlay"))
|
|
r = parse_path_many(tmp.path, line, field, &tmp.device_tree_overlay, p);
|
|
else {
|
|
log_syntax(NULL, LOG_WARNING, tmp.path, line, 0, "Unknown line '%s', ignoring.", field);
|
|
continue;
|
|
}
|
|
if (r < 0)
|
|
return log_syntax(NULL, LOG_ERR, tmp.path, line, r, "Error while parsing: %m");
|
|
}
|
|
|
|
*ret = TAKE_STRUCT(tmp);
|
|
return 0;
|
|
}
|
|
|
|
int boot_config_load_type1(
|
|
BootConfig *config,
|
|
FILE *f,
|
|
const char *root,
|
|
const BootEntrySource source,
|
|
const char *dir,
|
|
const char *fname) {
|
|
int r;
|
|
|
|
assert(config);
|
|
assert(f);
|
|
assert(root);
|
|
assert(dir);
|
|
assert(fname);
|
|
|
|
if (!GREEDY_REALLOC(config->entries, config->n_entries + 1))
|
|
return log_oom();
|
|
|
|
BootEntry *entry = config->entries + config->n_entries;
|
|
|
|
r = boot_entry_load_type1(f, root, source, dir, fname, entry);
|
|
if (r < 0)
|
|
return r;
|
|
config->n_entries++;
|
|
|
|
entry->global_addons = &config->global_addons[source];
|
|
|
|
return 0;
|
|
}
|
|
|
|
void boot_config_free(BootConfig *config) {
|
|
assert(config);
|
|
|
|
free(config->default_pattern);
|
|
|
|
free(config->entry_oneshot);
|
|
free(config->entry_default);
|
|
free(config->entry_selected);
|
|
free(config->entry_sysfail);
|
|
|
|
FOREACH_ARRAY(i, config->entries, config->n_entries)
|
|
boot_entry_free(i);
|
|
free(config->entries);
|
|
|
|
FOREACH_ELEMENT(i, config->global_addons)
|
|
boot_entry_addons_done(i);
|
|
|
|
set_free(config->inodes_seen);
|
|
}
|
|
|
|
int boot_loader_read_conf(BootConfig *config, FILE *file, const char *path) {
|
|
int r;
|
|
|
|
assert(config);
|
|
assert(file);
|
|
assert(path);
|
|
|
|
for (unsigned line = 1;; line++) {
|
|
_cleanup_free_ char *buf = NULL, *field = NULL;
|
|
|
|
r = read_stripped_line(file, LONG_LINE_MAX, &buf);
|
|
if (r == -ENOBUFS)
|
|
return log_syntax(NULL, LOG_ERR, path, line, r, "Line too long.");
|
|
if (r < 0)
|
|
return log_syntax(NULL, LOG_ERR, path, line, r, "Error while reading: %m");
|
|
if (r == 0)
|
|
break;
|
|
|
|
if (IN_SET(buf[0], '#', '\0'))
|
|
continue;
|
|
|
|
const char *p = buf;
|
|
r = extract_first_word(&p, &field, NULL, 0);
|
|
if (r < 0) {
|
|
log_syntax(NULL, LOG_WARNING, path, line, r, "Failed to parse, ignoring line: %m");
|
|
continue;
|
|
}
|
|
if (r == 0) {
|
|
log_syntax(NULL, LOG_WARNING, path, line, 0, "Bad syntax, ignoring line.");
|
|
continue;
|
|
}
|
|
if (isempty(p)) {
|
|
log_syntax(NULL, LOG_WARNING, path, line, 0, "Field '%s' without value, ignoring line.", field);
|
|
continue;
|
|
}
|
|
|
|
if (streq(field, "default"))
|
|
r = free_and_strdup(&config->default_pattern, p);
|
|
else if (STR_IN_SET(field, "timeout", "editor", "auto-entries", "auto-firmware",
|
|
"auto-poweroff", "auto-reboot", "beep", "reboot-for-bitlocker",
|
|
"reboot-on-error", "secure-boot-enroll", "secure-boot-enroll-action",
|
|
"secure-boot-enroll-timeout-sec", "console-mode", "log-level"))
|
|
r = 0; /* we don't parse these in userspace, but they are OK */
|
|
else {
|
|
log_syntax(NULL, LOG_WARNING, path, line, 0, "Unknown line '%s', ignoring.", field);
|
|
continue;
|
|
}
|
|
if (r < 0)
|
|
return log_syntax(NULL, LOG_ERR, path, line, r, "Error while parsing: %m");
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int boot_loader_read_conf_path(BootConfig *config, const char *root, const char *path) {
|
|
_cleanup_free_ char *full = NULL;
|
|
_cleanup_fclose_ FILE *f = NULL;
|
|
int r;
|
|
|
|
assert(config);
|
|
assert(path);
|
|
|
|
r = chase_and_fopen_unlocked(path, root, CHASE_PREFIX_ROOT|CHASE_PROHIBIT_SYMLINKS, "re", &full, &f);
|
|
config->loader_conf_status = r < 0 ? r : true;
|
|
if (r == -ENOENT)
|
|
return 0;
|
|
if (r < 0)
|
|
return log_error_errno(r, "Failed to open '%s/%s': %m", root, skip_leading_slash(path));
|
|
|
|
return boot_loader_read_conf(config, f, full);
|
|
}
|
|
|
|
static int boot_entry_compare(const BootEntry *a, const BootEntry *b) {
|
|
int r;
|
|
|
|
assert(a);
|
|
assert(b);
|
|
|
|
/* This mimics a function of the same name in src/boot/efi/sd-boot.c */
|
|
|
|
r = CMP(a->tries_left == 0, b->tries_left == 0);
|
|
if (r != 0)
|
|
return r;
|
|
|
|
r = CMP(!a->sort_key, !b->sort_key);
|
|
if (r != 0)
|
|
return r;
|
|
|
|
if (a->sort_key && b->sort_key) {
|
|
r = strcmp(a->sort_key, b->sort_key);
|
|
if (r != 0)
|
|
return r;
|
|
|
|
r = strcmp_ptr(a->machine_id, b->machine_id);
|
|
if (r != 0)
|
|
return r;
|
|
|
|
r = -strverscmp_improved(a->version, b->version);
|
|
if (r != 0)
|
|
return r;
|
|
}
|
|
|
|
r = -strverscmp_improved(a->id_without_profile ?: a->id, b->id_without_profile ?: b->id);
|
|
if (r != 0)
|
|
return r;
|
|
|
|
if (a->id_without_profile && b->id_without_profile) {
|
|
/* The strverscmp_improved() call above already established that we are talking about the
|
|
* same image here, hence order by profile, if there is one */
|
|
r = CMP(a->profile, b->profile);
|
|
if (r != 0)
|
|
return r;
|
|
}
|
|
|
|
if (a->tries_left != UINT_MAX || b->tries_left != UINT_MAX)
|
|
return 0;
|
|
|
|
r = -CMP(a->tries_left, b->tries_left);
|
|
if (r != 0)
|
|
return r;
|
|
|
|
return CMP(a->tries_done, b->tries_done);
|
|
}
|
|
|
|
static int config_check_inode_relevant_and_unseen(BootConfig *config, int fd, const char *fname) {
|
|
_cleanup_free_ char *d = NULL;
|
|
struct stat st;
|
|
|
|
assert(config);
|
|
assert(fd >= 0);
|
|
assert(fname);
|
|
|
|
/* So, here's the thing: because of the mess around /efi/ vs. /boot/ vs. /boot/efi/ it might be that
|
|
* people have these dirs, or subdirs of them symlinked or bind mounted, and we might end up
|
|
* iterating though some dirs multiple times. Let's thus rather be safe than sorry, and track the
|
|
* inodes we already processed: let's ignore inodes we have seen already. This should be robust
|
|
* against any form of symlinking or bind mounting, and effectively suppress any such duplicates. */
|
|
|
|
if (fstat(fd, &st) < 0)
|
|
return log_error_errno(errno, "Failed to stat('%s'): %m", fname);
|
|
if (!S_ISREG(st.st_mode)) {
|
|
log_debug("File '%s' is not a regular file, ignoring.", fname);
|
|
return false;
|
|
}
|
|
|
|
if (set_contains(config->inodes_seen, &st)) {
|
|
log_debug("Inode '%s' already seen before, ignoring.", fname);
|
|
return false;
|
|
}
|
|
|
|
d = memdup(&st, sizeof(st));
|
|
if (!d)
|
|
return log_oom();
|
|
|
|
if (set_ensure_consume(&config->inodes_seen, &inode_hash_ops, TAKE_PTR(d)) < 0)
|
|
return log_oom();
|
|
|
|
return true;
|
|
}
|
|
|
|
static int boot_entries_find_type1(
|
|
BootConfig *config,
|
|
const char *root,
|
|
const BootEntrySource source,
|
|
const char *dir) {
|
|
|
|
_cleanup_free_ DirectoryEntries *dentries = NULL;
|
|
_cleanup_free_ char *full = NULL;
|
|
_cleanup_close_ int dir_fd = -EBADF;
|
|
int r;
|
|
|
|
assert(config);
|
|
assert(root);
|
|
assert(dir);
|
|
|
|
dir_fd = chase_and_open(dir, root, CHASE_PREFIX_ROOT|CHASE_PROHIBIT_SYMLINKS, O_DIRECTORY|O_CLOEXEC, &full);
|
|
if (dir_fd == -ENOENT)
|
|
return 0;
|
|
if (dir_fd < 0)
|
|
return log_error_errno(dir_fd, "Failed to open '%s/%s': %m", root, skip_leading_slash(dir));
|
|
|
|
r = readdir_all(dir_fd, RECURSE_DIR_IGNORE_DOT, &dentries);
|
|
if (r < 0)
|
|
return log_error_errno(r, "Failed to read directory '%s': %m", full);
|
|
|
|
FOREACH_ARRAY(i, dentries->entries, dentries->n_entries) {
|
|
const struct dirent *de = *i;
|
|
_cleanup_fclose_ FILE *f = NULL;
|
|
|
|
if (!dirent_is_file(de))
|
|
continue;
|
|
|
|
if (!endswith_no_case(de->d_name, ".conf"))
|
|
continue;
|
|
|
|
r = xfopenat(dir_fd, de->d_name, "re", O_NOFOLLOW|O_NOCTTY, &f);
|
|
if (r < 0) {
|
|
log_warning_errno(r, "Failed to open %s/%s, ignoring: %m", full, de->d_name);
|
|
continue;
|
|
}
|
|
|
|
r = config_check_inode_relevant_and_unseen(config, fileno(f), de->d_name);
|
|
if (r < 0)
|
|
return r;
|
|
if (r == 0) /* inode already seen or otherwise not relevant */
|
|
continue;
|
|
|
|
r = boot_config_load_type1(config, f, root, source, full, de->d_name);
|
|
if (r == -ENOMEM) /* ignore all other errors */
|
|
return log_oom();
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int boot_entry_load_unified(
|
|
const char *root,
|
|
const BootEntrySource source,
|
|
const char *path,
|
|
unsigned profile,
|
|
const char *osrelease_text,
|
|
const char *profile_text,
|
|
const char *cmdline_text,
|
|
BootEntry *ret) {
|
|
|
|
_cleanup_free_ char *fname = NULL, *os_pretty_name = NULL, *os_image_id = NULL, *os_name = NULL, *os_id = NULL,
|
|
*os_image_version = NULL, *os_version = NULL, *os_version_id = NULL, *os_build_id = NULL;
|
|
const char *k, *good_name, *good_version, *good_sort_key;
|
|
_cleanup_fclose_ FILE *f = NULL;
|
|
int r;
|
|
|
|
assert(root);
|
|
assert(path);
|
|
assert(osrelease_text);
|
|
assert(ret);
|
|
|
|
k = path_startswith(path, root);
|
|
if (!k)
|
|
return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Path is not below root: %s", path);
|
|
|
|
f = fmemopen_unlocked((void*) osrelease_text, strlen(osrelease_text), "r");
|
|
if (!f)
|
|
return log_oom();
|
|
|
|
r = parse_env_file(f, "os-release",
|
|
"PRETTY_NAME", &os_pretty_name,
|
|
"IMAGE_ID", &os_image_id,
|
|
"NAME", &os_name,
|
|
"ID", &os_id,
|
|
"IMAGE_VERSION", &os_image_version,
|
|
"VERSION", &os_version,
|
|
"VERSION_ID", &os_version_id,
|
|
"BUILD_ID", &os_build_id);
|
|
if (r < 0)
|
|
return log_error_errno(r, "Failed to parse os-release data from unified kernel image %s: %m", path);
|
|
|
|
if (!bootspec_pick_name_version_sort_key(
|
|
os_pretty_name,
|
|
os_image_id,
|
|
os_name,
|
|
os_id,
|
|
os_image_version,
|
|
os_version,
|
|
os_version_id,
|
|
os_build_id,
|
|
&good_name,
|
|
&good_version,
|
|
&good_sort_key))
|
|
return log_error_errno(SYNTHETIC_ERRNO(EBADMSG), "Missing fields in os-release data from unified kernel image %s, refusing.", path);
|
|
|
|
_cleanup_free_ char *profile_id = NULL, *profile_title = NULL;
|
|
if (profile_text) {
|
|
fclose(f);
|
|
|
|
f = fmemopen_unlocked((void*) profile_text, strlen(profile_text), "r");
|
|
if (!f)
|
|
return log_oom();
|
|
|
|
r = parse_env_file(
|
|
f, "profile",
|
|
"ID", &profile_id,
|
|
"TITLE", &profile_title);
|
|
if (r < 0)
|
|
return log_error_errno(r, "Failed to parse profile data from unified kernel image '%s': %m", path);
|
|
}
|
|
|
|
r = path_extract_filename(path, &fname);
|
|
if (r < 0)
|
|
return log_error_errno(r, "Failed to extract file name from '%s': %m", path);
|
|
|
|
_cleanup_(boot_entry_free) BootEntry tmp = BOOT_ENTRY_INIT(BOOT_ENTRY_TYPE2, source);
|
|
|
|
r = boot_filename_extract_tries(fname, &tmp.id, &tmp.tries_left, &tmp.tries_done);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (!efi_loader_entry_name_valid(tmp.id))
|
|
return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Invalid loader entry name: %s", tmp.id);
|
|
|
|
tmp.profile = profile;
|
|
|
|
if (profile_id || profile > 0) {
|
|
tmp.id_without_profile = TAKE_PTR(tmp.id);
|
|
|
|
if (profile_id)
|
|
tmp.id = strjoin(tmp.id_without_profile, "@", profile_id);
|
|
else
|
|
(void) asprintf(&tmp.id, "%s@%u", tmp.id_without_profile, profile);
|
|
if (!tmp.id)
|
|
return log_oom();
|
|
}
|
|
|
|
if (os_id && os_version_id) {
|
|
tmp.id_old = strjoin(os_id, "-", os_version_id);
|
|
if (!tmp.id_old)
|
|
return log_oom();
|
|
}
|
|
|
|
tmp.path = strdup(path);
|
|
if (!tmp.path)
|
|
return log_oom();
|
|
|
|
tmp.root = strdup(root);
|
|
if (!tmp.root)
|
|
return log_oom();
|
|
|
|
tmp.kernel = path_make_absolute(k, "/");
|
|
if (!tmp.kernel)
|
|
return log_oom();
|
|
|
|
tmp.options = strv_new(cmdline_text);
|
|
if (!tmp.options)
|
|
return log_oom();
|
|
|
|
if (profile_title)
|
|
tmp.title = strjoin(good_name, " (", profile_title, ")");
|
|
else if (profile_id)
|
|
tmp.title = strjoin(good_name, " (", profile_id, ")");
|
|
else if (profile > 0)
|
|
(void) asprintf(&tmp.title, "%s (@%u)", good_name, profile);
|
|
else
|
|
tmp.title = strdup(good_name);
|
|
if (!tmp.title)
|
|
return log_oom();
|
|
|
|
if (good_sort_key) {
|
|
tmp.sort_key = strdup(good_sort_key);
|
|
if (!tmp.sort_key)
|
|
return log_oom();
|
|
}
|
|
|
|
if (good_version) {
|
|
tmp.version = strdup(good_version);
|
|
if (!tmp.version)
|
|
return log_oom();
|
|
}
|
|
|
|
*ret = TAKE_STRUCT(tmp);
|
|
return 0;
|
|
}
|
|
|
|
static int pe_load_headers_and_sections(
|
|
int fd,
|
|
const char *path,
|
|
IMAGE_SECTION_HEADER **ret_sections,
|
|
PeHeader **ret_pe_header) {
|
|
|
|
_cleanup_free_ IMAGE_SECTION_HEADER *sections = NULL;
|
|
_cleanup_free_ IMAGE_DOS_HEADER *dos_header = NULL;
|
|
_cleanup_free_ PeHeader *pe_header = NULL;
|
|
int r;
|
|
|
|
assert(fd >= 0);
|
|
assert(path);
|
|
|
|
r = pe_load_headers(fd, &dos_header, &pe_header);
|
|
if (r < 0)
|
|
return log_error_errno(r, "Failed to parse PE file '%s': %m", path);
|
|
|
|
r = pe_load_sections(fd, dos_header, pe_header, §ions);
|
|
if (r < 0)
|
|
return log_error_errno(r, "Failed to parse PE sections of '%s': %m", path);
|
|
|
|
if (ret_pe_header)
|
|
*ret_pe_header = TAKE_PTR(pe_header);
|
|
if (ret_sections)
|
|
*ret_sections = TAKE_PTR(sections);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static const IMAGE_SECTION_HEADER* pe_find_profile_section_table(
|
|
const PeHeader *pe_header,
|
|
const IMAGE_SECTION_HEADER *sections,
|
|
unsigned profile,
|
|
size_t *ret_n_sections) {
|
|
|
|
assert(pe_header);
|
|
|
|
/* Looks for the part of the section table that defines the specified profile. If 'profile' is
|
|
* specified as UINT_MAX this will look for the base profile. */
|
|
|
|
if (le16toh(pe_header->pe.NumberOfSections) == 0)
|
|
return NULL;
|
|
|
|
assert(sections);
|
|
|
|
const IMAGE_SECTION_HEADER
|
|
*p = sections,
|
|
*e = sections + le16toh(pe_header->pe.NumberOfSections),
|
|
*start = profile == UINT_MAX ? sections : NULL,
|
|
*end;
|
|
unsigned current_profile = UINT_MAX;
|
|
|
|
for (;;) {
|
|
p = pe_section_table_find(p, e - p, ".profile");
|
|
if (!p) {
|
|
end = e;
|
|
break;
|
|
}
|
|
if (current_profile == profile) {
|
|
end = p;
|
|
break;
|
|
}
|
|
|
|
if (current_profile == UINT_MAX)
|
|
current_profile = 0;
|
|
else
|
|
current_profile++;
|
|
|
|
if (current_profile == profile)
|
|
start = p;
|
|
|
|
p++; /* Continue scanning after the .profile entry we just found */
|
|
}
|
|
|
|
if (!start)
|
|
return NULL;
|
|
|
|
if (ret_n_sections)
|
|
*ret_n_sections = end - start;
|
|
|
|
return start;
|
|
}
|
|
|
|
static int trim_cmdline(char **cmdline) {
|
|
assert(cmdline);
|
|
|
|
/* Strips leading and trailing whitespace from command line */
|
|
|
|
if (!*cmdline)
|
|
return 0;
|
|
|
|
const char *skipped = skip_leading_chars(*cmdline, WHITESPACE);
|
|
|
|
if (isempty(skipped)) {
|
|
*cmdline = mfree(*cmdline);
|
|
return 0;
|
|
}
|
|
|
|
if (skipped != *cmdline) {
|
|
_cleanup_free_ char *c = strdup(skipped);
|
|
if (!c)
|
|
return -ENOMEM;
|
|
|
|
free_and_replace(*cmdline, c);
|
|
}
|
|
|
|
delete_trailing_chars(*cmdline, WHITESPACE);
|
|
return 1;
|
|
}
|
|
|
|
/* Maximum PE section we are willing to load (Note that sections we are not interested in may be larger, but
|
|
* the ones we do care about and we are willing to load into memory have this size limit.) */
|
|
#define PE_SECTION_SIZE_MAX (4U*1024U*1024U)
|
|
|
|
static int pe_find_uki_sections(
|
|
int fd,
|
|
const char *path,
|
|
unsigned profile,
|
|
char **ret_osrelease,
|
|
char **ret_profile,
|
|
char **ret_cmdline) {
|
|
|
|
_cleanup_free_ char *osrelease_text = NULL, *profile_text = NULL, *cmdline_text = NULL;
|
|
_cleanup_free_ IMAGE_SECTION_HEADER *sections = NULL;
|
|
_cleanup_free_ PeHeader *pe_header = NULL;
|
|
int r;
|
|
|
|
assert(fd >= 0);
|
|
assert(path);
|
|
assert(profile != UINT_MAX);
|
|
assert(ret_osrelease);
|
|
assert(ret_profile);
|
|
assert(ret_cmdline);
|
|
|
|
r = pe_load_headers_and_sections(fd, path, §ions, &pe_header);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (!pe_is_uki(pe_header, sections))
|
|
return log_error_errno(SYNTHETIC_ERRNO(EBADMSG), "Parsed PE file '%s' is not a UKI.", path);
|
|
|
|
if (!pe_is_native(pe_header)) /* Don't process non-native UKIs */
|
|
goto nothing;
|
|
|
|
/* Find part of the section table for this profile */
|
|
size_t n_psections = 0;
|
|
const IMAGE_SECTION_HEADER *psections = pe_find_profile_section_table(pe_header, sections, profile, &n_psections);
|
|
if (!psections && profile != 0) /* Profile not found? (Profile @0 needs no explicit .profile!) */
|
|
goto nothing;
|
|
|
|
/* Find base profile part of section table */
|
|
size_t n_bsections;
|
|
const IMAGE_SECTION_HEADER *bsections = ASSERT_PTR(pe_find_profile_section_table(pe_header, sections, UINT_MAX, &n_bsections));
|
|
|
|
struct {
|
|
const char *name;
|
|
char **data;
|
|
} table[] = {
|
|
{ ".osrel", &osrelease_text },
|
|
{ ".profile", &profile_text },
|
|
{ ".cmdline", &cmdline_text },
|
|
};
|
|
|
|
FOREACH_ELEMENT(t, table) {
|
|
const IMAGE_SECTION_HEADER *found;
|
|
|
|
/* First look in the profile part of the section table, and if we don't find anything there, look into the base part */
|
|
found = pe_section_table_find(psections, n_psections, t->name);
|
|
if (!found) {
|
|
found = pe_section_table_find(bsections, n_bsections, t->name);
|
|
if (!found)
|
|
continue;
|
|
}
|
|
|
|
/* Permit "masking" of sections in the base profile */
|
|
if (found->VirtualSize == 0)
|
|
continue;
|
|
|
|
r = pe_read_section_data(fd, found, PE_SECTION_SIZE_MAX, (void**) t->data, /* ret_size= */ NULL);
|
|
if (r < 0)
|
|
return log_error_errno(r, "Failed to load contents of section '%s': %m", t->name);
|
|
}
|
|
|
|
if (!osrelease_text)
|
|
return log_error_errno(SYNTHETIC_ERRNO(EBADMSG), "Unified kernel image lacks .osrel data for profile @%u, refusing.", profile);
|
|
|
|
if (trim_cmdline(&cmdline_text) < 0)
|
|
return log_oom();
|
|
|
|
*ret_osrelease = TAKE_PTR(osrelease_text);
|
|
*ret_profile = TAKE_PTR(profile_text);
|
|
*ret_cmdline = TAKE_PTR(cmdline_text);
|
|
return 1;
|
|
|
|
nothing:
|
|
*ret_osrelease = *ret_profile = *ret_cmdline = NULL;
|
|
return 0;
|
|
}
|
|
|
|
static int pe_find_addon_sections(
|
|
int fd,
|
|
const char *path,
|
|
char **ret_cmdline) {
|
|
|
|
_cleanup_free_ IMAGE_SECTION_HEADER *sections = NULL;
|
|
_cleanup_free_ PeHeader *pe_header = NULL;
|
|
int r;
|
|
|
|
assert(fd >= 0);
|
|
assert(path);
|
|
|
|
r = pe_load_headers_and_sections(fd, path, §ions, &pe_header);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (!pe_is_addon(pe_header, sections))
|
|
return log_error_errno(SYNTHETIC_ERRNO(EBADMSG), "Parse PE file '%s' is not an add-on.", path);
|
|
|
|
/* Define early, before the gotos below */
|
|
_cleanup_free_ char *cmdline_text = NULL;
|
|
|
|
if (!pe_is_native(pe_header))
|
|
goto nothing;
|
|
|
|
const IMAGE_SECTION_HEADER *found = pe_section_table_find(sections, le16toh(pe_header->pe.NumberOfSections), ".cmdline");
|
|
if (!found)
|
|
goto nothing;
|
|
|
|
r = pe_read_section_data(fd, found, PE_SECTION_SIZE_MAX, (void**) &cmdline_text, /* ret_size= */ NULL);
|
|
if (r < 0)
|
|
return log_error_errno(r, "Failed to load contents of section '.cmdline': %m");
|
|
|
|
if (trim_cmdline(&cmdline_text) < 0)
|
|
return log_oom();
|
|
|
|
*ret_cmdline = TAKE_PTR(cmdline_text);
|
|
return 1;
|
|
|
|
nothing:
|
|
*ret_cmdline = NULL;
|
|
return 0;
|
|
}
|
|
|
|
static int insert_boot_entry_addon(
|
|
BootEntryAddons *addons,
|
|
char *location,
|
|
char *cmdline) {
|
|
|
|
assert(addons);
|
|
|
|
if (!GREEDY_REALLOC(addons->items, addons->n_items + 1))
|
|
return log_oom();
|
|
|
|
addons->items[addons->n_items++] = (BootEntryAddon) {
|
|
.location = location,
|
|
.cmdline = cmdline,
|
|
};
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int boot_entries_find_unified_addons(
|
|
BootConfig *config,
|
|
int d_fd,
|
|
const char *addon_dir,
|
|
const char *root,
|
|
BootEntryAddons *ret_addons) {
|
|
|
|
_cleanup_closedir_ DIR *d = NULL;
|
|
_cleanup_free_ char *full = NULL;
|
|
_cleanup_(boot_entry_addons_done) BootEntryAddons addons = {};
|
|
int r;
|
|
|
|
assert(ret_addons);
|
|
assert(config);
|
|
|
|
r = chase_and_opendirat(d_fd, addon_dir, CHASE_AT_RESOLVE_IN_ROOT, &full, &d);
|
|
if (r == -ENOENT)
|
|
return 0;
|
|
if (r < 0)
|
|
return log_error_errno(r, "Failed to open '%s/%s': %m", root, skip_leading_slash(addon_dir));
|
|
|
|
FOREACH_DIRENT(de, d, return log_error_errno(errno, "Failed to read %s: %m", full)) {
|
|
_cleanup_free_ char *j = NULL, *cmdline = NULL, *location = NULL;
|
|
_cleanup_close_ int fd = -EBADF;
|
|
|
|
if (!dirent_is_file(de))
|
|
continue;
|
|
|
|
if (!endswith_no_case(de->d_name, ".addon.efi"))
|
|
continue;
|
|
|
|
fd = openat(dirfd(d), de->d_name, O_RDONLY|O_CLOEXEC|O_NONBLOCK|O_NOFOLLOW|O_NOCTTY);
|
|
if (fd < 0) {
|
|
log_warning_errno(errno, "Failed to open %s/%s, ignoring: %m", full, de->d_name);
|
|
continue;
|
|
}
|
|
|
|
r = config_check_inode_relevant_and_unseen(config, fd, de->d_name);
|
|
if (r < 0)
|
|
return r;
|
|
if (r == 0) /* inode already seen or otherwise not relevant */
|
|
continue;
|
|
|
|
j = path_join(full, de->d_name);
|
|
if (!j)
|
|
return log_oom();
|
|
|
|
if (pe_find_addon_sections(fd, j, &cmdline) <= 0)
|
|
continue;
|
|
|
|
location = strdup(j);
|
|
if (!location)
|
|
return log_oom();
|
|
|
|
r = insert_boot_entry_addon(&addons, location, cmdline);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
TAKE_PTR(location);
|
|
TAKE_PTR(cmdline);
|
|
}
|
|
|
|
*ret_addons = TAKE_STRUCT(addons);
|
|
return 0;
|
|
}
|
|
|
|
static int boot_entries_find_unified_global_addons(
|
|
BootConfig *config,
|
|
const char *root,
|
|
const char *d_name,
|
|
BootEntryAddons *ret_addons) {
|
|
|
|
int r;
|
|
_cleanup_closedir_ DIR *d = NULL;
|
|
|
|
assert(ret_addons);
|
|
|
|
r = chase_and_opendir(root, NULL, CHASE_PROHIBIT_SYMLINKS, NULL, &d);
|
|
if (r == -ENOENT)
|
|
return 0;
|
|
if (r < 0)
|
|
return log_error_errno(r, "Failed to open '%s/%s': %m", root, skip_leading_slash(d_name));
|
|
|
|
return boot_entries_find_unified_addons(config, dirfd(d), d_name, root, ret_addons);
|
|
}
|
|
|
|
static int boot_entries_find_unified_local_addons(
|
|
BootConfig *config,
|
|
int d_fd,
|
|
const char *d_name,
|
|
const char *root,
|
|
BootEntry *ret) {
|
|
|
|
_cleanup_free_ char *addon_dir = NULL;
|
|
|
|
assert(ret);
|
|
|
|
addon_dir = strjoin(d_name, ".extra.d");
|
|
if (!addon_dir)
|
|
return log_oom();
|
|
|
|
return boot_entries_find_unified_addons(config, d_fd, addon_dir, root, &ret->local_addons);
|
|
}
|
|
|
|
static int boot_entries_find_unified(
|
|
BootConfig *config,
|
|
const char *root,
|
|
BootEntrySource source,
|
|
const char *dir) {
|
|
|
|
_cleanup_closedir_ DIR *d = NULL;
|
|
_cleanup_free_ char *full = NULL;
|
|
int r;
|
|
|
|
assert(config);
|
|
assert(dir);
|
|
|
|
r = chase_and_opendir(dir, root, CHASE_PREFIX_ROOT|CHASE_PROHIBIT_SYMLINKS, &full, &d);
|
|
if (r == -ENOENT)
|
|
return 0;
|
|
if (r < 0)
|
|
return log_error_errno(r, "Failed to open '%s/%s': %m", root, skip_leading_slash(dir));
|
|
|
|
FOREACH_DIRENT(de, d, return log_error_errno(errno, "Failed to read %s: %m", full)) {
|
|
if (!dirent_is_file(de))
|
|
continue;
|
|
|
|
if (!endswith_no_case(de->d_name, ".efi"))
|
|
continue;
|
|
|
|
_cleanup_close_ int fd = openat(dirfd(d), de->d_name, O_RDONLY|O_CLOEXEC|O_NONBLOCK|O_NOFOLLOW|O_NOCTTY);
|
|
if (fd < 0) {
|
|
log_warning_errno(errno, "Failed to open %s/%s, ignoring: %m", full, de->d_name);
|
|
continue;
|
|
}
|
|
|
|
r = config_check_inode_relevant_and_unseen(config, fd, de->d_name);
|
|
if (r < 0)
|
|
return r;
|
|
if (r == 0) /* inode already seen or otherwise not relevant */
|
|
continue;
|
|
|
|
_cleanup_free_ char *j = path_join(full, de->d_name);
|
|
if (!j)
|
|
return log_oom();
|
|
|
|
for (unsigned p = 0; p < UNIFIED_PROFILES_MAX; p++) {
|
|
_cleanup_free_ char *osrelease = NULL, *profile = NULL, *cmdline = NULL;
|
|
|
|
r = pe_find_uki_sections(fd, j, p, &osrelease, &profile, &cmdline);
|
|
if (r == 0) /* this profile does not exist, we are done */
|
|
break;
|
|
if (r < 0)
|
|
continue;
|
|
|
|
if (!GREEDY_REALLOC(config->entries, config->n_entries + 1))
|
|
return log_oom();
|
|
|
|
BootEntry *entry = config->entries + config->n_entries;
|
|
|
|
if (boot_entry_load_unified(root, source, j, p, osrelease, profile, cmdline, entry) < 0)
|
|
continue;
|
|
|
|
/* look for .efi.extra.d */
|
|
(void) boot_entries_find_unified_local_addons(config, dirfd(d), de->d_name, full, entry);
|
|
|
|
/* Set up the backpointer, so that we can find the global addons */
|
|
entry->global_addons = &config->global_addons[source];
|
|
|
|
config->n_entries++;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static bool find_nonunique(const BootEntry *entries, size_t n_entries, bool arr[]) {
|
|
bool non_unique = false;
|
|
|
|
assert(entries || n_entries == 0);
|
|
assert(arr || n_entries == 0);
|
|
|
|
for (size_t i = 0; i < n_entries; i++)
|
|
arr[i] = false;
|
|
|
|
for (size_t i = 0; i < n_entries; i++)
|
|
for (size_t j = 0; j < n_entries; j++)
|
|
if (i != j && streq(boot_entry_title(entries + i),
|
|
boot_entry_title(entries + j)))
|
|
non_unique = arr[i] = arr[j] = true;
|
|
|
|
return non_unique;
|
|
}
|
|
|
|
static int boot_entries_uniquify(BootEntry *entries, size_t n_entries) {
|
|
_cleanup_free_ bool *arr = NULL;
|
|
char *s;
|
|
|
|
assert(entries || n_entries == 0);
|
|
|
|
if (n_entries == 0)
|
|
return 0;
|
|
|
|
arr = new(bool, n_entries);
|
|
if (!arr)
|
|
return -ENOMEM;
|
|
|
|
/* Find _all_ non-unique titles */
|
|
if (!find_nonunique(entries, n_entries, arr))
|
|
return 0;
|
|
|
|
/* Add version to non-unique titles */
|
|
for (size_t i = 0; i < n_entries; i++)
|
|
if (arr[i] && entries[i].version) {
|
|
if (asprintf(&s, "%s (%s)", boot_entry_title(entries + i), entries[i].version) < 0)
|
|
return -ENOMEM;
|
|
|
|
free_and_replace(entries[i].show_title, s);
|
|
}
|
|
|
|
if (!find_nonunique(entries, n_entries, arr))
|
|
return 0;
|
|
|
|
/* Add machine-id to non-unique titles */
|
|
for (size_t i = 0; i < n_entries; i++)
|
|
if (arr[i] && entries[i].machine_id) {
|
|
if (asprintf(&s, "%s (%s)", boot_entry_title(entries + i), entries[i].machine_id) < 0)
|
|
return -ENOMEM;
|
|
|
|
free_and_replace(entries[i].show_title, s);
|
|
}
|
|
|
|
if (!find_nonunique(entries, n_entries, arr))
|
|
return 0;
|
|
|
|
/* Add file name to non-unique titles */
|
|
for (size_t i = 0; i < n_entries; i++)
|
|
if (arr[i]) {
|
|
if (asprintf(&s, "%s (%s)", boot_entry_title(entries + i), entries[i].id) < 0)
|
|
return -ENOMEM;
|
|
|
|
free_and_replace(entries[i].show_title, s);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int boot_config_find(const BootConfig *config, const char *id) {
|
|
assert(config);
|
|
|
|
if (!id)
|
|
return -1;
|
|
|
|
if (id[0] == '@') {
|
|
if (!strcaseeq(id, "@saved"))
|
|
return -1;
|
|
if (!config->entry_selected)
|
|
return -1;
|
|
id = config->entry_selected;
|
|
}
|
|
|
|
for (size_t i = 0; i < config->n_entries; i++)
|
|
if (fnmatch(id, config->entries[i].id, FNM_CASEFOLD) == 0)
|
|
return i;
|
|
|
|
return -1;
|
|
}
|
|
|
|
static int boot_entries_select_default(const BootConfig *config) {
|
|
int i;
|
|
|
|
assert(config);
|
|
assert(config->entries || config->n_entries == 0);
|
|
|
|
if (config->n_entries == 0) {
|
|
log_debug("Found no default boot entry :(");
|
|
return -1; /* -1 means "no default" */
|
|
}
|
|
|
|
if (config->entry_oneshot) {
|
|
i = boot_config_find(config, config->entry_oneshot);
|
|
if (i >= 0) {
|
|
log_debug("Found default: id \"%s\" is matched by LoaderEntryOneShot",
|
|
config->entries[i].id);
|
|
return i;
|
|
}
|
|
}
|
|
|
|
if (config->entry_default) {
|
|
i = boot_config_find(config, config->entry_default);
|
|
if (i >= 0) {
|
|
log_debug("Found default: id \"%s\" is matched by LoaderEntryDefault",
|
|
config->entries[i].id);
|
|
return i;
|
|
}
|
|
}
|
|
|
|
if (config->default_pattern) {
|
|
i = boot_config_find(config, config->default_pattern);
|
|
if (i >= 0) {
|
|
log_debug("Found default: id \"%s\" is matched by pattern \"%s\"",
|
|
config->entries[i].id, config->default_pattern);
|
|
return i;
|
|
}
|
|
}
|
|
|
|
log_debug("Found default: first entry \"%s\"", config->entries[0].id);
|
|
return 0;
|
|
}
|
|
|
|
static int boot_entries_select_selected(const BootConfig *config) {
|
|
assert(config);
|
|
assert(config->entries || config->n_entries == 0);
|
|
|
|
if (!config->entry_selected || config->n_entries == 0)
|
|
return -1;
|
|
|
|
return boot_config_find(config, config->entry_selected);
|
|
}
|
|
|
|
static int boot_load_efi_entry_pointers(BootConfig *config, bool skip_efivars) {
|
|
int r;
|
|
|
|
assert(config);
|
|
|
|
if (skip_efivars || !is_efi_boot())
|
|
return 0;
|
|
|
|
/* Loads the three "pointers" to boot loader entries from their EFI variables */
|
|
|
|
r = efi_get_variable_string(EFI_LOADER_VARIABLE_STR("LoaderEntryOneShot"), &config->entry_oneshot);
|
|
if (r == -ENOMEM)
|
|
return log_oom();
|
|
if (r < 0 && !IN_SET(r, -ENOENT, -ENODATA))
|
|
log_warning_errno(r, "Failed to read EFI variable \"LoaderEntryOneShot\", ignoring: %m");
|
|
|
|
r = efi_get_variable_string(EFI_LOADER_VARIABLE_STR("LoaderEntryDefault"), &config->entry_default);
|
|
if (r == -ENOMEM)
|
|
return log_oom();
|
|
if (r < 0 && !IN_SET(r, -ENOENT, -ENODATA))
|
|
log_warning_errno(r, "Failed to read EFI variable \"LoaderEntryDefault\", ignoring: %m");
|
|
|
|
r = efi_get_variable_string(EFI_LOADER_VARIABLE_STR("LoaderEntrySelected"), &config->entry_selected);
|
|
if (r == -ENOMEM)
|
|
return log_oom();
|
|
if (r < 0 && !IN_SET(r, -ENOENT, -ENODATA))
|
|
log_warning_errno(r, "Failed to read EFI variable \"LoaderEntrySelected\", ignoring: %m");
|
|
|
|
r = efi_get_variable_string(EFI_LOADER_VARIABLE_STR("LoaderEntrySysFail"), &config->entry_sysfail);
|
|
if (r == -ENOMEM)
|
|
return log_oom();
|
|
if (r < 0 && !IN_SET(r, -ENOENT, -ENODATA))
|
|
log_warning_errno(r, "Failed to read EFI variable \"LoaderEntrySysFail\", ignoring: %m");
|
|
|
|
return 1;
|
|
}
|
|
|
|
int boot_config_select_special_entries(BootConfig *config, bool skip_efivars) {
|
|
int r;
|
|
|
|
assert(config);
|
|
|
|
r = boot_load_efi_entry_pointers(config, skip_efivars);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
config->default_entry = boot_entries_select_default(config);
|
|
config->selected_entry = boot_entries_select_selected(config);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int boot_config_finalize(BootConfig *config) {
|
|
int r;
|
|
|
|
typesafe_qsort(config->entries, config->n_entries, boot_entry_compare);
|
|
|
|
r = boot_entries_uniquify(config->entries, config->n_entries);
|
|
if (r < 0)
|
|
return log_error_errno(r, "Failed to uniquify boot entries: %m");
|
|
|
|
return 0;
|
|
}
|
|
|
|
int boot_config_load(
|
|
BootConfig *config,
|
|
const char *esp_path,
|
|
const char *xbootldr_path) {
|
|
|
|
int r;
|
|
|
|
assert(config);
|
|
|
|
if (esp_path) {
|
|
r = boot_loader_read_conf_path(config, esp_path, "/loader/loader.conf");
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = boot_entries_find_type1(config, esp_path, BOOT_ENTRY_ESP, "/loader/entries");
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = boot_entries_find_unified(config, esp_path, BOOT_ENTRY_ESP, "/EFI/Linux/");
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = boot_entries_find_unified_global_addons(config, esp_path, "/loader/addons/",
|
|
&config->global_addons[BOOT_ENTRY_ESP]);
|
|
if (r < 0)
|
|
return r;
|
|
}
|
|
|
|
if (xbootldr_path) {
|
|
r = boot_entries_find_type1(config, xbootldr_path, BOOT_ENTRY_XBOOTLDR, "/loader/entries");
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = boot_entries_find_unified(config, xbootldr_path, BOOT_ENTRY_XBOOTLDR, "/EFI/Linux/");
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = boot_entries_find_unified_global_addons(config, xbootldr_path, "/loader/addons/",
|
|
&config->global_addons[BOOT_ENTRY_XBOOTLDR]);
|
|
if (r < 0)
|
|
return r;
|
|
}
|
|
|
|
return boot_config_finalize(config);
|
|
}
|
|
|
|
int boot_config_load_auto(
|
|
BootConfig *config,
|
|
const char *override_esp_path,
|
|
const char *override_xbootldr_path) {
|
|
|
|
_cleanup_free_ char *esp_where = NULL, *xbootldr_where = NULL;
|
|
dev_t esp_devid = 0, xbootldr_devid = 0;
|
|
int r;
|
|
|
|
assert(config);
|
|
|
|
/* This function is similar to boot_entries_load_config(), however we automatically search for the
|
|
* ESP and the XBOOTLDR partition unless it is explicitly specified. Also, if the user did not pass
|
|
* an ESP or XBOOTLDR path directly, let's see if /run/boot-loader-entries/ exists. If so, let's
|
|
* read data from there, as if it was an ESP (i.e. loading both entries and loader.conf data from
|
|
* it). This allows other boot loaders to pass boot loader entry information to our tools if they
|
|
* want to. */
|
|
|
|
if (!override_esp_path && !override_xbootldr_path) {
|
|
if (access("/run/boot-loader-entries/", F_OK) >= 0)
|
|
return boot_config_load(config, "/run/boot-loader-entries/", NULL);
|
|
|
|
if (errno != ENOENT)
|
|
return log_error_errno(errno,
|
|
"Failed to determine whether /run/boot-loader-entries/ exists: %m");
|
|
}
|
|
|
|
r = find_esp_and_warn(NULL, override_esp_path, /* unprivileged_mode= */ false, &esp_where, NULL, NULL, NULL, NULL, &esp_devid);
|
|
if (r < 0) /* we don't log about ENOKEY here, but propagate it, leaving it to the caller to log */
|
|
return r;
|
|
|
|
r = find_xbootldr_and_warn(NULL, override_xbootldr_path, /* unprivileged_mode= */ false, &xbootldr_where, NULL, &xbootldr_devid);
|
|
if (r < 0 && r != -ENOKEY)
|
|
return r; /* It's fine if the XBOOTLDR partition doesn't exist, hence we ignore ENOKEY here */
|
|
|
|
/* If both paths actually refer to the same inode, suppress the xbootldr path */
|
|
if (esp_where && xbootldr_where && devnum_set_and_equal(esp_devid, xbootldr_devid))
|
|
xbootldr_where = mfree(xbootldr_where);
|
|
|
|
return boot_config_load(config, esp_where, xbootldr_where);
|
|
}
|
|
|
|
int boot_config_augment_from_loader(
|
|
BootConfig *config,
|
|
char **found_by_loader,
|
|
bool auto_only) {
|
|
|
|
static const BootEntryAddons no_addons = (BootEntryAddons) {};
|
|
static const char *const title_table[] = {
|
|
/* Pretty names for a few well-known automatically discovered entries. */
|
|
"auto-osx", "macOS",
|
|
"auto-windows", "Windows Boot Manager",
|
|
"auto-efi-shell", "EFI Shell",
|
|
"auto-efi-default", "EFI Default Loader",
|
|
"auto-poweroff", "Power Off The System",
|
|
"auto-reboot", "Reboot The System",
|
|
"auto-reboot-to-firmware-setup", "Reboot Into Firmware Interface",
|
|
NULL,
|
|
};
|
|
|
|
assert(config);
|
|
|
|
/* Let's add the entries discovered by the boot loader to the end of our list, unless they are
|
|
* already included there. */
|
|
|
|
STRV_FOREACH(i, found_by_loader) {
|
|
BootEntry *existing;
|
|
_cleanup_free_ char *c = NULL, *t = NULL, *p = NULL;
|
|
|
|
existing = boot_config_find_entry(config, *i);
|
|
if (existing) {
|
|
existing->reported_by_loader = true;
|
|
continue;
|
|
}
|
|
|
|
if (auto_only && !startswith(*i, "auto-"))
|
|
continue;
|
|
|
|
c = strdup(*i);
|
|
if (!c)
|
|
return log_oom();
|
|
|
|
STRV_FOREACH_PAIR(a, b, title_table)
|
|
if (streq(*a, *i)) {
|
|
t = strdup(*b);
|
|
if (!t)
|
|
return log_oom();
|
|
break;
|
|
}
|
|
|
|
p = strdup(EFIVAR_PATH(EFI_LOADER_VARIABLE_STR("LoaderEntries")));
|
|
if (!p)
|
|
return log_oom();
|
|
|
|
if (!GREEDY_REALLOC0(config->entries, config->n_entries + 1))
|
|
return log_oom();
|
|
|
|
config->entries[config->n_entries++] = (BootEntry) {
|
|
.type = startswith(*i, "auto-") ? BOOT_ENTRY_AUTO : BOOT_ENTRY_LOADER,
|
|
.id = TAKE_PTR(c),
|
|
.title = TAKE_PTR(t),
|
|
.path = TAKE_PTR(p),
|
|
.reported_by_loader = true,
|
|
.tries_left = UINT_MAX,
|
|
.tries_done = UINT_MAX,
|
|
.profile = UINT_MAX,
|
|
.global_addons = &no_addons,
|
|
};
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
BootEntry* boot_config_find_entry(BootConfig *config, const char *id) {
|
|
assert(config);
|
|
assert(id);
|
|
|
|
for (size_t j = 0; j < config->n_entries; j++)
|
|
if (strcaseeq_ptr(config->entries[j].id, id) ||
|
|
strcaseeq_ptr(config->entries[j].id_old, id))
|
|
return config->entries + j;
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static void boot_entry_file_list(
|
|
const char *field,
|
|
const char *root,
|
|
const char *p,
|
|
int *ret_status) {
|
|
|
|
assert(p);
|
|
assert(ret_status);
|
|
|
|
int status = chase_and_access(p, root, CHASE_PREFIX_ROOT|CHASE_PROHIBIT_SYMLINKS, F_OK, NULL);
|
|
|
|
/* Note that this shows two '/' between the root and the file. This is intentional to highlight (in
|
|
* the absence of color support) to the user that the boot loader is only interested in the second
|
|
* part of the file. */
|
|
printf("%13s%s %s%s/%s", strempty(field), field ? ":" : " ", ansi_grey(), root, ansi_normal());
|
|
|
|
if (status < 0) {
|
|
errno = -status;
|
|
printf("%s%s%s (%m)\n", ansi_highlight_red(), p, ansi_normal());
|
|
} else
|
|
printf("%s\n", p);
|
|
|
|
if (*ret_status == 0 && status < 0)
|
|
*ret_status = status;
|
|
}
|
|
|
|
static void print_addon(
|
|
BootEntryAddon *addon,
|
|
const char *addon_str) {
|
|
|
|
printf(" %s: %s\n", addon_str, addon->location);
|
|
printf(" options: %s%s\n", glyph(GLYPH_TREE_RIGHT), addon->cmdline);
|
|
}
|
|
|
|
static int indent_embedded_newlines(char *cmdline, char **ret_cmdline) {
|
|
_cleanup_free_ char *t = NULL;
|
|
_cleanup_strv_free_ char **ts = NULL;
|
|
|
|
assert(ret_cmdline);
|
|
|
|
ts = strv_split_newlines(cmdline);
|
|
if (!ts)
|
|
return -ENOMEM;
|
|
|
|
t = strv_join(ts, "\n ");
|
|
if (!t)
|
|
return -ENOMEM;
|
|
|
|
*ret_cmdline = TAKE_PTR(t);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int print_cmdline(const BootEntry *e) {
|
|
|
|
_cleanup_free_ char *options = NULL, *combined_cmdline = NULL, *t2 = NULL;
|
|
|
|
assert(e);
|
|
|
|
if (!strv_isempty(e->options)) {
|
|
_cleanup_free_ char *t = NULL;
|
|
|
|
options = strv_join(e->options, " ");
|
|
if (!options)
|
|
return log_oom();
|
|
|
|
if (indent_embedded_newlines(options, &t) < 0)
|
|
return log_oom();
|
|
|
|
printf(" options: %s\n", t);
|
|
t2 = strdup(options);
|
|
if (!t2)
|
|
return log_oom();
|
|
}
|
|
|
|
FOREACH_ARRAY(addon, e->global_addons->items, e->global_addons->n_items) {
|
|
print_addon(addon, "global-addon");
|
|
if (!strextend(&t2, " ", addon->cmdline))
|
|
return log_oom();
|
|
}
|
|
|
|
FOREACH_ARRAY(addon, e->local_addons.items, e->local_addons.n_items) {
|
|
/* Add space at the beginning of addon_str to align it correctly */
|
|
print_addon(addon, " local-addon");
|
|
if (!strextend(&t2, " ", addon->cmdline))
|
|
return log_oom();
|
|
}
|
|
|
|
/* Don't print the combined cmdline if it's same as options. */
|
|
if (streq_ptr(t2, options))
|
|
return 0;
|
|
|
|
if (indent_embedded_newlines(t2, &combined_cmdline) < 0)
|
|
return log_oom();
|
|
|
|
if (combined_cmdline)
|
|
printf(" cmdline: %s\n", combined_cmdline);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int json_addon(
|
|
BootEntryAddon *addon,
|
|
const char *addon_str,
|
|
sd_json_variant **array) {
|
|
|
|
int r;
|
|
|
|
assert(addon);
|
|
assert(addon_str);
|
|
|
|
r = sd_json_variant_append_arraybo(
|
|
array,
|
|
SD_JSON_BUILD_PAIR(addon_str, SD_JSON_BUILD_STRING(addon->location)),
|
|
SD_JSON_BUILD_PAIR("options", SD_JSON_BUILD_STRING(addon->cmdline)));
|
|
if (r < 0)
|
|
return log_oom();
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int json_cmdline(
|
|
const BootEntry *e,
|
|
const char *def_cmdline,
|
|
sd_json_variant **v) {
|
|
|
|
_cleanup_free_ char *combined_cmdline = NULL;
|
|
_cleanup_(sd_json_variant_unrefp) sd_json_variant *addons_array = NULL;
|
|
int r;
|
|
|
|
assert(e);
|
|
|
|
if (def_cmdline) {
|
|
combined_cmdline = strdup(def_cmdline);
|
|
if (!combined_cmdline)
|
|
return log_oom();
|
|
}
|
|
|
|
FOREACH_ARRAY(addon, e->global_addons->items, e->global_addons->n_items) {
|
|
r = json_addon(addon, "globalAddon", &addons_array);
|
|
if (r < 0)
|
|
return r;
|
|
if (!strextend(&combined_cmdline, " ", addon->cmdline))
|
|
return log_oom();
|
|
}
|
|
|
|
FOREACH_ARRAY(addon, e->local_addons.items, e->local_addons.n_items) {
|
|
r = json_addon(addon, "localAddon", &addons_array);
|
|
if (r < 0)
|
|
return r;
|
|
if (!strextend(&combined_cmdline, " ", addon->cmdline))
|
|
return log_oom();
|
|
}
|
|
|
|
r = sd_json_variant_merge_objectbo(
|
|
v,
|
|
SD_JSON_BUILD_PAIR("addons", SD_JSON_BUILD_VARIANT(addons_array)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(!!combined_cmdline, "cmdline", SD_JSON_BUILD_STRING(combined_cmdline)));
|
|
if (r < 0)
|
|
return log_oom();
|
|
return 0;
|
|
}
|
|
|
|
int show_boot_entry(
|
|
const BootEntry *e,
|
|
bool show_as_default,
|
|
bool show_as_selected,
|
|
bool show_reported) {
|
|
|
|
int status = 0, r = 0;
|
|
|
|
/* Returns 0 on success, negative on processing error, and positive if something is wrong with the
|
|
boot entry itself. */
|
|
|
|
assert(e);
|
|
|
|
printf(" type: %s\n",
|
|
boot_entry_type_description_to_string(e->type));
|
|
|
|
printf(" title: %s%s%s",
|
|
ansi_highlight(), boot_entry_title(e), ansi_normal());
|
|
|
|
if (show_as_default)
|
|
printf(" %s(default)%s",
|
|
ansi_highlight_green(), ansi_normal());
|
|
|
|
if (show_as_selected)
|
|
printf(" %s(selected)%s",
|
|
ansi_highlight_magenta(), ansi_normal());
|
|
|
|
if (show_reported) {
|
|
if (e->type == BOOT_ENTRY_LOADER)
|
|
printf(" %s(reported/absent)%s",
|
|
ansi_highlight_red(), ansi_normal());
|
|
else if (!e->reported_by_loader && e->type != BOOT_ENTRY_AUTO)
|
|
printf(" %s(not reported/new)%s",
|
|
ansi_highlight_green(), ansi_normal());
|
|
}
|
|
|
|
putchar('\n');
|
|
|
|
if (e->id) {
|
|
printf(" id: %s", e->id);
|
|
|
|
if (e->id_without_profile && !streq_ptr(e->id, e->id_without_profile))
|
|
printf(" (without profile: %s)\n", e->id_without_profile);
|
|
else
|
|
putchar('\n');
|
|
}
|
|
if (e->path) {
|
|
_cleanup_free_ char *text = NULL, *link = NULL;
|
|
|
|
const char *p = e->root ? path_startswith(e->path, e->root) : NULL;
|
|
if (p) {
|
|
text = strjoin(ansi_grey(), e->root, "/", ansi_normal(), "/", p);
|
|
if (!text)
|
|
return log_oom();
|
|
}
|
|
|
|
/* Let's urlify the link to make it easy to view in an editor, but only if it is a text
|
|
* file. Unified images are binary ELFs, and EFI variables are not pure text either. */
|
|
if (e->type == BOOT_ENTRY_TYPE1)
|
|
(void) terminal_urlify_path(e->path, text, &link);
|
|
|
|
printf(" source: %s (on the %s)\n",
|
|
link ?: text ?: e->path,
|
|
boot_entry_source_description_to_string(e->source));
|
|
}
|
|
if (e->tries_left != UINT_MAX) {
|
|
printf(" tries: %u left", e->tries_left);
|
|
|
|
if (e->tries_done != UINT_MAX)
|
|
printf("; %u done\n", e->tries_done);
|
|
else
|
|
putchar('\n');
|
|
}
|
|
|
|
if (e->sort_key)
|
|
printf(" sort-key: %s\n", e->sort_key);
|
|
if (e->version)
|
|
printf(" version: %s\n", e->version);
|
|
if (e->machine_id)
|
|
printf(" machine-id: %s\n", e->machine_id);
|
|
if (e->architecture)
|
|
printf(" architecture: %s\n", e->architecture);
|
|
if (e->kernel)
|
|
boot_entry_file_list("linux", e->root, e->kernel, &status);
|
|
if (e->efi)
|
|
boot_entry_file_list("efi", e->root, e->efi, &status);
|
|
if (e->uki)
|
|
boot_entry_file_list("uki", e->root, e->uki, &status);
|
|
if (e->uki_url)
|
|
printf(" uki-url: %s\n", e->uki_url);
|
|
if (e->profile != UINT_MAX)
|
|
printf(" profile: %u\n", e->profile);
|
|
|
|
STRV_FOREACH(s, e->initrd)
|
|
boot_entry_file_list(s == e->initrd ? "initrd" : NULL,
|
|
e->root,
|
|
*s,
|
|
&status);
|
|
|
|
r = print_cmdline(e);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (e->device_tree)
|
|
boot_entry_file_list("devicetree", e->root, e->device_tree, &status);
|
|
|
|
STRV_FOREACH(s, e->device_tree_overlay)
|
|
boot_entry_file_list(s == e->device_tree_overlay ? "devicetree-overlay" : NULL,
|
|
e->root,
|
|
*s,
|
|
&status);
|
|
|
|
return -status;
|
|
}
|
|
|
|
int boot_entry_to_json(const BootConfig *c, size_t i, sd_json_variant **ret) {
|
|
_cleanup_(sd_json_variant_unrefp) sd_json_variant *v = NULL;
|
|
_cleanup_free_ char *opts = NULL;
|
|
const BootEntry *e;
|
|
int r;
|
|
|
|
assert(c);
|
|
assert(ret);
|
|
|
|
if (i >= c->n_entries) {
|
|
*ret = NULL;
|
|
return 0;
|
|
}
|
|
|
|
e = c->entries + i;
|
|
|
|
if (!strv_isempty(e->options)) {
|
|
opts = strv_join(e->options, " ");
|
|
if (!opts)
|
|
return log_oom();
|
|
}
|
|
|
|
r = sd_json_variant_merge_objectbo(
|
|
&v,
|
|
SD_JSON_BUILD_PAIR("type", SD_JSON_BUILD_STRING(boot_entry_type_to_string(e->type))),
|
|
SD_JSON_BUILD_PAIR("source", SD_JSON_BUILD_STRING(boot_entry_source_to_string(e->source))),
|
|
SD_JSON_BUILD_PAIR_CONDITION(!!e->id, "id", SD_JSON_BUILD_STRING(e->id)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(!!e->path, "path", SD_JSON_BUILD_STRING(e->path)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(!!e->root, "root", SD_JSON_BUILD_STRING(e->root)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(!!e->title, "title", SD_JSON_BUILD_STRING(e->title)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(!!boot_entry_title(e), "showTitle", SD_JSON_BUILD_STRING(boot_entry_title(e))),
|
|
SD_JSON_BUILD_PAIR_CONDITION(!!e->sort_key, "sortKey", SD_JSON_BUILD_STRING(e->sort_key)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(!!e->version, "version", SD_JSON_BUILD_STRING(e->version)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(!!e->machine_id, "machineId", SD_JSON_BUILD_STRING(e->machine_id)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(!!e->architecture, "architecture", SD_JSON_BUILD_STRING(e->architecture)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(!!opts, "options", SD_JSON_BUILD_STRING(opts)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(!!e->kernel, "linux", SD_JSON_BUILD_STRING(e->kernel)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(!!e->efi, "efi", SD_JSON_BUILD_STRING(e->efi)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(!!e->uki, "uki", SD_JSON_BUILD_STRING(e->uki)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(!!e->uki_url, "ukiUrl", SD_JSON_BUILD_STRING(e->uki_url)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(e->profile != UINT_MAX, "profile", SD_JSON_BUILD_UNSIGNED(e->profile)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(!strv_isempty(e->initrd), "initrd", SD_JSON_BUILD_STRV(e->initrd)));
|
|
if (r < 0)
|
|
return log_oom();
|
|
|
|
/* Sanitizers (only memory sanitizer?) do not like function call with too many
|
|
* arguments and trigger false positive warnings. Let's not add too many json objects
|
|
* at once. */
|
|
r = sd_json_variant_merge_objectbo(
|
|
&v,
|
|
SD_JSON_BUILD_PAIR_CONDITION(!!e->device_tree, "devicetree", SD_JSON_BUILD_STRING(e->device_tree)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(!strv_isempty(e->device_tree_overlay), "devicetreeOverlay", SD_JSON_BUILD_STRV(e->device_tree_overlay)),
|
|
SD_JSON_BUILD_PAIR("isReported", SD_JSON_BUILD_BOOLEAN(e->reported_by_loader)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(e->tries_left != UINT_MAX, "triesLeft", SD_JSON_BUILD_UNSIGNED(e->tries_left)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(e->tries_done != UINT_MAX, "triesDone", SD_JSON_BUILD_UNSIGNED(e->tries_done)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(c->default_entry >= 0, "isDefault", SD_JSON_BUILD_BOOLEAN(i == (size_t) c->default_entry)),
|
|
SD_JSON_BUILD_PAIR_CONDITION(c->selected_entry >= 0, "isSelected", SD_JSON_BUILD_BOOLEAN(i == (size_t) c->selected_entry)));
|
|
if (r < 0)
|
|
return log_oom();
|
|
|
|
r = json_cmdline(e, opts, &v);
|
|
if (r < 0)
|
|
return log_oom();
|
|
|
|
*ret = TAKE_PTR(v);
|
|
return 1;
|
|
}
|
|
|
|
int show_boot_entries(const BootConfig *config, sd_json_format_flags_t json_format) {
|
|
int r;
|
|
|
|
assert(config);
|
|
|
|
if (sd_json_format_enabled(json_format)) {
|
|
_cleanup_(sd_json_variant_unrefp) sd_json_variant *array = NULL;
|
|
|
|
for (size_t i = 0; i < config->n_entries; i++) {
|
|
_cleanup_(sd_json_variant_unrefp) sd_json_variant *v = NULL;
|
|
|
|
r = boot_entry_to_json(config, i, &v);
|
|
if (r < 0)
|
|
return log_oom();
|
|
|
|
r = sd_json_variant_append_array(&array, v);
|
|
if (r < 0)
|
|
return log_oom();
|
|
}
|
|
|
|
return sd_json_variant_dump(array, json_format | SD_JSON_FORMAT_EMPTY_ARRAY, NULL, NULL);
|
|
} else
|
|
for (size_t n = 0; n < config->n_entries; n++) {
|
|
r = show_boot_entry(
|
|
config->entries + n,
|
|
/* show_as_default= */ n == (size_t) config->default_entry,
|
|
/* show_as_selected= */ n == (size_t) config->selected_entry,
|
|
/* show_reported= */ true);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (n+1 < config->n_entries)
|
|
putchar('\n');
|
|
}
|
|
|
|
return 0;
|
|
}
|