patches and low-level development discussion
 help / color / mirror / code / Atom feed
blob 07eb059f2718e1ad8ab087fe6509c1437ea3e96c 3902 bytes (raw)
name: tools/updates-dir-check.c 	 # note: path name is non-authoritative(*)

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
 
// SPDX-License-Identifier: EUPL-1.2+
// SPDX-FileCopyrightText: 2025 Demi Marie Obenour <demiobenour@gmail.com>
#include <assert.h>
#include <errno.h>
#include <stddef.h>
#include <stdlib.h>
#include <string.h>

#include <fcntl.h>
#include <sys/types.h>
#include <dirent.h>
#include <unistd.h>

#include <err.h>

[[noreturn]] static void bad_char(char c, char *msg_component)
{
	if (c >= 0x20 && c <= 0x7E)
		errx(EXIT_FAILURE, "Forbidden %s character in filename: '%c'",
		     msg_component, (int)c);
	errx(EXIT_FAILURE,
	     "Forbidden %s character in filename: byte %d",
	     msg_component, (int)(unsigned char)c);
}

[[noreturn]] static void usage(void)
{
	errx(EXIT_FAILURE, "Usage: updates-dir-check [cleanup|check] DIRECTORIES...");
}

static void checkdir(int fd, bool check_sig)
{
	bool found_sig = false;
	DIR *d = fdopendir(fd);
	if (d == NULL)
		err(EXIT_FAILURE, "fdopendir");
	// If there is an I/O error while there are dirty pages outstanding,
	// the dirty pages are silently discarded.  This means that the contents
	// of the filesystem can change behind userspace's back.  Flush all
	// dirty pages in the filesystem with the directory to prevent this.
	if (syncfs(fd) != 0)
		err(EXIT_FAILURE, "syncfs");
	bool changed = false;
	for (;;) {
		errno = 0;
		struct dirent *entry = readdir(d);
		if (entry == NULL) {
			if (errno)
				err(EXIT_FAILURE, "readdir");
			break;
		}
		const char *ptr = entry->d_name;
		if (ptr[0] == '.') {
			if (ptr[1] == '\0')
				continue;
			if (ptr[1] == '.' && ptr[2] == '\0')
				continue;
			// systemd-sysupdate uses these for temporary files.
			// It normally cleans them up itself, but if there is an error
			// it does not always clean them up.  I'm not sure if it is
			// guaranteed to clean up temporary files from a past run, so
			// delete them instead of returning an error.
			if (unlinkat(fd, ptr, 0))
				err(EXIT_FAILURE, "Failed to unlink temporary file");
			changed = true;
			continue;
		}
		char c = ptr[0];
		if (!((c >= 'A' && c <= 'Z') ||
		      (c >= 'a' && c <= 'z')))
			bad_char(c, "initial");
		while ((c = *++ptr)) {
			if (!((c >= 'A' && c <= 'Z') ||
			      (c >= 'a' && c <= 'z') ||
			      (c >= '0' && c <= '9') ||
			      (c == '_') ||
			      (c == '-') ||
			      (c == '.')))
				bad_char(c, "subsequent");
		}
		// Empty filenames are rejected as having a bad initial character,
		// and POSIX forbids them from being returned anyway.  Therefore,
		// this cannot be out of bounds.
		if (ptr[-1] == '.')
			errx(EXIT_FAILURE, "Filename %s ends with a '.'", entry->d_name);
		if (entry->d_type == DT_UNKNOWN)
			errx(EXIT_FAILURE, "Filesystem didn't report type of file %s", entry->d_name);
		if (entry->d_type != DT_REG)
			errx(EXIT_FAILURE, "Entry contains non-regular file %s", entry->d_name);
		if (strncmp(entry->d_name, "SHA256SUMS.", sizeof("SHA256SUMS.") - 1) == 0) {
			// Found a signature file!
			if (check_sig)
				found_sig = true;
			else {
				if (unlinkat(fd, entry->d_name, 0))
					err(EXIT_FAILURE, "Unlinking old signature file");
				changed = true;
			}
		}
	}
	// fsync() the directory if it was changed, to avoid the above
	// cache-incoherency problem.
	if (changed && fsync(fd))
		errx(EXIT_FAILURE, "fsync");
	if (check_sig && !found_sig) {
		warnx("sys.appvm-systemd-sysupdate didn't send a signature file.");
		warnx("There was probably a problem downloading the update.");
		errx(EXIT_FAILURE, "Check its logs for more information.");
	}
	closedir(d);
}

int main(int argc, char **argv)
{
	if (argc != 3)
		usage();

	bool check_sig;
	if (strcmp(argv[1], "cleanup") == 0)
		check_sig = false;
	else if (strcmp(argv[1], "check") == 0)
		check_sig = true;
	else
		usage();

	for (int i = 2; i < argc; ++i) {
		int fd = open(argv[i], O_DIRECTORY|O_RDONLY|O_CLOEXEC);
		if (fd < 0)
			err(EXIT_FAILURE, "open(%s)", argv[i]);
		checkdir(fd, check_sig);
	}
	return 0;
}

debug log:

solving 07eb059f2718e1ad8ab087fe6509c1437ea3e96c ...
found 07eb059f2718e1ad8ab087fe6509c1437ea3e96c in https://inbox.spectrum-os.org/spectrum-devel/20251119-updates-v3-3-b88a99915509@gmail.com/

applying [1/1] https://inbox.spectrum-os.org/spectrum-devel/20251119-updates-v3-3-b88a99915509@gmail.com/
diff --git a/tools/updates-dir-check.c b/tools/updates-dir-check.c
new file mode 100644
index 0000000000000000000000000000000000000000..07eb059f2718e1ad8ab087fe6509c1437ea3e96c

Checking patch tools/updates-dir-check.c...
Applied patch tools/updates-dir-check.c cleanly.

index at:
100644 07eb059f2718e1ad8ab087fe6509c1437ea3e96c	tools/updates-dir-check.c

(*) Git path names are given by the tree(s) the blob belongs to.
    Blobs themselves have no identifier aside from the hash of its contents.^

Code repositories for project(s) associated with this public inbox

	https://spectrum-os.org/git/crosvm
	https://spectrum-os.org/git/doc
	https://spectrum-os.org/git/mktuntap
	https://spectrum-os.org/git/nixpkgs
	https://spectrum-os.org/git/spectrum
	https://spectrum-os.org/git/ucspi-vsock
	https://spectrum-os.org/git/www

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).