• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

systemd / systemd / 14766779411

30 Apr 2025 04:55PM UTC coverage: 72.225% (-0.06%) from 72.282%
14766779411

push

github

web-flow
wait-online: handle varlink connection errors while waiting for DNS (#37283)

Currently, if systemd-networkd-wait-online is started with --dns, and
systemd-resolved is not running, it will exit with an error right away.
Similarly, if systemd-resolved is restarted while waiting for DNS
configuration, systemd-networkd-wait-online will not attempt to
re-connect, and will potentially never see subsequent DNS
configurations.

Improve this by adding socket units for the systemd-resolved varlink
servers, and re-establish the connection in systemd-networkd-wait-online
when we receive `SD_VARLINK_ERROR_DISCONNECTED`.

8 of 16 new or added lines in 2 files covered. (50.0%)

5825 existing lines in 217 files now uncovered.

297168 of 411450 relevant lines covered (72.22%)

695892.62 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

51.38
/src/core/dbus-execute.c
1
/* SPDX-License-Identifier: LGPL-2.1-or-later */
2

3
#include <sys/mount.h>
4
#include <sys/prctl.h>
5

6
#include "af-list.h"
7
#include "alloc-util.h"
8
#include "bus-get-properties.h"
9
#include "bus-unit-util.h"
10
#include "bus-util.h"
11
#include "cap-list.h"
12
#include "capability-util.h"
13
#include "cpu-set-util.h"
14
#include "creds-util.h"
15
#include "dbus-execute.h"
16
#include "dbus-util.h"
17
#include "env-util.h"
18
#include "errno-list.h"
19
#include "escape.h"
20
#include "exec-credential.h"
21
#include "execute.h"
22
#include "fd-util.h"
23
#include "fileio.h"
24
#include "hexdecoct.h"
25
#include "hostname-util.h"
26
#include "image-policy.h"
27
#include "ioprio-util.h"
28
#include "iovec-util.h"
29
#include "journal-file.h"
30
#include "load-fragment.h"
31
#include "memstream-util.h"
32
#include "mountpoint-util.h"
33
#include "namespace.h"
34
#include "parse-util.h"
35
#include "path-util.h"
36
#include "pcre2-util.h"
37
#include "process-util.h"
38
#include "rlimit-util.h"
39
#include "seccomp-util.h"
40
#include "securebits-util.h"
41
#include "specifier.h"
42
#include "stat-util.h"
43
#include "strv.h"
44
#include "syslog-util.h"
45
#include "unit-printf.h"
46
#include "user-util.h"
47
#include "utf8.h"
48

49
BUS_DEFINE_PROPERTY_GET_ENUM(bus_property_get_exec_output, exec_output, ExecOutput);
2,640✔
50
static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_exec_input, exec_input, ExecInput);
1,303✔
51
static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_exec_utmp_mode, exec_utmp_mode, ExecUtmpMode);
1,303✔
52
BUS_DEFINE_PROPERTY_GET_ENUM(bus_property_get_exec_preserve_mode, exec_preserve_mode, ExecPreserveMode);
2,421✔
53
static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_exec_keyring_mode, exec_keyring_mode, ExecKeyringMode);
1,303✔
54
static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_protect_proc, protect_proc, ProtectProc);
1,303✔
55
static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_proc_subset, proc_subset, ProcSubset);
1,303✔
56
static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_protect_home, protect_home, ProtectHome);
1,303✔
57
static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_protect_system, protect_system, ProtectSystem);
1,303✔
58
static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_personality, personality, unsigned long);
1,303✔
UNCOV
59
static BUS_DEFINE_PROPERTY_GET(property_get_ioprio, "i", ExecContext, exec_context_get_effective_ioprio);
×
60
static BUS_DEFINE_PROPERTY_GET(property_get_mount_apivfs, "b", ExecContext, exec_context_get_effective_mount_apivfs);
1,303✔
61
static BUS_DEFINE_PROPERTY_GET(property_get_bind_log_sockets, "b", ExecContext, exec_context_get_effective_bind_log_sockets);
1,303✔
62
static BUS_DEFINE_PROPERTY_GET2(property_get_ioprio_class, "i", ExecContext, exec_context_get_effective_ioprio, ioprio_prio_class);
1,303✔
63
static BUS_DEFINE_PROPERTY_GET2(property_get_ioprio_priority, "i", ExecContext, exec_context_get_effective_ioprio, ioprio_prio_data);
1,303✔
UNCOV
64
static BUS_DEFINE_PROPERTY_GET_GLOBAL(property_get_empty_string, "s", NULL);
×
65
static BUS_DEFINE_PROPERTY_GET_REF(property_get_private_tmp_ex, "s", PrivateTmp, private_tmp_to_string);
1,303✔
66
static BUS_DEFINE_PROPERTY_GET_REF(property_get_private_users_ex, "s", PrivateUsers, private_users_to_string);
1,303✔
67
static BUS_DEFINE_PROPERTY_GET_REF(property_get_protect_control_groups_ex, "s", ProtectControlGroups, protect_control_groups_to_string);
1,303✔
68
static BUS_DEFINE_PROPERTY_GET_REF(property_get_private_pids, "s", PrivatePIDs, private_pids_to_string);
1,303✔
69
static BUS_DEFINE_PROPERTY_GET_REF(property_get_syslog_level, "i", int, LOG_PRI);
1,303✔
70
static BUS_DEFINE_PROPERTY_GET_REF(property_get_syslog_facility, "i", int, LOG_FAC);
1,303✔
71
static BUS_DEFINE_PROPERTY_GET(property_get_cpu_affinity_from_numa, "b", ExecContext, exec_context_get_cpu_affinity_from_numa);
1,303✔
72
static BUS_DEFINE_PROPERTY_GET(property_get_oom_score_adjust, "i", ExecContext, exec_context_get_oom_score_adjust);
1,303✔
73
static BUS_DEFINE_PROPERTY_GET(property_get_nice, "i", ExecContext, exec_context_get_nice);
1,303✔
74
static BUS_DEFINE_PROPERTY_GET(property_get_cpu_sched_policy, "i", ExecContext, exec_context_get_cpu_sched_policy);
1,303✔
75
static BUS_DEFINE_PROPERTY_GET(property_get_cpu_sched_priority, "i", ExecContext, exec_context_get_cpu_sched_priority);
1,303✔
76
static BUS_DEFINE_PROPERTY_GET(property_get_coredump_filter, "t", ExecContext, exec_context_get_coredump_filter);
1,303✔
77
static BUS_DEFINE_PROPERTY_GET(property_get_timer_slack_nsec, "t", ExecContext, exec_context_get_timer_slack_nsec);
1,303✔
78
static BUS_DEFINE_PROPERTY_GET(property_get_set_login_environment, "b", ExecContext, exec_context_get_set_login_environment);
1,303✔
79

80
static int property_get_environment_files(
1,303✔
81
                sd_bus *bus,
82
                const char *path,
83
                const char *interface,
84
                const char *property,
85
                sd_bus_message *reply,
86
                void *userdata,
87
                sd_bus_error *error) {
88

89
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
90
        int r;
1,303✔
91

92
        assert(bus);
1,303✔
93
        assert(reply);
1,303✔
94

95
        r = sd_bus_message_open_container(reply, 'a', "(sb)");
1,303✔
96
        if (r < 0)
1,303✔
97
                return r;
98

99
        STRV_FOREACH(j, c->environment_files) {
1,313✔
100
                const char *fn = *j;
10✔
101

102
                r = sd_bus_message_append(reply, "(sb)", fn[0] == '-' ? fn + 1 : fn, fn[0] == '-');
10✔
103
                if (r < 0)
10✔
104
                        return r;
105
        }
106

107
        return sd_bus_message_close_container(reply);
1,303✔
108
}
109

110
static int property_get_cpu_affinity(
1,303✔
111
                sd_bus *bus,
112
                const char *path,
113
                const char *interface,
114
                const char *property,
115
                sd_bus_message *reply,
116
                void *userdata,
117
                sd_bus_error *error) {
118

119
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
UNCOV
120
        _cleanup_(cpu_set_reset) CPUSet s = {};
×
121
        _cleanup_free_ uint8_t *array = NULL;
1,303✔
122
        size_t allocated;
1,303✔
123

124
        assert(bus);
1,303✔
125
        assert(reply);
1,303✔
126

127
        if (c->cpu_affinity_from_numa) {
1,303✔
UNCOV
128
                int r;
×
129

130
                r = numa_to_cpu_set(&c->numa_policy, &s);
×
UNCOV
131
                if (r < 0)
×
132
                        return r;
133
        }
134

135
        (void) cpu_set_to_dbus(c->cpu_affinity_from_numa ? &s : &c->cpu_set,  &array, &allocated);
1,303✔
136

137
        return sd_bus_message_append_array(reply, 'y', array, allocated);
1,303✔
138
}
139

140
static int property_get_numa_mask(
1,303✔
141
                sd_bus *bus,
142
                const char *path,
143
                const char *interface,
144
                const char *property,
145
                sd_bus_message *reply,
146
                void *userdata,
147
                sd_bus_error *error) {
148

149
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
150
        _cleanup_free_ uint8_t *array = NULL;
1,303✔
151
        size_t allocated;
1,303✔
152

153
        assert(bus);
1,303✔
154
        assert(reply);
1,303✔
155

156
        (void) cpu_set_to_dbus(&c->numa_policy.nodes, &array, &allocated);
1,303✔
157

158
        return sd_bus_message_append_array(reply, 'y', array, allocated);
1,303✔
159
}
160

161
static int property_get_numa_policy(
1,303✔
162
                sd_bus *bus,
163
                const char *path,
164
                const char *interface,
165
                const char *property,
166
                sd_bus_message *reply,
167
                void *userdata,
168
                sd_bus_error *error) {
169
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
170
        int32_t policy;
1,303✔
171

172
        assert(bus);
1,303✔
173
        assert(reply);
1,303✔
174

175
        policy = numa_policy_get_type(&c->numa_policy);
1,303✔
176

177
        return sd_bus_message_append_basic(reply, 'i', &policy);
1,303✔
178
}
179

180
static int property_get_syscall_filter(
1,303✔
181
                sd_bus *bus,
182
                const char *path,
183
                const char *interface,
184
                const char *property,
185
                sd_bus_message *reply,
186
                void *userdata,
187
                sd_bus_error *error) {
188

189
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
190
        _cleanup_strv_free_ char **l = NULL;
1,303✔
191
        int r;
1,303✔
192

193
        assert(bus);
1,303✔
194
        assert(reply);
1,303✔
195

196
        r = sd_bus_message_open_container(reply, 'r', "bas");
1,303✔
197
        if (r < 0)
1,303✔
198
                return r;
199

200
        r = sd_bus_message_append(reply, "b", c->syscall_allow_list);
1,303✔
201
        if (r < 0)
1,303✔
202
                return r;
203

204
        l = exec_context_get_syscall_filter(c);
1,303✔
205
        if (!l)
1,303✔
206
                return -ENOMEM;
207

208
        r = sd_bus_message_append_strv(reply, l);
1,303✔
209
        if (r < 0)
1,303✔
210
                return r;
211

212
        return sd_bus_message_close_container(reply);
1,303✔
213
}
214

215
static int property_get_syscall_log(
1,303✔
216
                sd_bus *bus,
217
                const char *path,
218
                const char *interface,
219
                const char *property,
220
                sd_bus_message *reply,
221
                void *userdata,
222
                sd_bus_error *error) {
223

224
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
225
        _cleanup_strv_free_ char **l = NULL;
1,303✔
226
        int r;
1,303✔
227

228
        assert(bus);
1,303✔
229
        assert(reply);
1,303✔
230

231
        r = sd_bus_message_open_container(reply, 'r', "bas");
1,303✔
232
        if (r < 0)
1,303✔
233
                return r;
234

235
        r = sd_bus_message_append(reply, "b", c->syscall_log_allow_list);
1,303✔
236
        if (r < 0)
1,303✔
237
                return r;
238

239
        l = exec_context_get_syscall_log(c);
1,303✔
240
        if (!l)
1,303✔
241
                return -ENOMEM;
242

243
        r = sd_bus_message_append_strv(reply, l);
1,303✔
244
        if (r < 0)
1,303✔
245
                return r;
246

247
        return sd_bus_message_close_container(reply);
1,303✔
248
}
249

250
static int property_get_syscall_archs(
1,303✔
251
                sd_bus *bus,
252
                const char *path,
253
                const char *interface,
254
                const char *property,
255
                sd_bus_message *reply,
256
                void *userdata,
257
                sd_bus_error *error) {
258

259
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
260
        _cleanup_strv_free_ char **l = NULL;
1,303✔
261
        int r;
1,303✔
262

263
        assert(bus);
1,303✔
264
        assert(reply);
1,303✔
265

266
        l = exec_context_get_syscall_archs(c);
1,303✔
267
        if (!l)
1,303✔
268
                return -ENOMEM;
269

270
        r = sd_bus_message_append_strv(reply, l);
1,303✔
271
        if (r < 0)
1,303✔
UNCOV
272
                return r;
×
273

274
        return 0;
275
}
276

277
static int property_get_selinux_context(
1,303✔
278
                sd_bus *bus,
279
                const char *path,
280
                const char *interface,
281
                const char *property,
282
                sd_bus_message *reply,
283
                void *userdata,
284
                sd_bus_error *error) {
285

286
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
287

288
        assert(bus);
1,303✔
289
        assert(reply);
1,303✔
290

291
        return sd_bus_message_append(reply, "(bs)", c->selinux_context_ignore, c->selinux_context);
1,303✔
292
}
293

294
static int property_get_apparmor_profile(
1,303✔
295
                sd_bus *bus,
296
                const char *path,
297
                const char *interface,
298
                const char *property,
299
                sd_bus_message *reply,
300
                void *userdata,
301
                sd_bus_error *error) {
302

303
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
304

305
        assert(bus);
1,303✔
306
        assert(reply);
1,303✔
307

308
        return sd_bus_message_append(reply, "(bs)", c->apparmor_profile_ignore, c->apparmor_profile);
1,303✔
309
}
310

311
static int property_get_smack_process_label(
1,303✔
312
                sd_bus *bus,
313
                const char *path,
314
                const char *interface,
315
                const char *property,
316
                sd_bus_message *reply,
317
                void *userdata,
318
                sd_bus_error *error) {
319

320
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
321

322
        assert(bus);
1,303✔
323
        assert(reply);
1,303✔
324

325
        return sd_bus_message_append(reply, "(bs)", c->smack_process_label_ignore, c->smack_process_label);
1,303✔
326
}
327

328
static int property_get_address_families(
1,303✔
329
                sd_bus *bus,
330
                const char *path,
331
                const char *interface,
332
                const char *property,
333
                sd_bus_message *reply,
334
                void *userdata,
335
                sd_bus_error *error) {
336

337
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
338
        _cleanup_strv_free_ char **l = NULL;
1,303✔
339
        int r;
1,303✔
340

341
        assert(bus);
1,303✔
342
        assert(reply);
1,303✔
343

344
        r = sd_bus_message_open_container(reply, 'r', "bas");
1,303✔
345
        if (r < 0)
1,303✔
346
                return r;
347

348
        r = sd_bus_message_append(reply, "b", c->address_families_allow_list);
1,303✔
349
        if (r < 0)
1,303✔
350
                return r;
351

352
        l = exec_context_get_address_families(c);
1,303✔
353
        if (!l)
1,303✔
354
                return -ENOMEM;
355

356
        r = sd_bus_message_append_strv(reply, l);
1,303✔
357
        if (r < 0)
1,303✔
358
                return r;
359

360
        return sd_bus_message_close_container(reply);
1,303✔
361
}
362

363
static int property_get_working_directory(
1,303✔
364
                sd_bus *bus,
365
                const char *path,
366
                const char *interface,
367
                const char *property,
368
                sd_bus_message *reply,
369
                void *userdata,
370
                sd_bus_error *error) {
371

372
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
373
        const char *wd;
1,303✔
374

375
        assert(bus);
1,303✔
376
        assert(reply);
1,303✔
377

378
        if (c->working_directory_home)
1,303✔
379
                wd = "~";
380
        else
381
                wd = c->working_directory;
1,303✔
382

383
        if (c->working_directory_missing_ok)
1,303✔
384
                wd = strjoina("!", wd);
2,015✔
385

386
        return sd_bus_message_append(reply, "s", wd);
1,303✔
387
}
388

389
static int property_get_stdio_fdname(
3,909✔
390
                sd_bus *bus,
391
                const char *path,
392
                const char *interface,
393
                const char *property,
394
                sd_bus_message *reply,
395
                void *userdata,
396
                sd_bus_error *error) {
397

398
        ExecContext *c = ASSERT_PTR(userdata);
3,909✔
399
        int fileno;
3,909✔
400

401
        assert(bus);
3,909✔
402
        assert(property);
3,909✔
403
        assert(reply);
3,909✔
404

405
        if (streq(property, "StandardInputFileDescriptorName"))
3,909✔
406
                fileno = STDIN_FILENO;
407
        else if (streq(property, "StandardOutputFileDescriptorName"))
2,606✔
408
                fileno = STDOUT_FILENO;
409
        else {
410
                assert(streq(property, "StandardErrorFileDescriptorName"));
1,303✔
411
                fileno = STDERR_FILENO;
412
        }
413

414
        return sd_bus_message_append(reply, "s", exec_context_fdname(c, fileno));
3,909✔
415
}
416

417
static int property_get_input_data(
1,303✔
418
                sd_bus *bus,
419
                const char *path,
420
                const char *interface,
421
                const char *property,
422
                sd_bus_message *reply,
423
                void *userdata,
424
                sd_bus_error *error) {
425

426
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
427

428
        assert(bus);
1,303✔
429
        assert(property);
1,303✔
430
        assert(reply);
1,303✔
431

432
        return sd_bus_message_append_array(reply, 'y', c->stdin_data, c->stdin_data_size);
1,303✔
433
}
434

435
static int property_get_restrict_filesystems(
1,303✔
436
                sd_bus *bus,
437
                const char *path,
438
                const char *interface,
439
                const char *property,
440
                sd_bus_message *reply,
441
                void *userdata,
442
                sd_bus_error *error) {
443

444
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
445
        _cleanup_free_ char **l = NULL; /* Strings are owned by 'c->restrict_filesystems'! */
1,303✔
446
        int r;
1,303✔
447

448
        assert(bus);
1,303✔
449
        assert(reply);
1,303✔
450

451
        r = sd_bus_message_open_container(reply, 'r', "bas");
1,303✔
452
        if (r < 0)
1,303✔
453
                return r;
454

455
        r = sd_bus_message_append(reply, "b", c->restrict_filesystems_allow_list);
1,303✔
456
        if (r < 0)
1,303✔
457
                return r;
458

459
        l = exec_context_get_restrict_filesystems(c);
1,303✔
460
        if (!l)
1,303✔
461
                return -ENOMEM;
462

463
        r = sd_bus_message_append_strv(reply, l);
1,303✔
464
        if (r < 0)
1,303✔
465
                return r;
466

467
        return sd_bus_message_close_container(reply);
1,303✔
468
}
469

470
static int property_get_bind_paths(
2,606✔
471
                sd_bus *bus,
472
                const char *path,
473
                const char *interface,
474
                const char *property,
475
                sd_bus_message *reply,
476
                void *userdata,
477
                sd_bus_error *error) {
478

479
        ExecContext *c = ASSERT_PTR(userdata);
2,606✔
480
        bool ro;
2,606✔
481
        int r;
2,606✔
482

483
        assert(bus);
2,606✔
484
        assert(property);
2,606✔
485
        assert(reply);
2,606✔
486

487
        ro = strstr(property, "ReadOnly");
2,606✔
488

489
        r = sd_bus_message_open_container(reply, 'a', "(ssbt)");
2,606✔
490
        if (r < 0)
2,606✔
491
                return r;
492

493
        FOREACH_ARRAY(i, c->bind_mounts, c->n_bind_mounts) {
2,860✔
494
                if (ro != i->read_only)
254✔
495
                        continue;
127✔
496

497
                r = sd_bus_message_append(
381✔
498
                                reply, "(ssbt)",
499
                                i->source,
500
                                i->destination,
501
                                i->ignore_enoent,
127✔
502
                                i->recursive ? (uint64_t) MS_REC : UINT64_C(0));
127✔
503
                if (r < 0)
127✔
504
                        return r;
505
        }
506

507
        return sd_bus_message_close_container(reply);
2,606✔
508
}
509

510
static int property_get_temporary_filesystems(
1,303✔
511
                sd_bus *bus,
512
                const char *path,
513
                const char *interface,
514
                const char *property,
515
                sd_bus_message *reply,
516
                void *userdata,
517
                sd_bus_error *error) {
518

519
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
520
        int r;
1,303✔
521

522
        assert(bus);
1,303✔
523
        assert(property);
1,303✔
524
        assert(reply);
1,303✔
525

526
        r = sd_bus_message_open_container(reply, 'a', "(ss)");
1,303✔
527
        if (r < 0)
1,303✔
528
                return r;
529

530
        FOREACH_ARRAY(t, c->temporary_filesystems, c->n_temporary_filesystems) {
1,340✔
531
                r = sd_bus_message_append(
37✔
532
                                reply, "(ss)",
533
                                t->path,
534
                                t->options);
535
                if (r < 0)
37✔
536
                        return r;
537
        }
538

539
        return sd_bus_message_close_container(reply);
1,303✔
540
}
541

542
static int property_get_log_extra_fields(
1,303✔
543
                sd_bus *bus,
544
                const char *path,
545
                const char *interface,
546
                const char *property,
547
                sd_bus_message *reply,
548
                void *userdata,
549
                sd_bus_error *error) {
550

551
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
552
        int r;
1,303✔
553

554
        assert(bus);
1,303✔
555
        assert(property);
1,303✔
556
        assert(reply);
1,303✔
557

558
        r = sd_bus_message_open_container(reply, 'a', "ay");
1,303✔
559
        if (r < 0)
1,303✔
560
                return r;
561

562
        FOREACH_ARRAY(i, c->log_extra_fields, c->n_log_extra_fields) {
1,303✔
563
                r = sd_bus_message_append_array(reply, 'y', i->iov_base, i->iov_len);
×
UNCOV
564
                if (r < 0)
×
565
                        return r;
566
        }
567

568
        return sd_bus_message_close_container(reply);
1,303✔
569
}
570

571
static int sd_bus_message_append_log_filter_patterns(sd_bus_message *reply, Set *patterns, bool is_allowlist) {
2,606✔
572
        const char *pattern;
2,606✔
573
        int r;
2,606✔
574

575
        assert(reply);
2,606✔
576

577
        SET_FOREACH(pattern, patterns) {
2,606✔
578
                r = sd_bus_message_append(reply, "(bs)", is_allowlist, pattern);
×
579
                if (r < 0)
×
UNCOV
580
                        return r;
×
581
        }
582

583
        return 0;
2,606✔
584
}
585

586
static int property_get_log_filter_patterns(
1,303✔
587
                sd_bus *bus,
588
                const char *path,
589
                const char *interface,
590
                const char *property,
591
                sd_bus_message *reply,
592
                void *userdata,
593
                sd_bus_error *error) {
594

595
        ExecContext *c = userdata;
1,303✔
596
        int r;
1,303✔
597

598
        assert(c);
1,303✔
599
        assert(reply);
1,303✔
600

601
        r = sd_bus_message_open_container(reply, 'a', "(bs)");
1,303✔
602
        if (r < 0)
1,303✔
603
                return r;
604

605
        r = sd_bus_message_append_log_filter_patterns(reply, c->log_filter_allowed_patterns,
1,303✔
606
                                                      /* is_allowlist = */ true);
607
        if (r < 0)
1,303✔
608
                return r;
609

610
        r = sd_bus_message_append_log_filter_patterns(reply, c->log_filter_denied_patterns,
1,303✔
611
                                                      /* is_allowlist = */ false);
612
        if (r < 0)
1,303✔
613
                return r;
614

615
        return sd_bus_message_close_container(reply);
1,303✔
616
}
617

618
static int property_get_set_credential(
2,606✔
619
                sd_bus *bus,
620
                const char *path,
621
                const char *interface,
622
                const char *property,
623
                sd_bus_message *reply,
624
                void *userdata,
625
                sd_bus_error *error) {
626

627
        ExecContext *c = ASSERT_PTR(userdata);
2,606✔
628
        ExecSetCredential *sc;
2,606✔
629
        int r;
2,606✔
630

631
        assert(bus);
2,606✔
632
        assert(property);
2,606✔
633
        assert(reply);
2,606✔
634

635
        r = sd_bus_message_open_container(reply, 'a', "(say)");
2,606✔
636
        if (r < 0)
2,606✔
637
                return r;
2,606✔
638

639
        HASHMAP_FOREACH(sc, c->set_credentials) {
2,606✔
640

641
                if (sc->encrypted != streq(property, "SetCredentialEncrypted"))
×
UNCOV
642
                        continue;
×
643

644
                r = sd_bus_message_open_container(reply, 'r', "say");
×
645
                if (r < 0)
×
UNCOV
646
                        return r;
×
647

648
                r = sd_bus_message_append(reply, "s", sc->id);
×
UNCOV
649
                if (r < 0)
×
650
                        return r;
651

652
                r = sd_bus_message_append_array(reply, 'y', sc->data, sc->size);
×
UNCOV
653
                if (r < 0)
×
654
                        return r;
655

656
                r = sd_bus_message_close_container(reply);
×
UNCOV
657
                if (r < 0)
×
658
                        return r;
659
        }
660

661
        return sd_bus_message_close_container(reply);
2,606✔
662
}
663

664
static int property_get_load_credential(
2,606✔
665
                sd_bus *bus,
666
                const char *path,
667
                const char *interface,
668
                const char *property,
669
                sd_bus_message *reply,
670
                void *userdata,
671
                sd_bus_error *error) {
672

673
        ExecContext *c = ASSERT_PTR(userdata);
2,606✔
674
        ExecLoadCredential *lc;
2,606✔
675
        int r;
2,606✔
676

677
        assert(bus);
2,606✔
678
        assert(property);
2,606✔
679
        assert(reply);
2,606✔
680

681
        r = sd_bus_message_open_container(reply, 'a', "(ss)");
2,606✔
682
        if (r < 0)
2,606✔
683
                return r;
2,606✔
684

685
        HASHMAP_FOREACH(lc, c->load_credentials) {
2,624✔
686

687
                if (lc->encrypted != streq(property, "LoadCredentialEncrypted"))
18✔
688
                        continue;
9✔
689

690
                r = sd_bus_message_append(reply, "(ss)", lc->id, lc->path);
9✔
691
                if (r < 0)
9✔
UNCOV
692
                        return r;
×
693
        }
694

695
        return sd_bus_message_close_container(reply);
2,606✔
696
}
697

698
static int property_get_import_credential(
1,303✔
699
                sd_bus *bus,
700
                const char *path,
701
                const char *interface,
702
                const char *property,
703
                sd_bus_message *reply,
704
                void *userdata,
705
                sd_bus_error *error) {
706

707
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
708
        ExecImportCredential *ic;
1,303✔
709
        int r;
1,303✔
710

711
        assert(bus);
1,303✔
712
        assert(property);
1,303✔
713
        assert(reply);
1,303✔
714

715
        r = sd_bus_message_open_container(reply, 'a', "s");
1,303✔
716
        if (r < 0)
1,303✔
717
                return r;
1,303✔
718

719
        ORDERED_SET_FOREACH(ic, c->import_credentials) {
1,429✔
720
                r = sd_bus_message_append(reply, "s", ic->glob);
126✔
721
                if (r < 0)
126✔
UNCOV
722
                        return r;
×
723
        }
724

725
        return sd_bus_message_close_container(reply);
1,303✔
726
}
727

728
static int property_get_import_credential_ex(
1,303✔
729
                sd_bus *bus,
730
                const char *path,
731
                const char *interface,
732
                const char *property,
733
                sd_bus_message *reply,
734
                void *userdata,
735
                sd_bus_error *error) {
736

737
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
738
        ExecImportCredential *ic;
1,303✔
739
        int r;
1,303✔
740

741
        assert(bus);
1,303✔
742
        assert(property);
1,303✔
743
        assert(reply);
1,303✔
744

745
        r = sd_bus_message_open_container(reply, 'a', "(ss)");
1,303✔
746
        if (r < 0)
1,303✔
747
                return r;
1,303✔
748

749
        ORDERED_SET_FOREACH(ic, c->import_credentials) {
1,429✔
750
                r = sd_bus_message_append(reply, "(ss)", ic->glob, ic->rename);
126✔
751
                if (r < 0)
126✔
UNCOV
752
                        return r;
×
753
        }
754

755
        return sd_bus_message_close_container(reply);
1,303✔
756
}
757

758
static int property_get_root_hash(
1,303✔
759
                sd_bus *bus,
760
                const char *path,
761
                const char *interface,
762
                const char *property,
763
                sd_bus_message *reply,
764
                void *userdata,
765
                sd_bus_error *error) {
766

767
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
768

769
        assert(bus);
1,303✔
770
        assert(property);
1,303✔
771
        assert(reply);
1,303✔
772

773
        return sd_bus_message_append_array(reply, 'y', c->root_hash, c->root_hash_size);
1,303✔
774
}
775

776
static int property_get_root_hash_sig(
1,303✔
777
                sd_bus *bus,
778
                const char *path,
779
                const char *interface,
780
                const char *property,
781
                sd_bus_message *reply,
782
                void *userdata,
783
                sd_bus_error *error) {
784

785
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
786

787
        assert(bus);
1,303✔
788
        assert(property);
1,303✔
789
        assert(reply);
1,303✔
790

791
        return sd_bus_message_append_array(reply, 'y', c->root_hash_sig, c->root_hash_sig_size);
1,303✔
792
}
793

794
static int property_get_root_image_options(
1,303✔
795
                sd_bus *bus,
796
                const char *path,
797
                const char *interface,
798
                const char *property,
799
                sd_bus_message *reply,
800
                void *userdata,
801
                sd_bus_error *error) {
802

803
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
804
        int r;
1,303✔
805

806
        assert(bus);
1,303✔
807
        assert(property);
1,303✔
808
        assert(reply);
1,303✔
809

810
        r = sd_bus_message_open_container(reply, 'a', "(ss)");
1,303✔
811
        if (r < 0)
1,303✔
812
                return r;
813

814
        LIST_FOREACH(mount_options, m, c->root_image_options) {
1,303✔
UNCOV
815
                r = sd_bus_message_append(reply, "(ss)",
×
816
                                          partition_designator_to_string(m->partition_designator),
817
                                          m->options);
UNCOV
818
                if (r < 0)
×
819
                        return r;
820
        }
821

822
        return sd_bus_message_close_container(reply);
1,303✔
823
}
824

825
static int property_get_mount_images(
1,303✔
826
                sd_bus *bus,
827
                const char *path,
828
                const char *interface,
829
                const char *property,
830
                sd_bus_message *reply,
831
                void *userdata,
832
                sd_bus_error *error) {
833

834
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
835
        int r;
1,303✔
836

837
        assert(bus);
1,303✔
838
        assert(property);
1,303✔
839
        assert(reply);
1,303✔
840

841
        r = sd_bus_message_open_container(reply, 'a', "(ssba(ss))");
1,303✔
842
        if (r < 0)
1,303✔
843
                return r;
844

845
        FOREACH_ARRAY(i, c->mount_images, c->n_mount_images) {
1,303✔
846
                r = sd_bus_message_open_container(reply, SD_BUS_TYPE_STRUCT, "ssba(ss)");
×
UNCOV
847
                if (r < 0)
×
848
                        return r;
849

UNCOV
850
                r = sd_bus_message_append(
×
851
                                reply, "ssb",
852
                                i->source,
853
                                i->destination,
854
                                i->ignore_enoent);
×
UNCOV
855
                if (r < 0)
×
856
                        return r;
857

858
                r = sd_bus_message_open_container(reply, 'a', "(ss)");
×
UNCOV
859
                if (r < 0)
×
860
                        return r;
861

862
                LIST_FOREACH(mount_options, m, i->mount_options) {
×
UNCOV
863
                        r = sd_bus_message_append(reply, "(ss)",
×
864
                                                  partition_designator_to_string(m->partition_designator),
865
                                                  m->options);
UNCOV
866
                        if (r < 0)
×
867
                                return r;
868
                }
869

870
                r = sd_bus_message_close_container(reply);
×
UNCOV
871
                if (r < 0)
×
872
                        return r;
873

874
                r = sd_bus_message_close_container(reply);
×
UNCOV
875
                if (r < 0)
×
876
                        return r;
877
        }
878

879
        return sd_bus_message_close_container(reply);
1,303✔
880
}
881

882
static int property_get_extension_images(
1,303✔
883
                sd_bus *bus,
884
                const char *path,
885
                const char *interface,
886
                const char *property,
887
                sd_bus_message *reply,
888
                void *userdata,
889
                sd_bus_error *error) {
890

891
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
892
        int r;
1,303✔
893

894
        assert(bus);
1,303✔
895
        assert(property);
1,303✔
896
        assert(reply);
1,303✔
897

898
        r = sd_bus_message_open_container(reply, 'a', "(sba(ss))");
1,303✔
899
        if (r < 0)
1,303✔
900
                return r;
901

902
        FOREACH_ARRAY(i, c->extension_images, c->n_extension_images) {
1,303✔
903
                r = sd_bus_message_open_container(reply, SD_BUS_TYPE_STRUCT, "sba(ss)");
×
UNCOV
904
                if (r < 0)
×
905
                        return r;
906

UNCOV
907
                r = sd_bus_message_append(
×
908
                                reply, "sb",
909
                                i->source,
910
                                i->ignore_enoent);
×
UNCOV
911
                if (r < 0)
×
912
                        return r;
913

914
                r = sd_bus_message_open_container(reply, 'a', "(ss)");
×
UNCOV
915
                if (r < 0)
×
916
                        return r;
917

918
                LIST_FOREACH(mount_options, m, i->mount_options) {
×
UNCOV
919
                        r = sd_bus_message_append(reply, "(ss)",
×
920
                                                  partition_designator_to_string(m->partition_designator),
921
                                                  m->options);
UNCOV
922
                        if (r < 0)
×
923
                                return r;
924
                }
925

926
                r = sd_bus_message_close_container(reply);
×
UNCOV
927
                if (r < 0)
×
928
                        return r;
929

930
                r = sd_bus_message_close_container(reply);
×
UNCOV
931
                if (r < 0)
×
932
                        return r;
933
        }
934

935
        return sd_bus_message_close_container(reply);
1,303✔
936
}
937

938
static int property_get_exec_dir(
6,515✔
939
                sd_bus *bus,
940
                const char *path,
941
                const char *interface,
942
                const char *property,
943
                sd_bus_message *reply,
944
                void *userdata,
945
                sd_bus_error *error) {
946

947
        ExecDirectory *d = ASSERT_PTR(userdata);
6,515✔
948
        int r;
6,515✔
949

950
        assert(bus);
6,515✔
951
        assert(property);
6,515✔
952
        assert(reply);
6,515✔
953

954
        r = sd_bus_message_open_container(reply, 'a', "s");
6,515✔
955
        if (r < 0)
6,515✔
956
                return r;
957

958
        FOREACH_ARRAY(i, d->items, d->n_items) {
7,130✔
959
                r = sd_bus_message_append_basic(reply, 's', i->path);
615✔
960
                if (r < 0)
615✔
961
                        return r;
962
        }
963

964
        return sd_bus_message_close_container(reply);
6,515✔
965
}
966

967
static int property_get_exec_dir_symlink(
5,212✔
968
                sd_bus *bus,
969
                const char *path,
970
                const char *interface,
971
                const char *property,
972
                sd_bus_message *reply,
973
                void *userdata,
974
                sd_bus_error *error) {
975

976
        ExecDirectory *d = ASSERT_PTR(userdata);
5,212✔
977
        int r;
5,212✔
978

979
        assert(bus);
5,212✔
980
        assert(property);
5,212✔
981
        assert(reply);
5,212✔
982

983
        r = sd_bus_message_open_container(reply, 'a', "(sst)");
5,212✔
984
        if (r < 0)
5,212✔
985
                return r;
986

987
        FOREACH_ARRAY(i, d->items, d->n_items)
5,655✔
988
                if (strv_isempty(i->symlinks)) {
443✔
989
                        /* The old exec directory properties cannot represent flags, so list them here with no
990
                         * destination */
991
                        r = sd_bus_message_append(reply, "(sst)", i->path, "", (uint64_t) (i->flags & _EXEC_DIRECTORY_FLAGS_PUBLIC));
401✔
992
                        if (r < 0)
401✔
993
                                return r;
994
                } else
995
                        STRV_FOREACH(dst, i->symlinks) {
84✔
996
                                r = sd_bus_message_append(reply, "(sst)", i->path, *dst, (uint64_t) (i->flags & _EXEC_DIRECTORY_FLAGS_PUBLIC));
42✔
997
                                if (r < 0)
42✔
998
                                        return r;
999
                        }
1000

1001
        return sd_bus_message_close_container(reply);
5,212✔
1002
}
1003

1004
static int property_get_image_policy(
3,909✔
1005
                sd_bus *bus,
1006
                const char *path,
1007
                const char *interface,
1008
                const char *property,
1009
                sd_bus_message *reply,
1010
                void *userdata,
1011
                sd_bus_error *error) {
1012

1013
        ImagePolicy **pp = ASSERT_PTR(userdata);
3,909✔
1014
        _cleanup_free_ char *s = NULL;
3,909✔
1015
        int r;
3,909✔
1016

1017
        assert(bus);
3,909✔
1018
        assert(property);
3,909✔
1019
        assert(reply);
3,909✔
1020

1021
        r = image_policy_to_string(*pp ?: &image_policy_service, /* simplify= */ true, &s);
7,818✔
1022
        if (r < 0)
3,909✔
1023
                return r;
1024

1025
        return sd_bus_message_append(reply, "s", s);
3,909✔
1026
}
1027

1028
static int property_get_private_tmp(
1,303✔
1029
                sd_bus *bus,
1030
                const char *path,
1031
                const char *interface,
1032
                const char *property,
1033
                sd_bus_message *reply,
1034
                void *userdata,
1035
                sd_bus_error *error) {
1036

1037
        PrivateTmp *p = ASSERT_PTR(userdata);
1,303✔
1038
        int b = *p != PRIVATE_TMP_NO;
1,303✔
1039

1040
        return sd_bus_message_append_basic(reply, 'b', &b);
1,303✔
1041
}
1042

1043
static int property_get_private_users(
1,303✔
1044
                sd_bus *bus,
1045
                const char *path,
1046
                const char *interface,
1047
                const char *property,
1048
                sd_bus_message *reply,
1049
                void *userdata,
1050
                sd_bus_error *error) {
1051

1052
        PrivateUsers *p = ASSERT_PTR(userdata);
1,303✔
1053
        int b = *p != PRIVATE_USERS_NO;
1,303✔
1054

1055
        return sd_bus_message_append_basic(reply, 'b', &b);
1,303✔
1056
}
1057

1058
static int property_get_protect_control_groups(
1,303✔
1059
                sd_bus *bus,
1060
                const char *path,
1061
                const char *interface,
1062
                const char *property,
1063
                sd_bus_message *reply,
1064
                void *userdata,
1065
                sd_bus_error *error) {
1066

1067
        ProtectControlGroups *p = ASSERT_PTR(userdata);
1,303✔
1068
        int b = *p != PROTECT_CONTROL_GROUPS_NO;
1,303✔
1069

1070
        return sd_bus_message_append_basic(reply, 'b', &b);
1,303✔
1071
}
1072

1073
static int property_get_protect_hostname(
1,303✔
1074
                sd_bus *bus,
1075
                const char *path,
1076
                const char *interface,
1077
                const char *property,
1078
                sd_bus_message *reply,
1079
                void *userdata,
1080
                sd_bus_error *error) {
1081

1082
        ProtectHostname *p = ASSERT_PTR(userdata);
1,303✔
1083
        int b = *p != PROTECT_HOSTNAME_NO;
1,303✔
1084

1085
        return sd_bus_message_append_basic(reply, 'b', &b);
1,303✔
1086
}
1087

1088
static int property_get_protect_hostname_ex(
1,303✔
1089
                sd_bus *bus,
1090
                const char *path,
1091
                const char *interface,
1092
                const char *property,
1093
                sd_bus_message *reply,
1094
                void *userdata,
1095
                sd_bus_error *error) {
1096

1097
        ExecContext *c = ASSERT_PTR(userdata);
1,303✔
1098

1099
        return sd_bus_message_append(reply, "(ss)", protect_hostname_to_string(c->protect_hostname), c->private_hostname);
1,303✔
1100
}
1101

1102
static int property_get_unsigned_as_uint16(
2,606✔
1103
                sd_bus *bus,
1104
                const char *path,
1105
                const char *interface,
1106
                const char *property,
1107
                sd_bus_message *reply,
1108
                void *userdata,
1109
                sd_bus_error *error) {
1110

1111
        unsigned *value = ASSERT_PTR(userdata);
2,606✔
1112

1113
        /* Returns an unsigned as a D-Bus "q" type, i.e. as 16-bit value, even if unsigned is 32-bit. We'll saturate if it doesn't fit. */
1114

1115
        uint16_t q = *value >= UINT16_MAX ? UINT16_MAX : (uint16_t) *value;
2,606✔
1116
        return sd_bus_message_append_basic(reply, 'q', &q);
2,606✔
1117
}
1118

1119
const sd_bus_vtable bus_exec_vtable[] = {
1120
        SD_BUS_VTABLE_START(0),
1121
        SD_BUS_PROPERTY("Environment", "as", NULL, offsetof(ExecContext, environment), SD_BUS_VTABLE_PROPERTY_CONST),
1122
        SD_BUS_PROPERTY("EnvironmentFiles", "a(sb)", property_get_environment_files, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1123
        SD_BUS_PROPERTY("PassEnvironment", "as", NULL, offsetof(ExecContext, pass_environment), SD_BUS_VTABLE_PROPERTY_CONST),
1124
        SD_BUS_PROPERTY("UnsetEnvironment", "as", NULL, offsetof(ExecContext, unset_environment), SD_BUS_VTABLE_PROPERTY_CONST),
1125
        SD_BUS_PROPERTY("UMask", "u", bus_property_get_mode, offsetof(ExecContext, umask), SD_BUS_VTABLE_PROPERTY_CONST),
1126
        SD_BUS_PROPERTY("LimitCPU", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_CPU]), SD_BUS_VTABLE_PROPERTY_CONST),
1127
        SD_BUS_PROPERTY("LimitCPUSoft", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_CPU]), SD_BUS_VTABLE_PROPERTY_CONST),
1128
        SD_BUS_PROPERTY("LimitFSIZE", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_FSIZE]), SD_BUS_VTABLE_PROPERTY_CONST),
1129
        SD_BUS_PROPERTY("LimitFSIZESoft", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_FSIZE]), SD_BUS_VTABLE_PROPERTY_CONST),
1130
        SD_BUS_PROPERTY("LimitDATA", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_DATA]), SD_BUS_VTABLE_PROPERTY_CONST),
1131
        SD_BUS_PROPERTY("LimitDATASoft", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_DATA]), SD_BUS_VTABLE_PROPERTY_CONST),
1132
        SD_BUS_PROPERTY("LimitSTACK", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_STACK]), SD_BUS_VTABLE_PROPERTY_CONST),
1133
        SD_BUS_PROPERTY("LimitSTACKSoft", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_STACK]), SD_BUS_VTABLE_PROPERTY_CONST),
1134
        SD_BUS_PROPERTY("LimitCORE", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_CORE]), SD_BUS_VTABLE_PROPERTY_CONST),
1135
        SD_BUS_PROPERTY("LimitCORESoft", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_CORE]), SD_BUS_VTABLE_PROPERTY_CONST),
1136
        SD_BUS_PROPERTY("LimitRSS", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_RSS]), SD_BUS_VTABLE_PROPERTY_CONST),
1137
        SD_BUS_PROPERTY("LimitRSSSoft", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_RSS]), SD_BUS_VTABLE_PROPERTY_CONST),
1138
        SD_BUS_PROPERTY("LimitNOFILE", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_NOFILE]), SD_BUS_VTABLE_PROPERTY_CONST),
1139
        SD_BUS_PROPERTY("LimitNOFILESoft", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_NOFILE]), SD_BUS_VTABLE_PROPERTY_CONST),
1140
        SD_BUS_PROPERTY("LimitAS", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_AS]), SD_BUS_VTABLE_PROPERTY_CONST),
1141
        SD_BUS_PROPERTY("LimitASSoft", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_AS]), SD_BUS_VTABLE_PROPERTY_CONST),
1142
        SD_BUS_PROPERTY("LimitNPROC", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_NPROC]), SD_BUS_VTABLE_PROPERTY_CONST),
1143
        SD_BUS_PROPERTY("LimitNPROCSoft", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_NPROC]), SD_BUS_VTABLE_PROPERTY_CONST),
1144
        SD_BUS_PROPERTY("LimitMEMLOCK", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_MEMLOCK]), SD_BUS_VTABLE_PROPERTY_CONST),
1145
        SD_BUS_PROPERTY("LimitMEMLOCKSoft", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_MEMLOCK]), SD_BUS_VTABLE_PROPERTY_CONST),
1146
        SD_BUS_PROPERTY("LimitLOCKS", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_LOCKS]), SD_BUS_VTABLE_PROPERTY_CONST),
1147
        SD_BUS_PROPERTY("LimitLOCKSSoft", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_LOCKS]), SD_BUS_VTABLE_PROPERTY_CONST),
1148
        SD_BUS_PROPERTY("LimitSIGPENDING", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_SIGPENDING]), SD_BUS_VTABLE_PROPERTY_CONST),
1149
        SD_BUS_PROPERTY("LimitSIGPENDINGSoft", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_SIGPENDING]), SD_BUS_VTABLE_PROPERTY_CONST),
1150
        SD_BUS_PROPERTY("LimitMSGQUEUE", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_MSGQUEUE]), SD_BUS_VTABLE_PROPERTY_CONST),
1151
        SD_BUS_PROPERTY("LimitMSGQUEUESoft", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_MSGQUEUE]), SD_BUS_VTABLE_PROPERTY_CONST),
1152
        SD_BUS_PROPERTY("LimitNICE", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_NICE]), SD_BUS_VTABLE_PROPERTY_CONST),
1153
        SD_BUS_PROPERTY("LimitNICESoft", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_NICE]), SD_BUS_VTABLE_PROPERTY_CONST),
1154
        SD_BUS_PROPERTY("LimitRTPRIO", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_RTPRIO]), SD_BUS_VTABLE_PROPERTY_CONST),
1155
        SD_BUS_PROPERTY("LimitRTPRIOSoft", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_RTPRIO]), SD_BUS_VTABLE_PROPERTY_CONST),
1156
        SD_BUS_PROPERTY("LimitRTTIME", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_RTTIME]), SD_BUS_VTABLE_PROPERTY_CONST),
1157
        SD_BUS_PROPERTY("LimitRTTIMESoft", "t", bus_property_get_rlimit, offsetof(ExecContext, rlimit[RLIMIT_RTTIME]), SD_BUS_VTABLE_PROPERTY_CONST),
1158
        SD_BUS_PROPERTY("WorkingDirectory", "s", property_get_working_directory, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1159
        SD_BUS_PROPERTY("RootDirectory", "s", NULL, offsetof(ExecContext, root_directory), SD_BUS_VTABLE_PROPERTY_CONST),
1160
        SD_BUS_PROPERTY("RootImage", "s", NULL, offsetof(ExecContext, root_image), SD_BUS_VTABLE_PROPERTY_CONST),
1161
        SD_BUS_PROPERTY("RootImageOptions", "a(ss)", property_get_root_image_options, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1162
        SD_BUS_PROPERTY("RootHash", "ay", property_get_root_hash, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1163
        SD_BUS_PROPERTY("RootHashPath", "s", NULL, offsetof(ExecContext, root_hash_path), SD_BUS_VTABLE_PROPERTY_CONST),
1164
        SD_BUS_PROPERTY("RootHashSignature", "ay", property_get_root_hash_sig, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1165
        SD_BUS_PROPERTY("RootHashSignaturePath", "s", NULL, offsetof(ExecContext, root_hash_sig_path), SD_BUS_VTABLE_PROPERTY_CONST),
1166
        SD_BUS_PROPERTY("RootVerity", "s", NULL, offsetof(ExecContext, root_verity), SD_BUS_VTABLE_PROPERTY_CONST),
1167
        SD_BUS_PROPERTY("RootEphemeral", "b", bus_property_get_bool, offsetof(ExecContext, root_ephemeral), SD_BUS_VTABLE_PROPERTY_CONST),
1168
        SD_BUS_PROPERTY("ExtensionDirectories", "as", NULL, offsetof(ExecContext, extension_directories), SD_BUS_VTABLE_PROPERTY_CONST),
1169
        SD_BUS_PROPERTY("ExtensionImages", "a(sba(ss))", property_get_extension_images, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1170
        SD_BUS_PROPERTY("MountImages", "a(ssba(ss))", property_get_mount_images, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1171
        SD_BUS_PROPERTY("OOMScoreAdjust", "i", property_get_oom_score_adjust, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1172
        SD_BUS_PROPERTY("CoredumpFilter", "t", property_get_coredump_filter, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1173
        SD_BUS_PROPERTY("Nice", "i", property_get_nice, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1174
        SD_BUS_PROPERTY("IOSchedulingClass", "i", property_get_ioprio_class, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1175
        SD_BUS_PROPERTY("IOSchedulingPriority", "i", property_get_ioprio_priority, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1176
        SD_BUS_PROPERTY("CPUSchedulingPolicy", "i", property_get_cpu_sched_policy, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1177
        SD_BUS_PROPERTY("CPUSchedulingPriority", "i", property_get_cpu_sched_priority, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1178
        SD_BUS_PROPERTY("CPUAffinity", "ay", property_get_cpu_affinity, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1179
        SD_BUS_PROPERTY("CPUAffinityFromNUMA", "b", property_get_cpu_affinity_from_numa, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1180
        SD_BUS_PROPERTY("NUMAPolicy", "i", property_get_numa_policy, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1181
        SD_BUS_PROPERTY("NUMAMask", "ay", property_get_numa_mask, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1182
        SD_BUS_PROPERTY("TimerSlackNSec", "t", property_get_timer_slack_nsec, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1183
        SD_BUS_PROPERTY("CPUSchedulingResetOnFork", "b", bus_property_get_bool, offsetof(ExecContext, cpu_sched_reset_on_fork), SD_BUS_VTABLE_PROPERTY_CONST),
1184
        SD_BUS_PROPERTY("NonBlocking", "b", bus_property_get_bool, offsetof(ExecContext, non_blocking), SD_BUS_VTABLE_PROPERTY_CONST),
1185
        SD_BUS_PROPERTY("StandardInput", "s", property_get_exec_input, offsetof(ExecContext, std_input), SD_BUS_VTABLE_PROPERTY_CONST),
1186
        SD_BUS_PROPERTY("StandardInputFileDescriptorName", "s", property_get_stdio_fdname, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1187
        SD_BUS_PROPERTY("StandardInputData", "ay", property_get_input_data, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1188
        SD_BUS_PROPERTY("StandardOutput", "s", bus_property_get_exec_output, offsetof(ExecContext, std_output), SD_BUS_VTABLE_PROPERTY_CONST),
1189
        SD_BUS_PROPERTY("StandardOutputFileDescriptorName", "s", property_get_stdio_fdname, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1190
        SD_BUS_PROPERTY("StandardError", "s", bus_property_get_exec_output, offsetof(ExecContext, std_error), SD_BUS_VTABLE_PROPERTY_CONST),
1191
        SD_BUS_PROPERTY("StandardErrorFileDescriptorName", "s", property_get_stdio_fdname, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1192
        SD_BUS_PROPERTY("TTYPath", "s", NULL, offsetof(ExecContext, tty_path), SD_BUS_VTABLE_PROPERTY_CONST),
1193
        SD_BUS_PROPERTY("TTYReset", "b", bus_property_get_bool, offsetof(ExecContext, tty_reset), SD_BUS_VTABLE_PROPERTY_CONST),
1194
        SD_BUS_PROPERTY("TTYVHangup", "b", bus_property_get_bool, offsetof(ExecContext, tty_vhangup), SD_BUS_VTABLE_PROPERTY_CONST),
1195
        SD_BUS_PROPERTY("TTYVTDisallocate", "b", bus_property_get_bool, offsetof(ExecContext, tty_vt_disallocate), SD_BUS_VTABLE_PROPERTY_CONST),
1196
        SD_BUS_PROPERTY("TTYRows", "q", property_get_unsigned_as_uint16, offsetof(ExecContext, tty_rows), SD_BUS_VTABLE_PROPERTY_CONST),
1197
        SD_BUS_PROPERTY("TTYColumns", "q", property_get_unsigned_as_uint16, offsetof(ExecContext, tty_cols), SD_BUS_VTABLE_PROPERTY_CONST),
1198
        SD_BUS_PROPERTY("SyslogPriority", "i", bus_property_get_int, offsetof(ExecContext, syslog_priority), SD_BUS_VTABLE_PROPERTY_CONST),
1199
        SD_BUS_PROPERTY("SyslogIdentifier", "s", NULL, offsetof(ExecContext, syslog_identifier), SD_BUS_VTABLE_PROPERTY_CONST),
1200
        SD_BUS_PROPERTY("SyslogLevelPrefix", "b", bus_property_get_bool, offsetof(ExecContext, syslog_level_prefix), SD_BUS_VTABLE_PROPERTY_CONST),
1201
        SD_BUS_PROPERTY("SyslogLevel", "i", property_get_syslog_level, offsetof(ExecContext, syslog_priority), SD_BUS_VTABLE_PROPERTY_CONST),
1202
        SD_BUS_PROPERTY("SyslogFacility", "i", property_get_syslog_facility, offsetof(ExecContext, syslog_priority), SD_BUS_VTABLE_PROPERTY_CONST),
1203
        SD_BUS_PROPERTY("LogLevelMax", "i", bus_property_get_int, offsetof(ExecContext, log_level_max), SD_BUS_VTABLE_PROPERTY_CONST),
1204
        SD_BUS_PROPERTY("LogRateLimitIntervalUSec", "t", bus_property_get_usec, offsetof(ExecContext, log_ratelimit.interval), SD_BUS_VTABLE_PROPERTY_CONST),
1205
        SD_BUS_PROPERTY("LogRateLimitBurst", "u", bus_property_get_unsigned, offsetof(ExecContext, log_ratelimit.burst), SD_BUS_VTABLE_PROPERTY_CONST),
1206
        SD_BUS_PROPERTY("LogExtraFields", "aay", property_get_log_extra_fields, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1207
        SD_BUS_PROPERTY("LogFilterPatterns", "a(bs)", property_get_log_filter_patterns, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1208
        SD_BUS_PROPERTY("LogNamespace", "s", NULL, offsetof(ExecContext, log_namespace), SD_BUS_VTABLE_PROPERTY_CONST),
1209
        SD_BUS_PROPERTY("SecureBits", "i", bus_property_get_int, offsetof(ExecContext, secure_bits), SD_BUS_VTABLE_PROPERTY_CONST),
1210
        SD_BUS_PROPERTY("CapabilityBoundingSet", "t", NULL, offsetof(ExecContext, capability_bounding_set), SD_BUS_VTABLE_PROPERTY_CONST),
1211
        SD_BUS_PROPERTY("AmbientCapabilities", "t", NULL, offsetof(ExecContext, capability_ambient_set), SD_BUS_VTABLE_PROPERTY_CONST),
1212
        SD_BUS_PROPERTY("User", "s", NULL, offsetof(ExecContext, user), SD_BUS_VTABLE_PROPERTY_CONST),
1213
        SD_BUS_PROPERTY("Group", "s", NULL, offsetof(ExecContext, group), SD_BUS_VTABLE_PROPERTY_CONST),
1214
        SD_BUS_PROPERTY("DynamicUser", "b", bus_property_get_bool, offsetof(ExecContext, dynamic_user), SD_BUS_VTABLE_PROPERTY_CONST),
1215
        SD_BUS_PROPERTY("SetLoginEnvironment", "b", property_get_set_login_environment, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1216
        SD_BUS_PROPERTY("RemoveIPC", "b", bus_property_get_bool, offsetof(ExecContext, remove_ipc), SD_BUS_VTABLE_PROPERTY_CONST),
1217
        SD_BUS_PROPERTY("SetCredential", "a(say)", property_get_set_credential, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1218
        SD_BUS_PROPERTY("SetCredentialEncrypted", "a(say)", property_get_set_credential, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1219
        SD_BUS_PROPERTY("LoadCredential", "a(ss)", property_get_load_credential, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1220
        SD_BUS_PROPERTY("LoadCredentialEncrypted", "a(ss)", property_get_load_credential, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1221
        SD_BUS_PROPERTY("ImportCredential", "as", property_get_import_credential, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1222
        SD_BUS_PROPERTY("ImportCredentialEx", "a(ss)", property_get_import_credential_ex, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1223
        SD_BUS_PROPERTY("SupplementaryGroups", "as", NULL, offsetof(ExecContext, supplementary_groups), SD_BUS_VTABLE_PROPERTY_CONST),
1224
        SD_BUS_PROPERTY("PAMName", "s", NULL, offsetof(ExecContext, pam_name), SD_BUS_VTABLE_PROPERTY_CONST),
1225
        SD_BUS_PROPERTY("ReadWritePaths", "as", NULL, offsetof(ExecContext, read_write_paths), SD_BUS_VTABLE_PROPERTY_CONST),
1226
        SD_BUS_PROPERTY("ReadOnlyPaths", "as", NULL, offsetof(ExecContext, read_only_paths), SD_BUS_VTABLE_PROPERTY_CONST),
1227
        SD_BUS_PROPERTY("InaccessiblePaths", "as", NULL, offsetof(ExecContext, inaccessible_paths), SD_BUS_VTABLE_PROPERTY_CONST),
1228
        SD_BUS_PROPERTY("ExecPaths", "as", NULL, offsetof(ExecContext, exec_paths), SD_BUS_VTABLE_PROPERTY_CONST),
1229
        SD_BUS_PROPERTY("NoExecPaths", "as", NULL, offsetof(ExecContext, no_exec_paths), SD_BUS_VTABLE_PROPERTY_CONST),
1230
        SD_BUS_PROPERTY("ExecSearchPath", "as", NULL, offsetof(ExecContext, exec_search_path), SD_BUS_VTABLE_PROPERTY_CONST),
1231
        SD_BUS_PROPERTY("MountFlags", "t", bus_property_get_ulong, offsetof(ExecContext, mount_propagation_flag), SD_BUS_VTABLE_PROPERTY_CONST),
1232
        SD_BUS_PROPERTY("PrivateTmp", "b", property_get_private_tmp, offsetof(ExecContext, private_tmp), SD_BUS_VTABLE_PROPERTY_CONST),
1233
        SD_BUS_PROPERTY("PrivateTmpEx", "s", property_get_private_tmp_ex, offsetof(ExecContext, private_tmp), SD_BUS_VTABLE_PROPERTY_CONST),
1234
        SD_BUS_PROPERTY("PrivateDevices", "b", bus_property_get_bool, offsetof(ExecContext, private_devices), SD_BUS_VTABLE_PROPERTY_CONST),
1235
        SD_BUS_PROPERTY("ProtectClock", "b", bus_property_get_bool, offsetof(ExecContext, protect_clock), SD_BUS_VTABLE_PROPERTY_CONST),
1236
        SD_BUS_PROPERTY("ProtectKernelTunables", "b", bus_property_get_bool, offsetof(ExecContext, protect_kernel_tunables), SD_BUS_VTABLE_PROPERTY_CONST),
1237
        SD_BUS_PROPERTY("ProtectKernelModules", "b", bus_property_get_bool, offsetof(ExecContext, protect_kernel_modules), SD_BUS_VTABLE_PROPERTY_CONST),
1238
        SD_BUS_PROPERTY("ProtectKernelLogs", "b", bus_property_get_bool, offsetof(ExecContext, protect_kernel_logs), SD_BUS_VTABLE_PROPERTY_CONST),
1239
        SD_BUS_PROPERTY("ProtectControlGroups", "b", property_get_protect_control_groups, offsetof(ExecContext, protect_control_groups), SD_BUS_VTABLE_PROPERTY_CONST),
1240
        SD_BUS_PROPERTY("ProtectControlGroupsEx", "s", property_get_protect_control_groups_ex, offsetof(ExecContext, protect_control_groups), SD_BUS_VTABLE_PROPERTY_CONST),
1241
        SD_BUS_PROPERTY("PrivateNetwork", "b", bus_property_get_bool, offsetof(ExecContext, private_network), SD_BUS_VTABLE_PROPERTY_CONST),
1242
        SD_BUS_PROPERTY("PrivateUsers", "b", property_get_private_users, offsetof(ExecContext, private_users), SD_BUS_VTABLE_PROPERTY_CONST),
1243
        SD_BUS_PROPERTY("PrivateUsersEx", "s", property_get_private_users_ex, offsetof(ExecContext, private_users), SD_BUS_VTABLE_PROPERTY_CONST),
1244
        SD_BUS_PROPERTY("PrivateMounts", "b", bus_property_get_tristate, offsetof(ExecContext, private_mounts), SD_BUS_VTABLE_PROPERTY_CONST),
1245
        SD_BUS_PROPERTY("PrivateIPC", "b", bus_property_get_bool, offsetof(ExecContext, private_ipc), SD_BUS_VTABLE_PROPERTY_CONST),
1246
        SD_BUS_PROPERTY("PrivatePIDs", "s", property_get_private_pids, offsetof(ExecContext, private_pids), SD_BUS_VTABLE_PROPERTY_CONST),
1247
        SD_BUS_PROPERTY("ProtectHome", "s", property_get_protect_home, offsetof(ExecContext, protect_home), SD_BUS_VTABLE_PROPERTY_CONST),
1248
        SD_BUS_PROPERTY("ProtectSystem", "s", property_get_protect_system, offsetof(ExecContext, protect_system), SD_BUS_VTABLE_PROPERTY_CONST),
1249
        SD_BUS_PROPERTY("SameProcessGroup", "b", bus_property_get_bool, offsetof(ExecContext, same_pgrp), SD_BUS_VTABLE_PROPERTY_CONST),
1250
        SD_BUS_PROPERTY("UtmpIdentifier", "s", NULL, offsetof(ExecContext, utmp_id), SD_BUS_VTABLE_PROPERTY_CONST),
1251
        SD_BUS_PROPERTY("UtmpMode", "s", property_get_exec_utmp_mode, offsetof(ExecContext, utmp_mode), SD_BUS_VTABLE_PROPERTY_CONST),
1252
        SD_BUS_PROPERTY("SELinuxContext", "(bs)", property_get_selinux_context, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1253
        SD_BUS_PROPERTY("AppArmorProfile", "(bs)", property_get_apparmor_profile, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1254
        SD_BUS_PROPERTY("SmackProcessLabel", "(bs)", property_get_smack_process_label, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1255
        SD_BUS_PROPERTY("IgnoreSIGPIPE", "b", bus_property_get_bool, offsetof(ExecContext, ignore_sigpipe), SD_BUS_VTABLE_PROPERTY_CONST),
1256
        SD_BUS_PROPERTY("NoNewPrivileges", "b", bus_property_get_bool, offsetof(ExecContext, no_new_privileges), SD_BUS_VTABLE_PROPERTY_CONST),
1257
        SD_BUS_PROPERTY("SystemCallFilter", "(bas)", property_get_syscall_filter, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1258
        SD_BUS_PROPERTY("SystemCallArchitectures", "as", property_get_syscall_archs, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1259
        SD_BUS_PROPERTY("SystemCallErrorNumber", "i", bus_property_get_int, offsetof(ExecContext, syscall_errno), SD_BUS_VTABLE_PROPERTY_CONST),
1260
        SD_BUS_PROPERTY("SystemCallLog", "(bas)", property_get_syscall_log, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1261
        SD_BUS_PROPERTY("Personality", "s", property_get_personality, offsetof(ExecContext, personality), SD_BUS_VTABLE_PROPERTY_CONST),
1262
        SD_BUS_PROPERTY("LockPersonality", "b", bus_property_get_bool, offsetof(ExecContext, lock_personality), SD_BUS_VTABLE_PROPERTY_CONST),
1263
        SD_BUS_PROPERTY("RestrictAddressFamilies", "(bas)", property_get_address_families, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1264
        SD_BUS_PROPERTY("RuntimeDirectorySymlink", "a(sst)", property_get_exec_dir_symlink, offsetof(ExecContext, directories[EXEC_DIRECTORY_RUNTIME]), SD_BUS_VTABLE_PROPERTY_CONST),
1265
        SD_BUS_PROPERTY("RuntimeDirectoryPreserve", "s", bus_property_get_exec_preserve_mode, offsetof(ExecContext, runtime_directory_preserve_mode), SD_BUS_VTABLE_PROPERTY_CONST),
1266
        SD_BUS_PROPERTY("RuntimeDirectoryMode", "u", bus_property_get_mode, offsetof(ExecContext, directories[EXEC_DIRECTORY_RUNTIME].mode), SD_BUS_VTABLE_PROPERTY_CONST),
1267
        SD_BUS_PROPERTY("RuntimeDirectory", "as", property_get_exec_dir, offsetof(ExecContext, directories[EXEC_DIRECTORY_RUNTIME]), SD_BUS_VTABLE_PROPERTY_CONST),
1268
        SD_BUS_PROPERTY("StateDirectorySymlink", "a(sst)", property_get_exec_dir_symlink, offsetof(ExecContext, directories[EXEC_DIRECTORY_STATE]), SD_BUS_VTABLE_PROPERTY_CONST),
1269
        SD_BUS_PROPERTY("StateDirectoryMode", "u", bus_property_get_mode, offsetof(ExecContext, directories[EXEC_DIRECTORY_STATE].mode), SD_BUS_VTABLE_PROPERTY_CONST),
1270
        SD_BUS_PROPERTY("StateDirectory", "as", property_get_exec_dir, offsetof(ExecContext, directories[EXEC_DIRECTORY_STATE]), SD_BUS_VTABLE_PROPERTY_CONST),
1271
        SD_BUS_PROPERTY("CacheDirectorySymlink", "a(sst)", property_get_exec_dir_symlink, offsetof(ExecContext, directories[EXEC_DIRECTORY_CACHE]), SD_BUS_VTABLE_PROPERTY_CONST),
1272
        SD_BUS_PROPERTY("CacheDirectoryMode", "u", bus_property_get_mode, offsetof(ExecContext, directories[EXEC_DIRECTORY_CACHE].mode), SD_BUS_VTABLE_PROPERTY_CONST),
1273
        SD_BUS_PROPERTY("CacheDirectory", "as", property_get_exec_dir, offsetof(ExecContext, directories[EXEC_DIRECTORY_CACHE]), SD_BUS_VTABLE_PROPERTY_CONST),
1274
        SD_BUS_PROPERTY("LogsDirectorySymlink", "a(sst)", property_get_exec_dir_symlink, offsetof(ExecContext, directories[EXEC_DIRECTORY_LOGS]), SD_BUS_VTABLE_PROPERTY_CONST),
1275
        SD_BUS_PROPERTY("LogsDirectoryMode", "u", bus_property_get_mode, offsetof(ExecContext, directories[EXEC_DIRECTORY_LOGS].mode), SD_BUS_VTABLE_PROPERTY_CONST),
1276
        SD_BUS_PROPERTY("LogsDirectory", "as", property_get_exec_dir, offsetof(ExecContext, directories[EXEC_DIRECTORY_LOGS]), SD_BUS_VTABLE_PROPERTY_CONST),
1277
        SD_BUS_PROPERTY("ConfigurationDirectoryMode", "u", bus_property_get_mode, offsetof(ExecContext, directories[EXEC_DIRECTORY_CONFIGURATION].mode), SD_BUS_VTABLE_PROPERTY_CONST),
1278
        SD_BUS_PROPERTY("ConfigurationDirectory", "as", property_get_exec_dir, offsetof(ExecContext, directories[EXEC_DIRECTORY_CONFIGURATION]), SD_BUS_VTABLE_PROPERTY_CONST),
1279
        SD_BUS_PROPERTY("TimeoutCleanUSec", "t", bus_property_get_usec, offsetof(ExecContext, timeout_clean_usec), SD_BUS_VTABLE_PROPERTY_CONST),
1280
        SD_BUS_PROPERTY("MemoryDenyWriteExecute", "b", bus_property_get_bool, offsetof(ExecContext, memory_deny_write_execute), SD_BUS_VTABLE_PROPERTY_CONST),
1281
        SD_BUS_PROPERTY("RestrictRealtime", "b", bus_property_get_bool, offsetof(ExecContext, restrict_realtime), SD_BUS_VTABLE_PROPERTY_CONST),
1282
        SD_BUS_PROPERTY("RestrictSUIDSGID", "b", bus_property_get_bool, offsetof(ExecContext, restrict_suid_sgid), SD_BUS_VTABLE_PROPERTY_CONST),
1283
        SD_BUS_PROPERTY("RestrictNamespaces", "t", bus_property_get_ulong, offsetof(ExecContext, restrict_namespaces), SD_BUS_VTABLE_PROPERTY_CONST),
1284
        SD_BUS_PROPERTY("DelegateNamespaces", "t", bus_property_get_ulong, offsetof(ExecContext, delegate_namespaces), SD_BUS_VTABLE_PROPERTY_CONST),
1285
        SD_BUS_PROPERTY("RestrictFileSystems", "(bas)", property_get_restrict_filesystems, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1286
        SD_BUS_PROPERTY("BindPaths", "a(ssbt)", property_get_bind_paths, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1287
        SD_BUS_PROPERTY("BindReadOnlyPaths", "a(ssbt)", property_get_bind_paths, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1288
        SD_BUS_PROPERTY("TemporaryFileSystem", "a(ss)", property_get_temporary_filesystems, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1289
        SD_BUS_PROPERTY("MountAPIVFS", "b", property_get_mount_apivfs, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1290
        SD_BUS_PROPERTY("BindLogSockets", "b", property_get_bind_log_sockets, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1291
        SD_BUS_PROPERTY("KeyringMode", "s", property_get_exec_keyring_mode, offsetof(ExecContext, keyring_mode), SD_BUS_VTABLE_PROPERTY_CONST),
1292
        SD_BUS_PROPERTY("ProtectProc", "s", property_get_protect_proc, offsetof(ExecContext, protect_proc), SD_BUS_VTABLE_PROPERTY_CONST),
1293
        SD_BUS_PROPERTY("ProcSubset", "s", property_get_proc_subset, offsetof(ExecContext, proc_subset), SD_BUS_VTABLE_PROPERTY_CONST),
1294
        SD_BUS_PROPERTY("ProtectHostname", "b", property_get_protect_hostname, offsetof(ExecContext, protect_hostname), SD_BUS_VTABLE_PROPERTY_CONST),
1295
        SD_BUS_PROPERTY("ProtectHostnameEx", "(ss)", property_get_protect_hostname_ex, 0, SD_BUS_VTABLE_PROPERTY_CONST),
1296
        SD_BUS_PROPERTY("MemoryKSM", "b", bus_property_get_tristate, offsetof(ExecContext, memory_ksm), SD_BUS_VTABLE_PROPERTY_CONST),
1297
        SD_BUS_PROPERTY("NetworkNamespacePath", "s", NULL, offsetof(ExecContext, network_namespace_path), SD_BUS_VTABLE_PROPERTY_CONST),
1298
        SD_BUS_PROPERTY("IPCNamespacePath", "s", NULL, offsetof(ExecContext, ipc_namespace_path), SD_BUS_VTABLE_PROPERTY_CONST),
1299
        SD_BUS_PROPERTY("RootImagePolicy", "s", property_get_image_policy, offsetof(ExecContext, root_image_policy), SD_BUS_VTABLE_PROPERTY_CONST),
1300
        SD_BUS_PROPERTY("MountImagePolicy", "s", property_get_image_policy, offsetof(ExecContext, mount_image_policy), SD_BUS_VTABLE_PROPERTY_CONST),
1301
        SD_BUS_PROPERTY("ExtensionImagePolicy", "s", property_get_image_policy, offsetof(ExecContext, extension_image_policy), SD_BUS_VTABLE_PROPERTY_CONST),
1302

1303
        /* Obsolete/redundant properties: */
1304
        SD_BUS_PROPERTY("Capabilities", "s", property_get_empty_string, 0, SD_BUS_VTABLE_PROPERTY_CONST|SD_BUS_VTABLE_HIDDEN),
1305
        SD_BUS_PROPERTY("ReadWriteDirectories", "as", NULL, offsetof(ExecContext, read_write_paths), SD_BUS_VTABLE_PROPERTY_CONST|SD_BUS_VTABLE_HIDDEN),
1306
        SD_BUS_PROPERTY("ReadOnlyDirectories", "as", NULL, offsetof(ExecContext, read_only_paths), SD_BUS_VTABLE_PROPERTY_CONST|SD_BUS_VTABLE_HIDDEN),
1307
        SD_BUS_PROPERTY("InaccessibleDirectories", "as", NULL, offsetof(ExecContext, inaccessible_paths), SD_BUS_VTABLE_PROPERTY_CONST|SD_BUS_VTABLE_HIDDEN),
1308
        SD_BUS_PROPERTY("IOScheduling", "i", property_get_ioprio, 0, SD_BUS_VTABLE_PROPERTY_CONST|SD_BUS_VTABLE_HIDDEN),
1309

1310
        SD_BUS_VTABLE_END
1311
};
1312

1313
static int append_exec_command(sd_bus_message *reply, ExecCommand *c) {
1,492✔
1314
        int r;
1,492✔
1315

1316
        assert(reply);
1,492✔
1317
        assert(c);
1,492✔
1318

1319
        if (!c->path)
1,492✔
1320
                return 0;
1321

1322
        r = sd_bus_message_open_container(reply, 'r', "sasbttttuii");
1,265✔
1323
        if (r < 0)
1,265✔
1324
                return r;
1325

1326
        r = sd_bus_message_append(reply, "s", c->path);
1,265✔
1327
        if (r < 0)
1,265✔
1328
                return r;
1329

1330
        r = sd_bus_message_append_strv(reply, c->argv);
1,265✔
1331
        if (r < 0)
1,265✔
1332
                return r;
1333

1334
        r = sd_bus_message_append(reply, "bttttuii",
2,530✔
1335
                                  !!(c->flags & EXEC_COMMAND_IGNORE_FAILURE),
1,265✔
1336
                                  c->exec_status.start_timestamp.realtime,
1337
                                  c->exec_status.start_timestamp.monotonic,
1338
                                  c->exec_status.exit_timestamp.realtime,
1339
                                  c->exec_status.exit_timestamp.monotonic,
1340
                                  (uint32_t) c->exec_status.pid,
1,265✔
1341
                                  (int32_t) c->exec_status.code,
1342
                                  (int32_t) c->exec_status.status);
1343
        if (r < 0)
1,265✔
1344
                return r;
1345

1346
        return sd_bus_message_close_container(reply);
1,265✔
1347
}
1348

1349
static int append_exec_ex_command(sd_bus_message *reply, ExecCommand *c) {
1,261✔
1350
        _cleanup_strv_free_ char **ex_opts = NULL;
1,261✔
1351
        int r;
1,261✔
1352

1353
        assert(reply);
1,261✔
1354
        assert(c);
1,261✔
1355

1356
        if (!c->path)
1,261✔
1357
                return 0;
1358

1359
        r = sd_bus_message_open_container(reply, 'r', "sasasttttuii");
1,261✔
1360
        if (r < 0)
1,261✔
1361
                return r;
1362

1363
        r = sd_bus_message_append(reply, "s", c->path);
1,261✔
1364
        if (r < 0)
1,261✔
1365
                return r;
1366

1367
        r = sd_bus_message_append_strv(reply, c->argv);
1,261✔
1368
        if (r < 0)
1,261✔
1369
                return r;
1370

1371
        r = exec_command_flags_to_strv(c->flags, &ex_opts);
1,261✔
1372
        if (r < 0)
1,261✔
1373
                return r;
1374

1375
        r = sd_bus_message_append_strv(reply, ex_opts);
1,261✔
1376
        if (r < 0)
1,261✔
1377
                return r;
1378

1379
        r = sd_bus_message_append(reply, "ttttuii",
2,522✔
1380
                                  c->exec_status.start_timestamp.realtime,
1381
                                  c->exec_status.start_timestamp.monotonic,
1382
                                  c->exec_status.exit_timestamp.realtime,
1383
                                  c->exec_status.exit_timestamp.monotonic,
1384
                                  (uint32_t) c->exec_status.pid,
1,261✔
1385
                                  (int32_t) c->exec_status.code,
1386
                                  (int32_t) c->exec_status.status);
1387
        if (r < 0)
1,261✔
1388
                return r;
1389

1390
        return sd_bus_message_close_container(reply);
1,261✔
1391
}
1392

1393
int bus_property_get_exec_command(
231✔
1394
                sd_bus *bus,
1395
                const char *path,
1396
                const char *interface,
1397
                const char *property,
1398
                sd_bus_message *reply,
1399
                void *userdata,
1400
                sd_bus_error *ret_error) {
1401

1402
        ExecCommand *c = (ExecCommand*) userdata;
231✔
1403
        int r;
231✔
1404

1405
        assert(bus);
231✔
1406
        assert(reply);
231✔
1407

1408
        r = sd_bus_message_open_container(reply, 'a', "(sasbttttuii)");
231✔
1409
        if (r < 0)
231✔
1410
                return r;
1411

1412
        r = append_exec_command(reply, c);
231✔
1413
        if (r < 0)
231✔
1414
                return r;
1415

1416
        return sd_bus_message_close_container(reply);
231✔
1417
}
1418

1419
int bus_property_get_exec_command_list(
8,258✔
1420
                sd_bus *bus,
1421
                const char *path,
1422
                const char *interface,
1423
                const char *property,
1424
                sd_bus_message *reply,
1425
                void *userdata,
1426
                sd_bus_error *ret_error) {
1427

1428
        ExecCommand *exec_command = *(ExecCommand**) userdata;
8,258✔
1429
        int r;
8,258✔
1430

1431
        assert(bus);
8,258✔
1432
        assert(reply);
8,258✔
1433

1434
        r = sd_bus_message_open_container(reply, 'a', "(sasbttttuii)");
8,258✔
1435
        if (r < 0)
8,258✔
1436
                return r;
1437

1438
        LIST_FOREACH(command, c, exec_command) {
9,519✔
1439
                r = append_exec_command(reply, c);
1,261✔
1440
                if (r < 0)
1,261✔
1441
                        return r;
1442
        }
1443

1444
        return sd_bus_message_close_container(reply);
8,258✔
1445
}
1446

1447
int bus_property_get_exec_ex_command_list(
7,826✔
1448
                sd_bus *bus,
1449
                const char *path,
1450
                const char *interface,
1451
                const char *property,
1452
                sd_bus_message *reply,
1453
                void *userdata,
1454
                sd_bus_error *ret_error) {
1455

1456
        ExecCommand *exec_command = *(ExecCommand**) userdata;
7,826✔
1457
        int r;
7,826✔
1458

1459
        assert(bus);
7,826✔
1460
        assert(reply);
7,826✔
1461

1462
        r = sd_bus_message_open_container(reply, 'a', "(sasasttttuii)");
7,826✔
1463
        if (r < 0)
7,826✔
1464
                return r;
1465

1466
        LIST_FOREACH(command, c, exec_command) {
9,087✔
1467
                r = append_exec_ex_command(reply, c);
1,261✔
1468
                if (r < 0)
1,261✔
1469
                        return r;
1470
        }
1471

1472
        return sd_bus_message_close_container(reply);
7,826✔
1473
}
1474

1475
static char *exec_command_flags_to_exec_chars(ExecCommandFlags flags) {
141✔
1476
        return strjoin(FLAGS_SET(flags, EXEC_COMMAND_IGNORE_FAILURE)   ? "-" : "",
704✔
1477
                       FLAGS_SET(flags, EXEC_COMMAND_NO_ENV_EXPAND)    ? ":" : "",
1478
                       FLAGS_SET(flags, EXEC_COMMAND_FULLY_PRIVILEGED) ? "+" : "",
1479
                       FLAGS_SET(flags, EXEC_COMMAND_NO_SETUID)        ? "!" : "");
1480
}
1481

1482
int bus_set_transient_exec_command(
282✔
1483
                Unit *u,
1484
                const char *name,
1485
                ExecCommand **exec_command,
1486
                sd_bus_message *message,
1487
                UnitWriteFlags flags,
1488
                sd_bus_error *error) {
1489

1490
        const char *ex_prop = endswith(ASSERT_PTR(name), "Ex");
282✔
1491
        size_t n = 0;
282✔
1492
        int r;
282✔
1493

1494
        assert(u);
282✔
1495
        assert(exec_command);
282✔
1496
        assert(message);
282✔
1497
        assert(error);
282✔
1498

1499
        /* Drop Ex from the written setting. E.g. ExecStart=, not ExecStartEx=. */
1500
        const char *written_name = ex_prop ? strndupa_safe(name, ex_prop - name) : name;
282✔
1501

1502
        r = sd_bus_message_enter_container(message, 'a', ex_prop ? "(sasas)" : "(sasb)");
282✔
1503
        if (r < 0)
282✔
1504
                return r;
1505

1506
        while ((r = sd_bus_message_enter_container(message, 'r', ex_prop ? "sasas" : "sasb")) > 0) {
1,128✔
1507
                _cleanup_strv_free_ char **argv = NULL, **ex_opts = NULL;
282✔
1508
                const char *path;
282✔
1509
                int b;
282✔
1510

1511
                r = sd_bus_message_read(message, "s", &path);
282✔
1512
                if (r < 0)
282✔
1513
                        return r;
1514

1515
                if (!path_is_absolute(path) && !filename_is_valid(path))
282✔
UNCOV
1516
                        return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS,
×
1517
                                                 "\"%s\" is neither a valid executable name nor an absolute path",
1518
                                                 path);
1519

1520
                r = sd_bus_message_read_strv(message, &argv);
282✔
1521
                if (r < 0)
282✔
1522
                        return r;
1523

1524
                if (strv_isempty(argv))
282✔
UNCOV
1525
                        return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS,
×
1526
                                                 "\"%s\" argv cannot be empty", name);
1527

1528
                r = ex_prop ? sd_bus_message_read_strv(message, &ex_opts) : sd_bus_message_read(message, "b", &b);
282✔
1529
                if (r < 0)
282✔
1530
                        return r;
1531

1532
                r = sd_bus_message_exit_container(message);
282✔
1533
                if (r < 0)
282✔
1534
                        return r;
1535

1536
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
282✔
1537
                        _cleanup_(exec_command_freep) ExecCommand *c = NULL;
141✔
1538

1539
                        c = new(ExecCommand, 1);
141✔
1540
                        if (!c)
141✔
1541
                                return -ENOMEM;
1542

1543
                        *c = (ExecCommand) {
141✔
1544
                                .argv = TAKE_PTR(argv),
141✔
1545
                        };
1546

1547
                        r = path_simplify_alloc(path, &c->path);
141✔
1548
                        if (r < 0)
141✔
1549
                                return r;
1550

1551
                        if (ex_prop) {
141✔
1552
                                r = exec_command_flags_from_strv(ex_opts, &c->flags);
×
UNCOV
1553
                                if (r < 0)
×
1554
                                        return r;
1555
                        } else if (b)
141✔
1556
                                c->flags |= EXEC_COMMAND_IGNORE_FAILURE;
1✔
1557

1558
                        exec_command_append_list(exec_command, TAKE_PTR(c));
141✔
1559
                }
1560

1561
                n++;
282✔
1562
        }
1563
        if (r < 0)
282✔
1564
                return r;
1565

1566
        r = sd_bus_message_exit_container(message);
282✔
1567
        if (r < 0)
282✔
1568
                return r;
1569

1570
        if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
282✔
UNCOV
1571
                _cleanup_(memstream_done) MemStream m = {};
×
1572
                _cleanup_free_ char *buf = NULL;
141✔
1573
                FILE *f;
141✔
1574

1575
                if (n == 0)
141✔
UNCOV
1576
                        *exec_command = exec_command_free_list(*exec_command);
×
1577

1578
                f = memstream_init(&m);
141✔
1579
                if (!f)
141✔
1580
                        return -ENOMEM;
1581

1582
                fprintf(f, "%s=\n", written_name);
141✔
1583

1584
                LIST_FOREACH(command, c, *exec_command) {
282✔
1585
                        _cleanup_free_ char *a = NULL, *exec_chars = NULL;
141✔
1586
                        UnitWriteFlags esc_flags = UNIT_ESCAPE_SPECIFIERS |
141✔
1587
                                (FLAGS_SET(c->flags, EXEC_COMMAND_NO_ENV_EXPAND) ? UNIT_ESCAPE_EXEC_SYNTAX : UNIT_ESCAPE_EXEC_SYNTAX_ENV);
141✔
1588

1589
                        exec_chars = exec_command_flags_to_exec_chars(c->flags);
141✔
1590
                        if (!exec_chars)
141✔
1591
                                return -ENOMEM;
1592

1593
                        a = unit_concat_strv(c->argv, esc_flags);
141✔
1594
                        if (!a)
141✔
1595
                                return -ENOMEM;
1596

1597
                        if (streq_ptr(c->path, c->argv ? c->argv[0] : NULL))
141✔
1598
                                fprintf(f, "%s=%s%s\n", written_name, exec_chars, a);
141✔
1599
                        else {
1600
                                _cleanup_free_ char *t = NULL;
×
UNCOV
1601
                                const char *p;
×
1602

1603
                                p = unit_escape_setting(c->path, esc_flags, &t);
×
1604
                                if (!p)
×
UNCOV
1605
                                        return -ENOMEM;
×
1606

UNCOV
1607
                                fprintf(f, "%s=%s@%s %s\n", written_name, exec_chars, p, a);
×
1608
                        }
1609
                }
1610

1611
                r = memstream_finalize(&m, &buf, NULL);
141✔
1612
                if (r < 0)
141✔
1613
                        return r;
1614

1615
                unit_write_setting(u, flags, written_name, buf);
141✔
1616
        }
1617

1618
        return 1;
1619
}
1620

1621
static int parse_personality(const char *s, unsigned long *p) {
×
UNCOV
1622
        unsigned long v;
×
1623

UNCOV
1624
        assert(p);
×
1625

1626
        v = personality_from_string(s);
×
UNCOV
1627
        if (v == PERSONALITY_INVALID)
×
1628
                return -EINVAL;
1629

1630
        *p = v;
×
UNCOV
1631
        return 0;
×
1632
}
1633

1634
static const char* mount_propagation_flag_to_string_with_check(unsigned long n) {
2✔
1635
        if (!mount_propagation_flag_is_valid(n))
2✔
1636
                return NULL;
1637

1638
        return mount_propagation_flag_to_string(n);
2✔
1639
}
1640

1641
static BUS_DEFINE_SET_TRANSIENT(nsec, "t", uint64_t, nsec_t, NSEC_FMT);
×
UNCOV
1642
static BUS_DEFINE_SET_TRANSIENT_IS_VALID(log_level, "i", int32_t, int, "%" PRIi32, log_level_is_valid);
×
1643
#if HAVE_SECCOMP
UNCOV
1644
static BUS_DEFINE_SET_TRANSIENT_IS_VALID(errno, "i", int32_t, int, "%" PRIi32, seccomp_errno_or_action_is_valid);
×
1645
#endif
UNCOV
1646
static BUS_DEFINE_SET_TRANSIENT_PARSE(std_input, ExecInput, exec_input_from_string);
×
1647
static BUS_DEFINE_SET_TRANSIENT_PARSE(std_output, ExecOutput, exec_output_from_string);
60✔
UNCOV
1648
static BUS_DEFINE_SET_TRANSIENT_PARSE(utmp_mode, ExecUtmpMode, exec_utmp_mode_from_string);
×
1649
static BUS_DEFINE_SET_TRANSIENT_PARSE(protect_system, ProtectSystem, protect_system_from_string);
2✔
1650
static BUS_DEFINE_SET_TRANSIENT_PARSE(protect_home, ProtectHome, protect_home_from_string);
6✔
UNCOV
1651
static BUS_DEFINE_SET_TRANSIENT_PARSE(keyring_mode, ExecKeyringMode, exec_keyring_mode_from_string);
×
1652
static BUS_DEFINE_SET_TRANSIENT_PARSE(protect_proc, ProtectProc, protect_proc_from_string);
10✔
1653
static BUS_DEFINE_SET_TRANSIENT_PARSE(proc_subset, ProcSubset, proc_subset_from_string);
6✔
1654
BUS_DEFINE_SET_TRANSIENT_PARSE(exec_preserve_mode, ExecPreserveMode, exec_preserve_mode_from_string);
10✔
1655
static BUS_DEFINE_SET_TRANSIENT_PARSE_PTR(personality, unsigned long, parse_personality);
×
UNCOV
1656
static BUS_DEFINE_SET_TRANSIENT_TO_STRING_ALLOC(secure_bits, "i", int32_t, int, "%" PRIi32, secure_bits_to_string_alloc_with_check);
×
1657
static BUS_DEFINE_SET_TRANSIENT_TO_STRING_ALLOC(capability, "t", uint64_t, uint64_t, "%" PRIu64, capability_set_to_string);
10✔
1658
static BUS_DEFINE_SET_TRANSIENT_TO_STRING_ALLOC(namespace_flag, "t", uint64_t, unsigned long, "%" PRIu64, namespace_flags_to_string);
20✔
1659
static BUS_DEFINE_SET_TRANSIENT_TO_STRING(mount_propagation_flag, "t", uint64_t, unsigned long, "%" PRIu64, mount_propagation_flag_to_string_with_check);
2✔
1660

1661
int bus_exec_context_set_transient_property(
1,114✔
1662
                Unit *u,
1663
                ExecContext *c,
1664
                const char *name,
1665
                sd_bus_message *message,
1666
                UnitWriteFlags flags,
1667
                sd_bus_error *error) {
1668

1669
        const char *suffix;
1,114✔
1670
        int r;
1,114✔
1671

1672
        assert(u);
1,114✔
1673
        assert(c);
1,114✔
1674
        assert(name);
1,114✔
1675
        assert(message);
1,114✔
1676

1677
        flags |= UNIT_PRIVATE;
1,114✔
1678

1679
        if (streq(name, "User"))
1,114✔
1680
                return bus_set_transient_user_relaxed(u, name, &c->user, message, flags, error);
26✔
1681

1682
        if (streq(name, "Group"))
1,088✔
1683
                return bus_set_transient_user_relaxed(u, name, &c->group, message, flags, error);
4✔
1684

1685
        if (streq(name, "SetLoginEnvironment"))
1,084✔
UNCOV
1686
                return bus_set_transient_tristate(u, name, &c->set_login_environment, message, flags, error);
×
1687

1688
        if (streq(name, "TTYPath"))
1,084✔
UNCOV
1689
                return bus_set_transient_path(u, name, &c->tty_path, message, flags, error);
×
1690

1691
        if (streq(name, "RootImage"))
1,084✔
1692
                return bus_set_transient_path(u, name, &c->root_image, message, flags, error);
2✔
1693

1694
        if (streq(name, "RootImageOptions")) {
1,082✔
1695
                _cleanup_(mount_options_free_allp) MountOptions *options = NULL;
×
UNCOV
1696
                _cleanup_free_ char *format_str = NULL;
×
1697

1698
                r = bus_read_mount_options(message, error, &options, &format_str, " ");
×
UNCOV
1699
                if (r < 0)
×
1700
                        return r;
1701

1702
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
1703
                        if (options) {
×
1704
                                LIST_JOIN(mount_options, c->root_image_options, options);
×
1705
                                unit_write_settingf(
×
UNCOV
1706
                                                u, flags|UNIT_ESCAPE_SPECIFIERS, name,
×
1707
                                                "%s=%s",
1708
                                                name,
1709
                                                format_str);
1710
                        } else {
1711
                                c->root_image_options = mount_options_free_all(c->root_image_options);
×
UNCOV
1712
                                unit_write_settingf(u, flags, name, "%s=", name);
×
1713
                        }
1714
                }
1715

UNCOV
1716
                return 1;
×
1717
        }
1718

1719
        if (streq(name, "RootHash")) {
1,082✔
1720
                const void *roothash_decoded;
×
UNCOV
1721
                size_t roothash_decoded_size;
×
1722

1723
                r = sd_bus_message_read_array(message, 'y', &roothash_decoded, &roothash_decoded_size);
×
1724
                if (r < 0)
×
UNCOV
1725
                        return r;
×
1726

1727
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
UNCOV
1728
                        _cleanup_free_ char *encoded = NULL;
×
1729

1730
                        if (roothash_decoded_size == 0) {
×
1731
                                c->root_hash_path = mfree(c->root_hash_path);
×
1732
                                c->root_hash = mfree(c->root_hash);
×
UNCOV
1733
                                c->root_hash_size = 0;
×
1734

UNCOV
1735
                                unit_write_settingf(u, flags, name, "RootHash=");
×
1736
                        } else {
UNCOV
1737
                                _cleanup_free_ void *p = NULL;
×
1738

1739
                                encoded = hexmem(roothash_decoded, roothash_decoded_size);
×
UNCOV
1740
                                if (!encoded)
×
1741
                                        return -ENOMEM;
1742

1743
                                p = memdup(roothash_decoded, roothash_decoded_size);
×
UNCOV
1744
                                if (!p)
×
1745
                                        return -ENOMEM;
1746

1747
                                free_and_replace(c->root_hash, p);
×
1748
                                c->root_hash_size = roothash_decoded_size;
×
UNCOV
1749
                                c->root_hash_path = mfree(c->root_hash_path);
×
1750

UNCOV
1751
                                unit_write_settingf(u, flags, name, "RootHash=%s", encoded);
×
1752
                        }
1753
                }
1754

UNCOV
1755
                return 1;
×
1756
        }
1757

1758
        if (streq(name, "RootHashPath")) {
1,082✔
1759
                c->root_hash_size = 0;
×
UNCOV
1760
                c->root_hash = mfree(c->root_hash);
×
1761

UNCOV
1762
                return bus_set_transient_path(u, "RootHash", &c->root_hash_path, message, flags, error);
×
1763
        }
1764

1765
        if (streq(name, "RootHashSignature")) {
1,082✔
1766
                const void *roothash_sig_decoded;
×
UNCOV
1767
                size_t roothash_sig_decoded_size;
×
1768

1769
                r = sd_bus_message_read_array(message, 'y', &roothash_sig_decoded, &roothash_sig_decoded_size);
×
1770
                if (r < 0)
×
UNCOV
1771
                        return r;
×
1772

1773
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
UNCOV
1774
                        _cleanup_free_ char *encoded = NULL;
×
1775

1776
                        if (roothash_sig_decoded_size == 0) {
×
1777
                                c->root_hash_sig_path = mfree(c->root_hash_sig_path);
×
1778
                                c->root_hash_sig = mfree(c->root_hash_sig);
×
UNCOV
1779
                                c->root_hash_sig_size = 0;
×
1780

UNCOV
1781
                                unit_write_settingf(u, flags, name, "RootHashSignature=");
×
1782
                        } else {
1783
                                _cleanup_free_ void *p = NULL;
×
UNCOV
1784
                                ssize_t len;
×
1785

1786
                                len = base64mem(roothash_sig_decoded, roothash_sig_decoded_size, &encoded);
×
UNCOV
1787
                                if (len < 0)
×
1788
                                        return -ENOMEM;
1789

1790
                                p = memdup(roothash_sig_decoded, roothash_sig_decoded_size);
×
UNCOV
1791
                                if (!p)
×
1792
                                        return -ENOMEM;
1793

1794
                                free_and_replace(c->root_hash_sig, p);
×
1795
                                c->root_hash_sig_size = roothash_sig_decoded_size;
×
UNCOV
1796
                                c->root_hash_sig_path = mfree(c->root_hash_sig_path);
×
1797

UNCOV
1798
                                unit_write_settingf(u, flags, name, "RootHashSignature=base64:%s", encoded);
×
1799
                        }
1800
                }
1801

UNCOV
1802
                return 1;
×
1803
        }
1804

1805
        if (streq(name, "RootHashSignaturePath")) {
1,082✔
1806
                c->root_hash_sig_size = 0;
×
UNCOV
1807
                c->root_hash_sig = mfree(c->root_hash_sig);
×
1808

UNCOV
1809
                return bus_set_transient_path(u, "RootHashSignature", &c->root_hash_sig_path, message, flags, error);
×
1810
        }
1811

1812
        if (streq(name, "RootVerity"))
1,082✔
UNCOV
1813
                return bus_set_transient_path(u, name, &c->root_verity, message, flags, error);
×
1814

1815
        if (streq(name, "RootDirectory"))
1,082✔
1816
                return bus_set_transient_path(u, name, &c->root_directory, message, flags, error);
8✔
1817

1818
        if (streq(name, "RootEphemeral"))
1,074✔
UNCOV
1819
                return bus_set_transient_bool(u, name, &c->root_ephemeral, message, flags, error);
×
1820

1821
        if (streq(name, "SyslogIdentifier"))
1,074✔
UNCOV
1822
                return bus_set_transient_string(u, name, &c->syslog_identifier, message, flags, error);
×
1823

1824
        if (streq(name, "LogLevelMax"))
1,074✔
UNCOV
1825
                return bus_set_transient_log_level(u, name, &c->log_level_max, message, flags, error);
×
1826

1827
        if (streq(name, "LogRateLimitIntervalUSec"))
1,074✔
UNCOV
1828
                return bus_set_transient_usec(u, name, &c->log_ratelimit.interval, message, flags, error);
×
1829

1830
        if (streq(name, "LogRateLimitBurst"))
1,074✔
UNCOV
1831
                return bus_set_transient_unsigned(u, name, &c->log_ratelimit.burst, message, flags, error);
×
1832

1833
        if (streq(name, "LogFilterPatterns")) {
1,074✔
1834
                /* Use _cleanup_free_, not _cleanup_strv_free_, as we don't want the content of the strv
1835
                 * to be freed. */
1836
                _cleanup_free_ char **allow_list = NULL, **deny_list = NULL;
×
1837
                const char *pattern;
×
UNCOV
1838
                int is_allowlist;
×
1839

1840
                r = sd_bus_message_enter_container(message, 'a', "(bs)");
×
UNCOV
1841
                if (r < 0)
×
1842
                        return r;
1843

1844
                while ((r = sd_bus_message_read(message, "(bs)", &is_allowlist, &pattern)) > 0) {
×
UNCOV
1845
                        _cleanup_(pattern_freep) pcre2_code *compiled_pattern = NULL;
×
1846

1847
                        if (isempty(pattern))
×
UNCOV
1848
                                continue;
×
1849

1850
                        r = pattern_compile_and_log(pattern, 0, &compiled_pattern);
×
UNCOV
1851
                        if (r < 0)
×
1852
                                return r;
1853

1854
                        r = strv_push(is_allowlist ? &allow_list : &deny_list, (char *)pattern);
×
UNCOV
1855
                        if (r < 0)
×
1856
                                return r;
1857
                }
UNCOV
1858
                if (r < 0)
×
1859
                        return r;
1860

1861
                r = sd_bus_message_exit_container(message);
×
UNCOV
1862
                if (r < 0)
×
1863
                        return r;
1864

1865
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
1866
                        if (strv_isempty(allow_list) && strv_isempty(deny_list)) {
×
1867
                                c->log_filter_allowed_patterns = set_free(c->log_filter_allowed_patterns);
×
1868
                                c->log_filter_denied_patterns = set_free(c->log_filter_denied_patterns);
×
UNCOV
1869
                                unit_write_settingf(u, flags, name, "%s=", name);
×
1870
                        } else {
1871
                                r = set_put_strdupv(&c->log_filter_allowed_patterns, allow_list);
×
UNCOV
1872
                                if (r < 0)
×
1873
                                        return r;
1874
                                r = set_put_strdupv(&c->log_filter_denied_patterns, deny_list);
×
UNCOV
1875
                                if (r < 0)
×
1876
                                        return r;
1877

1878
                                STRV_FOREACH(unit_pattern, allow_list)
×
1879
                                        unit_write_settingf(u, flags, name, "%s=%s", name, *unit_pattern);
×
1880
                                STRV_FOREACH(unit_pattern, deny_list)
×
UNCOV
1881
                                        unit_write_settingf(u, flags, name, "%s=~%s", name, *unit_pattern);
×
1882
                        }
1883
                }
1884

UNCOV
1885
                return 1;
×
1886
        }
1887

1888
        if (streq(name, "Personality"))
1,074✔
UNCOV
1889
                return bus_set_transient_personality(u, name, &c->personality, message, flags, error);
×
1890

1891
        if (streq(name, "StandardInput"))
1,074✔
UNCOV
1892
                return bus_set_transient_std_input(u, name, &c->std_input, message, flags, error);
×
1893

1894
        if (streq(name, "StandardOutput"))
1,074✔
1895
                return bus_set_transient_std_output(u, name, &c->std_output, message, flags, error);
30✔
1896

1897
        if (streq(name, "StandardError"))
1,044✔
1898
                return bus_set_transient_std_output(u, name, &c->std_error, message, flags, error);
30✔
1899

1900
        if (streq(name, "IgnoreSIGPIPE"))
1,014✔
UNCOV
1901
                return bus_set_transient_bool(u, name, &c->ignore_sigpipe, message, flags, error);
×
1902

1903
        if (streq(name, "TTYVHangup"))
1,014✔
UNCOV
1904
                return bus_set_transient_bool(u, name, &c->tty_vhangup, message, flags, error);
×
1905

1906
        if (streq(name, "TTYReset"))
1,014✔
UNCOV
1907
                return bus_set_transient_bool(u, name, &c->tty_reset, message, flags, error);
×
1908

1909
        if (streq(name, "TTYVTDisallocate"))
1,014✔
UNCOV
1910
                return bus_set_transient_bool(u, name, &c->tty_vt_disallocate, message, flags, error);
×
1911

1912
        if (streq(name, "TTYRows"))
1,014✔
UNCOV
1913
                return bus_set_transient_unsigned(u, name, &c->tty_rows, message, flags, error);
×
1914

1915
        if (streq(name, "TTYColumns"))
1,014✔
UNCOV
1916
                return bus_set_transient_unsigned(u, name, &c->tty_cols, message, flags, error);
×
1917

1918
        if (streq(name, "PrivateTmp")) {
1,014✔
1919
                int v;
10✔
1920

1921
                r = sd_bus_message_read(message, "b", &v);
10✔
1922
                if (r < 0)
10✔
1923
                        return r;
10✔
1924

1925
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
10✔
1926
                        c->private_tmp = v ? PRIVATE_TMP_CONNECTED : PRIVATE_TMP_NO;
5✔
1927
                        (void) unit_write_settingf(u, flags, name, "%s=%s", name, yes_no(v));
5✔
1928
                }
1929

1930
                return 1;
10✔
1931

1932
        } else if (streq(name, "PrivateTmpEx")) {
1,004✔
1933
                const char *s;
×
UNCOV
1934
                PrivateTmp t;
×
1935

1936
                r = sd_bus_message_read(message, "s", &s);
×
1937
                if (r < 0)
×
UNCOV
1938
                        return r;
×
1939

1940
                t = private_tmp_from_string(s);
×
1941
                if (t < 0)
×
UNCOV
1942
                        return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid %s setting: %s", name, s);
×
1943

1944
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
1945
                        c->private_tmp = t;
×
UNCOV
1946
                        (void) unit_write_settingf(u, flags, name, "PrivateTmp=%s",
×
1947
                                                   private_tmp_to_string(c->private_tmp));
1948
                }
1949

UNCOV
1950
                return 1;
×
1951
        }
1952

1953
        if (streq(name, "PrivateUsers")) {
1,004✔
1954
                int v;
8✔
1955

1956
                r = sd_bus_message_read(message, "b", &v);
8✔
1957
                if (r < 0)
8✔
1958
                        return r;
8✔
1959

1960
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
8✔
1961
                        c->private_users = v ? PRIVATE_USERS_SELF : PRIVATE_USERS_NO;
4✔
1962
                        (void) unit_write_settingf(u, flags, name, "%s=%s", name, yes_no(v));
4✔
1963
                }
1964

1965
                return 1;
8✔
1966

1967
        } else if (streq(name, "PrivateUsersEx")) {
996✔
1968
                const char *s;
18✔
1969
                PrivateUsers t;
18✔
1970

1971
                r = sd_bus_message_read(message, "s", &s);
18✔
1972
                if (r < 0)
18✔
1973
                        return r;
18✔
1974

1975
                t = private_users_from_string(s);
18✔
1976
                if (t < 0)
18✔
UNCOV
1977
                        return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid %s setting: %s", name, s);
×
1978

1979
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
18✔
1980
                        c->private_users = t;
9✔
1981
                        (void) unit_write_settingf(u, flags, name, "PrivateUsers=%s",
9✔
1982
                                                   private_users_to_string(c->private_users));
1983
                }
1984

1985
                return 1;
18✔
1986
        }
1987

1988
        if (streq(name, "ProtectControlGroups")) {
978✔
UNCOV
1989
                int v;
×
1990

1991
                r = sd_bus_message_read(message, "b", &v);
×
1992
                if (r < 0)
×
UNCOV
1993
                        return r;
×
1994

1995
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
1996
                        c->protect_control_groups = v ? PROTECT_CONTROL_GROUPS_YES : PROTECT_CONTROL_GROUPS_NO;
×
UNCOV
1997
                        (void) unit_write_settingf(u, flags, name, "%s=%s", name, yes_no(v));
×
1998
                }
1999

UNCOV
2000
                return 1;
×
2001
        }
2002

2003
        if (streq(name, "ProtectControlGroupsEx")) {
978✔
2004
                const char *s;
2✔
2005
                ProtectControlGroups t;
2✔
2006

2007
                r = sd_bus_message_read(message, "s", &s);
2✔
2008
                if (r < 0)
2✔
2009
                        return r;
2✔
2010

2011
                t = protect_control_groups_from_string(s);
2✔
2012
                if (t < 0)
2✔
UNCOV
2013
                        return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid %s setting: %s", name, s);
×
2014

2015
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
2✔
2016
                        c->protect_control_groups = t;
1✔
2017
                        (void) unit_write_settingf(u, flags, name, "ProtectControlGroups=%s",
1✔
2018
                                                   protect_control_groups_to_string(c->protect_control_groups));
2019
                }
2020

2021
                return 1;
2✔
2022
        }
2023

2024
        if (streq(name, "PrivatePIDs")) {
976✔
2025
                const char *s;
8✔
2026
                PrivatePIDs t;
8✔
2027

2028
                r = sd_bus_message_read(message, "s", &s);
8✔
2029
                if (r < 0)
8✔
2030
                        return r;
8✔
2031

2032
                t = private_pids_from_string(s);
8✔
2033
                if (t < 0)
8✔
UNCOV
2034
                        return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid %s setting: %s", name, s);
×
2035

2036
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
8✔
2037
                        c->private_pids = t;
4✔
2038
                        (void) unit_write_settingf(u, flags, name, "%s=%s",
4✔
2039
                                                   name, private_pids_to_string(c->private_pids));
2040
                }
2041

2042
                return 1;
8✔
2043
        }
2044

2045
        if (streq(name, "ProtectHostname")) {
968✔
2046
                int v;
4✔
2047

2048
                r = sd_bus_message_read(message, "b", &v);
4✔
2049
                if (r < 0)
4✔
2050
                        return r;
4✔
2051

2052
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
4✔
2053
                        c->protect_hostname = v ? PROTECT_HOSTNAME_YES : PROTECT_HOSTNAME_NO;
2✔
2054
                        (void) unit_write_settingf(u, flags, name, "%s=%s", name, yes_no(v));
2✔
2055
                }
2056

2057
                return 1;
4✔
2058

2059
        }
2060

2061
        if (streq(name, "ProtectHostnameEx")) {
964✔
2062
                const char *s, *h = NULL;
4✔
2063

2064
                r = sd_bus_message_read(message, "(ss)", &s, &h);
4✔
2065
                if (r < 0)
4✔
2066
                        return r;
4✔
2067

2068
                if (!isempty(h) && !hostname_is_valid(h, /* flags = */ 0))
4✔
UNCOV
2069
                        return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid hostname in %s setting: %s", name, h);
×
2070

2071
                ProtectHostname t = protect_hostname_from_string(s);
4✔
2072
                if (t < 0 || (t == PROTECT_HOSTNAME_NO && !isempty(h)))
4✔
UNCOV
2073
                        return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid %s setting: %s", name, s);
×
2074

2075
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
4✔
2076
                        c->protect_hostname = t;
2✔
2077
                        r = free_and_strdup(&c->private_hostname, empty_to_null(h));
4✔
2078
                        if (r < 0)
2✔
2079
                                return r;
2080

2081
                        (void) unit_write_settingf(u, flags, name, "ProtectHostname=%s%s%s",
4✔
2082
                                                   protect_hostname_to_string(c->protect_hostname),
2083
                                                   c->private_hostname ? ":" : "",
2084
                                                   strempty(c->private_hostname));
2✔
2085
                }
2086

2087
                return 1;
4✔
2088
        }
2089

2090
        if (streq(name, "PrivateDevices"))
960✔
2091
                return bus_set_transient_bool(u, name, &c->private_devices, message, flags, error);
4✔
2092

2093
        if (streq(name, "PrivateMounts"))
956✔
2094
                return bus_set_transient_tristate(u, name, &c->private_mounts, message, flags, error);
20✔
2095

2096
        if (streq(name, "MountAPIVFS"))
936✔
2097
                return bus_set_transient_tristate(u, name, &c->mount_apivfs, message, flags, error);
4✔
2098

2099
        if (streq(name, "BindLogSockets"))
932✔
UNCOV
2100
                return bus_set_transient_tristate(u, name, &c->bind_log_sockets, message, flags, error);
×
2101

2102
        if (streq(name, "PrivateNetwork"))
932✔
2103
                return bus_set_transient_bool(u, name, &c->private_network, message, flags, error);
8✔
2104

2105
        if (streq(name, "PrivateIPC"))
924✔
2106
                return bus_set_transient_bool(u, name, &c->private_ipc, message, flags, error);
4✔
2107

2108
        if (streq(name, "NoNewPrivileges"))
920✔
2109
                return bus_set_transient_bool(u, name, &c->no_new_privileges, message, flags, error);
2✔
2110

2111
        if (streq(name, "SyslogLevelPrefix"))
918✔
UNCOV
2112
                return bus_set_transient_bool(u, name, &c->syslog_level_prefix, message, flags, error);
×
2113

2114
        if (streq(name, "MemoryDenyWriteExecute"))
918✔
UNCOV
2115
                return bus_set_transient_bool(u, name, &c->memory_deny_write_execute, message, flags, error);
×
2116

2117
        if (streq(name, "RestrictRealtime"))
918✔
UNCOV
2118
                return bus_set_transient_bool(u, name, &c->restrict_realtime, message, flags, error);
×
2119

2120
        if (streq(name, "RestrictSUIDSGID"))
918✔
UNCOV
2121
                return bus_set_transient_bool(u, name, &c->restrict_suid_sgid, message, flags, error);
×
2122

2123
        if (streq(name, "DynamicUser"))
918✔
2124
                return bus_set_transient_bool(u, name, &c->dynamic_user, message, flags, error);
2✔
2125

2126
        if (streq(name, "RemoveIPC"))
916✔
UNCOV
2127
                return bus_set_transient_bool(u, name, &c->remove_ipc, message, flags, error);
×
2128

2129
        if (streq(name, "ProtectKernelTunables"))
916✔
2130
                return bus_set_transient_bool(u, name, &c->protect_kernel_tunables, message, flags, error);
4✔
2131

2132
        if (streq(name, "ProtectKernelModules"))
912✔
2133
                return bus_set_transient_bool(u, name, &c->protect_kernel_modules, message, flags, error);
4✔
2134

2135
        if (streq(name, "ProtectKernelLogs"))
908✔
2136
                return bus_set_transient_bool(u, name, &c->protect_kernel_logs, message, flags, error);
2✔
2137

2138
        if (streq(name, "ProtectClock"))
906✔
2139
                return bus_set_transient_bool(u, name, &c->protect_clock, message, flags, error);
4✔
2140

2141
        if (streq(name, "CPUSchedulingResetOnFork"))
902✔
UNCOV
2142
                return bus_set_transient_bool(u, name, &c->cpu_sched_reset_on_fork, message, flags, error);
×
2143

2144
        if (streq(name, "NonBlocking"))
902✔
UNCOV
2145
                return bus_set_transient_bool(u, name, &c->non_blocking, message, flags, error);
×
2146

2147
        if (streq(name, "LockPersonality"))
902✔
2148
                return bus_set_transient_bool(u, name, &c->lock_personality, message, flags, error);
2✔
2149

2150
        if (streq(name, "MemoryKSM"))
900✔
UNCOV
2151
                return bus_set_transient_tristate(u, name, &c->memory_ksm, message, flags, error);
×
2152

2153
        if (streq(name, "UtmpIdentifier"))
900✔
UNCOV
2154
                return bus_set_transient_string(u, name, &c->utmp_id, message, flags, error);
×
2155

2156
        if (streq(name, "UtmpMode"))
900✔
UNCOV
2157
                return bus_set_transient_utmp_mode(u, name, &c->utmp_mode, message, flags, error);
×
2158

2159
        if (streq(name, "PAMName"))
900✔
2160
                return bus_set_transient_string(u, name, &c->pam_name, message, flags, error);
10✔
2161

2162
        if (streq(name, "TimerSlackNSec"))
890✔
UNCOV
2163
                return bus_set_transient_nsec(u, name, &c->timer_slack_nsec, message, flags, error);
×
2164

2165
        if (streq(name, "ProtectSystem"))
890✔
2166
                return bus_set_transient_protect_system(u, name, &c->protect_system, message, flags, error);
2✔
2167

2168
        if (streq(name, "ProtectHome"))
888✔
2169
                return bus_set_transient_protect_home(u, name, &c->protect_home, message, flags, error);
6✔
2170

2171
        if (streq(name, "KeyringMode"))
882✔
UNCOV
2172
                return bus_set_transient_keyring_mode(u, name, &c->keyring_mode, message, flags, error);
×
2173

2174
        if (streq(name, "ProtectProc"))
882✔
2175
                return bus_set_transient_protect_proc(u, name, &c->protect_proc, message, flags, error);
10✔
2176

2177
        if (streq(name, "ProcSubset"))
872✔
2178
                return bus_set_transient_proc_subset(u, name, &c->proc_subset, message, flags, error);
6✔
2179

2180
        if (streq(name, "RuntimeDirectoryPreserve"))
866✔
2181
                return bus_set_transient_exec_preserve_mode(u, name, &c->runtime_directory_preserve_mode, message, flags, error);
10✔
2182

2183
        if (streq(name, "UMask"))
856✔
UNCOV
2184
                return bus_set_transient_mode_t(u, name, &c->umask, message, flags, error);
×
2185

2186
        if (streq(name, "RuntimeDirectoryMode"))
856✔
UNCOV
2187
                return bus_set_transient_mode_t(u, name, &c->directories[EXEC_DIRECTORY_RUNTIME].mode, message, flags, error);
×
2188

2189
        if (streq(name, "StateDirectoryMode"))
856✔
2190
                return bus_set_transient_mode_t(u, name, &c->directories[EXEC_DIRECTORY_STATE].mode, message, flags, error);
10✔
2191

2192
        if (streq(name, "CacheDirectoryMode"))
846✔
2193
                return bus_set_transient_mode_t(u, name, &c->directories[EXEC_DIRECTORY_CACHE].mode, message, flags, error);
20✔
2194

2195
        if (streq(name, "LogsDirectoryMode"))
826✔
UNCOV
2196
                return bus_set_transient_mode_t(u, name, &c->directories[EXEC_DIRECTORY_LOGS].mode, message, flags, error);
×
2197

2198
        if (streq(name, "ConfigurationDirectoryMode"))
826✔
2199
                return bus_set_transient_mode_t(u, name, &c->directories[EXEC_DIRECTORY_CONFIGURATION].mode, message, flags, error);
10✔
2200

2201
        if (streq(name, "SELinuxContext"))
816✔
UNCOV
2202
                return bus_set_transient_string(u, name, &c->selinux_context, message, flags, error);
×
2203

2204
        if (streq(name, "SecureBits"))
816✔
UNCOV
2205
                return bus_set_transient_secure_bits(u, name, &c->secure_bits, message, flags, error);
×
2206

2207
        if (streq(name, "CapabilityBoundingSet"))
816✔
2208
                return bus_set_transient_capability(u, name, &c->capability_bounding_set, message, flags, error);
2✔
2209

2210
        if (streq(name, "AmbientCapabilities"))
814✔
2211
                return bus_set_transient_capability(u, name, &c->capability_ambient_set, message, flags, error);
8✔
2212

2213
        if (streq(name, "RestrictNamespaces"))
806✔
UNCOV
2214
                return bus_set_transient_namespace_flag(u, name, &c->restrict_namespaces, message, flags, error);
×
2215

2216
        if (streq(name, "DelegateNamespaces"))
806✔
2217
                return bus_set_transient_namespace_flag(u, name, &c->delegate_namespaces, message, flags, error);
18✔
2218

2219
        if (streq(name, "RestrictFileSystems")) {
788✔
2220
                int allow_list;
×
UNCOV
2221
                _cleanup_strv_free_ char **l = NULL;
×
2222

2223
                r = sd_bus_message_enter_container(message, 'r', "bas");
×
UNCOV
2224
                if (r < 0)
×
2225
                        return r;
2226

2227
                r = sd_bus_message_read(message, "b", &allow_list);
×
UNCOV
2228
                if (r < 0)
×
2229
                        return r;
2230

2231
                r = sd_bus_message_read_strv(message, &l);
×
UNCOV
2232
                if (r < 0)
×
2233
                        return r;
2234

2235
                r = sd_bus_message_exit_container(message);
×
UNCOV
2236
                if (r < 0)
×
2237
                        return r;
2238

2239
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
2240
                        _cleanup_free_ char *joined = NULL;
×
UNCOV
2241
                        FilesystemParseFlags invert_flag = allow_list ? 0 : FILESYSTEM_PARSE_INVERT;
×
2242

2243
                        if (strv_isempty(l)) {
×
2244
                                c->restrict_filesystems_allow_list = false;
×
UNCOV
2245
                                c->restrict_filesystems = set_free(c->restrict_filesystems);
×
2246

UNCOV
2247
                                unit_write_setting(u, flags, name, "RestrictFileSystems=");
×
2248
                                return 1;
2249
                        }
2250

2251
                        if (!c->restrict_filesystems)
×
UNCOV
2252
                                c->restrict_filesystems_allow_list = allow_list;
×
2253

2254
                        STRV_FOREACH(s, l) {
×
UNCOV
2255
                                r = bpf_restrict_fs_parse_filesystem(
×
2256
                                              *s,
2257
                                              &c->restrict_filesystems,
2258
                                              FILESYSTEM_PARSE_LOG|
×
2259
                                              (invert_flag ? FILESYSTEM_PARSE_INVERT : 0)|
×
2260
                                              (c->restrict_filesystems_allow_list ? FILESYSTEM_PARSE_ALLOW_LIST : 0),
×
2261
                                              u->id, NULL, 0);
×
UNCOV
2262
                                if (r < 0)
×
2263
                                        return r;
2264
                        }
2265

2266
                        joined = strv_join(l, " ");
×
UNCOV
2267
                        if (!joined)
×
2268
                                return -ENOMEM;
2269

UNCOV
2270
                        unit_write_settingf(u, flags, name, "%s=%s%s", name, allow_list ? "" : "~", joined);
×
2271
                }
2272

UNCOV
2273
                return 1;
×
2274
        }
2275

2276
        if (streq(name, "MountFlags"))
788✔
2277
                return bus_set_transient_mount_propagation_flag(u, name, &c->mount_propagation_flag, message, flags, error);
2✔
2278

2279
        if (streq(name, "NetworkNamespacePath"))
786✔
UNCOV
2280
                return bus_set_transient_path(u, name, &c->network_namespace_path, message, flags, error);
×
2281

2282
        if (streq(name, "IPCNamespacePath"))
786✔
UNCOV
2283
                return bus_set_transient_path(u, name, &c->ipc_namespace_path, message, flags, error);
×
2284

2285
        if (streq(name, "SupplementaryGroups")) {
786✔
UNCOV
2286
                _cleanup_strv_free_ char **l = NULL;
×
2287

2288
                r = sd_bus_message_read_strv(message, &l);
×
UNCOV
2289
                if (r < 0)
×
2290
                        return r;
2291

2292
                STRV_FOREACH(p, l)
×
2293
                        if (!isempty(*p) && !valid_user_group_name(*p, VALID_USER_ALLOW_NUMERIC|VALID_USER_RELAX|VALID_USER_WARN))
×
UNCOV
2294
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS,
×
2295
                                                         "Invalid supplementary group names");
2296

2297
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
2298
                        if (strv_isempty(l)) {
×
2299
                                c->supplementary_groups = strv_free(c->supplementary_groups);
×
UNCOV
2300
                                unit_write_settingf(u, flags, name, "%s=", name);
×
2301
                        } else {
UNCOV
2302
                                _cleanup_free_ char *joined = NULL;
×
2303

2304
                                r = strv_extend_strv(&c->supplementary_groups, l, true);
×
UNCOV
2305
                                if (r < 0)
×
2306
                                        return r;
2307

2308
                                joined = strv_join(c->supplementary_groups, " ");
×
UNCOV
2309
                                if (!joined)
×
2310
                                        return -ENOMEM;
2311

UNCOV
2312
                                unit_write_settingf(u, flags|UNIT_ESCAPE_SPECIFIERS, name, "%s=%s", name, joined);
×
2313
                        }
2314
                }
2315

UNCOV
2316
                return 1;
×
2317

2318
        } else if (STR_IN_SET(name, "SetCredential", "SetCredentialEncrypted")) {
786✔
UNCOV
2319
                bool isempty = true;
×
2320

2321
                r = sd_bus_message_enter_container(message, 'a', "(say)");
×
UNCOV
2322
                if (r < 0)
×
2323
                        return r;
4✔
2324

2325
                for (;;) {
×
2326
                        const char *id;
×
2327
                        const void *p;
×
UNCOV
2328
                        size_t sz;
×
2329

2330
                        r = sd_bus_message_enter_container(message, 'r', "say");
×
2331
                        if (r < 0)
×
2332
                                return r;
×
UNCOV
2333
                        if (r == 0)
×
2334
                                break;
2335

2336
                        r = sd_bus_message_read(message, "s", &id);
×
UNCOV
2337
                        if (r < 0)
×
2338
                                return r;
2339

2340
                        r = sd_bus_message_read_array(message, 'y', &p, &sz);
×
UNCOV
2341
                        if (r < 0)
×
2342
                                return r;
2343

2344
                        r = sd_bus_message_exit_container(message);
×
UNCOV
2345
                        if (r < 0)
×
2346
                                return r;
2347

2348
                        if (!credential_name_valid(id))
×
UNCOV
2349
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Credential ID is invalid: %s", id);
×
2350

UNCOV
2351
                        isempty = false;
×
2352

2353
                        if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
2354
                                bool encrypted = endswith(name, "Encrypted");
×
2355
                                _cleanup_free_ char *a = NULL, *b = NULL;
×
UNCOV
2356
                                _cleanup_free_ void *copy = NULL;
×
2357

2358
                                copy = memdup(p, sz);
×
UNCOV
2359
                                if (!copy)
×
2360
                                        return -ENOMEM;
2361

2362
                                a = specifier_escape(id);
×
UNCOV
2363
                                if (!a)
×
2364
                                        return -ENOMEM;
2365

2366
                                b = cescape_length(p, sz);
×
UNCOV
2367
                                if (!b)
×
2368
                                        return -ENOMEM;
2369

2370
                                r = exec_context_put_set_credential(c, id, TAKE_PTR(copy), sz, encrypted);
×
UNCOV
2371
                                if (r < 0)
×
2372
                                        return r;
2373

UNCOV
2374
                                (void) unit_write_settingf(u, flags, name, "%s=%s:%s", name, a, b);
×
2375
                        }
2376
                }
2377

2378
                r = sd_bus_message_exit_container(message);
×
UNCOV
2379
                if (r < 0)
×
2380
                        return r;
2381

2382
                if (!UNIT_WRITE_FLAGS_NOOP(flags) && isempty) {
×
2383
                        c->set_credentials = hashmap_free(c->set_credentials);
×
UNCOV
2384
                        (void) unit_write_settingf(u, flags, name, "%s=", name);
×
2385
                }
2386

UNCOV
2387
                return 1;
×
2388

2389
        } else if (STR_IN_SET(name, "LoadCredential", "LoadCredentialEncrypted")) {
786✔
2390
                bool isempty = true;
2✔
2391

2392
                r = sd_bus_message_enter_container(message, 'a', "(ss)");
2✔
2393
                if (r < 0)
2✔
2394
                        return r;
4✔
2395

2396
                for (;;) {
2✔
2397
                        const char *id, *source;
4✔
2398

2399
                        r = sd_bus_message_read(message, "(ss)", &id, &source);
4✔
2400
                        if (r < 0)
4✔
UNCOV
2401
                                return r;
×
2402
                        if (r == 0)
4✔
2403
                                break;
2404

2405
                        if (!credential_name_valid(id))
2✔
UNCOV
2406
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Credential ID is invalid: %s", id);
×
2407

2408
                        if (!(path_is_absolute(source) ? path_is_normalized(source) : credential_name_valid(source)))
2✔
UNCOV
2409
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Credential source is invalid: %s", source);
×
2410

2411
                        isempty = false;
2✔
2412

2413
                        if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
2✔
2414
                                bool encrypted = endswith(name, "Encrypted");
1✔
2415

2416
                                r = exec_context_put_load_credential(c, id, source, encrypted);
1✔
2417
                                if (r < 0)
1✔
2418
                                        return r;
2419

2420
                                (void) unit_write_settingf(u, flags|UNIT_ESCAPE_SPECIFIERS, name, "%s=%s:%s", name, id, source);
1✔
2421
                        }
2422
                }
2423

2424
                r = sd_bus_message_exit_container(message);
2✔
2425
                if (r < 0)
2✔
2426
                        return r;
2427

2428
                if (!UNIT_WRITE_FLAGS_NOOP(flags) && isempty) {
2✔
2429
                        c->load_credentials = hashmap_free(c->load_credentials);
×
UNCOV
2430
                        (void) unit_write_settingf(u, flags, name, "%s=", name);
×
2431
                }
2432

2433
                return 1;
2✔
2434

2435
        } else if (STR_IN_SET(name, "ImportCredential", "ImportCredentialEx")) {
784✔
2436
                bool empty = true, ex = streq(name, "ImportCredentialEx");
2✔
2437

2438
                r = sd_bus_message_enter_container(message, 'a', ex ? "(ss)" : "s");
4✔
2439
                if (r < 0)
2✔
2440
                        return r;
2✔
2441

2442
                for (;;) {
2✔
2443
                        const char *glob, *rename = NULL;
4✔
2444

2445
                        if (ex)
4✔
UNCOV
2446
                                r = sd_bus_message_read(message, "(ss)", &glob, &rename);
×
2447
                        else
2448
                                r = sd_bus_message_read(message, "s", &glob);
4✔
2449
                        if (r < 0)
4✔
UNCOV
2450
                                return r;
×
2451
                        if (r == 0)
4✔
2452
                                break;
2453

2454
                        if (!credential_glob_valid(glob))
2✔
UNCOV
2455
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Credential name or glob is invalid: %s", glob);
×
2456

2457
                        rename = empty_to_null(rename);
2✔
2458

2459
                        if (rename && !credential_name_valid(rename))
2✔
UNCOV
2460
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Credential name is invalid: %s", rename);
×
2461

2462
                        empty = false;
2✔
2463

2464
                        if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
2✔
2465
                                r = exec_context_put_import_credential(c, glob, rename);
1✔
2466
                                if (r < 0)
1✔
2467
                                        return r;
2468

2469
                                (void) unit_write_settingf(u, flags|UNIT_ESCAPE_SPECIFIERS, name,
3✔
2470
                                                           "ImportCredential=%s%s%s",
2471
                                                           glob, rename ? ":" : "", strempty(rename));
2472
                        }
2473
                }
2474

2475
                r = sd_bus_message_exit_container(message);
2✔
2476
                if (r < 0)
2✔
2477
                        return r;
2478

2479
                if (!UNIT_WRITE_FLAGS_NOOP(flags) && empty) {
2✔
2480
                        c->import_credentials = ordered_set_free(c->import_credentials);
×
UNCOV
2481
                        (void) unit_write_settingf(u, flags, name, "%s=", name);
×
2482
                }
2483

2484
                return 1;
2✔
2485

2486
        } else if (streq(name, "SyslogLevel")) {
782✔
UNCOV
2487
                int32_t level;
×
2488

2489
                r = sd_bus_message_read(message, "i", &level);
×
2490
                if (r < 0)
×
UNCOV
2491
                        return r;
×
2492

2493
                if (!log_level_is_valid(level))
×
UNCOV
2494
                        return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Log level value out of range");
×
2495

2496
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
2497
                        c->syslog_priority = (c->syslog_priority & LOG_FACMASK) | level;
×
UNCOV
2498
                        unit_write_settingf(u, flags, name, "SyslogLevel=%i", level);
×
2499
                }
2500

UNCOV
2501
                return 1;
×
2502

2503
        } else if (streq(name, "SyslogFacility")) {
782✔
UNCOV
2504
                int32_t facility;
×
2505

2506
                r = sd_bus_message_read(message, "i", &facility);
×
2507
                if (r < 0)
×
UNCOV
2508
                        return r;
×
2509

2510
                if (!log_facility_unshifted_is_valid(facility))
×
UNCOV
2511
                        return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Log facility value out of range");
×
2512

2513
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
2514
                        c->syslog_priority = (facility << 3) | LOG_PRI(c->syslog_priority);
×
UNCOV
2515
                        unit_write_settingf(u, flags, name, "SyslogFacility=%i", facility);
×
2516
                }
2517

UNCOV
2518
                return 1;
×
2519

2520
        } else if (streq(name, "LogNamespace")) {
782✔
UNCOV
2521
                const char *n;
×
2522

2523
                r = sd_bus_message_read(message, "s", &n);
×
2524
                if (r < 0)
×
UNCOV
2525
                        return r;
×
2526

2527
                if (!isempty(n) && !log_namespace_name_valid(n))
×
UNCOV
2528
                        return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Log namespace name not valid");
×
2529

UNCOV
2530
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
2531

2532
                        if (isempty(n)) {
×
2533
                                c->log_namespace = mfree(c->log_namespace);
×
UNCOV
2534
                                unit_write_settingf(u, flags, name, "%s=", name);
×
2535
                        } else {
2536
                                r = free_and_strdup(&c->log_namespace, n);
×
UNCOV
2537
                                if (r < 0)
×
2538
                                        return r;
2539

UNCOV
2540
                                unit_write_settingf(u, flags, name, "%s=%s", name, n);
×
2541
                        }
2542
                }
2543

UNCOV
2544
                return 1;
×
2545

2546
        } else if (streq(name, "LogExtraFields")) {
782✔
UNCOV
2547
                size_t n = 0;
×
2548

2549
                r = sd_bus_message_enter_container(message, 'a', "ay");
×
UNCOV
2550
                if (r < 0)
×
2551
                        return r;
2552

2553
                for (;;) {
×
2554
                        _cleanup_free_ void *copy = NULL;
×
2555
                        const char *eq;
×
2556
                        const void *p;
×
UNCOV
2557
                        size_t sz;
×
2558

2559
                        /* Note that we expect a byte array for each field, instead of a string. That's because on the
2560
                         * lower-level journal fields can actually contain binary data and are not restricted to text,
2561
                         * and we should not "lose precision" in our types on the way. That said, I am pretty sure
2562
                         * actually encoding binary data as unit metadata is not a good idea. Hence we actually refuse
2563
                         * any actual binary data, and only accept UTF-8. This allows us to eventually lift this
2564
                         * limitation, should a good, valid use case arise. */
2565

2566
                        r = sd_bus_message_read_array(message, 'y', &p, &sz);
×
UNCOV
2567
                        if (r < 0)
×
2568
                                return r;
UNCOV
2569
                        if (r == 0)
×
2570
                                break;
2571

2572
                        if (memchr(p, 0, sz))
×
UNCOV
2573
                                return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Journal field contains zero byte");
×
2574

2575
                        eq = memchr(p, '=', sz);
×
2576
                        if (!eq)
×
2577
                                return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Journal field contains no '=' character");
×
2578
                        if (!journal_field_valid(p, eq - (const char*) p, false))
×
UNCOV
2579
                                return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Journal field invalid");
×
2580

2581
                        copy = memdup_suffix0(p, sz);
×
UNCOV
2582
                        if (!copy)
×
2583
                                return -ENOMEM;
2584

2585
                        if (!utf8_is_valid(copy))
×
UNCOV
2586
                                return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Journal field is not valid UTF-8");
×
2587

2588
                        if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
UNCOV
2589
                                if (!GREEDY_REALLOC(c->log_extra_fields, c->n_log_extra_fields + 1))
×
2590
                                        return -ENOMEM;
2591

2592
                                c->log_extra_fields[c->n_log_extra_fields++] = IOVEC_MAKE(copy, sz);
×
UNCOV
2593
                                unit_write_settingf(u, flags|UNIT_ESCAPE_SPECIFIERS|UNIT_ESCAPE_C, name, "LogExtraFields=%s", (char*) copy);
×
2594
                                TAKE_PTR(copy);
2595
                        }
2596

UNCOV
2597
                        n++;
×
2598
                }
2599

2600
                r = sd_bus_message_exit_container(message);
×
UNCOV
2601
                if (r < 0)
×
2602
                        return r;
2603

2604
                if (!UNIT_WRITE_FLAGS_NOOP(flags) && n == 0) {
×
2605
                        exec_context_free_log_extra_fields(c);
×
UNCOV
2606
                        unit_write_setting(u, flags, name, "LogExtraFields=");
×
2607
                }
2608

UNCOV
2609
                return 1;
×
2610
        }
2611

2612
#if HAVE_SECCOMP
2613

2614
        if (streq(name, "SystemCallErrorNumber"))
782✔
UNCOV
2615
                return bus_set_transient_errno(u, name, &c->syscall_errno, message, flags, error);
×
2616

2617
        if (streq(name, "SystemCallFilter")) {
782✔
2618
                int allow_list;
×
UNCOV
2619
                _cleanup_strv_free_ char **l = NULL;
×
2620

2621
                r = sd_bus_message_enter_container(message, 'r', "bas");
×
UNCOV
2622
                if (r < 0)
×
2623
                        return r;
2624

2625
                r = sd_bus_message_read(message, "b", &allow_list);
×
UNCOV
2626
                if (r < 0)
×
2627
                        return r;
2628

2629
                r = sd_bus_message_read_strv(message, &l);
×
UNCOV
2630
                if (r < 0)
×
2631
                        return r;
2632

2633
                r = sd_bus_message_exit_container(message);
×
UNCOV
2634
                if (r < 0)
×
2635
                        return r;
2636

2637
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
2638
                        _cleanup_free_ char *joined = NULL;
×
UNCOV
2639
                        SeccompParseFlags invert_flag = allow_list ? 0 : SECCOMP_PARSE_INVERT;
×
2640

2641
                        if (strv_isempty(l)) {
×
2642
                                c->syscall_allow_list = false;
×
UNCOV
2643
                                c->syscall_filter = hashmap_free(c->syscall_filter);
×
2644

UNCOV
2645
                                unit_write_settingf(u, flags, name, "SystemCallFilter=");
×
2646
                                return 1;
2647
                        }
2648

2649
                        if (!c->syscall_filter) {
×
2650
                                c->syscall_filter = hashmap_new(NULL);
×
2651
                                if (!c->syscall_filter)
×
UNCOV
2652
                                        return log_oom();
×
2653

UNCOV
2654
                                c->syscall_allow_list = allow_list;
×
2655

2656
                                if (c->syscall_allow_list) {
×
UNCOV
2657
                                        r = seccomp_parse_syscall_filter("@default",
×
2658
                                                                         -1,
2659
                                                                         c->syscall_filter,
2660
                                                                         SECCOMP_PARSE_PERMISSIVE |
2661
                                                                         SECCOMP_PARSE_ALLOW_LIST,
UNCOV
2662
                                                                         u->id,
×
2663
                                                                         NULL, 0);
UNCOV
2664
                                        if (r < 0)
×
2665
                                                return r;
2666
                                }
2667
                        }
2668

2669
                        STRV_FOREACH(s, l) {
×
2670
                                _cleanup_free_ char *n = NULL;
×
UNCOV
2671
                                int e;
×
2672

2673
                                r = parse_syscall_and_errno(*s, &n, &e);
×
UNCOV
2674
                                if (r < 0)
×
2675
                                        return r;
2676

UNCOV
2677
                                if (allow_list && e >= 0)
×
2678
                                        return -EINVAL;
2679

UNCOV
2680
                                r = seccomp_parse_syscall_filter(n,
×
2681
                                                                 e,
2682
                                                                 c->syscall_filter,
2683
                                                                 SECCOMP_PARSE_LOG | SECCOMP_PARSE_PERMISSIVE |
2684
                                                                 invert_flag |
×
2685
                                                                 (c->syscall_allow_list ? SECCOMP_PARSE_ALLOW_LIST : 0),
×
UNCOV
2686
                                                                 u->id,
×
2687
                                                                 NULL, 0);
UNCOV
2688
                                if (r < 0)
×
2689
                                        return r;
2690
                        }
2691

2692
                        joined = strv_join(l, " ");
×
UNCOV
2693
                        if (!joined)
×
2694
                                return -ENOMEM;
2695

UNCOV
2696
                        unit_write_settingf(u, flags, name, "SystemCallFilter=%s%s", allow_list ? "" : "~", joined);
×
2697
                }
2698

UNCOV
2699
                return 1;
×
2700

2701
        } else if (streq(name, "SystemCallLog")) {
782✔
2702
                int allow_list;
×
UNCOV
2703
                _cleanup_strv_free_ char **l = NULL;
×
2704

2705
                r = sd_bus_message_enter_container(message, 'r', "bas");
×
UNCOV
2706
                if (r < 0)
×
2707
                        return r;
2708

2709
                r = sd_bus_message_read(message, "b", &allow_list);
×
UNCOV
2710
                if (r < 0)
×
2711
                        return r;
2712

2713
                r = sd_bus_message_read_strv(message, &l);
×
UNCOV
2714
                if (r < 0)
×
2715
                        return r;
2716

2717
                r = sd_bus_message_exit_container(message);
×
UNCOV
2718
                if (r < 0)
×
2719
                        return r;
2720

2721
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
2722
                        _cleanup_free_ char *joined = NULL;
×
UNCOV
2723
                        SeccompParseFlags invert_flag = allow_list ? 0 : SECCOMP_PARSE_INVERT;
×
2724

2725
                        if (strv_isempty(l)) {
×
2726
                                c->syscall_log_allow_list = false;
×
UNCOV
2727
                                c->syscall_log = hashmap_free(c->syscall_log);
×
2728

UNCOV
2729
                                unit_write_settingf(u, flags, name, "SystemCallLog=");
×
2730
                                return 1;
2731
                        }
2732

2733
                        if (!c->syscall_log) {
×
2734
                                c->syscall_log = hashmap_new(NULL);
×
2735
                                if (!c->syscall_log)
×
UNCOV
2736
                                        return log_oom();
×
2737

UNCOV
2738
                                c->syscall_log_allow_list = allow_list;
×
2739
                        }
2740

2741
                        STRV_FOREACH(s, l) {
×
UNCOV
2742
                                r = seccomp_parse_syscall_filter(*s,
×
2743
                                                                 -1, /* errno not used */
2744
                                                                 c->syscall_log,
2745
                                                                 SECCOMP_PARSE_LOG | SECCOMP_PARSE_PERMISSIVE |
2746
                                                                 invert_flag |
×
2747
                                                                 (c->syscall_log_allow_list ? SECCOMP_PARSE_ALLOW_LIST : 0),
×
UNCOV
2748
                                                                 u->id,
×
2749
                                                                 NULL, 0);
UNCOV
2750
                                if (r < 0)
×
2751
                                        return r;
2752
                        }
2753

2754
                        joined = strv_join(l, " ");
×
UNCOV
2755
                        if (!joined)
×
2756
                                return -ENOMEM;
2757

UNCOV
2758
                        unit_write_settingf(u, flags, name, "SystemCallLog=%s%s", allow_list ? "" : "~", joined);
×
2759
                }
2760

UNCOV
2761
                return 1;
×
2762

2763
        } else if (streq(name, "SystemCallArchitectures")) {
782✔
UNCOV
2764
                _cleanup_strv_free_ char **l = NULL;
×
2765

2766
                r = sd_bus_message_read_strv(message, &l);
×
UNCOV
2767
                if (r < 0)
×
2768
                        return r;
2769

2770
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
UNCOV
2771
                        _cleanup_free_ char *joined = NULL;
×
2772

2773
                        if (strv_isempty(l))
×
UNCOV
2774
                                c->syscall_archs = set_free(c->syscall_archs);
×
2775
                        else {
2776
                                r = parse_syscall_archs(l, &c->syscall_archs);
×
UNCOV
2777
                                if (r < 0)
×
2778
                                        return r;
2779
                        }
2780

2781
                        joined = strv_join(l, " ");
×
UNCOV
2782
                        if (!joined)
×
2783
                                return -ENOMEM;
2784

UNCOV
2785
                        unit_write_settingf(u, flags, name, "%s=%s", name, joined);
×
2786
                }
2787

UNCOV
2788
                return 1;
×
2789

2790
        } else if (streq(name, "RestrictAddressFamilies")) {
782✔
2791
                _cleanup_strv_free_ char **l = NULL;
×
UNCOV
2792
                int allow_list;
×
2793

2794
                r = sd_bus_message_enter_container(message, 'r', "bas");
×
UNCOV
2795
                if (r < 0)
×
2796
                        return r;
2797

2798
                r = sd_bus_message_read(message, "b", &allow_list);
×
UNCOV
2799
                if (r < 0)
×
2800
                        return r;
2801

2802
                r = sd_bus_message_read_strv(message, &l);
×
UNCOV
2803
                if (r < 0)
×
2804
                        return r;
2805

2806
                r = sd_bus_message_exit_container(message);
×
UNCOV
2807
                if (r < 0)
×
2808
                        return r;
2809

2810
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
UNCOV
2811
                        _cleanup_free_ char *joined = NULL;
×
2812

2813
                        if (strv_isempty(l)) {
×
2814
                                c->address_families_allow_list = allow_list;
×
UNCOV
2815
                                c->address_families = set_free(c->address_families);
×
2816

2817
                                unit_write_settingf(u, flags, name, "RestrictAddressFamilies=%s",
×
UNCOV
2818
                                                    allow_list ? "none" : "");
×
2819
                                return 1;
2820
                        }
2821

2822
                        if (!c->address_families) {
×
2823
                                c->address_families = set_new(NULL);
×
2824
                                if (!c->address_families)
×
UNCOV
2825
                                        return log_oom();
×
2826

UNCOV
2827
                                c->address_families_allow_list = allow_list;
×
2828
                        }
2829

2830
                        STRV_FOREACH(s, l) {
×
UNCOV
2831
                                int af;
×
2832

2833
                                af = af_from_name(*s);
×
UNCOV
2834
                                if (af < 0)
×
2835
                                        return af;
2836

2837
                                if (allow_list == c->address_families_allow_list) {
×
2838
                                        r = set_put(c->address_families, INT_TO_PTR(af));
×
UNCOV
2839
                                        if (r < 0)
×
2840
                                                return r;
2841
                                } else
UNCOV
2842
                                        set_remove(c->address_families, INT_TO_PTR(af));
×
2843
                        }
2844

2845
                        joined = strv_join(l, " ");
×
UNCOV
2846
                        if (!joined)
×
2847
                                return -ENOMEM;
2848

UNCOV
2849
                        unit_write_settingf(u, flags, name, "RestrictAddressFamilies=%s%s", allow_list ? "" : "~", joined);
×
2850
                }
2851

UNCOV
2852
                return 1;
×
2853
        }
2854
#endif
2855
        if (STR_IN_SET(name, "CPUAffinity", "NUMAMask")) {
782✔
2856
                const void *a;
×
2857
                size_t n;
×
2858
                bool affinity = streq(name, "CPUAffinity");
×
UNCOV
2859
                _cleanup_(cpu_set_reset) CPUSet set = {};
×
2860

2861
                r = sd_bus_message_read_array(message, 'y', &a, &n);
×
UNCOV
2862
                if (r < 0)
×
2863
                        return r;
2864

2865
                r = cpu_set_from_dbus(a, n, &set);
×
UNCOV
2866
                if (r < 0)
×
2867
                        return r;
2868

2869
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
2870
                        if (n == 0) {
×
2871
                                cpu_set_reset(affinity ? &c->cpu_set : &c->numa_policy.nodes);
×
UNCOV
2872
                                unit_write_settingf(u, flags, name, "%s=", name);
×
2873
                        } else {
UNCOV
2874
                                _cleanup_free_ char *str = NULL;
×
2875

2876
                                str = cpu_set_to_string(&set);
×
UNCOV
2877
                                if (!str)
×
2878
                                        return -ENOMEM;
2879

2880
                                /* We forego any optimizations here, and always create the structure using
2881
                                 * cpu_set_add_all(), because we don't want to care if the existing size we
2882
                                 * got over dbus is appropriate. */
2883
                                r = cpu_set_add_all(affinity ? &c->cpu_set : &c->numa_policy.nodes, &set);
×
UNCOV
2884
                                if (r < 0)
×
2885
                                        return r;
2886

UNCOV
2887
                                unit_write_settingf(u, flags, name, "%s=%s", name, str);
×
2888
                        }
2889
                }
2890

UNCOV
2891
                return 1;
×
2892

2893
        } else if (streq(name, "CPUAffinityFromNUMA")) {
782✔
UNCOV
2894
                int q;
×
2895

2896
                r = sd_bus_message_read_basic(message, 'b', &q);
×
2897
                if (r < 0)
×
UNCOV
2898
                        return r;
×
2899

2900
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
2901
                        c->cpu_affinity_from_numa = q;
×
UNCOV
2902
                        unit_write_settingf(u, flags, name, "%s=%s", "CPUAffinity", "numa");
×
2903
                }
2904

UNCOV
2905
                return 1;
×
2906

2907
        } else if (streq(name, "NUMAPolicy")) {
782✔
UNCOV
2908
                int32_t type;
×
2909

2910
                r = sd_bus_message_read(message, "i", &type);
×
2911
                if (r < 0)
×
UNCOV
2912
                        return r;
×
2913

2914
                if (!mpol_is_valid(type))
×
UNCOV
2915
                        return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid NUMAPolicy value: %i", type);
×
2916

2917
                if (!UNIT_WRITE_FLAGS_NOOP(flags))
×
UNCOV
2918
                        c->numa_policy.type = type;
×
2919

UNCOV
2920
                return 1;
×
2921

2922
        } else if (streq(name, "Nice")) {
782✔
UNCOV
2923
                int32_t q;
×
2924

2925
                r = sd_bus_message_read(message, "i", &q);
×
2926
                if (r < 0)
×
UNCOV
2927
                        return r;
×
2928

2929
                if (!nice_is_valid(q))
×
UNCOV
2930
                        return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid Nice value: %i", q);
×
2931

2932
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
2933
                        c->nice = q;
×
UNCOV
2934
                        c->nice_set = true;
×
2935

UNCOV
2936
                        unit_write_settingf(u, flags, name, "Nice=%i", q);
×
2937
                }
2938

UNCOV
2939
                return 1;
×
2940

2941
        } else if (streq(name, "CPUSchedulingPolicy")) {
782✔
UNCOV
2942
                int32_t q;
×
2943

2944
                r = sd_bus_message_read(message, "i", &q);
×
2945
                if (r < 0)
×
UNCOV
2946
                        return r;
×
2947

2948
                if (!sched_policy_is_valid(q))
×
UNCOV
2949
                        return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid CPU scheduling policy: %i", q);
×
2950

2951
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
UNCOV
2952
                        _cleanup_free_ char *s = NULL;
×
2953

2954
                        r = sched_policy_to_string_alloc(q, &s);
×
2955
                        if (r < 0)
×
UNCOV
2956
                                return r;
×
2957

2958
                        c->cpu_sched_policy = q;
×
2959
                        c->cpu_sched_priority = CLAMP(c->cpu_sched_priority, sched_get_priority_min(q), sched_get_priority_max(q));
×
UNCOV
2960
                        c->cpu_sched_set = true;
×
2961

UNCOV
2962
                        unit_write_settingf(u, flags, name, "CPUSchedulingPolicy=%s", s);
×
2963
                }
2964

UNCOV
2965
                return 1;
×
2966

2967
        } else if (streq(name, "CPUSchedulingPriority")) {
782✔
UNCOV
2968
                int32_t p;
×
2969

2970
                r = sd_bus_message_read(message, "i", &p);
×
2971
                if (r < 0)
×
UNCOV
2972
                        return r;
×
2973

2974
                /* On Linux RR/FIFO range from 1 to 99 and OTHER/BATCH may only be 0. Policy might be set
2975
                 * later so we do not check the precise range, but only the generic outer bounds. */
2976
                if (p < 0 || p > 99)
×
UNCOV
2977
                        return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid CPU scheduling priority: %i", p);
×
2978

2979
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
2980
                        c->cpu_sched_priority = p;
×
UNCOV
2981
                        c->cpu_sched_set = true;
×
2982

UNCOV
2983
                        unit_write_settingf(u, flags, name, "CPUSchedulingPriority=%i", p);
×
2984
                }
2985

UNCOV
2986
                return 1;
×
2987

2988
        } else if (streq(name, "IOSchedulingClass")) {
782✔
UNCOV
2989
                int32_t q;
×
2990

2991
                r = sd_bus_message_read(message, "i", &q);
×
2992
                if (r < 0)
×
UNCOV
2993
                        return r;
×
2994

2995
                if (!ioprio_class_is_valid(q))
×
UNCOV
2996
                        return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid IO scheduling class: %i", q);
×
2997

2998
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
UNCOV
2999
                        _cleanup_free_ char *s = NULL;
×
3000

3001
                        r = ioprio_class_to_string_alloc(q, &s);
×
3002
                        if (r < 0)
×
UNCOV
3003
                                return r;
×
3004

3005
                        c->ioprio = ioprio_normalize(ioprio_prio_value(q, ioprio_prio_data(c->ioprio)));
×
UNCOV
3006
                        c->ioprio_set = true;
×
3007

UNCOV
3008
                        unit_write_settingf(u, flags, name, "IOSchedulingClass=%s", s);
×
3009
                }
3010

UNCOV
3011
                return 1;
×
3012

3013
        } else if (streq(name, "IOSchedulingPriority")) {
782✔
UNCOV
3014
                int32_t p;
×
3015

3016
                r = sd_bus_message_read(message, "i", &p);
×
3017
                if (r < 0)
×
UNCOV
3018
                        return r;
×
3019

3020
                if (!ioprio_priority_is_valid(p))
×
UNCOV
3021
                        return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid IO scheduling priority: %i", p);
×
3022

3023
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
3024
                        c->ioprio = ioprio_normalize(ioprio_prio_value(ioprio_prio_class(c->ioprio), p));
×
UNCOV
3025
                        c->ioprio_set = true;
×
3026

UNCOV
3027
                        unit_write_settingf(u, flags, name, "IOSchedulingPriority=%i", p);
×
3028
                }
3029

UNCOV
3030
                return 1;
×
3031

3032
        } else if (streq(name, "WorkingDirectory")) {
782✔
3033
                _cleanup_free_ char *simplified = NULL;
×
3034
                bool missing_ok = false, is_home = false;
×
UNCOV
3035
                const char *s;
×
3036

3037
                r = sd_bus_message_read(message, "s", &s);
×
UNCOV
3038
                if (r < 0)
×
3039
                        return r;
3040

3041
                if (!isempty(s)) {
×
3042
                        if (s[0] == '-') {
×
3043
                                missing_ok = true;
×
UNCOV
3044
                                s++;
×
3045
                        }
3046

UNCOV
3047
                        if (streq(s, "~"))
×
3048
                                is_home = true;
3049
                        else {
3050
                                if (!path_is_absolute(s))
×
UNCOV
3051
                                        return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS,
×
3052
                                                                "WorkingDirectory= expects an absolute path or '~'");
3053

3054
                                r = path_simplify_alloc(s, &simplified);
×
UNCOV
3055
                                if (r < 0)
×
3056
                                        return r;
3057

3058
                                if (!path_is_normalized(simplified))
×
UNCOV
3059
                                        return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS,
×
3060
                                                                "WorkingDirectory= expects a normalized path or '~'");
3061
                        }
3062
                }
3063

3064
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
3065
                        free_and_replace(c->working_directory, simplified);
×
3066
                        c->working_directory_home = is_home;
×
UNCOV
3067
                        c->working_directory_missing_ok = missing_ok;
×
3068

UNCOV
3069
                        unit_write_settingf(u, flags|UNIT_ESCAPE_SPECIFIERS, name,
×
3070
                                            "WorkingDirectory=%s%s",
3071
                                            c->working_directory_missing_ok ? "-" : "",
×
UNCOV
3072
                                            c->working_directory_home ? "~" : strempty(c->working_directory));
×
3073
                }
3074

UNCOV
3075
                return 1;
×
3076

3077
        } else if (STR_IN_SET(name,
782✔
3078
                              "StandardInputFileDescriptorName", "StandardOutputFileDescriptorName", "StandardErrorFileDescriptorName")) {
UNCOV
3079
                const char *s;
×
3080

3081
                r = sd_bus_message_read(message, "s", &s);
×
3082
                if (r < 0)
×
UNCOV
3083
                        return r;
×
3084

3085
                if (!isempty(s) && !fdname_is_valid(s))
×
UNCOV
3086
                        return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid file descriptor name");
×
3087

UNCOV
3088
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
3089

3090
                        if (streq(name, "StandardInputFileDescriptorName")) {
×
3091
                                r = free_and_strdup(c->stdio_fdname + STDIN_FILENO, empty_to_null(s));
×
UNCOV
3092
                                if (r < 0)
×
3093
                                        return r;
3094

3095
                                c->std_input = EXEC_INPUT_NAMED_FD;
×
UNCOV
3096
                                unit_write_settingf(u, flags|UNIT_ESCAPE_SPECIFIERS, name, "StandardInput=fd:%s", exec_context_fdname(c, STDIN_FILENO));
×
3097

3098
                        } else if (streq(name, "StandardOutputFileDescriptorName")) {
×
3099
                                r = free_and_strdup(c->stdio_fdname + STDOUT_FILENO, empty_to_null(s));
×
UNCOV
3100
                                if (r < 0)
×
3101
                                        return r;
3102

3103
                                c->std_output = EXEC_OUTPUT_NAMED_FD;
×
UNCOV
3104
                                unit_write_settingf(u, flags|UNIT_ESCAPE_SPECIFIERS, name, "StandardOutput=fd:%s", exec_context_fdname(c, STDOUT_FILENO));
×
3105

3106
                        } else {
UNCOV
3107
                                assert(streq(name, "StandardErrorFileDescriptorName"));
×
3108

3109
                                r = free_and_strdup(&c->stdio_fdname[STDERR_FILENO], empty_to_null(s));
×
UNCOV
3110
                                if (r < 0)
×
3111
                                        return r;
3112

3113
                                c->std_error = EXEC_OUTPUT_NAMED_FD;
×
UNCOV
3114
                                unit_write_settingf(u, flags|UNIT_ESCAPE_SPECIFIERS, name, "StandardError=fd:%s", exec_context_fdname(c, STDERR_FILENO));
×
3115
                        }
3116
                }
3117

UNCOV
3118
                return 1;
×
3119

3120
        } else if (STR_IN_SET(name,
782✔
3121
                              "StandardInputFile",
3122
                              "StandardOutputFile", "StandardOutputFileToAppend", "StandardOutputFileToTruncate",
3123
                              "StandardErrorFile", "StandardErrorFileToAppend", "StandardErrorFileToTruncate")) {
UNCOV
3124
                const char *s;
×
3125

3126
                r = sd_bus_message_read(message, "s", &s);
×
3127
                if (r < 0)
×
UNCOV
3128
                        return r;
×
3129

3130
                if (!isempty(s)) {
×
3131
                        if (!path_is_absolute(s))
×
3132
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Path %s is not absolute", s);
×
3133
                        if (!path_is_normalized(s))
×
UNCOV
3134
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Path %s is not normalized", s);
×
3135
                }
3136

UNCOV
3137
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
3138

3139
                        if (streq(name, "StandardInputFile")) {
×
3140
                                r = free_and_strdup(&c->stdio_file[STDIN_FILENO], empty_to_null(s));
×
UNCOV
3141
                                if (r < 0)
×
3142
                                        return r;
3143

3144
                                c->std_input = EXEC_INPUT_FILE;
×
UNCOV
3145
                                unit_write_settingf(u, flags|UNIT_ESCAPE_SPECIFIERS, name, "StandardInput=file:%s", s);
×
3146

3147
                        } else if (STR_IN_SET(name, "StandardOutputFile", "StandardOutputFileToAppend", "StandardOutputFileToTruncate")) {
×
3148
                                r = free_and_strdup(&c->stdio_file[STDOUT_FILENO], empty_to_null(s));
×
3149
                                if (r < 0)
×
UNCOV
3150
                                        return r;
×
3151

3152
                                if (streq(name, "StandardOutputFile")) {
×
3153
                                        c->std_output = EXEC_OUTPUT_FILE;
×
3154
                                        unit_write_settingf(u, flags|UNIT_ESCAPE_SPECIFIERS, name, "StandardOutput=file:%s", s);
×
3155
                                } else if (streq(name, "StandardOutputFileToAppend")) {
×
3156
                                        c->std_output = EXEC_OUTPUT_FILE_APPEND;
×
UNCOV
3157
                                        unit_write_settingf(u, flags|UNIT_ESCAPE_SPECIFIERS, name, "StandardOutput=append:%s", s);
×
3158
                                } else {
3159
                                        assert(streq(name, "StandardOutputFileToTruncate"));
×
3160
                                        c->std_output = EXEC_OUTPUT_FILE_TRUNCATE;
×
UNCOV
3161
                                        unit_write_settingf(u, flags|UNIT_ESCAPE_SPECIFIERS, name, "StandardOutput=truncate:%s", s);
×
3162
                                }
3163
                        } else {
UNCOV
3164
                                assert(STR_IN_SET(name, "StandardErrorFile", "StandardErrorFileToAppend", "StandardErrorFileToTruncate"));
×
3165

3166
                                r = free_and_strdup(&c->stdio_file[STDERR_FILENO], empty_to_null(s));
×
UNCOV
3167
                                if (r < 0)
×
3168
                                        return r;
3169

3170
                                if (streq(name, "StandardErrorFile")) {
×
3171
                                        c->std_error = EXEC_OUTPUT_FILE;
×
3172
                                        unit_write_settingf(u, flags|UNIT_ESCAPE_SPECIFIERS, name, "StandardError=file:%s", s);
×
3173
                                } else if (streq(name, "StandardErrorFileToAppend")) {
×
3174
                                        c->std_error = EXEC_OUTPUT_FILE_APPEND;
×
UNCOV
3175
                                        unit_write_settingf(u, flags|UNIT_ESCAPE_SPECIFIERS, name, "StandardError=append:%s", s);
×
3176
                                } else {
3177
                                        assert(streq(name, "StandardErrorFileToTruncate"));
×
3178
                                        c->std_error = EXEC_OUTPUT_FILE_TRUNCATE;
×
UNCOV
3179
                                        unit_write_settingf(u, flags|UNIT_ESCAPE_SPECIFIERS, name, "StandardError=truncate:%s", s);
×
3180
                                }
3181
                        }
3182
                }
3183

UNCOV
3184
                return 1;
×
3185

3186
        } else if (streq(name, "StandardInputData")) {
782✔
3187
                const void *p;
×
UNCOV
3188
                size_t sz;
×
3189

3190
                r = sd_bus_message_read_array(message, 'y', &p, &sz);
×
3191
                if (r < 0)
×
UNCOV
3192
                        return r;
×
3193

3194
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
UNCOV
3195
                        _cleanup_free_ char *encoded = NULL;
×
3196

3197
                        if (sz == 0) {
×
3198
                                c->stdin_data = mfree(c->stdin_data);
×
UNCOV
3199
                                c->stdin_data_size = 0;
×
3200

UNCOV
3201
                                unit_write_settingf(u, flags, name, "StandardInputData=");
×
3202
                        } else {
3203
                                void *q;
×
UNCOV
3204
                                ssize_t n;
×
3205

UNCOV
3206
                                if (c->stdin_data_size + sz < c->stdin_data_size || /* check for overflow */
×
3207
                                    c->stdin_data_size + sz > EXEC_STDIN_DATA_MAX)
3208
                                        return -E2BIG;
3209

3210
                                n = base64mem(p, sz, &encoded);
×
3211
                                if (n < 0)
×
UNCOV
3212
                                        return (int) n;
×
3213

3214
                                q = realloc(c->stdin_data, c->stdin_data_size + sz);
×
UNCOV
3215
                                if (!q)
×
3216
                                        return -ENOMEM;
3217

UNCOV
3218
                                memcpy((uint8_t*) q + c->stdin_data_size, p, sz);
×
3219

3220
                                c->stdin_data = q;
×
UNCOV
3221
                                c->stdin_data_size += sz;
×
3222

UNCOV
3223
                                unit_write_settingf(u, flags, name, "StandardInputData=%s", encoded);
×
3224
                        }
3225
                }
3226

UNCOV
3227
                return 1;
×
3228

3229
        } else if (streq(name, "Environment")) {
782✔
3230

3231
                _cleanup_strv_free_ char **l = NULL;
14✔
3232

3233
                r = sd_bus_message_read_strv(message, &l);
14✔
3234
                if (r < 0)
14✔
3235
                        return r;
3236

3237
                if (!strv_env_is_valid(l))
14✔
UNCOV
3238
                        return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid environment block.");
×
3239

3240
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
14✔
3241
                        if (strv_isempty(l)) {
7✔
3242
                                c->environment = strv_free(c->environment);
×
UNCOV
3243
                                unit_write_setting(u, flags, name, "Environment=");
×
3244
                        } else {
3245
                                _cleanup_free_ char *joined = NULL;
7✔
3246
                                char **e;
7✔
3247

3248
                                joined = unit_concat_strv(l, UNIT_ESCAPE_SPECIFIERS|UNIT_ESCAPE_C);
7✔
3249
                                if (!joined)
7✔
3250
                                        return -ENOMEM;
3251

3252
                                e = strv_env_merge(c->environment, l);
7✔
3253
                                if (!e)
7✔
3254
                                        return -ENOMEM;
3255

3256
                                strv_free_and_replace(c->environment, e);
7✔
3257
                                unit_write_settingf(u, flags, name, "Environment=%s", joined);
7✔
3258
                        }
3259
                }
3260

3261
                return 1;
14✔
3262

3263
        } else if (streq(name, "UnsetEnvironment")) {
768✔
3264

UNCOV
3265
                _cleanup_strv_free_ char **l = NULL;
×
3266

3267
                r = sd_bus_message_read_strv(message, &l);
×
UNCOV
3268
                if (r < 0)
×
3269
                        return r;
3270

3271
                if (!strv_env_name_or_assignment_is_valid(l))
×
UNCOV
3272
                        return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid UnsetEnvironment= list.");
×
3273

3274
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
3275
                        if (strv_isempty(l)) {
×
3276
                                c->unset_environment = strv_free(c->unset_environment);
×
UNCOV
3277
                                unit_write_setting(u, flags, name, "UnsetEnvironment=");
×
3278
                        } else {
3279
                                _cleanup_free_ char *joined = NULL;
×
UNCOV
3280
                                char **e;
×
3281

3282
                                joined = unit_concat_strv(l, UNIT_ESCAPE_SPECIFIERS|UNIT_ESCAPE_C);
×
UNCOV
3283
                                if (!joined)
×
3284
                                        return -ENOMEM;
3285

3286
                                e = strv_env_merge(c->unset_environment, l);
×
UNCOV
3287
                                if (!e)
×
3288
                                        return -ENOMEM;
3289

3290
                                strv_free_and_replace(c->unset_environment, e);
×
UNCOV
3291
                                unit_write_settingf(u, flags, name, "UnsetEnvironment=%s", joined);
×
3292
                        }
3293
                }
3294

UNCOV
3295
                return 1;
×
3296

3297
        } else if (streq(name, "OOMScoreAdjust")) {
768✔
UNCOV
3298
                int oa;
×
3299

3300
                r = sd_bus_message_read(message, "i", &oa);
×
3301
                if (r < 0)
×
UNCOV
3302
                        return r;
×
3303

3304
                if (!oom_score_adjust_is_valid(oa))
×
UNCOV
3305
                        return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "OOM score adjust value out of range");
×
3306

3307
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
3308
                        c->oom_score_adjust = oa;
×
3309
                        c->oom_score_adjust_set = true;
×
UNCOV
3310
                        unit_write_settingf(u, flags, name, "OOMScoreAdjust=%i", oa);
×
3311
                }
3312

UNCOV
3313
                return 1;
×
3314

3315
        } else if (streq(name, "CoredumpFilter")) {
768✔
UNCOV
3316
                uint64_t f;
×
3317

3318
                r = sd_bus_message_read(message, "t", &f);
×
3319
                if (r < 0)
×
UNCOV
3320
                        return r;
×
3321

3322
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
3323
                        c->coredump_filter = f;
×
3324
                        c->coredump_filter_set = true;
×
UNCOV
3325
                        unit_write_settingf(u, flags, name, "CoredumpFilter=0x%"PRIx64, f);
×
3326
                }
3327

UNCOV
3328
                return 1;
×
3329

3330
        } else if (streq(name, "EnvironmentFiles")) {
768✔
UNCOV
3331
                _cleanup_(memstream_done) MemStream m = {};
×
3332
                _cleanup_free_ char *joined = NULL;
4✔
3333
                _cleanup_strv_free_ char **l = NULL;
4✔
3334
                FILE *f;
4✔
3335

3336
                r = sd_bus_message_enter_container(message, 'a', "(sb)");
4✔
3337
                if (r < 0)
4✔
3338
                        return r;
3339

3340
                f = memstream_init(&m);
4✔
3341
                if (!f)
4✔
3342
                        return -ENOMEM;
3343

3344
                fputs("EnvironmentFile=\n", f);
4✔
3345

3346
                STRV_FOREACH(i, c->environment_files) {
4✔
UNCOV
3347
                        _cleanup_free_ char *q = NULL;
×
3348

3349
                        q = specifier_escape(*i);
×
3350
                        if (!q)
×
UNCOV
3351
                                return -ENOMEM;
×
3352

UNCOV
3353
                        fprintf(f, "EnvironmentFile=%s\n", q);
×
3354
                }
3355

3356
                while ((r = sd_bus_message_enter_container(message, 'r', "sb")) > 0) {
8✔
3357
                        const char *path;
4✔
3358
                        int b;
4✔
3359

3360
                        r = sd_bus_message_read(message, "sb", &path, &b);
4✔
3361
                        if (r < 0)
4✔
UNCOV
3362
                                return r;
×
3363

3364
                        r = sd_bus_message_exit_container(message);
4✔
3365
                        if (r < 0)
4✔
3366
                                return r;
3367

3368
                        if (!path_is_absolute(path))
4✔
UNCOV
3369
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Path %s is not absolute.", path);
×
3370

3371
                        if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
4✔
3372
                                _cleanup_free_ char *q = NULL, *buf = NULL;
2✔
3373

3374
                                buf = strjoin(b ? "-" : "", path);
3✔
3375
                                if (!buf)
2✔
3376
                                        return -ENOMEM;
3377

3378
                                q = specifier_escape(buf);
2✔
3379
                                if (!q)
2✔
3380
                                        return -ENOMEM;
3381

3382
                                fprintf(f, "EnvironmentFile=%s\n", q);
2✔
3383

3384
                                r = strv_consume(&l, TAKE_PTR(buf));
2✔
3385
                                if (r < 0)
2✔
3386
                                        return r;
3387
                        }
3388
                }
3389
                if (r < 0)
4✔
3390
                        return r;
3391

3392
                r = sd_bus_message_exit_container(message);
4✔
3393
                if (r < 0)
4✔
3394
                        return r;
3395

3396
                r = memstream_finalize(&m, &joined, NULL);
4✔
3397
                if (r < 0)
4✔
3398
                        return r;
3399

3400
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
4✔
3401
                        if (strv_isempty(l)) {
2✔
3402
                                c->environment_files = strv_free(c->environment_files);
×
UNCOV
3403
                                unit_write_setting(u, flags, name, "EnvironmentFile=");
×
3404
                        } else {
3405
                                r = strv_extend_strv(&c->environment_files, l, true);
2✔
3406
                                if (r < 0)
2✔
3407
                                        return r;
3408

3409
                                unit_write_setting(u, flags, name, joined);
2✔
3410
                        }
3411
                }
3412

3413
                return 1;
4✔
3414

3415
        } else if (streq(name, "PassEnvironment")) {
764✔
3416

UNCOV
3417
                _cleanup_strv_free_ char **l = NULL;
×
3418

3419
                r = sd_bus_message_read_strv(message, &l);
×
UNCOV
3420
                if (r < 0)
×
3421
                        return r;
3422

3423
                if (!strv_env_name_is_valid(l))
×
UNCOV
3424
                        return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid PassEnvironment= block.");
×
3425

3426
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
3427
                        if (strv_isempty(l)) {
×
3428
                                c->pass_environment = strv_free(c->pass_environment);
×
UNCOV
3429
                                unit_write_setting(u, flags, name, "PassEnvironment=");
×
3430
                        } else {
UNCOV
3431
                                _cleanup_free_ char *joined = NULL;
×
3432

3433
                                r = strv_extend_strv(&c->pass_environment, l, true);
×
UNCOV
3434
                                if (r < 0)
×
3435
                                        return r;
3436

3437
                                /* We write just the new settings out to file, with unresolved specifiers. */
3438
                                joined = unit_concat_strv(l, UNIT_ESCAPE_SPECIFIERS);
×
UNCOV
3439
                                if (!joined)
×
3440
                                        return -ENOMEM;
3441

UNCOV
3442
                                unit_write_settingf(u, flags, name, "PassEnvironment=%s", joined);
×
3443
                        }
3444
                }
3445

UNCOV
3446
                return 1;
×
3447

3448
        } else if (STR_IN_SET(name, "ReadWriteDirectories", "ReadOnlyDirectories", "InaccessibleDirectories",
764✔
3449
                              "ReadWritePaths", "ReadOnlyPaths", "InaccessiblePaths", "ExecPaths", "NoExecPaths",
3450
                              "ExtensionDirectories")) {
3451
                _cleanup_strv_free_ char **l = NULL;
14✔
3452
                char ***dirs;
14✔
3453

3454
                r = sd_bus_message_read_strv(message, &l);
14✔
3455
                if (r < 0)
14✔
3456
                        return r;
3457

3458
                STRV_FOREACH(p, l) {
32✔
3459
                        char *i = *p;
18✔
3460
                        size_t offset;
18✔
3461

3462
                        offset = i[0] == '-';
18✔
3463
                        offset += i[offset] == '+';
18✔
3464
                        if (!path_is_absolute(i + offset))
18✔
UNCOV
3465
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid %s", name);
×
3466

3467
                        path_simplify(i + offset);
18✔
3468
                }
3469

3470
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
14✔
3471
                        if (STR_IN_SET(name, "ReadWriteDirectories", "ReadWritePaths"))
7✔
3472
                                dirs = &c->read_write_paths;
1✔
3473
                        else if (STR_IN_SET(name, "ReadOnlyDirectories", "ReadOnlyPaths"))
6✔
3474
                                dirs = &c->read_only_paths;
2✔
3475
                        else if (streq(name, "ExecPaths"))
4✔
3476
                                dirs = &c->exec_paths;
1✔
3477
                        else if (streq(name, "NoExecPaths"))
3✔
3478
                                dirs = &c->no_exec_paths;
1✔
3479
                        else if (streq(name, "ExtensionDirectories"))
2✔
3480
                                dirs = &c->extension_directories;
1✔
3481
                        else /* "InaccessiblePaths" */
3482
                                dirs = &c->inaccessible_paths;
1✔
3483

3484
                        if (strv_isempty(l)) {
7✔
3485
                                *dirs = strv_free(*dirs);
×
UNCOV
3486
                                unit_write_settingf(u, flags, name, "%s=", name);
×
3487
                        } else {
3488
                                _cleanup_free_ char *joined = NULL;
7✔
3489

3490
                                joined = unit_concat_strv(l, UNIT_ESCAPE_SPECIFIERS);
7✔
3491
                                if (!joined)
7✔
3492
                                        return -ENOMEM;
3493

3494
                                r = strv_extend_strv(dirs, l, true);
7✔
3495
                                if (r < 0)
7✔
3496
                                        return r;
3497

3498
                                unit_write_settingf(u, flags, name, "%s=%s", name, joined);
7✔
3499
                        }
3500
                }
3501

3502
                return 1;
14✔
3503

3504
        } else if (streq(name, "ExecSearchPath")) {
750✔
UNCOV
3505
                _cleanup_strv_free_ char **l = NULL;
×
3506

3507
                r = sd_bus_message_read_strv(message, &l);
×
UNCOV
3508
                if (r < 0)
×
3509
                        return r;
3510

3511
                STRV_FOREACH(p, l)
×
3512
                        if (!path_is_absolute(*p) || !path_is_normalized(*p) || strchr(*p, ':'))
×
UNCOV
3513
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid %s", name);
×
3514

3515
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
3516
                        if (strv_isempty(l)) {
×
3517
                                c->exec_search_path = strv_free(c->exec_search_path);
×
UNCOV
3518
                                unit_write_settingf(u, flags|UNIT_ESCAPE_SPECIFIERS, name, "ExecSearchPath=");
×
3519
                        } else {
3520
                                _cleanup_free_ char *joined = NULL;
×
3521
                                r = strv_extend_strv(&c->exec_search_path, l, true);
×
UNCOV
3522
                                if (r < 0)
×
3523
                                        return r;
3524
                                joined = strv_join(c->exec_search_path, ":");
×
3525
                                if (!joined)
×
3526
                                        return log_oom();
×
UNCOV
3527
                                unit_write_settingf(u, flags|UNIT_ESCAPE_SPECIFIERS, name, "ExecSearchPath=%s", joined);
×
3528
                        }
3529
                }
3530

UNCOV
3531
                return 1;
×
3532

3533
        } else if (STR_IN_SET(name, "RuntimeDirectory", "StateDirectory", "CacheDirectory", "LogsDirectory", "ConfigurationDirectory")) {
750✔
3534
                _cleanup_strv_free_ char **l = NULL;
114✔
3535

3536
                r = sd_bus_message_read_strv(message, &l);
114✔
3537
                if (r < 0)
114✔
3538
                        return r;
3539

3540
                STRV_FOREACH(p, l) {
288✔
3541
                        if (!path_is_normalized(*p))
174✔
UNCOV
3542
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "%s= path is not normalized: %s", name, *p);
×
3543

3544
                        if (path_is_absolute(*p))
174✔
UNCOV
3545
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "%s= path is absolute: %s", name, *p);
×
3546

3547
                        if (path_startswith(*p, "private"))
174✔
UNCOV
3548
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "%s= path can't be 'private': %s", name, *p);
×
3549
                }
3550

3551
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
114✔
3552
                        ExecDirectoryType i;
57✔
3553
                        ExecDirectory *d;
57✔
3554

3555
                        assert_se((i = exec_directory_type_from_string(name)) >= 0);
57✔
3556
                        d = c->directories + i;
57✔
3557

3558
                        if (strv_isempty(l)) {
57✔
3559
                                exec_directory_done(d);
×
UNCOV
3560
                                unit_write_settingf(u, flags, name, "%s=", name);
×
3561
                        } else {
3562
                                _cleanup_free_ char *joined = NULL;
57✔
3563

3564
                                STRV_FOREACH(source, l) {
144✔
3565
                                        r = exec_directory_add(d, *source, /* symlink= */ NULL, /* flags= */ 0);
87✔
3566
                                        if (r < 0)
87✔
UNCOV
3567
                                                return log_oom();
×
3568
                                }
3569
                                exec_directory_sort(d);
57✔
3570

3571
                                joined = unit_concat_strv(l, UNIT_ESCAPE_SPECIFIERS);
57✔
3572
                                if (!joined)
57✔
3573
                                        return -ENOMEM;
3574

3575
                                unit_write_settingf(u, flags, name, "%s=%s", name, joined);
57✔
3576
                        }
3577
                }
3578

3579
                return 1;
114✔
3580

3581
        } else if (STR_IN_SET(name, "AppArmorProfile", "SmackProcessLabel")) {
636✔
3582
                int ignore;
×
UNCOV
3583
                const char *s;
×
3584

3585
                r = sd_bus_message_read(message, "(bs)", &ignore, &s);
×
3586
                if (r < 0)
×
UNCOV
3587
                        return r;
×
3588

3589
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
3590
                        char **p;
×
UNCOV
3591
                        bool *b;
×
3592

3593
                        if (streq(name, "AppArmorProfile")) {
×
3594
                                p = &c->apparmor_profile;
×
UNCOV
3595
                                b = &c->apparmor_profile_ignore;
×
3596
                        } else { /* "SmackProcessLabel" */
3597
                                p = &c->smack_process_label;
×
UNCOV
3598
                                b = &c->smack_process_label_ignore;
×
3599
                        }
3600

3601
                        if (isempty(s)) {
×
3602
                                *p = mfree(*p);
×
UNCOV
3603
                                *b = false;
×
3604
                        } else {
UNCOV
3605
                                if (free_and_strdup(p, s) < 0)
×
3606
                                        return -ENOMEM;
UNCOV
3607
                                *b = ignore;
×
3608
                        }
3609

UNCOV
3610
                        unit_write_settingf(u, flags|UNIT_ESCAPE_SPECIFIERS, name, "%s=%s%s", name, ignore ? "-" : "", strempty(s));
×
3611
                }
3612

UNCOV
3613
                return 1;
×
3614

3615
        } else if (STR_IN_SET(name, "BindPaths", "BindReadOnlyPaths")) {
636✔
3616
                char *source, *destination;
14✔
3617
                int ignore_enoent;
14✔
3618
                uint64_t mount_flags;
14✔
3619
                bool empty = true;
14✔
3620

3621
                r = sd_bus_message_enter_container(message, 'a', "(ssbt)");
14✔
3622
                if (r < 0)
14✔
3623
                        return r;
14✔
3624

3625
                while ((r = sd_bus_message_read(message, "(ssbt)", &source, &destination, &ignore_enoent, &mount_flags)) > 0) {
44✔
3626

3627
                        if (!path_is_absolute(source))
30✔
UNCOV
3628
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Source path %s is not absolute.", source);
×
3629
                        if (!path_is_absolute(destination))
30✔
UNCOV
3630
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Destination path %s is not absolute.", destination);
×
3631
                        if (!IN_SET(mount_flags, 0, MS_REC))
30✔
UNCOV
3632
                                return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Unknown mount flags.");
×
3633

3634
                        if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
30✔
3635
                                r = bind_mount_add(&c->bind_mounts, &c->n_bind_mounts,
30✔
3636
                                                   &(BindMount) {
15✔
3637
                                                           .source = source,
3638
                                                           .destination = destination,
3639
                                                           .read_only = !!strstr(name, "ReadOnly"),
15✔
3640
                                                           .recursive = !!(mount_flags & MS_REC),
15✔
3641
                                                           .ignore_enoent = ignore_enoent,
15✔
3642
                                                   });
3643
                                if (r < 0)
15✔
UNCOV
3644
                                        return r;
×
3645

3646
                                unit_write_settingf(
45✔
3647
                                                u, flags|UNIT_ESCAPE_SPECIFIERS, name,
15✔
3648
                                                "%s=%s%s:%s:%s",
3649
                                                name,
3650
                                                ignore_enoent ? "-" : "",
15✔
3651
                                                source,
3652
                                                destination,
3653
                                                (mount_flags & MS_REC) ? "rbind" : "norbind");
15✔
3654
                        }
3655

3656
                        empty = false;
3657
                }
3658
                if (r < 0)
14✔
3659
                        return r;
3660

3661
                r = sd_bus_message_exit_container(message);
14✔
3662
                if (r < 0)
14✔
3663
                        return r;
3664

3665
                if (empty) {
14✔
3666
                        bind_mount_free_many(c->bind_mounts, c->n_bind_mounts);
×
3667
                        c->bind_mounts = NULL;
×
UNCOV
3668
                        c->n_bind_mounts = 0;
×
3669

UNCOV
3670
                        unit_write_settingf(u, flags, name, "%s=", name);
×
3671
                }
3672

3673
                return 1;
14✔
3674

3675
        } else if (streq(name, "TemporaryFileSystem")) {
622✔
3676
                const char *path, *options;
8✔
3677
                bool empty = true;
8✔
3678

3679
                r = sd_bus_message_enter_container(message, 'a', "(ss)");
8✔
3680
                if (r < 0)
8✔
3681
                        return r;
8✔
3682

3683
                while ((r = sd_bus_message_read(message, "(ss)", &path, &options)) > 0) {
16✔
3684

3685
                        if (!path_is_absolute(path))
8✔
UNCOV
3686
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Mount point %s is not absolute.", path);
×
3687

3688
                        if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
8✔
3689
                                r = temporary_filesystem_add(&c->temporary_filesystems, &c->n_temporary_filesystems, path, options);
4✔
3690
                                if (r < 0)
4✔
3691
                                        return r;
3692

3693
                                unit_write_settingf(
4✔
3694
                                                u, flags|UNIT_ESCAPE_SPECIFIERS, name,
4✔
3695
                                                "%s=%s:%s",
3696
                                                name,
3697
                                                path,
3698
                                                options);
3699
                        }
3700

3701
                        empty = false;
3702
                }
3703
                if (r < 0)
8✔
3704
                        return r;
3705

3706
                r = sd_bus_message_exit_container(message);
8✔
3707
                if (r < 0)
8✔
3708
                        return r;
3709

3710
                if (empty) {
8✔
3711
                        temporary_filesystem_free_many(c->temporary_filesystems, c->n_temporary_filesystems);
×
3712
                        c->temporary_filesystems = NULL;
×
UNCOV
3713
                        c->n_temporary_filesystems = 0;
×
3714

UNCOV
3715
                        unit_write_settingf(u, flags, name, "%s=", name);
×
3716
                }
3717

3718
                return 1;
8✔
3719

3720
        } else if ((suffix = startswith(name, "Limit"))) {
614✔
3721
                const char *soft = NULL;
88✔
3722
                int ri;
88✔
3723

3724
                ri = rlimit_from_string(suffix);
88✔
3725
                if (ri < 0) {
88✔
3726
                        soft = endswith(suffix, "Soft");
44✔
3727
                        if (soft) {
44✔
3728
                                const char *n;
44✔
3729

3730
                                n = strndupa_safe(suffix, soft - suffix);
44✔
3731
                                ri = rlimit_from_string(n);
44✔
3732
                                if (ri >= 0)
44✔
3733
                                        name = strjoina("Limit", n);
220✔
3734
                        }
3735
                }
3736

3737
                if (ri >= 0) {
44✔
3738
                        uint64_t rl;
88✔
3739
                        rlim_t x;
88✔
3740

3741
                        r = sd_bus_message_read(message, "t", &rl);
88✔
3742
                        if (r < 0)
88✔
3743
                                return r;
88✔
3744

3745
                        if (rl == UINT64_MAX)
88✔
3746
                                x = RLIM_INFINITY;
3747
                        else {
3748
                                x = (rlim_t) rl;
72✔
3749

3750
                                if ((uint64_t) x != rl)
72✔
3751
                                        return -ERANGE;
3752
                        }
3753

3754
                        if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
88✔
3755
                                _cleanup_free_ char *f = NULL;
44✔
3756
                                struct rlimit nl;
44✔
3757

3758
                                if (c->rlimit[ri]) {
44✔
3759
                                        nl = *c->rlimit[ri];
27✔
3760

3761
                                        if (soft)
27✔
3762
                                                nl.rlim_cur = x;
22✔
3763
                                        else
3764
                                                nl.rlim_max = x;
5✔
3765
                                } else
3766
                                        /* When the resource limit is not initialized yet, then assign the value to both fields */
3767
                                        nl = (struct rlimit) {
17✔
3768
                                                .rlim_cur = x,
3769
                                                .rlim_max = x,
3770
                                        };
3771

3772
                                r = rlimit_format(&nl, &f);
44✔
3773
                                if (r < 0)
44✔
3774
                                        return r;
3775

3776
                                if (c->rlimit[ri])
44✔
3777
                                        *c->rlimit[ri] = nl;
27✔
3778
                                else {
3779
                                        c->rlimit[ri] = newdup(struct rlimit, &nl, 1);
17✔
3780
                                        if (!c->rlimit[ri])
17✔
3781
                                                return -ENOMEM;
3782
                                }
3783

3784
                                unit_write_settingf(u, flags, name, "%s=%s", name, f);
44✔
3785
                        }
3786

3787
                        return 1;
88✔
3788
                }
3789

3790
        } else if (streq(name, "MountImages")) {
526✔
3791
                _cleanup_free_ char *format_str = NULL;
×
3792
                MountImage *mount_images = NULL;
×
3793
                size_t n_mount_images = 0;
×
3794
                char *source, *destination;
×
UNCOV
3795
                int permissive;
×
3796

3797
                r = sd_bus_message_enter_container(message, 'a', "(ssba(ss))");
×
UNCOV
3798
                if (r < 0)
×
3799
                        return r;
3800

3801
                for (;;) {
×
3802
                        _cleanup_(mount_options_free_allp) MountOptions *options = NULL;
×
3803
                        _cleanup_free_ char *source_escaped = NULL, *destination_escaped = NULL;
×
UNCOV
3804
                        char *tuple;
×
3805

3806
                        r = sd_bus_message_enter_container(message, 'r', "ssba(ss)");
×
UNCOV
3807
                        if (r < 0)
×
3808
                                return r;
3809

3810
                        r = sd_bus_message_read(message, "ssb", &source, &destination, &permissive);
×
UNCOV
3811
                        if (r <= 0)
×
3812
                                break;
3813

3814
                        if (!path_is_absolute(source))
×
3815
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Source path %s is not absolute.", source);
×
3816
                        if (!path_is_normalized(source))
×
3817
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Source path %s is not normalized.", source);
×
3818
                        if (!path_is_absolute(destination))
×
3819
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Destination path %s is not absolute.", destination);
×
3820
                        if (!path_is_normalized(destination))
×
UNCOV
3821
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Destination path %s is not normalized.", destination);
×
3822

3823
                        /* Need to store them in the unit with the escapes, so that they can be parsed again */
3824
                        source_escaped = shell_escape(source, ":");
×
UNCOV
3825
                        if (!source_escaped)
×
3826
                                return -ENOMEM;
3827
                        destination_escaped = shell_escape(destination, ":");
×
UNCOV
3828
                        if (!destination_escaped)
×
3829
                                return -ENOMEM;
3830

UNCOV
3831
                        tuple = strjoin(format_str,
×
3832
                                        format_str ? " " : "",
3833
                                        permissive ? "-" : "",
3834
                                        source_escaped,
3835
                                        ":",
3836
                                        destination_escaped);
UNCOV
3837
                        if (!tuple)
×
3838
                                return -ENOMEM;
UNCOV
3839
                        free_and_replace(format_str, tuple);
×
3840

3841
                        r = bus_read_mount_options(message, error, &options, &format_str, ":");
×
UNCOV
3842
                        if (r < 0)
×
3843
                                return r;
3844

3845
                        r = sd_bus_message_exit_container(message);
×
UNCOV
3846
                        if (r < 0)
×
3847
                                return r;
3848

3849
                        r = mount_image_add(&mount_images, &n_mount_images,
×
UNCOV
3850
                                            &(MountImage) {
×
3851
                                                    .source = source,
3852
                                                    .destination = destination,
3853
                                                    .mount_options = options,
UNCOV
3854
                                                    .ignore_enoent = permissive,
×
3855
                                                    .type = MOUNT_IMAGE_DISCRETE,
3856
                                            });
UNCOV
3857
                        if (r < 0)
×
3858
                                return r;
3859
                }
UNCOV
3860
                if (r < 0)
×
3861
                        return r;
3862

3863
                r = sd_bus_message_exit_container(message);
×
UNCOV
3864
                if (r < 0)
×
3865
                        return r;
3866

3867
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
3868
                        if (n_mount_images == 0) {
×
UNCOV
3869
                                c->mount_images = mount_image_free_many(c->mount_images, &c->n_mount_images);
×
3870

UNCOV
3871
                                unit_write_settingf(u, flags, name, "%s=", name);
×
3872
                        } else {
3873
                                for (size_t i = 0; i < n_mount_images; ++i) {
×
3874
                                        r = mount_image_add(&c->mount_images, &c->n_mount_images, &mount_images[i]);
×
UNCOV
3875
                                        if (r < 0)
×
3876
                                                return r;
3877
                                }
3878

UNCOV
3879
                                unit_write_settingf(u, flags|UNIT_ESCAPE_C|UNIT_ESCAPE_SPECIFIERS,
×
3880
                                                    name,
3881
                                                    "%s=%s",
3882
                                                    name,
3883
                                                    format_str);
3884
                        }
3885
                }
3886

UNCOV
3887
                mount_images = mount_image_free_many(mount_images, &n_mount_images);
×
3888

UNCOV
3889
                return 1;
×
3890
        } else if (streq(name, "ExtensionImages")) {
526✔
3891
                _cleanup_free_ char *format_str = NULL;
×
3892
                MountImage *extension_images = NULL;
×
UNCOV
3893
                size_t n_extension_images = 0;
×
3894

3895
                r = sd_bus_message_enter_container(message, 'a', "(sba(ss))");
×
UNCOV
3896
                if (r < 0)
×
3897
                        return r;
3898

3899
                for (;;) {
×
3900
                        _cleanup_(mount_options_free_allp) MountOptions *options = NULL;
×
3901
                        _cleanup_free_ char *source_escaped = NULL;
×
3902
                        char *source, *tuple;
×
UNCOV
3903
                        int permissive;
×
3904

3905
                        r = sd_bus_message_enter_container(message, 'r', "sba(ss)");
×
UNCOV
3906
                        if (r < 0)
×
3907
                                return r;
3908

3909
                        r = sd_bus_message_read(message, "sb", &source, &permissive);
×
UNCOV
3910
                        if (r <= 0)
×
3911
                                break;
3912

3913
                        if (!path_is_absolute(source))
×
3914
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Source path %s is not absolute.", source);
×
3915
                        if (!path_is_normalized(source))
×
UNCOV
3916
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Source path %s is not normalized.", source);
×
3917

3918
                        /* Need to store them in the unit with the escapes, so that they can be parsed again */
3919
                        source_escaped = shell_escape(source, ":");
×
UNCOV
3920
                        if (!source_escaped)
×
3921
                                return -ENOMEM;
3922

UNCOV
3923
                        tuple = strjoin(format_str,
×
3924
                                        format_str ? " " : "",
3925
                                        permissive ? "-" : "",
3926
                                        source_escaped);
UNCOV
3927
                        if (!tuple)
×
3928
                                return -ENOMEM;
UNCOV
3929
                        free_and_replace(format_str, tuple);
×
3930

3931
                        r = bus_read_mount_options(message, error, &options, &format_str, ":");
×
UNCOV
3932
                        if (r < 0)
×
3933
                                return r;
3934

3935
                        r = sd_bus_message_exit_container(message);
×
UNCOV
3936
                        if (r < 0)
×
3937
                                return r;
3938

3939
                        r = mount_image_add(&extension_images, &n_extension_images,
×
UNCOV
3940
                                            &(MountImage) {
×
3941
                                                    .source = source,
3942
                                                    .mount_options = options,
UNCOV
3943
                                                    .ignore_enoent = permissive,
×
3944
                                                    .type = MOUNT_IMAGE_EXTENSION,
3945
                                            });
UNCOV
3946
                        if (r < 0)
×
3947
                                return r;
3948
                }
UNCOV
3949
                if (r < 0)
×
3950
                        return r;
3951

3952
                r = sd_bus_message_exit_container(message);
×
UNCOV
3953
                if (r < 0)
×
3954
                        return r;
3955

3956
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
3957
                        if (n_extension_images == 0) {
×
UNCOV
3958
                                c->extension_images = mount_image_free_many(c->extension_images, &c->n_extension_images);
×
3959

UNCOV
3960
                                unit_write_settingf(u, flags, name, "%s=", name);
×
3961
                        } else {
3962
                                for (size_t i = 0; i < n_extension_images; ++i) {
×
3963
                                        r = mount_image_add(&c->extension_images, &c->n_extension_images, &extension_images[i]);
×
UNCOV
3964
                                        if (r < 0)
×
3965
                                                return r;
3966
                                }
3967

UNCOV
3968
                                unit_write_settingf(u, flags|UNIT_ESCAPE_C|UNIT_ESCAPE_SPECIFIERS,
×
3969
                                                    name,
3970
                                                    "%s=%s",
3971
                                                    name,
3972
                                                    format_str);
3973
                        }
3974
                }
3975

UNCOV
3976
                extension_images = mount_image_free_many(extension_images, &n_extension_images);
×
3977

UNCOV
3978
                return 1;
×
3979

3980
        } else if (STR_IN_SET(name, "StateDirectorySymlink", "RuntimeDirectorySymlink", "CacheDirectorySymlink", "LogsDirectorySymlink")) {
526✔
3981
                char *source, *destination;
14✔
3982
                ExecDirectory *directory;
14✔
3983
                uint64_t symlink_flags;
14✔
3984
                ExecDirectoryType i;
14✔
3985

3986
                assert_se((i = exec_directory_type_symlink_from_string(name)) >= 0);
14✔
3987
                directory = c->directories + i;
14✔
3988

3989
                r = sd_bus_message_enter_container(message, 'a', "(sst)");
14✔
3990
                if (r < 0)
14✔
3991
                        return r;
14✔
3992

3993
                while ((r = sd_bus_message_read(message, "(sst)", &source, &destination, &symlink_flags)) > 0) {
28✔
3994
                        if ((symlink_flags & ~_EXEC_DIRECTORY_FLAGS_PUBLIC) != 0)
14✔
UNCOV
3995
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid 'flags' parameter '%" PRIu64 "'", symlink_flags);
×
3996
                        if (!path_is_valid(source))
14✔
UNCOV
3997
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Source path %s is not valid.", source);
×
3998
                        if (path_is_absolute(source))
14✔
UNCOV
3999
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Source path %s is absolute.", source);
×
4000
                        if (!path_is_normalized(source))
14✔
UNCOV
4001
                                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Source path %s is not normalized.", source);
×
4002
                        if (isempty(destination))
14✔
4003
                                destination = NULL;
2✔
4004
                        else {
4005
                                if (!path_is_valid(destination))
12✔
UNCOV
4006
                                        return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Destination path %s is not valid.", destination);
×
4007
                                if (path_is_absolute(destination))
12✔
UNCOV
4008
                                        return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Destination path %s is absolute.", destination);
×
4009
                                if (!path_is_normalized(destination))
12✔
UNCOV
4010
                                        return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Destination path %s is not normalized.", destination);
×
4011
                        }
4012

4013
                        if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
14✔
4014
                                _cleanup_free_ char *destination_escaped = NULL, *source_escaped = NULL;
7✔
4015

4016
                                r = exec_directory_add(directory, source, destination, symlink_flags);
7✔
4017
                                if (r < 0)
7✔
4018
                                        return r;
4019

4020
                                /* Need to store them in the unit with the escapes, so that they can be parsed again */
4021
                                source_escaped = xescape(source, ":");
7✔
4022
                                if (!source_escaped)
7✔
4023
                                        return -ENOMEM;
4024
                                if (destination) {
7✔
4025
                                        destination_escaped = xescape(destination, ":");
6✔
4026
                                        if (!destination_escaped)
6✔
4027
                                                return -ENOMEM;
4028
                                }
4029

4030
                                unit_write_settingf(
8✔
4031
                                                u, flags|UNIT_ESCAPE_SPECIFIERS, exec_directory_type_to_string(i),
7✔
4032
                                                "%s=%s%s%s%s",
4033
                                                exec_directory_type_to_string(i),
4034
                                                source_escaped,
4035
                                                destination_escaped || FLAGS_SET(symlink_flags, EXEC_DIRECTORY_READ_ONLY) ? ":" : "",
1✔
4036
                                                destination_escaped,
4037
                                                FLAGS_SET(symlink_flags, EXEC_DIRECTORY_READ_ONLY) ? ":ro" : "");
7✔
4038
                        }
4039
                }
4040
                if (r < 0)
14✔
4041
                        return r;
4042

4043
                exec_directory_sort(directory);
14✔
4044

4045
                r = sd_bus_message_exit_container(message);
14✔
4046
                if (r < 0)
14✔
4047
                        return r;
4048

4049
                return 1;
14✔
4050

4051
        } else if (STR_IN_SET(name, "RootImagePolicy", "MountImagePolicy", "ExtensionImagePolicy")) {
512✔
4052
                _cleanup_(image_policy_freep) ImagePolicy *p = NULL;
×
UNCOV
4053
                const char *s;
×
4054

4055
                r = sd_bus_message_read(message, "s", &s);
×
UNCOV
4056
                if (r < 0)
×
4057
                        return r;
4058

4059
                r = image_policy_from_string(s, &p);
×
4060
                if (r < 0)
×
UNCOV
4061
                        return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Failed to parse image policy string: %s", s);
×
4062

4063
                if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
×
4064
                        _cleanup_free_ char *t = NULL;
×
4065
                        ImagePolicy **pp =
×
4066
                                streq(name, "RootImagePolicy")  ? &c->root_image_policy :
×
UNCOV
4067
                                streq(name, "MountImagePolicy") ? &c->mount_image_policy :
×
4068
                                                                  &c->extension_image_policy;
4069

4070
                        r = image_policy_to_string(p, /* simplify= */ true, &t);
×
4071
                        if (r < 0)
×
UNCOV
4072
                                return r;
×
4073

4074
                        image_policy_free(*pp);
×
UNCOV
4075
                        *pp = TAKE_PTR(p);
×
4076

UNCOV
4077
                        unit_write_settingf(
×
4078
                                        u, flags, name,
4079
                                        "%s=%s",
4080
                                        name,
4081
                                        t); /* no escaping necessary */
4082
                }
4083

UNCOV
4084
                return 1;
×
4085
        }
4086

4087
        return 0;
512✔
4088
}
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc