/* SPDX-License-Identifier: LGPL-2.1-or-later */ #include #include #include #include "sd-messages.h" #include "alloc-util.h" #include "bus-error.h" #include "bus-internal.h" #include "bus-locator.h" #include "bus-unit-util.h" #include "bus-util.h" #include "env-file.h" #include "errno-util.h" #include "escape.h" #include "extract-word.h" #include "fd-util.h" #include "fileio.h" #include "format-util.h" #include "fs-util.h" #include "hashmap.h" #include "machine-dbus.h" #include "machine.h" #include "mkdir-label.h" #include "parse-util.h" #include "path-util.h" #include "process-util.h" #include "serialize.h" #include "socket-util.h" #include "special.h" #include "stdio-util.h" #include "string-table.h" #include "string-util.h" #include "terminal-util.h" #include "tmpfile-util.h" #include "uid-range.h" #include "unit-name.h" #include "user-util.h" int machine_new(MachineClass class, const char *name, Machine **ret) { _cleanup_(machine_freep) Machine *m = NULL; assert(class < _MACHINE_CLASS_MAX); assert(ret); /* Passing class == _MACHINE_CLASS_INVALID here is fine. It * means as much as "we don't know yet", and that we'll figure * it out later when loading the state file. */ m = new(Machine, 1); if (!m) return -ENOMEM; *m = (Machine) { .class = class, .leader = PIDREF_NULL, .vsock_cid = VMADDR_CID_ANY, }; if (name) { m->name = strdup(name); if (!m->name) return -ENOMEM; } *ret = TAKE_PTR(m); return 0; } int machine_link(Manager *manager, Machine *machine) { int r; assert(manager); assert(machine); if (machine->manager) return -EEXIST; if (!machine->name) return -EINVAL; if (machine->class != MACHINE_HOST) { char *temp = path_join("/run/systemd/machines", machine->name); if (!temp) return -ENOMEM; free_and_replace(machine->state_file, temp); } r = hashmap_put(manager->machines, machine->name, machine); if (r < 0) return r; machine->manager = manager; return 0; } Machine* machine_free(Machine *m) { if (!m) return NULL; while (m->operations) operation_free(m->operations); if (m->in_gc_queue) { assert(m->manager); LIST_REMOVE(gc_queue, m->manager->machine_gc_queue, m); } if (m->manager) { machine_release_unit(m); (void) hashmap_remove(m->manager->machines, m->name); if (m->manager->host_machine == m) m->manager->host_machine = NULL; } m->leader_pidfd_event_source = sd_event_source_disable_unref(m->leader_pidfd_event_source); if (pidref_is_set(&m->leader)) { if (m->manager) (void) hashmap_remove_value(m->manager->machines_by_leader, &m->leader, m); pidref_done(&m->leader); } sd_bus_message_unref(m->create_message); free(m->name); free(m->scope_job); free(m->state_file); free(m->service); free(m->root_directory); free(m->netif); free(m->ssh_address); free(m->ssh_private_key_path); return mfree(m); } int machine_save(Machine *m) { _cleanup_(unlink_and_freep) char *temp_path = NULL; _cleanup_fclose_ FILE *f = NULL; int r; assert(m); if (!m->state_file) return 0; if (!m->started) return 0; r = mkdir_safe_label("/run/systemd/machines", 0755, 0, 0, MKDIR_WARN_MODE); if (r < 0) goto fail; r = fopen_temporary(m->state_file, &f, &temp_path); if (r < 0) goto fail; (void) fchmod(fileno(f), 0644); fprintf(f, "# This is private data. Do not parse.\n" "NAME=%s\n", m->name); if (m->unit) { _cleanup_free_ char *escaped = NULL; escaped = cescape(m->unit); if (!escaped) { r = -ENOMEM; goto fail; } fprintf(f, "SCOPE=%s\n", escaped); /* We continue to call this "SCOPE=" because it is internal only, and we want to stay compatible with old files */ } if (m->scope_job) fprintf(f, "SCOPE_JOB=%s\n", m->scope_job); if (m->service) { _cleanup_free_ char *escaped = NULL; escaped = cescape(m->service); if (!escaped) { r = -ENOMEM; goto fail; } fprintf(f, "SERVICE=%s\n", escaped); } if (m->root_directory) { _cleanup_free_ char *escaped = NULL; escaped = cescape(m->root_directory); if (!escaped) { r = -ENOMEM; goto fail; } fprintf(f, "ROOT=%s\n", escaped); } if (!sd_id128_is_null(m->id)) fprintf(f, "ID=" SD_ID128_FORMAT_STR "\n", SD_ID128_FORMAT_VAL(m->id)); if (pidref_is_set(&m->leader)) fprintf(f, "LEADER="PID_FMT"\n", m->leader.pid); if (m->class != _MACHINE_CLASS_INVALID) fprintf(f, "CLASS=%s\n", machine_class_to_string(m->class)); if (dual_timestamp_is_set(&m->timestamp)) fprintf(f, "REALTIME="USEC_FMT"\n" "MONOTONIC="USEC_FMT"\n", m->timestamp.realtime, m->timestamp.monotonic); if (m->n_netif > 0) { size_t i; fputs("NETIF=", f); for (i = 0; i < m->n_netif; i++) { if (i != 0) fputc(' ', f); fprintf(f, "%i", m->netif[i]); } fputc('\n', f); } r = fflush_and_check(f); if (r < 0) goto fail; if (rename(temp_path, m->state_file) < 0) { r = -errno; goto fail; } temp_path = mfree(temp_path); if (m->unit) { char *sl; /* Create a symlink from the unit name to the machine * name, so that we can quickly find the machine for * each given unit. Ignore error. */ sl = strjoina("/run/systemd/machines/unit:", m->unit); (void) symlink(m->name, sl); } return 0; fail: (void) unlink(m->state_file); return log_error_errno(r, "Failed to save machine data %s: %m", m->state_file); } static void machine_unlink(Machine *m) { assert(m); if (m->unit) { char *sl; sl = strjoina("/run/systemd/machines/unit:", m->unit); (void) unlink(sl); } if (m->state_file) (void) unlink(m->state_file); } int machine_load(Machine *m) { _cleanup_free_ char *realtime = NULL, *monotonic = NULL, *id = NULL, *leader = NULL, *class = NULL, *netif = NULL; int r; assert(m); if (!m->state_file) return 0; r = parse_env_file(NULL, m->state_file, "SCOPE", &m->unit, "SCOPE_JOB", &m->scope_job, "SERVICE", &m->service, "ROOT", &m->root_directory, "ID", &id, "LEADER", &leader, "CLASS", &class, "REALTIME", &realtime, "MONOTONIC", &monotonic, "NETIF", &netif); if (r == -ENOENT) return 0; if (r < 0) return log_error_errno(r, "Failed to read %s: %m", m->state_file); if (id) (void) sd_id128_from_string(id, &m->id); if (leader) { pidref_done(&m->leader); r = pidref_set_pidstr(&m->leader, leader); if (r < 0) log_debug_errno(r, "Failed to set leader PID to '%s', ignoring: %m", leader); } if (class) { MachineClass c; c = machine_class_from_string(class); if (c >= 0) m->class = c; } if (realtime) (void) deserialize_usec(realtime, &m->timestamp.realtime); if (monotonic) (void) deserialize_usec(monotonic, &m->timestamp.monotonic); if (netif) { _cleanup_free_ int *ni = NULL; size_t nr = 0; const char *p; p = netif; for (;;) { _cleanup_free_ char *word = NULL; r = extract_first_word(&p, &word, NULL, 0); if (r == 0) break; if (r == -ENOMEM) return log_oom(); if (r < 0) { log_warning_errno(r, "Failed to parse NETIF: %s", netif); break; } r = parse_ifindex(word); if (r < 0) continue; if (!GREEDY_REALLOC(ni, nr + 1)) return log_oom(); ni[nr++] = r; } free_and_replace(m->netif, ni); m->n_netif = nr; } return r; } static int machine_start_scope( Machine *machine, bool allow_pidfd, sd_bus_message *more_properties, sd_bus_error *error) { _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL, *reply = NULL; _cleanup_(sd_bus_error_free) sd_bus_error e = SD_BUS_ERROR_NULL; _cleanup_free_ char *escaped = NULL, *unit = NULL; const char *description; int r; assert(machine); assert(pidref_is_set(&machine->leader)); assert(!machine->unit); escaped = unit_name_escape(machine->name); if (!escaped) return log_oom(); unit = strjoin("machine-", escaped, ".scope"); if (!unit) return log_oom(); r = bus_message_new_method_call( machine->manager->bus, &m, bus_systemd_mgr, "StartTransientUnit"); if (r < 0) return r; r = sd_bus_message_append(m, "ss", unit, "fail"); if (r < 0) return r; r = sd_bus_message_open_container(m, 'a', "(sv)"); if (r < 0) return r; r = sd_bus_message_append(m, "(sv)", "Slice", "s", SPECIAL_MACHINE_SLICE); if (r < 0) return r; description = strjoina(machine->class == MACHINE_VM ? "Virtual Machine " : "Container ", machine->name); r = sd_bus_message_append(m, "(sv)", "Description", "s", description); if (r < 0) return r; r = bus_append_scope_pidref(m, &machine->leader, allow_pidfd); if (r < 0) return r; r = sd_bus_message_append(m, "(sv)(sv)(sv)(sv)", "Delegate", "b", 1, "CollectMode", "s", "inactive-or-failed", "AddRef", "b", 1, "TasksMax", "t", UINT64_C(16384)); if (r < 0) return r; if (more_properties) { r = sd_bus_message_copy(m, more_properties, true); if (r < 0) return r; } r = sd_bus_message_close_container(m); if (r < 0) return r; r = sd_bus_message_append(m, "a(sa(sv))", 0); if (r < 0) return r; r = sd_bus_call(NULL, m, 0, &e, &reply); if (r < 0) { /* If this failed with a property we couldn't write, this is quite likely because the server * doesn't support PIDFDs yet, let's try without. */ if (allow_pidfd && sd_bus_error_has_names(&e, SD_BUS_ERROR_UNKNOWN_PROPERTY, SD_BUS_ERROR_PROPERTY_READ_ONLY)) return machine_start_scope(machine, /* allow_pidfd = */ false, more_properties, error); return sd_bus_error_move(error, &e); } machine->unit = TAKE_PTR(unit); machine->referenced = true; const char *job; r = sd_bus_message_read(reply, "o", &job); if (r < 0) return r; return free_and_strdup(&machine->scope_job, job); } static int machine_ensure_scope(Machine *m, sd_bus_message *properties, sd_bus_error *error) { int r; assert(m); assert(m->class != MACHINE_HOST); if (!m->unit) { r = machine_start_scope(m, /* allow_pidfd = */ true, properties, error); if (r < 0) return log_error_errno(r, "Failed to start machine scope: %s", bus_error_message(error, r)); } assert(m->unit); r = hashmap_ensure_put(&m->manager->machines_by_unit, &string_hash_ops, m->unit, m); if (r < 0) return r; return 0; } static int machine_dispatch_leader_pidfd(sd_event_source *s, int fd, unsigned revents, void *userdata) { Machine *m = ASSERT_PTR(userdata); m->leader_pidfd_event_source = sd_event_source_disable_unref(m->leader_pidfd_event_source); machine_add_to_gc_queue(m); return 0; } static int machine_watch_pidfd(Machine *m) { int r; assert(m); assert(m->manager); assert(pidref_is_set(&m->leader)); assert(!m->leader_pidfd_event_source); if (m->leader.fd < 0) return 0; /* If we have a pidfd for the leader, let's also track it for POLLIN, and GC the machine * automatically if it dies */ r = sd_event_add_io(m->manager->event, &m->leader_pidfd_event_source, m->leader.fd, EPOLLIN, machine_dispatch_leader_pidfd, m); if (r < 0) return r; (void) sd_event_source_set_description(m->leader_pidfd_event_source, "machine-pidfd"); return 0; } int machine_start(Machine *m, sd_bus_message *properties, sd_bus_error *error) { int r; assert(m); if (!IN_SET(m->class, MACHINE_CONTAINER, MACHINE_VM)) return -EOPNOTSUPP; if (m->started) return 0; r = hashmap_ensure_put(&m->manager->machines_by_leader, &pidref_hash_ops, &m->leader, m); if (r < 0) return r; r = machine_watch_pidfd(m); if (r < 0) return r; /* Create cgroup */ r = machine_ensure_scope(m, properties, error); if (r < 0) return r; log_struct(LOG_INFO, "MESSAGE_ID=" SD_MESSAGE_MACHINE_START_STR, "NAME=%s", m->name, "LEADER="PID_FMT, m->leader.pid, LOG_MESSAGE("New machine %s.", m->name)); if (!dual_timestamp_is_set(&m->timestamp)) dual_timestamp_now(&m->timestamp); m->started = true; /* Save new machine data */ machine_save(m); machine_send_signal(m, true); return 0; } int machine_stop(Machine *m) { int r; assert(m); if (!IN_SET(m->class, MACHINE_CONTAINER, MACHINE_VM)) return -EOPNOTSUPP; if (m->unit) { _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL; char *job = NULL; r = manager_stop_unit(m->manager, m->unit, &error, &job); if (r < 0) return log_error_errno(r, "Failed to stop machine scope: %s", bus_error_message(&error, r)); free_and_replace(m->scope_job, job); } m->stopping = true; machine_save(m); return 0; } int machine_finalize(Machine *m) { assert(m); if (m->started) { log_struct(LOG_INFO, "MESSAGE_ID=" SD_MESSAGE_MACHINE_STOP_STR, "NAME=%s", m->name, "LEADER="PID_FMT, m->leader.pid, LOG_MESSAGE("Machine %s terminated.", m->name)); m->stopping = true; /* The machine is supposed to be going away. Don't try to kill it. */ } machine_unlink(m); machine_add_to_gc_queue(m); if (m->started) { machine_send_signal(m, false); m->started = false; } return 0; } bool machine_may_gc(Machine *m, bool drop_not_started) { assert(m); if (m->class == MACHINE_HOST) return false; if (drop_not_started && !m->started) return true; if (m->scope_job && manager_job_is_active(m->manager, m->scope_job)) return false; if (m->unit && manager_unit_is_active(m->manager, m->unit)) return false; return true; } void machine_add_to_gc_queue(Machine *m) { assert(m); if (m->in_gc_queue) return; LIST_PREPEND(gc_queue, m->manager->machine_gc_queue, m); m->in_gc_queue = true; manager_enqueue_gc(m->manager); } MachineState machine_get_state(Machine *s) { assert(s); if (s->class == MACHINE_HOST) return MACHINE_RUNNING; if (s->stopping) return MACHINE_CLOSING; if (s->scope_job) return MACHINE_OPENING; return MACHINE_RUNNING; } int machine_kill(Machine *m, KillWhom whom, int signo) { assert(m); if (!IN_SET(m->class, MACHINE_VM, MACHINE_CONTAINER)) return -EOPNOTSUPP; if (!m->unit) return -ESRCH; if (whom == KILL_LEADER) /* If we shall simply kill the leader, do so directly */ return pidref_kill(&m->leader, signo); /* Otherwise, make PID 1 do it for us, for the entire cgroup */ return manager_kill_unit(m->manager, m->unit, signo, NULL); } int machine_openpt(Machine *m, int flags, char **ret_slave) { assert(m); switch (m->class) { case MACHINE_HOST: return openpt_allocate(flags, ret_slave); case MACHINE_CONTAINER: if (!pidref_is_set(&m->leader)) return -EINVAL; return openpt_allocate_in_namespace(m->leader.pid, flags, ret_slave); default: return -EOPNOTSUPP; } } int machine_open_terminal(Machine *m, const char *path, int mode) { assert(m); switch (m->class) { case MACHINE_HOST: return open_terminal(path, mode); case MACHINE_CONTAINER: if (!pidref_is_set(&m->leader)) return -EINVAL; return open_terminal_in_namespace(m->leader.pid, path, mode); default: return -EOPNOTSUPP; } } static int machine_bus_new(Machine *m, sd_bus_error *error, sd_bus **ret) { int r; assert(m); assert(ret); switch (m->class) { case MACHINE_HOST: *ret = NULL; return 0; case MACHINE_CONTAINER: { _cleanup_(sd_bus_close_unrefp) sd_bus *bus = NULL; char *address; r = sd_bus_new(&bus); if (r < 0) return log_debug_errno(r, "Failed to allocate new DBus: %m"); if (asprintf(&address, "x-machine-unix:pid=%" PID_PRI, m->leader.pid) < 0) return -ENOMEM; bus->address = address; bus->bus_client = true; bus->trusted = false; bus->runtime_scope = RUNTIME_SCOPE_SYSTEM; r = sd_bus_start(bus); if (r == -ENOENT) return sd_bus_error_set_errnof(error, r, "There is no system bus in container %s.", m->name); if (r < 0) return r; *ret = TAKE_PTR(bus); return 0; } default: return -EOPNOTSUPP; } } int machine_start_getty(Machine *m, const char *ptmx_name, sd_bus_error *error) { _cleanup_(sd_bus_flush_close_unrefp) sd_bus *allocated_bus = NULL; sd_bus *container_bus = NULL; const char *p, *getty; int r; assert(m); assert(ptmx_name); p = path_startswith(ptmx_name, "/dev/pts/"); if (!p) return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Path of pseudo TTY has unexpected prefix"); r = machine_bus_new(m, error, &allocated_bus); if (r < 0) return log_debug_errno(r, "Failed to create DBus to machine: %m"); container_bus = allocated_bus ?: m->manager->bus; getty = strjoina("container-getty@", p, ".service"); r = bus_call_method(container_bus, bus_systemd_mgr, "StartUnit", error, /* reply = */ NULL, "ss", getty, "replace"); if (r < 0) return log_debug_errno(r, "Failed to StartUnit '%s' in container '%s': %m", getty, m->name); return 0; } int machine_start_shell( Machine *m, int ptmx_fd, const char *ptmx_name, const char *user, const char *path, char **args, char **env, sd_bus_error *error) { _cleanup_close_ int pty_fd = -EBADF; _cleanup_(sd_bus_message_unrefp) sd_bus_message *tm = NULL; _cleanup_(sd_bus_flush_close_unrefp) sd_bus *allocated_bus = NULL; const char *p, *utmp_id, *unit, *description; sd_bus *container_bus = NULL; int r; assert(m); assert(ptmx_fd >= 0); assert(ptmx_name); if (isempty(user) || isempty(path) || strv_isempty(args)) return -EINVAL; p = path_startswith(ptmx_name, "/dev/pts/"); utmp_id = path_startswith(ptmx_name, "/dev/"); if (!p || !utmp_id) return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Path of pseudo TTY has unexpected prefix"); /* First try to get an fd for the PTY peer via the new racefree ioctl(), directly. Otherwise go via * joining the namespace, because it goes by path */ pty_fd = pty_open_peer_racefree(ptmx_fd, O_RDWR|O_NOCTTY|O_CLOEXEC); if (ERRNO_IS_NEG_NOT_SUPPORTED(pty_fd)) pty_fd = machine_open_terminal(m, ptmx_name, O_RDWR|O_NOCTTY|O_CLOEXEC); if (pty_fd < 0) return log_debug_errno(pty_fd, "Failed to open terminal: %m"); r = machine_bus_new(m, error, &allocated_bus); if (r < 0) return log_debug_errno(r, "Failed to create DBus to machine: %m"); container_bus = allocated_bus ?: m->manager->bus; r = bus_message_new_method_call(container_bus, &tm, bus_systemd_mgr, "StartTransientUnit"); if (r < 0) return r; /* Name and mode */ unit = strjoina("container-shell@", p, ".service"); r = sd_bus_message_append(tm, "ss", unit, "fail"); if (r < 0) return r; /* Properties */ r = sd_bus_message_open_container(tm, 'a', "(sv)"); if (r < 0) return r; description = strjoina("Shell for User ", user); r = sd_bus_message_append(tm, "(sv)(sv)(sv)(sv)(sv)(sv)(sv)(sv)(sv)(sv)(sv)(sv)(sv)", "Description", "s", description, "StandardInputFileDescriptor", "h", pty_fd, "StandardOutputFileDescriptor", "h", pty_fd, "StandardErrorFileDescriptor", "h", pty_fd, "SendSIGHUP", "b", true, "IgnoreSIGPIPE", "b", false, "KillMode", "s", "mixed", "TTYPath", "s", ptmx_name, "TTYReset", "b", true, "UtmpIdentifier", "s", utmp_id, "UtmpMode", "s", "user", "PAMName", "s", "login", "WorkingDirectory", "s", "-~"); if (r < 0) return r; r = sd_bus_message_append(tm, "(sv)", "User", "s", user); if (r < 0) return r; if (!strv_isempty(env)) { r = sd_bus_message_open_container(tm, 'r', "sv"); if (r < 0) return r; r = sd_bus_message_append(tm, "s", "Environment"); if (r < 0) return r; r = sd_bus_message_open_container(tm, 'v', "as"); if (r < 0) return r; r = sd_bus_message_append_strv(tm, env); if (r < 0) return r; r = sd_bus_message_close_container(tm); if (r < 0) return r; r = sd_bus_message_close_container(tm); if (r < 0) return r; } /* Exec container */ r = sd_bus_message_open_container(tm, 'r', "sv"); if (r < 0) return r; r = sd_bus_message_append(tm, "s", "ExecStart"); if (r < 0) return r; r = sd_bus_message_open_container(tm, 'v', "a(sasb)"); if (r < 0) return r; r = sd_bus_message_open_container(tm, 'a', "(sasb)"); if (r < 0) return r; r = sd_bus_message_open_container(tm, 'r', "sasb"); if (r < 0) return r; r = sd_bus_message_append(tm, "s", path); if (r < 0) return r; r = sd_bus_message_append_strv(tm, args); if (r < 0) return r; r = sd_bus_message_append(tm, "b", true); if (r < 0) return r; r = sd_bus_message_close_container(tm); if (r < 0) return r; r = sd_bus_message_close_container(tm); if (r < 0) return r; r = sd_bus_message_close_container(tm); if (r < 0) return r; r = sd_bus_message_close_container(tm); if (r < 0) return r; r = sd_bus_message_close_container(tm); if (r < 0) return r; /* Auxiliary units */ r = sd_bus_message_append(tm, "a(sa(sv))", 0); if (r < 0) return r; r = sd_bus_call(container_bus, tm, 0, error, NULL); if (r < 0) return r; return 0; } char** machine_default_shell_args(const char *user) { _cleanup_strv_free_ char **args = NULL; int r; assert(user); args = new0(char*, 3 + 1); if (!args) return NULL; args[0] = strdup("sh"); if (!args[0]) return NULL; args[1] = strdup("-c"); if (!args[1]) return NULL; r = asprintf(&args[2], "shell=$(getent passwd %s 2>/dev/null | { IFS=: read _ _ _ _ _ _ x; echo \"$x\"; })\n"\ "exec \"${shell:-/bin/sh}\" -l", /* -l is means --login */ user); if (r < 0) { args[2] = NULL; return NULL; } return TAKE_PTR(args); } void machine_release_unit(Machine *m) { assert(m); if (!m->unit) return; assert(m->manager); if (m->referenced) { _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL; int r; r = manager_unref_unit(m->manager, m->unit, &error); if (r < 0) log_full_errno(ERRNO_IS_DISCONNECT(r) ? LOG_DEBUG : LOG_WARNING, r, "Failed to drop reference to machine scope, ignoring: %s", bus_error_message(&error, r)); m->referenced = false; } (void) hashmap_remove_value(m->manager->machines_by_unit, m->unit, m); m->unit = mfree(m->unit); } int machine_get_uid_shift(Machine *m, uid_t *ret) { char p[STRLEN("/proc//uid_map") + DECIMAL_STR_MAX(pid_t) + 1]; uid_t uid_base, uid_shift, uid_range; gid_t gid_base, gid_shift, gid_range; _cleanup_fclose_ FILE *f = NULL; int r; assert(m); assert(ret); /* Return the base UID/GID of the specified machine. Note that this only works for containers with simple * mappings. In most cases setups should be simple like this, and administrators should only care about the * basic offset a container has relative to the host. This is what this function exposes. * * If we encounter any more complex mappings we politely refuse this with ENXIO. */ if (m->class == MACHINE_HOST) { *ret = 0; return 0; } if (m->class != MACHINE_CONTAINER) return -EOPNOTSUPP; xsprintf(p, "/proc/" PID_FMT "/uid_map", m->leader.pid); f = fopen(p, "re"); if (!f) { if (errno == ENOENT) { /* If the file doesn't exist, user namespacing is off in the kernel, return a zero mapping hence. */ *ret = 0; return 0; } return -errno; } /* Read the first line. There's at least one. */ r = uid_map_read_one(f, &uid_base, &uid_shift, &uid_range); if (r < 0) return r; /* Not a mapping starting at 0? Then it's a complex mapping we can't expose here. */ if (uid_base != 0) return -ENXIO; /* Insist that at least the nobody user is mapped, everything else is weird, and hence complex, and we don't support it */ if (uid_range < UID_NOBODY) return -ENXIO; /* If there's more than one line, then we don't support this mapping. */ r = safe_fgetc(f, NULL); if (r < 0) return r; if (r != 0) /* Insist on EOF */ return -ENXIO; fclose(f); xsprintf(p, "/proc/" PID_FMT "/gid_map", m->leader.pid); f = fopen(p, "re"); if (!f) return -errno; /* Read the first line. There's at least one. */ errno = 0; r = fscanf(f, GID_FMT " " GID_FMT " " GID_FMT "\n", &gid_base, &gid_shift, &gid_range); if (r == EOF) return errno_or_else(ENOMSG); assert(r >= 0); if (r != 3) return -EBADMSG; /* If there's more than one line, then we don't support this file. */ r = safe_fgetc(f, NULL); if (r < 0) return r; if (r != 0) /* Insist on EOF */ return -ENXIO; /* If the UID and GID mapping doesn't match, we don't support this mapping. */ if (uid_base != (uid_t) gid_base) return -ENXIO; if (uid_shift != (uid_t) gid_shift) return -ENXIO; if (uid_range != (uid_t) gid_range) return -ENXIO; *ret = uid_shift; return 0; } static int machine_owns_uid_internal( Machine *machine, const char *map_file, /* "uid_map" or "gid_map" */ uid_t uid, uid_t *ret_internal_uid) { _cleanup_fclose_ FILE *f = NULL; const char *p; int r; /* This is a generic implementation for both uids and gids, under the assumptions they have the same types and semantics. */ assert_cc(sizeof(uid_t) == sizeof(gid_t)); assert(machine); /* Checks if the specified host UID is owned by the machine, and returns the UID it maps to * internally in the machine */ if (machine->class != MACHINE_CONTAINER) goto negative; p = procfs_file_alloca(machine->leader.pid, map_file); f = fopen(p, "re"); if (!f) { log_debug_errno(errno, "Failed to open %s, ignoring.", p); goto negative; } for (;;) { uid_t uid_base, uid_shift, uid_range, converted; r = uid_map_read_one(f, &uid_base, &uid_shift, &uid_range); if (r == -ENOMSG) break; if (r < 0) return r; /* The private user namespace is disabled, ignoring. */ if (uid_shift == 0) continue; if (uid < uid_shift || uid >= uid_shift + uid_range) continue; converted = (uid - uid_shift + uid_base); if (!uid_is_valid(converted)) return -EINVAL; if (ret_internal_uid) *ret_internal_uid = converted; return true; } negative: if (ret_internal_uid) *ret_internal_uid = UID_INVALID; return false; } int machine_owns_uid(Machine *machine, uid_t uid, uid_t *ret_internal_uid) { return machine_owns_uid_internal(machine, "uid_map", uid, ret_internal_uid); } int machine_owns_gid(Machine *machine, gid_t gid, gid_t *ret_internal_gid) { return machine_owns_uid_internal(machine, "gid_map", (uid_t) gid, (uid_t*) ret_internal_gid); } static int machine_translate_uid_internal( Machine *machine, const char *map_file, /* "uid_map" or "gid_map" */ uid_t uid, uid_t *ret_host_uid) { _cleanup_fclose_ FILE *f = NULL; const char *p; int r; /* This is a generic implementation for both uids and gids, under the assumptions they have the same types and semantics. */ assert_cc(sizeof(uid_t) == sizeof(gid_t)); assert(machine); assert(uid_is_valid(uid)); if (machine->class != MACHINE_CONTAINER) return -ESRCH; /* Translates a machine UID into a host UID */ p = procfs_file_alloca(machine->leader.pid, map_file); f = fopen(p, "re"); if (!f) return -errno; for (;;) { uid_t uid_base, uid_shift, uid_range, converted; r = uid_map_read_one(f, &uid_base, &uid_shift, &uid_range); if (r == -ENOMSG) break; if (r < 0) return r; if (uid < uid_base || uid >= uid_base + uid_range) continue; converted = uid - uid_base + uid_shift; if (!uid_is_valid(converted)) return -EINVAL; if (ret_host_uid) *ret_host_uid = converted; return 0; } return -ESRCH; } int machine_translate_uid(Machine *machine, gid_t uid, gid_t *ret_host_uid) { return machine_translate_uid_internal(machine, "uid_map", uid, ret_host_uid); } int machine_translate_gid(Machine *machine, gid_t gid, gid_t *ret_host_gid) { return machine_translate_uid_internal(machine, "gid_map", (uid_t) gid, (uid_t*) ret_host_gid); } static const char* const machine_class_table[_MACHINE_CLASS_MAX] = { [MACHINE_CONTAINER] = "container", [MACHINE_VM] = "vm", [MACHINE_HOST] = "host", }; DEFINE_STRING_TABLE_LOOKUP(machine_class, MachineClass); static const char* const machine_state_table[_MACHINE_STATE_MAX] = { [MACHINE_OPENING] = "opening", [MACHINE_RUNNING] = "running", [MACHINE_CLOSING] = "closing" }; DEFINE_STRING_TABLE_LOOKUP(machine_state, MachineState); static const char* const kill_whom_table[_KILL_WHOM_MAX] = { [KILL_LEADER] = "leader", [KILL_ALL] = "all" }; DEFINE_STRING_TABLE_LOOKUP(kill_whom, KillWhom); static const char* const acquire_metadata_table[_ACQUIRE_METADATA_MAX] = { [ACQUIRE_METADATA_NO] = "no", [ACQUIRE_METADATA_YES] = "yes", [ACQUIRE_METADATA_GRACEFUL] = "graceful" }; DEFINE_STRING_TABLE_LOOKUP_WITH_BOOLEAN(acquire_metadata, AcquireMetadata, ACQUIRE_METADATA_YES);