]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/core/machine-id-setup.c
machine-id-setup: simplify by using prefix_roota
[thirdparty/systemd.git] / src / core / machine-id-setup.c
1 /***
2 This file is part of systemd.
3
4 Copyright 2010 Lennart Poettering
5
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
10
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
15
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
18 ***/
19
20 #include <errno.h>
21 #include <fcntl.h>
22 #include <sched.h>
23 #include <stdio.h>
24 #include <string.h>
25 #include <sys/mount.h>
26 #include <unistd.h>
27
28 #include "sd-id128.h"
29
30 #include "alloc-util.h"
31 #include "fd-util.h"
32 #include "fileio.h"
33 #include "fs-util.h"
34 #include "hexdecoct.h"
35 #include "io-util.h"
36 #include "log.h"
37 #include "machine-id-setup.h"
38 #include "macro.h"
39 #include "mkdir.h"
40 #include "mount-util.h"
41 #include "path-util.h"
42 #include "process-util.h"
43 #include "stat-util.h"
44 #include "string-util.h"
45 #include "umask-util.h"
46 #include "util.h"
47 #include "virt.h"
48
49 static int shorten_uuid(char destination[34], const char source[36]) {
50 unsigned i, j;
51
52 assert(destination);
53 assert(source);
54
55 /* Converts a UUID into a machine ID, by lowercasing it and
56 * removing dashes. Validates everything. */
57
58 for (i = 0, j = 0; i < 36 && j < 32; i++) {
59 int t;
60
61 t = unhexchar(source[i]);
62 if (t < 0)
63 continue;
64
65 destination[j++] = hexchar(t);
66 }
67
68 if (i != 36 || j != 32)
69 return -EINVAL;
70
71 destination[32] = '\n';
72 destination[33] = 0;
73 return 0;
74 }
75
76 static int read_machine_id(int fd, char id[34]) {
77 char id_to_validate[34];
78 int r;
79
80 assert(fd >= 0);
81 assert(id);
82
83 /* Reads a machine ID from a file, validates it, and returns
84 * it. The returned ID ends in a newline. */
85
86 r = loop_read_exact(fd, id_to_validate, 33, false);
87 if (r < 0)
88 return r;
89
90 if (id_to_validate[32] != '\n')
91 return -EINVAL;
92
93 id_to_validate[32] = 0;
94
95 if (!id128_is_valid(id_to_validate))
96 return -EINVAL;
97
98 memcpy(id, id_to_validate, 32);
99 id[32] = '\n';
100 id[33] = 0;
101 return 0;
102 }
103
104 static int write_machine_id(int fd, char id[34]) {
105 assert(fd >= 0);
106 assert(id);
107
108 if (lseek(fd, 0, SEEK_SET) < 0)
109 return -errno;
110
111 return loop_write(fd, id, 33, false);
112 }
113
114 static int generate_machine_id(char id[34], const char *root) {
115 int fd, r;
116 unsigned char *p;
117 sd_id128_t buf;
118 char *q;
119 const char *dbus_machine_id;
120
121 assert(id);
122
123 dbus_machine_id = prefix_roota(root, "/var/lib/dbus/machine-id");
124
125 /* First, try reading the D-Bus machine id, unless it is a symlink */
126 fd = open(dbus_machine_id, O_RDONLY|O_CLOEXEC|O_NOCTTY|O_NOFOLLOW);
127 if (fd >= 0) {
128 r = read_machine_id(fd, id);
129 safe_close(fd);
130
131 if (r >= 0) {
132 log_info("Initializing machine ID from D-Bus machine ID.");
133 return 0;
134 }
135 }
136
137 if (isempty(root)) {
138 /* If that didn't work, see if we are running in a container,
139 * and a machine ID was passed in via $container_uuid the way
140 * libvirt/LXC does it */
141
142 if (detect_container() > 0) {
143 _cleanup_free_ char *e = NULL;
144
145 r = getenv_for_pid(1, "container_uuid", &e);
146 if (r > 0) {
147 r = shorten_uuid(id, e);
148 if (r >= 0) {
149 log_info("Initializing machine ID from container UUID.");
150 return 0;
151 }
152 }
153
154 } else if (detect_vm() == VIRTUALIZATION_KVM) {
155
156 /* If we are not running in a container, see if we are
157 * running in qemu/kvm and a machine ID was passed in
158 * via -uuid on the qemu/kvm command line */
159
160 char uuid[36];
161
162 fd = open("/sys/class/dmi/id/product_uuid", O_RDONLY|O_CLOEXEC|O_NOCTTY|O_NOFOLLOW);
163 if (fd >= 0) {
164 r = loop_read_exact(fd, uuid, 36, false);
165 safe_close(fd);
166
167 if (r >= 0) {
168 r = shorten_uuid(id, uuid);
169 if (r >= 0) {
170 log_info("Initializing machine ID from KVM UUID.");
171 return 0;
172 }
173 }
174 }
175 }
176 }
177
178 /* If that didn't work, generate a random machine id */
179 r = sd_id128_randomize(&buf);
180 if (r < 0)
181 return log_error_errno(r, "Failed to open /dev/urandom: %m");
182
183 for (p = buf.bytes, q = id; p < buf.bytes + sizeof(buf); p++, q += 2) {
184 q[0] = hexchar(*p >> 4);
185 q[1] = hexchar(*p & 15);
186 }
187
188 id[32] = '\n';
189 id[33] = 0;
190
191 log_info("Initializing machine ID from random generator.");
192
193 return 0;
194 }
195
196 int machine_id_setup(const char *root, sd_id128_t machine_id) {
197 const char *etc_machine_id, *run_machine_id;
198 _cleanup_close_ int fd = -1;
199 bool writable = true;
200 char id[34]; /* 32 + \n + \0 */
201 int r;
202
203 etc_machine_id = prefix_roota(root, "/etc/machine-id");
204 run_machine_id = prefix_roota(root, "/run/machine-id");
205
206 RUN_WITH_UMASK(0000) {
207 /* We create this 0444, to indicate that this isn't really
208 * something you should ever modify. Of course, since the file
209 * will be owned by root it doesn't matter much, but maybe
210 * people look. */
211
212 mkdir_parents(etc_machine_id, 0755);
213 fd = open(etc_machine_id, O_RDWR|O_CREAT|O_CLOEXEC|O_NOCTTY, 0444);
214 if (fd < 0) {
215 int old_errno = errno;
216
217 fd = open(etc_machine_id, O_RDONLY|O_CLOEXEC|O_NOCTTY);
218 if (fd < 0) {
219 if (old_errno == EROFS && errno == ENOENT)
220 log_error_errno(errno,
221 "System cannot boot: Missing /etc/machine-id and /etc is mounted read-only.\n"
222 "Booting up is supported only when:\n"
223 "1) /etc/machine-id exists and is populated.\n"
224 "2) /etc/machine-id exists and is empty.\n"
225 "3) /etc/machine-id is missing and /etc is writable.\n");
226 else
227 log_error_errno(errno, "Cannot open %s: %m", etc_machine_id);
228
229 return -errno;
230 }
231
232 writable = false;
233 }
234 }
235
236 /* A machine id argument overrides all other machined-ids */
237 if (!sd_id128_is_null(machine_id)) {
238 sd_id128_to_string(machine_id, id);
239 id[32] = '\n';
240 id[33] = 0;
241 } else {
242 if (read_machine_id(fd, id) >= 0)
243 return 0;
244
245 /* Hmm, so, the id currently stored is not useful, then let's
246 * generate one */
247
248 r = generate_machine_id(id, root);
249 if (r < 0)
250 return r;
251 }
252
253 if (writable)
254 if (write_machine_id(fd, id) >= 0)
255 return 0;
256
257 fd = safe_close(fd);
258
259 /* Hmm, we couldn't write it? So let's write it to
260 * /run/machine-id as a replacement */
261
262 RUN_WITH_UMASK(0022) {
263 r = write_string_file(run_machine_id, id, WRITE_STRING_FILE_CREATE);
264 }
265 if (r < 0) {
266 (void) unlink(run_machine_id);
267 return log_error_errno(r, "Cannot write %s: %m", run_machine_id);
268 }
269
270 /* And now, let's mount it over */
271 if (mount(run_machine_id, etc_machine_id, NULL, MS_BIND, NULL) < 0) {
272 (void) unlink_noerrno(run_machine_id);
273 return log_error_errno(errno, "Failed to mount %s: %m", etc_machine_id);
274 }
275
276 log_info("Installed transient %s file.", etc_machine_id);
277
278 /* Mark the mount read-only */
279 if (mount(NULL, etc_machine_id, NULL, MS_BIND|MS_RDONLY|MS_REMOUNT, NULL) < 0)
280 log_warning_errno(errno, "Failed to make transient %s read-only: %m", etc_machine_id);
281
282 return 0;
283 }
284
285 int machine_id_commit(const char *root) {
286 _cleanup_close_ int fd = -1, initial_mntns_fd = -1;
287 const char *etc_machine_id;
288 char id[34]; /* 32 + \n + \0 */
289 int r;
290
291 etc_machine_id = prefix_roota(root, "/etc/machine-id");
292
293 r = path_is_mount_point(etc_machine_id, 0);
294 if (r < 0)
295 return log_error_errno(r, "Failed to determine whether %s is a mount point: %m", etc_machine_id);
296 if (r == 0) {
297 log_debug("%s is is not a mount point. Nothing to do.", etc_machine_id);
298 return 0;
299 }
300
301 /* Read existing machine-id */
302 fd = open(etc_machine_id, O_RDONLY|O_CLOEXEC|O_NOCTTY);
303 if (fd < 0)
304 return log_error_errno(errno, "Cannot open %s: %m", etc_machine_id);
305
306 r = read_machine_id(fd, id);
307 if (r < 0)
308 return log_error_errno(r, "We didn't find a valid machine ID in %s.", etc_machine_id);
309
310 r = fd_is_temporary_fs(fd);
311 if (r < 0)
312 return log_error_errno(r, "Failed to determine whether %s is on a temporary file system: %m", etc_machine_id);
313 if (r == 0) {
314 log_error("%s is not on a temporary file system.", etc_machine_id);
315 return -EROFS;
316 }
317
318 fd = safe_close(fd);
319
320 /* Store current mount namespace */
321 r = namespace_open(0, NULL, &initial_mntns_fd, NULL, NULL, NULL);
322 if (r < 0)
323 return log_error_errno(r, "Can't fetch current mount namespace: %m");
324
325 /* Switch to a new mount namespace, isolate ourself and unmount etc_machine_id in our new namespace */
326 if (unshare(CLONE_NEWNS) < 0)
327 return log_error_errno(errno, "Failed to enter new namespace: %m");
328
329 if (mount(NULL, "/", NULL, MS_SLAVE | MS_REC, NULL) < 0)
330 return log_error_errno(errno, "Couldn't make-rslave / mountpoint in our private namespace: %m");
331
332 if (umount(etc_machine_id) < 0)
333 return log_error_errno(errno, "Failed to unmount transient %s file in our private namespace: %m", etc_machine_id);
334
335 /* Update a persistent version of etc_machine_id */
336 fd = open(etc_machine_id, O_RDWR|O_CREAT|O_CLOEXEC|O_NOCTTY, 0444);
337 if (fd < 0)
338 return log_error_errno(errno, "Cannot open for writing %s. This is mandatory to get a persistent machine-id: %m", etc_machine_id);
339
340 r = write_machine_id(fd, id);
341 if (r < 0)
342 return log_error_errno(r, "Cannot write %s: %m", etc_machine_id);
343
344 fd = safe_close(fd);
345
346 /* Return to initial namespace and proceed a lazy tmpfs unmount */
347 r = namespace_enter(-1, initial_mntns_fd, -1, -1, -1);
348 if (r < 0)
349 return log_warning_errno(r, "Failed to switch back to initial mount namespace: %m.\nWe'll keep transient %s file until next reboot.", etc_machine_id);
350
351 if (umount2(etc_machine_id, MNT_DETACH) < 0)
352 return log_warning_errno(errno, "Failed to unmount transient %s file: %m.\nWe keep that mount until next reboot.", etc_machine_id);
353
354 return 0;
355 }