1 /* SPDX-License-Identifier: LGPL-2.1+ */
3 Copyright 2016 Lennart Poettering
11 #include "alloc-util.h"
12 #include "bus-common-errors.h"
13 #include "dirent-util.h"
20 #include "signal-util.h"
21 #include "stdio-util.h"
22 #include "string-util.h"
23 #include "user-util.h"
26 #define DYNAMIC_USER_GECOS "Dynamic User"
27 #define DYNAMIC_USER_PASSWD "*" /* locked */
28 #define DYNAMIC_USER_DIR "/"
29 #define DYNAMIC_USER_SHELL "/sbin/nologin"
31 static const struct passwd root_passwd
= {
32 .pw_name
= (char*) "root",
33 .pw_passwd
= (char*) "x", /* see shadow file */
36 .pw_gecos
= (char*) "Super User",
37 .pw_dir
= (char*) "/root",
38 .pw_shell
= (char*) "/bin/sh",
41 static const struct passwd nobody_passwd
= {
42 .pw_name
= (char*) NOBODY_USER_NAME
,
43 .pw_passwd
= (char*) "*", /* locked */
46 .pw_gecos
= (char*) "User Nobody",
47 .pw_dir
= (char*) "/",
48 .pw_shell
= (char*) "/sbin/nologin",
51 static const struct group root_group
= {
52 .gr_name
= (char*) "root",
54 .gr_passwd
= (char*) "x", /* see shadow file */
55 .gr_mem
= (char*[]) { NULL
},
58 static const struct group nobody_group
= {
59 .gr_name
= (char*) NOBODY_GROUP_NAME
,
61 .gr_passwd
= (char*) "*", /* locked */
62 .gr_mem
= (char*[]) { NULL
},
65 typedef struct UserEntry UserEntry
;
66 typedef struct GetentData GetentData
;
73 LIST_FIELDS(UserEntry
, entries
);
77 /* As explained in NOTES section of getpwent_r(3) as 'getpwent_r() is not really
78 * reentrant since it shares the reading position in the stream with all other threads',
79 * we need to protect the data in UserEntry from multithreaded programs which may call
80 * setpwent(), getpwent_r(), or endpwent() simultaneously. So, each function locks the
81 * data by using the mutex below. */
82 pthread_mutex_t mutex
;
85 LIST_HEAD(UserEntry
, entries
);
88 static GetentData getpwent_data
= { PTHREAD_MUTEX_INITIALIZER
, NULL
, NULL
};
89 static GetentData getgrent_data
= { PTHREAD_MUTEX_INITIALIZER
, NULL
, NULL
};
91 NSS_GETPW_PROTOTYPES(systemd
);
92 NSS_GETGR_PROTOTYPES(systemd
);
93 enum nss_status
_nss_systemd_endpwent(void) _public_
;
94 enum nss_status
_nss_systemd_setpwent(int stayopen
) _public_
;
95 enum nss_status
_nss_systemd_getpwent_r(struct passwd
*result
, char *buffer
, size_t buflen
, int *errnop
) _public_
;
96 enum nss_status
_nss_systemd_endgrent(void) _public_
;
97 enum nss_status
_nss_systemd_setgrent(int stayopen
) _public_
;
98 enum nss_status
_nss_systemd_getgrent_r(struct group
*result
, char *buffer
, size_t buflen
, int *errnop
) _public_
;
100 static int direct_lookup_name(const char *name
, uid_t
*ret
) {
101 _cleanup_free_
char *s
= NULL
;
107 /* Normally, we go via the bus to resolve names. That has the benefit that it is available from any mount
108 * namespace and subject to proper authentication. However, there's one problem: if our module is called from
109 * dbus-daemon itself we really can't use D-Bus to communicate. In this case, resort to a client-side hack,
110 * and look for the dynamic names directly. This is pretty ugly, but breaks the cyclic dependency. */
112 path
= strjoina("/run/systemd/dynamic-uid/direct:", name
);
113 r
= readlink_malloc(path
, &s
);
117 return parse_uid(s
, ret
);
120 static int direct_lookup_uid(uid_t uid
, char **ret
) {
121 char path
[STRLEN("/run/systemd/dynamic-uid/direct:") + DECIMAL_STR_MAX(uid_t
) + 1], *s
;
124 xsprintf(path
, "/run/systemd/dynamic-uid/direct:" UID_FMT
, uid
);
126 r
= readlink_malloc(path
, &s
);
129 if (!valid_user_group_name(s
)) { /* extra safety check */
138 enum nss_status
_nss_systemd_getpwnam_r(
141 char *buffer
, size_t buflen
,
144 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
145 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
* reply
= NULL
;
146 _cleanup_(sd_bus_flush_close_unrefp
) sd_bus
*bus
= NULL
;
151 BLOCK_SIGNALS(NSS_SIGNALS_BLOCK
);
156 /* If the username is not valid, then we don't know it. Ideally libc would filter these for us anyway. We don't
157 * generate EINVAL here, because it isn't really out business to complain about invalid user names. */
158 if (!valid_user_group_name(name
))
161 /* Synthesize entries for the root and nobody users, in case they are missing in /etc/passwd */
162 if (getenv_bool_secure("SYSTEMD_NSS_BYPASS_SYNTHETIC") <= 0) {
163 if (streq(name
, root_passwd
.pw_name
)) {
166 return NSS_STATUS_SUCCESS
;
168 if (synthesize_nobody() &&
169 streq(name
, nobody_passwd
.pw_name
)) {
170 *pwd
= nobody_passwd
;
172 return NSS_STATUS_SUCCESS
;
176 /* Make sure that we don't go in circles when allocating a dynamic UID by checking our own database */
177 if (getenv_bool_secure("SYSTEMD_NSS_DYNAMIC_BYPASS") > 0)
180 bypass
= getenv_bool_secure("SYSTEMD_NSS_BYPASS_BUS");
182 r
= sd_bus_open_system(&bus
);
188 r
= direct_lookup_name(name
, (uid_t
*) &translated
);
194 r
= sd_bus_call_method(bus
,
195 "org.freedesktop.systemd1",
196 "/org/freedesktop/systemd1",
197 "org.freedesktop.systemd1.Manager",
198 "LookupDynamicUserByName",
204 if (sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_DYNAMIC_USER
))
210 r
= sd_bus_message_read(reply
, "u", &translated
);
218 return NSS_STATUS_TRYAGAIN
;
221 memcpy(buffer
, name
, l
+1);
223 pwd
->pw_name
= buffer
;
224 pwd
->pw_uid
= (uid_t
) translated
;
225 pwd
->pw_gid
= (uid_t
) translated
;
226 pwd
->pw_gecos
= (char*) DYNAMIC_USER_GECOS
;
227 pwd
->pw_passwd
= (char*) DYNAMIC_USER_PASSWD
;
228 pwd
->pw_dir
= (char*) DYNAMIC_USER_DIR
;
229 pwd
->pw_shell
= (char*) DYNAMIC_USER_SHELL
;
232 return NSS_STATUS_SUCCESS
;
236 return NSS_STATUS_NOTFOUND
;
240 return NSS_STATUS_UNAVAIL
;
243 enum nss_status
_nss_systemd_getpwuid_r(
246 char *buffer
, size_t buflen
,
249 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
250 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
* reply
= NULL
;
251 _cleanup_(sd_bus_flush_close_unrefp
) sd_bus
*bus
= NULL
;
252 _cleanup_free_
char *direct
= NULL
;
253 const char *translated
;
257 BLOCK_SIGNALS(NSS_SIGNALS_BLOCK
);
259 if (!uid_is_valid(uid
))
262 /* Synthesize data for the root user and for nobody in case they are missing from /etc/passwd */
263 if (getenv_bool_secure("SYSTEMD_NSS_BYPASS_SYNTHETIC") <= 0) {
264 if (uid
== root_passwd
.pw_uid
) {
267 return NSS_STATUS_SUCCESS
;
269 if (synthesize_nobody() &&
270 uid
== nobody_passwd
.pw_uid
) {
271 *pwd
= nobody_passwd
;
273 return NSS_STATUS_SUCCESS
;
277 if (!uid_is_dynamic(uid
))
280 if (getenv_bool_secure("SYSTEMD_NSS_DYNAMIC_BYPASS") > 0)
283 bypass
= getenv_bool_secure("SYSTEMD_NSS_BYPASS_BUS");
285 r
= sd_bus_open_system(&bus
);
291 r
= direct_lookup_uid(uid
, &direct
);
300 r
= sd_bus_call_method(bus
,
301 "org.freedesktop.systemd1",
302 "/org/freedesktop/systemd1",
303 "org.freedesktop.systemd1.Manager",
304 "LookupDynamicUserByUID",
310 if (sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_DYNAMIC_USER
))
316 r
= sd_bus_message_read(reply
, "s", &translated
);
321 l
= strlen(translated
) + 1;
324 return NSS_STATUS_TRYAGAIN
;
327 memcpy(buffer
, translated
, l
);
329 pwd
->pw_name
= buffer
;
332 pwd
->pw_gecos
= (char*) DYNAMIC_USER_GECOS
;
333 pwd
->pw_passwd
= (char*) DYNAMIC_USER_PASSWD
;
334 pwd
->pw_dir
= (char*) DYNAMIC_USER_DIR
;
335 pwd
->pw_shell
= (char*) DYNAMIC_USER_SHELL
;
338 return NSS_STATUS_SUCCESS
;
342 return NSS_STATUS_NOTFOUND
;
346 return NSS_STATUS_UNAVAIL
;
349 #pragma GCC diagnostic ignored "-Wsizeof-pointer-memaccess"
351 enum nss_status
_nss_systemd_getgrnam_r(
354 char *buffer
, size_t buflen
,
357 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
358 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
* reply
= NULL
;
359 _cleanup_(sd_bus_flush_close_unrefp
) sd_bus
*bus
= NULL
;
364 BLOCK_SIGNALS(NSS_SIGNALS_BLOCK
);
369 if (!valid_user_group_name(name
))
372 /* Synthesize records for root and nobody, in case they are missing form /etc/group */
373 if (getenv_bool_secure("SYSTEMD_NSS_BYPASS_SYNTHETIC") <= 0) {
374 if (streq(name
, root_group
.gr_name
)) {
377 return NSS_STATUS_SUCCESS
;
379 if (synthesize_nobody() &&
380 streq(name
, nobody_group
.gr_name
)) {
383 return NSS_STATUS_SUCCESS
;
387 if (getenv_bool_secure("SYSTEMD_NSS_DYNAMIC_BYPASS") > 0)
390 bypass
= getenv_bool_secure("SYSTEMD_NSS_BYPASS_BUS");
392 r
= sd_bus_open_system(&bus
);
398 r
= direct_lookup_name(name
, (uid_t
*) &translated
);
404 r
= sd_bus_call_method(bus
,
405 "org.freedesktop.systemd1",
406 "/org/freedesktop/systemd1",
407 "org.freedesktop.systemd1.Manager",
408 "LookupDynamicUserByName",
414 if (sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_DYNAMIC_USER
))
420 r
= sd_bus_message_read(reply
, "u", &translated
);
425 l
= sizeof(char*) + strlen(name
) + 1;
428 return NSS_STATUS_TRYAGAIN
;
431 memzero(buffer
, sizeof(char*));
432 strcpy(buffer
+ sizeof(char*), name
);
434 gr
->gr_name
= buffer
+ sizeof(char*);
435 gr
->gr_gid
= (gid_t
) translated
;
436 gr
->gr_passwd
= (char*) DYNAMIC_USER_PASSWD
;
437 gr
->gr_mem
= (char**) buffer
;
440 return NSS_STATUS_SUCCESS
;
444 return NSS_STATUS_NOTFOUND
;
448 return NSS_STATUS_UNAVAIL
;
451 enum nss_status
_nss_systemd_getgrgid_r(
454 char *buffer
, size_t buflen
,
457 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
458 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
* reply
= NULL
;
459 _cleanup_(sd_bus_flush_close_unrefp
) sd_bus
*bus
= NULL
;
460 _cleanup_free_
char *direct
= NULL
;
461 const char *translated
;
465 BLOCK_SIGNALS(NSS_SIGNALS_BLOCK
);
467 if (!gid_is_valid(gid
))
470 /* Synthesize records for root and nobody, in case they are missing from /etc/group */
471 if (getenv_bool_secure("SYSTEMD_NSS_BYPASS_SYNTHETIC") <= 0) {
472 if (gid
== root_group
.gr_gid
) {
475 return NSS_STATUS_SUCCESS
;
477 if (synthesize_nobody() &&
478 gid
== nobody_group
.gr_gid
) {
481 return NSS_STATUS_SUCCESS
;
485 if (!gid_is_dynamic(gid
))
488 if (getenv_bool_secure("SYSTEMD_NSS_DYNAMIC_BYPASS") > 0)
491 bypass
= getenv_bool_secure("SYSTEMD_NSS_BYPASS_BUS");
493 r
= sd_bus_open_system(&bus
);
499 r
= direct_lookup_uid(gid
, &direct
);
508 r
= sd_bus_call_method(bus
,
509 "org.freedesktop.systemd1",
510 "/org/freedesktop/systemd1",
511 "org.freedesktop.systemd1.Manager",
512 "LookupDynamicUserByUID",
518 if (sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_DYNAMIC_USER
))
524 r
= sd_bus_message_read(reply
, "s", &translated
);
529 l
= sizeof(char*) + strlen(translated
) + 1;
532 return NSS_STATUS_TRYAGAIN
;
535 memzero(buffer
, sizeof(char*));
536 strcpy(buffer
+ sizeof(char*), translated
);
538 gr
->gr_name
= buffer
+ sizeof(char*);
540 gr
->gr_passwd
= (char*) DYNAMIC_USER_PASSWD
;
541 gr
->gr_mem
= (char**) buffer
;
544 return NSS_STATUS_SUCCESS
;
548 return NSS_STATUS_NOTFOUND
;
552 return NSS_STATUS_UNAVAIL
;
555 static void user_entry_free(UserEntry
*p
) {
560 LIST_REMOVE(entries
, p
->data
->entries
, p
);
566 static int user_entry_add(GetentData
*data
, const char *name
, uid_t id
) {
571 /* This happens when User= or Group= already exists statically. */
572 if (!uid_is_dynamic(id
))
575 p
= new0(UserEntry
, 1);
579 p
->name
= strdup(name
);
587 LIST_PREPEND(entries
, data
->entries
, p
);
592 static void systemd_endent(GetentData
*data
) {
597 while ((p
= data
->entries
))
600 data
->position
= NULL
;
603 static enum nss_status
nss_systemd_endent(GetentData
*p
) {
604 BLOCK_SIGNALS(NSS_SIGNALS_BLOCK
);
606 assert_se(pthread_mutex_lock(&p
->mutex
) == 0);
608 assert_se(pthread_mutex_unlock(&p
->mutex
) == 0);
610 return NSS_STATUS_SUCCESS
;
613 enum nss_status
_nss_systemd_endpwent(void) {
614 return nss_systemd_endent(&getpwent_data
);
617 enum nss_status
_nss_systemd_endgrent(void) {
618 return nss_systemd_endent(&getgrent_data
);
621 static int direct_enumeration(GetentData
*p
) {
622 _cleanup_closedir_
DIR *d
= NULL
;
628 d
= opendir("/run/systemd/dynamic-uid/");
632 FOREACH_DIRENT(de
, d
, return -errno
) {
633 _cleanup_free_
char *name
= NULL
;
636 if (!dirent_is_file(de
))
639 r
= parse_uid(de
->d_name
, &uid
);
643 r
= direct_lookup_uid(uid
, &name
);
649 r
= direct_lookup_name(name
, &verified
);
656 r
= user_entry_add(p
, name
, uid
);
666 static enum nss_status
systemd_setent(GetentData
*p
) {
667 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
668 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
* reply
= NULL
;
669 _cleanup_(sd_bus_flush_close_unrefp
) sd_bus
*bus
= NULL
;
674 BLOCK_SIGNALS(NSS_SIGNALS_BLOCK
);
678 assert_se(pthread_mutex_lock(&p
->mutex
) == 0);
682 if (getenv_bool_secure("SYSTEMD_NSS_DYNAMIC_BYPASS") > 0)
685 bypass
= getenv_bool_secure("SYSTEMD_NSS_BYPASS_BUS");
688 r
= sd_bus_open_system(&bus
);
694 r
= direct_enumeration(p
);
701 r
= sd_bus_call_method(bus
,
702 "org.freedesktop.systemd1",
703 "/org/freedesktop/systemd1",
704 "org.freedesktop.systemd1.Manager",
712 r
= sd_bus_message_enter_container(reply
, 'a', "(us)");
716 while ((r
= sd_bus_message_read(reply
, "(us)", &id
, &name
)) > 0) {
717 r
= user_entry_add(p
, name
, id
);
726 r
= sd_bus_message_exit_container(reply
);
731 p
->position
= p
->entries
;
732 assert_se(pthread_mutex_unlock(&p
->mutex
) == 0);
734 return NSS_STATUS_SUCCESS
;
738 assert_se(pthread_mutex_unlock(&p
->mutex
) == 0);
740 return NSS_STATUS_UNAVAIL
;
743 enum nss_status
_nss_systemd_setpwent(int stayopen
) {
744 return systemd_setent(&getpwent_data
);
747 enum nss_status
_nss_systemd_setgrent(int stayopen
) {
748 return systemd_setent(&getgrent_data
);
751 enum nss_status
_nss_systemd_getpwent_r(struct passwd
*result
, char *buffer
, size_t buflen
, int *errnop
) {
756 BLOCK_SIGNALS(NSS_SIGNALS_BLOCK
);
762 assert_se(pthread_mutex_lock(&getpwent_data
.mutex
) == 0);
764 LIST_FOREACH(entries
, p
, getpwent_data
.position
) {
765 len
= strlen(p
->name
) + 1;
768 ret
= NSS_STATUS_TRYAGAIN
;
772 memcpy(buffer
, p
->name
, len
);
774 result
->pw_name
= buffer
;
775 result
->pw_uid
= p
->id
;
776 result
->pw_gid
= p
->id
;
777 result
->pw_gecos
= (char*) DYNAMIC_USER_GECOS
;
778 result
->pw_passwd
= (char*) DYNAMIC_USER_PASSWD
;
779 result
->pw_dir
= (char*) DYNAMIC_USER_DIR
;
780 result
->pw_shell
= (char*) DYNAMIC_USER_SHELL
;
785 ret
= NSS_STATUS_NOTFOUND
;
789 /* On success, step to the next entry. */
791 ret
= NSS_STATUS_SUCCESS
;
794 /* Save position for the next call. */
795 getpwent_data
.position
= p
;
797 assert_se(pthread_mutex_unlock(&getpwent_data
.mutex
) == 0);
802 enum nss_status
_nss_systemd_getgrent_r(struct group
*result
, char *buffer
, size_t buflen
, int *errnop
) {
807 BLOCK_SIGNALS(NSS_SIGNALS_BLOCK
);
813 assert_se(pthread_mutex_lock(&getgrent_data
.mutex
) == 0);
815 LIST_FOREACH(entries
, p
, getgrent_data
.position
) {
816 len
= sizeof(char*) + strlen(p
->name
) + 1;
819 ret
= NSS_STATUS_TRYAGAIN
;
823 memzero(buffer
, sizeof(char*));
824 strcpy(buffer
+ sizeof(char*), p
->name
);
826 result
->gr_name
= buffer
+ sizeof(char*);
827 result
->gr_gid
= p
->id
;
828 result
->gr_passwd
= (char*) DYNAMIC_USER_PASSWD
;
829 result
->gr_mem
= (char**) buffer
;
834 ret
= NSS_STATUS_NOTFOUND
;
838 /* On success, step to the next entry. */
840 ret
= NSS_STATUS_SUCCESS
;
843 /* Save position for the next call. */
844 getgrent_data
.position
= p
;
846 assert_se(pthread_mutex_unlock(&getgrent_data
.mutex
) == 0);