]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/shared/dev-setup.c
util: split out memcmp()/memset() related calls into memory-util.[ch]
[thirdparty/systemd.git] / src / shared / dev-setup.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
5ba2dc25
KS
2
3#include <errno.h>
5ba2dc25 4#include <stdlib.h>
5ba2dc25
KS
5#include <unistd.h>
6
b5efdb8a 7#include "alloc-util.h"
ee104e11 8#include "dev-setup.h"
5ba2dc25 9#include "label.h"
a8fbdf54 10#include "log.h"
03cfe0d5 11#include "path-util.h"
30874dda 12#include "umask-util.h"
ee104e11
LP
13#include "user-util.h"
14#include "util.h"
5ba2dc25 15
03cfe0d5 16int dev_setup(const char *prefix, uid_t uid, gid_t gid) {
5ba2dc25 17 static const char symlinks[] =
696fee7d 18 "-/proc/kcore\0" "/dev/core\0"
5ba2dc25
KS
19 "/proc/self/fd\0" "/dev/fd\0"
20 "/proc/self/fd/0\0" "/dev/stdin\0"
21 "/proc/self/fd/1\0" "/dev/stdout\0"
22 "/proc/self/fd/2\0" "/dev/stderr\0";
23
03cfe0d5
LP
24 const char *j, *k;
25 int r;
26
8f0e73f2 27 NULSTR_FOREACH_PAIR(j, k, symlinks) {
03cfe0d5
LP
28 _cleanup_free_ char *link_name = NULL;
29 const char *n;
30
696fee7d
ZJS
31 if (j[0] == '-') {
32 j++;
33
2b85f4e1 34 if (access(j, F_OK) < 0)
696fee7d
ZJS
35 continue;
36 }
8f0e73f2 37
01ed0e23 38 if (prefix) {
03cfe0d5 39 link_name = prefix_root(prefix, k);
7f112f50
LP
40 if (!link_name)
41 return -ENOMEM;
8f0e73f2 42
03cfe0d5 43 n = link_name;
01ed0e23 44 } else
03cfe0d5
LP
45 n = k;
46
47 r = symlink_label(j, n);
48 if (r < 0)
49 log_debug_errno(r, "Failed to symlink %s to %s: %m", j, n);
50
51 if (uid != UID_INVALID || gid != GID_INVALID)
52 if (lchown(n, uid, gid) < 0)
53 log_debug_errno(errno, "Failed to chown %s: %m", n);
8f0e73f2 54 }
7f112f50
LP
55
56 return 0;
5ba2dc25 57}
30874dda
LP
58
59int make_inaccessible_nodes(const char *root, uid_t uid, gid_t gid) {
60 static const struct {
61 const char *name;
62 mode_t mode;
63 } table[] = {
64 { "/run/systemd", S_IFDIR | 0755 },
65 { "/run/systemd/inaccessible", S_IFDIR | 0000 },
66 { "/run/systemd/inaccessible/reg", S_IFREG | 0000 },
67 { "/run/systemd/inaccessible/dir", S_IFDIR | 0000 },
68 { "/run/systemd/inaccessible/fifo", S_IFIFO | 0000 },
69 { "/run/systemd/inaccessible/sock", S_IFSOCK | 0000 },
70
71 /* The following two are likely to fail if we lack the privs for it (for example in an userns
72 * environment, if CAP_SYS_MKNOD is missing, or if a device node policy prohibit major/minor of 0
73 * device nodes to be created). But that's entirely fine. Consumers of these files should carry
74 * fallback to use a different node then, for example /run/systemd/inaccessible/sock, which is close
75 * enough in behaviour and semantics for most uses. */
76 { "/run/systemd/inaccessible/chr", S_IFCHR | 0000 },
77 { "/run/systemd/inaccessible/blk", S_IFBLK | 0000 },
78 };
79
80 _cleanup_umask_ mode_t u;
81 size_t i;
82 int r;
83
84 u = umask(0000);
85
86 /* Set up inaccessible (and empty) file nodes of all types. This are used to as mount sources for over-mounting
87 * ("masking") file nodes that shall become inaccessible and empty for specific containers or services. We try
88 * to lock down these nodes as much as we can, but otherwise try to match them as closely as possible with the
89 * underlying file, i.e. in the best case we offer the same node type as the underlying node. */
90
91 for (i = 0; i < ELEMENTSOF(table); i++) {
92 _cleanup_free_ char *path = NULL;
93
94 path = prefix_root(root, table[i].name);
95 if (!path)
96 return log_oom();
97
98 if (S_ISDIR(table[i].mode))
99 r = mkdir(path, table[i].mode & 07777);
100 else
101 r = mknod(path, table[i].mode, makedev(0, 0));
102 if (r < 0) {
103 if (errno != EEXIST)
104 log_debug_errno(errno, "Failed to create '%s', ignoring: %m", path);
105 continue;
106 }
107
108 if (uid != UID_INVALID || gid != GID_INVALID) {
109 if (lchown(path, uid, gid) < 0)
110 log_debug_errno(errno, "Failed to chown '%s': %m", path);
111 }
112 }
113
114 return 0;
115}