]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/shared/dev-setup.c
e79db91ddee5339ae3faa0e7a1b233df9f05761d
[thirdparty/systemd.git] / src / shared / dev-setup.c
1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
2
3 #include <sys/sysmacros.h>
4 #include <unistd.h>
5
6 #include "alloc-util.h"
7 #include "dev-setup.h"
8 #include "fd-util.h"
9 #include "fs-util.h"
10 #include "label-util.h"
11 #include "log.h"
12 #include "mkdir-label.h"
13 #include "nulstr-util.h"
14 #include "path-util.h"
15 #include "stat-util.h"
16 #include "umask-util.h"
17 #include "user-util.h"
18
19 int dev_setup(const char *prefix, uid_t uid, gid_t gid) {
20 static const char symlinks[] =
21 "-/proc/kcore\0" "/dev/core\0"
22 "/proc/self/fd\0" "/dev/fd\0"
23 "/proc/self/fd/0\0" "/dev/stdin\0"
24 "/proc/self/fd/1\0" "/dev/stdout\0"
25 "/proc/self/fd/2\0" "/dev/stderr\0";
26
27 int r;
28
29 NULSTR_FOREACH_PAIR(j, k, symlinks) {
30 _cleanup_free_ char *link_name = NULL;
31 const char *n;
32
33 if (j[0] == '-') {
34 j++;
35
36 if (access(j, F_OK) < 0)
37 continue;
38 }
39
40 if (prefix) {
41 link_name = path_join(prefix, k);
42 if (!link_name)
43 return -ENOMEM;
44
45 n = link_name;
46 } else
47 n = k;
48
49 r = symlink_label(j, n);
50 if (r < 0)
51 log_debug_errno(r, "Failed to symlink %s to %s: %m", j, n);
52
53 if (uid != UID_INVALID || gid != GID_INVALID)
54 if (lchown(n, uid, gid) < 0)
55 log_debug_errno(errno, "Failed to chown %s: %m", n);
56 }
57
58 return 0;
59 }
60
61 int make_inaccessible_nodes(
62 const char *parent_dir,
63 uid_t uid,
64 gid_t gid) {
65
66 static const mode_t table[] = {
67 S_IFREG,
68 S_IFDIR,
69 S_IFIFO,
70 S_IFSOCK,
71
72 /* The following two are likely to fail if we lack the privs for it (for example in an userns
73 * environment, if CAP_SYS_MKNOD is missing, or if a device node policy prohibits creation of
74 * device nodes with a major/minor of 0). But that's entirely fine. Consumers of these files
75 * should implement falling back to use a different node then, for example
76 * <root>/inaccessible/sock, which is close enough in behaviour and semantics for most uses.
77 */
78 S_IFCHR,
79 S_IFBLK,
80
81 /* NB: S_IFLNK is not listed here, as there is no such thing as an inaccessible symlink */
82 };
83
84 _cleanup_close_ int parent_fd = -EBADF, inaccessible_fd = -EBADF;
85 int r;
86
87 if (!parent_dir)
88 parent_dir = "/run/systemd";
89
90 BLOCK_WITH_UMASK(0000);
91
92 parent_fd = open(parent_dir, O_DIRECTORY|O_CLOEXEC|O_PATH, 0);
93 if (parent_fd < 0)
94 return -errno;
95
96 inaccessible_fd = open_mkdir_at_full(parent_fd, "inaccessible", O_CLOEXEC, XO_LABEL, 0755);
97 if (inaccessible_fd < 0)
98 return inaccessible_fd;
99
100 /* Set up inaccessible (and empty) file nodes of all types. This are used to as mount sources for over-mounting
101 * ("masking") file nodes that shall become inaccessible and empty for specific containers or services. We try
102 * to lock down these nodes as much as we can, but otherwise try to match them as closely as possible with the
103 * underlying file, i.e. in the best case we offer the same node type as the underlying node. */
104
105 FOREACH_ELEMENT(m, table) {
106 _cleanup_free_ char *path = NULL;
107 mode_t inode_type = *m;
108 const char *fn;
109
110 fn = inode_type_to_string(inode_type);
111 path = path_join(parent_dir, fn);
112 if (!path)
113 return log_oom();
114
115 if (S_ISDIR(inode_type))
116 r = mkdirat_label(inaccessible_fd, fn, 0000);
117 else
118 r = mknodat_label(inaccessible_fd, fn, inode_type | 0000, makedev(0, 0));
119 if (r == -EEXIST) {
120 if (fchmodat(inaccessible_fd, fn, 0000, AT_SYMLINK_NOFOLLOW) < 0)
121 log_debug_errno(errno, "Failed to adjust access mode of existing inode '%s', ignoring: %m", path);
122 } else if (r < 0) {
123 log_debug_errno(r, "Failed to create '%s', ignoring: %m", path);
124 continue;
125 }
126
127 if (uid_is_valid(uid) || gid_is_valid(gid))
128 if (fchownat(inaccessible_fd, fn, uid, gid, AT_SYMLINK_NOFOLLOW) < 0)
129 log_debug_errno(errno, "Failed to chown '%s', ignoring: %m", path);
130 }
131
132 if (fchmod(inaccessible_fd, 0555) < 0)
133 log_debug_errno(errno, "Failed to mark inaccessible directory read-only, ignoring: %m");
134
135 return 0;
136 }