]>
git.ipfire.org Git - thirdparty/systemd.git/blob - src/import/import-common.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
3 This file is part of systemd.
5 Copyright 2015 Lennart Poettering
7 systemd is free software; you can redistribute it and/or modify it
8 under the terms of the GNU Lesser General Public License as published by
9 the Free Software Foundation; either version 2.1 of the License, or
10 (at your option) any later version.
12 systemd is distributed in the hope that it will be useful, but
13 WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 Lesser General Public License for more details.
17 You should have received a copy of the GNU Lesser General Public License
18 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #include <sys/prctl.h>
26 #include "btrfs-util.h"
27 #include "capability-util.h"
29 #include "import-common.h"
30 #include "signal-util.h"
33 int import_make_read_only_fd(int fd
) {
38 /* First, let's make this a read-only subvolume if it refers
40 r
= btrfs_subvol_set_read_only_fd(fd
, true);
41 if (IN_SET(r
, -ENOTTY
, -ENOTDIR
, -EINVAL
)) {
44 /* This doesn't refer to a subvolume, or the file
45 * system isn't even btrfs. In that, case fall back to
50 return log_error_errno(errno
, "Failed to stat temporary image: %m");
53 if (fchmod(fd
, st
.st_mode
& 07555) < 0)
54 return log_error_errno(errno
, "Failed to chmod() final image: %m");
59 return log_error_errno(r
, "Failed to make subvolume read-only: %m");
64 int import_make_read_only(const char *path
) {
65 _cleanup_close_
int fd
= 1;
67 fd
= open(path
, O_RDONLY
|O_NOCTTY
|O_CLOEXEC
);
69 return log_error_errno(errno
, "Failed to open %s: %m", path
);
71 return import_make_read_only_fd(fd
);
74 int import_fork_tar_x(const char *path
, pid_t
*ret
) {
75 _cleanup_close_pair_
int pipefd
[2] = { -1, -1 };
82 if (pipe2(pipefd
, O_CLOEXEC
) < 0)
83 return log_error_errno(errno
, "Failed to create pipe for tar: %m");
87 return log_error_errno(errno
, "Failed to fork off tar: %m");
93 (1ULL << CAP_FOWNER
) |
94 (1ULL << CAP_FSETID
) |
96 (1ULL << CAP_SETFCAP
) |
97 (1ULL << CAP_DAC_OVERRIDE
);
101 (void) reset_all_signal_handlers();
102 (void) reset_signal_mask();
103 assert_se(prctl(PR_SET_PDEATHSIG
, SIGTERM
) == 0);
105 pipefd
[1] = safe_close(pipefd
[1]);
107 r
= move_fd(pipefd
[0], STDIN_FILENO
, false);
109 log_error_errno(r
, "Failed to move fd: %m");
113 null_fd
= open("/dev/null", O_WRONLY
|O_NOCTTY
);
115 log_error_errno(errno
, "Failed to open /dev/null: %m");
119 r
= move_fd(null_fd
, STDOUT_FILENO
, false);
121 log_error_errno(r
, "Failed to move fd: %m");
125 stdio_unset_cloexec();
127 if (unshare(CLONE_NEWNET
) < 0)
128 log_error_errno(errno
, "Failed to lock tar into network namespace, ignoring: %m");
130 r
= capability_bounding_set_drop(retain
, true);
132 log_error_errno(r
, "Failed to drop capabilities, ignoring: %m");
134 execlp("tar", "tar", "--numeric-owner", "-C", path
, "-px", "--xattrs", "--xattrs-include=*", NULL
);
135 log_error_errno(errno
, "Failed to execute tar: %m");
139 pipefd
[0] = safe_close(pipefd
[0]);
148 int import_fork_tar_c(const char *path
, pid_t
*ret
) {
149 _cleanup_close_pair_
int pipefd
[2] = { -1, -1 };
156 if (pipe2(pipefd
, O_CLOEXEC
) < 0)
157 return log_error_errno(errno
, "Failed to create pipe for tar: %m");
161 return log_error_errno(errno
, "Failed to fork off tar: %m");
165 uint64_t retain
= (1ULL << CAP_DAC_OVERRIDE
);
169 (void) reset_all_signal_handlers();
170 (void) reset_signal_mask();
171 assert_se(prctl(PR_SET_PDEATHSIG
, SIGTERM
) == 0);
173 pipefd
[0] = safe_close(pipefd
[0]);
175 r
= move_fd(pipefd
[1], STDOUT_FILENO
, false);
177 log_error_errno(r
, "Failed to move fd: %m");
181 null_fd
= open("/dev/null", O_RDONLY
|O_NOCTTY
);
183 log_error_errno(errno
, "Failed to open /dev/null: %m");
187 r
= move_fd(null_fd
, STDIN_FILENO
, false);
189 log_error_errno(errno
, "Failed to move fd: %m");
193 stdio_unset_cloexec();
195 if (unshare(CLONE_NEWNET
) < 0)
196 log_error_errno(errno
, "Failed to lock tar into network namespace, ignoring: %m");
198 r
= capability_bounding_set_drop(retain
, true);
200 log_error_errno(r
, "Failed to drop capabilities, ignoring: %m");
202 execlp("tar", "tar", "-C", path
, "-c", "--xattrs", "--xattrs-include=*", ".", NULL
);
203 log_error_errno(errno
, "Failed to execute tar: %m");
207 pipefd
[1] = safe_close(pipefd
[1]);