]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/machine/machined-dbus.c
Merge pull request #10221 from lucaswerkmeister/bash-completion
[thirdparty/systemd.git] / src / machine / machined-dbus.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #include <errno.h>
4 #include <string.h>
5 #include <unistd.h>
6
7 #include "sd-id128.h"
8
9 #include "alloc-util.h"
10 #include "btrfs-util.h"
11 #include "bus-common-errors.h"
12 #include "bus-util.h"
13 #include "cgroup-util.h"
14 #include "fd-util.h"
15 #include "fileio.h"
16 #include "format-util.h"
17 #include "hostname-util.h"
18 #include "image-dbus.h"
19 #include "io-util.h"
20 #include "machine-dbus.h"
21 #include "machine-image.h"
22 #include "machine-pool.h"
23 #include "machined.h"
24 #include "missing_capability.h"
25 #include "path-util.h"
26 #include "process-util.h"
27 #include "stdio-util.h"
28 #include "strv.h"
29 #include "tmpfile-util.h"
30 #include "unit-name.h"
31 #include "user-util.h"
32
33 static BUS_DEFINE_PROPERTY_GET_GLOBAL(property_get_pool_path, "s", "/var/lib/machines");
34
35 static int property_get_pool_usage(
36 sd_bus *bus,
37 const char *path,
38 const char *interface,
39 const char *property,
40 sd_bus_message *reply,
41 void *userdata,
42 sd_bus_error *error) {
43
44 _cleanup_close_ int fd = -1;
45 uint64_t usage = (uint64_t) -1;
46
47 assert(bus);
48 assert(reply);
49
50 fd = open("/var/lib/machines", O_RDONLY|O_CLOEXEC|O_DIRECTORY);
51 if (fd >= 0) {
52 BtrfsQuotaInfo q;
53
54 if (btrfs_subvol_get_subtree_quota_fd(fd, 0, &q) >= 0)
55 usage = q.referenced;
56 }
57
58 return sd_bus_message_append(reply, "t", usage);
59 }
60
61 static int property_get_pool_limit(
62 sd_bus *bus,
63 const char *path,
64 const char *interface,
65 const char *property,
66 sd_bus_message *reply,
67 void *userdata,
68 sd_bus_error *error) {
69
70 _cleanup_close_ int fd = -1;
71 uint64_t size = (uint64_t) -1;
72
73 assert(bus);
74 assert(reply);
75
76 fd = open("/var/lib/machines", O_RDONLY|O_CLOEXEC|O_DIRECTORY);
77 if (fd >= 0) {
78 BtrfsQuotaInfo q;
79
80 if (btrfs_subvol_get_subtree_quota_fd(fd, 0, &q) >= 0)
81 size = q.referenced_max;
82 }
83
84 return sd_bus_message_append(reply, "t", size);
85 }
86
87 static int method_get_machine(sd_bus_message *message, void *userdata, sd_bus_error *error) {
88 _cleanup_free_ char *p = NULL;
89 Manager *m = userdata;
90 Machine *machine;
91 const char *name;
92 int r;
93
94 assert(message);
95 assert(m);
96
97 r = sd_bus_message_read(message, "s", &name);
98 if (r < 0)
99 return r;
100
101 machine = hashmap_get(m->machines, name);
102 if (!machine)
103 return sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_MACHINE, "No machine '%s' known", name);
104
105 p = machine_bus_path(machine);
106 if (!p)
107 return -ENOMEM;
108
109 return sd_bus_reply_method_return(message, "o", p);
110 }
111
112 static int method_get_image(sd_bus_message *message, void *userdata, sd_bus_error *error) {
113 _cleanup_free_ char *p = NULL;
114 Manager *m = userdata;
115 const char *name;
116 int r;
117
118 assert(message);
119 assert(m);
120
121 r = sd_bus_message_read(message, "s", &name);
122 if (r < 0)
123 return r;
124
125 r = image_find(IMAGE_MACHINE, name, NULL);
126 if (r == -ENOENT)
127 return sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_IMAGE, "No image '%s' known", name);
128 if (r < 0)
129 return r;
130
131 p = image_bus_path(name);
132 if (!p)
133 return -ENOMEM;
134
135 return sd_bus_reply_method_return(message, "o", p);
136 }
137
138 static int method_get_machine_by_pid(sd_bus_message *message, void *userdata, sd_bus_error *error) {
139 _cleanup_free_ char *p = NULL;
140 Manager *m = userdata;
141 Machine *machine = NULL;
142 pid_t pid;
143 int r;
144
145 assert(message);
146 assert(m);
147
148 assert_cc(sizeof(pid_t) == sizeof(uint32_t));
149
150 r = sd_bus_message_read(message, "u", &pid);
151 if (r < 0)
152 return r;
153
154 if (pid < 0)
155 return -EINVAL;
156
157 if (pid == 0) {
158 _cleanup_(sd_bus_creds_unrefp) sd_bus_creds *creds = NULL;
159
160 r = sd_bus_query_sender_creds(message, SD_BUS_CREDS_PID, &creds);
161 if (r < 0)
162 return r;
163
164 r = sd_bus_creds_get_pid(creds, &pid);
165 if (r < 0)
166 return r;
167 }
168
169 r = manager_get_machine_by_pid(m, pid, &machine);
170 if (r < 0)
171 return r;
172 if (!machine)
173 return sd_bus_error_setf(error, BUS_ERROR_NO_MACHINE_FOR_PID, "PID "PID_FMT" does not belong to any known machine", pid);
174
175 p = machine_bus_path(machine);
176 if (!p)
177 return -ENOMEM;
178
179 return sd_bus_reply_method_return(message, "o", p);
180 }
181
182 static int method_list_machines(sd_bus_message *message, void *userdata, sd_bus_error *error) {
183 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
184 Manager *m = userdata;
185 Machine *machine;
186 Iterator i;
187 int r;
188
189 assert(message);
190 assert(m);
191
192 r = sd_bus_message_new_method_return(message, &reply);
193 if (r < 0)
194 return sd_bus_error_set_errno(error, r);
195
196 r = sd_bus_message_open_container(reply, 'a', "(ssso)");
197 if (r < 0)
198 return sd_bus_error_set_errno(error, r);
199
200 HASHMAP_FOREACH(machine, m->machines, i) {
201 _cleanup_free_ char *p = NULL;
202
203 p = machine_bus_path(machine);
204 if (!p)
205 return -ENOMEM;
206
207 r = sd_bus_message_append(reply, "(ssso)",
208 machine->name,
209 strempty(machine_class_to_string(machine->class)),
210 machine->service,
211 p);
212 if (r < 0)
213 return sd_bus_error_set_errno(error, r);
214 }
215
216 r = sd_bus_message_close_container(reply);
217 if (r < 0)
218 return sd_bus_error_set_errno(error, r);
219
220 return sd_bus_send(NULL, reply, NULL);
221 }
222
223 static int method_create_or_register_machine(Manager *manager, sd_bus_message *message, bool read_network, Machine **_m, sd_bus_error *error) {
224 const char *name, *service, *class, *root_directory;
225 const int32_t *netif = NULL;
226 MachineClass c;
227 uint32_t leader;
228 sd_id128_t id;
229 const void *v;
230 Machine *m;
231 size_t n, n_netif = 0;
232 int r;
233
234 assert(manager);
235 assert(message);
236 assert(_m);
237
238 r = sd_bus_message_read(message, "s", &name);
239 if (r < 0)
240 return r;
241 if (!machine_name_is_valid(name))
242 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid machine name");
243
244 r = sd_bus_message_read_array(message, 'y', &v, &n);
245 if (r < 0)
246 return r;
247 if (n == 0)
248 id = SD_ID128_NULL;
249 else if (n == 16)
250 memcpy(&id, v, n);
251 else
252 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid machine ID parameter");
253
254 r = sd_bus_message_read(message, "ssus", &service, &class, &leader, &root_directory);
255 if (r < 0)
256 return r;
257
258 if (read_network) {
259 size_t i;
260
261 r = sd_bus_message_read_array(message, 'i', (const void**) &netif, &n_netif);
262 if (r < 0)
263 return r;
264
265 n_netif /= sizeof(int32_t);
266
267 for (i = 0; i < n_netif; i++) {
268 if (netif[i] <= 0)
269 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid network interface index %i", netif[i]);
270 }
271 }
272
273 if (isempty(class))
274 c = _MACHINE_CLASS_INVALID;
275 else {
276 c = machine_class_from_string(class);
277 if (c < 0)
278 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid machine class parameter");
279 }
280
281 if (leader == 1)
282 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid leader PID");
283
284 if (!isempty(root_directory) && !path_is_absolute(root_directory))
285 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Root directory must be empty or an absolute path");
286
287 if (leader == 0) {
288 _cleanup_(sd_bus_creds_unrefp) sd_bus_creds *creds = NULL;
289
290 r = sd_bus_query_sender_creds(message, SD_BUS_CREDS_PID, &creds);
291 if (r < 0)
292 return r;
293
294 assert_cc(sizeof(uint32_t) == sizeof(pid_t));
295
296 r = sd_bus_creds_get_pid(creds, (pid_t*) &leader);
297 if (r < 0)
298 return r;
299 }
300
301 if (hashmap_get(manager->machines, name))
302 return sd_bus_error_setf(error, BUS_ERROR_MACHINE_EXISTS, "Machine '%s' already exists", name);
303
304 r = manager_add_machine(manager, name, &m);
305 if (r < 0)
306 return r;
307
308 m->leader = leader;
309 m->class = c;
310 m->id = id;
311
312 if (!isempty(service)) {
313 m->service = strdup(service);
314 if (!m->service) {
315 r = -ENOMEM;
316 goto fail;
317 }
318 }
319
320 if (!isempty(root_directory)) {
321 m->root_directory = strdup(root_directory);
322 if (!m->root_directory) {
323 r = -ENOMEM;
324 goto fail;
325 }
326 }
327
328 if (n_netif > 0) {
329 assert_cc(sizeof(int32_t) == sizeof(int));
330 m->netif = memdup(netif, sizeof(int32_t) * n_netif);
331 if (!m->netif) {
332 r = -ENOMEM;
333 goto fail;
334 }
335
336 m->n_netif = n_netif;
337 }
338
339 *_m = m;
340
341 return 1;
342
343 fail:
344 machine_add_to_gc_queue(m);
345 return r;
346 }
347
348 static int method_create_machine_internal(sd_bus_message *message, bool read_network, void *userdata, sd_bus_error *error) {
349 Manager *manager = userdata;
350 Machine *m = NULL;
351 int r;
352
353 assert(message);
354 assert(manager);
355
356 r = method_create_or_register_machine(manager, message, read_network, &m, error);
357 if (r < 0)
358 return r;
359
360 r = sd_bus_message_enter_container(message, 'a', "(sv)");
361 if (r < 0)
362 goto fail;
363
364 r = machine_start(m, message, error);
365 if (r < 0)
366 goto fail;
367
368 m->create_message = sd_bus_message_ref(message);
369 return 1;
370
371 fail:
372 machine_add_to_gc_queue(m);
373 return r;
374 }
375
376 static int method_create_machine_with_network(sd_bus_message *message, void *userdata, sd_bus_error *error) {
377 return method_create_machine_internal(message, true, userdata, error);
378 }
379
380 static int method_create_machine(sd_bus_message *message, void *userdata, sd_bus_error *error) {
381 return method_create_machine_internal(message, false, userdata, error);
382 }
383
384 static int method_register_machine_internal(sd_bus_message *message, bool read_network, void *userdata, sd_bus_error *error) {
385 Manager *manager = userdata;
386 _cleanup_free_ char *p = NULL;
387 Machine *m = NULL;
388 int r;
389
390 assert(message);
391 assert(manager);
392
393 r = method_create_or_register_machine(manager, message, read_network, &m, error);
394 if (r < 0)
395 return r;
396
397 r = cg_pid_get_unit(m->leader, &m->unit);
398 if (r < 0) {
399 r = sd_bus_error_set_errnof(error, r,
400 "Failed to determine unit of process "PID_FMT" : %m",
401 m->leader);
402 goto fail;
403 }
404
405 r = machine_start(m, NULL, error);
406 if (r < 0)
407 goto fail;
408
409 p = machine_bus_path(m);
410 if (!p) {
411 r = -ENOMEM;
412 goto fail;
413 }
414
415 return sd_bus_reply_method_return(message, "o", p);
416
417 fail:
418 machine_add_to_gc_queue(m);
419 return r;
420 }
421
422 static int method_register_machine_with_network(sd_bus_message *message, void *userdata, sd_bus_error *error) {
423 return method_register_machine_internal(message, true, userdata, error);
424 }
425
426 static int method_register_machine(sd_bus_message *message, void *userdata, sd_bus_error *error) {
427 return method_register_machine_internal(message, false, userdata, error);
428 }
429
430 static int redirect_method_to_machine(sd_bus_message *message, Manager *m, sd_bus_error *error, sd_bus_message_handler_t method) {
431 Machine *machine;
432 const char *name;
433 int r;
434
435 assert(message);
436 assert(m);
437 assert(method);
438
439 r = sd_bus_message_read(message, "s", &name);
440 if (r < 0)
441 return sd_bus_error_set_errno(error, r);
442
443 machine = hashmap_get(m->machines, name);
444 if (!machine)
445 return sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_MACHINE, "No machine '%s' known", name);
446
447 return method(message, machine, error);
448 }
449
450 static int method_terminate_machine(sd_bus_message *message, void *userdata, sd_bus_error *error) {
451 return redirect_method_to_machine(message, userdata, error, bus_machine_method_terminate);
452 }
453
454 static int method_kill_machine(sd_bus_message *message, void *userdata, sd_bus_error *error) {
455 return redirect_method_to_machine(message, userdata, error, bus_machine_method_kill);
456 }
457
458 static int method_get_machine_addresses(sd_bus_message *message, void *userdata, sd_bus_error *error) {
459 return redirect_method_to_machine(message, userdata, error, bus_machine_method_get_addresses);
460 }
461
462 static int method_get_machine_os_release(sd_bus_message *message, void *userdata, sd_bus_error *error) {
463 return redirect_method_to_machine(message, userdata, error, bus_machine_method_get_os_release);
464 }
465
466 static int method_list_images(sd_bus_message *message, void *userdata, sd_bus_error *error) {
467 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
468 _cleanup_hashmap_free_ Hashmap *images = NULL;
469 Manager *m = userdata;
470 Image *image;
471 Iterator i;
472 int r;
473
474 assert(message);
475 assert(m);
476
477 images = hashmap_new(&image_hash_ops);
478 if (!images)
479 return -ENOMEM;
480
481 r = image_discover(IMAGE_MACHINE, images);
482 if (r < 0)
483 return r;
484
485 r = sd_bus_message_new_method_return(message, &reply);
486 if (r < 0)
487 return r;
488
489 r = sd_bus_message_open_container(reply, 'a', "(ssbttto)");
490 if (r < 0)
491 return r;
492
493 HASHMAP_FOREACH(image, images, i) {
494 _cleanup_free_ char *p = NULL;
495
496 p = image_bus_path(image->name);
497 if (!p)
498 return -ENOMEM;
499
500 r = sd_bus_message_append(reply, "(ssbttto)",
501 image->name,
502 image_type_to_string(image->type),
503 image->read_only,
504 image->crtime,
505 image->mtime,
506 image->usage,
507 p);
508 if (r < 0)
509 return r;
510 }
511
512 r = sd_bus_message_close_container(reply);
513 if (r < 0)
514 return r;
515
516 return sd_bus_send(NULL, reply, NULL);
517 }
518
519 static int method_open_machine_pty(sd_bus_message *message, void *userdata, sd_bus_error *error) {
520 return redirect_method_to_machine(message, userdata, error, bus_machine_method_open_pty);
521 }
522
523 static int method_open_machine_login(sd_bus_message *message, void *userdata, sd_bus_error *error) {
524 return redirect_method_to_machine(message, userdata, error, bus_machine_method_open_login);
525 }
526
527 static int method_open_machine_shell(sd_bus_message *message, void *userdata, sd_bus_error *error) {
528 return redirect_method_to_machine(message, userdata, error, bus_machine_method_open_shell);
529 }
530
531 static int method_bind_mount_machine(sd_bus_message *message, void *userdata, sd_bus_error *error) {
532 return redirect_method_to_machine(message, userdata, error, bus_machine_method_bind_mount);
533 }
534
535 static int method_copy_machine(sd_bus_message *message, void *userdata, sd_bus_error *error) {
536 return redirect_method_to_machine(message, userdata, error, bus_machine_method_copy);
537 }
538
539 static int method_open_machine_root_directory(sd_bus_message *message, void *userdata, sd_bus_error *error) {
540 return redirect_method_to_machine(message, userdata, error, bus_machine_method_open_root_directory);
541 }
542
543 static int method_get_machine_uid_shift(sd_bus_message *message, void *userdata, sd_bus_error *error) {
544 return redirect_method_to_machine(message, userdata, error, bus_machine_method_get_uid_shift);
545 }
546
547 static int redirect_method_to_image(sd_bus_message *message, Manager *m, sd_bus_error *error, sd_bus_message_handler_t method) {
548 _cleanup_(image_unrefp) Image* i = NULL;
549 const char *name;
550 int r;
551
552 assert(message);
553 assert(m);
554 assert(method);
555
556 r = sd_bus_message_read(message, "s", &name);
557 if (r < 0)
558 return r;
559
560 if (!image_name_is_valid(name))
561 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Image name '%s' is invalid.", name);
562
563 r = image_find(IMAGE_MACHINE, name, &i);
564 if (r == -ENOENT)
565 return sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_IMAGE, "No image '%s' known", name);
566 if (r < 0)
567 return r;
568
569 i->userdata = m;
570 return method(message, i, error);
571 }
572
573 static int method_remove_image(sd_bus_message *message, void *userdata, sd_bus_error *error) {
574 return redirect_method_to_image(message, userdata, error, bus_image_method_remove);
575 }
576
577 static int method_rename_image(sd_bus_message *message, void *userdata, sd_bus_error *error) {
578 return redirect_method_to_image(message, userdata, error, bus_image_method_rename);
579 }
580
581 static int method_clone_image(sd_bus_message *message, void *userdata, sd_bus_error *error) {
582 return redirect_method_to_image(message, userdata, error, bus_image_method_clone);
583 }
584
585 static int method_mark_image_read_only(sd_bus_message *message, void *userdata, sd_bus_error *error) {
586 return redirect_method_to_image(message, userdata, error, bus_image_method_mark_read_only);
587 }
588
589 static int method_get_image_hostname(sd_bus_message *message, void *userdata, sd_bus_error *error) {
590 return redirect_method_to_image(message, userdata, error, bus_image_method_get_hostname);
591 }
592
593 static int method_get_image_machine_id(sd_bus_message *message, void *userdata, sd_bus_error *error) {
594 return redirect_method_to_image(message, userdata, error, bus_image_method_get_machine_id);
595 }
596
597 static int method_get_image_machine_info(sd_bus_message *message, void *userdata, sd_bus_error *error) {
598 return redirect_method_to_image(message, userdata, error, bus_image_method_get_machine_info);
599 }
600
601 static int method_get_image_os_release(sd_bus_message *message, void *userdata, sd_bus_error *error) {
602 return redirect_method_to_image(message, userdata, error, bus_image_method_get_os_release);
603 }
604
605 static int clean_pool_done(Operation *operation, int ret, sd_bus_error *error) {
606 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
607 _cleanup_fclose_ FILE *f = NULL;
608 bool success;
609 size_t n;
610 int r;
611
612 assert(operation);
613 assert(operation->extra_fd >= 0);
614
615 if (lseek(operation->extra_fd, 0, SEEK_SET) == (off_t) -1)
616 return -errno;
617
618 f = fdopen(operation->extra_fd, "r");
619 if (!f)
620 return -errno;
621
622 operation->extra_fd = -1;
623
624 /* The resulting temporary file starts with a boolean value that indicates success or not. */
625 errno = 0;
626 n = fread(&success, 1, sizeof(success), f);
627 if (n != sizeof(success))
628 return ret < 0 ? ret : (errno != 0 ? -errno : -EIO);
629
630 if (ret < 0) {
631 _cleanup_free_ char *name = NULL;
632
633 /* The clean-up operation failed. In this case the resulting temporary file should contain a boolean
634 * set to false followed by the name of the failed image. Let's try to read this and use it for the
635 * error message. If we can't read it, don't mind, and return the naked error. */
636
637 if (success) /* The resulting temporary file could not be updated, ignore it. */
638 return ret;
639
640 r = read_nul_string(f, &name);
641 if (r < 0 || isempty(name)) /* Same here... */
642 return ret;
643
644 return sd_bus_error_set_errnof(error, ret, "Failed to remove image %s: %m", name);
645 }
646
647 assert(success);
648
649 r = sd_bus_message_new_method_return(operation->message, &reply);
650 if (r < 0)
651 return r;
652
653 r = sd_bus_message_open_container(reply, 'a', "(st)");
654 if (r < 0)
655 return r;
656
657 /* On success the resulting temporary file will contain a list of image names that were removed followed by
658 * their size on disk. Let's read that and turn it into a bus message. */
659 for (;;) {
660 _cleanup_free_ char *name = NULL;
661 uint64_t size;
662
663 r = read_nul_string(f, &name);
664 if (r < 0)
665 return r;
666 if (isempty(name)) /* reached the end */
667 break;
668
669 errno = 0;
670 n = fread(&size, 1, sizeof(size), f);
671 if (n != sizeof(size))
672 return errno != 0 ? -errno : -EIO;
673
674 r = sd_bus_message_append(reply, "(st)", name, size);
675 if (r < 0)
676 return r;
677 }
678
679 r = sd_bus_message_close_container(reply);
680 if (r < 0)
681 return r;
682
683 return sd_bus_send(NULL, reply, NULL);
684 }
685
686 static int method_clean_pool(sd_bus_message *message, void *userdata, sd_bus_error *error) {
687 enum {
688 REMOVE_ALL,
689 REMOVE_HIDDEN,
690 } mode;
691
692 _cleanup_close_pair_ int errno_pipe_fd[2] = { -1, -1 };
693 _cleanup_close_ int result_fd = -1;
694 Manager *m = userdata;
695 Operation *operation;
696 const char *mm;
697 pid_t child;
698 int r;
699
700 assert(message);
701
702 if (m->n_operations >= OPERATIONS_MAX)
703 return sd_bus_error_setf(error, SD_BUS_ERROR_LIMITS_EXCEEDED, "Too many ongoing operations.");
704
705 r = sd_bus_message_read(message, "s", &mm);
706 if (r < 0)
707 return r;
708
709 if (streq(mm, "all"))
710 mode = REMOVE_ALL;
711 else if (streq(mm, "hidden"))
712 mode = REMOVE_HIDDEN;
713 else
714 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Unknown mode '%s'.", mm);
715
716 r = bus_verify_polkit_async(
717 message,
718 CAP_SYS_ADMIN,
719 "org.freedesktop.machine1.manage-machines",
720 NULL,
721 false,
722 UID_INVALID,
723 &m->polkit_registry,
724 error);
725 if (r < 0)
726 return r;
727 if (r == 0)
728 return 1; /* Will call us back */
729
730 if (pipe2(errno_pipe_fd, O_CLOEXEC|O_NONBLOCK) < 0)
731 return sd_bus_error_set_errnof(error, errno, "Failed to create pipe: %m");
732
733 /* Create a temporary file we can dump information about deleted images into. We use a temporary file for this
734 * instead of a pipe or so, since this might grow quit large in theory and we don't want to process this
735 * continuously */
736 result_fd = open_tmpfile_unlinkable(NULL, O_RDWR|O_CLOEXEC);
737 if (result_fd < 0)
738 return -errno;
739
740 /* This might be a slow operation, run it asynchronously in a background process */
741 r = safe_fork("(sd-clean)", FORK_RESET_SIGNALS, &child);
742 if (r < 0)
743 return sd_bus_error_set_errnof(error, r, "Failed to fork(): %m");
744 if (r == 0) {
745 _cleanup_hashmap_free_ Hashmap *images = NULL;
746 bool success = true;
747 Image *image;
748 Iterator i;
749 ssize_t l;
750
751 errno_pipe_fd[0] = safe_close(errno_pipe_fd[0]);
752
753 images = hashmap_new(&image_hash_ops);
754 if (!images) {
755 r = -ENOMEM;
756 goto child_fail;
757 }
758
759 r = image_discover(IMAGE_MACHINE, images);
760 if (r < 0)
761 goto child_fail;
762
763 l = write(result_fd, &success, sizeof(success));
764 if (l < 0) {
765 r = -errno;
766 goto child_fail;
767 }
768
769 HASHMAP_FOREACH(image, images, i) {
770
771 /* We can't remove vendor images (i.e. those in /usr) */
772 if (IMAGE_IS_VENDOR(image))
773 continue;
774
775 if (IMAGE_IS_HOST(image))
776 continue;
777
778 if (mode == REMOVE_HIDDEN && !IMAGE_IS_HIDDEN(image))
779 continue;
780
781 r = image_remove(image);
782 if (r == -EBUSY) /* keep images that are currently being used. */
783 continue;
784 if (r < 0) {
785 /* If the operation failed, let's override everything we wrote, and instead write there at which image we failed. */
786 success = false;
787 (void) ftruncate(result_fd, 0);
788 (void) lseek(result_fd, 0, SEEK_SET);
789 (void) write(result_fd, &success, sizeof(success));
790 (void) write(result_fd, image->name, strlen(image->name)+1);
791 goto child_fail;
792 }
793
794 l = write(result_fd, image->name, strlen(image->name)+1);
795 if (l < 0) {
796 r = -errno;
797 goto child_fail;
798 }
799
800 l = write(result_fd, &image->usage_exclusive, sizeof(image->usage_exclusive));
801 if (l < 0) {
802 r = -errno;
803 goto child_fail;
804 }
805 }
806
807 result_fd = safe_close(result_fd);
808 _exit(EXIT_SUCCESS);
809
810 child_fail:
811 (void) write(errno_pipe_fd[1], &r, sizeof(r));
812 _exit(EXIT_FAILURE);
813 }
814
815 errno_pipe_fd[1] = safe_close(errno_pipe_fd[1]);
816
817 /* The clean-up might take a while, hence install a watch on the child and return */
818
819 r = operation_new(m, NULL, child, message, errno_pipe_fd[0], &operation);
820 if (r < 0) {
821 (void) sigkill_wait(child);
822 return r;
823 }
824
825 operation->extra_fd = result_fd;
826 operation->done = clean_pool_done;
827
828 result_fd = -1;
829 errno_pipe_fd[0] = -1;
830
831 return 1;
832 }
833
834 static int method_set_pool_limit(sd_bus_message *message, void *userdata, sd_bus_error *error) {
835 Manager *m = userdata;
836 uint64_t limit;
837 int r;
838
839 assert(message);
840
841 r = sd_bus_message_read(message, "t", &limit);
842 if (r < 0)
843 return r;
844 if (!FILE_SIZE_VALID_OR_INFINITY(limit))
845 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "New limit out of range");
846
847 r = bus_verify_polkit_async(
848 message,
849 CAP_SYS_ADMIN,
850 "org.freedesktop.machine1.manage-machines",
851 NULL,
852 false,
853 UID_INVALID,
854 &m->polkit_registry,
855 error);
856 if (r < 0)
857 return r;
858 if (r == 0)
859 return 1; /* Will call us back */
860
861 /* Set up the machine directory if necessary */
862 r = setup_machine_directory(error);
863 if (r < 0)
864 return r;
865
866 (void) btrfs_qgroup_set_limit("/var/lib/machines", 0, limit);
867
868 r = btrfs_subvol_set_subtree_quota_limit("/var/lib/machines", 0, limit);
869 if (r == -ENOTTY)
870 return sd_bus_error_setf(error, SD_BUS_ERROR_NOT_SUPPORTED, "Quota is only supported on btrfs.");
871 if (r < 0)
872 return sd_bus_error_set_errnof(error, r, "Failed to adjust quota limit: %m");
873
874 return sd_bus_reply_method_return(message, NULL);
875 }
876
877 static int method_set_image_limit(sd_bus_message *message, void *userdata, sd_bus_error *error) {
878 return redirect_method_to_image(message, userdata, error, bus_image_method_set_limit);
879 }
880
881 static int method_map_from_machine_user(sd_bus_message *message, void *userdata, sd_bus_error *error) {
882 _cleanup_fclose_ FILE *f = NULL;
883 Manager *m = userdata;
884 const char *name, *p;
885 Machine *machine;
886 uint32_t uid;
887 int r;
888
889 r = sd_bus_message_read(message, "su", &name, &uid);
890 if (r < 0)
891 return r;
892
893 if (!uid_is_valid(uid))
894 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid user ID " UID_FMT, uid);
895
896 machine = hashmap_get(m->machines, name);
897 if (!machine)
898 return sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_MACHINE, "No machine '%s' known", name);
899
900 if (machine->class != MACHINE_CONTAINER)
901 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Not supported for non-container machines.");
902
903 p = procfs_file_alloca(machine->leader, "uid_map");
904 f = fopen(p, "re");
905 if (!f)
906 return -errno;
907
908 for (;;) {
909 uid_t uid_base, uid_shift, uid_range, converted;
910 int k;
911
912 errno = 0;
913 k = fscanf(f, UID_FMT " " UID_FMT " " UID_FMT, &uid_base, &uid_shift, &uid_range);
914 if (k < 0 && feof(f))
915 break;
916 if (k != 3) {
917 if (ferror(f) && errno > 0)
918 return -errno;
919
920 return -EIO;
921 }
922
923 if (uid < uid_base || uid >= uid_base + uid_range)
924 continue;
925
926 converted = uid - uid_base + uid_shift;
927 if (!uid_is_valid(converted))
928 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid user ID " UID_FMT, uid);
929
930 return sd_bus_reply_method_return(message, "u", (uint32_t) converted);
931 }
932
933 return sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_USER_MAPPING, "Machine '%s' has no matching user mappings.", name);
934 }
935
936 static int method_map_to_machine_user(sd_bus_message *message, void *userdata, sd_bus_error *error) {
937 Manager *m = userdata;
938 Machine *machine;
939 uid_t uid;
940 Iterator i;
941 int r;
942
943 r = sd_bus_message_read(message, "u", &uid);
944 if (r < 0)
945 return r;
946 if (!uid_is_valid(uid))
947 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid user ID " UID_FMT, uid);
948 if (uid < 0x10000)
949 return sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_USER_MAPPING, "User " UID_FMT " belongs to host UID range", uid);
950
951 HASHMAP_FOREACH(machine, m->machines, i) {
952 _cleanup_fclose_ FILE *f = NULL;
953 char p[STRLEN("/proc//uid_map") + DECIMAL_STR_MAX(pid_t) + 1];
954
955 if (machine->class != MACHINE_CONTAINER)
956 continue;
957
958 xsprintf(p, "/proc/" UID_FMT "/uid_map", machine->leader);
959 f = fopen(p, "re");
960 if (!f) {
961 log_warning_errno(errno, "Failed to open %s, ignoring,", p);
962 continue;
963 }
964
965 for (;;) {
966 _cleanup_free_ char *o = NULL;
967 uid_t uid_base, uid_shift, uid_range, converted;
968 int k;
969
970 errno = 0;
971 k = fscanf(f, UID_FMT " " UID_FMT " " UID_FMT, &uid_base, &uid_shift, &uid_range);
972 if (k < 0 && feof(f))
973 break;
974 if (k != 3) {
975 if (ferror(f) && errno > 0)
976 return -errno;
977
978 return -EIO;
979 }
980
981 /* The private user namespace is disabled, ignoring. */
982 if (uid_shift == 0)
983 continue;
984
985 if (uid < uid_shift || uid >= uid_shift + uid_range)
986 continue;
987
988 converted = (uid - uid_shift + uid_base);
989 if (!uid_is_valid(converted))
990 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid user ID " UID_FMT, uid);
991
992 o = machine_bus_path(machine);
993 if (!o)
994 return -ENOMEM;
995
996 return sd_bus_reply_method_return(message, "sou", machine->name, o, (uint32_t) converted);
997 }
998 }
999
1000 return sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_USER_MAPPING, "No matching user mapping for " UID_FMT ".", uid);
1001 }
1002
1003 static int method_map_from_machine_group(sd_bus_message *message, void *groupdata, sd_bus_error *error) {
1004 _cleanup_fclose_ FILE *f = NULL;
1005 Manager *m = groupdata;
1006 const char *name, *p;
1007 Machine *machine;
1008 uint32_t gid;
1009 int r;
1010
1011 r = sd_bus_message_read(message, "su", &name, &gid);
1012 if (r < 0)
1013 return r;
1014
1015 if (!gid_is_valid(gid))
1016 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid group ID " GID_FMT, gid);
1017
1018 machine = hashmap_get(m->machines, name);
1019 if (!machine)
1020 return sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_MACHINE, "No machine '%s' known", name);
1021
1022 if (machine->class != MACHINE_CONTAINER)
1023 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Not supported for non-container machines.");
1024
1025 p = procfs_file_alloca(machine->leader, "gid_map");
1026 f = fopen(p, "re");
1027 if (!f)
1028 return -errno;
1029
1030 for (;;) {
1031 gid_t gid_base, gid_shift, gid_range, converted;
1032 int k;
1033
1034 errno = 0;
1035 k = fscanf(f, GID_FMT " " GID_FMT " " GID_FMT, &gid_base, &gid_shift, &gid_range);
1036 if (k < 0 && feof(f))
1037 break;
1038 if (k != 3) {
1039 if (ferror(f) && errno > 0)
1040 return -errno;
1041
1042 return -EIO;
1043 }
1044
1045 if (gid < gid_base || gid >= gid_base + gid_range)
1046 continue;
1047
1048 converted = gid - gid_base + gid_shift;
1049 if (!gid_is_valid(converted))
1050 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid group ID " GID_FMT, gid);
1051
1052 return sd_bus_reply_method_return(message, "u", (uint32_t) converted);
1053 }
1054
1055 return sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_GROUP_MAPPING, "Machine '%s' has no matching group mappings.", name);
1056 }
1057
1058 static int method_map_to_machine_group(sd_bus_message *message, void *groupdata, sd_bus_error *error) {
1059 Manager *m = groupdata;
1060 Machine *machine;
1061 gid_t gid;
1062 Iterator i;
1063 int r;
1064
1065 r = sd_bus_message_read(message, "u", &gid);
1066 if (r < 0)
1067 return r;
1068 if (!gid_is_valid(gid))
1069 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid group ID " GID_FMT, gid);
1070 if (gid < 0x10000)
1071 return sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_GROUP_MAPPING, "Group " GID_FMT " belongs to host GID range", gid);
1072
1073 HASHMAP_FOREACH(machine, m->machines, i) {
1074 _cleanup_fclose_ FILE *f = NULL;
1075 char p[STRLEN("/proc//gid_map") + DECIMAL_STR_MAX(pid_t) + 1];
1076
1077 if (machine->class != MACHINE_CONTAINER)
1078 continue;
1079
1080 xsprintf(p, "/proc/" GID_FMT "/gid_map", machine->leader);
1081 f = fopen(p, "re");
1082 if (!f) {
1083 log_warning_errno(errno, "Failed to open %s, ignoring,", p);
1084 continue;
1085 }
1086
1087 for (;;) {
1088 _cleanup_free_ char *o = NULL;
1089 gid_t gid_base, gid_shift, gid_range, converted;
1090 int k;
1091
1092 errno = 0;
1093 k = fscanf(f, GID_FMT " " GID_FMT " " GID_FMT, &gid_base, &gid_shift, &gid_range);
1094 if (k < 0 && feof(f))
1095 break;
1096 if (k != 3) {
1097 if (ferror(f) && errno > 0)
1098 return -errno;
1099
1100 return -EIO;
1101 }
1102
1103 /* The private user namespace is disabled, ignoring. */
1104 if (gid_shift == 0)
1105 continue;
1106
1107 if (gid < gid_shift || gid >= gid_shift + gid_range)
1108 continue;
1109
1110 converted = (gid - gid_shift + gid_base);
1111 if (!gid_is_valid(converted))
1112 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid group ID " GID_FMT, gid);
1113
1114 o = machine_bus_path(machine);
1115 if (!o)
1116 return -ENOMEM;
1117
1118 return sd_bus_reply_method_return(message, "sou", machine->name, o, (uint32_t) converted);
1119 }
1120 }
1121
1122 return sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_GROUP_MAPPING, "No matching group mapping for " GID_FMT ".", gid);
1123 }
1124
1125 const sd_bus_vtable manager_vtable[] = {
1126 SD_BUS_VTABLE_START(0),
1127 SD_BUS_PROPERTY("PoolPath", "s", property_get_pool_path, 0, 0),
1128 SD_BUS_PROPERTY("PoolUsage", "t", property_get_pool_usage, 0, 0),
1129 SD_BUS_PROPERTY("PoolLimit", "t", property_get_pool_limit, 0, 0),
1130 SD_BUS_METHOD("GetMachine", "s", "o", method_get_machine, SD_BUS_VTABLE_UNPRIVILEGED),
1131 SD_BUS_METHOD("GetImage", "s", "o", method_get_image, SD_BUS_VTABLE_UNPRIVILEGED),
1132 SD_BUS_METHOD("GetMachineByPID", "u", "o", method_get_machine_by_pid, SD_BUS_VTABLE_UNPRIVILEGED),
1133 SD_BUS_METHOD("ListMachines", NULL, "a(ssso)", method_list_machines, SD_BUS_VTABLE_UNPRIVILEGED),
1134 SD_BUS_METHOD("ListImages", NULL, "a(ssbttto)", method_list_images, SD_BUS_VTABLE_UNPRIVILEGED),
1135 SD_BUS_METHOD("CreateMachine", "sayssusa(sv)", "o", method_create_machine, 0),
1136 SD_BUS_METHOD("CreateMachineWithNetwork", "sayssusaia(sv)", "o", method_create_machine_with_network, 0),
1137 SD_BUS_METHOD("RegisterMachine", "sayssus", "o", method_register_machine, 0),
1138 SD_BUS_METHOD("RegisterMachineWithNetwork", "sayssusai", "o", method_register_machine_with_network, 0),
1139 SD_BUS_METHOD("TerminateMachine", "s", NULL, method_terminate_machine, SD_BUS_VTABLE_UNPRIVILEGED),
1140 SD_BUS_METHOD("KillMachine", "ssi", NULL, method_kill_machine, SD_BUS_VTABLE_UNPRIVILEGED),
1141 SD_BUS_METHOD("GetMachineAddresses", "s", "a(iay)", method_get_machine_addresses, SD_BUS_VTABLE_UNPRIVILEGED),
1142 SD_BUS_METHOD("GetMachineOSRelease", "s", "a{ss}", method_get_machine_os_release, SD_BUS_VTABLE_UNPRIVILEGED),
1143 SD_BUS_METHOD("OpenMachinePTY", "s", "hs", method_open_machine_pty, 0),
1144 SD_BUS_METHOD("OpenMachineLogin", "s", "hs", method_open_machine_login, SD_BUS_VTABLE_UNPRIVILEGED),
1145 SD_BUS_METHOD("OpenMachineShell", "sssasas", "hs", method_open_machine_shell, SD_BUS_VTABLE_UNPRIVILEGED),
1146 SD_BUS_METHOD("BindMountMachine", "sssbb", NULL, method_bind_mount_machine, SD_BUS_VTABLE_UNPRIVILEGED),
1147 SD_BUS_METHOD("CopyFromMachine", "sss", NULL, method_copy_machine, SD_BUS_VTABLE_UNPRIVILEGED),
1148 SD_BUS_METHOD("CopyToMachine", "sss", NULL, method_copy_machine, SD_BUS_VTABLE_UNPRIVILEGED),
1149 SD_BUS_METHOD("OpenMachineRootDirectory", "s", "h", method_open_machine_root_directory, SD_BUS_VTABLE_UNPRIVILEGED),
1150 SD_BUS_METHOD("GetMachineUIDShift", "s", "u", method_get_machine_uid_shift, SD_BUS_VTABLE_UNPRIVILEGED),
1151 SD_BUS_METHOD("RemoveImage", "s", NULL, method_remove_image, SD_BUS_VTABLE_UNPRIVILEGED),
1152 SD_BUS_METHOD("RenameImage", "ss", NULL, method_rename_image, SD_BUS_VTABLE_UNPRIVILEGED),
1153 SD_BUS_METHOD("CloneImage", "ssb", NULL, method_clone_image, SD_BUS_VTABLE_UNPRIVILEGED),
1154 SD_BUS_METHOD("MarkImageReadOnly", "sb", NULL, method_mark_image_read_only, SD_BUS_VTABLE_UNPRIVILEGED),
1155 SD_BUS_METHOD("GetImageHostname", "s", "s", method_get_image_hostname, SD_BUS_VTABLE_UNPRIVILEGED),
1156 SD_BUS_METHOD("GetImageMachineID", "s", "ay", method_get_image_machine_id, SD_BUS_VTABLE_UNPRIVILEGED),
1157 SD_BUS_METHOD("GetImageMachineInfo", "s", "a{ss}", method_get_image_machine_info, SD_BUS_VTABLE_UNPRIVILEGED),
1158 SD_BUS_METHOD("GetImageOSRelease", "s", "a{ss}", method_get_image_os_release, SD_BUS_VTABLE_UNPRIVILEGED),
1159 SD_BUS_METHOD("SetPoolLimit", "t", NULL, method_set_pool_limit, SD_BUS_VTABLE_UNPRIVILEGED),
1160 SD_BUS_METHOD("SetImageLimit", "st", NULL, method_set_image_limit, SD_BUS_VTABLE_UNPRIVILEGED),
1161 SD_BUS_METHOD("CleanPool", "s", "a(st)", method_clean_pool, SD_BUS_VTABLE_UNPRIVILEGED),
1162 SD_BUS_METHOD("MapFromMachineUser", "su", "u", method_map_from_machine_user, SD_BUS_VTABLE_UNPRIVILEGED),
1163 SD_BUS_METHOD("MapToMachineUser", "u", "sou", method_map_to_machine_user, SD_BUS_VTABLE_UNPRIVILEGED),
1164 SD_BUS_METHOD("MapFromMachineGroup", "su", "u", method_map_from_machine_group, SD_BUS_VTABLE_UNPRIVILEGED),
1165 SD_BUS_METHOD("MapToMachineGroup", "u", "sou", method_map_to_machine_group, SD_BUS_VTABLE_UNPRIVILEGED),
1166 SD_BUS_SIGNAL("MachineNew", "so", 0),
1167 SD_BUS_SIGNAL("MachineRemoved", "so", 0),
1168 SD_BUS_VTABLE_END
1169 };
1170
1171 int match_job_removed(sd_bus_message *message, void *userdata, sd_bus_error *error) {
1172 const char *path, *result, *unit;
1173 Manager *m = userdata;
1174 Machine *machine;
1175 uint32_t id;
1176 int r;
1177
1178 assert(message);
1179 assert(m);
1180
1181 r = sd_bus_message_read(message, "uoss", &id, &path, &unit, &result);
1182 if (r < 0) {
1183 bus_log_parse_error(r);
1184 return 0;
1185 }
1186
1187 machine = hashmap_get(m->machine_units, unit);
1188 if (!machine)
1189 return 0;
1190
1191 if (streq_ptr(path, machine->scope_job)) {
1192 machine->scope_job = mfree(machine->scope_job);
1193
1194 if (machine->started) {
1195 if (streq(result, "done"))
1196 machine_send_create_reply(machine, NULL);
1197 else {
1198 _cleanup_(sd_bus_error_free) sd_bus_error e = SD_BUS_ERROR_NULL;
1199
1200 sd_bus_error_setf(&e, BUS_ERROR_JOB_FAILED, "Start job for unit %s failed with '%s'", unit, result);
1201
1202 machine_send_create_reply(machine, &e);
1203 }
1204 }
1205
1206 machine_save(machine);
1207 }
1208
1209 machine_add_to_gc_queue(machine);
1210 return 0;
1211 }
1212
1213 int match_properties_changed(sd_bus_message *message, void *userdata, sd_bus_error *error) {
1214 _cleanup_free_ char *unit = NULL;
1215 const char *path;
1216 Manager *m = userdata;
1217 Machine *machine;
1218 int r;
1219
1220 assert(message);
1221 assert(m);
1222
1223 path = sd_bus_message_get_path(message);
1224 if (!path)
1225 return 0;
1226
1227 r = unit_name_from_dbus_path(path, &unit);
1228 if (r == -EINVAL) /* not for a unit */
1229 return 0;
1230 if (r < 0) {
1231 log_oom();
1232 return 0;
1233 }
1234
1235 machine = hashmap_get(m->machine_units, unit);
1236 if (!machine)
1237 return 0;
1238
1239 machine_add_to_gc_queue(machine);
1240 return 0;
1241 }
1242
1243 int match_unit_removed(sd_bus_message *message, void *userdata, sd_bus_error *error) {
1244 const char *path, *unit;
1245 Manager *m = userdata;
1246 Machine *machine;
1247 int r;
1248
1249 assert(message);
1250 assert(m);
1251
1252 r = sd_bus_message_read(message, "so", &unit, &path);
1253 if (r < 0) {
1254 bus_log_parse_error(r);
1255 return 0;
1256 }
1257
1258 machine = hashmap_get(m->machine_units, unit);
1259 if (!machine)
1260 return 0;
1261
1262 machine_add_to_gc_queue(machine);
1263 return 0;
1264 }
1265
1266 int match_reloading(sd_bus_message *message, void *userdata, sd_bus_error *error) {
1267 Manager *m = userdata;
1268 Machine *machine;
1269 Iterator i;
1270 int b, r;
1271
1272 assert(message);
1273 assert(m);
1274
1275 r = sd_bus_message_read(message, "b", &b);
1276 if (r < 0) {
1277 bus_log_parse_error(r);
1278 return 0;
1279 }
1280 if (b)
1281 return 0;
1282
1283 /* systemd finished reloading, let's recheck all our machines */
1284 log_debug("System manager has been reloaded, rechecking machines...");
1285
1286 HASHMAP_FOREACH(machine, m->machines, i)
1287 machine_add_to_gc_queue(machine);
1288
1289 return 0;
1290 }
1291
1292 int manager_start_scope(
1293 Manager *manager,
1294 const char *scope,
1295 pid_t pid,
1296 const char *slice,
1297 const char *description,
1298 sd_bus_message *more_properties,
1299 sd_bus_error *error,
1300 char **job) {
1301
1302 _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL, *reply = NULL;
1303 int r;
1304
1305 assert(manager);
1306 assert(scope);
1307 assert(pid > 1);
1308
1309 r = sd_bus_message_new_method_call(
1310 manager->bus,
1311 &m,
1312 "org.freedesktop.systemd1",
1313 "/org/freedesktop/systemd1",
1314 "org.freedesktop.systemd1.Manager",
1315 "StartTransientUnit");
1316 if (r < 0)
1317 return r;
1318
1319 r = sd_bus_message_append(m, "ss", strempty(scope), "fail");
1320 if (r < 0)
1321 return r;
1322
1323 r = sd_bus_message_open_container(m, 'a', "(sv)");
1324 if (r < 0)
1325 return r;
1326
1327 if (!isempty(slice)) {
1328 r = sd_bus_message_append(m, "(sv)", "Slice", "s", slice);
1329 if (r < 0)
1330 return r;
1331 }
1332
1333 if (!isempty(description)) {
1334 r = sd_bus_message_append(m, "(sv)", "Description", "s", description);
1335 if (r < 0)
1336 return r;
1337 }
1338
1339 r = sd_bus_message_append(m, "(sv)(sv)(sv)(sv)(sv)",
1340 "PIDs", "au", 1, pid,
1341 "Delegate", "b", 1,
1342 "CollectMode", "s", "inactive-or-failed",
1343 "AddRef", "b", 1,
1344 "TasksMax", "t", UINT64_C(16384));
1345 if (r < 0)
1346 return r;
1347
1348 if (more_properties) {
1349 r = sd_bus_message_copy(m, more_properties, true);
1350 if (r < 0)
1351 return r;
1352 }
1353
1354 r = sd_bus_message_close_container(m);
1355 if (r < 0)
1356 return r;
1357
1358 r = sd_bus_message_append(m, "a(sa(sv))", 0);
1359 if (r < 0)
1360 return r;
1361
1362 r = sd_bus_call(manager->bus, m, 0, error, &reply);
1363 if (r < 0)
1364 return r;
1365
1366 if (job) {
1367 const char *j;
1368 char *copy;
1369
1370 r = sd_bus_message_read(reply, "o", &j);
1371 if (r < 0)
1372 return r;
1373
1374 copy = strdup(j);
1375 if (!copy)
1376 return -ENOMEM;
1377
1378 *job = copy;
1379 }
1380
1381 return 1;
1382 }
1383
1384 int manager_unref_unit(
1385 Manager *m,
1386 const char *unit,
1387 sd_bus_error *error) {
1388
1389 assert(m);
1390 assert(unit);
1391
1392 return sd_bus_call_method(
1393 m->bus,
1394 "org.freedesktop.systemd1",
1395 "/org/freedesktop/systemd1",
1396 "org.freedesktop.systemd1.Manager",
1397 "UnrefUnit",
1398 error,
1399 NULL,
1400 "s",
1401 unit);
1402 }
1403
1404 int manager_stop_unit(Manager *manager, const char *unit, sd_bus_error *error, char **job) {
1405 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
1406 int r;
1407
1408 assert(manager);
1409 assert(unit);
1410
1411 r = sd_bus_call_method(
1412 manager->bus,
1413 "org.freedesktop.systemd1",
1414 "/org/freedesktop/systemd1",
1415 "org.freedesktop.systemd1.Manager",
1416 "StopUnit",
1417 error,
1418 &reply,
1419 "ss", unit, "fail");
1420 if (r < 0) {
1421 if (sd_bus_error_has_name(error, BUS_ERROR_NO_SUCH_UNIT) ||
1422 sd_bus_error_has_name(error, BUS_ERROR_LOAD_FAILED)) {
1423
1424 if (job)
1425 *job = NULL;
1426
1427 sd_bus_error_free(error);
1428 return 0;
1429 }
1430
1431 return r;
1432 }
1433
1434 if (job) {
1435 const char *j;
1436 char *copy;
1437
1438 r = sd_bus_message_read(reply, "o", &j);
1439 if (r < 0)
1440 return r;
1441
1442 copy = strdup(j);
1443 if (!copy)
1444 return -ENOMEM;
1445
1446 *job = copy;
1447 }
1448
1449 return 1;
1450 }
1451
1452 int manager_kill_unit(Manager *manager, const char *unit, int signo, sd_bus_error *error) {
1453 assert(manager);
1454 assert(unit);
1455
1456 return sd_bus_call_method(
1457 manager->bus,
1458 "org.freedesktop.systemd1",
1459 "/org/freedesktop/systemd1",
1460 "org.freedesktop.systemd1.Manager",
1461 "KillUnit",
1462 error,
1463 NULL,
1464 "ssi", unit, "all", signo);
1465 }
1466
1467 int manager_unit_is_active(Manager *manager, const char *unit) {
1468 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1469 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
1470 _cleanup_free_ char *path = NULL;
1471 const char *state;
1472 int r;
1473
1474 assert(manager);
1475 assert(unit);
1476
1477 path = unit_dbus_path_from_name(unit);
1478 if (!path)
1479 return -ENOMEM;
1480
1481 r = sd_bus_get_property(
1482 manager->bus,
1483 "org.freedesktop.systemd1",
1484 path,
1485 "org.freedesktop.systemd1.Unit",
1486 "ActiveState",
1487 &error,
1488 &reply,
1489 "s");
1490 if (r < 0) {
1491 if (sd_bus_error_has_name(&error, SD_BUS_ERROR_NO_REPLY) ||
1492 sd_bus_error_has_name(&error, SD_BUS_ERROR_DISCONNECTED))
1493 return true;
1494
1495 if (sd_bus_error_has_name(&error, BUS_ERROR_NO_SUCH_UNIT) ||
1496 sd_bus_error_has_name(&error, BUS_ERROR_LOAD_FAILED))
1497 return false;
1498
1499 return r;
1500 }
1501
1502 r = sd_bus_message_read(reply, "s", &state);
1503 if (r < 0)
1504 return -EINVAL;
1505
1506 return !STR_IN_SET(state, "inactive", "failed");
1507 }
1508
1509 int manager_job_is_active(Manager *manager, const char *path) {
1510 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1511 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
1512 int r;
1513
1514 assert(manager);
1515 assert(path);
1516
1517 r = sd_bus_get_property(
1518 manager->bus,
1519 "org.freedesktop.systemd1",
1520 path,
1521 "org.freedesktop.systemd1.Job",
1522 "State",
1523 &error,
1524 &reply,
1525 "s");
1526 if (r < 0) {
1527 if (sd_bus_error_has_name(&error, SD_BUS_ERROR_NO_REPLY) ||
1528 sd_bus_error_has_name(&error, SD_BUS_ERROR_DISCONNECTED))
1529 return true;
1530
1531 if (sd_bus_error_has_name(&error, SD_BUS_ERROR_UNKNOWN_OBJECT))
1532 return false;
1533
1534 return r;
1535 }
1536
1537 /* We don't actually care about the state really. The fact
1538 * that we could read the job state is enough for us */
1539
1540 return true;
1541 }
1542
1543 int manager_get_machine_by_pid(Manager *m, pid_t pid, Machine **machine) {
1544 Machine *mm;
1545 int r;
1546
1547 assert(m);
1548 assert(pid >= 1);
1549 assert(machine);
1550
1551 mm = hashmap_get(m->machine_leaders, PID_TO_PTR(pid));
1552 if (!mm) {
1553 _cleanup_free_ char *unit = NULL;
1554
1555 r = cg_pid_get_unit(pid, &unit);
1556 if (r >= 0)
1557 mm = hashmap_get(m->machine_units, unit);
1558 }
1559 if (!mm)
1560 return 0;
1561
1562 *machine = mm;
1563 return 1;
1564 }
1565
1566 int manager_add_machine(Manager *m, const char *name, Machine **_machine) {
1567 Machine *machine;
1568
1569 assert(m);
1570 assert(name);
1571
1572 machine = hashmap_get(m->machines, name);
1573 if (!machine) {
1574 machine = machine_new(m, _MACHINE_CLASS_INVALID, name);
1575 if (!machine)
1576 return -ENOMEM;
1577 }
1578
1579 if (_machine)
1580 *_machine = machine;
1581
1582 return 0;
1583 }