1 /* SPDX-License-Identifier: LGPL-2.1+ */
8 #include "alloc-util.h"
9 #include "bus-common-errors.h"
10 #include "dirent-util.h"
17 #include "signal-util.h"
18 #include "stdio-util.h"
19 #include "string-util.h"
20 #include "user-util.h"
23 #define DYNAMIC_USER_GECOS "Dynamic User"
24 #define DYNAMIC_USER_PASSWD "*" /* locked */
25 #define DYNAMIC_USER_DIR "/"
26 #define DYNAMIC_USER_SHELL "/sbin/nologin"
28 static const struct passwd root_passwd
= {
29 .pw_name
= (char*) "root",
30 .pw_passwd
= (char*) "x", /* see shadow file */
33 .pw_gecos
= (char*) "Super User",
34 .pw_dir
= (char*) "/root",
35 .pw_shell
= (char*) "/bin/sh",
38 static const struct passwd nobody_passwd
= {
39 .pw_name
= (char*) NOBODY_USER_NAME
,
40 .pw_passwd
= (char*) "*", /* locked */
43 .pw_gecos
= (char*) "User Nobody",
44 .pw_dir
= (char*) "/",
45 .pw_shell
= (char*) "/sbin/nologin",
48 static const struct group root_group
= {
49 .gr_name
= (char*) "root",
51 .gr_passwd
= (char*) "x", /* see shadow file */
52 .gr_mem
= (char*[]) { NULL
},
55 static const struct group nobody_group
= {
56 .gr_name
= (char*) NOBODY_GROUP_NAME
,
58 .gr_passwd
= (char*) "*", /* locked */
59 .gr_mem
= (char*[]) { NULL
},
62 typedef struct UserEntry UserEntry
;
63 typedef struct GetentData GetentData
;
70 LIST_FIELDS(UserEntry
, entries
);
74 /* As explained in NOTES section of getpwent_r(3) as 'getpwent_r() is not really
75 * reentrant since it shares the reading position in the stream with all other threads',
76 * we need to protect the data in UserEntry from multithreaded programs which may call
77 * setpwent(), getpwent_r(), or endpwent() simultaneously. So, each function locks the
78 * data by using the mutex below. */
79 pthread_mutex_t mutex
;
82 LIST_HEAD(UserEntry
, entries
);
85 static GetentData getpwent_data
= { PTHREAD_MUTEX_INITIALIZER
, NULL
, NULL
};
86 static GetentData getgrent_data
= { PTHREAD_MUTEX_INITIALIZER
, NULL
, NULL
};
88 NSS_GETPW_PROTOTYPES(systemd
);
89 NSS_GETGR_PROTOTYPES(systemd
);
90 enum nss_status
_nss_systemd_endpwent(void) _public_
;
91 enum nss_status
_nss_systemd_setpwent(int stayopen
) _public_
;
92 enum nss_status
_nss_systemd_getpwent_r(struct passwd
*result
, char *buffer
, size_t buflen
, int *errnop
) _public_
;
93 enum nss_status
_nss_systemd_endgrent(void) _public_
;
94 enum nss_status
_nss_systemd_setgrent(int stayopen
) _public_
;
95 enum nss_status
_nss_systemd_getgrent_r(struct group
*result
, char *buffer
, size_t buflen
, int *errnop
) _public_
;
97 static int direct_lookup_name(const char *name
, uid_t
*ret
) {
98 _cleanup_free_
char *s
= NULL
;
104 /* Normally, we go via the bus to resolve names. That has the benefit that it is available from any mount
105 * namespace and subject to proper authentication. However, there's one problem: if our module is called from
106 * dbus-daemon itself we really can't use D-Bus to communicate. In this case, resort to a client-side hack,
107 * and look for the dynamic names directly. This is pretty ugly, but breaks the cyclic dependency. */
109 path
= strjoina("/run/systemd/dynamic-uid/direct:", name
);
110 r
= readlink_malloc(path
, &s
);
114 return parse_uid(s
, ret
);
117 static int direct_lookup_uid(uid_t uid
, char **ret
) {
118 char path
[STRLEN("/run/systemd/dynamic-uid/direct:") + DECIMAL_STR_MAX(uid_t
) + 1], *s
;
121 xsprintf(path
, "/run/systemd/dynamic-uid/direct:" UID_FMT
, uid
);
123 r
= readlink_malloc(path
, &s
);
126 if (!valid_user_group_name(s
)) { /* extra safety check */
135 enum nss_status
_nss_systemd_getpwnam_r(
138 char *buffer
, size_t buflen
,
141 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
142 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
* reply
= NULL
;
143 _cleanup_(sd_bus_flush_close_unrefp
) sd_bus
*bus
= NULL
;
149 BLOCK_SIGNALS(NSS_SIGNALS_BLOCK
);
154 /* If the username is not valid, then we don't know it. Ideally libc would filter these for us anyway. We don't
155 * generate EINVAL here, because it isn't really out business to complain about invalid user names. */
156 if (!valid_user_group_name(name
))
157 return NSS_STATUS_NOTFOUND
;
159 /* Synthesize entries for the root and nobody users, in case they are missing in /etc/passwd */
160 if (getenv_bool_secure("SYSTEMD_NSS_BYPASS_SYNTHETIC") <= 0) {
161 if (streq(name
, root_passwd
.pw_name
)) {
163 return NSS_STATUS_SUCCESS
;
165 if (synthesize_nobody() &&
166 streq(name
, nobody_passwd
.pw_name
)) {
167 *pwd
= nobody_passwd
;
168 return NSS_STATUS_SUCCESS
;
172 /* Make sure that we don't go in circles when allocating a dynamic UID by checking our own database */
173 if (getenv_bool_secure("SYSTEMD_NSS_DYNAMIC_BYPASS") > 0)
174 return NSS_STATUS_NOTFOUND
;
176 bypass
= getenv_bool_secure("SYSTEMD_NSS_BYPASS_BUS");
178 r
= sd_bus_open_system(&bus
);
184 r
= direct_lookup_name(name
, (uid_t
*) &translated
);
186 return NSS_STATUS_NOTFOUND
;
190 r
= sd_bus_call_method(bus
,
191 "org.freedesktop.systemd1",
192 "/org/freedesktop/systemd1",
193 "org.freedesktop.systemd1.Manager",
194 "LookupDynamicUserByName",
200 if (sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_DYNAMIC_USER
))
201 return NSS_STATUS_NOTFOUND
;
206 r
= sd_bus_message_read(reply
, "u", &translated
);
214 return NSS_STATUS_TRYAGAIN
;
217 memcpy(buffer
, name
, l
+1);
219 pwd
->pw_name
= buffer
;
220 pwd
->pw_uid
= (uid_t
) translated
;
221 pwd
->pw_gid
= (uid_t
) translated
;
222 pwd
->pw_gecos
= (char*) DYNAMIC_USER_GECOS
;
223 pwd
->pw_passwd
= (char*) DYNAMIC_USER_PASSWD
;
224 pwd
->pw_dir
= (char*) DYNAMIC_USER_DIR
;
225 pwd
->pw_shell
= (char*) DYNAMIC_USER_SHELL
;
227 return NSS_STATUS_SUCCESS
;
231 return NSS_STATUS_UNAVAIL
;
234 enum nss_status
_nss_systemd_getpwuid_r(
237 char *buffer
, size_t buflen
,
240 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
241 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
* reply
= NULL
;
242 _cleanup_(sd_bus_flush_close_unrefp
) sd_bus
*bus
= NULL
;
243 _cleanup_free_
char *direct
= NULL
;
244 const char *translated
;
249 BLOCK_SIGNALS(NSS_SIGNALS_BLOCK
);
251 if (!uid_is_valid(uid
))
252 return NSS_STATUS_NOTFOUND
;
254 /* Synthesize data for the root user and for nobody in case they are missing from /etc/passwd */
255 if (getenv_bool_secure("SYSTEMD_NSS_BYPASS_SYNTHETIC") <= 0) {
256 if (uid
== root_passwd
.pw_uid
) {
258 return NSS_STATUS_SUCCESS
;
260 if (synthesize_nobody() &&
261 uid
== nobody_passwd
.pw_uid
) {
262 *pwd
= nobody_passwd
;
263 return NSS_STATUS_SUCCESS
;
267 if (!uid_is_dynamic(uid
))
268 return NSS_STATUS_NOTFOUND
;
270 if (getenv_bool_secure("SYSTEMD_NSS_DYNAMIC_BYPASS") > 0)
271 return NSS_STATUS_NOTFOUND
;
273 bypass
= getenv_bool_secure("SYSTEMD_NSS_BYPASS_BUS");
275 r
= sd_bus_open_system(&bus
);
281 r
= direct_lookup_uid(uid
, &direct
);
283 return NSS_STATUS_NOTFOUND
;
290 r
= sd_bus_call_method(bus
,
291 "org.freedesktop.systemd1",
292 "/org/freedesktop/systemd1",
293 "org.freedesktop.systemd1.Manager",
294 "LookupDynamicUserByUID",
300 if (sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_DYNAMIC_USER
))
301 return NSS_STATUS_NOTFOUND
;
306 r
= sd_bus_message_read(reply
, "s", &translated
);
311 l
= strlen(translated
) + 1;
314 return NSS_STATUS_TRYAGAIN
;
317 memcpy(buffer
, translated
, l
);
319 pwd
->pw_name
= buffer
;
322 pwd
->pw_gecos
= (char*) DYNAMIC_USER_GECOS
;
323 pwd
->pw_passwd
= (char*) DYNAMIC_USER_PASSWD
;
324 pwd
->pw_dir
= (char*) DYNAMIC_USER_DIR
;
325 pwd
->pw_shell
= (char*) DYNAMIC_USER_SHELL
;
327 return NSS_STATUS_SUCCESS
;
331 return NSS_STATUS_UNAVAIL
;
334 #pragma GCC diagnostic ignored "-Wsizeof-pointer-memaccess"
336 enum nss_status
_nss_systemd_getgrnam_r(
339 char *buffer
, size_t buflen
,
342 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
343 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
* reply
= NULL
;
344 _cleanup_(sd_bus_flush_close_unrefp
) sd_bus
*bus
= NULL
;
350 BLOCK_SIGNALS(NSS_SIGNALS_BLOCK
);
355 if (!valid_user_group_name(name
))
356 return NSS_STATUS_NOTFOUND
;
358 /* Synthesize records for root and nobody, in case they are missing form /etc/group */
359 if (getenv_bool_secure("SYSTEMD_NSS_BYPASS_SYNTHETIC") <= 0) {
360 if (streq(name
, root_group
.gr_name
)) {
362 return NSS_STATUS_SUCCESS
;
364 if (synthesize_nobody() &&
365 streq(name
, nobody_group
.gr_name
)) {
367 return NSS_STATUS_SUCCESS
;
371 if (getenv_bool_secure("SYSTEMD_NSS_DYNAMIC_BYPASS") > 0)
372 return NSS_STATUS_NOTFOUND
;
374 bypass
= getenv_bool_secure("SYSTEMD_NSS_BYPASS_BUS");
376 r
= sd_bus_open_system(&bus
);
382 r
= direct_lookup_name(name
, (uid_t
*) &translated
);
384 return NSS_STATUS_NOTFOUND
;
388 r
= sd_bus_call_method(bus
,
389 "org.freedesktop.systemd1",
390 "/org/freedesktop/systemd1",
391 "org.freedesktop.systemd1.Manager",
392 "LookupDynamicUserByName",
398 if (sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_DYNAMIC_USER
))
399 return NSS_STATUS_NOTFOUND
;
404 r
= sd_bus_message_read(reply
, "u", &translated
);
409 l
= sizeof(char*) + strlen(name
) + 1;
412 return NSS_STATUS_TRYAGAIN
;
415 memzero(buffer
, sizeof(char*));
416 strcpy(buffer
+ sizeof(char*), name
);
418 gr
->gr_name
= buffer
+ sizeof(char*);
419 gr
->gr_gid
= (gid_t
) translated
;
420 gr
->gr_passwd
= (char*) DYNAMIC_USER_PASSWD
;
421 gr
->gr_mem
= (char**) buffer
;
423 return NSS_STATUS_SUCCESS
;
427 return NSS_STATUS_UNAVAIL
;
430 enum nss_status
_nss_systemd_getgrgid_r(
433 char *buffer
, size_t buflen
,
436 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
437 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
* reply
= NULL
;
438 _cleanup_(sd_bus_flush_close_unrefp
) sd_bus
*bus
= NULL
;
439 _cleanup_free_
char *direct
= NULL
;
440 const char *translated
;
445 BLOCK_SIGNALS(NSS_SIGNALS_BLOCK
);
447 if (!gid_is_valid(gid
))
448 return NSS_STATUS_NOTFOUND
;
450 /* Synthesize records for root and nobody, in case they are missing from /etc/group */
451 if (getenv_bool_secure("SYSTEMD_NSS_BYPASS_SYNTHETIC") <= 0) {
452 if (gid
== root_group
.gr_gid
) {
454 return NSS_STATUS_SUCCESS
;
456 if (synthesize_nobody() &&
457 gid
== nobody_group
.gr_gid
) {
459 return NSS_STATUS_SUCCESS
;
463 if (!gid_is_dynamic(gid
))
464 return NSS_STATUS_NOTFOUND
;
466 if (getenv_bool_secure("SYSTEMD_NSS_DYNAMIC_BYPASS") > 0)
467 return NSS_STATUS_NOTFOUND
;
469 bypass
= getenv_bool_secure("SYSTEMD_NSS_BYPASS_BUS");
471 r
= sd_bus_open_system(&bus
);
477 r
= direct_lookup_uid(gid
, &direct
);
479 return NSS_STATUS_NOTFOUND
;
486 r
= sd_bus_call_method(bus
,
487 "org.freedesktop.systemd1",
488 "/org/freedesktop/systemd1",
489 "org.freedesktop.systemd1.Manager",
490 "LookupDynamicUserByUID",
496 if (sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_DYNAMIC_USER
))
497 return NSS_STATUS_NOTFOUND
;
502 r
= sd_bus_message_read(reply
, "s", &translated
);
507 l
= sizeof(char*) + strlen(translated
) + 1;
510 return NSS_STATUS_TRYAGAIN
;
513 memzero(buffer
, sizeof(char*));
514 strcpy(buffer
+ sizeof(char*), translated
);
516 gr
->gr_name
= buffer
+ sizeof(char*);
518 gr
->gr_passwd
= (char*) DYNAMIC_USER_PASSWD
;
519 gr
->gr_mem
= (char**) buffer
;
521 return NSS_STATUS_SUCCESS
;
525 return NSS_STATUS_UNAVAIL
;
528 static void user_entry_free(UserEntry
*p
) {
533 LIST_REMOVE(entries
, p
->data
->entries
, p
);
539 static int user_entry_add(GetentData
*data
, const char *name
, uid_t id
) {
544 /* This happens when User= or Group= already exists statically. */
545 if (!uid_is_dynamic(id
))
548 p
= new0(UserEntry
, 1);
552 p
->name
= strdup(name
);
560 LIST_PREPEND(entries
, data
->entries
, p
);
565 static void systemd_endent(GetentData
*data
) {
570 while ((p
= data
->entries
))
573 data
->position
= NULL
;
576 static enum nss_status
nss_systemd_endent(GetentData
*p
) {
578 BLOCK_SIGNALS(NSS_SIGNALS_BLOCK
);
580 assert_se(pthread_mutex_lock(&p
->mutex
) == 0);
582 assert_se(pthread_mutex_unlock(&p
->mutex
) == 0);
584 return NSS_STATUS_SUCCESS
;
587 enum nss_status
_nss_systemd_endpwent(void) {
588 return nss_systemd_endent(&getpwent_data
);
591 enum nss_status
_nss_systemd_endgrent(void) {
592 return nss_systemd_endent(&getgrent_data
);
595 static int direct_enumeration(GetentData
*p
) {
596 _cleanup_closedir_
DIR *d
= NULL
;
602 d
= opendir("/run/systemd/dynamic-uid/");
606 FOREACH_DIRENT(de
, d
, return -errno
) {
607 _cleanup_free_
char *name
= NULL
;
610 if (!dirent_is_file(de
))
613 r
= parse_uid(de
->d_name
, &uid
);
617 r
= direct_lookup_uid(uid
, &name
);
623 r
= direct_lookup_name(name
, &verified
);
630 r
= user_entry_add(p
, name
, uid
);
640 static enum nss_status
systemd_setent(GetentData
*p
) {
641 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
642 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
* reply
= NULL
;
643 _cleanup_(sd_bus_flush_close_unrefp
) sd_bus
*bus
= NULL
;
649 BLOCK_SIGNALS(NSS_SIGNALS_BLOCK
);
653 assert_se(pthread_mutex_lock(&p
->mutex
) == 0);
657 if (getenv_bool_secure("SYSTEMD_NSS_DYNAMIC_BYPASS") > 0)
660 bypass
= getenv_bool_secure("SYSTEMD_NSS_BYPASS_BUS");
663 r
= sd_bus_open_system(&bus
);
669 r
= direct_enumeration(p
);
676 r
= sd_bus_call_method(bus
,
677 "org.freedesktop.systemd1",
678 "/org/freedesktop/systemd1",
679 "org.freedesktop.systemd1.Manager",
687 r
= sd_bus_message_enter_container(reply
, 'a', "(us)");
691 while ((r
= sd_bus_message_read(reply
, "(us)", &id
, &name
)) > 0) {
692 r
= user_entry_add(p
, name
, id
);
701 r
= sd_bus_message_exit_container(reply
);
706 p
->position
= p
->entries
;
707 assert_se(pthread_mutex_unlock(&p
->mutex
) == 0);
709 return NSS_STATUS_SUCCESS
;
713 assert_se(pthread_mutex_unlock(&p
->mutex
) == 0);
715 return NSS_STATUS_UNAVAIL
;
718 enum nss_status
_nss_systemd_setpwent(int stayopen
) {
719 return systemd_setent(&getpwent_data
);
722 enum nss_status
_nss_systemd_setgrent(int stayopen
) {
723 return systemd_setent(&getgrent_data
);
726 enum nss_status
_nss_systemd_getpwent_r(struct passwd
*result
, char *buffer
, size_t buflen
, int *errnop
) {
732 BLOCK_SIGNALS(NSS_SIGNALS_BLOCK
);
738 assert_se(pthread_mutex_lock(&getpwent_data
.mutex
) == 0);
740 LIST_FOREACH(entries
, p
, getpwent_data
.position
) {
741 len
= strlen(p
->name
) + 1;
744 ret
= NSS_STATUS_TRYAGAIN
;
748 memcpy(buffer
, p
->name
, len
);
750 result
->pw_name
= buffer
;
751 result
->pw_uid
= p
->id
;
752 result
->pw_gid
= p
->id
;
753 result
->pw_gecos
= (char*) DYNAMIC_USER_GECOS
;
754 result
->pw_passwd
= (char*) DYNAMIC_USER_PASSWD
;
755 result
->pw_dir
= (char*) DYNAMIC_USER_DIR
;
756 result
->pw_shell
= (char*) DYNAMIC_USER_SHELL
;
760 ret
= NSS_STATUS_NOTFOUND
;
764 /* On success, step to the next entry. */
766 ret
= NSS_STATUS_SUCCESS
;
769 /* Save position for the next call. */
770 getpwent_data
.position
= p
;
772 assert_se(pthread_mutex_unlock(&getpwent_data
.mutex
) == 0);
777 enum nss_status
_nss_systemd_getgrent_r(struct group
*result
, char *buffer
, size_t buflen
, int *errnop
) {
783 BLOCK_SIGNALS(NSS_SIGNALS_BLOCK
);
789 assert_se(pthread_mutex_lock(&getgrent_data
.mutex
) == 0);
791 LIST_FOREACH(entries
, p
, getgrent_data
.position
) {
792 len
= sizeof(char*) + strlen(p
->name
) + 1;
795 ret
= NSS_STATUS_TRYAGAIN
;
799 memzero(buffer
, sizeof(char*));
800 strcpy(buffer
+ sizeof(char*), p
->name
);
802 result
->gr_name
= buffer
+ sizeof(char*);
803 result
->gr_gid
= p
->id
;
804 result
->gr_passwd
= (char*) DYNAMIC_USER_PASSWD
;
805 result
->gr_mem
= (char**) buffer
;
809 ret
= NSS_STATUS_NOTFOUND
;
813 /* On success, step to the next entry. */
815 ret
= NSS_STATUS_SUCCESS
;
818 /* Save position for the next call. */
819 getgrent_data
.position
= p
;
821 assert_se(pthread_mutex_unlock(&getgrent_data
.mutex
) == 0);