176 lines
5.5 KiB
C
176 lines
5.5 KiB
C
/* SPDX-License-Identifier: LGPL-2.1+ */
|
|
/***
|
|
This file is part of systemd.
|
|
|
|
Copyright 2015 Lennart Poettering
|
|
|
|
systemd is free software; you can redistribute it and/or modify it
|
|
under the terms of the GNU Lesser General Public License as published by
|
|
the Free Software Foundation; either version 2.1 of the License, or
|
|
(at your option) any later version.
|
|
|
|
systemd is distributed in the hope that it will be useful, but
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
|
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
|
***/
|
|
|
|
#include <sched.h>
|
|
#include <sys/prctl.h>
|
|
#include <sys/stat.h>
|
|
#include <unistd.h>
|
|
|
|
#include "btrfs-util.h"
|
|
#include "capability-util.h"
|
|
#include "fd-util.h"
|
|
#include "import-common.h"
|
|
#include "process-util.h"
|
|
#include "signal-util.h"
|
|
#include "util.h"
|
|
|
|
int import_make_read_only_fd(int fd) {
|
|
int r;
|
|
|
|
assert(fd >= 0);
|
|
|
|
/* First, let's make this a read-only subvolume if it refers
|
|
* to a subvolume */
|
|
r = btrfs_subvol_set_read_only_fd(fd, true);
|
|
if (IN_SET(r, -ENOTTY, -ENOTDIR, -EINVAL)) {
|
|
struct stat st;
|
|
|
|
/* This doesn't refer to a subvolume, or the file
|
|
* system isn't even btrfs. In that, case fall back to
|
|
* chmod()ing */
|
|
|
|
r = fstat(fd, &st);
|
|
if (r < 0)
|
|
return log_error_errno(errno, "Failed to stat temporary image: %m");
|
|
|
|
/* Drop "w" flag */
|
|
if (fchmod(fd, st.st_mode & 07555) < 0)
|
|
return log_error_errno(errno, "Failed to chmod() final image: %m");
|
|
|
|
return 0;
|
|
|
|
} else if (r < 0)
|
|
return log_error_errno(r, "Failed to make subvolume read-only: %m");
|
|
|
|
return 0;
|
|
}
|
|
|
|
int import_make_read_only(const char *path) {
|
|
_cleanup_close_ int fd = 1;
|
|
|
|
fd = open(path, O_RDONLY|O_NOCTTY|O_CLOEXEC);
|
|
if (fd < 0)
|
|
return log_error_errno(errno, "Failed to open %s: %m", path);
|
|
|
|
return import_make_read_only_fd(fd);
|
|
}
|
|
|
|
int import_fork_tar_x(const char *path, pid_t *ret) {
|
|
_cleanup_close_pair_ int pipefd[2] = { -1, -1 };
|
|
pid_t pid;
|
|
int r;
|
|
|
|
assert(path);
|
|
assert(ret);
|
|
|
|
if (pipe2(pipefd, O_CLOEXEC) < 0)
|
|
return log_error_errno(errno, "Failed to create pipe for tar: %m");
|
|
|
|
r = safe_fork("(tar)", FORK_RESET_SIGNALS|FORK_DEATHSIG|FORK_LOG, &pid);
|
|
if (r < 0)
|
|
return r;
|
|
if (r == 0) {
|
|
uint64_t retain =
|
|
(1ULL << CAP_CHOWN) |
|
|
(1ULL << CAP_FOWNER) |
|
|
(1ULL << CAP_FSETID) |
|
|
(1ULL << CAP_MKNOD) |
|
|
(1ULL << CAP_SETFCAP) |
|
|
(1ULL << CAP_DAC_OVERRIDE);
|
|
|
|
/* Child */
|
|
|
|
pipefd[1] = safe_close(pipefd[1]);
|
|
|
|
r = rearrange_stdio(pipefd[0], -1, STDERR_FILENO);
|
|
if (r < 0) {
|
|
log_error_errno(r, "Failed to rearrange stdin/stdout: %m");
|
|
_exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (unshare(CLONE_NEWNET) < 0)
|
|
log_error_errno(errno, "Failed to lock tar into network namespace, ignoring: %m");
|
|
|
|
r = capability_bounding_set_drop(retain, true);
|
|
if (r < 0)
|
|
log_error_errno(r, "Failed to drop capabilities, ignoring: %m");
|
|
|
|
execlp("tar", "tar", "--numeric-owner", "-C", path, "-px", "--xattrs", "--xattrs-include=*", NULL);
|
|
log_error_errno(errno, "Failed to execute tar: %m");
|
|
_exit(EXIT_FAILURE);
|
|
}
|
|
|
|
pipefd[0] = safe_close(pipefd[0]);
|
|
r = pipefd[1];
|
|
pipefd[1] = -1;
|
|
|
|
*ret = pid;
|
|
|
|
return r;
|
|
}
|
|
|
|
int import_fork_tar_c(const char *path, pid_t *ret) {
|
|
_cleanup_close_pair_ int pipefd[2] = { -1, -1 };
|
|
pid_t pid;
|
|
int r;
|
|
|
|
assert(path);
|
|
assert(ret);
|
|
|
|
if (pipe2(pipefd, O_CLOEXEC) < 0)
|
|
return log_error_errno(errno, "Failed to create pipe for tar: %m");
|
|
|
|
r = safe_fork("(tar)", FORK_RESET_SIGNALS|FORK_DEATHSIG|FORK_LOG, &pid);
|
|
if (r < 0)
|
|
return r;
|
|
if (r == 0) {
|
|
uint64_t retain = (1ULL << CAP_DAC_OVERRIDE);
|
|
|
|
/* Child */
|
|
|
|
pipefd[0] = safe_close(pipefd[0]);
|
|
|
|
r = rearrange_stdio(-1, pipefd[1], STDERR_FILENO);
|
|
if (r < 0) {
|
|
log_error_errno(r, "Failed to rearrange stdin/stdout: %m");
|
|
_exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (unshare(CLONE_NEWNET) < 0)
|
|
log_error_errno(errno, "Failed to lock tar into network namespace, ignoring: %m");
|
|
|
|
r = capability_bounding_set_drop(retain, true);
|
|
if (r < 0)
|
|
log_error_errno(r, "Failed to drop capabilities, ignoring: %m");
|
|
|
|
execlp("tar", "tar", "-C", path, "-c", "--xattrs", "--xattrs-include=*", ".", NULL);
|
|
log_error_errno(errno, "Failed to execute tar: %m");
|
|
_exit(EXIT_FAILURE);
|
|
}
|
|
|
|
pipefd[1] = safe_close(pipefd[1]);
|
|
r = pipefd[0];
|
|
pipefd[0] = -1;
|
|
|
|
*ret = pid;
|
|
|
|
return r;
|
|
}
|