File: | build-scan/../src/machine/machine-dbus.c |
Warning: | line 1172, column 17 Value stored to 'hostfd' is never read |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | /* SPDX-License-Identifier: LGPL-2.1+ */ |
2 | |
3 | #include <errno(*__errno_location ()).h> |
4 | #include <string.h> |
5 | #include <sys/mount.h> |
6 | #include <sys/wait.h> |
7 | |
8 | /* When we include libgen.h because we need dirname() we immediately |
9 | * undefine basename() since libgen.h defines it as a macro to the POSIX |
10 | * version which is really broken. We prefer GNU basename(). */ |
11 | #include <libgen.h> |
12 | #undef basename |
13 | |
14 | #include "alloc-util.h" |
15 | #include "bus-common-errors.h" |
16 | #include "bus-internal.h" |
17 | #include "bus-label.h" |
18 | #include "bus-util.h" |
19 | #include "copy.h" |
20 | #include "env-util.h" |
21 | #include "fd-util.h" |
22 | #include "fileio.h" |
23 | #include "format-util.h" |
24 | #include "fs-util.h" |
25 | #include "in-addr-util.h" |
26 | #include "local-addresses.h" |
27 | #include "machine-dbus.h" |
28 | #include "machine.h" |
29 | #include "mkdir.h" |
30 | #include "os-util.h" |
31 | #include "path-util.h" |
32 | #include "process-util.h" |
33 | #include "signal-util.h" |
34 | #include "strv.h" |
35 | #include "terminal-util.h" |
36 | #include "user-util.h" |
37 | |
38 | static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_class, machine_class, MachineClass)int property_get_class(sd_bus *bus, const char *path, const char *interface, const char *property, sd_bus_message *reply, void *userdata, sd_bus_error *error) { MachineClass *data = userdata ; do { if ((__builtin_expect(!!(!(bus)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("bus"), "../src/machine/machine-dbus.c", 38, __PRETTY_FUNCTION__); } while (0); do { if ((__builtin_expect (!!(!(reply)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("reply"), "../src/machine/machine-dbus.c", 38, __PRETTY_FUNCTION__ ); } while (0); do { if ((__builtin_expect(!!(!(data)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("data"), "../src/machine/machine-dbus.c" , 38, __PRETTY_FUNCTION__); } while (0); return sd_bus_message_append (reply, "s", machine_class_to_string((*(data)))); }; |
39 | static BUS_DEFINE_PROPERTY_GET2(property_get_state, "s", Machine, machine_get_state, machine_state_to_string)int property_get_state(sd_bus *bus, const char *path, const char *interface, const char *property, sd_bus_message *reply, void *userdata, sd_bus_error *error) { Machine *data = userdata; do { if ((__builtin_expect(!!(!(bus)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("bus"), "../src/machine/machine-dbus.c", 39, __PRETTY_FUNCTION__); } while (0); do { if ((__builtin_expect (!!(!(reply)),0))) log_assert_failed_realm(LOG_REALM_SYSTEMD, ("reply"), "../src/machine/machine-dbus.c", 39, __PRETTY_FUNCTION__ ); } while (0); do { if ((__builtin_expect(!!(!(data)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("data"), "../src/machine/machine-dbus.c" , 39, __PRETTY_FUNCTION__); } while (0); return sd_bus_message_append (reply, "s", machine_state_to_string(machine_get_state(data)) ); }; |
40 | |
41 | static int property_get_netif( |
42 | sd_bus *bus, |
43 | const char *path, |
44 | const char *interface, |
45 | const char *property, |
46 | sd_bus_message *reply, |
47 | void *userdata, |
48 | sd_bus_error *error) { |
49 | |
50 | Machine *m = userdata; |
51 | |
52 | assert(bus)do { if ((__builtin_expect(!!(!(bus)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("bus"), "../src/machine/machine-dbus.c", 52, __PRETTY_FUNCTION__); } while (0); |
53 | assert(reply)do { if ((__builtin_expect(!!(!(reply)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("reply"), "../src/machine/machine-dbus.c" , 53, __PRETTY_FUNCTION__); } while (0); |
54 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/machine/machine-dbus.c", 54 , __PRETTY_FUNCTION__); } while (0); |
55 | |
56 | assert_cc(sizeof(int) == sizeof(int32_t))GCC diagnostic push
; GCC diagnostic ignored "-Wdeclaration-after-statement" ; struct _assert_struct_13 { char x[(sizeof(int) == sizeof(int32_t )) ? 0 : -1]; }; GCC diagnostic pop ; |
57 | |
58 | return sd_bus_message_append_array(reply, 'i', m->netif, m->n_netif * sizeof(int)); |
59 | } |
60 | |
61 | int bus_machine_method_terminate(sd_bus_message *message, void *userdata, sd_bus_error *error) { |
62 | Machine *m = userdata; |
63 | int r; |
64 | |
65 | assert(message)do { if ((__builtin_expect(!!(!(message)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("message"), "../src/machine/machine-dbus.c" , 65, __PRETTY_FUNCTION__); } while (0); |
66 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/machine/machine-dbus.c", 66 , __PRETTY_FUNCTION__); } while (0); |
67 | |
68 | r = bus_verify_polkit_async( |
69 | message, |
70 | CAP_KILL5, |
71 | "org.freedesktop.machine1.manage-machines", |
72 | NULL((void*)0), |
73 | false0, |
74 | UID_INVALID((uid_t) -1), |
75 | &m->manager->polkit_registry, |
76 | error); |
77 | if (r < 0) |
78 | return r; |
79 | if (r == 0) |
80 | return 1; /* Will call us back */ |
81 | |
82 | r = machine_stop(m); |
83 | if (r < 0) |
84 | return r; |
85 | |
86 | return sd_bus_reply_method_return(message, NULL((void*)0)); |
87 | } |
88 | |
89 | int bus_machine_method_kill(sd_bus_message *message, void *userdata, sd_bus_error *error) { |
90 | Machine *m = userdata; |
91 | const char *swho; |
92 | int32_t signo; |
93 | KillWho who; |
94 | int r; |
95 | |
96 | assert(message)do { if ((__builtin_expect(!!(!(message)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("message"), "../src/machine/machine-dbus.c" , 96, __PRETTY_FUNCTION__); } while (0); |
97 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/machine/machine-dbus.c", 97 , __PRETTY_FUNCTION__); } while (0); |
98 | |
99 | r = sd_bus_message_read(message, "si", &swho, &signo); |
100 | if (r < 0) |
101 | return r; |
102 | |
103 | if (isempty(swho)) |
104 | who = KILL_ALL; |
105 | else { |
106 | who = kill_who_from_string(swho); |
107 | if (who < 0) |
108 | return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS"org.freedesktop.DBus.Error.InvalidArgs", "Invalid kill parameter '%s'", swho); |
109 | } |
110 | |
111 | if (!SIGNAL_VALID(signo)) |
112 | return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS"org.freedesktop.DBus.Error.InvalidArgs", "Invalid signal %i", signo); |
113 | |
114 | r = bus_verify_polkit_async( |
115 | message, |
116 | CAP_KILL5, |
117 | "org.freedesktop.machine1.manage-machines", |
118 | NULL((void*)0), |
119 | false0, |
120 | UID_INVALID((uid_t) -1), |
121 | &m->manager->polkit_registry, |
122 | error); |
123 | if (r < 0) |
124 | return r; |
125 | if (r == 0) |
126 | return 1; /* Will call us back */ |
127 | |
128 | r = machine_kill(m, who, signo); |
129 | if (r < 0) |
130 | return r; |
131 | |
132 | return sd_bus_reply_method_return(message, NULL((void*)0)); |
133 | } |
134 | |
135 | int bus_machine_method_get_addresses(sd_bus_message *message, void *userdata, sd_bus_error *error) { |
136 | _cleanup_(sd_bus_message_unrefp)__attribute__((cleanup(sd_bus_message_unrefp))) sd_bus_message *reply = NULL((void*)0); |
137 | Machine *m = userdata; |
138 | int r; |
139 | |
140 | assert(message)do { if ((__builtin_expect(!!(!(message)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("message"), "../src/machine/machine-dbus.c" , 140, __PRETTY_FUNCTION__); } while (0); |
141 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/machine/machine-dbus.c", 141 , __PRETTY_FUNCTION__); } while (0); |
142 | |
143 | r = sd_bus_message_new_method_return(message, &reply); |
144 | if (r < 0) |
145 | return r; |
146 | |
147 | r = sd_bus_message_open_container(reply, 'a', "(iay)"); |
148 | if (r < 0) |
149 | return r; |
150 | |
151 | switch (m->class) { |
152 | |
153 | case MACHINE_HOST: { |
154 | _cleanup_free___attribute__((cleanup(freep))) struct local_address *addresses = NULL((void*)0); |
155 | struct local_address *a; |
156 | int n, i; |
157 | |
158 | n = local_addresses(NULL((void*)0), 0, AF_UNSPEC0, &addresses); |
159 | if (n < 0) |
160 | return n; |
161 | |
162 | for (a = addresses, i = 0; i < n; a++, i++) { |
163 | |
164 | r = sd_bus_message_open_container(reply, 'r', "iay"); |
165 | if (r < 0) |
166 | return r; |
167 | |
168 | r = sd_bus_message_append(reply, "i", addresses[i].family); |
169 | if (r < 0) |
170 | return r; |
171 | |
172 | r = sd_bus_message_append_array(reply, 'y', &addresses[i].address, FAMILY_ADDRESS_SIZE(addresses[i].family)); |
173 | if (r < 0) |
174 | return r; |
175 | |
176 | r = sd_bus_message_close_container(reply); |
177 | if (r < 0) |
178 | return r; |
179 | } |
180 | |
181 | break; |
182 | } |
183 | |
184 | case MACHINE_CONTAINER: { |
185 | _cleanup_close_pair___attribute__((cleanup(close_pairp))) int pair[2] = { -1, -1 }; |
186 | _cleanup_free___attribute__((cleanup(freep))) char *us = NULL((void*)0), *them = NULL((void*)0); |
187 | _cleanup_close___attribute__((cleanup(closep))) int netns_fd = -1; |
188 | const char *p; |
189 | pid_t child; |
190 | |
191 | r = readlink_malloc("/proc/self/ns/net", &us); |
192 | if (r < 0) |
193 | return r; |
194 | |
195 | p = procfs_file_alloca(m->leader, "ns/net")({ pid_t _pid_ = (m->leader); const char *_r_; if (_pid_ == 0) { _r_ = ("/proc/self/" "ns/net"); } else { _r_ = __builtin_alloca ((sizeof("""/proc/""") - 1) + (2+(sizeof(pid_t) <= 1 ? 3 : sizeof(pid_t) <= 2 ? 5 : sizeof(pid_t) <= 4 ? 10 : sizeof (pid_t) <= 8 ? 20 : sizeof(int[-2*(sizeof(pid_t) > 8)]) )) + 1 + sizeof("ns/net")); sprintf((char*) _r_, "/proc/""%" "i" "/" "ns/net", _pid_); } _r_; }); |
196 | r = readlink_malloc(p, &them); |
197 | if (r < 0) |
198 | return r; |
199 | |
200 | if (streq(us, them)(strcmp((us),(them)) == 0)) |
201 | return sd_bus_error_setf(error, BUS_ERROR_NO_PRIVATE_NETWORKING"org.freedesktop.machine1.NoPrivateNetworking", "Machine %s does not use private networking", m->name); |
202 | |
203 | r = namespace_open(m->leader, NULL((void*)0), NULL((void*)0), &netns_fd, NULL((void*)0), NULL((void*)0)); |
204 | if (r < 0) |
205 | return r; |
206 | |
207 | if (socketpair(AF_UNIX1, SOCK_SEQPACKETSOCK_SEQPACKET, 0, pair) < 0) |
208 | return -errno(*__errno_location ()); |
209 | |
210 | r = safe_fork("(sd-addr)", FORK_RESET_SIGNALS|FORK_DEATHSIG, &child); |
211 | if (r < 0) |
212 | return sd_bus_error_set_errnof(error, r, "Failed to fork(): %m"); |
213 | if (r == 0) { |
214 | _cleanup_free___attribute__((cleanup(freep))) struct local_address *addresses = NULL((void*)0); |
215 | struct local_address *a; |
216 | int i, n; |
217 | |
218 | pair[0] = safe_close(pair[0]); |
219 | |
220 | r = namespace_enter(-1, -1, netns_fd, -1, -1); |
221 | if (r < 0) |
222 | _exit(EXIT_FAILURE1); |
223 | |
224 | n = local_addresses(NULL((void*)0), 0, AF_UNSPEC0, &addresses); |
225 | if (n < 0) |
226 | _exit(EXIT_FAILURE1); |
227 | |
228 | for (a = addresses, i = 0; i < n; a++, i++) { |
229 | struct iovec iov[2] = { |
230 | { .iov_base = &a->family, .iov_len = sizeof(a->family) }, |
231 | { .iov_base = &a->address, .iov_len = FAMILY_ADDRESS_SIZE(a->family) }, |
232 | }; |
233 | |
234 | r = writev(pair[1], iov, 2); |
235 | if (r < 0) |
236 | _exit(EXIT_FAILURE1); |
237 | } |
238 | |
239 | pair[1] = safe_close(pair[1]); |
240 | |
241 | _exit(EXIT_SUCCESS0); |
242 | } |
243 | |
244 | pair[1] = safe_close(pair[1]); |
245 | |
246 | for (;;) { |
247 | int family; |
248 | ssize_t n; |
249 | union in_addr_union in_addr; |
250 | struct iovec iov[2]; |
251 | struct msghdr mh = { |
252 | .msg_iov = iov, |
253 | .msg_iovlen = 2, |
254 | }; |
255 | |
256 | iov[0] = (struct iovec) { .iov_base = &family, .iov_len = sizeof(family) }; |
257 | iov[1] = (struct iovec) { .iov_base = &in_addr, .iov_len = sizeof(in_addr) }; |
258 | |
259 | n = recvmsg(pair[0], &mh, 0); |
260 | if (n < 0) |
261 | return -errno(*__errno_location ()); |
262 | if ((size_t) n < sizeof(family)) |
263 | break; |
264 | |
265 | r = sd_bus_message_open_container(reply, 'r', "iay"); |
266 | if (r < 0) |
267 | return r; |
268 | |
269 | r = sd_bus_message_append(reply, "i", family); |
270 | if (r < 0) |
271 | return r; |
272 | |
273 | switch (family) { |
274 | |
275 | case AF_INET2: |
276 | if (n != sizeof(struct in_addr) + sizeof(family)) |
277 | return -EIO5; |
278 | |
279 | r = sd_bus_message_append_array(reply, 'y', &in_addr.in, sizeof(in_addr.in)); |
280 | break; |
281 | |
282 | case AF_INET610: |
283 | if (n != sizeof(struct in6_addr) + sizeof(family)) |
284 | return -EIO5; |
285 | |
286 | r = sd_bus_message_append_array(reply, 'y', &in_addr.in6, sizeof(in_addr.in6)); |
287 | break; |
288 | } |
289 | if (r < 0) |
290 | return r; |
291 | |
292 | r = sd_bus_message_close_container(reply); |
293 | if (r < 0) |
294 | return r; |
295 | } |
296 | |
297 | r = wait_for_terminate_and_check("(sd-addr)", child, 0); |
298 | if (r < 0) |
299 | return sd_bus_error_set_errnof(error, r, "Failed to wait for child: %m"); |
300 | if (r != EXIT_SUCCESS0) |
301 | return sd_bus_error_setf(error, SD_BUS_ERROR_FAILED"org.freedesktop.DBus.Error.Failed", "Child died abnormally."); |
302 | break; |
303 | } |
304 | |
305 | default: |
306 | return sd_bus_error_setf(error, SD_BUS_ERROR_NOT_SUPPORTED"org.freedesktop.DBus.Error.NotSupported", "Requesting IP address data is only supported on container machines."); |
307 | } |
308 | |
309 | r = sd_bus_message_close_container(reply); |
310 | if (r < 0) |
311 | return r; |
312 | |
313 | return sd_bus_send(NULL((void*)0), reply, NULL((void*)0)); |
314 | } |
315 | |
316 | #define EXIT_NOT_FOUND2 2 |
317 | |
318 | int bus_machine_method_get_os_release(sd_bus_message *message, void *userdata, sd_bus_error *error) { |
319 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **l = NULL((void*)0); |
320 | Machine *m = userdata; |
321 | int r; |
322 | |
323 | assert(message)do { if ((__builtin_expect(!!(!(message)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("message"), "../src/machine/machine-dbus.c" , 323, __PRETTY_FUNCTION__); } while (0); |
324 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/machine/machine-dbus.c", 324 , __PRETTY_FUNCTION__); } while (0); |
325 | |
326 | switch (m->class) { |
327 | |
328 | case MACHINE_HOST: |
329 | r = load_os_release_pairs(NULL((void*)0), &l); |
330 | if (r < 0) |
331 | return r; |
332 | |
333 | break; |
334 | |
335 | case MACHINE_CONTAINER: { |
336 | _cleanup_close___attribute__((cleanup(closep))) int mntns_fd = -1, root_fd = -1; |
337 | _cleanup_close_pair___attribute__((cleanup(close_pairp))) int pair[2] = { -1, -1 }; |
338 | _cleanup_fclose___attribute__((cleanup(fclosep))) FILE *f = NULL((void*)0); |
339 | pid_t child; |
340 | |
341 | r = namespace_open(m->leader, NULL((void*)0), &mntns_fd, NULL((void*)0), NULL((void*)0), &root_fd); |
342 | if (r < 0) |
343 | return r; |
344 | |
345 | if (socketpair(AF_UNIX1, SOCK_SEQPACKETSOCK_SEQPACKET, 0, pair) < 0) |
346 | return -errno(*__errno_location ()); |
347 | |
348 | r = safe_fork("(sd-osrel)", FORK_RESET_SIGNALS|FORK_DEATHSIG, &child); |
349 | if (r < 0) |
350 | return sd_bus_error_set_errnof(error, r, "Failed to fork(): %m"); |
351 | if (r == 0) { |
352 | int fd = -1; |
353 | |
354 | pair[0] = safe_close(pair[0]); |
355 | |
356 | r = namespace_enter(-1, mntns_fd, -1, -1, root_fd); |
357 | if (r < 0) |
358 | _exit(EXIT_FAILURE1); |
359 | |
360 | r = open_os_release(NULL((void*)0), NULL((void*)0), &fd); |
361 | if (r == -ENOENT2) |
362 | _exit(EXIT_NOT_FOUND2); |
363 | if (r < 0) |
364 | _exit(EXIT_FAILURE1); |
365 | |
366 | r = copy_bytes(fd, pair[1], (uint64_t) -1, 0); |
367 | if (r < 0) |
368 | _exit(EXIT_FAILURE1); |
369 | |
370 | _exit(EXIT_SUCCESS0); |
371 | } |
372 | |
373 | pair[1] = safe_close(pair[1]); |
374 | |
375 | f = fdopen(pair[0], "re"); |
376 | if (!f) |
377 | return -errno(*__errno_location ()); |
378 | |
379 | pair[0] = -1; |
380 | |
381 | r = load_env_file_pairs(f, "/etc/os-release", NULL((void*)0), &l); |
382 | if (r < 0) |
383 | return r; |
384 | |
385 | r = wait_for_terminate_and_check("(sd-osrel)", child, 0); |
386 | if (r < 0) |
387 | return sd_bus_error_set_errnof(error, r, "Failed to wait for child: %m"); |
388 | if (r == EXIT_NOT_FOUND2) |
389 | return sd_bus_error_setf(error, SD_BUS_ERROR_FAILED"org.freedesktop.DBus.Error.Failed", "Machine does not contain OS release information"); |
390 | if (r != EXIT_SUCCESS0) |
391 | return sd_bus_error_setf(error, SD_BUS_ERROR_FAILED"org.freedesktop.DBus.Error.Failed", "Child died abnormally."); |
392 | |
393 | break; |
394 | } |
395 | |
396 | default: |
397 | return sd_bus_error_setf(error, SD_BUS_ERROR_NOT_SUPPORTED"org.freedesktop.DBus.Error.NotSupported", "Requesting OS release data is only supported on container machines."); |
398 | } |
399 | |
400 | return bus_reply_pair_array(message, l); |
401 | } |
402 | |
403 | int bus_machine_method_open_pty(sd_bus_message *message, void *userdata, sd_bus_error *error) { |
404 | _cleanup_(sd_bus_message_unrefp)__attribute__((cleanup(sd_bus_message_unrefp))) sd_bus_message *reply = NULL((void*)0); |
405 | _cleanup_free___attribute__((cleanup(freep))) char *pty_name = NULL((void*)0); |
406 | _cleanup_close___attribute__((cleanup(closep))) int master = -1; |
407 | Machine *m = userdata; |
408 | int r; |
409 | |
410 | assert(message)do { if ((__builtin_expect(!!(!(message)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("message"), "../src/machine/machine-dbus.c" , 410, __PRETTY_FUNCTION__); } while (0); |
411 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/machine/machine-dbus.c", 411 , __PRETTY_FUNCTION__); } while (0); |
412 | |
413 | r = bus_verify_polkit_async( |
414 | message, |
415 | CAP_SYS_ADMIN21, |
416 | m->class == MACHINE_HOST ? "org.freedesktop.machine1.host-open-pty" : "org.freedesktop.machine1.open-pty", |
417 | NULL((void*)0), |
418 | false0, |
419 | UID_INVALID((uid_t) -1), |
420 | &m->manager->polkit_registry, |
421 | error); |
422 | if (r < 0) |
423 | return r; |
424 | if (r == 0) |
425 | return 1; /* Will call us back */ |
426 | |
427 | master = machine_openpt(m, O_RDWR02|O_NOCTTY0400|O_CLOEXEC02000000); |
428 | if (master < 0) |
429 | return master; |
430 | |
431 | r = ptsname_namespace(master, &pty_name); |
432 | if (r < 0) |
433 | return r; |
434 | |
435 | r = sd_bus_message_new_method_return(message, &reply); |
436 | if (r < 0) |
437 | return r; |
438 | |
439 | r = sd_bus_message_append(reply, "hs", master, pty_name); |
440 | if (r < 0) |
441 | return r; |
442 | |
443 | return sd_bus_send(NULL((void*)0), reply, NULL((void*)0)); |
444 | } |
445 | |
446 | static int container_bus_new(Machine *m, sd_bus_error *error, sd_bus **ret) { |
447 | int r; |
448 | |
449 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/machine/machine-dbus.c", 449 , __PRETTY_FUNCTION__); } while (0); |
450 | assert(ret)do { if ((__builtin_expect(!!(!(ret)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("ret"), "../src/machine/machine-dbus.c", 450, __PRETTY_FUNCTION__); } while (0); |
451 | |
452 | switch (m->class) { |
453 | |
454 | case MACHINE_HOST: |
455 | *ret = NULL((void*)0); |
456 | break; |
457 | |
458 | case MACHINE_CONTAINER: { |
459 | _cleanup_(sd_bus_unrefp)__attribute__((cleanup(sd_bus_unrefp))) sd_bus *bus = NULL((void*)0); |
460 | char *address; |
461 | |
462 | r = sd_bus_new(&bus); |
463 | if (r < 0) |
464 | return r; |
465 | |
466 | if (asprintf(&address, "x-machine-kernel:pid=%1$" PID_PRI"i" ";x-machine-unix:pid=%1$" PID_PRI"i", m->leader) < 0) |
467 | return -ENOMEM12; |
468 | |
469 | bus->address = address; |
470 | bus->bus_client = true1; |
471 | bus->trusted = false0; |
472 | bus->is_system = true1; |
473 | |
474 | r = sd_bus_start(bus); |
475 | if (r == -ENOENT2) |
476 | return sd_bus_error_set_errnof(error, r, "There is no system bus in container %s.", m->name); |
477 | if (r < 0) |
478 | return r; |
479 | |
480 | *ret = TAKE_PTR(bus)({ typeof(bus) _ptr_ = (bus); (bus) = ((void*)0); _ptr_; }); |
481 | break; |
482 | } |
483 | |
484 | default: |
485 | return -EOPNOTSUPP95; |
486 | } |
487 | |
488 | return 0; |
489 | } |
490 | |
491 | int bus_machine_method_open_login(sd_bus_message *message, void *userdata, sd_bus_error *error) { |
492 | _cleanup_(sd_bus_message_unrefp)__attribute__((cleanup(sd_bus_message_unrefp))) sd_bus_message *reply = NULL((void*)0); |
493 | _cleanup_free___attribute__((cleanup(freep))) char *pty_name = NULL((void*)0); |
494 | _cleanup_(sd_bus_flush_close_unrefp)__attribute__((cleanup(sd_bus_flush_close_unrefp))) sd_bus *allocated_bus = NULL((void*)0); |
495 | _cleanup_close___attribute__((cleanup(closep))) int master = -1; |
496 | sd_bus *container_bus = NULL((void*)0); |
497 | Machine *m = userdata; |
498 | const char *p, *getty; |
499 | int r; |
500 | |
501 | assert(message)do { if ((__builtin_expect(!!(!(message)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("message"), "../src/machine/machine-dbus.c" , 501, __PRETTY_FUNCTION__); } while (0); |
502 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/machine/machine-dbus.c", 502 , __PRETTY_FUNCTION__); } while (0); |
503 | |
504 | r = bus_verify_polkit_async( |
505 | message, |
506 | CAP_SYS_ADMIN21, |
507 | m->class == MACHINE_HOST ? "org.freedesktop.machine1.host-login" : "org.freedesktop.machine1.login", |
508 | NULL((void*)0), |
509 | false0, |
510 | UID_INVALID((uid_t) -1), |
511 | &m->manager->polkit_registry, |
512 | error); |
513 | if (r < 0) |
514 | return r; |
515 | if (r == 0) |
516 | return 1; /* Will call us back */ |
517 | |
518 | master = machine_openpt(m, O_RDWR02|O_NOCTTY0400|O_CLOEXEC02000000); |
519 | if (master < 0) |
520 | return master; |
521 | |
522 | r = ptsname_namespace(master, &pty_name); |
523 | if (r < 0) |
524 | return r; |
525 | |
526 | p = path_startswith(pty_name, "/dev/pts/"); |
527 | if (!p) |
528 | return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS"org.freedesktop.DBus.Error.InvalidArgs", "PTS name %s is invalid", pty_name); |
529 | |
530 | r = container_bus_new(m, error, &allocated_bus); |
531 | if (r < 0) |
532 | return r; |
533 | |
534 | container_bus = allocated_bus ?: m->manager->bus; |
535 | |
536 | getty = strjoina("container-getty@", p, ".service")({ const char *_appendees_[] = { "container-getty@", p, ".service" }; char *_d_, *_p_; size_t _len_ = 0; size_t _i_; for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(_appendees_), typeof(&*(_appendees_))), sizeof(_appendees_ )/sizeof((_appendees_)[0]), ((void)0))) && _appendees_ [_i_]; _i_++) _len_ += strlen(_appendees_[_i_]); _p_ = _d_ = __builtin_alloca (_len_ + 1); for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(_appendees_), typeof(& *(_appendees_))), sizeof(_appendees_)/sizeof((_appendees_)[0] ), ((void)0))) && _appendees_[_i_]; _i_++) _p_ = stpcpy (_p_, _appendees_[_i_]); *_p_ = 0; _d_; }); |
537 | |
538 | r = sd_bus_call_method( |
539 | container_bus, |
540 | "org.freedesktop.systemd1", |
541 | "/org/freedesktop/systemd1", |
542 | "org.freedesktop.systemd1.Manager", |
543 | "StartUnit", |
544 | error, NULL((void*)0), |
545 | "ss", getty, "replace"); |
546 | if (r < 0) |
547 | return r; |
548 | |
549 | r = sd_bus_message_new_method_return(message, &reply); |
550 | if (r < 0) |
551 | return r; |
552 | |
553 | r = sd_bus_message_append(reply, "hs", master, pty_name); |
554 | if (r < 0) |
555 | return r; |
556 | |
557 | return sd_bus_send(NULL((void*)0), reply, NULL((void*)0)); |
558 | } |
559 | |
560 | int bus_machine_method_open_shell(sd_bus_message *message, void *userdata, sd_bus_error *error) { |
561 | _cleanup_(sd_bus_message_unrefp)__attribute__((cleanup(sd_bus_message_unrefp))) sd_bus_message *reply = NULL((void*)0), *tm = NULL((void*)0); |
562 | _cleanup_free___attribute__((cleanup(freep))) char *pty_name = NULL((void*)0); |
563 | _cleanup_(sd_bus_flush_close_unrefp)__attribute__((cleanup(sd_bus_flush_close_unrefp))) sd_bus *allocated_bus = NULL((void*)0); |
564 | sd_bus *container_bus = NULL((void*)0); |
565 | _cleanup_close___attribute__((cleanup(closep))) int master = -1, slave = -1; |
566 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **env = NULL((void*)0), **args_wire = NULL((void*)0), **args = NULL((void*)0); |
567 | Machine *m = userdata; |
568 | const char *p, *unit, *user, *path, *description, *utmp_id; |
569 | int r; |
570 | |
571 | assert(message)do { if ((__builtin_expect(!!(!(message)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("message"), "../src/machine/machine-dbus.c" , 571, __PRETTY_FUNCTION__); } while (0); |
572 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/machine/machine-dbus.c", 572 , __PRETTY_FUNCTION__); } while (0); |
573 | |
574 | r = sd_bus_message_read(message, "ss", &user, &path); |
575 | if (r < 0) |
576 | return r; |
577 | user = empty_to_null(user); |
578 | r = sd_bus_message_read_strv(message, &args_wire); |
579 | if (r < 0) |
580 | return r; |
581 | if (isempty(path)) { |
582 | path = "/bin/sh"; |
583 | |
584 | args = new0(char*, 3 + 1)((char**) calloc((3 + 1), sizeof(char*))); |
585 | if (!args) |
586 | return -ENOMEM12; |
587 | args[0] = strdup("sh"); |
588 | if (!args[0]) |
589 | return -ENOMEM12; |
590 | args[1] = strdup("-c"); |
591 | if (!args[1]) |
592 | return -ENOMEM12; |
593 | r = asprintf(&args[2], |
594 | "shell=$(getent passwd %s 2>/dev/null | { IFS=: read _ _ _ _ _ _ x; echo \"$x\"; })\n"\ |
595 | "exec \"${shell:-/bin/sh}\" -l", /* -l is means --login */ |
596 | isempty(user) ? "root" : user); |
597 | if (r < 0) { |
598 | args[2] = NULL((void*)0); |
599 | return -ENOMEM12; |
600 | } |
601 | } else { |
602 | if (!path_is_absolute(path)) |
603 | return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS"org.freedesktop.DBus.Error.InvalidArgs", "Specified path '%s' is not absolute", path); |
604 | args = TAKE_PTR(args_wire)({ typeof(args_wire) _ptr_ = (args_wire); (args_wire) = ((void *)0); _ptr_; }); |
605 | if (strv_isempty(args)) { |
606 | args = strv_free(args); |
607 | |
608 | args = strv_new(path, NULL((void*)0)); |
609 | if (!args) |
610 | return -ENOMEM12; |
611 | } |
612 | } |
613 | |
614 | r = sd_bus_message_read_strv(message, &env); |
615 | if (r < 0) |
616 | return r; |
617 | if (!strv_env_is_valid(env)) |
618 | return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS"org.freedesktop.DBus.Error.InvalidArgs", "Invalid environment assignments"); |
619 | |
620 | r = bus_verify_polkit_async( |
621 | message, |
622 | CAP_SYS_ADMIN21, |
623 | m->class == MACHINE_HOST ? "org.freedesktop.machine1.host-shell" : "org.freedesktop.machine1.shell", |
624 | NULL((void*)0), |
625 | false0, |
626 | UID_INVALID((uid_t) -1), |
627 | &m->manager->polkit_registry, |
628 | error); |
629 | if (r < 0) |
630 | return r; |
631 | if (r == 0) |
632 | return 1; /* Will call us back */ |
633 | |
634 | master = machine_openpt(m, O_RDWR02|O_NOCTTY0400|O_CLOEXEC02000000); |
635 | if (master < 0) |
636 | return master; |
637 | |
638 | r = ptsname_namespace(master, &pty_name); |
639 | if (r < 0) |
640 | return r; |
641 | |
642 | p = path_startswith(pty_name, "/dev/pts/"); |
643 | assert(p)do { if ((__builtin_expect(!!(!(p)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("p"), "../src/machine/machine-dbus.c", 643 , __PRETTY_FUNCTION__); } while (0); |
644 | |
645 | slave = machine_open_terminal(m, pty_name, O_RDWR02|O_NOCTTY0400|O_CLOEXEC02000000); |
646 | if (slave < 0) |
647 | return slave; |
648 | |
649 | utmp_id = path_startswith(pty_name, "/dev/"); |
650 | assert(utmp_id)do { if ((__builtin_expect(!!(!(utmp_id)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("utmp_id"), "../src/machine/machine-dbus.c" , 650, __PRETTY_FUNCTION__); } while (0); |
651 | |
652 | r = container_bus_new(m, error, &allocated_bus); |
653 | if (r < 0) |
654 | return r; |
655 | |
656 | container_bus = allocated_bus ?: m->manager->bus; |
657 | |
658 | r = sd_bus_message_new_method_call( |
659 | container_bus, |
660 | &tm, |
661 | "org.freedesktop.systemd1", |
662 | "/org/freedesktop/systemd1", |
663 | "org.freedesktop.systemd1.Manager", |
664 | "StartTransientUnit"); |
665 | if (r < 0) |
666 | return r; |
667 | |
668 | /* Name and mode */ |
669 | unit = strjoina("container-shell@", p, ".service")({ const char *_appendees_[] = { "container-shell@", p, ".service" }; char *_d_, *_p_; size_t _len_ = 0; size_t _i_; for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(_appendees_), typeof(&*(_appendees_))), sizeof(_appendees_ )/sizeof((_appendees_)[0]), ((void)0))) && _appendees_ [_i_]; _i_++) _len_ += strlen(_appendees_[_i_]); _p_ = _d_ = __builtin_alloca (_len_ + 1); for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(_appendees_), typeof(& *(_appendees_))), sizeof(_appendees_)/sizeof((_appendees_)[0] ), ((void)0))) && _appendees_[_i_]; _i_++) _p_ = stpcpy (_p_, _appendees_[_i_]); *_p_ = 0; _d_; }); |
670 | r = sd_bus_message_append(tm, "ss", unit, "fail"); |
671 | if (r < 0) |
672 | return r; |
673 | |
674 | /* Properties */ |
675 | r = sd_bus_message_open_container(tm, 'a', "(sv)"); |
676 | if (r < 0) |
677 | return r; |
678 | |
679 | description = strjoina("Shell for User ", isempty(user) ? "root" : user)({ const char *_appendees_[] = { "Shell for User ", isempty(user ) ? "root" : user }; char *_d_, *_p_; size_t _len_ = 0; size_t _i_; for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(_appendees_), typeof(& *(_appendees_))), sizeof(_appendees_)/sizeof((_appendees_)[0] ), ((void)0))) && _appendees_[_i_]; _i_++) _len_ += strlen (_appendees_[_i_]); _p_ = _d_ = __builtin_alloca (_len_ + 1); for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p(typeof(_appendees_), typeof(& *(_appendees_))), sizeof(_appendees_)/sizeof((_appendees_)[0] ), ((void)0))) && _appendees_[_i_]; _i_++) _p_ = stpcpy (_p_, _appendees_[_i_]); *_p_ = 0; _d_; }); |
680 | r = sd_bus_message_append(tm, |
681 | "(sv)(sv)(sv)(sv)(sv)(sv)(sv)(sv)(sv)(sv)(sv)(sv)", |
682 | "Description", "s", description, |
683 | "StandardInputFileDescriptor", "h", slave, |
684 | "StandardOutputFileDescriptor", "h", slave, |
685 | "StandardErrorFileDescriptor", "h", slave, |
686 | "SendSIGHUP", "b", true1, |
687 | "IgnoreSIGPIPE", "b", false0, |
688 | "KillMode", "s", "mixed", |
689 | "TTYReset", "b", true1, |
690 | "UtmpIdentifier", "s", utmp_id, |
691 | "UtmpMode", "s", "user", |
692 | "PAMName", "s", "login", |
693 | "WorkingDirectory", "s", "-~"); |
694 | if (r < 0) |
695 | return r; |
696 | |
697 | r = sd_bus_message_append(tm, "(sv)", "User", "s", isempty(user) ? "root" : user); |
698 | if (r < 0) |
699 | return r; |
700 | |
701 | if (!strv_isempty(env)) { |
702 | r = sd_bus_message_open_container(tm, 'r', "sv"); |
703 | if (r < 0) |
704 | return r; |
705 | |
706 | r = sd_bus_message_append(tm, "s", "Environment"); |
707 | if (r < 0) |
708 | return r; |
709 | |
710 | r = sd_bus_message_open_container(tm, 'v', "as"); |
711 | if (r < 0) |
712 | return r; |
713 | |
714 | r = sd_bus_message_append_strv(tm, env); |
715 | if (r < 0) |
716 | return r; |
717 | |
718 | r = sd_bus_message_close_container(tm); |
719 | if (r < 0) |
720 | return r; |
721 | |
722 | r = sd_bus_message_close_container(tm); |
723 | if (r < 0) |
724 | return r; |
725 | } |
726 | |
727 | /* Exec container */ |
728 | r = sd_bus_message_open_container(tm, 'r', "sv"); |
729 | if (r < 0) |
730 | return r; |
731 | |
732 | r = sd_bus_message_append(tm, "s", "ExecStart"); |
733 | if (r < 0) |
734 | return r; |
735 | |
736 | r = sd_bus_message_open_container(tm, 'v', "a(sasb)"); |
737 | if (r < 0) |
738 | return r; |
739 | |
740 | r = sd_bus_message_open_container(tm, 'a', "(sasb)"); |
741 | if (r < 0) |
742 | return r; |
743 | |
744 | r = sd_bus_message_open_container(tm, 'r', "sasb"); |
745 | if (r < 0) |
746 | return r; |
747 | |
748 | r = sd_bus_message_append(tm, "s", path); |
749 | if (r < 0) |
750 | return r; |
751 | |
752 | r = sd_bus_message_append_strv(tm, args); |
753 | if (r < 0) |
754 | return r; |
755 | |
756 | r = sd_bus_message_append(tm, "b", true1); |
757 | if (r < 0) |
758 | return r; |
759 | |
760 | r = sd_bus_message_close_container(tm); |
761 | if (r < 0) |
762 | return r; |
763 | |
764 | r = sd_bus_message_close_container(tm); |
765 | if (r < 0) |
766 | return r; |
767 | |
768 | r = sd_bus_message_close_container(tm); |
769 | if (r < 0) |
770 | return r; |
771 | |
772 | r = sd_bus_message_close_container(tm); |
773 | if (r < 0) |
774 | return r; |
775 | |
776 | r = sd_bus_message_close_container(tm); |
777 | if (r < 0) |
778 | return r; |
779 | |
780 | /* Auxiliary units */ |
781 | r = sd_bus_message_append(tm, "a(sa(sv))", 0); |
782 | if (r < 0) |
783 | return r; |
784 | |
785 | r = sd_bus_call(container_bus, tm, 0, error, NULL((void*)0)); |
786 | if (r < 0) |
787 | return r; |
788 | |
789 | slave = safe_close(slave); |
790 | |
791 | r = sd_bus_message_new_method_return(message, &reply); |
792 | if (r < 0) |
793 | return r; |
794 | |
795 | r = sd_bus_message_append(reply, "hs", master, pty_name); |
796 | if (r < 0) |
797 | return r; |
798 | |
799 | return sd_bus_send(NULL((void*)0), reply, NULL((void*)0)); |
800 | } |
801 | |
802 | int bus_machine_method_bind_mount(sd_bus_message *message, void *userdata, sd_bus_error *error) { |
803 | _cleanup_close_pair___attribute__((cleanup(close_pairp))) int errno_pipe_fd[2] = { -1, -1 }; |
804 | char mount_slave[] = "/tmp/propagate.XXXXXX", *mount_tmp, *mount_outside, *p; |
805 | bool_Bool mount_slave_created = false0, mount_slave_mounted = false0, |
806 | mount_tmp_created = false0, mount_tmp_mounted = false0, |
807 | mount_outside_created = false0, mount_outside_mounted = false0; |
808 | _cleanup_free___attribute__((cleanup(freep))) char *chased_src = NULL((void*)0); |
809 | int read_only, make_file_or_directory; |
810 | const char *dest, *src; |
811 | Machine *m = userdata; |
812 | struct stat st; |
813 | pid_t child; |
814 | uid_t uid; |
815 | int r; |
816 | |
817 | assert(message)do { if ((__builtin_expect(!!(!(message)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("message"), "../src/machine/machine-dbus.c" , 817, __PRETTY_FUNCTION__); } while (0); |
818 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/machine/machine-dbus.c", 818 , __PRETTY_FUNCTION__); } while (0); |
819 | |
820 | if (m->class != MACHINE_CONTAINER) |
821 | return sd_bus_error_setf(error, SD_BUS_ERROR_NOT_SUPPORTED"org.freedesktop.DBus.Error.NotSupported", "Bind mounting is only supported on container machines."); |
822 | |
823 | r = sd_bus_message_read(message, "ssbb", &src, &dest, &read_only, &make_file_or_directory); |
824 | if (r < 0) |
825 | return r; |
826 | |
827 | if (!path_is_absolute(src) || !path_is_normalized(src)) |
828 | return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS"org.freedesktop.DBus.Error.InvalidArgs", "Source path must be absolute and not contain ../."); |
829 | |
830 | if (isempty(dest)) |
831 | dest = src; |
832 | else if (!path_is_absolute(dest) || !path_is_normalized(dest)) |
833 | return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS"org.freedesktop.DBus.Error.InvalidArgs", "Destination path must be absolute and not contain ../."); |
834 | |
835 | r = bus_verify_polkit_async( |
836 | message, |
837 | CAP_SYS_ADMIN21, |
838 | "org.freedesktop.machine1.manage-machines", |
839 | NULL((void*)0), |
840 | false0, |
841 | UID_INVALID((uid_t) -1), |
842 | &m->manager->polkit_registry, |
843 | error); |
844 | if (r < 0) |
845 | return r; |
846 | if (r == 0) |
847 | return 1; /* Will call us back */ |
848 | |
849 | r = machine_get_uid_shift(m, &uid); |
850 | if (r < 0) |
851 | return r; |
852 | if (uid != 0) |
853 | return sd_bus_error_setf(error, SD_BUS_ERROR_NOT_SUPPORTED"org.freedesktop.DBus.Error.NotSupported", "Can't bind mount on container with user namespacing applied."); |
854 | |
855 | /* One day, when bind mounting /proc/self/fd/n works across |
856 | * namespace boundaries we should rework this logic to make |
857 | * use of it... */ |
858 | |
859 | p = strjoina("/run/systemd/nspawn/propagate/", m->name, "/")({ const char *_appendees_[] = { "/run/systemd/nspawn/propagate/" , m->name, "/" }; char *_d_, *_p_; size_t _len_ = 0; size_t _i_; for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(_appendees_), typeof(& *(_appendees_))), sizeof(_appendees_)/sizeof((_appendees_)[0] ), ((void)0))) && _appendees_[_i_]; _i_++) _len_ += strlen (_appendees_[_i_]); _p_ = _d_ = __builtin_alloca (_len_ + 1); for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p(typeof(_appendees_), typeof(& *(_appendees_))), sizeof(_appendees_)/sizeof((_appendees_)[0] ), ((void)0))) && _appendees_[_i_]; _i_++) _p_ = stpcpy (_p_, _appendees_[_i_]); *_p_ = 0; _d_; }); |
860 | if (laccess(p, F_OK)faccessat(-100, (p), (0), 0x100) < 0) |
861 | return sd_bus_error_setf(error, SD_BUS_ERROR_NOT_SUPPORTED"org.freedesktop.DBus.Error.NotSupported", "Container does not allow propagation of mount points."); |
862 | |
863 | r = chase_symlinks(src, NULL((void*)0), CHASE_TRAIL_SLASH, &chased_src); |
864 | if (r < 0) |
865 | return sd_bus_error_set_errnof(error, r, "Failed to resolve source path: %m"); |
866 | |
867 | if (lstat(chased_src, &st) < 0) |
868 | return sd_bus_error_set_errnof(error, errno(*__errno_location ()), "Failed to stat() source path: %m"); |
869 | if (S_ISLNK(st.st_mode)((((st.st_mode)) & 0170000) == (0120000))) /* This shouldn't really happen, given that we just chased the symlinks above, but let's better be safe… */ |
870 | return sd_bus_error_setf(error, SD_BUS_ERROR_NOT_SUPPORTED"org.freedesktop.DBus.Error.NotSupported", "Source directory can't be a symbolic link"); |
871 | |
872 | /* Our goal is to install a new bind mount into the container, |
873 | possibly read-only. This is irritatingly complex |
874 | unfortunately, currently. |
875 | |
876 | First, we start by creating a private playground in /tmp, |
877 | that we can mount MS_SLAVE. (Which is necessary, since |
878 | MS_MOVE cannot be applied to mounts with MS_SHARED parent |
879 | mounts.) */ |
880 | |
881 | if (!mkdtemp(mount_slave)) |
882 | return sd_bus_error_set_errnof(error, errno(*__errno_location ()), "Failed to create playground %s: %m", mount_slave); |
883 | |
884 | mount_slave_created = true1; |
885 | |
886 | if (mount(mount_slave, mount_slave, NULL((void*)0), MS_BINDMS_BIND, NULL((void*)0)) < 0) { |
887 | r = sd_bus_error_set_errnof(error, errno(*__errno_location ()), "Failed to make bind mount %s: %m", mount_slave); |
888 | goto finish; |
889 | } |
890 | |
891 | mount_slave_mounted = true1; |
892 | |
893 | if (mount(NULL((void*)0), mount_slave, NULL((void*)0), MS_SLAVEMS_SLAVE, NULL((void*)0)) < 0) { |
894 | r = sd_bus_error_set_errnof(error, errno(*__errno_location ()), "Failed to remount slave %s: %m", mount_slave); |
895 | goto finish; |
896 | } |
897 | |
898 | /* Second, we mount the source file or directory to a directory inside of our MS_SLAVE playground. */ |
899 | mount_tmp = strjoina(mount_slave, "/mount")({ const char *_appendees_[] = { mount_slave, "/mount" }; char *_d_, *_p_; size_t _len_ = 0; size_t _i_; for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p (typeof(_appendees_), typeof(&*(_appendees_))), sizeof(_appendees_ )/sizeof((_appendees_)[0]), ((void)0))) && _appendees_ [_i_]; _i_++) _len_ += strlen(_appendees_[_i_]); _p_ = _d_ = __builtin_alloca (_len_ + 1); for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(_appendees_), typeof(& *(_appendees_))), sizeof(_appendees_)/sizeof((_appendees_)[0] ), ((void)0))) && _appendees_[_i_]; _i_++) _p_ = stpcpy (_p_, _appendees_[_i_]); *_p_ = 0; _d_; }); |
900 | if (S_ISDIR(st.st_mode)((((st.st_mode)) & 0170000) == (0040000))) |
901 | r = mkdir_errno_wrapper(mount_tmp, 0700); |
902 | else |
903 | r = touch(mount_tmp); |
904 | if (r < 0) { |
905 | sd_bus_error_set_errnof(error, errno(*__errno_location ()), "Failed to create temporary mount point %s: %m", mount_tmp); |
906 | goto finish; |
907 | } |
908 | |
909 | mount_tmp_created = true1; |
910 | |
911 | if (mount(chased_src, mount_tmp, NULL((void*)0), MS_BINDMS_BIND, NULL((void*)0)) < 0) { |
912 | r = sd_bus_error_set_errnof(error, errno(*__errno_location ()), "Failed to mount %s: %m", chased_src); |
913 | goto finish; |
914 | } |
915 | |
916 | mount_tmp_mounted = true1; |
917 | |
918 | /* Third, we remount the new bind mount read-only if requested. */ |
919 | if (read_only) |
920 | if (mount(NULL((void*)0), mount_tmp, NULL((void*)0), MS_BINDMS_BIND|MS_REMOUNTMS_REMOUNT|MS_RDONLYMS_RDONLY, NULL((void*)0)) < 0) { |
921 | r = sd_bus_error_set_errnof(error, errno(*__errno_location ()), "Failed to remount read-only %s: %m", mount_tmp); |
922 | goto finish; |
923 | } |
924 | |
925 | /* Fourth, we move the new bind mount into the propagation directory. This way it will appear there read-only |
926 | * right-away. */ |
927 | |
928 | mount_outside = strjoina("/run/systemd/nspawn/propagate/", m->name, "/XXXXXX")({ const char *_appendees_[] = { "/run/systemd/nspawn/propagate/" , m->name, "/XXXXXX" }; char *_d_, *_p_; size_t _len_ = 0; size_t _i_; for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(_appendees_), typeof(& *(_appendees_))), sizeof(_appendees_)/sizeof((_appendees_)[0] ), ((void)0))) && _appendees_[_i_]; _i_++) _len_ += strlen (_appendees_[_i_]); _p_ = _d_ = __builtin_alloca (_len_ + 1); for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p(typeof(_appendees_), typeof(& *(_appendees_))), sizeof(_appendees_)/sizeof((_appendees_)[0] ), ((void)0))) && _appendees_[_i_]; _i_++) _p_ = stpcpy (_p_, _appendees_[_i_]); *_p_ = 0; _d_; }); |
929 | if (S_ISDIR(st.st_mode)((((st.st_mode)) & 0170000) == (0040000))) |
930 | r = mkdtemp(mount_outside) ? 0 : -errno(*__errno_location ()); |
931 | else { |
932 | r = mkostemp_safe(mount_outside); |
933 | safe_close(r); |
934 | } |
935 | if (r < 0) { |
936 | sd_bus_error_set_errnof(error, errno(*__errno_location ()), "Cannot create propagation file or directory %s: %m", mount_outside); |
937 | goto finish; |
938 | } |
939 | |
940 | mount_outside_created = true1; |
941 | |
942 | if (mount(mount_tmp, mount_outside, NULL((void*)0), MS_MOVEMS_MOVE, NULL((void*)0)) < 0) { |
943 | r = sd_bus_error_set_errnof(error, errno(*__errno_location ()), "Failed to move %s to %s: %m", mount_tmp, mount_outside); |
944 | goto finish; |
945 | } |
946 | |
947 | mount_outside_mounted = true1; |
948 | mount_tmp_mounted = false0; |
949 | |
950 | if (S_ISDIR(st.st_mode)((((st.st_mode)) & 0170000) == (0040000))) |
951 | (void) rmdir(mount_tmp); |
952 | else |
953 | (void) unlink(mount_tmp); |
954 | mount_tmp_created = false0; |
955 | |
956 | (void) umount(mount_slave); |
957 | mount_slave_mounted = false0; |
958 | |
959 | (void) rmdir(mount_slave); |
960 | mount_slave_created = false0; |
961 | |
962 | if (pipe2(errno_pipe_fd, O_CLOEXEC02000000|O_NONBLOCK04000) < 0) { |
963 | r = sd_bus_error_set_errnof(error, errno(*__errno_location ()), "Failed to create pipe: %m"); |
964 | goto finish; |
965 | } |
966 | |
967 | r = safe_fork("(sd-bindmnt)", FORK_RESET_SIGNALS, &child); |
968 | if (r < 0) { |
969 | sd_bus_error_set_errnof(error, r, "Failed to fork(): %m"); |
970 | goto finish; |
971 | } |
972 | if (r == 0) { |
973 | const char *mount_inside; |
974 | int mntfd; |
975 | const char *q; |
976 | |
977 | errno_pipe_fd[0] = safe_close(errno_pipe_fd[0]); |
978 | |
979 | q = procfs_file_alloca(m->leader, "ns/mnt")({ pid_t _pid_ = (m->leader); const char *_r_; if (_pid_ == 0) { _r_ = ("/proc/self/" "ns/mnt"); } else { _r_ = __builtin_alloca ((sizeof("""/proc/""") - 1) + (2+(sizeof(pid_t) <= 1 ? 3 : sizeof(pid_t) <= 2 ? 5 : sizeof(pid_t) <= 4 ? 10 : sizeof (pid_t) <= 8 ? 20 : sizeof(int[-2*(sizeof(pid_t) > 8)]) )) + 1 + sizeof("ns/mnt")); sprintf((char*) _r_, "/proc/""%" "i" "/" "ns/mnt", _pid_); } _r_; }); |
980 | mntfd = open(q, O_RDONLY00|O_NOCTTY0400|O_CLOEXEC02000000); |
981 | if (mntfd < 0) { |
982 | r = log_error_errno(errno, "Failed to open mount namespace of leader: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/machine/machine-dbus.c", 982, __func__ , "Failed to open mount namespace of leader: %m") : -abs(_e); }); |
983 | goto child_fail; |
984 | } |
985 | |
986 | if (setns(mntfd, CLONE_NEWNS0x00020000) < 0) { |
987 | r = log_error_errno(errno, "Failed to join namespace of leader: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/machine/machine-dbus.c", 987, __func__ , "Failed to join namespace of leader: %m") : -abs(_e); }); |
988 | goto child_fail; |
989 | } |
990 | |
991 | if (make_file_or_directory) { |
992 | if (S_ISDIR(st.st_mode)((((st.st_mode)) & 0170000) == (0040000))) |
993 | (void) mkdir_p(dest, 0755); |
994 | else { |
995 | (void) mkdir_parents(dest, 0755); |
996 | safe_close(open(dest, O_CREAT0100|O_EXCL0200|O_WRONLY01|O_CLOEXEC02000000|O_NOCTTY0400, 0600)); |
997 | } |
998 | } |
999 | |
1000 | /* Fifth, move the mount to the right place inside */ |
1001 | mount_inside = strjoina("/run/systemd/nspawn/incoming/", basename(mount_outside))({ const char *_appendees_[] = { "/run/systemd/nspawn/incoming/" , basename(mount_outside) }; char *_d_, *_p_; size_t _len_ = 0 ; size_t _i_; for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr ( !__builtin_types_compatible_p(typeof(_appendees_), typeof(& *(_appendees_))), sizeof(_appendees_)/sizeof((_appendees_)[0] ), ((void)0))) && _appendees_[_i_]; _i_++) _len_ += strlen (_appendees_[_i_]); _p_ = _d_ = __builtin_alloca (_len_ + 1); for (_i_ = 0; _i_ < __extension__ (__builtin_choose_expr( !__builtin_types_compatible_p(typeof(_appendees_), typeof(& *(_appendees_))), sizeof(_appendees_)/sizeof((_appendees_)[0] ), ((void)0))) && _appendees_[_i_]; _i_++) _p_ = stpcpy (_p_, _appendees_[_i_]); *_p_ = 0; _d_; }); |
1002 | if (mount(mount_inside, dest, NULL((void*)0), MS_MOVEMS_MOVE, NULL((void*)0)) < 0) { |
1003 | r = log_error_errno(errno, "Failed to mount: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/machine/machine-dbus.c", 1003, __func__ , "Failed to mount: %m") : -abs(_e); }); |
1004 | goto child_fail; |
1005 | } |
1006 | |
1007 | _exit(EXIT_SUCCESS0); |
1008 | |
1009 | child_fail: |
1010 | (void) write(errno_pipe_fd[1], &r, sizeof(r)); |
1011 | errno_pipe_fd[1] = safe_close(errno_pipe_fd[1]); |
1012 | |
1013 | _exit(EXIT_FAILURE1); |
1014 | } |
1015 | |
1016 | errno_pipe_fd[1] = safe_close(errno_pipe_fd[1]); |
1017 | |
1018 | r = wait_for_terminate_and_check("(sd-bindmnt)", child, 0); |
1019 | if (r < 0) { |
1020 | r = sd_bus_error_set_errnof(error, r, "Failed to wait for child: %m"); |
1021 | goto finish; |
1022 | } |
1023 | if (r != EXIT_SUCCESS0) { |
1024 | if (read(errno_pipe_fd[0], &r, sizeof(r)) == sizeof(r)) |
1025 | r = sd_bus_error_set_errnof(error, r, "Failed to mount: %m"); |
1026 | else |
1027 | r = sd_bus_error_setf(error, SD_BUS_ERROR_FAILED"org.freedesktop.DBus.Error.Failed", "Child failed."); |
1028 | goto finish; |
1029 | } |
1030 | |
1031 | r = sd_bus_reply_method_return(message, NULL((void*)0)); |
1032 | |
1033 | finish: |
1034 | if (mount_outside_mounted) |
1035 | (void) umount(mount_outside); |
1036 | if (mount_outside_created) { |
1037 | if (S_ISDIR(st.st_mode)((((st.st_mode)) & 0170000) == (0040000))) |
1038 | (void) rmdir(mount_outside); |
1039 | else |
1040 | (void) unlink(mount_outside); |
1041 | } |
1042 | |
1043 | if (mount_tmp_mounted) |
1044 | (void) umount(mount_tmp); |
1045 | if (mount_tmp_created) { |
1046 | if (S_ISDIR(st.st_mode)((((st.st_mode)) & 0170000) == (0040000))) |
1047 | (void) rmdir(mount_tmp); |
1048 | else |
1049 | (void) unlink(mount_tmp); |
1050 | } |
1051 | |
1052 | if (mount_slave_mounted) |
1053 | (void) umount(mount_slave); |
1054 | if (mount_slave_created) |
1055 | (void) rmdir(mount_slave); |
1056 | |
1057 | return r; |
1058 | } |
1059 | |
1060 | int bus_machine_method_copy(sd_bus_message *message, void *userdata, sd_bus_error *error) { |
1061 | const char *src, *dest, *host_path, *container_path, *host_basename, *host_dirname, *container_basename, *container_dirname; |
1062 | _cleanup_close_pair___attribute__((cleanup(close_pairp))) int errno_pipe_fd[2] = { -1, -1 }; |
1063 | CopyFlags copy_flags = COPY_REFLINK|COPY_MERGE; |
1064 | _cleanup_close___attribute__((cleanup(closep))) int hostfd = -1; |
1065 | Machine *m = userdata; |
1066 | bool_Bool copy_from; |
1067 | pid_t child; |
1068 | uid_t uid_shift; |
1069 | char *t; |
1070 | int r; |
1071 | |
1072 | assert(message)do { if ((__builtin_expect(!!(!(message)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("message"), "../src/machine/machine-dbus.c" , 1072, __PRETTY_FUNCTION__); } while (0); |
1073 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/machine/machine-dbus.c", 1073 , __PRETTY_FUNCTION__); } while (0); |
1074 | |
1075 | if (m->manager->n_operations >= OPERATIONS_MAX64) |
1076 | return sd_bus_error_setf(error, SD_BUS_ERROR_LIMITS_EXCEEDED"org.freedesktop.DBus.Error.LimitsExceeded", "Too many ongoing copies."); |
1077 | |
1078 | if (m->class != MACHINE_CONTAINER) |
1079 | return sd_bus_error_setf(error, SD_BUS_ERROR_NOT_SUPPORTED"org.freedesktop.DBus.Error.NotSupported", "Copying files is only supported on container machines."); |
1080 | |
1081 | r = sd_bus_message_read(message, "ss", &src, &dest); |
1082 | if (r < 0) |
1083 | return r; |
1084 | |
1085 | if (!path_is_absolute(src)) |
1086 | return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS"org.freedesktop.DBus.Error.InvalidArgs", "Source path must be absolute."); |
1087 | |
1088 | if (isempty(dest)) |
1089 | dest = src; |
1090 | else if (!path_is_absolute(dest)) |
1091 | return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS"org.freedesktop.DBus.Error.InvalidArgs", "Destination path must be absolute."); |
1092 | |
1093 | r = bus_verify_polkit_async( |
1094 | message, |
1095 | CAP_SYS_ADMIN21, |
1096 | "org.freedesktop.machine1.manage-machines", |
1097 | NULL((void*)0), |
1098 | false0, |
1099 | UID_INVALID((uid_t) -1), |
1100 | &m->manager->polkit_registry, |
1101 | error); |
1102 | if (r < 0) |
1103 | return r; |
1104 | if (r == 0) |
1105 | return 1; /* Will call us back */ |
1106 | |
1107 | r = machine_get_uid_shift(m, &uid_shift); |
1108 | if (r < 0) |
1109 | return r; |
1110 | |
1111 | copy_from = strstr(sd_bus_message_get_member(message), "CopyFrom"); |
1112 | |
1113 | if (copy_from) { |
1114 | container_path = src; |
1115 | host_path = dest; |
1116 | } else { |
1117 | host_path = src; |
1118 | container_path = dest; |
1119 | } |
1120 | |
1121 | host_basename = basename(host_path); |
1122 | t = strdupa(host_path)(__extension__ ({ const char *__old = (host_path); size_t __len = strlen (__old) + 1; char *__new = (char *) __builtin_alloca (__len); (char *) memcpy (__new, __old, __len); })); |
1123 | host_dirname = dirname(t); |
1124 | |
1125 | container_basename = basename(container_path); |
1126 | t = strdupa(container_path)(__extension__ ({ const char *__old = (container_path); size_t __len = strlen (__old) + 1; char *__new = (char *) __builtin_alloca (__len); (char *) memcpy (__new, __old, __len); })); |
1127 | container_dirname = dirname(t); |
1128 | |
1129 | hostfd = open(host_dirname, O_CLOEXEC02000000|O_RDONLY00|O_NOCTTY0400|O_DIRECTORY0200000); |
1130 | if (hostfd < 0) |
1131 | return sd_bus_error_set_errnof(error, errno(*__errno_location ()), "Failed to open host directory %s: %m", host_dirname); |
1132 | |
1133 | if (pipe2(errno_pipe_fd, O_CLOEXEC02000000|O_NONBLOCK04000) < 0) |
1134 | return sd_bus_error_set_errnof(error, errno(*__errno_location ()), "Failed to create pipe: %m"); |
1135 | |
1136 | r = safe_fork("(sd-copy)", FORK_RESET_SIGNALS, &child); |
1137 | if (r < 0) |
1138 | return sd_bus_error_set_errnof(error, r, "Failed to fork(): %m"); |
1139 | if (r == 0) { |
1140 | int containerfd; |
1141 | const char *q; |
1142 | int mntfd; |
1143 | |
1144 | errno_pipe_fd[0] = safe_close(errno_pipe_fd[0]); |
1145 | |
1146 | q = procfs_file_alloca(m->leader, "ns/mnt")({ pid_t _pid_ = (m->leader); const char *_r_; if (_pid_ == 0) { _r_ = ("/proc/self/" "ns/mnt"); } else { _r_ = __builtin_alloca ((sizeof("""/proc/""") - 1) + (2+(sizeof(pid_t) <= 1 ? 3 : sizeof(pid_t) <= 2 ? 5 : sizeof(pid_t) <= 4 ? 10 : sizeof (pid_t) <= 8 ? 20 : sizeof(int[-2*(sizeof(pid_t) > 8)]) )) + 1 + sizeof("ns/mnt")); sprintf((char*) _r_, "/proc/""%" "i" "/" "ns/mnt", _pid_); } _r_; }); |
1147 | mntfd = open(q, O_RDONLY00|O_NOCTTY0400|O_CLOEXEC02000000); |
1148 | if (mntfd < 0) { |
1149 | r = log_error_errno(errno, "Failed to open mount namespace of leader: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/machine/machine-dbus.c", 1149, __func__ , "Failed to open mount namespace of leader: %m") : -abs(_e); }); |
1150 | goto child_fail; |
1151 | } |
1152 | |
1153 | if (setns(mntfd, CLONE_NEWNS0x00020000) < 0) { |
1154 | r = log_error_errno(errno, "Failed to join namespace of leader: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/machine/machine-dbus.c", 1154, __func__ , "Failed to join namespace of leader: %m") : -abs(_e); }); |
1155 | goto child_fail; |
1156 | } |
1157 | |
1158 | containerfd = open(container_dirname, O_CLOEXEC02000000|O_RDONLY00|O_NOCTTY0400|O_DIRECTORY0200000); |
1159 | if (containerfd < 0) { |
1160 | r = log_error_errno(errno, "Failed to open destination directory: %m")({ int _level = ((3)), _e = (((*__errno_location ()))), _realm = (LOG_REALM_SYSTEMD); (log_get_max_level_realm(_realm) >= ((_level) & 0x07)) ? log_internal_realm(((_realm) << 10 | (_level)), _e, "../src/machine/machine-dbus.c", 1160, __func__ , "Failed to open destination directory: %m") : -abs(_e); }); |
1161 | goto child_fail; |
1162 | } |
1163 | |
1164 | /* Run the actual copy operation. Note that when an UID shift is set we'll either clamp the UID/GID to |
1165 | * 0 or to the actual UID shift depending on the direction we copy. If no UID shift is set we'll copy |
1166 | * the UID/GIDs as they are. */ |
1167 | if (copy_from) |
1168 | r = copy_tree_at(containerfd, container_basename, hostfd, host_basename, uid_shift == 0 ? UID_INVALID((uid_t) -1) : 0, uid_shift == 0 ? GID_INVALID((gid_t) -1) : 0, copy_flags); |
1169 | else |
1170 | r = copy_tree_at(hostfd, host_basename, containerfd, container_basename, uid_shift == 0 ? UID_INVALID((uid_t) -1) : uid_shift, uid_shift == 0 ? GID_INVALID((gid_t) -1) : uid_shift, copy_flags); |
1171 | |
1172 | hostfd = safe_close(hostfd); |
Value stored to 'hostfd' is never read | |
1173 | containerfd = safe_close(containerfd); |
1174 | |
1175 | if (r < 0) { |
1176 | r = log_error_errno(r, "Failed to copy tree: %m")({ int _level = ((3)), _e = ((r)), _realm = (LOG_REALM_SYSTEMD ); (log_get_max_level_realm(_realm) >= ((_level) & 0x07 )) ? log_internal_realm(((_realm) << 10 | (_level)), _e , "../src/machine/machine-dbus.c", 1176, __func__, "Failed to copy tree: %m" ) : -abs(_e); }); |
1177 | goto child_fail; |
1178 | } |
1179 | |
1180 | _exit(EXIT_SUCCESS0); |
1181 | |
1182 | child_fail: |
1183 | (void) write(errno_pipe_fd[1], &r, sizeof(r)); |
1184 | _exit(EXIT_FAILURE1); |
1185 | } |
1186 | |
1187 | errno_pipe_fd[1] = safe_close(errno_pipe_fd[1]); |
1188 | |
1189 | /* Copying might take a while, hence install a watch on the child, and return */ |
1190 | |
1191 | r = operation_new(m->manager, m, child, message, errno_pipe_fd[0], NULL((void*)0)); |
1192 | if (r < 0) { |
1193 | (void) sigkill_wait(child); |
1194 | return r; |
1195 | } |
1196 | errno_pipe_fd[0] = -1; |
1197 | |
1198 | return 1; |
1199 | } |
1200 | |
1201 | int bus_machine_method_open_root_directory(sd_bus_message *message, void *userdata, sd_bus_error *error) { |
1202 | _cleanup_close___attribute__((cleanup(closep))) int fd = -1; |
1203 | Machine *m = userdata; |
1204 | int r; |
1205 | |
1206 | assert(message)do { if ((__builtin_expect(!!(!(message)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("message"), "../src/machine/machine-dbus.c" , 1206, __PRETTY_FUNCTION__); } while (0); |
1207 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/machine/machine-dbus.c", 1207 , __PRETTY_FUNCTION__); } while (0); |
1208 | |
1209 | r = bus_verify_polkit_async( |
1210 | message, |
1211 | CAP_SYS_ADMIN21, |
1212 | "org.freedesktop.machine1.manage-machines", |
1213 | NULL((void*)0), |
1214 | false0, |
1215 | UID_INVALID((uid_t) -1), |
1216 | &m->manager->polkit_registry, |
1217 | error); |
1218 | if (r < 0) |
1219 | return r; |
1220 | if (r == 0) |
1221 | return 1; /* Will call us back */ |
1222 | |
1223 | switch (m->class) { |
1224 | |
1225 | case MACHINE_HOST: |
1226 | fd = open("/", O_RDONLY00|O_CLOEXEC02000000|O_DIRECTORY0200000); |
1227 | if (fd < 0) |
1228 | return -errno(*__errno_location ()); |
1229 | |
1230 | break; |
1231 | |
1232 | case MACHINE_CONTAINER: { |
1233 | _cleanup_close___attribute__((cleanup(closep))) int mntns_fd = -1, root_fd = -1; |
1234 | _cleanup_close_pair___attribute__((cleanup(close_pairp))) int pair[2] = { -1, -1 }; |
1235 | pid_t child; |
1236 | |
1237 | r = namespace_open(m->leader, NULL((void*)0), &mntns_fd, NULL((void*)0), NULL((void*)0), &root_fd); |
1238 | if (r < 0) |
1239 | return r; |
1240 | |
1241 | if (socketpair(AF_UNIX1, SOCK_DGRAMSOCK_DGRAM, 0, pair) < 0) |
1242 | return -errno(*__errno_location ()); |
1243 | |
1244 | r = safe_fork("(sd-openroot)", FORK_RESET_SIGNALS|FORK_DEATHSIG, &child); |
1245 | if (r < 0) |
1246 | return sd_bus_error_set_errnof(error, r, "Failed to fork(): %m"); |
1247 | if (r == 0) { |
1248 | _cleanup_close___attribute__((cleanup(closep))) int dfd = -1; |
1249 | |
1250 | pair[0] = safe_close(pair[0]); |
1251 | |
1252 | r = namespace_enter(-1, mntns_fd, -1, -1, root_fd); |
1253 | if (r < 0) |
1254 | _exit(EXIT_FAILURE1); |
1255 | |
1256 | dfd = open("/", O_RDONLY00|O_CLOEXEC02000000|O_DIRECTORY0200000); |
1257 | if (dfd < 0) |
1258 | _exit(EXIT_FAILURE1); |
1259 | |
1260 | r = send_one_fd(pair[1], dfd, 0)send_one_fd_iov_sa(pair[1], dfd, ((void*)0), 0, ((void*)0), 0 , 0); |
1261 | dfd = safe_close(dfd); |
1262 | if (r < 0) |
1263 | _exit(EXIT_FAILURE1); |
1264 | |
1265 | _exit(EXIT_SUCCESS0); |
1266 | } |
1267 | |
1268 | pair[1] = safe_close(pair[1]); |
1269 | |
1270 | r = wait_for_terminate_and_check("(sd-openroot)", child, 0); |
1271 | if (r < 0) |
1272 | return sd_bus_error_set_errnof(error, r, "Failed to wait for child: %m"); |
1273 | if (r != EXIT_SUCCESS0) |
1274 | return sd_bus_error_setf(error, SD_BUS_ERROR_FAILED"org.freedesktop.DBus.Error.Failed", "Child died abnormally."); |
1275 | |
1276 | fd = receive_one_fd(pair[0], MSG_DONTWAITMSG_DONTWAIT); |
1277 | if (fd < 0) |
1278 | return fd; |
1279 | |
1280 | break; |
1281 | } |
1282 | |
1283 | default: |
1284 | return sd_bus_error_setf(error, SD_BUS_ERROR_NOT_SUPPORTED"org.freedesktop.DBus.Error.NotSupported", "Opening the root directory is only supported on container machines."); |
1285 | } |
1286 | |
1287 | return sd_bus_reply_method_return(message, "h", fd); |
1288 | } |
1289 | |
1290 | int bus_machine_method_get_uid_shift(sd_bus_message *message, void *userdata, sd_bus_error *error) { |
1291 | Machine *m = userdata; |
1292 | uid_t shift = 0; |
1293 | int r; |
1294 | |
1295 | assert(message)do { if ((__builtin_expect(!!(!(message)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("message"), "../src/machine/machine-dbus.c" , 1295, __PRETTY_FUNCTION__); } while (0); |
1296 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/machine/machine-dbus.c", 1296 , __PRETTY_FUNCTION__); } while (0); |
1297 | |
1298 | /* You wonder why this is a method and not a property? Well, properties are not supposed to return errors, but |
1299 | * we kinda have to for this. */ |
1300 | |
1301 | if (m->class == MACHINE_HOST) |
1302 | return sd_bus_reply_method_return(message, "u", UINT32_C(0)0U); |
1303 | |
1304 | if (m->class != MACHINE_CONTAINER) |
1305 | return sd_bus_error_setf(error, SD_BUS_ERROR_NOT_SUPPORTED"org.freedesktop.DBus.Error.NotSupported", "UID/GID shift may only be determined for container machines."); |
1306 | |
1307 | r = machine_get_uid_shift(m, &shift); |
1308 | if (r == -ENXIO6) |
1309 | return sd_bus_error_setf(error, SD_BUS_ERROR_NOT_SUPPORTED"org.freedesktop.DBus.Error.NotSupported", "Machine %s uses a complex UID/GID mapping, cannot determine shift", m->name); |
1310 | if (r < 0) |
1311 | return r; |
1312 | |
1313 | return sd_bus_reply_method_return(message, "u", (uint32_t) shift); |
1314 | } |
1315 | |
1316 | const sd_bus_vtable machine_vtable[] = { |
1317 | SD_BUS_VTABLE_START(0){ .type = _SD_BUS_VTABLE_START, .flags = 0, .x = { .start = { .element_size = sizeof(sd_bus_vtable) }, }, }, |
1318 | SD_BUS_PROPERTY("Name", "s", NULL, offsetof(Machine, name), SD_BUS_VTABLE_PROPERTY_CONST){ .type = _SD_BUS_VTABLE_PROPERTY, .flags = SD_BUS_VTABLE_PROPERTY_CONST , .x = { .property = { .member = "Name", .signature = "s", .get = ((void*)0), .set = ((void*)0), .offset = __builtin_offsetof (Machine, name), }, }, }, |
1319 | SD_BUS_PROPERTY("Id", "ay", bus_property_get_id128, offsetof(Machine, id), SD_BUS_VTABLE_PROPERTY_CONST){ .type = _SD_BUS_VTABLE_PROPERTY, .flags = SD_BUS_VTABLE_PROPERTY_CONST , .x = { .property = { .member = "Id", .signature = "ay", .get = bus_property_get_id128, .set = ((void*)0), .offset = __builtin_offsetof (Machine, id), }, }, }, |
1320 | BUS_PROPERTY_DUAL_TIMESTAMP("Timestamp", offsetof(Machine, timestamp), SD_BUS_VTABLE_PROPERTY_CONST){ .type = _SD_BUS_VTABLE_PROPERTY, .flags = (SD_BUS_VTABLE_PROPERTY_CONST ), .x = { .property = { .member = "Timestamp", .signature = "t" , .get = ((sd_bus_property_get_t) ((void*)0)), .set = ((void* )0), .offset = (__builtin_offsetof(Machine, timestamp)) + __builtin_offsetof (struct dual_timestamp, realtime), }, }, }, { .type = _SD_BUS_VTABLE_PROPERTY , .flags = (SD_BUS_VTABLE_PROPERTY_CONST), .x = { .property = { .member = "Timestamp" "Monotonic", .signature = "t", .get = ((sd_bus_property_get_t) ((void*)0)), .set = ((void*)0), .offset = (__builtin_offsetof(Machine, timestamp)) + __builtin_offsetof (struct dual_timestamp, monotonic), }, }, }, |
1321 | SD_BUS_PROPERTY("Service", "s", NULL, offsetof(Machine, service), SD_BUS_VTABLE_PROPERTY_CONST){ .type = _SD_BUS_VTABLE_PROPERTY, .flags = SD_BUS_VTABLE_PROPERTY_CONST , .x = { .property = { .member = "Service", .signature = "s", .get = ((void*)0), .set = ((void*)0), .offset = __builtin_offsetof (Machine, service), }, }, }, |
1322 | SD_BUS_PROPERTY("Unit", "s", NULL, offsetof(Machine, unit), SD_BUS_VTABLE_PROPERTY_CONST){ .type = _SD_BUS_VTABLE_PROPERTY, .flags = SD_BUS_VTABLE_PROPERTY_CONST , .x = { .property = { .member = "Unit", .signature = "s", .get = ((void*)0), .set = ((void*)0), .offset = __builtin_offsetof (Machine, unit), }, }, }, |
1323 | SD_BUS_PROPERTY("Scope", "s", NULL, offsetof(Machine, unit), SD_BUS_VTABLE_PROPERTY_CONST|SD_BUS_VTABLE_HIDDEN){ .type = _SD_BUS_VTABLE_PROPERTY, .flags = SD_BUS_VTABLE_PROPERTY_CONST |SD_BUS_VTABLE_HIDDEN, .x = { .property = { .member = "Scope" , .signature = "s", .get = ((void*)0), .set = ((void*)0), .offset = __builtin_offsetof(Machine, unit), }, }, }, |
1324 | SD_BUS_PROPERTY("Leader", "u", NULL, offsetof(Machine, leader), SD_BUS_VTABLE_PROPERTY_CONST){ .type = _SD_BUS_VTABLE_PROPERTY, .flags = SD_BUS_VTABLE_PROPERTY_CONST , .x = { .property = { .member = "Leader", .signature = "u", . get = ((void*)0), .set = ((void*)0), .offset = __builtin_offsetof (Machine, leader), }, }, }, |
1325 | SD_BUS_PROPERTY("Class", "s", property_get_class, offsetof(Machine, class), SD_BUS_VTABLE_PROPERTY_CONST){ .type = _SD_BUS_VTABLE_PROPERTY, .flags = SD_BUS_VTABLE_PROPERTY_CONST , .x = { .property = { .member = "Class", .signature = "s", . get = property_get_class, .set = ((void*)0), .offset = __builtin_offsetof (Machine, class), }, }, }, |
1326 | SD_BUS_PROPERTY("RootDirectory", "s", NULL, offsetof(Machine, root_directory), SD_BUS_VTABLE_PROPERTY_CONST){ .type = _SD_BUS_VTABLE_PROPERTY, .flags = SD_BUS_VTABLE_PROPERTY_CONST , .x = { .property = { .member = "RootDirectory", .signature = "s", .get = ((void*)0), .set = ((void*)0), .offset = __builtin_offsetof (Machine, root_directory), }, }, }, |
1327 | SD_BUS_PROPERTY("NetworkInterfaces", "ai", property_get_netif, 0, SD_BUS_VTABLE_PROPERTY_CONST){ .type = _SD_BUS_VTABLE_PROPERTY, .flags = SD_BUS_VTABLE_PROPERTY_CONST , .x = { .property = { .member = "NetworkInterfaces", .signature = "ai", .get = property_get_netif, .set = ((void*)0), .offset = 0, }, }, }, |
1328 | SD_BUS_PROPERTY("State", "s", property_get_state, 0, 0){ .type = _SD_BUS_VTABLE_PROPERTY, .flags = 0, .x = { .property = { .member = "State", .signature = "s", .get = property_get_state , .set = ((void*)0), .offset = 0, }, }, }, |
1329 | SD_BUS_METHOD("Terminate", NULL, NULL, bus_machine_method_terminate, SD_BUS_VTABLE_UNPRIVILEGED){ .type = _SD_BUS_VTABLE_METHOD, .flags = SD_BUS_VTABLE_UNPRIVILEGED , .x = { .method = { .member = "Terminate", .signature = ((void *)0), .result = ((void*)0), .handler = bus_machine_method_terminate , .offset = 0, }, }, }, |
1330 | SD_BUS_METHOD("Kill", "si", NULL, bus_machine_method_kill, SD_BUS_VTABLE_UNPRIVILEGED){ .type = _SD_BUS_VTABLE_METHOD, .flags = SD_BUS_VTABLE_UNPRIVILEGED , .x = { .method = { .member = "Kill", .signature = "si", .result = ((void*)0), .handler = bus_machine_method_kill, .offset = 0 , }, }, }, |
1331 | SD_BUS_METHOD("GetAddresses", NULL, "a(iay)", bus_machine_method_get_addresses, SD_BUS_VTABLE_UNPRIVILEGED){ .type = _SD_BUS_VTABLE_METHOD, .flags = SD_BUS_VTABLE_UNPRIVILEGED , .x = { .method = { .member = "GetAddresses", .signature = ( (void*)0), .result = "a(iay)", .handler = bus_machine_method_get_addresses , .offset = 0, }, }, }, |
1332 | SD_BUS_METHOD("GetOSRelease", NULL, "a{ss}", bus_machine_method_get_os_release, SD_BUS_VTABLE_UNPRIVILEGED){ .type = _SD_BUS_VTABLE_METHOD, .flags = SD_BUS_VTABLE_UNPRIVILEGED , .x = { .method = { .member = "GetOSRelease", .signature = ( (void*)0), .result = "a{ss}", .handler = bus_machine_method_get_os_release , .offset = 0, }, }, }, |
1333 | SD_BUS_METHOD("GetUIDShift", NULL, "u", bus_machine_method_get_uid_shift, SD_BUS_VTABLE_UNPRIVILEGED){ .type = _SD_BUS_VTABLE_METHOD, .flags = SD_BUS_VTABLE_UNPRIVILEGED , .x = { .method = { .member = "GetUIDShift", .signature = (( void*)0), .result = "u", .handler = bus_machine_method_get_uid_shift , .offset = 0, }, }, }, |
1334 | SD_BUS_METHOD("OpenPTY", NULL, "hs", bus_machine_method_open_pty, SD_BUS_VTABLE_UNPRIVILEGED){ .type = _SD_BUS_VTABLE_METHOD, .flags = SD_BUS_VTABLE_UNPRIVILEGED , .x = { .method = { .member = "OpenPTY", .signature = ((void *)0), .result = "hs", .handler = bus_machine_method_open_pty, .offset = 0, }, }, }, |
1335 | SD_BUS_METHOD("OpenLogin", NULL, "hs", bus_machine_method_open_login, SD_BUS_VTABLE_UNPRIVILEGED){ .type = _SD_BUS_VTABLE_METHOD, .flags = SD_BUS_VTABLE_UNPRIVILEGED , .x = { .method = { .member = "OpenLogin", .signature = ((void *)0), .result = "hs", .handler = bus_machine_method_open_login , .offset = 0, }, }, }, |
1336 | SD_BUS_METHOD("OpenShell", "ssasas", "hs", bus_machine_method_open_shell, SD_BUS_VTABLE_UNPRIVILEGED){ .type = _SD_BUS_VTABLE_METHOD, .flags = SD_BUS_VTABLE_UNPRIVILEGED , .x = { .method = { .member = "OpenShell", .signature = "ssasas" , .result = "hs", .handler = bus_machine_method_open_shell, . offset = 0, }, }, }, |
1337 | SD_BUS_METHOD("BindMount", "ssbb", NULL, bus_machine_method_bind_mount, SD_BUS_VTABLE_UNPRIVILEGED){ .type = _SD_BUS_VTABLE_METHOD, .flags = SD_BUS_VTABLE_UNPRIVILEGED , .x = { .method = { .member = "BindMount", .signature = "ssbb" , .result = ((void*)0), .handler = bus_machine_method_bind_mount , .offset = 0, }, }, }, |
1338 | SD_BUS_METHOD("CopyFrom", "ss", NULL, bus_machine_method_copy, SD_BUS_VTABLE_UNPRIVILEGED){ .type = _SD_BUS_VTABLE_METHOD, .flags = SD_BUS_VTABLE_UNPRIVILEGED , .x = { .method = { .member = "CopyFrom", .signature = "ss", .result = ((void*)0), .handler = bus_machine_method_copy, .offset = 0, }, }, }, |
1339 | SD_BUS_METHOD("CopyTo", "ss", NULL, bus_machine_method_copy, SD_BUS_VTABLE_UNPRIVILEGED){ .type = _SD_BUS_VTABLE_METHOD, .flags = SD_BUS_VTABLE_UNPRIVILEGED , .x = { .method = { .member = "CopyTo", .signature = "ss", . result = ((void*)0), .handler = bus_machine_method_copy, .offset = 0, }, }, }, |
1340 | SD_BUS_METHOD("OpenRootDirectory", NULL, "h", bus_machine_method_open_root_directory, SD_BUS_VTABLE_UNPRIVILEGED){ .type = _SD_BUS_VTABLE_METHOD, .flags = SD_BUS_VTABLE_UNPRIVILEGED , .x = { .method = { .member = "OpenRootDirectory", .signature = ((void*)0), .result = "h", .handler = bus_machine_method_open_root_directory , .offset = 0, }, }, }, |
1341 | SD_BUS_VTABLE_END{ .type = _SD_BUS_VTABLE_END, .flags = 0, .x = { { 0 } }, } |
1342 | }; |
1343 | |
1344 | int machine_object_find(sd_bus *bus, const char *path, const char *interface, void *userdata, void **found, sd_bus_error *error) { |
1345 | Manager *m = userdata; |
1346 | Machine *machine; |
1347 | int r; |
1348 | |
1349 | assert(bus)do { if ((__builtin_expect(!!(!(bus)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("bus"), "../src/machine/machine-dbus.c", 1349, __PRETTY_FUNCTION__); } while (0); |
1350 | assert(path)do { if ((__builtin_expect(!!(!(path)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("path"), "../src/machine/machine-dbus.c" , 1350, __PRETTY_FUNCTION__); } while (0); |
1351 | assert(interface)do { if ((__builtin_expect(!!(!(interface)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("interface"), "../src/machine/machine-dbus.c" , 1351, __PRETTY_FUNCTION__); } while (0); |
1352 | assert(found)do { if ((__builtin_expect(!!(!(found)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("found"), "../src/machine/machine-dbus.c" , 1352, __PRETTY_FUNCTION__); } while (0); |
1353 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/machine/machine-dbus.c", 1353 , __PRETTY_FUNCTION__); } while (0); |
1354 | |
1355 | if (streq(path, "/org/freedesktop/machine1/machine/self")(strcmp((path),("/org/freedesktop/machine1/machine/self")) == 0)) { |
1356 | _cleanup_(sd_bus_creds_unrefp)__attribute__((cleanup(sd_bus_creds_unrefp))) sd_bus_creds *creds = NULL((void*)0); |
1357 | sd_bus_message *message; |
1358 | pid_t pid; |
1359 | |
1360 | message = sd_bus_get_current_message(bus); |
1361 | if (!message) |
1362 | return 0; |
1363 | |
1364 | r = sd_bus_query_sender_creds(message, SD_BUS_CREDS_PID, &creds); |
1365 | if (r < 0) |
1366 | return r; |
1367 | |
1368 | r = sd_bus_creds_get_pid(creds, &pid); |
1369 | if (r < 0) |
1370 | return r; |
1371 | |
1372 | r = manager_get_machine_by_pid(m, pid, &machine); |
1373 | if (r <= 0) |
1374 | return 0; |
1375 | } else { |
1376 | _cleanup_free___attribute__((cleanup(freep))) char *e = NULL((void*)0); |
1377 | const char *p; |
1378 | |
1379 | p = startswith(path, "/org/freedesktop/machine1/machine/"); |
1380 | if (!p) |
1381 | return 0; |
1382 | |
1383 | e = bus_label_unescape(p); |
1384 | if (!e) |
1385 | return -ENOMEM12; |
1386 | |
1387 | machine = hashmap_get(m->machines, e); |
1388 | if (!machine) |
1389 | return 0; |
1390 | } |
1391 | |
1392 | *found = machine; |
1393 | return 1; |
1394 | } |
1395 | |
1396 | char *machine_bus_path(Machine *m) { |
1397 | _cleanup_free___attribute__((cleanup(freep))) char *e = NULL((void*)0); |
1398 | |
1399 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/machine/machine-dbus.c", 1399 , __PRETTY_FUNCTION__); } while (0); |
1400 | |
1401 | e = bus_label_escape(m->name); |
1402 | if (!e) |
1403 | return NULL((void*)0); |
1404 | |
1405 | return strappend("/org/freedesktop/machine1/machine/", e); |
1406 | } |
1407 | |
1408 | int machine_node_enumerator(sd_bus *bus, const char *path, void *userdata, char ***nodes, sd_bus_error *error) { |
1409 | _cleanup_strv_free___attribute__((cleanup(strv_freep))) char **l = NULL((void*)0); |
1410 | Machine *machine = NULL((void*)0); |
1411 | Manager *m = userdata; |
1412 | Iterator i; |
1413 | int r; |
1414 | |
1415 | assert(bus)do { if ((__builtin_expect(!!(!(bus)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("bus"), "../src/machine/machine-dbus.c", 1415, __PRETTY_FUNCTION__); } while (0); |
1416 | assert(path)do { if ((__builtin_expect(!!(!(path)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("path"), "../src/machine/machine-dbus.c" , 1416, __PRETTY_FUNCTION__); } while (0); |
1417 | assert(nodes)do { if ((__builtin_expect(!!(!(nodes)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("nodes"), "../src/machine/machine-dbus.c" , 1417, __PRETTY_FUNCTION__); } while (0); |
1418 | |
1419 | HASHMAP_FOREACH(machine, m->machines, i)for ((i) = ((Iterator) { .idx = ((2147483647 *2U +1U) - 1), . next_key = ((void*)0) }); hashmap_iterate((m->machines), & (i), (void**)&(machine), ((void*)0)); ) { |
1420 | char *p; |
1421 | |
1422 | p = machine_bus_path(machine); |
1423 | if (!p) |
1424 | return -ENOMEM12; |
1425 | |
1426 | r = strv_consume(&l, p); |
1427 | if (r < 0) |
1428 | return r; |
1429 | } |
1430 | |
1431 | *nodes = TAKE_PTR(l)({ typeof(l) _ptr_ = (l); (l) = ((void*)0); _ptr_; }); |
1432 | |
1433 | return 1; |
1434 | } |
1435 | |
1436 | int machine_send_signal(Machine *m, bool_Bool new_machine) { |
1437 | _cleanup_free___attribute__((cleanup(freep))) char *p = NULL((void*)0); |
1438 | |
1439 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/machine/machine-dbus.c", 1439 , __PRETTY_FUNCTION__); } while (0); |
1440 | |
1441 | p = machine_bus_path(m); |
1442 | if (!p) |
1443 | return -ENOMEM12; |
1444 | |
1445 | return sd_bus_emit_signal( |
1446 | m->manager->bus, |
1447 | "/org/freedesktop/machine1", |
1448 | "org.freedesktop.machine1.Manager", |
1449 | new_machine ? "MachineNew" : "MachineRemoved", |
1450 | "so", m->name, p); |
1451 | } |
1452 | |
1453 | int machine_send_create_reply(Machine *m, sd_bus_error *error) { |
1454 | _cleanup_(sd_bus_message_unrefp)__attribute__((cleanup(sd_bus_message_unrefp))) sd_bus_message *c = NULL((void*)0); |
1455 | _cleanup_free___attribute__((cleanup(freep))) char *p = NULL((void*)0); |
1456 | |
1457 | assert(m)do { if ((__builtin_expect(!!(!(m)),0))) log_assert_failed_realm (LOG_REALM_SYSTEMD, ("m"), "../src/machine/machine-dbus.c", 1457 , __PRETTY_FUNCTION__); } while (0); |
1458 | |
1459 | if (!m->create_message) |
1460 | return 0; |
1461 | |
1462 | c = TAKE_PTR(m->create_message)({ typeof(m->create_message) _ptr_ = (m->create_message ); (m->create_message) = ((void*)0); _ptr_; }); |
1463 | |
1464 | if (error) |
1465 | return sd_bus_reply_method_error(c, error); |
1466 | |
1467 | /* Update the machine state file before we notify the client |
1468 | * about the result. */ |
1469 | machine_save(m); |
1470 | |
1471 | p = machine_bus_path(m); |
1472 | if (!p) |
1473 | return -ENOMEM12; |
1474 | |
1475 | return sd_bus_reply_method_return(c, "o", p); |
1476 | } |