2011-03-04 23:53:19 +03:00
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
/***
This file is part of systemd .
Copyright 2010 Lennart Poettering
systemd is free software ; you can redistribute it and / or modify it
2012-04-12 02:20:58 +04:00
under the terms of the GNU Lesser General Public License as published by
the Free Software Foundation ; either version 2.1 of the License , or
2011-03-04 23:53:19 +03:00
( at your option ) any later version .
systemd is distributed in the hope that it will be useful , but
WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the GNU
2012-04-12 02:20:58 +04:00
Lesser General Public License for more details .
2011-03-04 23:53:19 +03:00
2012-04-12 02:20:58 +04:00
You should have received a copy of the GNU Lesser General Public License
2011-03-04 23:53:19 +03:00
along with systemd ; If not , see < http : //www.gnu.org/licenses/>.
* * */
# include <unistd.h>
# include <stdio.h>
# include <errno.h>
# include <string.h>
# include <fcntl.h>
# include <sys/mount.h>
2014-07-31 12:15:29 +04:00
# include "systemd/sd-id128.h"
2012-01-05 19:01:58 +04:00
2012-04-12 16:28:43 +04:00
# include "machine-id-setup.h"
2011-03-04 23:53:19 +03:00
# include "macro.h"
# include "util.h"
2012-04-10 23:54:31 +04:00
# include "mkdir.h"
2011-03-04 23:53:19 +03:00
# include "log.h"
2012-02-15 22:16:08 +04:00
# include "virt.h"
2013-02-14 15:26:13 +04:00
# include "fileio.h"
2014-03-14 16:43:21 +04:00
# include "path-util.h"
2011-07-25 21:31:07 +04:00
2014-06-10 21:15:06 +04:00
static int shorten_uuid ( char destination [ 34 ] , const char source [ 36 ] ) {
2012-03-14 17:06:42 +04:00
unsigned i , j ;
for ( i = 0 , j = 0 ; i < 36 & & j < 32 ; i + + ) {
int t ;
t = unhexchar ( source [ i ] ) ;
if ( t < 0 )
continue ;
destination [ j + + ] = hexchar ( t ) ;
}
if ( i = = 36 & & j = = 32 ) {
destination [ 32 ] = ' \n ' ;
destination [ 33 ] = 0 ;
return 0 ;
}
return - EINVAL ;
}
2014-03-14 08:43:04 +04:00
static int generate ( char id [ 34 ] , const char * root ) {
2011-10-07 23:06:39 +04:00
int fd , r ;
unsigned char * p ;
sd_id128_t buf ;
2014-08-20 15:49:39 +04:00
char * q ;
const char * vm_id , * dbus_machine_id ;
2011-03-04 23:53:19 +03:00
assert ( id ) ;
2014-08-20 15:49:39 +04:00
if ( isempty ( root ) )
dbus_machine_id = " /var/lib/dbus/machine-id " ;
else
2015-02-03 04:05:59 +03:00
dbus_machine_id = strjoina ( root , " /var/lib/dbus/machine-id " ) ;
2014-03-14 08:43:04 +04:00
2011-03-04 23:53:19 +03:00
/* First, try reading the D-Bus machine id, unless it is a symlink */
2014-03-14 08:43:04 +04:00
fd = open ( dbus_machine_id , O_RDONLY | O_CLOEXEC | O_NOCTTY | O_NOFOLLOW ) ;
2011-07-25 21:31:07 +04:00
if ( fd > = 0 ) {
2015-03-10 04:23:53 +03:00
r = loop_read_exact ( fd , id , 33 , false ) ;
2014-03-18 22:22:43 +04:00
safe_close ( fd ) ;
2011-03-04 23:53:19 +03:00
2015-03-10 04:23:53 +03:00
if ( r > = 0 & & id [ 32 ] = = ' \n ' ) {
2013-04-30 01:39:12 +04:00
id [ 32 ] = 0 ;
if ( id128_is_valid ( id ) ) {
id [ 32 ] = ' \n ' ;
id [ 33 ] = 0 ;
log_info ( " Initializing machine ID from D-Bus machine ID. " ) ;
return 0 ;
}
2011-03-04 23:53:19 +03:00
}
}
2014-08-20 15:49:39 +04:00
if ( isempty ( root ) ) {
/* If that didn't work, see if we are running in a container,
* and a machine ID was passed in via $ container_uuid the way
* libvirt / LXC does it */
r = detect_container ( NULL ) ;
2012-04-22 16:48:46 +04:00
if ( r > 0 ) {
2014-08-20 15:49:39 +04:00
_cleanup_free_ char * e = NULL ;
2014-04-28 20:11:40 +04:00
2014-08-20 15:49:39 +04:00
r = getenv_for_pid ( 1 , " container_uuid " , & e ) ;
if ( r > 0 ) {
if ( strlen ( e ) > = 36 ) {
r = shorten_uuid ( id , e ) ;
2014-04-28 20:11:40 +04:00
if ( r > = 0 ) {
2014-08-20 15:49:39 +04:00
log_info ( " Initializing machine ID from container UUID. " ) ;
2014-04-28 20:11:40 +04:00
return 0 ;
}
}
}
2014-08-20 15:49:39 +04:00
} else {
/* If we are not running in a container, see if we are
* running in qemu / kvm and a machine ID was passed in
* via - uuid on the qemu / kvm command line */
r = detect_vm ( & vm_id ) ;
if ( r > 0 & & streq ( vm_id , " kvm " ) ) {
2015-03-10 04:23:53 +03:00
char uuid [ 36 ] ;
2014-08-20 15:49:39 +04:00
fd = open ( " /sys/class/dmi/id/product_uuid " , O_RDONLY | O_CLOEXEC | O_NOCTTY | O_NOFOLLOW ) ;
if ( fd > = 0 ) {
2015-03-10 04:23:53 +03:00
r = loop_read_exact ( fd , uuid , 36 , false ) ;
2014-08-20 15:49:39 +04:00
safe_close ( fd ) ;
2015-03-10 04:23:53 +03:00
if ( r > = 0 ) {
2014-08-20 15:49:39 +04:00
r = shorten_uuid ( id , uuid ) ;
if ( r > = 0 ) {
log_info ( " Initializing machine ID from KVM UUID. " ) ;
return 0 ;
}
}
}
}
2014-04-28 20:11:40 +04:00
}
2012-02-15 22:16:08 +04:00
}
2011-03-04 23:53:19 +03:00
/* If that didn't work, generate a random machine id */
2011-10-07 23:06:39 +04:00
r = sd_id128_randomize ( & buf ) ;
2014-11-28 20:23:20 +03:00
if ( r < 0 )
return log_error_errno ( r , " Failed to open /dev/urandom: %m " ) ;
2011-03-04 23:53:19 +03:00
2011-10-07 23:06:39 +04:00
for ( p = buf . bytes , q = id ; p < buf . bytes + sizeof ( buf ) ; p + + , q + = 2 ) {
2011-03-04 23:53:19 +03:00
q [ 0 ] = hexchar ( * p > > 4 ) ;
q [ 1 ] = hexchar ( * p & 15 ) ;
}
id [ 32 ] = ' \n ' ;
id [ 33 ] = 0 ;
log_info ( " Initializing machine ID from random generator. " ) ;
return 0 ;
}
2014-11-24 11:40:57 +03:00
static int get_valid_machine_id ( int fd , char id [ 34 ] ) {
char id_to_validate [ 34 ] ;
assert ( fd > = 0 ) ;
assert ( id ) ;
2015-03-10 04:23:53 +03:00
if ( loop_read_exact ( fd , id_to_validate , 33 , false ) > = 0 & &
id_to_validate [ 32 ] = = ' \n ' ) {
2014-11-24 11:40:57 +03:00
id_to_validate [ 32 ] = 0 ;
if ( id128_is_valid ( id_to_validate ) ) {
memcpy ( id , id_to_validate , 32 ) ;
id [ 32 ] = ' \n ' ;
id [ 33 ] = 0 ;
return 0 ;
}
}
return - EINVAL ;
}
static int write_machine_id ( int fd , char id [ 34 ] ) {
assert ( fd > = 0 ) ;
assert ( id ) ;
lseek ( fd , 0 , SEEK_SET ) ;
2014-12-02 04:43:19 +03:00
if ( loop_write ( fd , id , 33 , false ) = = 0 )
2014-11-24 11:40:57 +03:00
return 0 ;
return - errno ;
}
2014-11-24 11:43:29 +03:00
int machine_id_commit ( const char * root ) {
_cleanup_close_ int fd = - 1 , initial_mntns_fd = - 1 ;
const char * etc_machine_id ;
char id [ 34 ] ; /* 32 + \n + \0 */
int r ;
if ( isempty ( root ) )
etc_machine_id = " /etc/machine-id " ;
else {
char * x ;
2015-02-03 04:05:59 +03:00
x = strjoina ( root , " /etc/machine-id " ) ;
2014-11-24 11:43:29 +03:00
etc_machine_id = path_kill_slashes ( x ) ;
}
r = path_is_mount_point ( etc_machine_id , false ) ;
if ( r < 0 )
2014-12-29 12:45:58 +03:00
return log_error_errno ( r , " Failed to determine whether %s is a mount point: %m " , etc_machine_id ) ;
2014-11-24 11:43:29 +03:00
if ( r = = 0 ) {
log_debug ( " %s is is not a mount point. Nothing to do. " , etc_machine_id ) ;
return 0 ;
}
/* Read existing machine-id */
fd = open ( etc_machine_id , O_RDONLY | O_CLOEXEC | O_NOCTTY ) ;
if ( fd < 0 )
return log_error_errno ( errno , " Cannot open %s: %m " , etc_machine_id ) ;
r = get_valid_machine_id ( fd , id ) ;
if ( r < 0 )
return log_error_errno ( r , " We didn't find a valid machine ID in %s. " , etc_machine_id ) ;
r = is_fd_on_temporary_fs ( fd ) ;
if ( r < 0 )
return log_error_errno ( r , " Failed to determine whether %s is on a temporary file system: %m " , etc_machine_id ) ;
if ( r = = 0 ) {
log_error ( " %s is not on a temporary file system. " , etc_machine_id ) ;
return - EROFS ;
}
fd = safe_close ( fd ) ;
/* Store current mount namespace */
r = namespace_open ( 0 , NULL , & initial_mntns_fd , NULL , NULL ) ;
if ( r < 0 )
return log_error_errno ( r , " Can't fetch current mount namespace: %m " ) ;
/* Switch to a new mount namespace, isolate ourself and unmount etc_machine_id in our new namespace */
if ( unshare ( CLONE_NEWNS ) < 0 )
return log_error_errno ( errno , " Failed to enter new namespace: %m " ) ;
if ( mount ( NULL , " / " , NULL , MS_SLAVE | MS_REC , NULL ) < 0 )
return log_error_errno ( errno , " Couldn't make-rslave / mountpoint in our private namespace: %m " ) ;
if ( umount ( etc_machine_id ) < 0 )
return log_error_errno ( errno , " Failed to unmount transient %s file in our private namespace: %m " , etc_machine_id ) ;
/* Update a persistent version of etc_machine_id */
fd = open ( etc_machine_id , O_RDWR | O_CREAT | O_CLOEXEC | O_NOCTTY , 0444 ) ;
if ( fd < 0 )
return log_error_errno ( errno , " Cannot open for writing %s. This is mandatory to get a persistent machine-id: %m " , etc_machine_id ) ;
r = write_machine_id ( fd , id ) ;
if ( r < 0 )
return log_error_errno ( r , " Cannot write %s: %m " , etc_machine_id ) ;
fd = safe_close ( fd ) ;
/* Return to initial namespace and proceed a lazy tmpfs unmount */
r = namespace_enter ( - 1 , initial_mntns_fd , - 1 , - 1 ) ;
if ( r < 0 )
return log_warning_errno ( r , " Failed to switch back to initial mount namespace: %m. \n We'll keep transient %s file until next reboot. " , etc_machine_id ) ;
if ( umount2 ( etc_machine_id , MNT_DETACH ) < 0 )
return log_warning_errno ( errno , " Failed to unmount transient %s file: %m. \n We keep that mount until next reboot. " , etc_machine_id ) ;
return 0 ;
}
2014-03-14 08:43:04 +04:00
int machine_id_setup ( const char * root ) {
2014-06-17 05:25:02 +04:00
const char * etc_machine_id , * run_machine_id ;
2013-04-09 00:43:52 +04:00
_cleanup_close_ int fd = - 1 ;
2014-10-31 12:16:45 +03:00
bool writable = true ;
2011-03-04 23:53:19 +03:00
struct stat st ;
char id [ 34 ] ; /* 32 + \n + \0 */
2014-06-17 05:25:02 +04:00
int r ;
2014-03-14 08:43:04 +04:00
2014-06-17 05:25:02 +04:00
if ( isempty ( root ) ) {
etc_machine_id = " /etc/machine-id " ;
run_machine_id = " /run/machine-id " ;
} else {
2014-12-03 05:13:34 +03:00
char * x ;
2014-03-14 08:43:04 +04:00
2015-02-03 04:05:59 +03:00
x = strjoina ( root , " /etc/machine-id " ) ;
2014-12-03 05:13:34 +03:00
etc_machine_id = path_kill_slashes ( x ) ;
2015-02-03 04:05:59 +03:00
x = strjoina ( root , " /run/machine-id " ) ;
2014-12-03 05:13:34 +03:00
run_machine_id = path_kill_slashes ( x ) ;
2014-06-17 05:25:02 +04:00
}
2011-03-04 23:53:19 +03:00
2013-04-04 05:39:39 +04:00
RUN_WITH_UMASK ( 0000 ) {
/* We create this 0444, to indicate that this isn't really
* something you should ever modify . Of course , since the file
* will be owned by root it doesn ' t matter much , but maybe
* people look . */
2014-06-24 15:30:11 +04:00
mkdir_parents ( etc_machine_id , 0755 ) ;
2014-03-14 08:43:04 +04:00
fd = open ( etc_machine_id , O_RDWR | O_CREAT | O_CLOEXEC | O_NOCTTY , 0444 ) ;
2014-10-31 12:16:45 +03:00
if ( fd < 0 ) {
int old_errno = errno ;
2014-03-14 08:43:04 +04:00
fd = open ( etc_machine_id , O_RDONLY | O_CLOEXEC | O_NOCTTY ) ;
2013-04-04 05:39:39 +04:00
if ( fd < 0 ) {
2014-10-31 12:16:45 +03:00
if ( old_errno = = EROFS & & errno = = ENOENT )
log_error ( " System cannot boot: Missing /etc/machine-id and /etc is mounted read-only. \n "
" Booting up is supported only when: \n "
" 1) /etc/machine-id exists and is populated. \n "
" 2) /etc/machine-id exists and is empty. \n "
" 3) /etc/machine-id is missing and /etc is writable. \n " ) ;
else
2014-11-28 21:29:59 +03:00
log_error_errno ( errno , " Cannot open %s: %m " , etc_machine_id ) ;
2013-04-04 05:39:39 +04:00
return - errno ;
}
2011-03-05 00:50:56 +03:00
2013-04-04 05:39:39 +04:00
writable = false ;
2011-03-04 23:53:19 +03:00
}
}
2014-11-28 21:57:32 +03:00
if ( fstat ( fd , & st ) < 0 )
return log_error_errno ( errno , " fstat() failed : % m " ) ;
2011-03-04 23:53:19 +03:00
2014-11-24 11:40:57 +03:00
if ( S_ISREG ( st . st_mode ) & & get_valid_machine_id ( fd , id ) = = 0 )
return 0 ;
2011-03-04 23:53:19 +03:00
/* Hmm, so, the id currently stored is not useful, then let's
* generate one */
2014-03-14 08:43:04 +04:00
r = generate ( id , root ) ;
2011-07-25 21:31:07 +04:00
if ( r < 0 )
2013-04-09 00:43:52 +04:00
return r ;
2011-03-04 23:53:19 +03:00
2014-12-02 04:43:19 +03:00
if ( S_ISREG ( st . st_mode ) & & writable )
2014-11-24 11:40:57 +03:00
if ( write_machine_id ( fd , id ) = = 0 )
2013-04-09 00:43:52 +04:00
return 0 ;
2011-03-04 23:53:19 +03:00
2014-03-18 22:22:43 +04:00
fd = safe_close ( fd ) ;
2011-03-04 23:53:19 +03:00
/* Hmm, we couldn't write it? So let's write it to
2012-04-11 14:49:52 +04:00
* / run / machine - id as a replacement */
2011-03-04 23:53:19 +03:00
2013-04-04 05:39:39 +04:00
RUN_WITH_UMASK ( 0022 ) {
2014-03-14 08:43:04 +04:00
r = write_string_file ( run_machine_id , id ) ;
2013-04-04 05:39:39 +04:00
}
2011-07-25 21:31:07 +04:00
if ( r < 0 ) {
2014-11-28 15:19:16 +03:00
log_error_errno ( r , " Cannot write %s: %m " , run_machine_id ) ;
2014-03-14 08:43:04 +04:00
unlink ( run_machine_id ) ;
2013-04-09 00:43:52 +04:00
return r ;
2011-03-04 23:53:19 +03:00
}
/* And now, let's mount it over */
2014-03-14 08:43:04 +04:00
r = mount ( run_machine_id , etc_machine_id , NULL , MS_BIND , NULL ) ;
2012-04-11 14:49:52 +04:00
if ( r < 0 ) {
2014-11-28 21:29:59 +03:00
log_error_errno ( errno , " Failed to mount %s: %m " , etc_machine_id ) ;
2014-03-14 08:43:04 +04:00
unlink_noerrno ( run_machine_id ) ;
2013-04-09 00:43:52 +04:00
return - errno ;
2012-08-13 18:24:30 +04:00
}
2014-03-14 08:43:04 +04:00
log_info ( " Installed transient %s file. " , etc_machine_id ) ;
2011-03-04 23:53:19 +03:00
2013-04-09 00:43:52 +04:00
/* Mark the mount read-only */
2014-03-14 08:43:04 +04:00
if ( mount ( NULL , etc_machine_id , NULL , MS_BIND | MS_RDONLY | MS_REMOUNT , NULL ) < 0 )
2014-11-28 21:29:59 +03:00
log_warning_errno ( errno , " Failed to make transient %s read-only: %m " , etc_machine_id ) ;
2011-03-04 23:53:19 +03:00
2013-04-09 00:43:52 +04:00
return 0 ;
2011-03-04 23:53:19 +03:00
}