Home | History | Annotate | Download | only in other
      1 /* nsenter.c - Enter existing namespaces
      2  *
      3  * Copyright 2014 Andy Lutomirski <luto (at) amacapital.net>
      4  *
      5  * See http://man7.org/linux/man-pages/man1/nsenter.1.html
      6  *
      7  * unshare.c - run command in new context
      8  *
      9  * Copyright 2011 Rob Landley <rob (at) landley.net>
     10  *
     11  * See http://man7.org/linux/man-pages/man1/unshare.1.html
     12  *
     13 
     14 // Note: flags go in same order (right to left) for shared subset
     15 USE_NSENTER(NEWTOY(nsenter, "<1F(no-fork)t#<1(target)i:(ipc);m:(mount);n:(net);p:(pid);u:(uts);U:(user);", TOYFLAG_USR|TOYFLAG_BIN))
     16 USE_UNSHARE(NEWTOY(unshare, "<1^f(fork);r(map-root-user);i:(ipc);m:(mount);n:(net);p:(pid);u:(uts);U:(user);", TOYFLAG_USR|TOYFLAG_BIN))
     17 
     18 config UNSHARE
     19   bool "unshare"
     20   default y
     21   depends on TOYBOX_CONTAINER
     22   help
     23     usage: unshare [-imnpuUr] COMMAND...
     24 
     25     Create new container namespace(s) for this process and its children, so
     26     some attribute is not shared with the parent process.
     27 
     28     -f  Fork command in the background (--fork)
     29     -i	SysV IPC (message queues, semaphores, shared memory) (--ipc)
     30     -m	Mount/unmount tree (--mount)
     31     -n	Network address, sockets, routing, iptables (--net)
     32     -p	Process IDs and init (--pid)
     33     -r	Become root (map current euid/egid to 0/0, implies -U) (--map-root-user)
     34     -u	Host and domain names (--uts)
     35     -U	UIDs, GIDs, capabilities (--user)
     36 
     37     A namespace allows a set of processes to have a different view of the
     38     system than other sets of processes.
     39 
     40 config NSENTER
     41   bool "nsenter"
     42   depends on TOYBOX_CONTAINER
     43   default y
     44   help
     45     usage: nsenter [-t pid] [-F] [-i] [-m] [-n] [-p] [-u] [-U] COMMAND...
     46 
     47     Run COMMAND in an existing (set of) namespace(s).
     48 
     49     -t  PID to take namespaces from    (--target)
     50     -F  don't fork, even if -p is used (--no-fork)
     51 
     52     The namespaces to switch are:
     53 
     54     -i	SysV IPC: message queues, semaphores, shared memory (--ipc)
     55     -m	Mount/unmount tree (--mount)
     56     -n	Network address, sockets, routing, iptables (--net)
     57     -p	Process IDs and init, will fork unless -F is used (--pid)
     58     -u	Host and domain names (--uts)
     59     -U	UIDs, GIDs, capabilities (--user)
     60 
     61     If -t isn't specified, each namespace argument must provide a path
     62     to a namespace file, ala "-i=/proc/$PID/ns/ipc"
     63 */
     64 
     65 #define FOR_nsenter
     66 #include "toys.h"
     67 #include <linux/sched.h>
     68 int unshare(int flags);
     69 int setns(int fd, int nstype);
     70 
     71 GLOBALS(
     72   char *nsnames[6];
     73   long targetpid;
     74 )
     75 
     76 // Code that must run in unshare's flag context
     77 #define CLEANUP_nsenter
     78 #define FOR_unshare
     79 #include <generated/flags.h>
     80 
     81 static void write_ugid_map(char *map, unsigned eugid)
     82 {
     83   int bytes = sprintf(toybuf, "0 %u 1", eugid), fd = xopen(map, O_WRONLY);
     84 
     85   xwrite(fd, toybuf, bytes);
     86   xclose(fd);
     87 }
     88 
     89 static void handle_r(int euid, int egid)
     90 {
     91   int fd;
     92 
     93   if ((fd = open("/proc/self/setgroups", O_WRONLY)) >= 0) {
     94     xwrite(fd, "deny", 4);
     95     close(fd);
     96   }
     97 
     98   write_ugid_map("/proc/self/uid_map", euid);
     99   write_ugid_map("/proc/self/gid_map", egid);
    100 }
    101 
    102 static int test_r()
    103 {
    104   return toys.optflags & FLAG_r;
    105 }
    106 
    107 static int test_f()
    108 {
    109   return toys.optflags & FLAG_f;
    110 }
    111 
    112 // Shift back to the context GLOBALS lives in (I.E. matching the filename).
    113 #define CLEANUP_unshare
    114 #define FOR_nsenter
    115 #include <generated/flags.h>
    116 
    117 void unshare_main(void)
    118 {
    119   unsigned flags[]={CLONE_NEWUSER, CLONE_NEWUTS, CLONE_NEWPID, CLONE_NEWNET,
    120                     CLONE_NEWNS, CLONE_NEWIPC}, f = 0;
    121   int i, fd;
    122 
    123   // Create new namespace(s)?
    124   if (CFG_UNSHARE && *toys.which->name=='u') {
    125     // For -r, we have to save our original [ug]id before calling unshare()
    126     int euid = geteuid(), egid = getegid();
    127 
    128     // unshare -U does not imply -r, so we cannot use [+rU]
    129     if (test_r()) toys.optflags |= FLAG_U;
    130 
    131     for (i = 0; i<ARRAY_LEN(flags); i++)
    132       if (toys.optflags & (1<<i)) f |= flags[i];
    133 
    134     if (unshare(f)) perror_exit(0);
    135     if (test_r()) handle_r(euid, egid);
    136 
    137     if (test_f()) {
    138       toys.exitval = xrun(toys.optargs);
    139 
    140       return;
    141     }
    142   // Bind to existing namespace(s)?
    143   } else if (CFG_NSENTER) {
    144     char *nsnames = "user\0uts\0pid\0net\0mnt\0ipc";
    145 
    146     for (i = 0; i<ARRAY_LEN(flags); i++) {
    147       char *filename = TT.nsnames[i];
    148 
    149       if (toys.optflags & (1<<i)) {
    150         if (!filename || !*filename) {
    151           if (!(toys.optflags & FLAG_t)) error_exit("need -t or =filename");
    152           sprintf(toybuf, "/proc/%ld/ns/%s", TT.targetpid, nsnames);
    153           filename = toybuf;
    154         }
    155 
    156         if (setns(fd = xopenro(filename), flags[i])) perror_exit("setns");
    157         close(fd);
    158       }
    159       nsnames += strlen(nsnames)+1;
    160     }
    161 
    162     if ((toys.optflags & FLAG_p) && !(toys.optflags & FLAG_F)) {
    163       toys.exitval = xrun(toys.optargs);
    164 
    165       return;
    166     }
    167   }
    168 
    169   xexec(toys.optargs);
    170 }
    171 
    172 void nsenter_main(void)
    173 {
    174   unshare_main();
    175 }
    176