[Toybox] [PATCH] nsenter: A tool to use setns(2)

Andy Lutomirski luto at amacapital.net
Fri Oct 17 20:01:18 PDT 2014


# HG changeset patch
# User Andy Lutomirski <luto at amacapital.net>
# Date 1413601258 25200
#      Fri Oct 17 20:00:58 2014 -0700
# Node ID 5520248c82b288cb03ae53de623feab8c9e2d4ce
# Parent  5330d3f88fa344a7eb9fada28944394663cd3562
nsenter: A tool to use setns(2)

This implements all of the namespace parts of nsenter, but UID and GID
switching are missing, as are -r and -w (both because they're not strictly
necessary and because the nsenter manpage has an insufficient
description of how they work).

diff -r 5330d3f88fa3 -r 5520248c82b2 toys/other/nsenter.c
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/toys/other/nsenter.c	Fri Oct 17 20:00:58 2014 -0700
@@ -0,0 +1,104 @@
+/* nsenter.c - Enter existing namespaces
+ *
+ * Copyright 2014 andy Lutomirski <luto at amacapital.net>
+
+USE_NSENTER(NEWTOY(nsenter, "<1F(no-fork)t#(target)i:(ipc);m:(mount);n:(net);p:(pid);u:(uts);U:(user);", TOYFLAG_USR|TOYFLAG_BIN))
+
+config NSENTER
+  bool "nsenter"
+  default n
+  help
+    usage: nsenter [-t pid] [-F] [-i] [-m] [-n] [-p] [-u] [-U] COMMAND...
+
+    Run COMMAND in a different set of namespaces.
+
+    -T  PID to take namespaces from
+    -F  don't fork, even if -p is set
+
+    The namespaces to switch are:
+
+    -i	SysV IPC (message queues, semaphores, shared memory)
+    -m	Mount/unmount tree
+    -n	Network address, sockets, routing, iptables
+    -p	Process IDs and init (will fork unless -F is used)
+    -u	Host and domain names
+    -U	UIDs, GIDs, capabilities
+
+    Each of those options takes an optional argument giving the path of
+    the namespace file (usually in /proc).  This optional argument is
+    mandatory unless -t is used.
+*/
+
+#define FOR_nsenter
+#define _GNU_SOURCE
+#include "toys.h"
+#include <errno.h>
+#include <sched.h>
+#include <linux/sched.h>
+
+#define NUM_NSTYPES 6
+
+struct nstype {
+  int type;
+  const char *name;
+};
+
+struct nstype nstypes[NUM_NSTYPES] = {
+  {CLONE_NEWUSER, "user"}, /* must be first to allow non-root operation */
+  {CLONE_NEWUTS,  "uts"},
+  {CLONE_NEWPID,  "pid"},
+  {CLONE_NEWNET,  "net"},
+  {CLONE_NEWNS,   "mnt"},
+  {CLONE_NEWIPC,  "ipc"},
+};
+
+GLOBALS(
+  char *nsnames[6];
+  long targetpid;
+)
+
+static void enter_by_name(int idx)
+{
+  int fd, rc;
+  char buf[64];
+  char *filename = TT.nsnames[idx];
+
+  if (!(toys.optflags & (1<<idx))) return;
+
+  if (!filename || !*filename) {
+    if (!(toys.optflags & (1<<NUM_NSTYPES)))
+      error_exit("either -t or an ns filename is required");
+    sprintf(buf, "/proc/%ld/ns/%s", TT.targetpid, nstypes[idx].name);
+    filename = buf;
+  }
+
+  fd = open(filename, O_RDONLY | O_CLOEXEC);
+  if (fd == -1) perror_exit(filename);
+
+  rc = setns(fd, nstypes[idx].type);
+  if (CFG_TOYBOX_FREE) close(fd);
+  if (rc != 0) perror_exit("setns");
+}
+
+void nsenter_main(void)
+{
+  int i;
+
+  for (i = 0; i < NUM_NSTYPES; i++)
+    enter_by_name(i);
+
+  if ((toys.optflags & (1<<2)) && !(toys.optflags & 1<<(NUM_NSTYPES+1))) {
+    /* changed PID ns and --no-fork wasn't set, so fork. */
+    pid_t pid = fork();
+
+    if (pid == -1) {
+      perror_exit("fork");
+    } else if (pid != 0) {
+      while (waitpid(pid, 0, 0) == -1 && errno == EINTR)
+        ;
+      return;
+    }
+  }
+
+  xexec_optargs(0);
+}

 1413601278.0


More information about the Toybox mailing list