1*1a96fba6SXin Li // Copyright 2020 The Chromium OS Authors. All rights reserved.
2*1a96fba6SXin Li // Use of this source code is governed by a BSD-style license that can be
3*1a96fba6SXin Li // found in the LICENSE file.
4*1a96fba6SXin Li
5*1a96fba6SXin Li // Contains the implementation of class MountNamespace for libbrillo.
6*1a96fba6SXin Li
7*1a96fba6SXin Li #include "brillo/namespaces/mount_namespace.h"
8*1a96fba6SXin Li
9*1a96fba6SXin Li #include <sched.h>
10*1a96fba6SXin Li #include <sys/mount.h>
11*1a96fba6SXin Li #include <sys/types.h>
12*1a96fba6SXin Li
13*1a96fba6SXin Li #include <string>
14*1a96fba6SXin Li
15*1a96fba6SXin Li #include <base/files/file_path.h>
16*1a96fba6SXin Li #include <base/files/file_util.h>
17*1a96fba6SXin Li #include <base/logging.h>
18*1a96fba6SXin Li #include <base/strings/stringprintf.h>
19*1a96fba6SXin Li #include <brillo/namespaces/platform.h>
20*1a96fba6SXin Li
21*1a96fba6SXin Li namespace brillo {
MountNamespace(const base::FilePath & ns_path,Platform * platform)22*1a96fba6SXin Li MountNamespace::MountNamespace(const base::FilePath& ns_path,
23*1a96fba6SXin Li Platform* platform)
24*1a96fba6SXin Li : ns_path_(ns_path), platform_(platform), exists_(false) {}
25*1a96fba6SXin Li
~MountNamespace()26*1a96fba6SXin Li MountNamespace::~MountNamespace() {
27*1a96fba6SXin Li if (exists_)
28*1a96fba6SXin Li Destroy();
29*1a96fba6SXin Li }
30*1a96fba6SXin Li
Create()31*1a96fba6SXin Li bool MountNamespace::Create() {
32*1a96fba6SXin Li if (platform_->FileSystemIsNsfs(ns_path_)) {
33*1a96fba6SXin Li LOG(ERROR) << "Mount namespace at " << ns_path_.value()
34*1a96fba6SXin Li << " already exists.";
35*1a96fba6SXin Li return false;
36*1a96fba6SXin Li }
37*1a96fba6SXin Li int fd_mounted[2];
38*1a96fba6SXin Li int fd_unshared[2];
39*1a96fba6SXin Li char byte = '\0';
40*1a96fba6SXin Li if (pipe(fd_mounted) != 0) {
41*1a96fba6SXin Li PLOG(ERROR) << "Cannot create mount signalling pipe";
42*1a96fba6SXin Li return false;
43*1a96fba6SXin Li }
44*1a96fba6SXin Li if (pipe(fd_unshared) != 0) {
45*1a96fba6SXin Li PLOG(ERROR) << "Cannot create unshare signalling pipe";
46*1a96fba6SXin Li return false;
47*1a96fba6SXin Li }
48*1a96fba6SXin Li pid_t pid = platform_->Fork();
49*1a96fba6SXin Li if (pid < 0) {
50*1a96fba6SXin Li PLOG(ERROR) << "Fork failed";
51*1a96fba6SXin Li } else if (pid == 0) {
52*1a96fba6SXin Li // Child.
53*1a96fba6SXin Li close(fd_mounted[1]);
54*1a96fba6SXin Li close(fd_unshared[0]);
55*1a96fba6SXin Li if (unshare(CLONE_NEWNS) != 0) {
56*1a96fba6SXin Li PLOG(ERROR) << "unshare(CLONE_NEWNS) failed";
57*1a96fba6SXin Li exit(1);
58*1a96fba6SXin Li }
59*1a96fba6SXin Li base::WriteFileDescriptor(fd_unshared[1], &byte, 1);
60*1a96fba6SXin Li base::ReadFromFD(fd_mounted[0], &byte, 1);
61*1a96fba6SXin Li exit(0);
62*1a96fba6SXin Li } else {
63*1a96fba6SXin Li // Parent.
64*1a96fba6SXin Li close(fd_mounted[0]);
65*1a96fba6SXin Li close(fd_unshared[1]);
66*1a96fba6SXin Li std::string proc_ns_path = base::StringPrintf("/proc/%d/ns/mnt", pid);
67*1a96fba6SXin Li bool mount_success = true;
68*1a96fba6SXin Li base::ReadFromFD(fd_unshared[0], &byte, 1);
69*1a96fba6SXin Li if (platform_->Mount(proc_ns_path, ns_path_.value(), "", MS_BIND) != 0) {
70*1a96fba6SXin Li PLOG(ERROR) << "Mount(" << proc_ns_path << ", " << ns_path_.value()
71*1a96fba6SXin Li << ", MS_BIND) failed";
72*1a96fba6SXin Li mount_success = false;
73*1a96fba6SXin Li }
74*1a96fba6SXin Li base::WriteFileDescriptor(fd_mounted[1], &byte, 1);
75*1a96fba6SXin Li
76*1a96fba6SXin Li int status;
77*1a96fba6SXin Li if (platform_->Waitpid(pid, &status) < 0) {
78*1a96fba6SXin Li PLOG(ERROR) << "waitpid(" << pid << ") failed";
79*1a96fba6SXin Li return false;
80*1a96fba6SXin Li }
81*1a96fba6SXin Li if (!WIFEXITED(status)) {
82*1a96fba6SXin Li LOG(ERROR) << "Child process did not exit normally.";
83*1a96fba6SXin Li } else if (WEXITSTATUS(status) != 0) {
84*1a96fba6SXin Li LOG(ERROR) << "Child process failed.";
85*1a96fba6SXin Li } else {
86*1a96fba6SXin Li exists_ = mount_success;
87*1a96fba6SXin Li }
88*1a96fba6SXin Li }
89*1a96fba6SXin Li return exists_;
90*1a96fba6SXin Li }
91*1a96fba6SXin Li
Destroy()92*1a96fba6SXin Li bool MountNamespace::Destroy() {
93*1a96fba6SXin Li if (!exists_) {
94*1a96fba6SXin Li LOG(ERROR) << "Mount namespace at " << ns_path_.value()
95*1a96fba6SXin Li << "does not exist, cannot destroy";
96*1a96fba6SXin Li return false;
97*1a96fba6SXin Li }
98*1a96fba6SXin Li bool was_busy;
99*1a96fba6SXin Li if (!platform_->Unmount(ns_path_, false /*lazy*/, &was_busy)) {
100*1a96fba6SXin Li PLOG(ERROR) << "Failed to unmount " << ns_path_.value();
101*1a96fba6SXin Li if (was_busy) {
102*1a96fba6SXin Li LOG(ERROR) << ns_path_.value().c_str() << " was busy";
103*1a96fba6SXin Li }
104*1a96fba6SXin Li // If Unmount() fails, keep the object valid by keeping |exists_|
105*1a96fba6SXin Li // set to true.
106*1a96fba6SXin Li return false;
107*1a96fba6SXin Li } else {
108*1a96fba6SXin Li VLOG(1) << "Unmounted namespace at " << ns_path_.value();
109*1a96fba6SXin Li }
110*1a96fba6SXin Li exists_ = false;
111*1a96fba6SXin Li return true;
112*1a96fba6SXin Li }
113*1a96fba6SXin Li
114*1a96fba6SXin Li } // namespace brillo
115