xref: /aosp_15_r20/external/toybox/toys/other/nsenter.c (revision cf5a6c84e2b8763fc1a7db14496fd4742913b199)
1*cf5a6c84SAndroid Build Coastguard Worker /* nsenter.c - Enter existing namespaces
2*cf5a6c84SAndroid Build Coastguard Worker  *
3*cf5a6c84SAndroid Build Coastguard Worker  * Copyright 2014 Andy Lutomirski <[email protected]>
4*cf5a6c84SAndroid Build Coastguard Worker  *
5*cf5a6c84SAndroid Build Coastguard Worker  * See http://man7.org/linux/man-pages/man1/nsenter.1.html
6*cf5a6c84SAndroid Build Coastguard Worker  *
7*cf5a6c84SAndroid Build Coastguard Worker  * unshare.c - run command in new context
8*cf5a6c84SAndroid Build Coastguard Worker  *
9*cf5a6c84SAndroid Build Coastguard Worker  * Copyright 2011 Rob Landley <[email protected]>
10*cf5a6c84SAndroid Build Coastguard Worker  *
11*cf5a6c84SAndroid Build Coastguard Worker  * See http://man7.org/linux/man-pages/man1/unshare.1.html
12*cf5a6c84SAndroid Build Coastguard Worker  *
13*cf5a6c84SAndroid Build Coastguard Worker 
14*cf5a6c84SAndroid Build Coastguard Worker // Note: flags go in same order (right to left) for shared subset
15*cf5a6c84SAndroid Build Coastguard Worker USE_NSENTER(NEWTOY(nsenter, "<1a(all)F(no-fork)t#<1(target)C(cgroup):; i(ipc):; m(mount):; n(net):; p(pid):; u(uts):; U(user):; ", TOYFLAG_USR|TOYFLAG_BIN|TOYFLAG_STAYROOT))
16*cf5a6c84SAndroid Build Coastguard Worker USE_UNSHARE(NEWTOY(unshare, "<1^a(all)f(fork)r(map-root-user)C(cgroup):; i(ipc):; m(mount):; n(net):; p(pid):; u(uts):; U(user):; ", TOYFLAG_USR|TOYFLAG_BIN|TOYFLAG_STAYROOT))
17*cf5a6c84SAndroid Build Coastguard Worker 
18*cf5a6c84SAndroid Build Coastguard Worker config UNSHARE
19*cf5a6c84SAndroid Build Coastguard Worker   bool "unshare"
20*cf5a6c84SAndroid Build Coastguard Worker   default y
21*cf5a6c84SAndroid Build Coastguard Worker   help
22*cf5a6c84SAndroid Build Coastguard Worker     usage: unshare [-imnpuUr] COMMAND...
23*cf5a6c84SAndroid Build Coastguard Worker 
24*cf5a6c84SAndroid Build Coastguard Worker     Create new container namespace(s) for this process and its children, allowing
25*cf5a6c84SAndroid Build Coastguard Worker     the new set of processes to have a different view of the system than the
26*cf5a6c84SAndroid Build Coastguard Worker     parent process.
27*cf5a6c84SAndroid Build Coastguard Worker 
28*cf5a6c84SAndroid Build Coastguard Worker     -a	Unshare all supported namespaces
29*cf5a6c84SAndroid Build Coastguard Worker     -f	Fork command in the background (--fork)
30*cf5a6c84SAndroid Build Coastguard Worker     -r	Become root (map current euid/egid to 0/0, implies -U) (--map-root-user)
31*cf5a6c84SAndroid Build Coastguard Worker 
32*cf5a6c84SAndroid Build Coastguard Worker     Available namespaces:
33*cf5a6c84SAndroid Build Coastguard Worker     -C	Control groups (--cgroup)
34*cf5a6c84SAndroid Build Coastguard Worker     -i	SysV IPC (message queues, semaphores, shared memory) (--ipc)
35*cf5a6c84SAndroid Build Coastguard Worker     -m	Mount/unmount tree (--mount)
36*cf5a6c84SAndroid Build Coastguard Worker     -n	Network address, sockets, routing, iptables (--net)
37*cf5a6c84SAndroid Build Coastguard Worker     -p	Process IDs and init (--pid)
38*cf5a6c84SAndroid Build Coastguard Worker     -u	Host and domain names (--uts)
39*cf5a6c84SAndroid Build Coastguard Worker     -U	UIDs, GIDs, capabilities (--user)
40*cf5a6c84SAndroid Build Coastguard Worker 
41*cf5a6c84SAndroid Build Coastguard Worker     Each namespace can take an optional argument, a persistent mountpoint usable
42*cf5a6c84SAndroid Build Coastguard Worker     by the nsenter command to add new processes to that the namespace. (Specify
43*cf5a6c84SAndroid Build Coastguard Worker     multiple namespaces to unshare separately, ala -c -i -m because -cim is -c
44*cf5a6c84SAndroid Build Coastguard Worker     with persistent mount "im".)
45*cf5a6c84SAndroid Build Coastguard Worker 
46*cf5a6c84SAndroid Build Coastguard Worker config NSENTER
47*cf5a6c84SAndroid Build Coastguard Worker   bool "nsenter"
48*cf5a6c84SAndroid Build Coastguard Worker   default y
49*cf5a6c84SAndroid Build Coastguard Worker   help
50*cf5a6c84SAndroid Build Coastguard Worker     usage: nsenter [-t pid] [-F] [-i] [-m] [-n] [-p] [-u] [-U] COMMAND...
51*cf5a6c84SAndroid Build Coastguard Worker 
52*cf5a6c84SAndroid Build Coastguard Worker     Run COMMAND in an existing (set of) namespace(s).
53*cf5a6c84SAndroid Build Coastguard Worker 
54*cf5a6c84SAndroid Build Coastguard Worker     -a	Enter all supported namespaces (--all)
55*cf5a6c84SAndroid Build Coastguard Worker     -F	don't fork, even if -p is used (--no-fork)
56*cf5a6c84SAndroid Build Coastguard Worker     -t	PID to take namespaces from    (--target)
57*cf5a6c84SAndroid Build Coastguard Worker 
58*cf5a6c84SAndroid Build Coastguard Worker     The namespaces to switch are:
59*cf5a6c84SAndroid Build Coastguard Worker 
60*cf5a6c84SAndroid Build Coastguard Worker     -C	Control groups (--cgroup)
61*cf5a6c84SAndroid Build Coastguard Worker     -i	SysV IPC: message queues, semaphores, shared memory (--ipc)
62*cf5a6c84SAndroid Build Coastguard Worker     -m	Mount/unmount tree (--mount)
63*cf5a6c84SAndroid Build Coastguard Worker     -n	Network address, sockets, routing, iptables (--net)
64*cf5a6c84SAndroid Build Coastguard Worker     -p	Process IDs and init, will fork unless -F is used (--pid)
65*cf5a6c84SAndroid Build Coastguard Worker     -u	Host and domain names (--uts)
66*cf5a6c84SAndroid Build Coastguard Worker     -U	UIDs, GIDs, capabilities (--user)
67*cf5a6c84SAndroid Build Coastguard Worker 
68*cf5a6c84SAndroid Build Coastguard Worker     If -t isn't specified, each namespace argument must provide a path
69*cf5a6c84SAndroid Build Coastguard Worker     to a namespace file, ala "-i=/proc/$PID/ns/ipc"
70*cf5a6c84SAndroid Build Coastguard Worker */
71*cf5a6c84SAndroid Build Coastguard Worker 
72*cf5a6c84SAndroid Build Coastguard Worker #define FOR_nsenter
73*cf5a6c84SAndroid Build Coastguard Worker #include "toys.h"
74*cf5a6c84SAndroid Build Coastguard Worker #include <linux/sched.h>
75*cf5a6c84SAndroid Build Coastguard Worker 
76*cf5a6c84SAndroid Build Coastguard Worker #define unshare(flags) syscall(SYS_unshare, flags)
77*cf5a6c84SAndroid Build Coastguard Worker #define setns(fd, nstype) syscall(SYS_setns, fd, nstype)
78*cf5a6c84SAndroid Build Coastguard Worker 
GLOBALS(char * UupnmiC[7];long t;)79*cf5a6c84SAndroid Build Coastguard Worker GLOBALS(
80*cf5a6c84SAndroid Build Coastguard Worker   char *UupnmiC[7];
81*cf5a6c84SAndroid Build Coastguard Worker   long t;
82*cf5a6c84SAndroid Build Coastguard Worker )
83*cf5a6c84SAndroid Build Coastguard Worker 
84*cf5a6c84SAndroid Build Coastguard Worker // Code that must run in unshare's flag context
85*cf5a6c84SAndroid Build Coastguard Worker #define FOR_unshare
86*cf5a6c84SAndroid Build Coastguard Worker #include <generated/flags.h>
87*cf5a6c84SAndroid Build Coastguard Worker 
88*cf5a6c84SAndroid Build Coastguard Worker static void write_ugid_map(char *map, unsigned eugid)
89*cf5a6c84SAndroid Build Coastguard Worker {
90*cf5a6c84SAndroid Build Coastguard Worker   int fd = xopen(map, O_WRONLY);
91*cf5a6c84SAndroid Build Coastguard Worker 
92*cf5a6c84SAndroid Build Coastguard Worker   dprintf(fd, "0 %u 1", eugid);
93*cf5a6c84SAndroid Build Coastguard Worker   xclose(fd);
94*cf5a6c84SAndroid Build Coastguard Worker }
95*cf5a6c84SAndroid Build Coastguard Worker 
test_a()96*cf5a6c84SAndroid Build Coastguard Worker static int test_a() { return FLAG(a); }
test_r()97*cf5a6c84SAndroid Build Coastguard Worker static int test_r() { return FLAG(r); }
test_f()98*cf5a6c84SAndroid Build Coastguard Worker static int test_f() { return FLAG(f); }
99*cf5a6c84SAndroid Build Coastguard Worker 
100*cf5a6c84SAndroid Build Coastguard Worker // Shift back to the context GLOBALS lives in (I.E. matching the filename).
101*cf5a6c84SAndroid Build Coastguard Worker #define FOR_nsenter
102*cf5a6c84SAndroid Build Coastguard Worker #include <generated/flags.h>
103*cf5a6c84SAndroid Build Coastguard Worker 
unshare_main(void)104*cf5a6c84SAndroid Build Coastguard Worker void unshare_main(void)
105*cf5a6c84SAndroid Build Coastguard Worker {
106*cf5a6c84SAndroid Build Coastguard Worker   char *nsnames = "user\0uts\0pid\0net\0mnt\0ipc\0cgroup";
107*cf5a6c84SAndroid Build Coastguard Worker   unsigned flags[]={CLONE_NEWUSER, CLONE_NEWUTS, CLONE_NEWPID, CLONE_NEWNET,
108*cf5a6c84SAndroid Build Coastguard Worker                     CLONE_NEWNS, CLONE_NEWIPC, CLONE_NEWCGROUP}, f = 0;
109*cf5a6c84SAndroid Build Coastguard Worker   int i, fd;
110*cf5a6c84SAndroid Build Coastguard Worker 
111*cf5a6c84SAndroid Build Coastguard Worker   // Create new namespace(s)?
112*cf5a6c84SAndroid Build Coastguard Worker   if (CFG_UNSHARE && *toys.which->name=='u') {
113*cf5a6c84SAndroid Build Coastguard Worker     // For -r, we have to save our original [ug]id before calling unshare()
114*cf5a6c84SAndroid Build Coastguard Worker     int euid = geteuid(), egid = getegid();
115*cf5a6c84SAndroid Build Coastguard Worker 
116*cf5a6c84SAndroid Build Coastguard Worker     // unshare -U does not imply -r, so we cannot use [+rU]
117*cf5a6c84SAndroid Build Coastguard Worker     if (test_r()) toys.optflags |= FLAG_U;
118*cf5a6c84SAndroid Build Coastguard Worker 
119*cf5a6c84SAndroid Build Coastguard Worker     for (i = 0; i<ARRAY_LEN(flags); i++)
120*cf5a6c84SAndroid Build Coastguard Worker       if (test_a() || (toys.optflags & (1<<i))) f |= flags[i];
121*cf5a6c84SAndroid Build Coastguard Worker     if (unshare(f)) perror_exit(0);
122*cf5a6c84SAndroid Build Coastguard Worker     if (test_r()) {
123*cf5a6c84SAndroid Build Coastguard Worker       if ((fd = open("/proc/self/setgroups", O_WRONLY)) >= 0) {
124*cf5a6c84SAndroid Build Coastguard Worker         xwrite(fd, "deny", 4);
125*cf5a6c84SAndroid Build Coastguard Worker         close(fd);
126*cf5a6c84SAndroid Build Coastguard Worker       }
127*cf5a6c84SAndroid Build Coastguard Worker 
128*cf5a6c84SAndroid Build Coastguard Worker       write_ugid_map("/proc/self/uid_map", euid);
129*cf5a6c84SAndroid Build Coastguard Worker       write_ugid_map("/proc/self/gid_map", egid);
130*cf5a6c84SAndroid Build Coastguard Worker     }
131*cf5a6c84SAndroid Build Coastguard Worker 
132*cf5a6c84SAndroid Build Coastguard Worker     if (test_f()) {
133*cf5a6c84SAndroid Build Coastguard Worker       toys.exitval = xrun(toys.optargs);
134*cf5a6c84SAndroid Build Coastguard Worker 
135*cf5a6c84SAndroid Build Coastguard Worker       return;
136*cf5a6c84SAndroid Build Coastguard Worker     }
137*cf5a6c84SAndroid Build Coastguard Worker   // Bind to existing namespace(s)?
138*cf5a6c84SAndroid Build Coastguard Worker   } else if (CFG_NSENTER) {
139*cf5a6c84SAndroid Build Coastguard Worker     for (i = 0; i<ARRAY_LEN(flags); i++, nsnames += strlen(nsnames)+1) {
140*cf5a6c84SAndroid Build Coastguard Worker       if (FLAG(a) || (toys.optflags & (1<<i))) {
141*cf5a6c84SAndroid Build Coastguard Worker         char *filename = TT.UupnmiC[i];
142*cf5a6c84SAndroid Build Coastguard Worker 
143*cf5a6c84SAndroid Build Coastguard Worker         if (!filename || !*filename) {
144*cf5a6c84SAndroid Build Coastguard Worker           if (!FLAG(t)) error_exit("need -t or =filename");
145*cf5a6c84SAndroid Build Coastguard Worker           sprintf(filename = toybuf, "/proc/%ld/ns/%s", TT.t, nsnames);
146*cf5a6c84SAndroid Build Coastguard Worker         }
147*cf5a6c84SAndroid Build Coastguard Worker 
148*cf5a6c84SAndroid Build Coastguard Worker         if (setns(fd = xopenro(filename), flags[i])) perror_exit("setns");
149*cf5a6c84SAndroid Build Coastguard Worker         close(fd);
150*cf5a6c84SAndroid Build Coastguard Worker       }
151*cf5a6c84SAndroid Build Coastguard Worker     }
152*cf5a6c84SAndroid Build Coastguard Worker 
153*cf5a6c84SAndroid Build Coastguard Worker     if (FLAG(p) && !FLAG(F)) {
154*cf5a6c84SAndroid Build Coastguard Worker       toys.exitval = xrun(toys.optargs);
155*cf5a6c84SAndroid Build Coastguard Worker 
156*cf5a6c84SAndroid Build Coastguard Worker       return;
157*cf5a6c84SAndroid Build Coastguard Worker     }
158*cf5a6c84SAndroid Build Coastguard Worker   }
159*cf5a6c84SAndroid Build Coastguard Worker 
160*cf5a6c84SAndroid Build Coastguard Worker   xexec(toys.optargs);
161*cf5a6c84SAndroid Build Coastguard Worker }
162*cf5a6c84SAndroid Build Coastguard Worker 
nsenter_main(void)163*cf5a6c84SAndroid Build Coastguard Worker void nsenter_main(void)
164*cf5a6c84SAndroid Build Coastguard Worker {
165*cf5a6c84SAndroid Build Coastguard Worker   unshare_main();
166*cf5a6c84SAndroid Build Coastguard Worker }
167