/* nsenter.c - Enter existing namespaces * * Copyright 2014 andy Lutomirski * * No standard * * unshare.c - run command in new context * * Copyright 2011 Rob Landley * * No Standard * // Note: flags go in same order (right to left) for shared subset USE_NSENTER(NEWTOY(nsenter, "<1F(no-fork)t#<1(target)i:(ipc);m:(mount);n:(net);p:(pid);u:(uts);U:(user);", TOYFLAG_USR|TOYFLAG_BIN)) USE_UNSHARE(NEWTOY(unshare, "<1^rimnpuU", TOYFLAG_USR|TOYFLAG_BIN)) config UNSHARE bool "unshare" default y depends on TOYBOX_CONTAINER help usage: unshare [-imnpuUr] COMMAND... Create new container namespace(s) for this process and its children, so some attribute is not shared with the parent process. -i SysV IPC (message queues, semaphores, shared memory) -m Mount/unmount tree -n Network address, sockets, routing, iptables -p Process IDs and init -r Become root (map current euid/egid to 0/0, implies -U) -u Host and domain names -U UIDs, GIDs, capabilities A namespace allows a set of processes to have a different view of the system than other sets of processes. config NSENTER bool "nsenter" default n help usage: nsenter [-t pid] [-F] [-i] [-m] [-n] [-p] [-u] [-U] COMMAND... Run COMMAND in an existing (set of) namespace(s). -t PID to take namespaces from (--target) -F don't fork, even if -p is used (--no-fork) The namespaces to switch are: -i SysV IPC: message queues, semaphores, shared memory (--ipc) -m Mount/unmount tree (--mnt) -n Network address, sockets, routing, iptables (--net) -p Process IDs and init, will fork unless -F is used (--pid) -u Host and domain names (--uts) -U UIDs, GIDs, capabilities (--user) If -t isn't specified, each namespace argument must provide a path to a namespace file, ala "-i=/proc/$PID/ns/ipc" */ #define FOR_nsenter #include "toys.h" #include int unshare(int flags); int setns(int fd, int nstype); GLOBALS( char *nsnames[6]; long targetpid; ) // Code that must run in unshare's flag context #define CLEANUP_nsenter #define FOR_unshare #include static void write_ugid_map(char *map, unsigned eugid) { int bytes = sprintf(toybuf, "0 %u 1", eugid), fd = xopen(map, O_WRONLY); xwrite(fd, toybuf, bytes); xclose(fd); } static int handle_r(int test) { int fd; if (!CFG_UNSHARE || !(toys.optflags & FLAG_r) || *toys.which->name!='u') return 0; if (!test) return 1; if (toys.optflags & FLAG_r) { if ((fd = open("/proc/self/setgroups", O_WRONLY)) >= 0) { xwrite(fd, "deny", 4); close(fd); } write_ugid_map("/proc/self/uid_map", geteuid()); write_ugid_map("/proc/self/gid_map", getegid()); } return 0; } // Shift back to the context GLOBALS lives in (I.E. matching the filename). #define CLEANUP_unshare #define FOR_nsenter #include void unshare_main(void) { unsigned flags[]={CLONE_NEWUSER, CLONE_NEWUTS, CLONE_NEWPID, CLONE_NEWNET, CLONE_NEWNS, CLONE_NEWIPC}, f = 0; int i, fd; // unshare -U does not imply -r, so we cannot use [+rU] if (handle_r(0)) toys.optflags |= FLAG_U; // Create new namespace(s)? if (CFG_UNSHARE && *toys.which->name=='u') { for (i = 0; i