public inbox for passt-dev@passt.top
 help / color / mirror / code / Atom feed
blob 2cb4fb3c1fd4d734cc67f65ab5befc539aa022c5 4434 bytes (raw)

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
 
// SPDX-License-Identifier: AGPL-3.0-or-later

/* nstool - maintain a namespace to be entered by other processes
 *
 * Copyright Red Hat
 * Author: David Gibson <david@gibson.dropbear.id.au>
 */

#define _GNU_SOURCE

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <stdbool.h>
#include <errno.h>
#include <unistd.h>
#include <getopt.h>
#include <sys/socket.h>
#include <linux/un.h>

#define die(...)				\
	do {					\
		fprintf(stderr, __VA_ARGS__);	\
		exit(1);			\
	} while (0)

static void usage(void)
{
	die("Usage:\n"
	    "  nstool hold SOCK\n"
	    "    Run within a set of namespaces, open a Unix domain control\n"
	    "    socket at SOCK and wait for requests from other nstool\n"
	    "    subcommands.\n"
	    "  nstool info [-pw] pid SOCK\n"
	    "    Print information about the nstool hold process with control\n"
	    "    socket at SOCK\n"
	    "      -p    Print just the holder's PID as seen by the caller\n"
	    "      -w    Retry connecting to SOCK until it is ready\n"
	    "  nstool stop SOCK\n"
	    "    Instruct the nstool hold with control socket at SOCK to\n"
	    "    terminate.\n");
}

static int connect_ctl(const char * sockpath, bool wait)
{
	int fd = socket(AF_UNIX, SOCK_STREAM, PF_UNIX);
	struct sockaddr_un addr = {
		.sun_family = AF_UNIX,
	};
	int rc;

	if (fd < 0)
		die("socket(): %s\n", strerror(errno));

	strncpy(addr.sun_path, sockpath, UNIX_PATH_MAX);

	do {
		rc = connect(fd, (struct sockaddr *)&addr, sizeof(addr));
		if (rc < 0 &&
		    (!wait || (errno != ENOENT && errno != ECONNREFUSED)))
			die("connect() to %s: %s\n", sockpath, strerror(errno));
	} while (rc < 0);

	return fd;
}

static void cmd_hold(int argc, char *argv[])
{
	int fd = socket(AF_UNIX, SOCK_STREAM, PF_UNIX);
	struct sockaddr_un addr = {
		.sun_family = AF_UNIX,
	};
	const char *sockpath = argv[1];
	int rc;

	if (argc != 2)
		usage();

	if (fd < 0)
		die("socket(): %s\n", strerror(errno));

	strncpy(addr.sun_path, sockpath, UNIX_PATH_MAX);

	rc = bind(fd, (struct sockaddr *)&addr, sizeof(addr));
	if (rc < 0)
		die("bind() to %s: %s\n", sockpath, strerror(errno));

	rc = listen(fd, 0);
	if (rc < 0)
		die("listen() on %s: %s\n", sockpath, strerror(errno));

	printf("nstool hold: local PID=%d  local UID=%u  local GID=%u\n",
	       getpid(), getuid(), getgid());
	do {
		int afd = accept(fd, NULL, NULL);
		char buf;

		if (afd < 0)
			die("accept(): %s\n", strerror(errno));

		rc = read(afd, &buf, sizeof(buf));
		if (rc < 0)
			die("read(): %s\n", strerror(errno));
	} while (rc == 0);

	unlink(sockpath);
}

static void cmd_info(int argc, char *argv[])
{
	const struct option options[] = {
		{"pid",		no_argument, 	NULL,	'p' },
		{"wait",	no_argument,	NULL,	'w' },
		{ 0 },
	};
	bool pidonly = false, waitforsock = false;
	struct ucred peercred;
	socklen_t optlen = sizeof(peercred);
	const char *optstring = "pw";
	const char *sockpath;
	int fd, rc, opt;

	do {
		opt = getopt_long(argc, argv, optstring, options, NULL);

		switch (opt) {
		case 'p':
			pidonly = true;
			break;
		case 'w':
			waitforsock = true;
			break;
		case -1:
			break;
		default:
			usage();
		}
	} while (opt != -1);

	if (optind != argc - 1) {
		fprintf(stderr, "B\n");
		usage();
	}

	sockpath = argv[optind];

	fd = connect_ctl(sockpath, waitforsock);

	rc = getsockopt(fd, SOL_SOCKET, SO_PEERCRED,
			&peercred, &optlen);
	if (rc < 0)
		die("getsockopet(SO_PEERCRED) %s: %s\n",
		    sockpath, strerror(errno));

	close(fd);

	if (pidonly) {
		printf("%d\n", peercred.pid);
	} else {
		printf("As seen from calling context:\n");
		printf("\tPID:\t%d\n", peercred.pid);
		printf("\tUID:\t%u\n", peercred.uid);
		printf("\tGID:\t%u\n", peercred.gid);
	}
}

static void cmd_stop(int argc, char *argv[])
{
	const char *sockpath = argv[1];
	int fd, rc;
	char buf = 'Q';

	if (argc != 2)
		usage();

	fd = connect_ctl(sockpath, false);

	rc = write(fd, &buf, sizeof(buf));
	if (rc < 0)
		die("write() to %s: %s\n", sockpath, strerror(errno));

	close(fd);
}

int main(int argc, char *argv[])
{
	const char *subcmd = argv[1];
	int fd;

	if (argc < 2)
		usage();

	fd = socket(AF_UNIX, SOCK_STREAM, PF_UNIX);
	if (fd < 0)
		die("socket(): %s\n", strerror(errno));

	if (strcmp(subcmd, "hold") == 0)
		cmd_hold(argc - 1, argv + 1);
	else if (strcmp(subcmd, "info") == 0)
		cmd_info(argc - 1, argv + 1);
	else if (strcmp(subcmd, "stop") == 0)
		cmd_stop(argc - 1, argv + 1);
	else
		usage();

	exit(0);
}

debug log:

solving 2cb4fb3 ...
found 2cb4fb3 in https://archives.passt.top/passt-dev/20230404014638.3225556-6-david@gibson.dropbear.id.au/
found 9ea7eeb in https://archives.passt.top/passt-dev/20230404014638.3225556-5-david@gibson.dropbear.id.au/
found 7e069b6 in https://archives.passt.top/passt-dev/20230404014638.3225556-4-david@gibson.dropbear.id.au/
found cc6d617 in https://archives.passt.top/passt-dev/20230404014638.3225556-3-david@gibson.dropbear.id.au/
found 4ae0f85 in https://archives.passt.top/passt-dev/20230404014638.3225556-2-david@gibson.dropbear.id.au/
found 010a051 in https://passt.top/passt
preparing index
index prepared:
100644 010a051fb9cae71dbbe1fef9c00161c0698a0ad7	test/nsholder.c

applying [1/5] https://archives.passt.top/passt-dev/20230404014638.3225556-2-david@gibson.dropbear.id.au/
diff --git a/test/nsholder.c b/test/nstool.c
similarity index 83%
rename from test/nsholder.c
rename to test/nstool.c
index 010a051..4ae0f85 100644


applying [2/5] https://archives.passt.top/passt-dev/20230404014638.3225556-3-david@gibson.dropbear.id.au/
diff --git a/test/nstool.c b/test/nstool.c
index 4ae0f85..cc6d617 100644


applying [3/5] https://archives.passt.top/passt-dev/20230404014638.3225556-4-david@gibson.dropbear.id.au/
diff --git a/test/nstool.c b/test/nstool.c
index cc6d617..7e069b6 100644


applying [4/5] https://archives.passt.top/passt-dev/20230404014638.3225556-5-david@gibson.dropbear.id.au/
diff --git a/test/nstool.c b/test/nstool.c
index 7e069b6..9ea7eeb 100644


applying [5/5] https://archives.passt.top/passt-dev/20230404014638.3225556-6-david@gibson.dropbear.id.au/
diff --git a/test/nstool.c b/test/nstool.c
index 9ea7eeb..2cb4fb3 100644

Checking patch test/nsholder.c => test/nstool.c...
Applied patch test/nsholder.c => test/nstool.c cleanly.
Checking patch test/nstool.c...
Applied patch test/nstool.c cleanly.
Checking patch test/nstool.c...
Applied patch test/nstool.c cleanly.
Checking patch test/nstool.c...
Applied patch test/nstool.c cleanly.
Checking patch test/nstool.c...
Applied patch test/nstool.c cleanly.

index at:
100644 2cb4fb3c1fd4d734cc67f65ab5befc539aa022c5	test/nstool.c

Code repositories for project(s) associated with this public inbox

	https://passt.top/passt

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).