1 /* Linux namespaces(7) support. 2 3 Copyright (C) 2015-2023 Free Software Foundation, Inc. 4 5 This file is part of GDB. 6 7 This program is free software; you can redistribute it and/or modify 8 it under the terms of the GNU General Public License as published by 9 the Free Software Foundation; either version 3 of the License, or 10 (at your option) any later version. 11 12 This program is distributed in the hope that it will be useful, 13 but WITHOUT ANY WARRANTY; without even the implied warranty of 14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 15 GNU General Public License for more details. 16 17 You should have received a copy of the GNU General Public License 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */ 19 20 #include "gdbsupport/common-defs.h" 21 #include "nat/linux-namespaces.h" 22 #include "gdbsupport/filestuff.h" 23 #include <fcntl.h> 24 #include <sys/syscall.h> 25 #include <sys/types.h> 26 #include <sys/stat.h> 27 #include <sys/socket.h> 28 #include "gdbsupport/gdb_wait.h" 29 #include <signal.h> 30 #include <sched.h> 31 #include "gdbsupport/scope-exit.h" 32 33 /* See nat/linux-namespaces.h. */ 34 bool debug_linux_namespaces; 35 36 /* Handle systems without fork. */ 37 38 static inline pid_t 39 do_fork (void) 40 { 41 #ifdef HAVE_FORK 42 return fork (); 43 #else 44 errno = ENOSYS; 45 return -1; 46 #endif 47 } 48 49 /* Handle systems without setns. */ 50 51 static inline int 52 do_setns (int fd, int nstype) 53 { 54 #ifdef HAVE_SETNS 55 return setns (fd, nstype); 56 #elif defined __NR_setns 57 return syscall (__NR_setns, fd, nstype); 58 #else 59 errno = ENOSYS; 60 return -1; 61 #endif 62 } 63 64 /* Handle systems without MSG_CMSG_CLOEXEC. */ 65 66 #ifndef MSG_CMSG_CLOEXEC 67 #define MSG_CMSG_CLOEXEC 0 68 #endif 69 70 /* A Linux namespace. */ 71 72 struct linux_ns 73 { 74 /* Filename of this namespace's entries in /proc/PID/ns. */ 75 const char *filename; 76 77 /* Nonzero if this object has been initialized. */ 78 int initialized; 79 80 /* Nonzero if this namespace is supported on this system. */ 81 int supported; 82 83 /* ID of the namespace the calling process is in, used to 84 see if other processes share the namespace. The code in 85 this file assumes that the calling process never changes 86 namespace. */ 87 ino_t id; 88 }; 89 90 /* Return the absolute filename of process PID's /proc/PID/ns 91 entry for namespace NS. The returned value persists until 92 this function is next called. */ 93 94 static const char * 95 linux_ns_filename (struct linux_ns *ns, int pid) 96 { 97 static char filename[PATH_MAX]; 98 99 gdb_assert (pid > 0); 100 xsnprintf (filename, sizeof (filename), "/proc/%d/ns/%s", pid, 101 ns->filename); 102 103 return filename; 104 } 105 106 /* Return a representation of the caller's TYPE namespace, or 107 NULL if TYPE namespaces are not supported on this system. */ 108 109 static struct linux_ns * 110 linux_ns_get_namespace (enum linux_ns_type type) 111 { 112 static struct linux_ns namespaces[NUM_LINUX_NS_TYPES] = 113 { 114 { "ipc" }, 115 { "mnt" }, 116 { "net" }, 117 { "pid" }, 118 { "user" }, 119 { "uts" }, 120 }; 121 struct linux_ns *ns; 122 123 gdb_assert (type >= 0 && type < NUM_LINUX_NS_TYPES); 124 ns = &namespaces[type]; 125 126 if (!ns->initialized) 127 { 128 struct stat sb; 129 130 if (stat (linux_ns_filename (ns, getpid ()), &sb) == 0) 131 { 132 ns->id = sb.st_ino; 133 134 ns->supported = 1; 135 } 136 137 ns->initialized = 1; 138 } 139 140 return ns->supported ? ns : NULL; 141 } 142 143 /* See nat/linux-namespaces.h. */ 144 145 int 146 linux_ns_same (pid_t pid, enum linux_ns_type type) 147 { 148 struct linux_ns *ns = linux_ns_get_namespace (type); 149 const char *filename; 150 struct stat sb; 151 152 /* If the kernel does not support TYPE namespaces then there's 153 effectively only one TYPE namespace that all processes on 154 the system share. */ 155 if (ns == NULL) 156 return 1; 157 158 /* Stat PID's TYPE namespace entry to get the namespace ID. This 159 might fail if the process died, or if we don't have the right 160 permissions (though we should be attached by this time so this 161 seems unlikely). In any event, we can't make any decisions and 162 must throw. */ 163 filename = linux_ns_filename (ns, pid); 164 if (stat (filename, &sb) != 0) 165 perror_with_name (filename); 166 167 return sb.st_ino == ns->id; 168 } 169 170 /* We need to use setns(2) to handle filesystem access in mount 171 namespaces other than our own, but this isn't permitted for 172 multithreaded processes. GDB is multithreaded when compiled 173 with Guile support, and may become multithreaded if compiled 174 with Python support. We deal with this by spawning a single- 175 threaded helper process to access mount namespaces other than 176 our own. 177 178 The helper process is started the first time a call to setns 179 is required. The main process (GDB or gdbserver) communicates 180 with the helper via sockets, passing file descriptors where 181 necessary using SCM_RIGHTS. Once started the helper process 182 runs until the main process terminates; when this happens the 183 helper will receive socket errors, notice that its parent died, 184 and exit accordingly (see mnsh_maybe_mourn_peer). 185 186 The protocol is that the main process sends a request in a 187 single message, and the helper replies to every message it 188 receives with a single-message response. If the helper 189 receives a message it does not understand it will reply with 190 a MNSH_MSG_ERROR message. The main process checks all 191 responses it receives with gdb_assert, so if the main process 192 receives something unexpected (which includes MNSH_MSG_ERROR) 193 the main process will call internal_error. 194 195 For avoidance of doubt, if the helper process receives a 196 message it doesn't handle it will reply with MNSH_MSG_ERROR. 197 If the main process receives MNSH_MSG_ERROR at any time then 198 it will call internal_error. If internal_error causes the 199 main process to exit, the helper will notice this and also 200 exit. The helper will not exit until the main process 201 terminates, so if the user continues through internal_error 202 the helper will still be there awaiting requests from the 203 main process. 204 205 Messages in both directions have the following payload: 206 207 - TYPE (enum mnsh_msg_type, always sent) - the message type. 208 - INT1 and 209 - INT2 (int, always sent, though not always used) - two 210 values whose meaning is message-type-dependent. 211 See enum mnsh_msg_type documentation below. 212 - FD (int, optional, sent using SCM_RIGHTS) - an open file 213 descriptor. 214 - BUF (unstructured data, optional) - some data with message- 215 type-dependent meaning. 216 217 Note that the helper process is the child of a call to fork, 218 so all code in the helper must be async-signal-safe. */ 219 220 /* Mount namespace helper message types. */ 221 222 enum mnsh_msg_type 223 { 224 /* A communication error occurred. Receipt of this message 225 by either end will cause an assertion failure in the main 226 process. */ 227 MNSH_MSG_ERROR, 228 229 /* Requests, sent from the main process to the helper. */ 230 231 /* A request that the helper call setns. Arguments should 232 be passed in FD and INT1. Helper should respond with a 233 MNSH_RET_INT. */ 234 MNSH_REQ_SETNS, 235 236 /* A request that the helper call open. Arguments should 237 be passed in BUF, INT1 and INT2. The filename (in BUF) 238 should include a terminating NUL character. The helper 239 should respond with a MNSH_RET_FD. */ 240 MNSH_REQ_OPEN, 241 242 /* A request that the helper call unlink. The single 243 argument (the filename) should be passed in BUF, and 244 should include a terminating NUL character. The helper 245 should respond with a MNSH_RET_INT. */ 246 MNSH_REQ_UNLINK, 247 248 /* A request that the helper call readlink. The single 249 argument (the filename) should be passed in BUF, and 250 should include a terminating NUL character. The helper 251 should respond with a MNSH_RET_INTSTR. */ 252 MNSH_REQ_READLINK, 253 254 /* Responses, sent to the main process from the helper. */ 255 256 /* Return an integer in INT1 and errno in INT2. */ 257 MNSH_RET_INT, 258 259 /* Return a file descriptor in FD if one was opened or an 260 integer in INT1 otherwise. Return errno in INT2. */ 261 MNSH_RET_FD, 262 263 /* Return an integer in INT1, errno in INT2, and optionally 264 some data in BUF. */ 265 MNSH_RET_INTSTR, 266 }; 267 268 /* Print a string representation of a message using debug_printf. 269 This function is not async-signal-safe so should never be 270 called from the helper. */ 271 272 static void 273 mnsh_debug_print_message (enum mnsh_msg_type type, 274 int fd, int int1, int int2, 275 const void *buf, int bufsiz) 276 { 277 gdb_byte *c = (gdb_byte *) buf; 278 gdb_byte *cl = c + bufsiz; 279 280 switch (type) 281 { 282 case MNSH_MSG_ERROR: 283 debug_printf ("ERROR"); 284 break; 285 286 case MNSH_REQ_SETNS: 287 debug_printf ("SETNS"); 288 break; 289 290 case MNSH_REQ_OPEN: 291 debug_printf ("OPEN"); 292 break; 293 294 case MNSH_REQ_UNLINK: 295 debug_printf ("UNLINK"); 296 break; 297 298 case MNSH_REQ_READLINK: 299 debug_printf ("READLINK"); 300 break; 301 302 case MNSH_RET_INT: 303 debug_printf ("INT"); 304 break; 305 306 case MNSH_RET_FD: 307 debug_printf ("FD"); 308 break; 309 310 case MNSH_RET_INTSTR: 311 debug_printf ("INTSTR"); 312 break; 313 314 default: 315 debug_printf ("unknown-packet-%d", type); 316 } 317 318 debug_printf (" %d %d %d \"", fd, int1, int2); 319 320 for (; c < cl; c++) 321 debug_printf (*c >= ' ' && *c <= '~' ? "%c" : "\\%o", *c); 322 323 debug_printf ("\""); 324 } 325 326 /* Forward declaration. */ 327 328 static void mnsh_maybe_mourn_peer (void); 329 330 /* Send a message. The argument SOCK is the file descriptor of the 331 sending socket, the other arguments are the payload to send. 332 Return the number of bytes sent on success. Return -1 on failure 333 and set errno appropriately. This function is called by both the 334 main process and the helper so must be async-signal-safe. */ 335 336 static ssize_t 337 mnsh_send_message (int sock, enum mnsh_msg_type type, 338 int fd, int int1, int int2, 339 const void *buf, int bufsiz) 340 { 341 struct msghdr msg; 342 struct iovec iov[4]; 343 char fdbuf[CMSG_SPACE (sizeof (fd))]; 344 ssize_t size; 345 346 /* Build the basic TYPE, INT1, INT2 message. */ 347 memset (&msg, 0, sizeof (msg)); 348 msg.msg_iov = iov; 349 350 iov[0].iov_base = &type; 351 iov[0].iov_len = sizeof (type); 352 iov[1].iov_base = &int1; 353 iov[1].iov_len = sizeof (int1); 354 iov[2].iov_base = &int2; 355 iov[2].iov_len = sizeof (int2); 356 357 msg.msg_iovlen = 3; 358 359 /* Append BUF if supplied. */ 360 if (buf != NULL && bufsiz > 0) 361 { 362 iov[3].iov_base = alloca (bufsiz); 363 memcpy (iov[3].iov_base, buf, bufsiz); 364 iov[3].iov_len = bufsiz; 365 366 msg.msg_iovlen ++; 367 } 368 369 /* Attach FD if supplied. */ 370 if (fd >= 0) 371 { 372 struct cmsghdr *cmsg; 373 374 msg.msg_control = fdbuf; 375 msg.msg_controllen = sizeof (fdbuf); 376 377 cmsg = CMSG_FIRSTHDR (&msg); 378 cmsg->cmsg_level = SOL_SOCKET; 379 cmsg->cmsg_type = SCM_RIGHTS; 380 cmsg->cmsg_len = CMSG_LEN (sizeof (int)); 381 382 memcpy (CMSG_DATA (cmsg), &fd, sizeof (int)); 383 384 msg.msg_controllen = cmsg->cmsg_len; 385 } 386 387 /* Send the message. */ 388 size = sendmsg (sock, &msg, 0); 389 390 if (size < 0) 391 mnsh_maybe_mourn_peer (); 392 393 if (debug_linux_namespaces) 394 { 395 debug_printf ("mnsh: send: "); 396 mnsh_debug_print_message (type, fd, int1, int2, buf, bufsiz); 397 debug_printf (" -> %s\n", pulongest (size)); 398 } 399 400 return size; 401 } 402 403 /* Receive a message. The argument SOCK is the file descriptor of 404 the receiving socket, the other arguments point to storage for 405 the received payload. Returns the number of bytes stored into 406 BUF on success, which may be zero in the event no BUF was sent. 407 Return -1 on failure and set errno appropriately. This function 408 is called from both the main process and the helper and must be 409 async-signal-safe. */ 410 411 static ssize_t 412 mnsh_recv_message (int sock, enum mnsh_msg_type *type, 413 int *fd, int *int1, int *int2, 414 void *buf, int bufsiz) 415 { 416 struct msghdr msg; 417 struct iovec iov[4]; 418 char fdbuf[CMSG_SPACE (sizeof (*fd))]; 419 struct cmsghdr *cmsg; 420 ssize_t size, fixed_size; 421 int i; 422 423 /* Build the message to receive data into. */ 424 memset (&msg, 0, sizeof (msg)); 425 msg.msg_iov = iov; 426 427 iov[0].iov_base = type; 428 iov[0].iov_len = sizeof (*type); 429 iov[1].iov_base = int1; 430 iov[1].iov_len = sizeof (*int1); 431 iov[2].iov_base = int2; 432 iov[2].iov_len = sizeof (*int2); 433 iov[3].iov_base = buf; 434 iov[3].iov_len = bufsiz; 435 436 msg.msg_iovlen = 4; 437 438 for (fixed_size = i = 0; i < msg.msg_iovlen - 1; i++) 439 fixed_size += iov[i].iov_len; 440 441 msg.msg_control = fdbuf; 442 msg.msg_controllen = sizeof (fdbuf); 443 444 /* Receive the message. */ 445 size = recvmsg (sock, &msg, MSG_CMSG_CLOEXEC); 446 if (size < 0) 447 { 448 if (debug_linux_namespaces) 449 debug_printf ("namespace-helper: recv failed (%s)\n", 450 pulongest (size)); 451 452 mnsh_maybe_mourn_peer (); 453 454 return size; 455 } 456 457 /* Check for truncation. */ 458 if (size < fixed_size || (msg.msg_flags & (MSG_TRUNC | MSG_CTRUNC))) 459 { 460 if (debug_linux_namespaces) 461 debug_printf ("namespace-helper: recv truncated (%s 0x%x)\n", 462 pulongest (size), msg.msg_flags); 463 464 mnsh_maybe_mourn_peer (); 465 466 errno = EBADMSG; 467 return -1; 468 } 469 470 /* Unpack the file descriptor if supplied. */ 471 cmsg = CMSG_FIRSTHDR (&msg); 472 if (cmsg != NULL 473 && cmsg->cmsg_len == CMSG_LEN (sizeof (int)) 474 && cmsg->cmsg_level == SOL_SOCKET 475 && cmsg->cmsg_type == SCM_RIGHTS) 476 memcpy (fd, CMSG_DATA (cmsg), sizeof (int)); 477 else 478 *fd = -1; 479 480 if (debug_linux_namespaces) 481 { 482 debug_printf ("mnsh: recv: "); 483 mnsh_debug_print_message (*type, *fd, *int1, *int2, buf, 484 size - fixed_size); 485 debug_printf ("\n"); 486 } 487 488 /* Return the number of bytes of data in BUF. */ 489 return size - fixed_size; 490 } 491 492 /* Shortcuts for returning results from the helper. */ 493 494 #define mnsh_return_int(sock, result, error) \ 495 mnsh_send_message (sock, MNSH_RET_INT, -1, result, error, NULL, 0) 496 497 #define mnsh_return_fd(sock, fd, error) \ 498 mnsh_send_message (sock, MNSH_RET_FD, \ 499 (fd) < 0 ? -1 : (fd), \ 500 (fd) < 0 ? (fd) : 0, \ 501 error, NULL, 0) 502 503 #define mnsh_return_intstr(sock, result, buf, bufsiz, error) \ 504 mnsh_send_message (sock, MNSH_RET_INTSTR, -1, result, error, \ 505 buf, bufsiz) 506 507 /* Handle a MNSH_REQ_SETNS message. Must be async-signal-safe. */ 508 509 static ssize_t 510 mnsh_handle_setns (int sock, int fd, int nstype) 511 { 512 int result = do_setns (fd, nstype); 513 514 return mnsh_return_int (sock, result, errno); 515 } 516 517 /* Handle a MNSH_REQ_OPEN message. Must be async-signal-safe. */ 518 519 static ssize_t 520 mnsh_handle_open (int sock, const char *filename, 521 int flags, mode_t mode) 522 { 523 scoped_fd fd = gdb_open_cloexec (filename, flags, mode); 524 return mnsh_return_fd (sock, fd.get (), errno); 525 } 526 527 /* Handle a MNSH_REQ_UNLINK message. Must be async-signal-safe. */ 528 529 static ssize_t 530 mnsh_handle_unlink (int sock, const char *filename) 531 { 532 int result = unlink (filename); 533 534 return mnsh_return_int (sock, result, errno); 535 } 536 537 /* Handle a MNSH_REQ_READLINK message. Must be async-signal-safe. */ 538 539 static ssize_t 540 mnsh_handle_readlink (int sock, const char *filename) 541 { 542 char buf[PATH_MAX]; 543 int len = readlink (filename, buf, sizeof (buf)); 544 545 return mnsh_return_intstr (sock, len, 546 buf, len < 0 ? 0 : len, 547 errno); 548 } 549 550 /* The helper process. Never returns. Must be async-signal-safe. */ 551 552 static void mnsh_main (int sock) ATTRIBUTE_NORETURN; 553 554 static void 555 mnsh_main (int sock) 556 { 557 while (1) 558 { 559 enum mnsh_msg_type type; 560 int fd = -1, int1, int2; 561 char buf[PATH_MAX]; 562 ssize_t size, response = -1; 563 564 size = mnsh_recv_message (sock, &type, 565 &fd, &int1, &int2, 566 buf, sizeof (buf)); 567 568 if (size >= 0 && size < sizeof (buf)) 569 { 570 switch (type) 571 { 572 case MNSH_REQ_SETNS: 573 if (fd > 0) 574 response = mnsh_handle_setns (sock, fd, int1); 575 break; 576 577 case MNSH_REQ_OPEN: 578 if (size > 0 && buf[size - 1] == '\0') 579 response = mnsh_handle_open (sock, buf, int1, int2); 580 break; 581 582 case MNSH_REQ_UNLINK: 583 if (size > 0 && buf[size - 1] == '\0') 584 response = mnsh_handle_unlink (sock, buf); 585 break; 586 587 case MNSH_REQ_READLINK: 588 if (size > 0 && buf[size - 1] == '\0') 589 response = mnsh_handle_readlink (sock, buf); 590 break; 591 592 default: 593 break; /* Handled below. */ 594 } 595 } 596 597 /* Close any file descriptors we were passed. */ 598 if (fd >= 0) 599 close (fd); 600 601 /* Can't handle this message, bounce it back. */ 602 if (response < 0) 603 { 604 if (size < 0) 605 size = 0; 606 607 mnsh_send_message (sock, MNSH_MSG_ERROR, 608 -1, int1, int2, buf, size); 609 } 610 } 611 } 612 613 /* The mount namespace helper process. */ 614 615 struct linux_mnsh 616 { 617 /* PID of helper. */ 618 pid_t pid; 619 620 /* Socket for communication. */ 621 int sock; 622 623 /* ID of the mount namespace the helper is currently in. */ 624 ino_t nsid; 625 }; 626 627 /* In the helper process this is set to the PID of the process that 628 created the helper (i.e. GDB or gdbserver). In the main process 629 this is set to zero. Used by mnsh_maybe_mourn_peer. */ 630 static int mnsh_creator_pid = 0; 631 632 /* Return an object representing the mount namespace helper process. 633 If no mount namespace helper process has been started then start 634 one. Return NULL if no mount namespace helper process could be 635 started. */ 636 637 static struct linux_mnsh * 638 linux_mntns_get_helper (void) 639 { 640 static struct linux_mnsh *helper = NULL; 641 642 if (helper == NULL) 643 { 644 static struct linux_mnsh h; 645 struct linux_ns *ns; 646 pid_t helper_creator = getpid (); 647 int sv[2]; 648 649 ns = linux_ns_get_namespace (LINUX_NS_MNT); 650 if (ns == NULL) 651 return NULL; 652 653 if (gdb_socketpair_cloexec (AF_UNIX, SOCK_STREAM, 0, sv) < 0) 654 return NULL; 655 656 h.pid = do_fork (); 657 if (h.pid < 0) 658 { 659 int saved_errno = errno; 660 661 close (sv[0]); 662 close (sv[1]); 663 664 errno = saved_errno; 665 return NULL; 666 } 667 668 if (h.pid == 0) 669 { 670 /* Child process. */ 671 close (sv[0]); 672 673 mnsh_creator_pid = helper_creator; 674 675 /* Debug printing isn't async-signal-safe. */ 676 debug_linux_namespaces = 0; 677 678 mnsh_main (sv[1]); 679 } 680 681 /* Parent process. */ 682 close (sv[1]); 683 684 helper = &h; 685 helper->sock = sv[0]; 686 helper->nsid = ns->id; 687 688 if (debug_linux_namespaces) 689 debug_printf ("Started mount namespace helper process %d\n", 690 helper->pid); 691 } 692 693 return helper; 694 } 695 696 /* Check whether the other process died and act accordingly. Called 697 whenever a socket error occurs, from both the main process and the 698 helper. Must be async-signal-safe when called from the helper. */ 699 700 static void 701 mnsh_maybe_mourn_peer (void) 702 { 703 if (mnsh_creator_pid != 0) 704 { 705 /* We're in the helper. Check if our current parent is the 706 process that started us. If it isn't, then our original 707 parent died and we've been reparented. Exit immediately 708 if that's the case. */ 709 if (getppid () != mnsh_creator_pid) 710 _exit (0); 711 } 712 else 713 { 714 /* We're in the main process. */ 715 716 struct linux_mnsh *helper = linux_mntns_get_helper (); 717 int status; 718 pid_t pid; 719 720 if (helper->pid < 0) 721 { 722 /* We already mourned it. */ 723 return; 724 } 725 726 pid = waitpid (helper->pid, &status, WNOHANG); 727 if (pid == 0) 728 { 729 /* The helper is still alive. */ 730 return; 731 } 732 else if (pid == -1) 733 { 734 if (errno == ECHILD) 735 warning (_("mount namespace helper vanished?")); 736 else 737 internal_warning (_("unhandled error %d"), errno); 738 } 739 else if (pid == helper->pid) 740 { 741 if (WIFEXITED (status)) 742 warning (_("mount namespace helper exited with status %d"), 743 WEXITSTATUS (status)); 744 else if (WIFSIGNALED (status)) 745 warning (_("mount namespace helper killed by signal %d"), 746 WTERMSIG (status)); 747 else 748 internal_warning (_("unhandled status %d"), status); 749 } 750 else 751 internal_warning (_("unknown pid %d"), pid); 752 753 /* Something unrecoverable happened. */ 754 helper->pid = -1; 755 } 756 } 757 758 /* Shortcuts for sending messages to the helper. */ 759 760 #define mnsh_send_setns(helper, fd, nstype) \ 761 mnsh_send_message (helper->sock, MNSH_REQ_SETNS, fd, nstype, 0, \ 762 NULL, 0) 763 764 #define mnsh_send_open(helper, filename, flags, mode) \ 765 mnsh_send_message (helper->sock, MNSH_REQ_OPEN, -1, flags, mode, \ 766 filename, strlen (filename) + 1) 767 768 #define mnsh_send_unlink(helper, filename) \ 769 mnsh_send_message (helper->sock, MNSH_REQ_UNLINK, -1, 0, 0, \ 770 filename, strlen (filename) + 1) 771 772 #define mnsh_send_readlink(helper, filename) \ 773 mnsh_send_message (helper->sock, MNSH_REQ_READLINK, -1, 0, 0, \ 774 filename, strlen (filename) + 1) 775 776 /* Receive a message from the helper. Issue an assertion failure if 777 the message isn't a correctly-formatted MNSH_RET_INT. Set RESULT 778 and ERROR and return 0 on success. Set errno and return -1 on 779 failure. */ 780 781 static int 782 mnsh_recv_int (struct linux_mnsh *helper, int *result, int *error) 783 { 784 enum mnsh_msg_type type; 785 char buf[PATH_MAX]; 786 ssize_t size; 787 int fd; 788 789 size = mnsh_recv_message (helper->sock, &type, &fd, 790 result, error, 791 buf, sizeof (buf)); 792 if (size < 0) 793 return -1; 794 795 gdb_assert (type == MNSH_RET_INT); 796 gdb_assert (fd == -1); 797 gdb_assert (size == 0); 798 799 return 0; 800 } 801 802 /* Receive a message from the helper. Issue an assertion failure if 803 the message isn't a correctly-formatted MNSH_RET_FD. Set FD and 804 ERROR and return 0 on success. Set errno and return -1 on 805 failure. */ 806 807 static int 808 mnsh_recv_fd (struct linux_mnsh *helper, int *fd, int *error) 809 { 810 enum mnsh_msg_type type; 811 char buf[PATH_MAX]; 812 ssize_t size; 813 int result; 814 815 size = mnsh_recv_message (helper->sock, &type, fd, 816 &result, error, 817 buf, sizeof (buf)); 818 if (size < 0) 819 return -1; 820 821 gdb_assert (type == MNSH_RET_FD); 822 gdb_assert (size == 0); 823 824 if (*fd < 0) 825 { 826 gdb_assert (result < 0); 827 *fd = result; 828 } 829 830 return 0; 831 } 832 833 /* Receive a message from the helper. Issue an assertion failure if 834 the message isn't a correctly-formatted MNSH_RET_INTSTR. Set 835 RESULT and ERROR and optionally store data in BUF, then return 836 the number of bytes stored in BUF on success (this may be zero). 837 Set errno and return -1 on error. */ 838 839 static ssize_t 840 mnsh_recv_intstr (struct linux_mnsh *helper, 841 int *result, int *error, 842 void *buf, int bufsiz) 843 { 844 enum mnsh_msg_type type; 845 ssize_t size; 846 int fd; 847 848 size = mnsh_recv_message (helper->sock, &type, &fd, 849 result, error, 850 buf, bufsiz); 851 852 if (size < 0) 853 return -1; 854 855 gdb_assert (type == MNSH_RET_INTSTR); 856 gdb_assert (fd == -1); 857 858 return size; 859 } 860 861 /* Return values for linux_mntns_access_fs. */ 862 863 enum mnsh_fs_code 864 { 865 /* Something went wrong, errno is set. */ 866 MNSH_FS_ERROR = -1, 867 868 /* The main process is in the correct mount namespace. 869 The caller should access the filesystem directly. */ 870 MNSH_FS_DIRECT, 871 872 /* The helper is in the correct mount namespace. 873 The caller should access the filesystem via the helper. */ 874 MNSH_FS_HELPER 875 }; 876 877 /* Return a value indicating how the caller should access the 878 mount namespace of process PID. */ 879 880 static enum mnsh_fs_code 881 linux_mntns_access_fs (pid_t pid) 882 { 883 struct linux_ns *ns; 884 struct stat sb; 885 struct linux_mnsh *helper; 886 ssize_t size; 887 int fd; 888 889 if (pid == getpid ()) 890 return MNSH_FS_DIRECT; 891 892 ns = linux_ns_get_namespace (LINUX_NS_MNT); 893 if (ns == NULL) 894 return MNSH_FS_DIRECT; 895 896 fd = gdb_open_cloexec (linux_ns_filename (ns, pid), O_RDONLY, 0).release (); 897 if (fd < 0) 898 return MNSH_FS_ERROR; 899 900 SCOPE_EXIT 901 { 902 int save_errno = errno; 903 close (fd); 904 errno = save_errno; 905 }; 906 907 if (fstat (fd, &sb) != 0) 908 return MNSH_FS_ERROR; 909 910 if (sb.st_ino == ns->id) 911 return MNSH_FS_DIRECT; 912 913 helper = linux_mntns_get_helper (); 914 if (helper == NULL) 915 return MNSH_FS_ERROR; 916 917 if (sb.st_ino != helper->nsid) 918 { 919 int result, error; 920 921 size = mnsh_send_setns (helper, fd, 0); 922 if (size < 0) 923 return MNSH_FS_ERROR; 924 925 if (mnsh_recv_int (helper, &result, &error) != 0) 926 return MNSH_FS_ERROR; 927 928 if (result != 0) 929 { 930 /* ENOSYS indicates that an entire function is unsupported 931 (it's not appropriate for our versions of open/unlink/ 932 readlink to sometimes return with ENOSYS depending on how 933 they're called) so we convert ENOSYS to ENOTSUP if setns 934 fails. */ 935 if (error == ENOSYS) 936 error = ENOTSUP; 937 938 errno = error; 939 return MNSH_FS_ERROR; 940 } 941 942 helper->nsid = sb.st_ino; 943 } 944 945 return MNSH_FS_HELPER; 946 } 947 948 /* See nat/linux-namespaces.h. */ 949 950 int 951 linux_mntns_open_cloexec (pid_t pid, const char *filename, 952 int flags, mode_t mode) 953 { 954 enum mnsh_fs_code access = linux_mntns_access_fs (pid); 955 struct linux_mnsh *helper; 956 int fd, error; 957 ssize_t size; 958 959 if (access == MNSH_FS_ERROR) 960 return -1; 961 962 if (access == MNSH_FS_DIRECT) 963 return gdb_open_cloexec (filename, flags, mode).release (); 964 965 gdb_assert (access == MNSH_FS_HELPER); 966 967 helper = linux_mntns_get_helper (); 968 969 size = mnsh_send_open (helper, filename, flags, mode); 970 if (size < 0) 971 return -1; 972 973 if (mnsh_recv_fd (helper, &fd, &error) != 0) 974 return -1; 975 976 if (fd < 0) 977 errno = error; 978 979 return fd; 980 } 981 982 /* See nat/linux-namespaces.h. */ 983 984 int 985 linux_mntns_unlink (pid_t pid, const char *filename) 986 { 987 enum mnsh_fs_code access = linux_mntns_access_fs (pid); 988 struct linux_mnsh *helper; 989 int ret, error; 990 ssize_t size; 991 992 if (access == MNSH_FS_ERROR) 993 return -1; 994 995 if (access == MNSH_FS_DIRECT) 996 return unlink (filename); 997 998 gdb_assert (access == MNSH_FS_HELPER); 999 1000 helper = linux_mntns_get_helper (); 1001 1002 size = mnsh_send_unlink (helper, filename); 1003 if (size < 0) 1004 return -1; 1005 1006 if (mnsh_recv_int (helper, &ret, &error) != 0) 1007 return -1; 1008 1009 if (ret != 0) 1010 errno = error; 1011 1012 return ret; 1013 } 1014 1015 /* See nat/linux-namespaces.h. */ 1016 1017 ssize_t 1018 linux_mntns_readlink (pid_t pid, const char *filename, 1019 char *buf, size_t bufsiz) 1020 { 1021 enum mnsh_fs_code access = linux_mntns_access_fs (pid); 1022 struct linux_mnsh *helper; 1023 int ret, error; 1024 ssize_t size; 1025 1026 if (access == MNSH_FS_ERROR) 1027 return -1; 1028 1029 if (access == MNSH_FS_DIRECT) 1030 return readlink (filename, buf, bufsiz); 1031 1032 gdb_assert (access == MNSH_FS_HELPER); 1033 1034 helper = linux_mntns_get_helper (); 1035 1036 size = mnsh_send_readlink (helper, filename); 1037 if (size < 0) 1038 return -1; 1039 1040 size = mnsh_recv_intstr (helper, &ret, &error, buf, bufsiz); 1041 1042 if (size < 0) 1043 { 1044 ret = -1; 1045 errno = error; 1046 } 1047 else 1048 gdb_assert (size == ret); 1049 1050 return ret; 1051 } 1052