diff options
author | David Gibson <david@gibson.dropbear.id.au> | 2022-08-26 14:58:37 +1000 |
---|---|---|
committer | Stefano Brivio <sbrivio@redhat.com> | 2022-08-30 19:43:31 +0200 |
commit | 9e0dbc8948138053a8cc8e5a98632fafdead921f (patch) | |
tree | b6f84ebf0b061e6219509cf8febdbfbb7eed8552 | |
parent | 70389d364089f7e9f132f712f6b2d6ab2b129453 (diff) | |
download | passt-9e0dbc8948138053a8cc8e5a98632fafdead921f.tar passt-9e0dbc8948138053a8cc8e5a98632fafdead921f.tar.gz passt-9e0dbc8948138053a8cc8e5a98632fafdead921f.tar.bz2 passt-9e0dbc8948138053a8cc8e5a98632fafdead921f.tar.lz passt-9e0dbc8948138053a8cc8e5a98632fafdead921f.tar.xz passt-9e0dbc8948138053a8cc8e5a98632fafdead921f.tar.zst passt-9e0dbc8948138053a8cc8e5a98632fafdead921f.zip |
More deterministic detection of whether argument is a PID, PATH or NAME
pasta takes as its only non-option argument either a PID to attach to the
namespaces of, a PATH to a network namespace or a NAME of a network
namespace (relative to /run/netns). Currently to determine which it is
we try all 3 in that order, and if anything goes wrong we move onto the
next.
This has the potential to cause very confusing failure modes. e.g. if the
argument is intended to be a network namespace name, but a (non-namespace)
file of the same name exists in the current directory.
Make behaviour more predictable by choosing how to treat the argument based
only on the argument's contents, not anything else on the system:
- If it's a decimal integer treat it as a PID
- Otherwise, if it has no '/' characters, treat it as a netns name
(ip-netns doesn't allow '/' in netns names)
- Otherwise, treat it as a netns path
If you want to open a persistent netns in the current directory, you can
use './netns'.
This also allows us to split the parsing of the PID|PATH|NAME option from
the actual opening of the namespaces. In turn that allows us to put the
opening of existing namespaces next to the opening of new namespaces in
pasta_start_ns. That makes the logical flow easier to follow and will
enable later cleanups.
Caveats:
- The separation of functions mean we will always generate the basename
and dirname for the netns_quit system, even when using PID namespaces.
This is pointless, since the netns_quit system doesn't work for non
persistent namespaces, but is harmless.
Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
-rw-r--r-- | conf.c | 172 |
1 files changed, 90 insertions, 82 deletions
@@ -490,6 +490,51 @@ out: } /** + * conf_ns_opt() - Parse non-option argument to namespace paths + * @userns: buffer of size PATH_MAX, initially contains --userns + * argument (may be empty), updated with userns path + * @netns: buffer of size PATH_MAX, updated with netns path + * @arg: PID, path or name of network namespace + * + * Return: 0 on success, negative error code otherwise + */ +static int conf_ns_opt(char *userns, char *netns, const char *arg) +{ + char *endptr; + long pidval; + int ret; + + pidval = strtol(arg, &endptr, 10); + if (!*endptr) { + /* Looks like a pid */ + if (pidval < 0 || pidval > INT_MAX) { + err("Invalid PID %s", arg); + return -EINVAL; + } + + snprintf(netns, PATH_MAX, "/proc/%ld/ns/net", pidval); + if (!*userns) + snprintf(userns, PATH_MAX, "/proc/%ld/ns/user", pidval); + return 0; + } + + if (!strchr(arg, '/')) { + /* looks like a netns name */ + ret = snprintf(netns, PATH_MAX, "%s/%s", NETNS_RUN_DIR, arg); + } else { + /* otherwise assume it's a netns path */ + ret = snprintf(netns, PATH_MAX, "%s", arg); + } + + if (ret <= 0 || ret > PATH_MAX) { + err("Network namespace name/path %s too long"); + return -E2BIG; + } + + return 0; +} + +/** * conf_ns_check() - Check if we can enter configured namespaces * @arg: Execution context * @@ -508,102 +553,58 @@ static int conf_ns_check(void *arg) } /** - * conf_ns_opt() - Open network, user namespaces descriptors from configuration - * @c: Execution context - * @conf_userns: --userns argument, can be an empty string - * @optarg: PID, path or name of namespace + * conf_ns_open() - Open network, user namespaces descriptors from configuration + * @c: Execution context + * @userns: --userns argument, can be an empty string + * @netns: network namespace path * * Return: 0 on success, negative error code otherwise */ -static int conf_ns_opt(struct ctx *c, - const char *conf_userns, const char *optarg) +static int conf_ns_open(struct ctx *c, const char *userns, const char *netns) { - int ufd = -1, nfd = -1, try, ret, netns_only_reset = c->netns_only; - char userns[PATH_MAX] = { 0 }, netns[PATH_MAX]; - char *endptr; - long pid_arg; - pid_t pid; + int ufd = -1, nfd = -1; - if (c->netns_only && *conf_userns) { + if (c->netns_only && *userns) { err("Both --userns and --netns-only given"); return -EINVAL; } - /* It might be a PID, a netns path, or a netns name */ - for (try = 0; try < 3; try++) { - if (try == 0) { - pid_arg = strtol(optarg, &endptr, 10); - if (*endptr || pid_arg < 0 || pid_arg > INT_MAX) - continue; - - pid = pid_arg; - - if (!*conf_userns && !c->netns_only) { - ret = snprintf(userns, PATH_MAX, - "/proc/%i/ns/user", pid); - if (ret <= 0 || ret > (int)sizeof(userns)) - continue; - } - ret = snprintf(netns, PATH_MAX, "/proc/%i/ns/net", pid); - if (ret <= 0 || ret > (int)sizeof(netns)) - continue; - } else if (try == 1) { - if (!*conf_userns) - c->netns_only = 1; - - ret = snprintf(netns, PATH_MAX, "%s", optarg); - if (ret <= 0 || ret > (int)sizeof(userns)) - continue; - } else if (try == 2) { - ret = snprintf(netns, PATH_MAX, "%s/%s", - NETNS_RUN_DIR, optarg); - if (ret <= 0 || ret > (int)sizeof(netns)) - continue; - } - - if (!c->netns_only) { - if (*conf_userns) - ufd = open(conf_userns, O_RDONLY | O_CLOEXEC); - else if (*userns) - ufd = open(userns, O_RDONLY | O_CLOEXEC); - } - - nfd = open(netns, O_RDONLY | O_CLOEXEC); - - if (nfd == -1 || (ufd == -1 && !c->netns_only)) { - if (nfd >= 0) - close(nfd); - - if (ufd >= 0) - close(ufd); + nfd = open(netns, O_RDONLY | O_CLOEXEC); + if (nfd < 0) { + err("Couldn't open network namespace %s", netns); + return -ENOENT; + } - continue; + if (!c->netns_only && *userns) { + ufd = open(userns, O_RDONLY | O_CLOEXEC); + if (ufd < 0) { + close(nfd); + err("Couldn't open user namespace %s", userns); + return -ENOENT; } + } - c->pasta_netns_fd = nfd; - c->pasta_userns_fd = ufd; - - NS_CALL(conf_ns_check, c); + c->pasta_netns_fd = nfd; + c->pasta_userns_fd = ufd; + c->netns_only = !*userns; - if (c->pasta_netns_fd >= 0) { - char buf[PATH_MAX]; + NS_CALL(conf_ns_check, c); - if (try == 0 || c->no_netns_quit) - return 0; + if (c->pasta_netns_fd < 0) { + err("Couldn't switch to pasta namespaces"); + return -ENOENT; + } - strncpy(buf, netns, PATH_MAX); - strncpy(c->netns_base, basename(buf), PATH_MAX - 1); - strncpy(buf, netns, PATH_MAX); - strncpy(c->netns_dir, dirname(buf), PATH_MAX - 1); + if (!c->no_netns_quit) { + char buf[PATH_MAX]; - return 0; - } + strncpy(buf, netns, PATH_MAX); + strncpy(c->netns_base, basename(buf), PATH_MAX - 1); + strncpy(buf, netns, PATH_MAX); + strncpy(c->netns_dir, dirname(buf), PATH_MAX - 1); } - c->netns_only = netns_only_reset; - - err("Namespace %s not found", optarg); - return -ENOENT; + return 0; } /** @@ -1051,7 +1052,7 @@ void conf(struct ctx *c, int argc, char **argv) { 0 }, }; struct get_bound_ports_ns_arg ns_ports_arg = { .c = c }; - char userns[PATH_MAX] = { 0 }; + char userns[PATH_MAX] = { 0 }, netns[PATH_MAX] = { 0 }; enum conf_port_type tcp_tap = 0, tcp_init = 0; enum conf_port_type udp_tap = 0, udp_init = 0; bool v4_only = false, v6_only = false; @@ -1464,7 +1465,7 @@ void conf(struct ctx *c, int argc, char **argv) check_root(c); if (c->mode == MODE_PASTA && optind + 1 == argc) { - ret = conf_ns_opt(c, userns, argv[optind]); + ret = conf_ns_opt(userns, netns, argv[optind]); if (ret < 0) usage(argv[0]); } else if (c->mode == MODE_PASTA && *userns && optind == argc) { @@ -1477,8 +1478,15 @@ void conf(struct ctx *c, int argc, char **argv) if (c->pasta_conf_ns) c->no_ra = 1; - if (c->mode == MODE_PASTA && c->pasta_netns_fd == -1) - pasta_start_ns(c); + if (c->mode == MODE_PASTA) { + if (*netns) { + ret = conf_ns_open(c, userns, netns); + if (ret < 0) + usage(argv[0]); + } else { + pasta_start_ns(c); + } + } if (nl_sock_init(c)) { err("Failed to get netlink socket"); |