162306a36Sopenharmony_ci/*
262306a36Sopenharmony_ci * Copyright © 2019 Alexey Dobriyan <adobriyan@gmail.com>
362306a36Sopenharmony_ci *
462306a36Sopenharmony_ci * Permission to use, copy, modify, and distribute this software for any
562306a36Sopenharmony_ci * purpose with or without fee is hereby granted, provided that the above
662306a36Sopenharmony_ci * copyright notice and this permission notice appear in all copies.
762306a36Sopenharmony_ci *
862306a36Sopenharmony_ci * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
962306a36Sopenharmony_ci * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
1062306a36Sopenharmony_ci * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
1162306a36Sopenharmony_ci * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
1262306a36Sopenharmony_ci * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
1362306a36Sopenharmony_ci * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1462306a36Sopenharmony_ci * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
1562306a36Sopenharmony_ci */
1662306a36Sopenharmony_ci/*
1762306a36Sopenharmony_ci * Test that setns(CLONE_NEWNET) points to new /proc/net content even
1862306a36Sopenharmony_ci * if old one is in dcache.
1962306a36Sopenharmony_ci *
2062306a36Sopenharmony_ci * FIXME /proc/net/unix is under CONFIG_UNIX which can be disabled.
2162306a36Sopenharmony_ci */
2262306a36Sopenharmony_ci#undef NDEBUG
2362306a36Sopenharmony_ci#include <assert.h>
2462306a36Sopenharmony_ci#include <errno.h>
2562306a36Sopenharmony_ci#include <sched.h>
2662306a36Sopenharmony_ci#include <signal.h>
2762306a36Sopenharmony_ci#include <stdio.h>
2862306a36Sopenharmony_ci#include <stdlib.h>
2962306a36Sopenharmony_ci#include <string.h>
3062306a36Sopenharmony_ci#include <unistd.h>
3162306a36Sopenharmony_ci#include <sys/types.h>
3262306a36Sopenharmony_ci#include <sys/stat.h>
3362306a36Sopenharmony_ci#include <fcntl.h>
3462306a36Sopenharmony_ci#include <sys/socket.h>
3562306a36Sopenharmony_ci
3662306a36Sopenharmony_cistatic pid_t pid = -1;
3762306a36Sopenharmony_ci
3862306a36Sopenharmony_cistatic void f(void)
3962306a36Sopenharmony_ci{
4062306a36Sopenharmony_ci	if (pid > 0) {
4162306a36Sopenharmony_ci		kill(pid, SIGTERM);
4262306a36Sopenharmony_ci	}
4362306a36Sopenharmony_ci}
4462306a36Sopenharmony_ci
4562306a36Sopenharmony_ciint main(void)
4662306a36Sopenharmony_ci{
4762306a36Sopenharmony_ci	int fd[2];
4862306a36Sopenharmony_ci	char _ = 0;
4962306a36Sopenharmony_ci	int nsfd;
5062306a36Sopenharmony_ci
5162306a36Sopenharmony_ci	atexit(f);
5262306a36Sopenharmony_ci
5362306a36Sopenharmony_ci	/* Check for priviledges and syscall availability straight away. */
5462306a36Sopenharmony_ci	if (unshare(CLONE_NEWNET) == -1) {
5562306a36Sopenharmony_ci		if (errno == ENOSYS || errno == EPERM) {
5662306a36Sopenharmony_ci			return 4;
5762306a36Sopenharmony_ci		}
5862306a36Sopenharmony_ci		return 1;
5962306a36Sopenharmony_ci	}
6062306a36Sopenharmony_ci	/* Distinguisher between two otherwise empty net namespaces. */
6162306a36Sopenharmony_ci	if (socket(AF_UNIX, SOCK_STREAM, 0) == -1) {
6262306a36Sopenharmony_ci		return 1;
6362306a36Sopenharmony_ci	}
6462306a36Sopenharmony_ci
6562306a36Sopenharmony_ci	if (pipe(fd) == -1) {
6662306a36Sopenharmony_ci		return 1;
6762306a36Sopenharmony_ci	}
6862306a36Sopenharmony_ci
6962306a36Sopenharmony_ci	pid = fork();
7062306a36Sopenharmony_ci	if (pid == -1) {
7162306a36Sopenharmony_ci		return 1;
7262306a36Sopenharmony_ci	}
7362306a36Sopenharmony_ci
7462306a36Sopenharmony_ci	if (pid == 0) {
7562306a36Sopenharmony_ci		if (unshare(CLONE_NEWNET) == -1) {
7662306a36Sopenharmony_ci			return 1;
7762306a36Sopenharmony_ci		}
7862306a36Sopenharmony_ci
7962306a36Sopenharmony_ci		if (write(fd[1], &_, 1) != 1) {
8062306a36Sopenharmony_ci			return 1;
8162306a36Sopenharmony_ci		}
8262306a36Sopenharmony_ci
8362306a36Sopenharmony_ci		pause();
8462306a36Sopenharmony_ci
8562306a36Sopenharmony_ci		return 0;
8662306a36Sopenharmony_ci	}
8762306a36Sopenharmony_ci
8862306a36Sopenharmony_ci	if (read(fd[0], &_, 1) != 1) {
8962306a36Sopenharmony_ci		return 1;
9062306a36Sopenharmony_ci	}
9162306a36Sopenharmony_ci
9262306a36Sopenharmony_ci	{
9362306a36Sopenharmony_ci		char buf[64];
9462306a36Sopenharmony_ci		snprintf(buf, sizeof(buf), "/proc/%u/ns/net", pid);
9562306a36Sopenharmony_ci		nsfd = open(buf, O_RDONLY);
9662306a36Sopenharmony_ci		if (nsfd == -1) {
9762306a36Sopenharmony_ci			return 1;
9862306a36Sopenharmony_ci		}
9962306a36Sopenharmony_ci	}
10062306a36Sopenharmony_ci
10162306a36Sopenharmony_ci	/* Reliably pin dentry into dcache. */
10262306a36Sopenharmony_ci	(void)open("/proc/net/unix", O_RDONLY);
10362306a36Sopenharmony_ci
10462306a36Sopenharmony_ci	if (setns(nsfd, CLONE_NEWNET) == -1) {
10562306a36Sopenharmony_ci		return 1;
10662306a36Sopenharmony_ci	}
10762306a36Sopenharmony_ci
10862306a36Sopenharmony_ci	kill(pid, SIGTERM);
10962306a36Sopenharmony_ci	pid = 0;
11062306a36Sopenharmony_ci
11162306a36Sopenharmony_ci	{
11262306a36Sopenharmony_ci		char buf[4096];
11362306a36Sopenharmony_ci		ssize_t rv;
11462306a36Sopenharmony_ci		int fd;
11562306a36Sopenharmony_ci
11662306a36Sopenharmony_ci		fd = open("/proc/net/unix", O_RDONLY);
11762306a36Sopenharmony_ci		if (fd == -1) {
11862306a36Sopenharmony_ci			return 1;
11962306a36Sopenharmony_ci		}
12062306a36Sopenharmony_ci
12162306a36Sopenharmony_ci#define S "Num       RefCount Protocol Flags    Type St Inode Path\n"
12262306a36Sopenharmony_ci		rv = read(fd, buf, sizeof(buf));
12362306a36Sopenharmony_ci
12462306a36Sopenharmony_ci		assert(rv == strlen(S));
12562306a36Sopenharmony_ci		assert(memcmp(buf, S, strlen(S)) == 0);
12662306a36Sopenharmony_ci	}
12762306a36Sopenharmony_ci
12862306a36Sopenharmony_ci	return 0;
12962306a36Sopenharmony_ci}
130