162306a36Sopenharmony_ci/* 262306a36Sopenharmony_ci * Copyright © 2019 Alexey Dobriyan <adobriyan@gmail.com> 362306a36Sopenharmony_ci * 462306a36Sopenharmony_ci * Permission to use, copy, modify, and distribute this software for any 562306a36Sopenharmony_ci * purpose with or without fee is hereby granted, provided that the above 662306a36Sopenharmony_ci * copyright notice and this permission notice appear in all copies. 762306a36Sopenharmony_ci * 862306a36Sopenharmony_ci * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 962306a36Sopenharmony_ci * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 1062306a36Sopenharmony_ci * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 1162306a36Sopenharmony_ci * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 1262306a36Sopenharmony_ci * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 1362306a36Sopenharmony_ci * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 1462306a36Sopenharmony_ci * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 1562306a36Sopenharmony_ci */ 1662306a36Sopenharmony_ci/* 1762306a36Sopenharmony_ci * Test that setns(CLONE_NEWNET) points to new /proc/net content even 1862306a36Sopenharmony_ci * if old one is in dcache. 1962306a36Sopenharmony_ci * 2062306a36Sopenharmony_ci * FIXME /proc/net/unix is under CONFIG_UNIX which can be disabled. 2162306a36Sopenharmony_ci */ 2262306a36Sopenharmony_ci#undef NDEBUG 2362306a36Sopenharmony_ci#include <assert.h> 2462306a36Sopenharmony_ci#include <errno.h> 2562306a36Sopenharmony_ci#include <sched.h> 2662306a36Sopenharmony_ci#include <signal.h> 2762306a36Sopenharmony_ci#include <stdio.h> 2862306a36Sopenharmony_ci#include <stdlib.h> 2962306a36Sopenharmony_ci#include <string.h> 3062306a36Sopenharmony_ci#include <unistd.h> 3162306a36Sopenharmony_ci#include <sys/types.h> 3262306a36Sopenharmony_ci#include <sys/stat.h> 3362306a36Sopenharmony_ci#include <fcntl.h> 3462306a36Sopenharmony_ci#include <sys/socket.h> 3562306a36Sopenharmony_ci 3662306a36Sopenharmony_cistatic pid_t pid = -1; 3762306a36Sopenharmony_ci 3862306a36Sopenharmony_cistatic void f(void) 3962306a36Sopenharmony_ci{ 4062306a36Sopenharmony_ci if (pid > 0) { 4162306a36Sopenharmony_ci kill(pid, SIGTERM); 4262306a36Sopenharmony_ci } 4362306a36Sopenharmony_ci} 4462306a36Sopenharmony_ci 4562306a36Sopenharmony_ciint main(void) 4662306a36Sopenharmony_ci{ 4762306a36Sopenharmony_ci int fd[2]; 4862306a36Sopenharmony_ci char _ = 0; 4962306a36Sopenharmony_ci int nsfd; 5062306a36Sopenharmony_ci 5162306a36Sopenharmony_ci atexit(f); 5262306a36Sopenharmony_ci 5362306a36Sopenharmony_ci /* Check for priviledges and syscall availability straight away. */ 5462306a36Sopenharmony_ci if (unshare(CLONE_NEWNET) == -1) { 5562306a36Sopenharmony_ci if (errno == ENOSYS || errno == EPERM) { 5662306a36Sopenharmony_ci return 4; 5762306a36Sopenharmony_ci } 5862306a36Sopenharmony_ci return 1; 5962306a36Sopenharmony_ci } 6062306a36Sopenharmony_ci /* Distinguisher between two otherwise empty net namespaces. */ 6162306a36Sopenharmony_ci if (socket(AF_UNIX, SOCK_STREAM, 0) == -1) { 6262306a36Sopenharmony_ci return 1; 6362306a36Sopenharmony_ci } 6462306a36Sopenharmony_ci 6562306a36Sopenharmony_ci if (pipe(fd) == -1) { 6662306a36Sopenharmony_ci return 1; 6762306a36Sopenharmony_ci } 6862306a36Sopenharmony_ci 6962306a36Sopenharmony_ci pid = fork(); 7062306a36Sopenharmony_ci if (pid == -1) { 7162306a36Sopenharmony_ci return 1; 7262306a36Sopenharmony_ci } 7362306a36Sopenharmony_ci 7462306a36Sopenharmony_ci if (pid == 0) { 7562306a36Sopenharmony_ci if (unshare(CLONE_NEWNET) == -1) { 7662306a36Sopenharmony_ci return 1; 7762306a36Sopenharmony_ci } 7862306a36Sopenharmony_ci 7962306a36Sopenharmony_ci if (write(fd[1], &_, 1) != 1) { 8062306a36Sopenharmony_ci return 1; 8162306a36Sopenharmony_ci } 8262306a36Sopenharmony_ci 8362306a36Sopenharmony_ci pause(); 8462306a36Sopenharmony_ci 8562306a36Sopenharmony_ci return 0; 8662306a36Sopenharmony_ci } 8762306a36Sopenharmony_ci 8862306a36Sopenharmony_ci if (read(fd[0], &_, 1) != 1) { 8962306a36Sopenharmony_ci return 1; 9062306a36Sopenharmony_ci } 9162306a36Sopenharmony_ci 9262306a36Sopenharmony_ci { 9362306a36Sopenharmony_ci char buf[64]; 9462306a36Sopenharmony_ci snprintf(buf, sizeof(buf), "/proc/%u/ns/net", pid); 9562306a36Sopenharmony_ci nsfd = open(buf, O_RDONLY); 9662306a36Sopenharmony_ci if (nsfd == -1) { 9762306a36Sopenharmony_ci return 1; 9862306a36Sopenharmony_ci } 9962306a36Sopenharmony_ci } 10062306a36Sopenharmony_ci 10162306a36Sopenharmony_ci /* Reliably pin dentry into dcache. */ 10262306a36Sopenharmony_ci (void)open("/proc/net/unix", O_RDONLY); 10362306a36Sopenharmony_ci 10462306a36Sopenharmony_ci if (setns(nsfd, CLONE_NEWNET) == -1) { 10562306a36Sopenharmony_ci return 1; 10662306a36Sopenharmony_ci } 10762306a36Sopenharmony_ci 10862306a36Sopenharmony_ci kill(pid, SIGTERM); 10962306a36Sopenharmony_ci pid = 0; 11062306a36Sopenharmony_ci 11162306a36Sopenharmony_ci { 11262306a36Sopenharmony_ci char buf[4096]; 11362306a36Sopenharmony_ci ssize_t rv; 11462306a36Sopenharmony_ci int fd; 11562306a36Sopenharmony_ci 11662306a36Sopenharmony_ci fd = open("/proc/net/unix", O_RDONLY); 11762306a36Sopenharmony_ci if (fd == -1) { 11862306a36Sopenharmony_ci return 1; 11962306a36Sopenharmony_ci } 12062306a36Sopenharmony_ci 12162306a36Sopenharmony_ci#define S "Num RefCount Protocol Flags Type St Inode Path\n" 12262306a36Sopenharmony_ci rv = read(fd, buf, sizeof(buf)); 12362306a36Sopenharmony_ci 12462306a36Sopenharmony_ci assert(rv == strlen(S)); 12562306a36Sopenharmony_ci assert(memcmp(buf, S, strlen(S)) == 0); 12662306a36Sopenharmony_ci } 12762306a36Sopenharmony_ci 12862306a36Sopenharmony_ci return 0; 12962306a36Sopenharmony_ci} 130