blob: d1361617810329c0d4efca7376969d42e5aae7ce [file] [log] [blame]
// Copyright 2019 The Chromium OS Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "brillo/scoped_mount_namespace.h"
#include <fcntl.h>
#include <sched.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <utility>
#include <base/posix/eintr_wrapper.h>
#include <base/strings/stringprintf.h>
namespace brillo {
ScopedMountNamespace::ScopedMountNamespace(base::ScopedFD mount_namespace_fd)
: mount_namespace_fd_(std::move(mount_namespace_fd)) {}
ScopedMountNamespace::~ScopedMountNamespace() {
PLOG_IF(ERROR, setns(mount_namespace_fd_.get(), CLONE_NEWNS) != 0)
<< "Ignoring failure to restore original mount namespace";
}
// static
std::unique_ptr<ScopedMountNamespace>
ScopedMountNamespace::CreateForPid(pid_t pid) {
constexpr char kCurrentMountNamespacePath[] = "/proc/self/ns/mnt";
base::ScopedFD original_mount_namespace_fd(
HANDLE_EINTR(open(kCurrentMountNamespacePath, O_RDONLY)));
if (!original_mount_namespace_fd.is_valid()) {
PLOG(ERROR) << "Failed to get the original mount namespace FD";
return nullptr;
}
base::ScopedFD mount_namespace_fd(HANDLE_EINTR(
open(base::StringPrintf("/proc/%d/ns/mnt", pid).c_str(), O_RDONLY)));
if (!mount_namespace_fd.is_valid()) {
PLOG(ERROR) << "Failed to get PID " << pid << "'s mount namespace FD";
return nullptr;
}
if (setns(mount_namespace_fd.get(), CLONE_NEWNS) != 0) {
PLOG(ERROR) << "Failed to enter PID " << pid << "'s mount namespace";
return nullptr;
}
return std::make_unique<ScopedMountNamespace>(
std::move(original_mount_namespace_fd));
}
} // namespace brillo