2016-11-17 04:54:38 +01:00
|
|
|
extern crate syscall;
|
|
|
|
|
2016-11-26 04:42:46 +01:00
|
|
|
use syscall::scheme::Scheme;
|
|
|
|
|
|
|
|
use std::{env, fs, thread};
|
2016-11-17 20:12:02 +01:00
|
|
|
use std::os::unix::process::CommandExt;
|
|
|
|
use std::process::Command;
|
2016-11-17 04:54:38 +01:00
|
|
|
|
2016-11-26 04:42:46 +01:00
|
|
|
use self::chroot::ChrootScheme;
|
|
|
|
|
|
|
|
mod chroot;
|
|
|
|
|
2016-11-17 04:54:38 +01:00
|
|
|
pub fn main() {
|
2016-11-25 23:42:26 +01:00
|
|
|
let mut args = env::args().skip(1);
|
|
|
|
|
2016-11-26 02:24:38 +01:00
|
|
|
let root_opt = args.next();
|
2016-11-25 23:42:26 +01:00
|
|
|
|
|
|
|
let cmd = args.next().unwrap_or("sh".to_string());
|
|
|
|
|
|
|
|
let mut names = vec![
|
2016-11-17 20:12:02 +01:00
|
|
|
"rand",
|
|
|
|
"tcp",
|
|
|
|
"udp"
|
|
|
|
];
|
2016-11-26 02:24:38 +01:00
|
|
|
|
|
|
|
if root_opt.is_none() {
|
2016-11-25 23:42:26 +01:00
|
|
|
names.push("file");
|
|
|
|
}
|
2016-11-17 20:12:02 +01:00
|
|
|
|
2016-11-25 20:09:54 +01:00
|
|
|
let mut name_ptrs = Vec::new();
|
|
|
|
for name in names.iter() {
|
|
|
|
name_ptrs.push([name.as_ptr() as usize, name.len()]);
|
|
|
|
}
|
|
|
|
|
|
|
|
let new_ns = syscall::mkns(&name_ptrs).unwrap();
|
|
|
|
|
2016-11-26 02:24:38 +01:00
|
|
|
let root_thread = if let Some(root) = root_opt {
|
|
|
|
Some(thread::spawn(move || {
|
|
|
|
syscall::setrens(-1isize as usize, new_ns).unwrap();
|
|
|
|
let scheme_fd = syscall::open(":file", syscall::O_CREAT | syscall::O_RDWR | syscall::O_CLOEXEC).unwrap();
|
|
|
|
syscall::setrens(-1isize as usize, syscall::getns().unwrap()).unwrap();
|
|
|
|
|
2016-11-26 04:42:46 +01:00
|
|
|
let chroot_scheme = ChrootScheme::new(fs::canonicalize(root).unwrap());
|
2016-11-26 02:24:38 +01:00
|
|
|
loop {
|
|
|
|
let mut packet = syscall::Packet::default();
|
|
|
|
if syscall::read(scheme_fd, &mut packet).unwrap() == 0 {
|
|
|
|
break;
|
|
|
|
}
|
2016-11-26 04:42:46 +01:00
|
|
|
chroot_scheme.handle(&mut packet);
|
|
|
|
syscall::write(scheme_fd, &packet).unwrap();
|
2016-11-26 02:24:38 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
let _ = syscall::close(scheme_fd);
|
|
|
|
}))
|
|
|
|
} else {
|
|
|
|
None
|
|
|
|
};
|
|
|
|
|
2016-11-17 06:14:02 +01:00
|
|
|
let pid = unsafe { syscall::clone(0).unwrap() };
|
2016-11-17 04:54:38 +01:00
|
|
|
if pid == 0 {
|
2016-11-25 20:09:54 +01:00
|
|
|
syscall::setrens(new_ns, new_ns).unwrap();
|
2016-11-17 06:14:02 +01:00
|
|
|
|
2016-11-25 23:42:26 +01:00
|
|
|
println!("Container {}: enter: {}", new_ns, cmd);
|
|
|
|
|
|
|
|
let mut command = Command::new(&cmd);
|
|
|
|
for arg in args {
|
|
|
|
command.arg(&arg);
|
|
|
|
}
|
2016-11-26 04:42:46 +01:00
|
|
|
command.current_dir("/");
|
2016-11-17 06:14:02 +01:00
|
|
|
|
2016-11-25 23:42:26 +01:00
|
|
|
let err = command.exec();
|
2016-11-17 20:12:02 +01:00
|
|
|
|
2016-11-25 23:42:26 +01:00
|
|
|
panic!("contain: failed to launch {}: {}", cmd, err);
|
2016-11-17 04:54:38 +01:00
|
|
|
} else {
|
|
|
|
let mut status = 0;
|
|
|
|
syscall::waitpid(pid, &mut status, 0).unwrap();
|
|
|
|
|
2016-11-17 20:24:46 +01:00
|
|
|
loop {
|
|
|
|
let mut c_status = 0;
|
|
|
|
let c_pid = syscall::waitpid(0, &mut c_status, syscall::WNOHANG).unwrap();
|
|
|
|
if c_pid == 0 {
|
|
|
|
break;
|
|
|
|
} else {
|
|
|
|
println!("Container zombie {}: {:X}", c_pid, c_status);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-11-25 20:09:54 +01:00
|
|
|
println!("Container {}: exit: {:X}", new_ns, status);
|
2016-11-17 04:54:38 +01:00
|
|
|
}
|
|
|
|
}
|