2 * lsns(8) - list system namespaces
4 * Copyright (C) 2015 Karel Zak <kzak@redhat.com>
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it would be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software Foundation,
18 * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
28 #include <sys/types.h>
30 #include <libsmartcols.h>
33 #ifdef HAVE_LINUX_NET_NAMESPACE_H
35 # include <sys/socket.h>
36 # include <linux/netlink.h>
37 # include <linux/rtnetlink.h>
38 # include <linux/net_namespace.h>
41 #ifdef HAVE_LINUX_NSFS_H
42 # include <linux/nsfs.h>
43 # define USE_NS_GET_API 1
46 #include "pathnames.h"
51 #include "closestream.h"
55 #include "namespace.h"
57 #include "fileutils.h"
61 static UL_DEBUG_DEFINE_MASK(lsns
);
62 UL_DEBUG_DEFINE_MASKNAMES(lsns
) = UL_DEBUG_EMPTY_MASKNAMES
;
64 #define LSNS_DEBUG_INIT (1 << 1)
65 #define LSNS_DEBUG_PROC (1 << 2)
66 #define LSNS_DEBUG_NS (1 << 3)
67 #define LSNS_DEBUG_ALL 0xFFFF
69 #define LSNS_NETNS_UNUSABLE -2
71 #define DBG(m, x) __UL_DBG(lsns, LSNS_DEBUG_, m, x)
72 #define ON_DBG(m, x) __UL_DBG_CALL(lsns, LSNS_DEBUG_, m, x)
74 #define UL_DEBUG_CURRENT_MASK UL_DEBUG_MASK(lsns)
77 static struct idcache
*uid_cache
= NULL
;
92 COL_PNS
, /* parent namespace */
93 COL_ONS
, /* owner namespace */
98 const char *name
; /* header */
99 double whint
; /* width hint (N < 1 is in percent of termwidth) */
100 int flags
; /* SCOLS_FL_* */
105 /* columns descriptions */
106 static const struct colinfo infos
[] = {
107 [COL_NS
] = { "NS", 10, SCOLS_FL_RIGHT
, N_("namespace identifier (inode number)"), SCOLS_JSON_NUMBER
},
108 [COL_TYPE
] = { "TYPE", 5, 0, N_("kind of namespace") },
109 [COL_PATH
] = { "PATH", 0, 0, N_("path to the namespace")},
110 [COL_NPROCS
] = { "NPROCS", 5, SCOLS_FL_RIGHT
, N_("number of processes in the namespace"), SCOLS_JSON_NUMBER
},
111 [COL_PID
] = { "PID", 5, SCOLS_FL_RIGHT
, N_("lowest PID in the namespace"), SCOLS_JSON_NUMBER
},
112 [COL_PPID
] = { "PPID", 5, SCOLS_FL_RIGHT
, N_("PPID of the PID"), SCOLS_JSON_NUMBER
},
113 [COL_COMMAND
] = { "COMMAND", 0, SCOLS_FL_TRUNC
, N_("command line of the PID")},
114 [COL_UID
] = { "UID", 0, SCOLS_FL_RIGHT
, N_("UID of the PID"), SCOLS_JSON_NUMBER
},
115 [COL_USER
] = { "USER", 0, 0, N_("username of the PID")},
116 [COL_NETNSID
] = { "NETNSID", 0, SCOLS_FL_RIGHT
, N_("namespace ID as used by network subsystem")},
117 [COL_NSFS
] = { "NSFS", 0, SCOLS_FL_WRAP
, N_("nsfs mountpoint (usually used network subsystem)")},
118 [COL_PNS
] = { "PNS", 10, SCOLS_FL_RIGHT
, N_("parent namespace identifier (inode number)"), SCOLS_JSON_NUMBER
},
119 [COL_ONS
] = { "ONS", 10, SCOLS_FL_RIGHT
, N_("owner namespace identifier (inode number)"), SCOLS_JSON_NUMBER
},
122 static int columns
[ARRAY_SIZE(infos
) * 2];
123 static size_t ncolumns
;
136 static char *ns_names
[] = {
137 [LSNS_ID_MNT
] = "mnt",
138 [LSNS_ID_NET
] = "net",
139 [LSNS_ID_PID
] = "pid",
140 [LSNS_ID_UTS
] = "uts",
141 [LSNS_ID_IPC
] = "ipc",
142 [LSNS_ID_USER
] = "user",
143 [LSNS_ID_CGROUP
] = "cgroup",
144 [LSNS_ID_TIME
] = "time"
153 struct lsns_namespace
{
155 int type
; /* LSNS_* */
158 ino_t related_id
[MAX_RELA
];
160 struct lsns_process
*proc
;
162 struct lsns_namespace
*related_ns
[MAX_RELA
];
163 struct libscols_line
*ns_outline
;
164 uid_t uid_fallback
; /* refer this member if `proc' is NULL. */
166 struct list_head namespaces
; /* lsns->processes member */
167 struct list_head processes
; /* head of lsns_process *siblings */
170 struct lsns_process
{
171 pid_t pid
; /* process PID */
172 pid_t ppid
; /* parent's PID */
173 pid_t tpid
; /* thread group */
177 ino_t ns_ids
[ARRAY_SIZE(ns_names
)];
178 ino_t ns_pids
[ARRAY_SIZE(ns_names
)];
179 ino_t ns_oids
[ARRAY_SIZE(ns_names
)];
181 struct list_head ns_siblings
[ARRAY_SIZE(ns_names
)];
183 struct list_head processes
; /* list of processes */
185 struct libscols_line
*outline
;
186 struct lsns_process
*parent
;
200 struct list_head processes
;
201 struct list_head namespaces
;
203 pid_t fltr_pid
; /* filter out by PID */
204 ino_t fltr_ns
; /* filter out by namespace */
205 int fltr_types
[ARRAY_SIZE(ns_names
)];
208 unsigned int raw
: 1,
216 struct libmnt_table
*tab
;
219 struct netnsid_cache
{
222 struct list_head netnsids
;
225 static struct list_head netnsids_cache
;
227 static int netlink_fd
= -1;
229 static void lsns_init_debug(void)
231 __UL_INIT_DEBUG_FROM_ENV(lsns
, LSNS_DEBUG_
, 0, LSNS_DEBUG
);
234 static int ns_name2type(const char *name
)
238 for (i
= 0; i
< ARRAY_SIZE(ns_names
); i
++) {
239 if (strcmp(ns_names
[i
], name
) == 0)
245 static int column_name_to_id(const char *name
, size_t namesz
)
251 for (i
= 0; i
< ARRAY_SIZE(infos
); i
++) {
252 const char *cn
= infos
[i
].name
;
254 if (!strncasecmp(name
, cn
, namesz
) && !*(cn
+ namesz
))
257 warnx(_("unknown column: %s"), name
);
261 static int has_column(int id
)
265 for (i
= 0; i
< ncolumns
; i
++) {
266 if (columns
[i
] == id
)
272 static inline int get_column_id(int num
)
275 assert((size_t) num
< ncolumns
);
276 assert(columns
[num
] < (int) ARRAY_SIZE(infos
));
281 static inline const struct colinfo
*get_column_info(unsigned num
)
283 return &infos
[ get_column_id(num
) ];
286 static int get_ns_ino(int dir
, const char *nsname
, ino_t
*ino
, ino_t
*pino
, ino_t
*oino
)
291 snprintf(path
, sizeof(path
), "ns/%s", nsname
);
293 if (fstatat(dir
, path
, &st
, 0) != 0)
300 #ifdef USE_NS_GET_API
302 fd
= openat(dir
, path
, 0);
305 if (strcmp(nsname
, "pid") == 0 || strcmp(nsname
, "user") == 0) {
306 if ((pfd
= ioctl(fd
, NS_GET_PARENT
)) < 0) {
312 if (fstat(pfd
, &st
) < 0) {
321 if ((ofd
= ioctl(fd
, NS_GET_USERNS
)) < 0) {
327 if (fstat(ofd
, &st
) < 0) {
340 static int parse_proc_stat(FILE *fp
, pid_t
*pid
, char *state
, pid_t
*ppid
)
342 char *line
= NULL
, *p
;
346 if (getline(&line
, &len
, fp
) < 0) {
351 p
= strrchr(line
, ')');
353 sscanf(line
, "%d (", pid
) != 1 ||
354 sscanf(p
, ") %c %d*[^\n]", state
, ppid
) != 2) {
365 #ifdef HAVE_LINUX_NET_NAMESPACE_H
366 static int netnsid_cache_find(ino_t netino
, int *netnsid
)
370 list_for_each(p
, &netnsids_cache
) {
371 struct netnsid_cache
*e
= list_entry(p
,
372 struct netnsid_cache
,
374 if (e
->ino
== netino
) {
383 static void netnsid_cache_add(ino_t netino
, int netnsid
)
385 struct netnsid_cache
*e
;
387 e
= xcalloc(1, sizeof(*e
));
390 INIT_LIST_HEAD(&e
->netnsids
);
391 list_add(&e
->netnsids
, &netnsids_cache
);
394 static int get_netnsid_via_netlink_send_request(int target_fd
)
396 unsigned char req
[NLMSG_SPACE(sizeof(struct rtgenmsg
))
397 + RTA_SPACE(sizeof(int32_t))];
399 struct nlmsghdr
*nlh
= (struct nlmsghdr
*)req
;
400 struct rtgenmsg
*rt
= NLMSG_DATA(req
);
401 struct rtattr
*rta
= (struct rtattr
*)
402 (req
+ NLMSG_SPACE(sizeof(struct rtgenmsg
)));
403 int32_t *fd
= RTA_DATA(rta
);
405 nlh
->nlmsg_len
= sizeof(req
);
406 nlh
->nlmsg_flags
= NLM_F_REQUEST
;
407 nlh
->nlmsg_type
= RTM_GETNSID
;
408 rt
->rtgen_family
= AF_UNSPEC
;
409 rta
->rta_type
= NETNSA_FD
;
410 rta
->rta_len
= RTA_SPACE(sizeof(int32_t));
413 if (send(netlink_fd
, req
, sizeof(req
), 0) < 0)
418 static int get_netnsid_via_netlink_recv_response(int *netnsid
)
420 unsigned char res
[NLMSG_SPACE(sizeof(struct rtgenmsg
))
421 + ((RTA_SPACE(sizeof(int32_t))
422 < RTA_SPACE(sizeof(struct nlmsgerr
)))
423 ? RTA_SPACE(sizeof(struct nlmsgerr
))
424 : RTA_SPACE(sizeof(int32_t)))];
428 struct nlmsghdr
*nlh
;
431 reslen
= recv(netlink_fd
, res
, sizeof(res
), 0);
435 nlh
= (struct nlmsghdr
*)res
;
436 if (!(NLMSG_OK(nlh
, (size_t)reslen
)
437 && nlh
->nlmsg_type
== RTM_NEWNSID
))
440 rtalen
= NLMSG_PAYLOAD(nlh
, sizeof(struct rtgenmsg
));
441 rta
= (struct rtattr
*)(res
+ NLMSG_SPACE(sizeof(struct rtgenmsg
)));
442 if (!(RTA_OK(rta
, rtalen
)
443 && rta
->rta_type
== NETNSA_NSID
))
446 *netnsid
= *(int *)RTA_DATA(rta
);
451 static int get_netnsid_via_netlink(int dir
, const char *path
)
457 return LSNS_NETNS_UNUSABLE
;
459 target_fd
= openat(dir
, path
, O_RDONLY
);
461 return LSNS_NETNS_UNUSABLE
;
463 if (get_netnsid_via_netlink_send_request(target_fd
) < 0) {
464 netnsid
= LSNS_NETNS_UNUSABLE
;
468 if (get_netnsid_via_netlink_recv_response(&netnsid
) < 0) {
469 netnsid
= LSNS_NETNS_UNUSABLE
;
478 static int get_netnsid(int dir
, ino_t netino
)
482 if (!netnsid_cache_find(netino
, &netnsid
)) {
483 netnsid
= get_netnsid_via_netlink(dir
, "ns/net");
484 netnsid_cache_add(netino
, netnsid
);
490 static int get_netnsid(int dir
__attribute__((__unused__
)),
491 ino_t netino
__attribute__((__unused__
)))
493 return LSNS_NETNS_UNUSABLE
;
495 #endif /* HAVE_LINUX_NET_NAMESPACE_H */
497 static int read_process(struct lsns
*ls
, pid_t pid
)
499 struct lsns_process
*p
= NULL
;
507 DBG(PROC
, ul_debug("reading %d", (int) pid
));
509 snprintf(buf
, sizeof(buf
), "/proc/%d", pid
);
514 p
= xcalloc(1, sizeof(*p
));
515 p
->netnsid
= LSNS_NETNS_UNUSABLE
;
517 if (fstat(dirfd(dir
), &st
) == 0) {
519 add_uid(uid_cache
, st
.st_uid
);
522 fd
= openat(dirfd(dir
), "stat", O_RDONLY
);
527 if (!(f
= fdopen(fd
, "r"))) {
531 rc
= parse_proc_stat(f
, &p
->pid
, &p
->state
, &p
->ppid
);
536 for (i
= 0; i
< ARRAY_SIZE(p
->ns_ids
); i
++) {
537 INIT_LIST_HEAD(&p
->ns_siblings
[i
]);
539 if (!ls
->fltr_types
[i
])
542 rc
= get_ns_ino(dirfd(dir
), ns_names
[i
], &p
->ns_ids
[i
],
543 &p
->ns_pids
[i
], &p
->ns_oids
[i
]);
544 if (rc
&& rc
!= -EACCES
&& rc
!= -ENOENT
)
546 if (i
== LSNS_ID_NET
)
547 p
->netnsid
= get_netnsid(dirfd(dir
), p
->ns_ids
[i
]);
551 INIT_LIST_HEAD(&p
->processes
);
553 DBG(PROC
, ul_debugobj(p
, "new pid=%d", p
->pid
));
554 list_add_tail(&p
->processes
, &ls
->processes
);
564 static int read_processes(struct lsns
*ls
)
570 DBG(PROC
, ul_debug("opening /proc"));
572 dir
= opendir(_PATH_PROC
);
576 while ((d
= xreaddir(dir
))) {
579 if (procfs_dirent_get_pid(d
, &pid
) != 0)
582 /* TODO: use ul_new_procfs_path(pid, NULL) to read files from /proc/pid/
584 rc
= read_process(ls
, pid
);
585 if (rc
&& rc
!= -EACCES
&& rc
!= -ENOENT
)
590 DBG(PROC
, ul_debug("closing /proc"));
595 static struct lsns_namespace
*get_namespace(struct lsns
*ls
, ino_t ino
)
599 list_for_each(p
, &ls
->namespaces
) {
600 struct lsns_namespace
*ns
= list_entry(p
, struct lsns_namespace
, namespaces
);
608 static int namespace_has_process(struct lsns_namespace
*ns
, pid_t pid
)
612 list_for_each(p
, &ns
->processes
) {
613 struct lsns_process
*proc
= list_entry(p
, struct lsns_process
, ns_siblings
[ns
->type
]);
615 if (proc
->pid
== pid
)
621 static struct lsns_namespace
*add_namespace(struct lsns
*ls
, int type
, ino_t ino
,
622 ino_t parent_ino
, ino_t owner_ino
)
624 struct lsns_namespace
*ns
= xcalloc(1, sizeof(*ns
));
629 DBG(NS
, ul_debugobj(ns
, "new %s[%ju]", ns_names
[type
], (uintmax_t)ino
));
631 INIT_LIST_HEAD(&ns
->processes
);
632 INIT_LIST_HEAD(&ns
->namespaces
);
636 ns
->related_id
[RELA_PARENT
] = parent_ino
;
637 ns
->related_id
[RELA_OWNER
] = owner_ino
;
639 list_add_tail(&ns
->namespaces
, &ls
->namespaces
);
643 static int add_process_to_namespace(struct lsns
*ls
, struct lsns_namespace
*ns
, struct lsns_process
*proc
)
647 DBG(NS
, ul_debugobj(ns
, "add process [%p] pid=%d to %s[%ju]",
648 proc
, proc
->pid
, ns_names
[ns
->type
], (uintmax_t)ns
->id
));
650 list_for_each(p
, &ls
->processes
) {
651 struct lsns_process
*xproc
= list_entry(p
, struct lsns_process
, processes
);
653 if (xproc
->pid
== proc
->ppid
) /* my parent */
654 proc
->parent
= xproc
;
655 else if (xproc
->ppid
== proc
->pid
) /* my child */
656 xproc
->parent
= proc
;
659 list_add_tail(&proc
->ns_siblings
[ns
->type
], &ns
->processes
);
662 if (!ns
->proc
|| ns
->proc
->pid
> proc
->pid
)
668 static int cmp_namespaces(struct list_head
*a
, struct list_head
*b
,
669 __attribute__((__unused__
)) void *data
)
671 struct lsns_namespace
*xa
= list_entry(a
, struct lsns_namespace
, namespaces
),
672 *xb
= list_entry(b
, struct lsns_namespace
, namespaces
);
674 return cmp_numbers(xa
->id
, xb
->id
);
677 static int netnsid_xasputs(char **str
, int netnsid
)
680 return xasprintf(str
, "%d", netnsid
);
681 #ifdef NETNSA_NSID_NOT_ASSIGNED
682 if (netnsid
== NETNSA_NSID_NOT_ASSIGNED
)
683 return xasprintf(str
, "%s", "unassigned");
688 #ifdef USE_NS_GET_API
689 static int clone_type_to_lsns_type(int clone_type
)
691 switch (clone_type
) {
694 case CLONE_NEWCGROUP
:
695 return LSNS_ID_CGROUP
;
711 static struct lsns_namespace
*add_namespace_for_nsfd(struct lsns
*ls
, int fd
, ino_t ino
)
713 int fd_owner
= -1, fd_parent
= -1;
714 struct stat st_owner
, st_parent
;
715 ino_t ino_owner
= 0, ino_parent
= 0;
716 struct lsns_namespace
*ns
;
717 int clone_type
, lsns_type
;
719 clone_type
= ioctl(fd
, NS_GET_NSTYPE
);
722 lsns_type
= clone_type_to_lsns_type(clone_type
);
726 fd_owner
= ioctl(fd
, NS_GET_USERNS
);
729 if (fstat(fd_owner
, &st_owner
) < 0)
731 ino_owner
= st_owner
.st_ino
;
734 fd_parent
= ioctl(fd
, NS_GET_PARENT
);
737 if (fstat(fd_parent
, &st_parent
) < 0)
739 ino_parent
= st_parent
.st_ino
;
742 ns
= add_namespace(ls
, lsns_type
, ino
, ino_parent
, ino_owner
);
743 ioctl(fd
, NS_GET_OWNER_UID
, &ns
->uid_fallback
);
744 add_uid(uid_cache
, ns
->uid_fallback
);
746 if ((lsns_type
== LSNS_ID_USER
|| lsns_type
== LSNS_ID_PID
)
747 && ino_parent
!= ino
&& ino_parent
!= 0) {
748 ns
->related_ns
[RELA_PARENT
] = get_namespace(ls
, ino_parent
);
749 if (!ns
->related_ns
[RELA_PARENT
]) {
750 ns
->related_ns
[RELA_PARENT
] = add_namespace_for_nsfd(ls
, fd_parent
, ino_parent
);
751 if (ino_parent
== ino_owner
)
752 ns
->related_ns
[RELA_OWNER
] = ns
->related_ns
[RELA_PARENT
];
756 if (ns
->related_ns
[RELA_OWNER
] == NULL
&& ino_owner
!= 0) {
757 ns
->related_ns
[RELA_OWNER
] = get_namespace(ls
, ino_owner
);
758 if (!ns
->related_ns
[RELA_OWNER
])
759 ns
->related_ns
[RELA_OWNER
] = add_namespace_for_nsfd(ls
, fd_owner
, ino_owner
);
770 static void interpolate_missing_namespaces(struct lsns
*ls
, struct lsns_namespace
*orphan
, int rela
)
772 const int cmd
[MAX_RELA
] = {
773 [RELA_PARENT
] = NS_GET_PARENT
,
774 [RELA_OWNER
] = NS_GET_USERNS
777 int fd_orphan
, fd_missing
;
780 orphan
->related_ns
[rela
] = get_namespace(ls
, orphan
->related_id
[rela
]);
781 if (orphan
->related_ns
[rela
])
784 snprintf(buf
, sizeof(buf
), "/proc/%d/ns/%s", orphan
->proc
->pid
, ns_names
[orphan
->type
]);
785 fd_orphan
= open(buf
, O_RDONLY
);
789 fd_missing
= ioctl(fd_orphan
, cmd
[rela
]);
794 if (fstat(fd_missing
, &st
) < 0
795 || st
.st_ino
!= orphan
->related_id
[rela
]) {
800 orphan
->related_ns
[rela
] = add_namespace_for_nsfd(ls
, fd_missing
, orphan
->related_id
[rela
]);
804 static void read_related_namespaces(struct lsns
*ls
)
807 struct lsns_namespace
*orphan
[2] = {NULL
, NULL
};
810 list_for_each(p
, &ls
->namespaces
) {
811 struct lsns_namespace
*ns
= list_entry(p
, struct lsns_namespace
, namespaces
);
812 struct list_head
*pp
;
813 list_for_each(pp
, &ls
->namespaces
) {
814 struct lsns_namespace
*pns
= list_entry(pp
, struct lsns_namespace
, namespaces
);
815 if (ns
->type
== LSNS_ID_USER
816 || ns
->type
== LSNS_ID_PID
) {
817 if (ns
->related_id
[RELA_PARENT
] == pns
->id
)
818 ns
->related_ns
[RELA_PARENT
] = pns
;
819 if (ns
->related_id
[RELA_OWNER
] == pns
->id
)
820 ns
->related_ns
[RELA_OWNER
] = pns
;
821 if (ns
->related_ns
[RELA_PARENT
] && ns
->related_ns
[RELA_OWNER
])
824 if (ns
->related_id
[RELA_OWNER
] == pns
->id
) {
825 ns
->related_ns
[RELA_OWNER
] = pns
;
831 /* lsns scans /proc/[0-9]+ for finding namespaces.
832 * So if a namespace has no process, lsns cannot
833 * find it. Here we call it a missing namespace.
835 * If the id for a related namesspce is known but
836 * namespace for the id is not found, there must
837 * be orphan namespaces. A missing namespace is an
838 * owner or a parent of the orphan namespace.
840 for (rela
= 0; rela
< MAX_RELA
; rela
++) {
841 if (ns
->related_id
[rela
] != 0
842 && ns
->related_ns
[rela
] == NULL
) {
843 ns
->related_ns
[rela
] = orphan
[rela
];
849 for (rela
= 0; rela
< MAX_RELA
; rela
++) {
850 while (orphan
[rela
]) {
851 struct lsns_namespace
*current
= orphan
[rela
];
852 orphan
[rela
] = orphan
[rela
]->related_ns
[rela
];
853 current
->related_ns
[rela
] = NULL
;
854 interpolate_missing_namespaces(ls
, current
, rela
);
859 #endif /* USE_NS_GET_API */
861 static int read_namespaces(struct lsns
*ls
)
865 DBG(NS
, ul_debug("reading namespace"));
867 list_for_each(p
, &ls
->processes
) {
869 struct lsns_namespace
*ns
;
870 struct lsns_process
*proc
= list_entry(p
, struct lsns_process
, processes
);
872 for (i
= 0; i
< ARRAY_SIZE(proc
->ns_ids
); i
++) {
873 if (proc
->ns_ids
[i
] == 0)
875 if (!(ns
= get_namespace(ls
, proc
->ns_ids
[i
]))) {
876 ns
= add_namespace(ls
, i
, proc
->ns_ids
[i
],
877 proc
->ns_pids
[i
], proc
->ns_oids
[i
]);
881 add_process_to_namespace(ls
, ns
, proc
);
885 #ifdef USE_NS_GET_API
886 if (ls
->tree
== LSNS_TREE_OWNER
|| ls
->tree
== LSNS_TREE_PARENT
)
887 read_related_namespaces(ls
);
889 list_sort(&ls
->namespaces
, cmp_namespaces
, NULL
);
894 static int is_nsfs_root(struct libmnt_fs
*fs
, void *data
)
896 if (!mnt_fs_match_fstype(fs
, "nsfs") || !mnt_fs_get_root(fs
))
899 return (strcmp(mnt_fs_get_root(fs
), (char *)data
) == 0);
902 static int is_path_included(const char *path_set
, const char *elt
,
910 tmp
= strstr(path_set
, elt
);
914 elt_len
= strlen(elt
);
915 path_set_len
= strlen(path_set
);
917 /* path_set includes only elt or
918 * path_set includes elt as the first element.
921 && ((path_set_len
== elt_len
)
922 || (path_set
[elt_len
] == sep
)))
925 /* path_set includes elt at the middle
926 * or as the last element.
928 if ((*(tmp
- 1) == sep
)
929 && ((*(tmp
+ elt_len
) == sep
)
930 || (*(tmp
+ elt_len
) == '\0')))
936 static int nsfs_xasputs(char **str
,
937 struct lsns_namespace
*ns
,
938 struct libmnt_table
*tab
,
941 struct libmnt_iter
*itr
= mnt_new_iter(MNT_ITER_FORWARD
);
943 struct libmnt_fs
*fs
= NULL
;
945 xasprintf(&expected_root
, "%s:[%ju]", ns_names
[ns
->type
], (uintmax_t)ns
->id
);
948 while (mnt_table_find_next_fs(tab
, itr
, is_nsfs_root
,
949 expected_root
, &fs
) == 0) {
951 const char *tgt
= mnt_fs_get_target(fs
);
954 xasprintf(str
, "%s", tgt
);
956 else if (!is_path_included(*str
, tgt
, sep
)) {
959 xasprintf(&tmp
, "%s%c%s", *str
, sep
, tgt
);
969 static void add_scols_line(struct lsns
*ls
, struct libscols_table
*table
,
970 struct lsns_namespace
*ns
, struct lsns_process
*proc
)
973 struct libscols_line
*line
;
978 line
= scols_table_new_line(table
,
979 (ls
->tree
== LSNS_TREE_PROCESS
&& proc
) && proc
->parent
? proc
->parent
->outline
:
980 (ls
->tree
== LSNS_TREE_PARENT
) && ns
->related_ns
[RELA_PARENT
] ? ns
->related_ns
[RELA_PARENT
]->ns_outline
:
981 (ls
->tree
== LSNS_TREE_OWNER
) && ns
->related_ns
[RELA_OWNER
] ? ns
->related_ns
[RELA_OWNER
]->ns_outline
:
984 warn(_("failed to add line to output"));
988 for (i
= 0; i
< ncolumns
; i
++) {
991 switch (get_column_id(i
)) {
993 xasprintf(&str
, "%ju", (uintmax_t)ns
->id
);
997 xasprintf(&str
, "%d", (int) proc
->pid
);
1001 xasprintf(&str
, "%d", (int) proc
->ppid
);
1004 xasprintf(&str
, "%s", ns_names
[ns
->type
]);
1007 xasprintf(&str
, "%d", ns
->nprocs
);
1012 str
= pid_get_cmdline(proc
->pid
);
1014 str
= pid_get_cmdname(proc
->pid
);
1019 xasprintf(&str
, "/proc/%d/ns/%s", (int) proc
->pid
, ns_names
[ns
->type
]);
1022 xasprintf(&str
, "%d", proc
? (int) proc
->uid
: (int) ns
->uid_fallback
);
1025 xasprintf(&str
, "%s", get_id(uid_cache
, proc
? proc
->uid
: ns
->uid_fallback
)->name
);
1030 if (ns
->type
== LSNS_ID_NET
)
1031 netnsid_xasputs(&str
, proc
->netnsid
);
1034 nsfs_xasputs(&str
, ns
, ls
->tab
, ls
->no_wrap
? ',' : '\n');
1037 xasprintf(&str
, "%ju", (uintmax_t)ns
->related_id
[RELA_PARENT
]);
1040 xasprintf(&str
, "%ju", (uintmax_t)ns
->related_id
[RELA_OWNER
]);
1046 if (str
&& scols_line_refer_data(line
, i
, str
) != 0)
1050 if (ls
->tree
== LSNS_TREE_OWNER
|| ls
->tree
== LSNS_TREE_PARENT
)
1051 ns
->ns_outline
= line
;
1053 proc
->outline
= line
;
1056 static struct libscols_table
*init_scols_table(struct lsns
*ls
)
1058 struct libscols_table
*tab
;
1061 tab
= scols_new_table();
1063 warn(_("failed to initialize output table"));
1067 scols_table_enable_raw(tab
, ls
->raw
);
1068 scols_table_enable_json(tab
, ls
->json
);
1069 scols_table_enable_noheadings(tab
, ls
->no_headings
);
1072 scols_table_set_name(tab
, "namespaces");
1074 for (i
= 0; i
< ncolumns
; i
++) {
1075 const struct colinfo
*col
= get_column_info(i
);
1076 int flags
= col
->flags
;
1077 struct libscols_column
*cl
;
1080 flags
&= ~SCOLS_FL_TRUNC
;
1081 if (ls
->tree
== LSNS_TREE_PROCESS
&& get_column_id(i
) == COL_COMMAND
)
1082 flags
|= SCOLS_FL_TREE
;
1084 flags
&= ~SCOLS_FL_WRAP
;
1085 if ((ls
->tree
== LSNS_TREE_OWNER
|| ls
->tree
== LSNS_TREE_PARENT
)
1086 && get_column_id(i
) == COL_NS
) {
1087 flags
|= SCOLS_FL_TREE
;
1088 flags
&= ~SCOLS_FL_RIGHT
;
1091 cl
= scols_table_new_column(tab
, col
->name
, col
->whint
, flags
);
1093 warnx(_("failed to initialize output column"));
1097 scols_column_set_json_type(cl
, col
->json_type
);
1099 if (!ls
->no_wrap
&& get_column_id(i
) == COL_NSFS
) {
1100 scols_column_set_wrapfunc(cl
,
1101 scols_wrapnl_chunksize
,
1102 scols_wrapnl_nextchunk
,
1104 scols_column_set_safechars(cl
, "\n");
1110 scols_unref_table(tab
);
1114 static void show_namespace(struct lsns
*ls
, struct libscols_table
*tab
,
1115 struct lsns_namespace
*ns
, struct lsns_process
*proc
)
1118 * create a tree from owner->owned and/or parent->child relation
1120 if (ls
->tree
== LSNS_TREE_OWNER
1121 && ns
->related_ns
[RELA_OWNER
]
1122 && !ns
->related_ns
[RELA_OWNER
]->ns_outline
)
1123 show_namespace(ls
, tab
, ns
->related_ns
[RELA_OWNER
], ns
->related_ns
[RELA_OWNER
]->proc
);
1124 else if (ls
->tree
== LSNS_TREE_PARENT
) {
1125 if (ns
->related_ns
[RELA_PARENT
]) {
1126 if (!ns
->related_ns
[RELA_PARENT
]->ns_outline
)
1127 show_namespace(ls
, tab
, ns
->related_ns
[RELA_PARENT
], ns
->related_ns
[RELA_PARENT
]->proc
);
1129 else if (ns
->related_ns
[RELA_OWNER
] && !ns
->related_ns
[RELA_OWNER
]->ns_outline
)
1130 show_namespace(ls
, tab
, ns
->related_ns
[RELA_OWNER
], ns
->related_ns
[RELA_OWNER
]->proc
);
1133 add_scols_line(ls
, tab
, ns
, proc
);
1136 static int show_namespaces(struct lsns
*ls
)
1138 struct libscols_table
*tab
;
1139 struct list_head
*p
;
1142 tab
= init_scols_table(ls
);
1146 list_for_each(p
, &ls
->namespaces
) {
1147 struct lsns_namespace
*ns
= list_entry(p
, struct lsns_namespace
, namespaces
);
1149 if (ls
->fltr_pid
!= 0 && !namespace_has_process(ns
, ls
->fltr_pid
))
1152 if (!ns
->ns_outline
)
1153 show_namespace(ls
, tab
, ns
, ns
->proc
);
1156 scols_print_table(tab
);
1157 scols_unref_table(tab
);
1161 static void show_process(struct lsns
*ls
, struct libscols_table
*tab
,
1162 struct lsns_process
*proc
, struct lsns_namespace
*ns
)
1165 * create a tree from parent->child relation, but only if the parent is
1166 * within the same namespace
1168 if (ls
->tree
== LSNS_TREE_PROCESS
1170 && !proc
->parent
->outline
1171 && proc
->parent
->ns_ids
[ns
->type
] == proc
->ns_ids
[ns
->type
])
1172 show_process(ls
, tab
, proc
->parent
, ns
);
1174 add_scols_line(ls
, tab
, ns
, proc
);
1178 static int show_namespace_processes(struct lsns
*ls
, struct lsns_namespace
*ns
)
1180 struct libscols_table
*tab
;
1181 struct list_head
*p
;
1183 tab
= init_scols_table(ls
);
1187 list_for_each(p
, &ns
->processes
) {
1188 struct lsns_process
*proc
= list_entry(p
, struct lsns_process
, ns_siblings
[ns
->type
]);
1191 show_process(ls
, tab
, proc
, ns
);
1195 scols_print_table(tab
);
1196 scols_unref_table(tab
);
1200 static void __attribute__((__noreturn__
)) usage(void)
1205 fputs(USAGE_HEADER
, out
);
1208 _(" %s [options] [<namespace>]\n"), program_invocation_short_name
);
1210 fputs(USAGE_SEPARATOR
, out
);
1211 fputs(_("List system namespaces.\n"), out
);
1213 fputs(USAGE_OPTIONS
, out
);
1214 fputs(_(" -J, --json use JSON output format\n"), out
);
1215 fputs(_(" -l, --list use list format output\n"), out
);
1216 fputs(_(" -n, --noheadings don't print headings\n"), out
);
1217 fputs(_(" -o, --output <list> define which output columns to use\n"), out
);
1218 fputs(_(" --output-all output all columns\n"), out
);
1219 fputs(_(" -p, --task <pid> print process namespaces\n"), out
);
1220 fputs(_(" -r, --raw use the raw output format\n"), out
);
1221 fputs(_(" -u, --notruncate don't truncate text in columns\n"), out
);
1222 fputs(_(" -W, --nowrap don't use multi-line representation\n"), out
);
1223 fputs(_(" -t, --type <name> namespace type (mnt, net, ipc, user, pid, uts, cgroup, time)\n"), out
);
1224 fputs(_(" -T, --tree <rel> use tree format (parent, owner, or process)\n"), out
);
1226 fputs(USAGE_SEPARATOR
, out
);
1227 printf(USAGE_HELP_OPTIONS(24));
1229 fputs(USAGE_COLUMNS
, out
);
1230 for (i
= 0; i
< ARRAY_SIZE(infos
); i
++)
1231 fprintf(out
, " %11s %s\n", infos
[i
].name
, _(infos
[i
].help
));
1233 printf(USAGE_MAN_TAIL("lsns(8)"));
1239 int main(int argc
, char *argv
[])
1242 int c
, force_list
= 0;
1244 char *outarg
= NULL
;
1246 OPT_OUTPUT_ALL
= CHAR_MAX
+ 1
1248 static const struct option long_opts
[] = {
1249 { "json", no_argument
, NULL
, 'J' },
1250 { "task", required_argument
, NULL
, 'p' },
1251 { "help", no_argument
, NULL
, 'h' },
1252 { "output", required_argument
, NULL
, 'o' },
1253 { "output-all", no_argument
, NULL
, OPT_OUTPUT_ALL
},
1254 { "notruncate", no_argument
, NULL
, 'u' },
1255 { "version", no_argument
, NULL
, 'V' },
1256 { "noheadings", no_argument
, NULL
, 'n' },
1257 { "nowrap", no_argument
, NULL
, 'W' },
1258 { "list", no_argument
, NULL
, 'l' },
1259 { "raw", no_argument
, NULL
, 'r' },
1260 { "type", required_argument
, NULL
, 't' },
1261 { "tree", optional_argument
, NULL
, 'T' },
1262 { NULL
, 0, NULL
, 0 }
1265 static const ul_excl_t excl
[] = { /* rows and cols in ASCII order */
1270 int excl_st
[ARRAY_SIZE(excl
)] = UL_EXCL_STATUS_INIT
;
1273 setlocale(LC_ALL
, "");
1274 bindtextdomain(PACKAGE
, LOCALEDIR
);
1275 textdomain(PACKAGE
);
1276 close_stdout_atexit();
1279 memset(&ls
, 0, sizeof(ls
));
1281 INIT_LIST_HEAD(&ls
.processes
);
1282 INIT_LIST_HEAD(&ls
.namespaces
);
1283 INIT_LIST_HEAD(&netnsids_cache
);
1285 while ((c
= getopt_long(argc
, argv
,
1286 "Jlp:o:nruhVt:T::W", long_opts
, NULL
)) != -1) {
1288 err_exclusive_options(c
, long_opts
, excl
, excl_st
);
1300 case OPT_OUTPUT_ALL
:
1301 for (ncolumns
= 0; ncolumns
< ARRAY_SIZE(infos
); ncolumns
++)
1302 columns
[ncolumns
] = ncolumns
;
1305 ls
.fltr_pid
= strtos32_or_err(optarg
, _("invalid PID argument"));
1311 ls
.no_wrap
= ls
.raw
= 1;
1318 int type
= ns_name2type(optarg
);
1320 errx(EXIT_FAILURE
, _("unknown namespace type: %s"), optarg
);
1321 ls
.fltr_types
[type
] = 1;
1323 if (type
== LSNS_ID_NET
)
1331 ls
.tree
= LSNS_TREE_OWNER
;
1335 if (strcmp (optarg
, "parent") == 0)
1336 ls
.tree
= LSNS_TREE_PARENT
;
1337 else if (strcmp (optarg
, "process") == 0)
1338 ls
.tree
= LSNS_TREE_PROCESS
;
1339 else if (strcmp (optarg
, "owner") != 0)
1340 errx(EXIT_FAILURE
, _("unknown tree type: %s"), optarg
);
1347 print_version(EXIT_SUCCESS
);
1349 errtryhelp(EXIT_FAILURE
);
1353 if (!ls
.fltr_ntypes
) {
1356 for (i
= 0; i
< ARRAY_SIZE(ns_names
); i
++)
1357 ls
.fltr_types
[i
] = 1;
1360 if (optind
< argc
) {
1362 errx(EXIT_FAILURE
, _("--task is mutually exclusive with <namespace>"));
1363 ls
.fltr_ns
= strtou64_or_err(argv
[optind
], _("invalid namespace argument"));
1364 if (!ls
.tree
&& !force_list
)
1365 ls
.tree
= LSNS_TREE_PROCESS
;
1368 columns
[ncolumns
++] = COL_PID
;
1369 columns
[ncolumns
++] = COL_PPID
;
1370 columns
[ncolumns
++] = COL_USER
;
1371 columns
[ncolumns
++] = COL_COMMAND
;
1376 columns
[ncolumns
++] = COL_NS
;
1377 columns
[ncolumns
++] = COL_TYPE
;
1378 columns
[ncolumns
++] = COL_NPROCS
;
1379 columns
[ncolumns
++] = COL_PID
;
1380 columns
[ncolumns
++] = COL_USER
;
1382 columns
[ncolumns
++] = COL_NETNSID
;
1383 columns
[ncolumns
++] = COL_NSFS
;
1385 columns
[ncolumns
++] = COL_COMMAND
;
1387 if (!ls
.tree
&& !force_list
)
1388 ls
.tree
= LSNS_TREE_PROCESS
;
1391 #ifndef USE_NS_GET_API
1392 if (ls
.tree
&& ls
.tree
!= LSNS_TREE_PROCESS
)
1393 errx(EXIT_FAILURE
, _("--tree={parent|owner} is unsupported for your system"));
1395 if (outarg
&& string_add_to_idarray(outarg
, columns
, ARRAY_SIZE(columns
),
1396 &ncolumns
, column_name_to_id
) < 0)
1397 return EXIT_FAILURE
;
1399 scols_init_debug(0);
1401 uid_cache
= new_idcache();
1403 err(EXIT_FAILURE
, _("failed to allocate UID cache"));
1405 #ifdef HAVE_LINUX_NET_NAMESPACE_H
1406 if (has_column(COL_NETNSID
))
1407 netlink_fd
= socket(AF_NETLINK
, SOCK_RAW
, NETLINK_ROUTE
);
1409 if (has_column(COL_NSFS
)) {
1410 ls
.tab
= mnt_new_table_from_file(_PATH_PROC_MOUNTINFO
);
1412 err(MNT_EX_FAIL
, _("failed to parse %s"), _PATH_PROC_MOUNTINFO
);
1415 r
= read_processes(&ls
);
1417 r
= read_namespaces(&ls
);
1420 struct lsns_namespace
*ns
= get_namespace(&ls
, ls
.fltr_ns
);
1423 errx(EXIT_FAILURE
, _("not found namespace: %ju"), (uintmax_t) ls
.fltr_ns
);
1424 r
= show_namespace_processes(&ls
, ns
);
1426 r
= show_namespaces(&ls
);
1429 mnt_free_table(ls
.tab
);
1430 if (netlink_fd
>= 0)
1432 free_idcache(uid_cache
);
1433 return r
== 0 ? EXIT_SUCCESS
: EXIT_FAILURE
;