1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277
|
.\" Copyright, the authors of the Linux man-pages project
.\"
.\" SPDX-License-Identifier: Linux-man-pages-copyleft
.\"
.TH NS_GET_USERNS 2const 2025-05-17 "Linux man-pages (unreleased)"
.SH NAME
NS_GET_USERNS,
NS_GET_PARENT
\-
discovering namespace relationships
.SH SYNOPSIS
.nf
.BR "#include <linux/nsfs.h>" " /* Definition of " NS_GET_* " constants */"
.B #include <sys/ioctl.h>
.P
.BI "int ioctl(int " fd ", unsigned long " op );
.fi
.SH DESCRIPTION
The following
.BR ioctl (2)
operations are provided to allow discovery of namespace relationships (see
.BR user_namespaces (7)
and
.BR pid_namespaces (7)).
.P
In each case,
.I fd
refers to a
.IR /proc/ pid /ns/*
file.
Both operations return a new file descriptor on success.
.TP
.B NS_GET_USERNS
Returns a file descriptor that refers to the owning user namespace
for the namespace referred to by
.IR fd .
.TP
.B NS_GET_PARENT
Returns a file descriptor that refers to the parent namespace of
the namespace referred to by
.IR fd .
This operation is valid only for hierarchical namespaces
(i.e., PID and user namespaces).
For user namespaces,
.B NS_GET_PARENT
is synonymous with
.BR NS_GET_USERNS .
.P
The new file descriptor returned by these operations is opened with the
.B O_RDONLY
and
.B O_CLOEXEC
(close-on-exec; see
.BR fcntl (2))
flags.
.P
By applying
.BR fstat (2)
to the returned file descriptor, one obtains a
.I stat
structure whose
.I st_dev
(resident device) and
.I st_ino
(inode number) fields together identify the owning/parent namespace.
This inode number can be matched with the inode number of another
.IR /proc/ pid /ns/ { pid , user }
file to determine whether that is the owning/parent namespace.
.SH RETURN VALUE
On success,
a file descriptor is returned.
Or error, \-1 is returned, and
.I errno
is set to indicate the error.
.SH ERRORS
.TP
.B EPERM
The requested namespace is outside of the caller's namespace scope.
This error can occur if, for example, the owning user namespace is an
ancestor of the caller's current user namespace.
It can also occur on attempts to obtain the parent of the initial
user or PID namespace.
.TP
.B ENOTTY
The operation is not supported by this kernel version.
.P
Additionally, the
.B NS_GET_PARENT
operation can fail with the following error:
.TP
.B EINVAL
.I fd
refers to a nonhierarchical namespace.
.SH STANDARDS
Linux.
.SH HISTORY
.TP
.B NS_GET_USERNS
.\" linux.git bcac25a58bfc6bd79191ac5d7afb49bea96da8c9
.\" linux.git 6786741dbf99e44fb0c0ed85a37582b8a26f1c3b
Linux 4.9.
.TP
.B NS_GET_PARENT
.\" linux.git a7306ed8d94af729ecef8b6e37506a1c6fc14788
Linux 4.9.
.SH EXAMPLES
The example shown below uses the
.BR ioctl (2)
operations described above to perform simple
discovery of namespace relationships.
The following shell sessions show various examples of the use
of this program.
.P
Trying to get the parent of the initial user namespace fails,
since it has no parent:
.P
.in +4n
.EX
.RB $ " ./ns_show /proc/self/ns/user p" ;
The parent namespace is outside your namespace scope
.EE
.in
.P
Create a process running
.BR sleep (1)
that resides in new user and UTS namespaces,
and show that the new UTS namespace is associated with the new user namespace:
.P
.in +4n
.EX
.RB $ " unshare \-Uu sleep 1000 &"
[1] 23235
.RB $ " ./ns_show /proc/23235/ns/uts u" ;
Device/Inode of owning user namespace is: [0,3] / 4026532448
.RB $ " readlink /proc/23235/ns/user" ;
user:[4026532448]
.EE
.in
.P
Then show that the parent of the new user namespace in the preceding
example is the initial user namespace:
.P
.in +4n
.EX
.RB $ " readlink /proc/self/ns/user" ;
user:[4026531837]
.RB $ " ./ns_show /proc/23235/ns/user p" ;
Device/Inode of parent namespace is: [0,3] / 4026531837
.EE
.in
.P
Start a shell in a new user namespace, and show that from within
this shell, the parent user namespace can't be discovered.
Similarly, the UTS namespace
(which is associated with the initial user namespace)
can't be discovered.
.P
.in +4n
.EX
.RB $ " PS1=\[dq]sh2$ \[dq] unshare \-U bash" ;
.RB sh2$ " ./ns_show /proc/self/ns/user p" ;
The parent namespace is outside your namespace scope
.RB sh2$ " ./ns_show /proc/self/ns/uts u" ;
The owning user namespace is outside your namespace scope
.EE
.in
.SS Program source
\&
.\" SRC BEGIN (ns_show.c)
.EX
/* ns_show.c
\&
Licensed under the GNU General Public License v2 or later.
*/
#include <errno.h>
#include <fcntl.h>
#include <linux/nsfs.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/ioctl.h>
#include <sys/stat.h>
#include <sys/sysmacros.h>
#include <unistd.h>
\&
int
main(int argc, char *argv[])
{
int fd, userns_fd, parent_fd;
struct stat sb;
\&
if (argc < 2) {
fprintf(stderr, "Usage: %s /proc/[pid]/ns/[file] [p|u]\[rs]n",
argv[0]);
fprintf(stderr, "\[rs]nDisplay the result of one or both "
"of NS_GET_USERNS (u) or NS_GET_PARENT (p)\[rs]n"
"for the specified /proc/[pid]/ns/[file]. If neither "
"\[aq]p\[aq] nor \[aq]u\[aq] is specified,\[rs]n"
"NS_GET_USERNS is the default.\[rs]n");
exit(EXIT_FAILURE);
}
\&
/* Obtain a file descriptor for the \[aq]ns\[aq] file specified
in argv[1]. */
\&
fd = open(argv[1], O_RDONLY);
if (fd == \-1) {
perror("open");
exit(EXIT_FAILURE);
}
\&
/* Obtain a file descriptor for the owning user namespace and
then obtain and display the inode number of that namespace. */
\&
if (argc < 3 || strchr(argv[2], \[aq]u\[aq])) {
userns_fd = ioctl(fd, NS_GET_USERNS);
\&
if (userns_fd == \-1) {
if (errno == EPERM)
printf("The owning user namespace is outside "
"your namespace scope\[rs]n");
else
perror("ioctl\-NS_GET_USERNS");
exit(EXIT_FAILURE);
}
\&
if (fstat(userns_fd, &sb) == \-1) {
perror("fstat\-userns");
exit(EXIT_FAILURE);
}
printf("Device/Inode of owning user namespace is: "
"[%x,%x] / %ju\[rs]n",
major(sb.st_dev),
minor(sb.st_dev),
(uintmax_t) sb.st_ino);
\&
close(userns_fd);
}
\&
/* Obtain a file descriptor for the parent namespace and
then obtain and display the inode number of that namespace. */
\&
if (argc > 2 && strchr(argv[2], \[aq]p\[aq])) {
parent_fd = ioctl(fd, NS_GET_PARENT);
\&
if (parent_fd == \-1) {
if (errno == EINVAL)
printf("Can\[aq] get parent namespace of a "
"nonhierarchical namespace\[rs]n");
else if (errno == EPERM)
printf("The parent namespace is outside "
"your namespace scope\[rs]n");
else
perror("ioctl\-NS_GET_PARENT");
exit(EXIT_FAILURE);
}
\&
if (fstat(parent_fd, &sb) == \-1) {
perror("fstat\-parentns");
exit(EXIT_FAILURE);
}
printf("Device/Inode of parent namespace is: [%x,%x] / %ju\[rs]n",
major(sb.st_dev),
minor(sb.st_dev),
(uintmax_t) sb.st_ino);
\&
close(parent_fd);
}
\&
exit(EXIT_SUCCESS);
}
.EE
.\" SRC END
.SH SEE ALSO
.BR ioctl (2),
.BR ioctl_nsfs (2)
|