99 lines
2.8 KiB
Go
99 lines
2.8 KiB
Go
// Copyright 2018 The gVisor Authors.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
// Package cmd holds implementations of the runsc commands.
|
|
package cmd
|
|
|
|
import (
|
|
"fmt"
|
|
"runtime"
|
|
"strconv"
|
|
"syscall"
|
|
|
|
specs "github.com/opencontainers/runtime-spec/specs-go"
|
|
"gvisor.dev/gvisor/pkg/log"
|
|
"gvisor.dev/gvisor/runsc/specutils"
|
|
)
|
|
|
|
// intFlags can be used with int flags that appear multiple times.
|
|
type intFlags []int
|
|
|
|
// String implements flag.Value.
|
|
func (i *intFlags) String() string {
|
|
return fmt.Sprintf("%v", *i)
|
|
}
|
|
|
|
// Get implements flag.Value.
|
|
func (i *intFlags) Get() interface{} {
|
|
return i
|
|
}
|
|
|
|
// GetArray returns array of FDs.
|
|
func (i *intFlags) GetArray() []int {
|
|
return *i
|
|
}
|
|
|
|
// Set implements flag.Value.
|
|
func (i *intFlags) Set(s string) error {
|
|
fd, err := strconv.Atoi(s)
|
|
if err != nil {
|
|
return fmt.Errorf("invalid flag value: %v", err)
|
|
}
|
|
if fd < 0 {
|
|
return fmt.Errorf("flag value must be greater than 0: %d", fd)
|
|
}
|
|
*i = append(*i, fd)
|
|
return nil
|
|
}
|
|
|
|
// setCapsAndCallSelf sets capabilities to the current thread and then execve's
|
|
// itself again with the arguments specified in 'args' to restart the process
|
|
// with the desired capabilities.
|
|
func setCapsAndCallSelf(args []string, caps *specs.LinuxCapabilities) error {
|
|
// Keep thread locked while capabilities are changed.
|
|
runtime.LockOSThread()
|
|
defer runtime.UnlockOSThread()
|
|
|
|
if err := applyCaps(caps); err != nil {
|
|
return fmt.Errorf("applyCaps() failed: %v", err)
|
|
}
|
|
binPath := specutils.ExePath
|
|
|
|
log.Infof("Execve %q again, bye!", binPath)
|
|
err := syscall.Exec(binPath, args, []string{})
|
|
return fmt.Errorf("error executing %s: %v", binPath, err)
|
|
}
|
|
|
|
// callSelfAsNobody sets UID and GID to nobody and then execve's itself again.
|
|
func callSelfAsNobody(args []string) error {
|
|
// Keep thread locked while user/group are changed.
|
|
runtime.LockOSThread()
|
|
defer runtime.UnlockOSThread()
|
|
|
|
const nobody = 65534
|
|
|
|
if _, _, err := syscall.RawSyscall(syscall.SYS_SETGID, uintptr(nobody), 0, 0); err != 0 {
|
|
return fmt.Errorf("error setting uid: %v", err)
|
|
}
|
|
if _, _, err := syscall.RawSyscall(syscall.SYS_SETUID, uintptr(nobody), 0, 0); err != 0 {
|
|
return fmt.Errorf("error setting gid: %v", err)
|
|
}
|
|
|
|
binPath := specutils.ExePath
|
|
|
|
log.Infof("Execve %q again, bye!", binPath)
|
|
err := syscall.Exec(binPath, args, []string{})
|
|
return fmt.Errorf("error executing %s: %v", binPath, err)
|
|
}
|