1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120
|
// Copyright 2020 The gVisor Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// Package fdimport provides the Import function.
package fdimport
import (
"fmt"
"golang.org/x/sys/unix"
"gvisor.dev/gvisor/pkg/context"
"gvisor.dev/gvisor/pkg/fd"
"gvisor.dev/gvisor/pkg/sentry/fsimpl/host"
"gvisor.dev/gvisor/pkg/sentry/kernel"
"gvisor.dev/gvisor/pkg/sentry/kernel/auth"
"gvisor.dev/gvisor/pkg/sentry/vfs"
)
// Import imports a map of FDs into the given FDTable. If console is true,
// sets up TTY for sentry stdin, stdout, and stderr FDs. Used FDs are either
// closed or released. It's safe for the caller to close any remaining files
// upon return.
func Import(ctx context.Context, fdTable *kernel.FDTable, console bool, uid auth.KUID, gid auth.KGID, fds map[int]*fd.FD, containerName string) (*host.TTYFileDescription, error) {
k := kernel.KernelFromContext(ctx)
if k == nil {
return nil, fmt.Errorf("cannot find kernel from context")
}
mnt := k.HostMount()
// Collect host fds and flags. Do this before importing any fds because
// multiple fds may refer to the same file, and importing fds may
// change flags.
fdFlags := make(map[*fd.FD]kernel.FDFlags)
for _, hostFD := range fds {
var err error
fdFlags[hostFD], err = getFDFlags(hostFD)
if err != nil {
return nil, err
}
}
var ttyFile *vfs.FileDescription
for appFD, hostFD := range fds {
fdOpts := host.NewFDOptions{
Savable: true,
}
if uid != auth.NoID || gid != auth.NoID {
fdOpts.VirtualOwner = true
fdOpts.UID = uid
fdOpts.GID = gid
}
var appFile *vfs.FileDescription
fdOpts.RestoreKey = host.MakeRestoreID(containerName, appFD)
if console && appFD < 3 {
// Import the file as a host TTY file.
if ttyFile == nil {
fdOpts.IsTTY = true
var err error
appFile, err = host.NewFD(ctx, mnt, hostFD.FD(), &fdOpts)
if err != nil {
return nil, err
}
defer appFile.DecRef(ctx)
hostFD.Release() // FD is transferred to host FD.
// Remember this in the TTY file, as we will use it for the other stdio
// FDs.
ttyFile = appFile
} else {
// Re-use the existing TTY file, as all three stdio FDs must point to
// the same fs.File in order to share TTY state, specifically the
// foreground process group id.
appFile = ttyFile
}
} else {
var err error
appFile, err = host.NewFD(ctx, mnt, hostFD.FD(), &fdOpts)
if err != nil {
return nil, err
}
defer appFile.DecRef(ctx)
hostFD.Release() // FD is transferred to host FD.
}
df, err := fdTable.NewFDAt(ctx, int32(appFD), appFile, fdFlags[hostFD])
if err != nil {
return nil, err
}
if df != nil {
df.DecRef(ctx)
return nil, fmt.Errorf("app FD %d displaced while importing FDs", appFD)
}
}
if ttyFile == nil {
return nil, nil
}
return ttyFile.Impl().(*host.TTYFileDescription), nil
}
func getFDFlags(f *fd.FD) (kernel.FDFlags, error) {
fdflags, _, errno := unix.Syscall(unix.SYS_FCNTL, uintptr(f.FD()), unix.F_GETFD, 0)
if errno != 0 {
return kernel.FDFlags{}, fmt.Errorf("failed to get fd flags for fd %d (errno=%d)", f, errno)
}
return kernel.FDFlags{
CloseOnExec: fdflags&unix.O_CLOEXEC != 0,
}, nil
}
|