github.com/nicocha30/gvisor-ligolo@v0.0.0-20230726075806-989fa2c0a413/pkg/sentry/fsimpl/proc/subtasks.go (about) 1 // Copyright 2019 The gVisor Authors. 2 // 3 // Licensed under the Apache License, Version 2.0 (the "License"); 4 // you may not use this file except in compliance with the License. 5 // You may obtain a copy of the License at 6 // 7 // http://www.apache.org/licenses/LICENSE-2.0 8 // 9 // Unless required by applicable law or agreed to in writing, software 10 // distributed under the License is distributed on an "AS IS" BASIS, 11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 // See the License for the specific language governing permissions and 13 // limitations under the License. 14 15 package proc 16 17 import ( 18 "sort" 19 "strconv" 20 21 "github.com/nicocha30/gvisor-ligolo/pkg/abi/linux" 22 "github.com/nicocha30/gvisor-ligolo/pkg/context" 23 "github.com/nicocha30/gvisor-ligolo/pkg/errors/linuxerr" 24 "github.com/nicocha30/gvisor-ligolo/pkg/sentry/fsimpl/kernfs" 25 "github.com/nicocha30/gvisor-ligolo/pkg/sentry/kernel" 26 "github.com/nicocha30/gvisor-ligolo/pkg/sentry/kernel/auth" 27 "github.com/nicocha30/gvisor-ligolo/pkg/sentry/vfs" 28 ) 29 30 // subtasksInode represents the inode for /proc/[pid]/task/ directory. 31 // 32 // +stateify savable 33 type subtasksInode struct { 34 implStatFS 35 kernfs.InodeAlwaysValid 36 kernfs.InodeAttrs 37 kernfs.InodeDirectoryNoNewChildren 38 kernfs.InodeNotAnonymous 39 kernfs.InodeNotSymlink 40 kernfs.InodeTemporary 41 kernfs.InodeWatches 42 kernfs.OrderedChildren 43 subtasksInodeRefs 44 45 locks vfs.FileLocks 46 47 fs *filesystem 48 task *kernel.Task 49 pidns *kernel.PIDNamespace 50 cgroupControllers map[string]string 51 } 52 53 var _ kernfs.Inode = (*subtasksInode)(nil) 54 55 func (fs *filesystem) newSubtasks(ctx context.Context, task *kernel.Task, pidns *kernel.PIDNamespace, cgroupControllers map[string]string) kernfs.Inode { 56 subInode := &subtasksInode{ 57 fs: fs, 58 task: task, 59 pidns: pidns, 60 cgroupControllers: cgroupControllers, 61 } 62 // Note: credentials are overridden by taskOwnedInode. 63 subInode.InodeAttrs.Init(ctx, task.Credentials(), linux.UNNAMED_MAJOR, fs.devMinor, fs.NextIno(), linux.ModeDirectory|0555) 64 subInode.OrderedChildren.Init(kernfs.OrderedChildrenOptions{}) 65 subInode.InitRefs() 66 67 inode := &taskOwnedInode{Inode: subInode, owner: task} 68 return inode 69 } 70 71 // Lookup implements kernfs.inodeDirectory.Lookup. 72 func (i *subtasksInode) Lookup(ctx context.Context, name string) (kernfs.Inode, error) { 73 tid, err := strconv.ParseUint(name, 10, 32) 74 if err != nil { 75 return nil, linuxerr.ENOENT 76 } 77 78 subTask := i.pidns.TaskWithID(kernel.ThreadID(tid)) 79 if subTask == nil { 80 return nil, linuxerr.ENOENT 81 } 82 if subTask.ThreadGroup() != i.task.ThreadGroup() { 83 return nil, linuxerr.ENOENT 84 } 85 return i.fs.newTaskInode(ctx, subTask, i.pidns, false, i.cgroupControllers) 86 } 87 88 // IterDirents implements kernfs.inodeDirectory.IterDirents. 89 func (i *subtasksInode) IterDirents(ctx context.Context, mnt *vfs.Mount, cb vfs.IterDirentsCallback, offset, relOffset int64) (int64, error) { 90 tasks := i.task.ThreadGroup().MemberIDs(i.pidns) 91 if len(tasks) == 0 { 92 return offset, linuxerr.ENOENT 93 } 94 if relOffset >= int64(len(tasks)) { 95 return offset, nil 96 } 97 98 tids := make([]int, 0, len(tasks)) 99 for _, tid := range tasks { 100 tids = append(tids, int(tid)) 101 } 102 103 sort.Ints(tids) 104 for _, tid := range tids[relOffset:] { 105 dirent := vfs.Dirent{ 106 Name: strconv.FormatUint(uint64(tid), 10), 107 Type: linux.DT_DIR, 108 Ino: i.fs.NextIno(), 109 NextOff: offset + 1, 110 } 111 if err := cb.Handle(dirent); err != nil { 112 return offset, err 113 } 114 offset++ 115 } 116 return offset, nil 117 } 118 119 // +stateify savable 120 type subtasksFD struct { 121 kernfs.GenericDirectoryFD 122 123 task *kernel.Task 124 } 125 126 func (fd *subtasksFD) IterDirents(ctx context.Context, cb vfs.IterDirentsCallback) error { 127 if fd.task.ExitState() >= kernel.TaskExitZombie { 128 return linuxerr.ENOENT 129 } 130 return fd.GenericDirectoryFD.IterDirents(ctx, cb) 131 } 132 133 // Seek implements vfs.FileDescriptionImpl.Seek. 134 func (fd *subtasksFD) Seek(ctx context.Context, offset int64, whence int32) (int64, error) { 135 if fd.task.ExitState() >= kernel.TaskExitZombie { 136 return 0, linuxerr.ENOENT 137 } 138 return fd.GenericDirectoryFD.Seek(ctx, offset, whence) 139 } 140 141 // Stat implements vfs.FileDescriptionImpl.Stat. 142 func (fd *subtasksFD) Stat(ctx context.Context, opts vfs.StatOptions) (linux.Statx, error) { 143 if fd.task.ExitState() >= kernel.TaskExitZombie { 144 return linux.Statx{}, linuxerr.ENOENT 145 } 146 return fd.GenericDirectoryFD.Stat(ctx, opts) 147 } 148 149 // SetStat implements vfs.FileDescriptionImpl.SetStat. 150 func (fd *subtasksFD) SetStat(ctx context.Context, opts vfs.SetStatOptions) error { 151 if fd.task.ExitState() >= kernel.TaskExitZombie { 152 return linuxerr.ENOENT 153 } 154 return fd.GenericDirectoryFD.SetStat(ctx, opts) 155 } 156 157 // Open implements kernfs.Inode.Open. 158 func (i *subtasksInode) Open(ctx context.Context, rp *vfs.ResolvingPath, d *kernfs.Dentry, opts vfs.OpenOptions) (*vfs.FileDescription, error) { 159 fd := &subtasksFD{task: i.task} 160 if err := fd.Init(&i.OrderedChildren, &i.locks, &opts, kernfs.GenericDirectoryFDOptions{ 161 SeekEnd: kernfs.SeekEndZero, 162 }); err != nil { 163 return nil, err 164 } 165 if err := fd.VFSFileDescription().Init(fd, opts.Flags, rp.Mount(), d.VFSDentry(), &vfs.FileDescriptionOptions{}); err != nil { 166 return nil, err 167 } 168 return fd.VFSFileDescription(), nil 169 } 170 171 // Stat implements kernfs.Inode.Stat. 172 func (i *subtasksInode) Stat(ctx context.Context, vsfs *vfs.Filesystem, opts vfs.StatOptions) (linux.Statx, error) { 173 stat, err := i.InodeAttrs.Stat(ctx, vsfs, opts) 174 if err != nil { 175 return linux.Statx{}, err 176 } 177 if opts.Mask&linux.STATX_NLINK != 0 { 178 stat.Nlink += uint32(i.task.ThreadGroup().Count()) 179 } 180 return stat, nil 181 } 182 183 // SetStat implements kernfs.Inode.SetStat not allowing inode attributes to be changed. 184 func (*subtasksInode) SetStat(context.Context, *vfs.Filesystem, *auth.Credentials, vfs.SetStatOptions) error { 185 return linuxerr.EPERM 186 } 187 188 // DecRef implements kernfs.Inode.DecRef. 189 func (i *subtasksInode) DecRef(ctx context.Context) { 190 i.subtasksInodeRefs.DecRef(func() { i.Destroy(ctx) }) 191 }