diff options
author | Shiva Prasanth <kesavarapu.siva@gmail.com> | 2019-04-10 10:48:28 -0700 |
---|---|---|
committer | Shentubot <shentubot@google.com> | 2019-04-10 10:49:43 -0700 |
commit | 7140b1fdca1cc9c9c711955a49e6e7fc41f339d9 (patch) | |
tree | 71a783c420dd83ae620ca55aac1310ac86bb25d5 /pkg/sentry/fs/fsutil | |
parent | 0e14e48b84fd8f759bb5a0f5261cdb090d1ffe90 (diff) |
Fixed /proc/cpuinfo permissions
This also applies these permissions to other static proc files.
Change-Id: I4167e585fed49ad271aa4e1f1260babb3239a73d
PiperOrigin-RevId: 242898575
Diffstat (limited to 'pkg/sentry/fs/fsutil')
-rw-r--r-- | pkg/sentry/fs/fsutil/inode.go | 12 |
1 files changed, 12 insertions, 0 deletions
diff --git a/pkg/sentry/fs/fsutil/inode.go b/pkg/sentry/fs/fsutil/inode.go index 2673d73d7..37490e5b2 100644 --- a/pkg/sentry/fs/fsutil/inode.go +++ b/pkg/sentry/fs/fsutil/inode.go @@ -452,3 +452,15 @@ type InodeGenericChecker struct{} func (InodeGenericChecker) Check(ctx context.Context, inode *fs.Inode, p fs.PermMask) bool { return fs.ContextCanAccessFile(ctx, inode, p) } + +// InodeDenyWriteChecker implements fs.InodeOperations.Check which denies all +// write operations. +type InodeDenyWriteChecker struct{} + +// Check implements fs.InodeOperations.Check. +func (InodeDenyWriteChecker) Check(ctx context.Context, inode *fs.Inode, p fs.PermMask) bool { + if p.Write { + return false + } + return fs.ContextCanAccessFile(ctx, inode, p) +} |