diff options
author | gVisor bot <gvisor-bot@google.com> | 2020-03-17 17:33:30 +0000 |
---|---|---|
committer | gVisor bot <gvisor-bot@google.com> | 2020-03-17 17:33:30 +0000 |
commit | cb87cbb7e46568c0bab786205369d11a7fc5b268 (patch) | |
tree | 91b7c82d77deba18e716211f9e5079225b7ab0c7 /pkg/sentry/fs/host/host.go | |
parent | 7c9c2e4e96037a5ff3b0afefaf0f08bb7aebcdf8 (diff) | |
parent | 42d78ba61bf93f927ee89099abf5ef27b394b0d9 (diff) |
Merge release-20200219.0-187-g42d78ba (automated)
Diffstat (limited to 'pkg/sentry/fs/host/host.go')
-rwxr-xr-x | pkg/sentry/fs/host/host.go | 59 |
1 files changed, 59 insertions, 0 deletions
diff --git a/pkg/sentry/fs/host/host.go b/pkg/sentry/fs/host/host.go new file mode 100755 index 000000000..081ba1dd8 --- /dev/null +++ b/pkg/sentry/fs/host/host.go @@ -0,0 +1,59 @@ +// Copyright 2020 The gVisor Authors. +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +// Package host supports file descriptors imported directly. +package host + +import ( + "gvisor.dev/gvisor/pkg/context" + "gvisor.dev/gvisor/pkg/sentry/fs" + "gvisor.dev/gvisor/pkg/syserror" +) + +// filesystem is a host filesystem. +// +// +stateify savable +type filesystem struct{} + +func init() { + fs.RegisterFilesystem(&filesystem{}) +} + +// FilesystemName is the name under which the filesystem is registered. +const FilesystemName = "host" + +// Name is the name of the filesystem. +func (*filesystem) Name() string { + return FilesystemName +} + +// Mount returns an error. Mounting hostfs is not allowed. +func (*filesystem) Mount(ctx context.Context, device string, flags fs.MountSourceFlags, data string, dataObj interface{}) (*fs.Inode, error) { + return nil, syserror.EPERM +} + +// AllowUserMount prohibits users from using mount(2) with this file system. +func (*filesystem) AllowUserMount() bool { + return false +} + +// AllowUserList prohibits this filesystem to be listed in /proc/filesystems. +func (*filesystem) AllowUserList() bool { + return false +} + +// Flags returns that there is nothing special about this file system. +func (*filesystem) Flags() fs.FilesystemFlags { + return 0 +} |