From 49d797effbc0888975c51ac45371d91fc59ea2dc Mon Sep 17 00:00:00 2001 From: Jakob Unterwurzacher Date: Wed, 26 Feb 2025 20:55:07 +0100 Subject: syscallcompat: move asUser to its own file --- internal/syscallcompat/sys_linux.go | 41 ------------------------------------- 1 file changed, 41 deletions(-) (limited to 'internal/syscallcompat/sys_linux.go') diff --git a/internal/syscallcompat/sys_linux.go b/internal/syscallcompat/sys_linux.go index a64b27e..d769f96 100644 --- a/internal/syscallcompat/sys_linux.go +++ b/internal/syscallcompat/sys_linux.go @@ -4,7 +4,6 @@ package syscallcompat import ( "fmt" "io/ioutil" - "runtime" "strconv" "strings" "sync" @@ -93,46 +92,6 @@ func getSupplementaryGroups(pid uint32) (gids []int) { return nil } -// asUser runs `f()` under the effective uid, gid, groups specified -// in `context`. -// -// If `context` is nil, `f()` is executed directly without switching user id. -func asUser(f func() (int, error), context *fuse.Context) (int, error) { - if context == nil { - return f() - } - - runtime.LockOSThread() - defer runtime.UnlockOSThread() - - // Since go1.16beta1 (commit d1b1145cace8b968307f9311ff611e4bb810710c , - // https://go-review.googlesource.com/c/go/+/210639 ) - // syscall.{Setgroups,Setregid,Setreuid} affects all threads, which - // is exactly what we not want. - // - // We now use unix.{Setgroups,Setregid,Setreuid} instead. - - err := unix.Setgroups(getSupplementaryGroups(context.Pid)) - if err != nil { - return -1, err - } - defer unix.Setgroups(nil) - - err = unix.Setregid(-1, int(context.Owner.Gid)) - if err != nil { - return -1, err - } - defer unix.Setregid(-1, 0) - - err = unix.Setreuid(-1, int(context.Owner.Uid)) - if err != nil { - return -1, err - } - defer unix.Setreuid(-1, 0) - - return f() -} - // OpenatUser runs the Openat syscall in the context of a different user. // // It switches the current thread to the new user, performs the syscall, -- cgit v1.2.3