Linux vmi284606.contaboserver.net 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
Apache/2.4.57 (Ubuntu)
: 167.86.127.34 | : 216.73.217.31
Cant Read [ /etc/named.conf ]
7.2.24-0ubuntu0.18.04.17
root
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
local /
go /
src /
syscall /
[ HOME SHELL ]
Name
Size
Permission
Action
js
[ DIR ]
drwxr-xr-x
asm9_unix1_amd64.s
1.02
KB
-rw-r--r--
asm9_unix2_amd64.s
1.2
KB
-rw-r--r--
asm_aix_ppc64.s
540
B
-rw-r--r--
asm_darwin_386.s
2.5
KB
-rw-r--r--
asm_darwin_amd64.s
2.82
KB
-rw-r--r--
asm_darwin_arm.s
2.81
KB
-rw-r--r--
asm_darwin_arm64.s
2.71
KB
-rw-r--r--
asm_freebsd_arm.s
2.96
KB
-rw-r--r--
asm_freebsd_arm64.s
2.68
KB
-rw-r--r--
asm_linux_386.s
4.67
KB
-rw-r--r--
asm_linux_amd64.s
3.21
KB
-rw-r--r--
asm_linux_arm.s
3.63
KB
-rw-r--r--
asm_linux_arm64.s
2.73
KB
-rw-r--r--
asm_linux_mips64x.s
2.28
KB
-rw-r--r--
asm_linux_mipsx.s
3.28
KB
-rw-r--r--
asm_linux_ppc64x.s
2.66
KB
-rw-r--r--
asm_linux_riscv64.s
2.46
KB
-rw-r--r--
asm_linux_s390x.s
4.19
KB
-rw-r--r--
asm_netbsd_arm.s
2.85
KB
-rw-r--r--
asm_netbsd_arm64.s
2.77
KB
-rw-r--r--
asm_openbsd_arm.s
3.22
KB
-rw-r--r--
asm_openbsd_arm64.s
2.49
KB
-rw-r--r--
asm_plan9_386.s
3.14
KB
-rw-r--r--
asm_plan9_amd64.s
3.06
KB
-rw-r--r--
asm_plan9_arm.s
3.25
KB
-rw-r--r--
asm_solaris_amd64.s
1.79
KB
-rw-r--r--
asm_unix_386.s
2.74
KB
-rw-r--r--
asm_unix_amd64.s
2.08
KB
-rw-r--r--
asm_windows.s
384
B
-rw-r--r--
bpf_bsd.go
4.61
KB
-rw-r--r--
bpf_darwin.go
3.97
KB
-rw-r--r--
const_plan9.go
1.2
KB
-rw-r--r--
creds_test.go
3.26
KB
-rw-r--r--
dir_plan9.go
5.62
KB
-rw-r--r--
dirent.go
3
KB
-rw-r--r--
dirent_test.go
3.28
KB
-rw-r--r--
dll_windows.go
9.72
KB
-rw-r--r--
endian_big.go
239
B
-rw-r--r--
endian_little.go
273
B
-rw-r--r--
env_plan9.go
2.15
KB
-rw-r--r--
env_unix.go
2.77
KB
-rw-r--r--
env_windows.go
1.75
KB
-rw-r--r--
errors_plan9.go
1.61
KB
-rw-r--r--
exec_aix_test.go
816
B
-rw-r--r--
exec_bsd.go
6.36
KB
-rw-r--r--
exec_darwin.go
6.76
KB
-rw-r--r--
exec_libc.go
6.96
KB
-rw-r--r--
exec_linux.go
18.34
KB
-rw-r--r--
exec_linux_test.go
18.81
KB
-rw-r--r--
exec_plan9.go
13.19
KB
-rw-r--r--
exec_solaris_test.go
808
B
-rw-r--r--
exec_unix.go
8.13
KB
-rw-r--r--
exec_unix_test.go
3.89
KB
-rw-r--r--
exec_windows.go
7.64
KB
-rw-r--r--
export_freebsd_test.go
304
B
-rw-r--r--
export_linux_test.go
252
B
-rw-r--r--
export_test.go
193
B
-rw-r--r--
export_unix_test.go
341
B
-rw-r--r--
flock.go
691
B
-rw-r--r--
flock_aix.go
564
B
-rw-r--r--
flock_darwin.go
405
B
-rw-r--r--
flock_linux_32bit.go
481
B
-rw-r--r--
forkpipe.go
501
B
-rw-r--r--
forkpipe2.go
276
B
-rw-r--r--
fs_js.go
10.46
KB
-rw-r--r--
getdirentries_test.go
2.18
KB
-rw-r--r--
lsf_linux.go
2.12
KB
-rw-r--r--
mkall.sh
12.49
KB
-rwxr-xr-x
mkasm_darwin.go
1.66
KB
-rw-r--r--
mkerrors.sh
10.65
KB
-rwxr-xr-x
mkpost.go
1.99
KB
-rw-r--r--
mksyscall.pl
9.52
KB
-rwxr-xr-x
mksyscall_libc.pl
7.8
KB
-rwxr-xr-x
mksyscall_windows.go
707
B
-rw-r--r--
mksysctl_openbsd.pl
5.04
KB
-rwxr-xr-x
mksysnum_darwin.pl
578
B
-rwxr-xr-x
mksysnum_dragonfly.pl
866
B
-rwxr-xr-x
mksysnum_freebsd.pl
1.35
KB
-rwxr-xr-x
mksysnum_linux.pl
1.26
KB
-rwxr-xr-x
mksysnum_netbsd.pl
1.01
KB
-rwxr-xr-x
mksysnum_openbsd.pl
871
B
-rwxr-xr-x
mksysnum_plan9.sh
459
B
-rwxr-xr-x
mmap_unix_test.go
544
B
-rw-r--r--
msan.go
409
B
-rw-r--r--
msan0.go
341
B
-rw-r--r--
net.go
1.19
KB
-rw-r--r--
net_js.go
2.11
KB
-rw-r--r--
netlink_linux.go
4.67
KB
-rw-r--r--
pwd_plan9.go
1.55
KB
-rw-r--r--
route_bsd.go
9.09
KB
-rw-r--r--
route_darwin.go
2.01
KB
-rw-r--r--
route_dragonfly.go
2.61
KB
-rw-r--r--
route_freebsd.go
2.67
KB
-rw-r--r--
route_freebsd_32bit.go
1.29
KB
-rw-r--r--
route_freebsd_64bit.go
724
B
-rw-r--r--
route_netbsd.go
1.43
KB
-rw-r--r--
route_openbsd.go
1.46
KB
-rw-r--r--
security_windows.go
10.12
KB
-rw-r--r--
setuidgid_32_linux.go
306
B
-rw-r--r--
setuidgid_linux.go
302
B
-rw-r--r--
sock_cloexec_linux.go
632
B
-rw-r--r--
sockcmsg_dragonfly.go
547
B
-rw-r--r--
sockcmsg_linux.go
1.12
KB
-rw-r--r--
sockcmsg_unix.go
2.56
KB
-rw-r--r--
sockcmsg_unix_other.go
957
B
-rw-r--r--
str.go
549
B
-rw-r--r--
syscall.go
3.72
KB
-rw-r--r--
syscall_aix.go
17.83
KB
-rw-r--r--
syscall_aix_ppc64.go
405
B
-rw-r--r--
syscall_bsd.go
14.07
KB
-rw-r--r--
syscall_bsd_test.go
1.16
KB
-rw-r--r--
syscall_darwin.go
14.26
KB
-rw-r--r--
syscall_darwin_386.go
2
KB
-rw-r--r--
syscall_darwin_amd64.go
1.92
KB
-rw-r--r--
syscall_darwin_arm.go
2.03
KB
-rw-r--r--
syscall_darwin_arm64.go
1.98
KB
-rw-r--r--
syscall_dragonfly.go
7.98
KB
-rw-r--r--
syscall_dragonfly_amd64.go
1.12
KB
-rw-r--r--
syscall_freebsd.go
15.82
KB
-rw-r--r--
syscall_freebsd_386.go
1.17
KB
-rw-r--r--
syscall_freebsd_amd64.go
1.12
KB
-rw-r--r--
syscall_freebsd_arm.go
1.16
KB
-rw-r--r--
syscall_freebsd_arm64.go
1.12
KB
-rw-r--r--
syscall_freebsd_test.go
1.35
KB
-rw-r--r--
syscall_getwd_bsd.go
453
B
-rw-r--r--
syscall_js.go
6.59
KB
-rw-r--r--
syscall_linux.go
26.05
KB
-rw-r--r--
syscall_linux_386.go
10.91
KB
-rw-r--r--
syscall_linux_amd64.go
5.39
KB
-rw-r--r--
syscall_linux_arm.go
7.47
KB
-rw-r--r--
syscall_linux_arm64.go
6.24
KB
-rw-r--r--
syscall_linux_mips64x.go
6.58
KB
-rw-r--r--
syscall_linux_mipsx.go
7.03
KB
-rw-r--r--
syscall_linux_ppc64x.go
5.21
KB
-rw-r--r--
syscall_linux_riscv64.go
6.4
KB
-rw-r--r--
syscall_linux_s390x.go
8.64
KB
-rw-r--r--
syscall_linux_test.go
10.61
KB
-rw-r--r--
syscall_netbsd.go
7.59
KB
-rw-r--r--
syscall_netbsd_386.go
716
B
-rw-r--r--
syscall_netbsd_amd64.go
709
B
-rw-r--r--
syscall_netbsd_arm.go
716
B
-rw-r--r--
syscall_netbsd_arm64.go
709
B
-rw-r--r--
syscall_openbsd.go
7.06
KB
-rw-r--r--
syscall_openbsd_386.go
715
B
-rw-r--r--
syscall_openbsd_amd64.go
701
B
-rw-r--r--
syscall_openbsd_arm.go
715
B
-rw-r--r--
syscall_openbsd_arm64.go
906
B
-rw-r--r--
syscall_plan9.go
8.94
KB
-rw-r--r--
syscall_plan9_test.go
1.15
KB
-rw-r--r--
syscall_ptrace_test.go
752
B
-rw-r--r--
syscall_solaris.go
15.07
KB
-rw-r--r--
syscall_solaris_amd64.go
487
B
-rw-r--r--
syscall_test.go
1.7
KB
-rw-r--r--
syscall_unix.go
8.3
KB
-rw-r--r--
syscall_unix_test.go
10.61
KB
-rw-r--r--
syscall_windows.go
42.54
KB
-rw-r--r--
syscall_windows_386.go
176
B
-rw-r--r--
syscall_windows_amd64.go
176
B
-rw-r--r--
syscall_windows_test.go
1.8
KB
-rw-r--r--
tables_js.go
19.17
KB
-rw-r--r--
time_fake.go
676
B
-rw-r--r--
time_nofake.go
350
B
-rw-r--r--
timestruct.go
1.13
KB
-rw-r--r--
types_aix.go
3.35
KB
-rw-r--r--
types_darwin.go
4.98
KB
-rw-r--r--
types_dragonfly.go
5.04
KB
-rw-r--r--
types_freebsd.go
6.96
KB
-rw-r--r--
types_linux.go
10.68
KB
-rw-r--r--
types_netbsd.go
4.77
KB
-rw-r--r--
types_openbsd.go
5.04
KB
-rw-r--r--
types_solaris.go
4.88
KB
-rw-r--r--
types_windows.go
26.96
KB
-rw-r--r--
types_windows_386.go
477
B
-rw-r--r--
types_windows_amd64.go
477
B
-rw-r--r--
types_windows_arm.go
477
B
-rw-r--r--
zerrors_aix_ppc64.go
47.16
KB
-rw-r--r--
zerrors_darwin_386.go
55.27
KB
-rw-r--r--
zerrors_darwin_amd64.go
55.27
KB
-rw-r--r--
zerrors_darwin_arm.go
46.08
KB
-rw-r--r--
zerrors_darwin_arm64.go
55.78
KB
-rw-r--r--
zerrors_dragonfly_amd64.go
59.49
KB
-rw-r--r--
zerrors_freebsd_386.go
67.35
KB
-rw-r--r--
zerrors_freebsd_amd64.go
67.4
KB
-rw-r--r--
zerrors_freebsd_arm.go
67.34
KB
-rw-r--r--
zerrors_freebsd_arm64.go
67.41
KB
-rw-r--r--
zerrors_linux_386.go
58.31
KB
-rw-r--r--
zerrors_linux_amd64.go
58.35
KB
-rw-r--r--
zerrors_linux_arm.go
58.83
KB
-rw-r--r--
zerrors_linux_arm64.go
69.52
KB
-rw-r--r--
zerrors_linux_mips.go
70.14
KB
-rw-r--r--
zerrors_linux_mips64.go
69.46
KB
-rw-r--r--
zerrors_linux_mips64le.go
69.46
KB
-rw-r--r--
zerrors_linux_mipsle.go
70.14
KB
-rw-r--r--
zerrors_linux_ppc64.go
71.84
KB
-rw-r--r--
zerrors_linux_ppc64le.go
72.8
KB
-rw-r--r--
zerrors_linux_riscv64.go
71.76
KB
-rw-r--r--
zerrors_linux_s390x.go
74.28
KB
-rw-r--r--
zerrors_netbsd_386.go
67.43
KB
-rw-r--r--
zerrors_netbsd_amd64.go
67.02
KB
-rw-r--r--
zerrors_netbsd_arm.go
66.45
KB
-rw-r--r--
zerrors_netbsd_arm64.go
67.02
KB
-rw-r--r--
zerrors_openbsd_386.go
62.47
KB
-rw-r--r--
zerrors_openbsd_amd64.go
62.43
KB
-rw-r--r--
zerrors_openbsd_arm.go
62.46
KB
-rw-r--r--
zerrors_openbsd_arm64.go
66.36
KB
-rw-r--r--
zerrors_solaris_amd64.go
50.71
KB
-rw-r--r--
zerrors_windows.go
9.97
KB
-rw-r--r--
zerrors_windows_386.go
176
B
-rw-r--r--
zerrors_windows_amd64.go
176
B
-rw-r--r--
zsyscall_aix_ppc64.go
40.02
KB
-rw-r--r--
zsyscall_darwin_386.go
53.97
KB
-rw-r--r--
zsyscall_darwin_386.s
8.65
KB
-rw-r--r--
zsyscall_darwin_amd64.go
53.83
KB
-rw-r--r--
zsyscall_darwin_amd64.s
8.65
KB
-rw-r--r--
zsyscall_darwin_arm.go
53.44
KB
-rw-r--r--
zsyscall_darwin_arm.s
8.56
KB
-rw-r--r--
zsyscall_darwin_arm64.go
53.3
KB
-rw-r--r--
zsyscall_darwin_arm64.s
8.56
KB
-rw-r--r--
zsyscall_dragonfly_amd64.go
30.9
KB
-rw-r--r--
zsyscall_freebsd_386.go
33.55
KB
-rw-r--r--
zsyscall_freebsd_amd64.go
33.41
KB
-rw-r--r--
zsyscall_freebsd_arm.go
33.58
KB
-rw-r--r--
zsyscall_freebsd_arm64.go
33.41
KB
-rw-r--r--
zsyscall_linux_386.go
35.54
KB
-rw-r--r--
zsyscall_linux_amd64.go
40.66
KB
-rw-r--r--
zsyscall_linux_arm.go
39.77
KB
-rw-r--r--
zsyscall_linux_arm64.go
38.92
KB
-rw-r--r--
zsyscall_linux_mips.go
41.52
KB
-rw-r--r--
zsyscall_linux_mips64.go
41.3
KB
-rw-r--r--
zsyscall_linux_mips64le.go
41.3
KB
-rw-r--r--
zsyscall_linux_mipsle.go
41.52
KB
-rw-r--r--
zsyscall_linux_ppc64.go
41.94
KB
-rw-r--r--
zsyscall_linux_ppc64le.go
41.94
KB
-rw-r--r--
zsyscall_linux_riscv64.go
38.95
KB
-rw-r--r--
zsyscall_linux_s390x.go
35.94
KB
-rw-r--r--
zsyscall_netbsd_386.go
29.62
KB
-rw-r--r--
zsyscall_netbsd_amd64.go
29.48
KB
-rw-r--r--
zsyscall_netbsd_arm.go
29.63
KB
-rw-r--r--
zsyscall_netbsd_arm64.go
29.48
KB
-rw-r--r--
zsyscall_openbsd_386.go
30.46
KB
-rw-r--r--
zsyscall_openbsd_amd64.go
30.32
KB
-rw-r--r--
zsyscall_openbsd_arm.go
30.47
KB
-rw-r--r--
zsyscall_openbsd_arm64.go
30.32
KB
-rw-r--r--
zsyscall_plan9_386.go
6.17
KB
-rw-r--r--
zsyscall_plan9_amd64.go
6.17
KB
-rw-r--r--
zsyscall_plan9_arm.go
6.17
KB
-rw-r--r--
zsyscall_solaris_amd64.go
35.79
KB
-rw-r--r--
zsyscall_windows.go
60.53
KB
-rw-r--r--
zsysctl_openbsd.go
11.71
KB
-rw-r--r--
zsysnum_darwin_386.go
14.55
KB
-rw-r--r--
zsysnum_darwin_amd64.go
14.55
KB
-rw-r--r--
zsysnum_darwin_arm.go
12.28
KB
-rw-r--r--
zsysnum_darwin_arm64.go
14.38
KB
-rw-r--r--
zsysnum_dragonfly_amd64.go
22.72
KB
-rw-r--r--
zsysnum_freebsd_386.go
25.65
KB
-rw-r--r--
zsysnum_freebsd_amd64.go
25.65
KB
-rw-r--r--
zsysnum_freebsd_arm.go
25.65
KB
-rw-r--r--
zsysnum_freebsd_arm64.go
36.09
KB
-rw-r--r--
zsysnum_linux_386.go
11.26
KB
-rw-r--r--
zsysnum_linux_amd64.go
10.1
KB
-rw-r--r--
zsysnum_linux_arm.go
11.55
KB
-rw-r--r--
zsysnum_linux_arm64.go
8.95
KB
-rw-r--r--
zsysnum_linux_mips.go
12.1
KB
-rw-r--r--
zsysnum_linux_mips64.go
10.93
KB
-rw-r--r--
zsysnum_linux_mips64le.go
10.93
KB
-rw-r--r--
zsysnum_linux_mipsle.go
12.1
KB
-rw-r--r--
zsysnum_linux_ppc64.go
11.46
KB
-rw-r--r--
zsysnum_linux_ppc64le.go
11.49
KB
-rw-r--r--
zsysnum_linux_riscv64.go
8.88
KB
-rw-r--r--
zsysnum_linux_s390x.go
10.64
KB
-rw-r--r--
zsysnum_netbsd_386.go
25.54
KB
-rw-r--r--
zsysnum_netbsd_amd64.go
25.55
KB
-rw-r--r--
zsysnum_netbsd_arm.go
25.54
KB
-rw-r--r--
zsysnum_netbsd_arm64.go
25.55
KB
-rw-r--r--
zsysnum_openbsd_386.go
14.15
KB
-rw-r--r--
zsysnum_openbsd_amd64.go
14.15
KB
-rw-r--r--
zsysnum_openbsd_arm.go
14.46
KB
-rw-r--r--
zsysnum_openbsd_arm64.go
14.72
KB
-rw-r--r--
zsysnum_plan9.go
1.03
KB
-rw-r--r--
zsysnum_solaris_amd64.go
289
B
-rw-r--r--
zsysnum_windows_386.go
40
B
-rw-r--r--
zsysnum_windows_amd64.go
40
B
-rw-r--r--
ztypes_aix_ppc64.go
4.17
KB
-rw-r--r--
ztypes_darwin_386.go
6.7
KB
-rw-r--r--
ztypes_darwin_amd64.go
6.92
KB
-rw-r--r--
ztypes_darwin_arm.go
6.77
KB
-rw-r--r--
ztypes_darwin_arm64.go
6.92
KB
-rw-r--r--
ztypes_dragonfly_amd64.go
6.7
KB
-rw-r--r--
ztypes_freebsd_386.go
9
KB
-rw-r--r--
ztypes_freebsd_amd64.go
9
KB
-rw-r--r--
ztypes_freebsd_arm.go
9.01
KB
-rw-r--r--
ztypes_freebsd_arm64.go
9
KB
-rw-r--r--
ztypes_linux_386.go
11.55
KB
-rw-r--r--
ztypes_linux_amd64.go
11.92
KB
-rw-r--r--
ztypes_linux_arm.go
11.44
KB
-rw-r--r--
ztypes_linux_arm64.go
10.12
KB
-rw-r--r--
ztypes_linux_mips.go
9.93
KB
-rw-r--r--
ztypes_linux_mips64.go
10.05
KB
-rw-r--r--
ztypes_linux_mips64le.go
10.05
KB
-rw-r--r--
ztypes_linux_mipsle.go
9.93
KB
-rw-r--r--
ztypes_linux_ppc64.go
10.21
KB
-rw-r--r--
ztypes_linux_ppc64le.go
10.35
KB
-rw-r--r--
ztypes_linux_riscv64.go
10.2
KB
-rw-r--r--
ztypes_linux_s390x.go
10.39
KB
-rw-r--r--
ztypes_netbsd_386.go
5.98
KB
-rw-r--r--
ztypes_netbsd_amd64.go
6.17
KB
-rw-r--r--
ztypes_netbsd_arm.go
6.13
KB
-rw-r--r--
ztypes_netbsd_arm64.go
6.17
KB
-rw-r--r--
ztypes_openbsd_386.go
6.73
KB
-rw-r--r--
ztypes_openbsd_amd64.go
6.88
KB
-rw-r--r--
ztypes_openbsd_arm.go
6.84
KB
-rw-r--r--
ztypes_openbsd_arm64.go
6.66
KB
-rw-r--r--
ztypes_solaris_amd64.go
5.56
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : exec_linux.go
// Copyright 2011 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // +build linux package syscall import ( "runtime" "unsafe" ) // SysProcIDMap holds Container ID to Host ID mappings used for User Namespaces in Linux. // See user_namespaces(7). type SysProcIDMap struct { ContainerID int // Container ID. HostID int // Host ID. Size int // Size. } type SysProcAttr struct { Chroot string // Chroot. Credential *Credential // Credential. // Ptrace tells the child to call ptrace(PTRACE_TRACEME). // Call runtime.LockOSThread before starting a process with this set, // and don't call UnlockOSThread until done with PtraceSyscall calls. Ptrace bool Setsid bool // Create session. Setpgid bool // Set process group ID to Pgid, or, if Pgid == 0, to new pid. Setctty bool // Set controlling terminal to fd Ctty (only meaningful if Setsid is set) Noctty bool // Detach fd 0 from controlling terminal Ctty int // Controlling TTY fd Foreground bool // Place child's process group in foreground. (Implies Setpgid. Uses Ctty as fd of controlling TTY) Pgid int // Child's process group ID if Setpgid. Pdeathsig Signal // Signal that the process will get when its parent dies (Linux only) Cloneflags uintptr // Flags for clone calls (Linux only) Unshareflags uintptr // Flags for unshare calls (Linux only) UidMappings []SysProcIDMap // User ID mappings for user namespaces. GidMappings []SysProcIDMap // Group ID mappings for user namespaces. // GidMappingsEnableSetgroups enabling setgroups syscall. // If false, then setgroups syscall will be disabled for the child process. // This parameter is no-op if GidMappings == nil. Otherwise for unprivileged // users this should be set to false for mappings work. GidMappingsEnableSetgroups bool AmbientCaps []uintptr // Ambient capabilities (Linux only) } var ( none = [...]byte{'n', 'o', 'n', 'e', 0} slash = [...]byte{'/', 0} ) // Implemented in runtime package. func runtime_BeforeFork() func runtime_AfterFork() func runtime_AfterForkInChild() // Fork, dup fd onto 0..len(fd), and exec(argv0, argvv, envv) in child. // If a dup or exec fails, write the errno error to pipe. // (Pipe is close-on-exec so if exec succeeds, it will be closed.) // In the child, this function must not acquire any locks, because // they might have been locked at the time of the fork. This means // no rescheduling, no malloc calls, and no new stack segments. // For the same reason compiler does not race instrument it. // The calls to RawSyscall are okay because they are assembly // functions that do not grow the stack. //go:norace func forkAndExecInChild(argv0 *byte, argv, envv []*byte, chroot, dir *byte, attr *ProcAttr, sys *SysProcAttr, pipe int) (pid int, err Errno) { // Set up and fork. This returns immediately in the parent or // if there's an error. r1, err1, p, locked := forkAndExecInChild1(argv0, argv, envv, chroot, dir, attr, sys, pipe) if locked { runtime_AfterFork() } if err1 != 0 { return 0, err1 } // parent; return PID pid = int(r1) if sys.UidMappings != nil || sys.GidMappings != nil { Close(p[0]) var err2 Errno // uid/gid mappings will be written after fork and unshare(2) for user // namespaces. if sys.Unshareflags&CLONE_NEWUSER == 0 { if err := writeUidGidMappings(pid, sys); err != nil { err2 = err.(Errno) } } RawSyscall(SYS_WRITE, uintptr(p[1]), uintptr(unsafe.Pointer(&err2)), unsafe.Sizeof(err2)) Close(p[1]) } return pid, 0 } const _LINUX_CAPABILITY_VERSION_3 = 0x20080522 type capHeader struct { version uint32 pid int32 } type capData struct { effective uint32 permitted uint32 inheritable uint32 } type caps struct { hdr capHeader data [2]capData } // See CAP_TO_INDEX in linux/capability.h: func capToIndex(cap uintptr) uintptr { return cap >> 5 } // See CAP_TO_MASK in linux/capability.h: func capToMask(cap uintptr) uint32 { return 1 << uint(cap&31) } // forkAndExecInChild1 implements the body of forkAndExecInChild up to // the parent's post-fork path. This is a separate function so we can // separate the child's and parent's stack frames if we're using // vfork. // // This is go:noinline because the point is to keep the stack frames // of this and forkAndExecInChild separate. // //go:noinline //go:norace func forkAndExecInChild1(argv0 *byte, argv, envv []*byte, chroot, dir *byte, attr *ProcAttr, sys *SysProcAttr, pipe int) (r1 uintptr, err1 Errno, p [2]int, locked bool) { // Defined in linux/prctl.h starting with Linux 4.3. const ( PR_CAP_AMBIENT = 0x2f PR_CAP_AMBIENT_RAISE = 0x2 ) // vfork requires that the child not touch any of the parent's // active stack frames. Hence, the child does all post-fork // processing in this stack frame and never returns, while the // parent returns immediately from this frame and does all // post-fork processing in the outer frame. // Declare all variables at top in case any // declarations require heap allocation (e.g., err1). var ( err2 Errno nextfd int i int caps caps fd1 uintptr puid, psetgroups, pgid []byte uidmap, setgroups, gidmap []byte ) if sys.UidMappings != nil { puid = []byte("/proc/self/uid_map\000") uidmap = formatIDMappings(sys.UidMappings) } if sys.GidMappings != nil { psetgroups = []byte("/proc/self/setgroups\000") pgid = []byte("/proc/self/gid_map\000") if sys.GidMappingsEnableSetgroups { setgroups = []byte("allow\000") } else { setgroups = []byte("deny\000") } gidmap = formatIDMappings(sys.GidMappings) } // Record parent PID so child can test if it has died. ppid, _ := rawSyscallNoError(SYS_GETPID, 0, 0, 0) // Guard against side effects of shuffling fds below. // Make sure that nextfd is beyond any currently open files so // that we can't run the risk of overwriting any of them. fd := make([]int, len(attr.Files)) nextfd = len(attr.Files) for i, ufd := range attr.Files { if nextfd < int(ufd) { nextfd = int(ufd) } fd[i] = int(ufd) } nextfd++ // Allocate another pipe for parent to child communication for // synchronizing writing of User ID/Group ID mappings. if sys.UidMappings != nil || sys.GidMappings != nil { if err := forkExecPipe(p[:]); err != nil { err1 = err.(Errno) return } } hasRawVforkSyscall := runtime.GOARCH == "amd64" || runtime.GOARCH == "ppc64" || runtime.GOARCH == "s390x" || runtime.GOARCH == "arm64" // About to call fork. // No more allocation or calls of non-assembly functions. runtime_BeforeFork() locked = true switch { case hasRawVforkSyscall && (sys.Cloneflags&CLONE_NEWUSER == 0 && sys.Unshareflags&CLONE_NEWUSER == 0): r1, err1 = rawVforkSyscall(SYS_CLONE, uintptr(SIGCHLD|CLONE_VFORK|CLONE_VM)|sys.Cloneflags) case runtime.GOARCH == "s390x": r1, _, err1 = RawSyscall6(SYS_CLONE, 0, uintptr(SIGCHLD)|sys.Cloneflags, 0, 0, 0, 0) default: r1, _, err1 = RawSyscall6(SYS_CLONE, uintptr(SIGCHLD)|sys.Cloneflags, 0, 0, 0, 0, 0) } if err1 != 0 || r1 != 0 { // If we're in the parent, we must return immediately // so we're not in the same stack frame as the child. // This can at most use the return PC, which the child // will not modify, and the results of // rawVforkSyscall, which must have been written after // the child was replaced. return } // Fork succeeded, now in child. runtime_AfterForkInChild() // Enable the "keep capabilities" flag to set ambient capabilities later. if len(sys.AmbientCaps) > 0 { _, _, err1 = RawSyscall6(SYS_PRCTL, PR_SET_KEEPCAPS, 1, 0, 0, 0, 0) if err1 != 0 { goto childerror } } // Wait for User ID/Group ID mappings to be written. if sys.UidMappings != nil || sys.GidMappings != nil { if _, _, err1 = RawSyscall(SYS_CLOSE, uintptr(p[1]), 0, 0); err1 != 0 { goto childerror } r1, _, err1 = RawSyscall(SYS_READ, uintptr(p[0]), uintptr(unsafe.Pointer(&err2)), unsafe.Sizeof(err2)) if err1 != 0 { goto childerror } if r1 != unsafe.Sizeof(err2) { err1 = EINVAL goto childerror } if err2 != 0 { err1 = err2 goto childerror } } // Session ID if sys.Setsid { _, _, err1 = RawSyscall(SYS_SETSID, 0, 0, 0) if err1 != 0 { goto childerror } } // Set process group if sys.Setpgid || sys.Foreground { // Place child in process group. _, _, err1 = RawSyscall(SYS_SETPGID, 0, uintptr(sys.Pgid), 0) if err1 != 0 { goto childerror } } if sys.Foreground { pgrp := int32(sys.Pgid) if pgrp == 0 { r1, _ = rawSyscallNoError(SYS_GETPID, 0, 0, 0) pgrp = int32(r1) } // Place process group in foreground. _, _, err1 = RawSyscall(SYS_IOCTL, uintptr(sys.Ctty), uintptr(TIOCSPGRP), uintptr(unsafe.Pointer(&pgrp))) if err1 != 0 { goto childerror } } // Unshare if sys.Unshareflags != 0 { _, _, err1 = RawSyscall(SYS_UNSHARE, sys.Unshareflags, 0, 0) if err1 != 0 { goto childerror } if sys.Unshareflags&CLONE_NEWUSER != 0 && sys.GidMappings != nil { dirfd := int(_AT_FDCWD) if fd1, _, err1 = RawSyscall6(SYS_OPENAT, uintptr(dirfd), uintptr(unsafe.Pointer(&psetgroups[0])), uintptr(O_WRONLY), 0, 0, 0); err1 != 0 { goto childerror } r1, _, err1 = RawSyscall(SYS_WRITE, uintptr(fd1), uintptr(unsafe.Pointer(&setgroups[0])), uintptr(len(setgroups))) if err1 != 0 { goto childerror } if _, _, err1 = RawSyscall(SYS_CLOSE, uintptr(fd1), 0, 0); err1 != 0 { goto childerror } if fd1, _, err1 = RawSyscall6(SYS_OPENAT, uintptr(dirfd), uintptr(unsafe.Pointer(&pgid[0])), uintptr(O_WRONLY), 0, 0, 0); err1 != 0 { goto childerror } r1, _, err1 = RawSyscall(SYS_WRITE, uintptr(fd1), uintptr(unsafe.Pointer(&gidmap[0])), uintptr(len(gidmap))) if err1 != 0 { goto childerror } if _, _, err1 = RawSyscall(SYS_CLOSE, uintptr(fd1), 0, 0); err1 != 0 { goto childerror } } if sys.Unshareflags&CLONE_NEWUSER != 0 && sys.UidMappings != nil { dirfd := int(_AT_FDCWD) if fd1, _, err1 = RawSyscall6(SYS_OPENAT, uintptr(dirfd), uintptr(unsafe.Pointer(&puid[0])), uintptr(O_WRONLY), 0, 0, 0); err1 != 0 { goto childerror } r1, _, err1 = RawSyscall(SYS_WRITE, uintptr(fd1), uintptr(unsafe.Pointer(&uidmap[0])), uintptr(len(uidmap))) if err1 != 0 { goto childerror } if _, _, err1 = RawSyscall(SYS_CLOSE, uintptr(fd1), 0, 0); err1 != 0 { goto childerror } } // The unshare system call in Linux doesn't unshare mount points // mounted with --shared. Systemd mounts / with --shared. For a // long discussion of the pros and cons of this see debian bug 739593. // The Go model of unsharing is more like Plan 9, where you ask // to unshare and the namespaces are unconditionally unshared. // To make this model work we must further mark / as MS_PRIVATE. // This is what the standard unshare command does. if sys.Unshareflags&CLONE_NEWNS == CLONE_NEWNS { _, _, err1 = RawSyscall6(SYS_MOUNT, uintptr(unsafe.Pointer(&none[0])), uintptr(unsafe.Pointer(&slash[0])), 0, MS_REC|MS_PRIVATE, 0, 0) if err1 != 0 { goto childerror } } } // Chroot if chroot != nil { _, _, err1 = RawSyscall(SYS_CHROOT, uintptr(unsafe.Pointer(chroot)), 0, 0) if err1 != 0 { goto childerror } } // User and groups if cred := sys.Credential; cred != nil { ngroups := uintptr(len(cred.Groups)) groups := uintptr(0) if ngroups > 0 { groups = uintptr(unsafe.Pointer(&cred.Groups[0])) } if !(sys.GidMappings != nil && !sys.GidMappingsEnableSetgroups && ngroups == 0) && !cred.NoSetGroups { _, _, err1 = RawSyscall(_SYS_setgroups, ngroups, groups, 0) if err1 != 0 { goto childerror } } _, _, err1 = RawSyscall(sys_SETGID, uintptr(cred.Gid), 0, 0) if err1 != 0 { goto childerror } _, _, err1 = RawSyscall(sys_SETUID, uintptr(cred.Uid), 0, 0) if err1 != 0 { goto childerror } } if len(sys.AmbientCaps) != 0 { // Ambient capabilities were added in the 4.3 kernel, // so it is safe to always use _LINUX_CAPABILITY_VERSION_3. caps.hdr.version = _LINUX_CAPABILITY_VERSION_3 if _, _, err1 := RawSyscall(SYS_CAPGET, uintptr(unsafe.Pointer(&caps.hdr)), uintptr(unsafe.Pointer(&caps.data[0])), 0); err1 != 0 { goto childerror } for _, c := range sys.AmbientCaps { // Add the c capability to the permitted and inheritable capability mask, // otherwise we will not be able to add it to the ambient capability mask. caps.data[capToIndex(c)].permitted |= capToMask(c) caps.data[capToIndex(c)].inheritable |= capToMask(c) } if _, _, err1 := RawSyscall(SYS_CAPSET, uintptr(unsafe.Pointer(&caps.hdr)), uintptr(unsafe.Pointer(&caps.data[0])), 0); err1 != 0 { goto childerror } for _, c := range sys.AmbientCaps { _, _, err1 = RawSyscall6(SYS_PRCTL, PR_CAP_AMBIENT, uintptr(PR_CAP_AMBIENT_RAISE), c, 0, 0, 0) if err1 != 0 { goto childerror } } } // Chdir if dir != nil { _, _, err1 = RawSyscall(SYS_CHDIR, uintptr(unsafe.Pointer(dir)), 0, 0) if err1 != 0 { goto childerror } } // Parent death signal if sys.Pdeathsig != 0 { _, _, err1 = RawSyscall6(SYS_PRCTL, PR_SET_PDEATHSIG, uintptr(sys.Pdeathsig), 0, 0, 0, 0) if err1 != 0 { goto childerror } // Signal self if parent is already dead. This might cause a // duplicate signal in rare cases, but it won't matter when // using SIGKILL. r1, _ = rawSyscallNoError(SYS_GETPPID, 0, 0, 0) if r1 != ppid { pid, _ := rawSyscallNoError(SYS_GETPID, 0, 0, 0) _, _, err1 := RawSyscall(SYS_KILL, pid, uintptr(sys.Pdeathsig), 0) if err1 != 0 { goto childerror } } } // Pass 1: look for fd[i] < i and move those up above len(fd) // so that pass 2 won't stomp on an fd it needs later. if pipe < nextfd { _, _, err1 = RawSyscall(_SYS_dup, uintptr(pipe), uintptr(nextfd), 0) if err1 != 0 { goto childerror } RawSyscall(fcntl64Syscall, uintptr(nextfd), F_SETFD, FD_CLOEXEC) pipe = nextfd nextfd++ } for i = 0; i < len(fd); i++ { if fd[i] >= 0 && fd[i] < int(i) { if nextfd == pipe { // don't stomp on pipe nextfd++ } _, _, err1 = RawSyscall(_SYS_dup, uintptr(fd[i]), uintptr(nextfd), 0) if err1 != 0 { goto childerror } RawSyscall(fcntl64Syscall, uintptr(nextfd), F_SETFD, FD_CLOEXEC) fd[i] = nextfd nextfd++ } } // Pass 2: dup fd[i] down onto i. for i = 0; i < len(fd); i++ { if fd[i] == -1 { RawSyscall(SYS_CLOSE, uintptr(i), 0, 0) continue } if fd[i] == int(i) { // dup2(i, i) won't clear close-on-exec flag on Linux, // probably not elsewhere either. _, _, err1 = RawSyscall(fcntl64Syscall, uintptr(fd[i]), F_SETFD, 0) if err1 != 0 { goto childerror } continue } // The new fd is created NOT close-on-exec, // which is exactly what we want. _, _, err1 = RawSyscall(_SYS_dup, uintptr(fd[i]), uintptr(i), 0) if err1 != 0 { goto childerror } } // By convention, we don't close-on-exec the fds we are // started with, so if len(fd) < 3, close 0, 1, 2 as needed. // Programs that know they inherit fds >= 3 will need // to set them close-on-exec. for i = len(fd); i < 3; i++ { RawSyscall(SYS_CLOSE, uintptr(i), 0, 0) } // Detach fd 0 from tty if sys.Noctty { _, _, err1 = RawSyscall(SYS_IOCTL, 0, uintptr(TIOCNOTTY), 0) if err1 != 0 { goto childerror } } // Set the controlling TTY to Ctty if sys.Setctty { _, _, err1 = RawSyscall(SYS_IOCTL, uintptr(sys.Ctty), uintptr(TIOCSCTTY), 1) if err1 != 0 { goto childerror } } // Enable tracing if requested. // Do this right before exec so that we don't unnecessarily trace the runtime // setting up after the fork. See issue #21428. if sys.Ptrace { _, _, err1 = RawSyscall(SYS_PTRACE, uintptr(PTRACE_TRACEME), 0, 0) if err1 != 0 { goto childerror } } // Time to exec. _, _, err1 = RawSyscall(SYS_EXECVE, uintptr(unsafe.Pointer(argv0)), uintptr(unsafe.Pointer(&argv[0])), uintptr(unsafe.Pointer(&envv[0]))) childerror: // send error code on pipe RawSyscall(SYS_WRITE, uintptr(pipe), uintptr(unsafe.Pointer(&err1)), unsafe.Sizeof(err1)) for { RawSyscall(SYS_EXIT, 253, 0, 0) } } // Try to open a pipe with O_CLOEXEC set on both file descriptors. func forkExecPipe(p []int) (err error) { err = Pipe2(p, O_CLOEXEC) // pipe2 was added in 2.6.27 and our minimum requirement is 2.6.23, so it // might not be implemented. if err == ENOSYS { if err = Pipe(p); err != nil { return } if _, err = fcntl(p[0], F_SETFD, FD_CLOEXEC); err != nil { return } _, err = fcntl(p[1], F_SETFD, FD_CLOEXEC) } return } func formatIDMappings(idMap []SysProcIDMap) []byte { var data []byte for _, im := range idMap { data = append(data, []byte(itoa(im.ContainerID)+" "+itoa(im.HostID)+" "+itoa(im.Size)+"\n")...) } return data } // writeIDMappings writes the user namespace User ID or Group ID mappings to the specified path. func writeIDMappings(path string, idMap []SysProcIDMap) error { fd, err := Open(path, O_RDWR, 0) if err != nil { return err } if _, err := Write(fd, formatIDMappings(idMap)); err != nil { Close(fd) return err } if err := Close(fd); err != nil { return err } return nil } // writeSetgroups writes to /proc/PID/setgroups "deny" if enable is false // and "allow" if enable is true. // This is needed since kernel 3.19, because you can't write gid_map without // disabling setgroups() system call. func writeSetgroups(pid int, enable bool) error { sgf := "/proc/" + itoa(pid) + "/setgroups" fd, err := Open(sgf, O_RDWR, 0) if err != nil { return err } var data []byte if enable { data = []byte("allow") } else { data = []byte("deny") } if _, err := Write(fd, data); err != nil { Close(fd) return err } return Close(fd) } // writeUidGidMappings writes User ID and Group ID mappings for user namespaces // for a process and it is called from the parent process. func writeUidGidMappings(pid int, sys *SysProcAttr) error { if sys.UidMappings != nil { uidf := "/proc/" + itoa(pid) + "/uid_map" if err := writeIDMappings(uidf, sys.UidMappings); err != nil { return err } } if sys.GidMappings != nil { // If the kernel is too old to support /proc/PID/setgroups, writeSetGroups will return ENOENT; this is OK. if err := writeSetgroups(pid, sys.GidMappingsEnableSetgroups); err != nil && err != ENOENT { return err } gidf := "/proc/" + itoa(pid) + "/gid_map" if err := writeIDMappings(gidf, sys.GidMappings); err != nil { return err } } return nil }
Close