Skip to content

Commit

Permalink
Merge pull request #4490 from kolyshkin/nits22
Browse files Browse the repository at this point in the history
Post overlay addition and dmz removal nits
  • Loading branch information
lifubang authored Oct 30, 2024
2 parents 867917d + 5586d7c commit 82bf6d1
Show file tree
Hide file tree
Showing 4 changed files with 4 additions and 11 deletions.
2 changes: 1 addition & 1 deletion libcontainer/process.go
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ type Process struct {
// ExtraFiles specifies additional open files to be inherited by the container
ExtraFiles []*os.File

// open handles to cloned binaries -- see dmz.ClonedBinary for more details
// open handles to cloned binaries -- see dmz.CloneSelfExe for more details
clonedExes []*os.File

// Initial sizings for the console
Expand Down
5 changes: 0 additions & 5 deletions libcontainer/setns_init_linux.go
Original file line number Diff line number Diff line change
Expand Up @@ -150,11 +150,6 @@ func (l *linuxSetnsInit) Init() error {
// (otherwise the (*os.File) finaliser could close the wrong file). See
// CVE-2024-21626 for more information as to why this protection is
// necessary.
//
// This is not needed for runc-dmz, because the extra execve(2) step means
// that all O_CLOEXEC file descriptors have already been closed and thus
// the second execve(2) from runc-dmz cannot access internal file
// descriptors from runc.
if err := utils.UnsafeCloseFrom(l.config.PassedFilesCount + 3); err != nil {
return err
}
Expand Down
5 changes: 0 additions & 5 deletions libcontainer/standard_init_linux.go
Original file line number Diff line number Diff line change
Expand Up @@ -284,11 +284,6 @@ func (l *linuxStandardInit) Init() error {
// (otherwise the (*os.File) finaliser could close the wrong file). See
// CVE-2024-21626 for more information as to why this protection is
// necessary.
//
// This is not needed for runc-dmz, because the extra execve(2) step means
// that all O_CLOEXEC file descriptors have already been closed and thus
// the second execve(2) from runc-dmz cannot access internal file
// descriptors from runc.
if err := utils.UnsafeCloseFrom(l.config.PassedFilesCount + 3); err != nil {
return err
}
Expand Down
3 changes: 3 additions & 0 deletions script/check-config.sh
Original file line number Diff line number Diff line change
Expand Up @@ -241,6 +241,9 @@ flags=(

# required for bind-mounting /dev/mqueue into containers
POSIX_MQUEUE

# Most containers use overlayfs, and now runc itself uses it.
OVERLAY_FS
)
check_flags "${flags[@]}"

Expand Down

0 comments on commit 82bf6d1

Please sign in to comment.