File tree Expand file tree Collapse file tree 4 files changed +4
-11
lines changed Expand file tree Collapse file tree 4 files changed +4
-11
lines changed Original file line number Diff line number Diff line change @@ -49,7 +49,7 @@ type Process struct {
49
49
// ExtraFiles specifies additional open files to be inherited by the container
50
50
ExtraFiles []* os.File
51
51
52
- // open handles to cloned binaries -- see dmz.ClonedBinary for more details
52
+ // open handles to cloned binaries -- see dmz.CloneSelfExe for more details
53
53
clonedExes []* os.File
54
54
55
55
// Initial sizings for the console
Original file line number Diff line number Diff line change @@ -150,11 +150,6 @@ func (l *linuxSetnsInit) Init() error {
150
150
// (otherwise the (*os.File) finaliser could close the wrong file). See
151
151
// CVE-2024-21626 for more information as to why this protection is
152
152
// necessary.
153
- //
154
- // This is not needed for runc-dmz, because the extra execve(2) step means
155
- // that all O_CLOEXEC file descriptors have already been closed and thus
156
- // the second execve(2) from runc-dmz cannot access internal file
157
- // descriptors from runc.
158
153
if err := utils .UnsafeCloseFrom (l .config .PassedFilesCount + 3 ); err != nil {
159
154
return err
160
155
}
Original file line number Diff line number Diff line change @@ -284,11 +284,6 @@ func (l *linuxStandardInit) Init() error {
284
284
// (otherwise the (*os.File) finaliser could close the wrong file). See
285
285
// CVE-2024-21626 for more information as to why this protection is
286
286
// necessary.
287
- //
288
- // This is not needed for runc-dmz, because the extra execve(2) step means
289
- // that all O_CLOEXEC file descriptors have already been closed and thus
290
- // the second execve(2) from runc-dmz cannot access internal file
291
- // descriptors from runc.
292
287
if err := utils .UnsafeCloseFrom (l .config .PassedFilesCount + 3 ); err != nil {
293
288
return err
294
289
}
Original file line number Diff line number Diff line change @@ -241,6 +241,9 @@ flags=(
241
241
242
242
# required for bind-mounting /dev/mqueue into containers
243
243
POSIX_MQUEUE
244
+
245
+ # Most containers use overlayfs, and now runc itself uses it.
246
+ OVERLAY_FS
244
247
)
245
248
check_flags " ${flags[@]} "
246
249
You can’t perform that action at this time.
0 commit comments