File tree Expand file tree Collapse file tree 4 files changed +4
-11
lines changed Expand file tree Collapse file tree 4 files changed +4
-11
lines changed Original file line number Diff line number Diff line change @@ -49,7 +49,7 @@ type Process struct {
4949 // ExtraFiles specifies additional open files to be inherited by the container
5050 ExtraFiles []* os.File
5151
52- // open handles to cloned binaries -- see dmz.ClonedBinary for more details
52+ // open handles to cloned binaries -- see dmz.CloneSelfExe for more details
5353 clonedExes []* os.File
5454
5555 // Initial sizings for the console
Original file line number Diff line number Diff line change @@ -150,11 +150,6 @@ func (l *linuxSetnsInit) Init() error {
150150 // (otherwise the (*os.File) finaliser could close the wrong file). See
151151 // CVE-2024-21626 for more information as to why this protection is
152152 // necessary.
153- //
154- // This is not needed for runc-dmz, because the extra execve(2) step means
155- // that all O_CLOEXEC file descriptors have already been closed and thus
156- // the second execve(2) from runc-dmz cannot access internal file
157- // descriptors from runc.
158153 if err := utils .UnsafeCloseFrom (l .config .PassedFilesCount + 3 ); err != nil {
159154 return err
160155 }
Original file line number Diff line number Diff line change @@ -284,11 +284,6 @@ func (l *linuxStandardInit) Init() error {
284284 // (otherwise the (*os.File) finaliser could close the wrong file). See
285285 // CVE-2024-21626 for more information as to why this protection is
286286 // necessary.
287- //
288- // This is not needed for runc-dmz, because the extra execve(2) step means
289- // that all O_CLOEXEC file descriptors have already been closed and thus
290- // the second execve(2) from runc-dmz cannot access internal file
291- // descriptors from runc.
292287 if err := utils .UnsafeCloseFrom (l .config .PassedFilesCount + 3 ); err != nil {
293288 return err
294289 }
Original file line number Diff line number Diff line change @@ -241,6 +241,9 @@ flags=(
241241
242242 # required for bind-mounting /dev/mqueue into containers
243243 POSIX_MQUEUE
244+
245+ # Most containers use overlayfs, and now runc itself uses it.
246+ OVERLAY_FS
244247)
245248check_flags " ${flags[@]} "
246249
You can’t perform that action at this time.
0 commit comments