diff options
author | Fabricio Voznika <fvoznika@google.com> | 2018-06-21 13:21:25 -0700 |
---|---|---|
committer | Shentubot <shentubot@google.com> | 2018-06-21 13:22:18 -0700 |
commit | f6be5fe6193163ad46722bc36209572da4a15ad0 (patch) | |
tree | 4f7424aa6dc619d4f674dee989f401ee758e179b /runsc/boot/loader.go | |
parent | d571a4359cebbcf8a9b201bb125f1cdc9fb126e4 (diff) |
Forward SIGUSR2 to the sandbox too
SIGUSR2 was being masked out to be used as a way to dump sentry
stacks. This could cause compatibility problems in cases anyone
uses SIGUSR2 to communicate with the container init process.
PiperOrigin-RevId: 201575374
Change-Id: I312246e828f38ad059139bb45b8addc2ed055d74
Diffstat (limited to 'runsc/boot/loader.go')
-rw-r--r-- | runsc/boot/loader.go | 5 |
1 files changed, 2 insertions, 3 deletions
diff --git a/runsc/boot/loader.go b/runsc/boot/loader.go index e1194bd03..a0a28dc43 100644 --- a/runsc/boot/loader.go +++ b/runsc/boot/loader.go @@ -215,9 +215,8 @@ func New(spec *specs.Spec, conf *Config, controllerFD, restoreFD int, ioFDs []in if err := sighandling.IgnoreChildStop(); err != nil { return nil, fmt.Errorf("failed to ignore child stop signals: %v", err) } - // Ensure that most signals received in sentry context are forwarded to - // the emulated kernel. - stopSignalForwarding := sighandling.StartForwarding(k) + // Ensure that signals received are forwarded to the emulated kernel. + stopSignalForwarding := sighandling.PrepareForwarding(k, false)() procArgs, err := newProcess(spec, conf, ioFDs, console, creds, utsns, ipcns, k) if err != nil { |