summaryrefslogtreecommitdiffhomepage
path: root/runsc/boot/loader.go
diff options
context:
space:
mode:
authorFabricio Voznika <fvoznika@google.com>2018-06-21 13:21:25 -0700
committerShentubot <shentubot@google.com>2018-06-21 13:22:18 -0700
commitf6be5fe6193163ad46722bc36209572da4a15ad0 (patch)
tree4f7424aa6dc619d4f674dee989f401ee758e179b /runsc/boot/loader.go
parentd571a4359cebbcf8a9b201bb125f1cdc9fb126e4 (diff)
Forward SIGUSR2 to the sandbox too
SIGUSR2 was being masked out to be used as a way to dump sentry stacks. This could cause compatibility problems in cases anyone uses SIGUSR2 to communicate with the container init process. PiperOrigin-RevId: 201575374 Change-Id: I312246e828f38ad059139bb45b8addc2ed055d74
Diffstat (limited to 'runsc/boot/loader.go')
-rw-r--r--runsc/boot/loader.go5
1 files changed, 2 insertions, 3 deletions
diff --git a/runsc/boot/loader.go b/runsc/boot/loader.go
index e1194bd03..a0a28dc43 100644
--- a/runsc/boot/loader.go
+++ b/runsc/boot/loader.go
@@ -215,9 +215,8 @@ func New(spec *specs.Spec, conf *Config, controllerFD, restoreFD int, ioFDs []in
if err := sighandling.IgnoreChildStop(); err != nil {
return nil, fmt.Errorf("failed to ignore child stop signals: %v", err)
}
- // Ensure that most signals received in sentry context are forwarded to
- // the emulated kernel.
- stopSignalForwarding := sighandling.StartForwarding(k)
+ // Ensure that signals received are forwarded to the emulated kernel.
+ stopSignalForwarding := sighandling.PrepareForwarding(k, false)()
procArgs, err := newProcess(spec, conf, ioFDs, console, creds, utsns, ipcns, k)
if err != nil {