summaryrefslogtreecommitdiffhomepage
path: root/runsc/cmd/chroot.go
diff options
context:
space:
mode:
authorAndrei Vagin <avagin@google.com>2019-01-18 12:16:24 -0800
committerShentubot <shentubot@google.com>2019-01-18 12:17:34 -0800
commitc063a1350f4ac6249fb26e6125c9cc99db14263b (patch)
treeb96361cb0b81c81e9af7f3f61ddc65e0469349ab /runsc/cmd/chroot.go
parent8d7c10e90840cfecf53089e7cc3507cac2804fd1 (diff)
runsc: create a new proc mount if the sandbox process is running in a new pidns
PiperOrigin-RevId: 229971902 Change-Id: Ief4fac731e839ef092175908de9375d725eaa3aa
Diffstat (limited to 'runsc/cmd/chroot.go')
-rw-r--r--runsc/cmd/chroot.go13
1 files changed, 10 insertions, 3 deletions
diff --git a/runsc/cmd/chroot.go b/runsc/cmd/chroot.go
index b53085934..ec539a11c 100644
--- a/runsc/cmd/chroot.go
+++ b/runsc/cmd/chroot.go
@@ -42,7 +42,7 @@ func mountInChroot(chroot, src, dst, typ string, flags uint32) error {
// setUpChroot creates an empty directory with runsc mounted at /runsc and proc
// mounted at /proc.
-func setUpChroot() error {
+func setUpChroot(pidns bool) error {
// We are a new mount namespace, so we can use /tmp as a directory to
// construct a new root.
chroot := os.TempDir()
@@ -59,8 +59,15 @@ func setUpChroot() error {
return fmt.Errorf("error mounting tmpfs in choot: %v", err)
}
- if err := mountInChroot(chroot, "/proc", "/proc", "bind", syscall.MS_BIND|syscall.MS_RDONLY|syscall.MS_REC); err != nil {
- return fmt.Errorf("error mounting proc in chroot: %v", err)
+ if pidns {
+ flags := uint32(syscall.MS_NOSUID | syscall.MS_NODEV | syscall.MS_NOEXEC | syscall.MS_RDONLY)
+ if err := mountInChroot(chroot, "proc", "/proc", "proc", flags); err != nil {
+ return fmt.Errorf("error mounting proc in chroot: %v", err)
+ }
+ } else {
+ if err := mountInChroot(chroot, "/proc", "/proc", "bind", syscall.MS_BIND|syscall.MS_RDONLY|syscall.MS_REC); err != nil {
+ return fmt.Errorf("error mounting proc in chroot: %v", err)
+ }
}
if err := mountInChroot(chroot, specutils.ExePath, chrootBinPath, "bind", syscall.MS_BIND|syscall.MS_RDONLY); err != nil {