35 Commits

Author SHA1 Message Date
songyanting
e48716dd7e sync patches
patch/0126-runc-add-check-in-spec.patch
patch/0127-runc-add-mount-destination-validation-fix-CVE-2021.patch
patch/0128-runc-optimize-nsexec-logging.patch
patch/0129-runc-improve-log-for-debugging.patch
patch/0130-runc-fix-cgroup-info-print-error.patch
2022-01-26 22:59:29 +08:00
openeuler-ci-bot
6170e0b05c !38 change the spec file name to be the same as the repo name
From: @chen-jan
Reviewed-by: @jianminw
Signed-off-by: @jianminw
2021-11-08 01:08:18 +00:00
chen-jan
4ad86f2160 change the spec file name to be the same as the repo name 2021-10-26 02:00:35 +00:00
openeuler-ci-bot
6705d3781b !25 runc: do not use -i in go build
From: @Vanient
Reviewed-by: 
Signed-off-by:
2021-03-22 09:15:28 +08:00
xiadanni
ba84bf6e44 runc: do not use -i in go build
Signed-off-by: xiadanni <xiadanni1@huawei.com>
2021-03-19 15:18:20 +08:00
openeuler-ci-bot
d166469c4b !22 runc:build security options
From: @Vanient
Reviewed-by: @jing-rui,@caihaomin
Signed-off-by: @caihaomin
2021-03-18 15:13:19 +08:00
xiadanni
2f6befc1d9 runc:build security options
Signed-off-by: xiadanni <xiadanni1@huawei.com>
2021-03-18 11:18:36 +08:00
xiadanni
86bbece715 runc: sync bugfix
1. add cpu and memory info when print cgroup info
2. fix freezing race

Signed-off-by: xiadanni <xiadanni1@huawei.com>
2021-03-18 11:10:23 +08:00
openeuler-ci-bot
8f2504f874 !19 runc:sys:add symbol for riscv64
From: @riscv-spare
Reviewed-by: @jing-rui
Signed-off-by: @jing-rui
2021-01-14 16:43:29 +08:00
rv_spare
c4bc0d77ce !1 runc:sys:add symbol for riscv64
Merge pull request !1 from 杨演超/master
2020-12-15 14:54:21 +08:00
yangyanchao
356cf9ad42 runc:sys:add symbol for riscv64
Signed-off-by: yangyanchao <yangyanchao6@huawei.com>
2020-12-15 14:52:48 +08:00
openeuler-ci-bot
80fe4319cf !13 runc: don't deny all devices when update cgroup resource
From: @Vanient
Reviewed-by: @jing-rui
Signed-off-by: @jing-rui
2020-11-25 17:25:37 +08:00
xiadanni
573b34b3bb runc: don't deny all devices when update cgroup resource
Signed-off-by: xiadanni <xiadanni1@huawei.com>
2020-11-25 15:42:31 +08:00
openeuler-ci-bot
64b427019f !10 runc: fix apply patch fail
From: @Vanient
Reviewed-by: @jing-rui
Signed-off-by: @jing-rui
2020-09-15 17:15:17 +08:00
xiadanni
a95af96b2a runc: fix apply patch fail
Signed-off-by: xiadanni <xiadanni1@huawei.com>
2020-09-15 09:38:24 +08:00
openeuler-ci-bot
24528c2b42 !9 runc: fix SOURCE0 addr
From: @Vanient
Reviewed-by: @jing-rui
Signed-off-by: @jing-rui
2020-09-14 20:17:24 +08:00
xiadanni
621cb0a06f runc: fix SOURCE0 addr
Signed-off-by: xiadanni <xiadanni1@huawei.com>
2020-09-14 15:12:34 +08:00
openeuler-ci-bot
01bdeee494 !8 runc: fix permission denied
Merge pull request !8 from Vanient/master
2020-07-10 17:04:40 +08:00
xiadanni
450a0907cf runc: fix permission denied
reason: when exec as root and config.Cwd is not owned by root,
exec will fail because root doesn't have the caps.

Signed-off-by: Kurnia D Win <kurnia.d.win@gmail.com>
Signed-off-by: xiadanni <xiadanni1@huawei.com>
2020-07-09 16:02:37 +08:00
openeuler-ci-bot
e532736168 !7 runc: add yaml file in package
Merge pull request !7 from Vanient/master
2020-07-07 14:16:08 +08:00
xiadanni
5a188f2c87 runc: add yaml file in package
Signed-off-by: xiadanni <xiadanni1@huawei.com>
2020-07-06 10:21:54 +08:00
openeuler-ci-bot
2c74c3d91e !6 runc: use git-commit to store commit ID
Merge pull request !6 from Vanient/master
2020-06-15 15:45:49 +08:00
xiadanni1
ab5af31922 runc: use git-commit to store commit ID
Change-Id: Ib43bafb0ec680082520d85530ef783b68bc08671
Signed-off-by: xiadanni1 <xiadanni1@huawei.com>
2020-06-12 01:19:00 +08:00
openeuler-ci-bot
438be5f0d9 !5 add runc-openeuler.yaml
Merge pull request !5 from 成子晗/master
2020-05-09 19:23:32 +08:00
chengzihan2
79b5a220be add runc-openeuler.yaml 2020-05-06 16:36:00 +08:00
openeuler-ci-bot
5d0b0c9450 !4 rootfs: do not permit /proc mounts to non-directories
Merge pull request !4 from Vanient/master
2020-04-26 15:56:39 +08:00
xiadanni1
1029fc9d1c rootfs: do not permit /proc mounts to non-directories
mount(2) will blindly follow symlinks, which is a problem because it
allows a malicious container to trick runc into mounting /proc to an
entirely different location (and thus within the attacker's control for
a rename-exchange attack).

This is just a hotfix (to "stop the bleeding"), and the more complete
fix would be finish libpathrs and port runc to it (to avoid these types
of attacks entirely, and defend against a variety of other /proc-related
attacks). It can be bypased by someone having "/" be a volume controlled
by another container.

Fixes: CVE-2019-19921
Signed-off-by: Aleksa Sarai <asarai@suse.de>
Signed-off-by: xiadanni1 <xiadanni1@huawei.com>
2020-04-15 17:01:50 +08:00
openeuler-ci-bot
fabf83fd21 !3 runc:Pass back the pid of runc:[1:CHILD] so we can wait on it
Merge pull request !3 from Grooooot/master
2020-03-20 15:19:42 +08:00
xiadanni1
e85c7e153b runc:Pass back the pid of runc:[1:CHILD] so we can wait on it
reason:This allows the libcontainer to automatically clean up
runc:[1:CHILD] processes created as part of nsenter.

Signed-off-by: Alex Fang <littlelightlittlefire@gmail.com>
2020-03-20 21:31:32 +08:00
openeuler-ci-bot
8f8796634d !2 runc: add patches
Merge pull request !2 from Grooooot/master
2020-03-06 17:28:36 +08:00
Grooooot
ba3d1f2aa6 runc: sync patches
Signed-off-by: Grooooot <isula@huawei.com>
2020-03-05 19:34:03 +08:00
dogsheng
33edf12965 modify 2019-12-29 19:03:52 +08:00
openeuler-ci-bot
b862929a21 !1 runc: package init
Merge pull request !1 from Grooooot/master
2019-12-29 16:36:17 +08:00
openeuler-iSula
5904ba4dcf runc: package init
Signed-off-by: openeuler-iSula <isula@huawei.com>
2019-12-29 15:34:20 +08:00
openeuler-ci-bot
83e4e22447 Initial commit 2019-12-29 14:46:19 +08:00