vendor: bump runc to 1.1.6
Signed-off-by: Peter Hunt <pehunt@redhat.com>
This commit is contained in:
19
vendor/github.com/opencontainers/runc/libcontainer/system/linux.go
generated
vendored
19
vendor/github.com/opencontainers/runc/libcontainer/system/linux.go
generated
vendored
@@ -31,25 +31,6 @@ func (p ParentDeathSignal) Set() error {
|
||||
return SetParentDeathSignal(uintptr(p))
|
||||
}
|
||||
|
||||
// Eaccess is similar to unix.Access except for setuid/setgid binaries
|
||||
// it checks against the effective (rather than real) uid and gid.
|
||||
func Eaccess(path string) error {
|
||||
err := unix.Faccessat2(unix.AT_FDCWD, path, unix.X_OK, unix.AT_EACCESS)
|
||||
if err != unix.ENOSYS && err != unix.EPERM { //nolint:errorlint // unix errors are bare
|
||||
return err
|
||||
}
|
||||
|
||||
// Faccessat2() not available; check if we are a set[ug]id binary.
|
||||
if os.Getuid() == os.Geteuid() && os.Getgid() == os.Getegid() {
|
||||
// For a non-set[ug]id binary, use access(2).
|
||||
return unix.Access(path, unix.X_OK)
|
||||
}
|
||||
|
||||
// For a setuid/setgid binary, there is no fallback way
|
||||
// so assume we can execute the binary.
|
||||
return nil
|
||||
}
|
||||
|
||||
func Execv(cmd string, args []string, env []string) error {
|
||||
name, err := exec.LookPath(cmd)
|
||||
if err != nil {
|
||||
|
Reference in New Issue
Block a user