namespaces: allow to use pid namespace without mount namespace

The gocapability package uses /proc/PID/status to get a bounding set.
If a container uses pidns without mntns, it sees /proc from the host
namespace, but the process doesn't know its own pid in this namespace.

In this case it can use /proc/self/status, which is always the right one.

Signed-off-by: Andrew Vagin <avagin@openvz.org>
This commit is contained in:
Andrey Vagin 2015-01-27 14:00:15 +03:00 committed by Andrew Vagin
parent e59984353a
commit 444cc2989a
2 changed files with 3 additions and 5 deletions

View File

@ -1,8 +1,6 @@
package capabilities
import (
"os"
"github.com/syndtr/gocapability/capability"
)
@ -11,7 +9,7 @@ const allCapabilityTypes = capability.CAPS | capability.BOUNDS
// DropBoundingSet drops the capability bounding set to those specified in the
// container configuration.
func DropBoundingSet(capabilities []string) error {
c, err := capability.NewPid(os.Getpid())
c, err := capability.NewPid(0)
if err != nil {
return err
}
@ -29,7 +27,7 @@ func DropBoundingSet(capabilities []string) error {
// DropCapabilities drops all capabilities for the current process except those specified in the container configuration.
func DropCapabilities(capList []string) error {
c, err := capability.NewPid(os.Getpid())
c, err := capability.NewPid(0)
if err != nil {
return err
}

View File

@ -43,6 +43,6 @@ clone() {
clone git github.com/codegangsta/cli 1.1.0
clone git github.com/coreos/go-systemd v2
clone git github.com/godbus/dbus v2
clone git github.com/syndtr/gocapability 3c85049eae
clone git github.com/syndtr/gocapability 1cf3ac4dc4
# intentionally not vendoring Docker itself... that'd be a circle :)