File tree Expand file tree Collapse file tree 1 file changed +12
-1
lines changed Expand file tree Collapse file tree 1 file changed +12
-1
lines changed Original file line number Diff line number Diff line change 1
1
## memfd-bind ##
2
2
3
- ` runc ` normally has to make a binary copy of itself when constructing a
3
+ > ** NOTE** : Since runc 1.2.0, runc will now use a private overlayfs mount to
4
+ > protect the runc binary. This protection is far more light-weight than
5
+ > memfd-bind, and for most users this should obviate the need for ` memfd-bind `
6
+ > entirely. Rootless containers will still make a memfd copy (unless you are
7
+ > using ` runc ` itself inside a user namespace -- a-la
8
+ > [ ` rootlesskit ` ] [ rootlesskit ] ), but ` memfd-bind ` is not particularly useful
9
+ > for rootless container users anyway (see [ Caveats] ( #Caveats ) for more
10
+ > details).
11
+
12
+ ` runc ` sometimes has to make a binary copy of itself when constructing a
4
13
container process in order to defend against certain container runtime attacks
5
14
such as CVE-2019 -5736.
6
15
@@ -38,6 +47,8 @@ much memory usage they can use:
38
47
container process setup takes up about 10MB per process spawned inside the
39
48
container by runc (both pid1 and ` runc exec ` ).
40
49
50
+ [ rootlesskit ] : https://github.com/rootless-containers/rootlesskit
51
+
41
52
### Caveats ###
42
53
43
54
There are several downsides with using ` memfd-bind ` on the ` runc ` binary:
You can’t perform that action at this time.
0 commit comments