Skip to content

Commit aa505bf

Browse files
committed
memfd-bind: mention that overlayfs obviates the need for it
Signed-off-by: Aleksa Sarai <[email protected]>
1 parent 9bc42d6 commit aa505bf

File tree

1 file changed

+12
-1
lines changed

1 file changed

+12
-1
lines changed

contrib/cmd/memfd-bind/README.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,15 @@
11
## memfd-bind ##
22

3-
`runc` normally has to make a binary copy of itself when constructing a
3+
> **NOTE**: Since runc 1.2.0, runc will now use a private overlayfs mount to
4+
> protect the runc binary. This protection is far more light-weight than
5+
> memfd-bind, and for most users this should obviate the need for `memfd-bind`
6+
> entirely. Rootless containers will still make a memfd copy (unless you are
7+
> using `runc` itself inside a user namespace -- a-la
8+
> [`rootlesskit`][rootlesskit]), but `memfd-bind` is not particularly useful
9+
> for rootless container users anyway (see [Caveats](#Caveats) for more
10+
> details).
11+
12+
`runc` sometimes has to make a binary copy of itself when constructing a
413
container process in order to defend against certain container runtime attacks
514
such as CVE-2019-5736.
615

@@ -38,6 +47,8 @@ much memory usage they can use:
3847
container process setup takes up about 10MB per process spawned inside the
3948
container by runc (both pid1 and `runc exec`).
4049

50+
[rootlesskit]: https://github.com/rootless-containers/rootlesskit
51+
4152
### Caveats ###
4253

4354
There are several downsides with using `memfd-bind` on the `runc` binary:

0 commit comments

Comments
 (0)