mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 12:18:16 +00:00 
			
		
		
		
	vendor: bump runc to f000fe11
This commit is contained in:
		
							
								
								
									
										23
									
								
								vendor/github.com/opencontainers/runc/libcontainer/process_linux.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										23
									
								
								vendor/github.com/opencontainers/runc/libcontainer/process_linux.go
									
									
									
										generated
									
									
										vendored
									
									
								
							@@ -46,15 +46,16 @@ type parentProcess interface {
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type setnsProcess struct {
 | 
			
		||||
	cmd           *exec.Cmd
 | 
			
		||||
	parentPipe    *os.File
 | 
			
		||||
	childPipe     *os.File
 | 
			
		||||
	cgroupPaths   map[string]string
 | 
			
		||||
	intelRdtPath  string
 | 
			
		||||
	config        *initConfig
 | 
			
		||||
	fds           []string
 | 
			
		||||
	process       *Process
 | 
			
		||||
	bootstrapData io.Reader
 | 
			
		||||
	cmd             *exec.Cmd
 | 
			
		||||
	parentPipe      *os.File
 | 
			
		||||
	childPipe       *os.File
 | 
			
		||||
	cgroupPaths     map[string]string
 | 
			
		||||
	rootlessCgroups bool
 | 
			
		||||
	intelRdtPath    string
 | 
			
		||||
	config          *initConfig
 | 
			
		||||
	fds             []string
 | 
			
		||||
	process         *Process
 | 
			
		||||
	bootstrapData   io.Reader
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (p *setnsProcess) startTime() (uint64, error) {
 | 
			
		||||
@@ -86,7 +87,7 @@ func (p *setnsProcess) start() (err error) {
 | 
			
		||||
		return newSystemErrorWithCause(err, "executing setns process")
 | 
			
		||||
	}
 | 
			
		||||
	if len(p.cgroupPaths) > 0 {
 | 
			
		||||
		if err := cgroups.EnterPid(p.cgroupPaths, p.pid()); err != nil {
 | 
			
		||||
		if err := cgroups.EnterPid(p.cgroupPaths, p.pid()); err != nil && !p.rootlessCgroups {
 | 
			
		||||
			return newSystemErrorWithCausef(err, "adding pid %d to cgroups", p.pid())
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
@@ -537,7 +538,7 @@ func (p *Process) InitializeIO(rootuid, rootgid int) (i *IO, err error) {
 | 
			
		||||
	}
 | 
			
		||||
	fds = append(fds, r.Fd(), w.Fd())
 | 
			
		||||
	p.Stderr, i.Stderr = w, r
 | 
			
		||||
	// change ownership of the pipes incase we are in a user namespace
 | 
			
		||||
	// change ownership of the pipes in case we are in a user namespace
 | 
			
		||||
	for _, fd := range fds {
 | 
			
		||||
		if err := unix.Fchown(int(fd), rootuid, rootgid); err != nil {
 | 
			
		||||
			return nil, err
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user