Skip to content

Conversation

@slp
Copy link
Contributor

@slp slp commented Apr 4, 2025

Stop using set_workdir, which can be dangerous, and rely exclusively on the config file for setting up the workdir in the container.

Fixes: #1691

Summary by Sourcery

Remove the use of set_workdir function in krun handler, relying exclusively on the config file for setting up the container's working directory.

Bug Fixes:

  • Eliminate potentially dangerous direct workdir setting in the krun handler, addressing a potential security or configuration inconsistency

Enhancements:

  • Simplify the krun handler by removing direct workdir configuration method

Stop using set_workdir, which can be dangerous, and rely exclusively
on the config file for setting up the workdir in the container.

Fixes: containers#1691

Signed-off-by: Sergio Lopez <[email protected]>
@sourcery-ai
Copy link

sourcery-ai bot commented Apr 4, 2025

Reviewer's Guide by Sourcery

This pull request removes the usage of set_workdir in libkrun_exec. The working directory is now exclusively configured via the config file.

Sequence diagram for libkrun_exec function call flow (after removal of set_workdir)

sequenceDiagram
  participant libkrun_exec
  participant krun_set_root
  participant libkrun_configure_vm

  libkrun_exec->>krun_set_root: krun_set_root (ctx_id, "/")
  activate krun_set_root
  krun_set_root-->>libkrun_exec: returns ret
  deactivate krun_set_root
  libkrun_exec->>libkrun_configure_vm: libkrun_configure_vm (ctx_id, handle, &configured, &err)
  activate libkrun_configure_vm
  libkrun_configure_vm-->>libkrun_exec: returns ret
  deactivate libkrun_configure_vm
Loading

File-Level Changes

Change Details Files
Removed the krun_set_workdir function from libkrun_exec.
  • Removed the declaration of krun_set_workdir.
  • Removed the dlsym call to load krun_set_workdir.
  • Removed the call to krun_set_workdir.
src/libcrun/handlers/krun.c

Tips and commands

Interacting with Sourcery

  • Trigger a new review: Comment @sourcery-ai review on the pull request.
  • Continue discussions: Reply directly to Sourcery's review comments.
  • Generate a GitHub issue from a review comment: Ask Sourcery to create an
    issue from a review comment by replying to it. You can also reply to a
    review comment with @sourcery-ai issue to create an issue from it.
  • Generate a pull request title: Write @sourcery-ai anywhere in the pull
    request title to generate a title at any time. You can also comment
    @sourcery-ai title on the pull request to (re-)generate the title at any time.
  • Generate a pull request summary: Write @sourcery-ai summary anywhere in
    the pull request body to generate a PR summary at any time exactly where you
    want it. You can also comment @sourcery-ai summary on the pull request to
    (re-)generate the summary at any time.
  • Generate reviewer's guide: Comment @sourcery-ai guide on the pull
    request to (re-)generate the reviewer's guide at any time.
  • Resolve all Sourcery comments: Comment @sourcery-ai resolve on the
    pull request to resolve all Sourcery comments. Useful if you've already
    addressed all the comments and don't want to see them anymore.
  • Dismiss all Sourcery reviews: Comment @sourcery-ai dismiss on the pull
    request to dismiss all existing Sourcery reviews. Especially useful if you
    want to start fresh with a new review - don't forget to comment
    @sourcery-ai review to trigger a new review!
  • Generate a plan of action for an issue: Comment @sourcery-ai plan on
    an issue to generate a plan of action for it.

Customizing Your Experience

Access your dashboard to:

  • Enable or disable review features such as the Sourcery-generated pull request
    summary, the reviewer's guide, and others.
  • Change the review language.
  • Add, remove or edit custom review instructions.
  • Adjust other review settings.

Getting Help

Copy link

@sourcery-ai sourcery-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hey @slp - I've reviewed your changes - here's some feedback:

Overall Comments:

  • Consider adding a comment explaining why krun_set_workdir is considered dangerous.
  • It might be worth adding a check to ensure that the config file is actually setting the workdir.
Here's what I looked at during the review
  • 🟢 General issues: all looks good
  • 🟢 Security: all looks good
  • 🟢 Testing: all looks good
  • 🟢 Complexity: all looks good
  • 🟢 Documentation: all looks good

Sourcery is free for open source - if you like our reviews please consider sharing them ✨
Help me be more useful! Please click 👍 or 👎 on each comment and I'll use the feedback to improve your reviews.

Copy link
Member

@giuseppe giuseppe left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@rhatdan
Copy link
Member

rhatdan commented Apr 4, 2025

/lgtm

@slp
Copy link
Contributor Author

slp commented Apr 4, 2025

Side note, dangerous was probably a bit of an exaggeration on my part. In the crun-krun execution model, the guest's kernel is simply part of the untrusted workload, and it's not considered by any means a protection layer on top of the userspace component. In fact, we now allow users to provide their own kernels.

The protection is provided by the combination of HW Virtualization on top of the usual container-based protections (cgroups, namespaces, selinux, etc...).

@giuseppe giuseppe merged commit 5e48e2a into containers:main Apr 4, 2025
47 of 48 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Kernel arguments and environment variables can be set with WORKDIR when using krun

3 participants