/** # Copyright (c) 2025, NVIDIA CORPORATION. All rights reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. **/ package ldcache import ( "fmt" "os" "strconv" "syscall" "github.com/opencontainers/runc/libcontainer/dmz" ) // SafeExec attempts to clone the specified binary (as an memfd, for example) before executing it. func (m command) SafeExec(path string, args []string, envv []string) error { safeExe, err := cloneBinary(path) if err != nil { m.logger.Warningf("Failed to clone binary %q: %v; falling back to Exec", path, err) //nolint:gosec // TODO: Can we harden this so that there is less risk of command injection return syscall.Exec(path, args, envv) } defer safeExe.Close() exePath := "/proc/self/fd/" + strconv.Itoa(int(safeExe.Fd())) //nolint:gosec // TODO: Can we harden this so that there is less risk of command injection return syscall.Exec(exePath, args, envv) } func cloneBinary(path string) (*os.File, error) { exe, err := os.Open(path) if err != nil { return nil, fmt.Errorf("opening current binary: %w", err) } defer exe.Close() stat, err := exe.Stat() if err != nil { return nil, fmt.Errorf("checking %v size: %w", path, err) } size := stat.Size() return dmz.CloneBinary(exe, size, path, os.TempDir()) }