[lxc-devel] [lxc/lxc] d648e1: seccomp: cleanup compat architecture handling

GitHub noreply at github.com
Wed Apr 18 16:35:13 UTC 2018


  Branch: refs/heads/master
  Home:   https://github.com/lxc/lxc
  Commit: d648e178f1b3fa9f261b890157d2ee6e9e5e14fa
      https://github.com/lxc/lxc/commit/d648e178f1b3fa9f261b890157d2ee6e9e5e14fa
  Author: Christian Brauner <christian.brauner at ubuntu.com>
  Date:   2018-04-15 (Sun, 15 Apr 2018)

  Changed paths:
    M src/lxc/seccomp.c

  Log Message:
  -----------
  seccomp: cleanup compat architecture handling

Signed-off-by: Christian Brauner <christian.brauner at ubuntu.com>


  Commit: 94d56054143a8634852989819acee06bf4aaf9f9
      https://github.com/lxc/lxc/commit/94d56054143a8634852989819acee06bf4aaf9f9
  Author: Christian Brauner <christian.brauner at ubuntu.com>
  Date:   2018-04-15 (Sun, 15 Apr 2018)

  Changed paths:
    M src/lxc/seccomp.c

  Log Message:
  -----------
  seccomp: improve logging

Signed-off-by: Christian Brauner <christian.brauner at ubuntu.com>


  Commit: 4160ef02e5bbabbf4f3d0ab002aa8afba4f680a1
      https://github.com/lxc/lxc/commit/4160ef02e5bbabbf4f3d0ab002aa8afba4f680a1
  Author: Christian Brauner <christian.brauner at ubuntu.com>
  Date:   2018-04-15 (Sun, 15 Apr 2018)

  Changed paths:
    M doc/lxc-execute.sgml.in
    M src/lxc/tools/lxc_execute.c

  Log Message:
  -----------
  tools: document -d/--daemonize for lxc-execute

Closes #2280.

Signed-off-by: Christian Brauner <christian.brauner at ubuntu.com>


  Commit: 7e84441ec3f973609bc2462528d55888ab1a084f
      https://github.com/lxc/lxc/commit/7e84441ec3f973609bc2462528d55888ab1a084f
  Author: Christian Brauner <christian.brauner at ubuntu.com>
  Date:   2018-04-18 (Wed, 18 Apr 2018)

  Changed paths:
    M src/lxc/seccomp.c
    M src/tests/api_reboot.c

  Log Message:
  -----------
  seccomp: non-functional changes

Rename "compat_ctx" to "contexts" and "compat_arch" to "architectures".

Signed-off-by: Christian Brauner <christian.brauner at ubuntu.com>


  Commit: eca6736eb019f33a6243fc20a61c658da0662827
      https://github.com/lxc/lxc/commit/eca6736eb019f33a6243fc20a61c658da0662827
  Author: Christian Brauner <christian.brauner at ubuntu.com>
  Date:   2018-04-18 (Wed, 18 Apr 2018)

  Changed paths:
    M src/lxc/seccomp.c

  Log Message:
  -----------
  seccomp: handle arch inversion II

LXC generates and loads the seccomp-bpf filter in the host/container which
spawn the new container. In other words, userspace N is responsible for
generating and loading the seccomp-bpf filter which restricts userspace N + 1.
Assume 64bit kernel and 32bit userspace running a 64bit container. In this case
the 32-bit x86 userspace is used to create a seccomp-bpf filter for a 64-bit
userspace. Unless one explicitly adds the 64-bit ABI to the libseccomp filter,
or adjusts the default behavior for "BAD_ARCH", *all* 64-bit x86 syscalls will
be blocked.

Signed-off-by: Christian Brauner <christian.brauner at ubuntu.com>
Suggested-by: Paul Moore <paul at paul-moore.com>


  Commit: a5fb69a3f14b49cceb509504a9a3dc3d5389409a
      https://github.com/lxc/lxc/commit/a5fb69a3f14b49cceb509504a9a3dc3d5389409a
  Author: Serge Hallyn <serge at hallyn.com>
  Date:   2018-04-18 (Wed, 18 Apr 2018)

  Changed paths:
    M doc/lxc-execute.sgml.in
    M src/lxc/seccomp.c
    M src/lxc/tools/lxc_execute.c
    M src/tests/api_reboot.c

  Log Message:
  -----------
  Merge pull request #2281 from brauner/2018-04-15/seccomp_fixes

seccomp: handle arch inversion - The Architecture Strikes Back


Compare: https://github.com/lxc/lxc/compare/a55e2ad107f0...a5fb69a3f14b


More information about the lxc-devel mailing list