Re: [PATCH 01/11] fs: add O_BENEATH_ONLY flag to openat(2)

2014-07-08 Thread Meredydd Luff
On 8 July 2014 13:51, Christoph Hellwig wrote: > Yeah, it won't work for an explicit directory - I was thinking of > working relative to $CWD. I think that would sacrifice far too much flexibility. Even without Capsicum, it would be worthwhile to be able to wire up a static seccomp-bpf filter to

Re: [PATCH 01/11] fs: add O_BENEATH_ONLY flag to openat(2)

2014-07-08 Thread Meredydd Luff
On 8 July 2014 13:07, Christoph Hellwig wrote: > There's two different AT_* namespaces. The flags that most *at syscalls > has, and the the one for the dfd argument, which currently only contains > AT_FDCWD, although a new constant has recently been proposed to it. > > Having an AT_BENEATH magic

Re: [PATCH signal#execve2] syscalls,x86: Add execveat() system call (v3)

2013-01-08 Thread Meredydd Luff
On Sun, Jan 6, 2013 at 4:31 PM, Al Viro wrote: > > OK, now that sys_execve() unification has settled down, let's get back > to this one. The real problem is what you are doing with bprm->filename > and bprm->interp; blind use of ->d_name is completely wrong. ACK. I've blocked out tomorrow to dive

[PATCH signal#execve2] syscalls,x86: Add execveat() system call (v3)

2012-09-11 Thread Meredydd Luff
s patch. Signed-off-by: Meredydd Luff --- arch/alpha/kernel/binfmt_loader.c |2 +- arch/x86/ia32/ia32entry.S |3 +- arch/x86/kernel/entry_64.S| 14 + arch/x86/syscalls/syscall_32.tbl |1 + arch/x86/syscalls/syscall_64.tbl |1 + arch/x86/um/sys_call_table

Re: [PATCH] [RFC] syscalls,x86: Add execveat() system call (v2)

2012-08-02 Thread Meredydd Luff
On Thu, Aug 2, 2012 at 11:30 AM, Al Viro wrote: > FWIW, I've just pushed (completely untested) arm and alpha > parts of what I described into signal.git#execve2; x86 is > next. Note that after that sys_execve() is identical on > converted architectures and can be merged; ditto for > kernel_execve

Re: [PATCH] [RFC] syscalls,x86: Add execveat() system call (v2)

2012-08-02 Thread Meredydd Luff
On Thu, Aug 2, 2012 at 7:55 AM, Al Viro wrote: >> This means you need an x32 version of the function -- execve >> unfortunately is one of the few system calls which require a special x32 >> version (although it's a simple wrapper around sys32_execve). See >> sys_x32_execve. > > I *really* strongl

Re: [PATCH] [RFC] syscalls,x86: Add execveat() system call (v2)

2012-08-01 Thread Meredydd Luff
On Wed, Aug 1, 2012 at 11:53 PM, H. Peter Anvin wrote: > On 08/01/2012 03:10 PM, Meredydd Luff wrote: >> diff --git a/arch/x86/syscalls/syscall_64.tbl >> b/arch/x86/syscalls/syscall_64.tbl >> index 51171ae..c35df9e 100644 >> --- a/arch/x86/syscalls/syscall_64.tbl

[PATCH] um: Coding style fix in sys_execve()

2012-08-01 Thread Meredydd Luff
Submitting this as a separate patch per rich...@nod.at's suggestion. Signed-off-by: Meredydd Luff --- arch/um/kernel/exec.c |3 ++- 1 files changed, 2 insertions(+), 1 deletions(-) diff --git a/arch/um/kernel/exec.c b/arch/um/kernel/exec.c index 6cade93..e74ec80 100644 --- a/arch/um/k

[PATCH] [RFC] syscalls,x86: Add execveat() system call (v2)

2012-08-01 Thread Meredydd Luff
e Linux is also supported. Signed-off-by: Meredydd Luff --- arch/alpha/kernel/binfmt_loader.c |2 +- arch/um/kernel/exec.c | 36 arch/x86/ia32/ia32entry.S |1 + arch/x86/ia32/sys_ia32.c | 20 +++ arch/x86/include/asm/sys_ia32.h |

[PATCH] [RFC] syscalls,x86: Add execveat() system call

2012-08-01 Thread Meredydd Luff
libc v2.16 it's a gross hack that depends on /proc being mounted. That hack does not work in chrooted sandboxes, or stripped-down systems without /proc mounted. execveat() does. Only x86-64 and i386 ABIs are supported in this patch. User-Mode Linux is also supported. Signed-off-by