On 8 July 2014 13:51, Christoph Hellwig wrote:
> Yeah, it won't work for an explicit directory - I was thinking of
> working relative to $CWD.
I think that would sacrifice far too much flexibility. Even without
Capsicum, it would be worthwhile to be able to wire up a static
seccomp-bpf filter to
On 8 July 2014 13:07, Christoph Hellwig wrote:
> There's two different AT_* namespaces. The flags that most *at syscalls
> has, and the the one for the dfd argument, which currently only contains
> AT_FDCWD, although a new constant has recently been proposed to it.
>
> Having an AT_BENEATH magic
On Sun, Jan 6, 2013 at 4:31 PM, Al Viro wrote:
>
> OK, now that sys_execve() unification has settled down, let's get back
> to this one. The real problem is what you are doing with bprm->filename
> and bprm->interp; blind use of ->d_name is completely wrong.
ACK. I've blocked out tomorrow to dive
s patch.
Signed-off-by: Meredydd Luff
---
arch/alpha/kernel/binfmt_loader.c |2 +-
arch/x86/ia32/ia32entry.S |3 +-
arch/x86/kernel/entry_64.S| 14 +
arch/x86/syscalls/syscall_32.tbl |1 +
arch/x86/syscalls/syscall_64.tbl |1 +
arch/x86/um/sys_call_table
On Thu, Aug 2, 2012 at 11:30 AM, Al Viro wrote:
> FWIW, I've just pushed (completely untested) arm and alpha
> parts of what I described into signal.git#execve2; x86 is
> next. Note that after that sys_execve() is identical on
> converted architectures and can be merged; ditto for
> kernel_execve
On Thu, Aug 2, 2012 at 7:55 AM, Al Viro wrote:
>> This means you need an x32 version of the function -- execve
>> unfortunately is one of the few system calls which require a special x32
>> version (although it's a simple wrapper around sys32_execve). See
>> sys_x32_execve.
>
> I *really* strongl
On Wed, Aug 1, 2012 at 11:53 PM, H. Peter Anvin wrote:
> On 08/01/2012 03:10 PM, Meredydd Luff wrote:
>> diff --git a/arch/x86/syscalls/syscall_64.tbl
>> b/arch/x86/syscalls/syscall_64.tbl
>> index 51171ae..c35df9e 100644
>> --- a/arch/x86/syscalls/syscall_64.tbl
Submitting this as a separate patch per rich...@nod.at's suggestion.
Signed-off-by: Meredydd Luff
---
arch/um/kernel/exec.c |3 ++-
1 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/arch/um/kernel/exec.c b/arch/um/kernel/exec.c
index 6cade93..e74ec80 100644
--- a/arch/um/k
e Linux
is also supported.
Signed-off-by: Meredydd Luff
---
arch/alpha/kernel/binfmt_loader.c |2 +-
arch/um/kernel/exec.c | 36
arch/x86/ia32/ia32entry.S |1 +
arch/x86/ia32/sys_ia32.c | 20 +++
arch/x86/include/asm/sys_ia32.h |
libc v2.16 it's a gross hack that depends on /proc being mounted.
That hack does not work in chrooted sandboxes, or stripped-down
systems without /proc mounted. execveat() does.
Only x86-64 and i386 ABIs are supported in this patch. User-Mode Linux
is also supported.
Signed-off-by
10 matches
Mail list logo