[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Qemu-devel] [PULL 04/04] Add syscalls for -runas and -chroot to the sec
From: |
Eduardo Otubo |
Subject: |
[Qemu-devel] [PULL 04/04] Add syscalls for -runas and -chroot to the seccomp sandbox |
Date: |
Wed, 14 Oct 2015 11:38:26 +0200 |
From: Namsun Ch'o <address@hidden>
The seccomp sandbox doesn't whitelist setuid, setgid, or setgroups, which are
needed for -runas to work. It also doesn't whitelist chroot, which is needed
for the -chroot option. Unfortunately, QEMU enables seccomp before it drops
privileges or chroots, so without these whitelisted, -runas and -chroot cause
QEMU to be killed with -sandbox on. This patch adds those syscalls.
Signed-off-by: Namsun Ch'o <address@hidden>
Acked-by: Eduardo Otubo <address@hidden>
---
qemu-seccomp.c | 7 ++++++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/qemu-seccomp.c b/qemu-seccomp.c
index a54d358..429b208 100644
--- a/qemu-seccomp.c
+++ b/qemu-seccomp.c
@@ -237,7 +237,12 @@ static const struct QemuSeccompSyscall seccomp_whitelist[]
= {
{ SCMP_SYS(inotify_init1), 240 },
{ SCMP_SYS(inotify_add_watch), 240 },
{ SCMP_SYS(mbind), 240 },
- { SCMP_SYS(cacheflush), 240 }
+ { SCMP_SYS(cacheflush), 240 },
+ { SCMP_SYS(mbind), 240 },
+ { SCMP_SYS(setuid), 240 },
+ { SCMP_SYS(setgid), 240 },
+ { SCMP_SYS(chroot), 240 },
+ { SCMP_SYS(setgroups), 240 }
};
int seccomp_start(void)
--
2.1.4
- [Qemu-devel] [PULL 00/04] seccomp branch queue, Eduardo Otubo, 2015/10/14
- [Qemu-devel] [PULL 00/04] seccomp branch queue, Eduardo Otubo, 2015/10/15
- [Qemu-devel] [PULL 01/04] libseccomp: add cacheflush to whitelist, Eduardo Otubo, 2015/10/15
- [Qemu-devel] [PULL 02/04] configure: arm/aarch64: allow enable-seccomp, Eduardo Otubo, 2015/10/15
- [Qemu-devel] [PULL 03/04] Add argument filters to the seccomp sandbox, Eduardo Otubo, 2015/10/15
- [Qemu-devel] [PULL 04/04] Add syscalls for -runas and -chroot to the seccomp sandbox, Eduardo Otubo, 2015/10/15
- Re: [Qemu-devel] [PULL 00/04] seccomp branch queue, Peter Maydell, 2015/10/16