From 5ce43972812e4d9473d5acfd1d12e52cb9778b2c Mon Sep 17 00:00:00 2001 From: James Hogan Date: Fri, 8 Apr 2016 14:16:34 +0100 Subject: [PATCH 1/3] configure: Enable seccomp sandbox for MIPS Enable seccomp on MIPS since libseccomp version 2.2.0 when MIPS support was first added. Signed-off-by: James Hogan Reviewed-by: Andrew Jones Acked-by: Eduardo Otubo --- configure | 3 +++ 1 file changed, 3 insertions(+) diff --git a/configure b/configure index 5db29f0245..f1c307bfc6 100755 --- a/configure +++ b/configure @@ -1872,6 +1872,9 @@ if test "$seccomp" != "no" ; then i386|x86_64) libseccomp_minver="2.1.0" ;; + mips) + libseccomp_minver="2.2.0" + ;; arm|aarch64) libseccomp_minver="2.2.3" ;; From 81bed73b5395c4c17dee6efebd44dd34b8f40d99 Mon Sep 17 00:00:00 2001 From: James Hogan Date: Fri, 8 Apr 2016 14:16:33 +0100 Subject: [PATCH 2/3] seccomp: Whitelist cacheflush since 2.2.0 not 2.2.3 The cacheflush system call (found on MIPS and ARM) has been included in the libseccomp header since 2.2.0, so include it back to that version. Previously it was only enabled since 2.2.3 since that is when it was enabled properly for ARM. This will allow seccomp support to be enabled for MIPS back to libseccomp 2.2.0. Signed-off-by: James Hogan Reviewed-By: Andrew Jones Acked-by: Eduardo Otubo --- qemu-seccomp.c | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/qemu-seccomp.c b/qemu-seccomp.c index 2866e3c2a6..138ee022a8 100644 --- a/qemu-seccomp.c +++ b/qemu-seccomp.c @@ -16,11 +16,13 @@ #include #include "sysemu/seccomp.h" +/* For some architectures (notably ARM) cacheflush is not supported until + * libseccomp 2.2.3, but configure enforces that we are using a more recent + * version on those hosts, so it is OK for this check to be less strict. + */ #if SCMP_VER_MAJOR >= 3 #define HAVE_CACHEFLUSH -#elif SCMP_VER_MAJOR == 2 && SCMP_VER_MINOR >= 3 - #define HAVE_CACHEFLUSH -#elif SCMP_VER_MAJOR == 2 && SCMP_VER_MINOR == 2 && SCMP_VER_MICRO >= 3 +#elif SCMP_VER_MAJOR == 2 && SCMP_VER_MINOR >= 2 #define HAVE_CACHEFLUSH #endif From 8e08f8a4a7f613af65b29fcc3ac3bfc2a08a3343 Mon Sep 17 00:00:00 2001 From: Miroslav Rezanina Date: Mon, 7 Mar 2016 10:34:46 +0100 Subject: [PATCH 3/3] seccomp: adding sysinfo system call to whitelist Newer version of nss-softokn libraries (> 3.16.2.3) use sysinfo call so qemu using rbd image hang after start when run in sandbox mode. To allow using rbd images in sandbox mode we have to whitelist it. Signed-off-by: Miroslav Rezanina Acked-by: Eduardo Otubo --- qemu-seccomp.c | 1 + 1 file changed, 1 insertion(+) diff --git a/qemu-seccomp.c b/qemu-seccomp.c index 138ee022a8..cb569dc058 100644 --- a/qemu-seccomp.c +++ b/qemu-seccomp.c @@ -252,6 +252,7 @@ static const struct QemuSeccompSyscall seccomp_whitelist[] = { #ifdef HAVE_CACHEFLUSH { SCMP_SYS(cacheflush), 240 }, #endif + { SCMP_SYS(sysinfo), 240 }, }; int seccomp_start(void)