[meta-virtualization] [PATCH] lxc: Update support for seccomp on PPC architectures
Bogdan Purcareata
bogdan.purcareata at freescale.com
Mon Mar 16 04:17:03 PDT 2015
Update the LXC recipe with the upstream-applied version of the patch.
Signed-off-by: Bogdan Purcareata <bogdan.purcareata at freescale.com>
---
.../files/ppc-add-seccomp-support-for-lxc.patch | 29 +++++++++++++++-------
1 file changed, 20 insertions(+), 9 deletions(-)
diff --git a/recipes-containers/lxc/files/ppc-add-seccomp-support-for-lxc.patch b/recipes-containers/lxc/files/ppc-add-seccomp-support-for-lxc.patch
index 6faf791..1055539 100644
--- a/recipes-containers/lxc/files/ppc-add-seccomp-support-for-lxc.patch
+++ b/recipes-containers/lxc/files/ppc-add-seccomp-support-for-lxc.patch
@@ -1,6 +1,6 @@
-From 29ca2ec418cb496ac8a19f0718a8474a55cfe16d Mon Sep 17 00:00:00 2001
+From b4067426d58aec9b6cad7a4739793f3d90c5f189 Mon Sep 17 00:00:00 2001
From: Bogdan Purcareata <bogdan.purcareata at freescale.com>
-Date: Wed, 4 Feb 2015 11:28:32 +0000
+Date: Thu, 12 Mar 2015 08:57:47 +0000
Subject: [PATCH] seccomp: add ppc support
This patch enables seccomp support for LXC containers running on PowerPC
@@ -13,16 +13,21 @@ default seccomp policy example files delivered with the LXC package.
[1] https://github.com/seccomp/libseccomp/commits/working-ppc64
-Upstream-Status: Pending
-[https://lists.linuxcontainers.org/pipermail/lxc-devel/2015-March/011437.html]
+v2:
+- add #ifdefs in get_new_ctx to fix builds on systems not having SCMP_ARCH_PPC*
+ defined
+
+Upstream-Status: Applied
+[https://github.com/lxc/lxc/commit/b4067426d58aec9b6cad7a4739793f3d90c5f189]
Signed-off-by: Bogdan Purcareata <bogdan.purcareata at freescale.com>
+Acked-by: Serge E. Hallyn <serge.hallyn at ubuntu.com>
---
- src/lxc/seccomp.c | 42 ++++++++++++++++++++++++++++++++++++++++++
- 1 file changed, 42 insertions(+)
+ src/lxc/seccomp.c | 48 ++++++++++++++++++++++++++++++++++++++++++++++++
+ 1 file changed, 48 insertions(+)
diff --git a/src/lxc/seccomp.c b/src/lxc/seccomp.c
-index 3ba6c9a..0e2310f 100644
+index 3ba6c9a..108faa0 100644
--- a/src/lxc/seccomp.c
+++ b/src/lxc/seccomp.c
@@ -121,6 +121,9 @@ enum lxc_hostarch_t {
@@ -48,17 +53,23 @@ index 3ba6c9a..0e2310f 100644
return lxc_seccomp_arch_unknown;
}
-@@ -150,6 +159,9 @@ scmp_filter_ctx get_new_ctx(enum lxc_hostarch_t n_arch, uint32_t default_policy_
+@@ -150,6 +159,15 @@ scmp_filter_ctx get_new_ctx(enum lxc_hostarch_t n_arch, uint32_t default_policy_
case lxc_seccomp_arch_i386: arch = SCMP_ARCH_X86; break;
case lxc_seccomp_arch_amd64: arch = SCMP_ARCH_X86_64; break;
case lxc_seccomp_arch_arm: arch = SCMP_ARCH_ARM; break;
++#ifdef SCMP_ARCH_PPC64LE
+ case lxc_seccomp_arch_ppc64le: arch = SCMP_ARCH_PPC64LE; break;
++#endif
++#ifdef SCMP_ARCH_PPC64
+ case lxc_seccomp_arch_ppc64: arch = SCMP_ARCH_PPC64; break;
++#endif
++#ifdef SCMP_ARCH_PPC
+ case lxc_seccomp_arch_ppc: arch = SCMP_ARCH_PPC; break;
++#endif
default: return NULL;
}
-@@ -343,6 +355,36 @@ static int parse_config_v2(FILE *f, char *line, struct lxc_conf *conf)
+@@ -343,6 +361,36 @@ static int parse_config_v2(FILE *f, char *line, struct lxc_conf *conf)
cur_rule_arch = lxc_seccomp_arch_arm;
}
#endif
--
2.1.4
More information about the meta-virtualization
mailing list