The following pull request was submitted through Github.
It can be accessed and reviewed at: https://github.com/lxc/lxc/pull/3092

This e-mail was sent by the LXC bot, direct replies will not reach the author
unless they happen to be subscribed to this list.

=== Description (from pull-request) ===
Makes it easier to implement syscalls which need to write to
a buffer passed by user space as a pointer.

Signed-off-by: Wolfgang Bumiller <w.bumil...@proxmox.com>
From aad859c42c30dce269286503976d7cbab2142a62 Mon Sep 17 00:00:00 2001
From: Wolfgang Bumiller <w.bumil...@proxmox.com>
Date: Tue, 16 Jul 2019 11:22:50 +0200
Subject: [PATCH] seccomp: open memfd read-write

Makes it easier to implement syscalls which need to write to
a buffer passed by user space as a pointer.

Signed-off-by: Wolfgang Bumiller <w.bumil...@proxmox.com>
---
 src/lxc/seccomp.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/src/lxc/seccomp.c b/src/lxc/seccomp.c
index aa45b0cf60..00d533e0f9 100644
--- a/src/lxc/seccomp.c
+++ b/src/lxc/seccomp.c
@@ -1400,7 +1400,7 @@ int seccomp_notify_handler(int fd, uint32_t events, void 
*data,
        }
 
        snprintf(mem_path, sizeof(mem_path), "/proc/%d/mem", req->pid);
-       fd_mem = open(mem_path, O_RDONLY | O_CLOEXEC);
+       fd_mem = open(mem_path, O_RDWR | O_CLOEXEC);
        if (fd_mem < 0) {
                seccomp_notify_default_answer(fd, req, resp, hdlr);
                SYSERROR("Failed to open process memory for seccomp notify 
request");
_______________________________________________
lxc-devel mailing list
lxc-devel@lists.linuxcontainers.org
http://lists.linuxcontainers.org/listinfo/lxc-devel

Reply via email to