<feed xmlns='http://www.w3.org/2005/Atom'>
<title>apt/methods, branch 1.6_alpha2</title>
<subtitle>Debians commandline package manager</subtitle>
<id>https://git.kalnischkies.de/apt/atom?h=1.6_alpha2</id>
<link rel='self' href='https://git.kalnischkies.de/apt/atom?h=1.6_alpha2'/>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/'/>
<updated>2017-10-25T22:02:33Z</updated>
<entry>
<title>Print syscall number and arch to stderr when trapped by seccomp</title>
<updated>2017-10-25T22:02:33Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-10-25T21:16:09Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=39656a6f79e48f86d31c53a939481c07aceca352'/>
<id>urn:sha1:39656a6f79e48f86d31c53a939481c07aceca352</id>
<content type='text'>
This should help debugging crashes. The signal handler is a C++11
lambda, yay! Special care has been taken to only use signal handler
-safe functions inside there.
</content>
</entry>
<entry>
<title>Only warn about seccomp() EINVAL (normal) and EFAULT (qemu) errors</title>
<updated>2017-10-25T20:16:24Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-10-25T19:49:34Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=230b0570532bf2f419608b2043a9d6e02b9467e3'/>
<id>urn:sha1:230b0570532bf2f419608b2043a9d6e02b9467e3</id>
<content type='text'>
If seccomp is disabled, we fallback to running without it. Qemu fails
in the seccomp() call, returning ENOSYS and libseccomp falls back to
prctl() without adjusting the pointer, causing the EFAULT. I hope
qemu gets fixed at some point to return EINVAL for seccomp via
prctl.

Bug-Qemu: https://bugs.launchpad.net/qemu/+bug/1726394
</content>
</entry>
<entry>
<title>methods: Enable additional syscalls (SYSV IPC) in fakeroot</title>
<updated>2017-10-25T19:40:35Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-10-25T19:38:31Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=cf1a98baa58360a56f38cc3d5ce01905f6ebc8f4'/>
<id>urn:sha1:cf1a98baa58360a56f38cc3d5ce01905f6ebc8f4</id>
<content type='text'>
If FAKED_MODE is set, enable SYSV IPC so we don't crash when
running in fakeroot.

Closes: #879662
</content>
</entry>
<entry>
<title>CMake: methods: Cleanup link libraries, use OBJECT libraries</title>
<updated>2017-10-23T02:19:19Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-10-23T01:29:10Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=43b9eb5bac15666fdc0346aca7031fab0fa5e064'/>
<id>urn:sha1:43b9eb5bac15666fdc0346aca7031fab0fa5e064</id>
<content type='text'>
Use OBJECT libraries for http and connect stuff, and move the
seccomp link expression into a global link_libraries() call.

This also fixes a bug where only the http target pulled in
the gnutls header arguments despite gnutls being used in
connect.cc, and thus by mirror and ftp as well.

Adjust translation support to ignore TARGET_OBJECTS sources
and add the OBJECT libraries to the translated files.
</content>
</entry>
<entry>
<title>seccomp: Conditionalize statx() whitelisting</title>
<updated>2017-10-23T00:17:31Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-10-23T00:17:31Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=669b310a6676f2247165e492b673d2e5bcb06f89'/>
<id>urn:sha1:669b310a6676f2247165e492b673d2e5bcb06f89</id>
<content type='text'>
statx was introduced in 4.11, so it fails to build in stretch if
we just unconditionally use it.
</content>
</entry>
<entry>
<title>seccomp: Add missing syscalls for ppc64el, i386, and others</title>
<updated>2017-10-22T23:51:19Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-10-22T22:35:15Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=f5572ef1daf21d20f4a7d261884291c0acddd947'/>
<id>urn:sha1:f5572ef1daf21d20f4a7d261884291c0acddd947</id>
<content type='text'>
These are a few overlooked syscalls. Also add readv(), writev(),
renameat2(), and statx() in case libc uses them.

Gbp-Dch: ignore
</content>
</entry>
<entry>
<title>Sandbox methods with seccomp-BPF; except cdrom, gpgv, rsh</title>
<updated>2017-10-22T21:38:31Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-10-22T21:34:03Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=32bcbd73e0988d2d2237690ffae33b4f5cc5ff81'/>
<id>urn:sha1:32bcbd73e0988d2d2237690ffae33b4f5cc5ff81</id>
<content type='text'>
This reduces the number of syscalls to about 140 from about
350 or so, significantly reducing security risks.

Also change prepare-release to ignore the architecture lists
in the build dependencies when generating the build-depends
package for travis.

We might want to clean up things a bit more and/or move it
somewhere else.
</content>
</entry>
<entry>
<title>methods/basehttp.cc: Remove proxy autodetect debugging code</title>
<updated>2017-10-22T18:27:23Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-10-22T18:26:55Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=9130b5f9304b7f58273a826ff9acf04e10c6f98e'/>
<id>urn:sha1:9130b5f9304b7f58273a826ff9acf04e10c6f98e</id>
<content type='text'>
This was a left over from the autodetect move.

Gbp-Dch: ignore
</content>
</entry>
<entry>
<title>methods/mirror: Enable sandboxing and other aptMethod features</title>
<updated>2017-10-22T18:25:50Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-10-22T18:25:50Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=8616c21628c8bff9174a912ca5814e469d49e7cb'/>
<id>urn:sha1:8616c21628c8bff9174a912ca5814e469d49e7cb</id>
<content type='text'>
Sandboxing was turned off because we called pkgAcqMethod's
Configuration() instead of aptMethod's.
</content>
</entry>
<entry>
<title>Run Proxy-Auto-Detect script from main process</title>
<updated>2017-10-22T16:52:16Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2017-10-21T13:44:43Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=1a76517470ebc2dd3f96e39ebe6f3706d6dd78da'/>
<id>urn:sha1:1a76517470ebc2dd3f96e39ebe6f3706d6dd78da</id>
<content type='text'>
This avoids running the Proxy-Auto-Detect script inside the
untrusted (well, less trusted for now) sandbox. This will allow
us to restrict the http method from fork()ing or exec()ing via
seccomp.
</content>
</entry>
</feed>
