Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Don't silently succeed seccomp setup when !HAVE_SECCOMP. #1882

Merged
merged 1 commit into from Feb 19, 2018

Conversation

shlevy
Copy link
Member

@shlevy shlevy commented Feb 19, 2018

Running Nix with build users without seccomp on Linux is dangerous,
and administrators should very explicitly opt-in to it.

Running Nix with build users without seccomp on Linux is dangerous,
and administrators should very explicitly opt-in to it.
@shlevy shlevy requested a review from edolstra February 19, 2018 14:58
shlevy referenced this pull request Feb 19, 2018
This is needed for new arches where libseccomp support doesn't exist
yet.

Fixes #1878.
@edolstra edolstra merged commit 623fcb0 into NixOS:master Feb 19, 2018
@shlevy shlevy deleted the no-seccomp-no-filterSyscalls branch February 19, 2018 16:57
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants