Skip to content

droidspaces: bump version 5.6.0#14

Merged
ravindu644 merged 10 commits intomainfrom
test-docker
Mar 12, 2026
Merged

droidspaces: bump version 5.6.0#14
ravindu644 merged 10 commits intomainfrom
test-docker

Conversation

@ravindu644
Copy link
Owner

No description provided.

…t kernel deadlocks on legacy Android kernels
Enabled Droidspaces to respect the user's preferred login shell by
manually parsing /etc/passwd within the container's mount namespace.

Detailed Changes:
- Added get_user_shell() helper in utils.c to reliably extract the
  default shell (seventh field) from /etc/passwd for a specific user.
- Updated enter_rootfs() in container.c to prioritize the detected
  shell, ensuring that changes made via `chsh` inside the container
  now persist.
- Maintained a hardcoded /bin/bash|ash|sh priority list as a robust
  fallback for cases where /etc/passwd is missing or the preferred
  shell is not executable.

Fixes the issue where users were forced back into bash/ash on every
re-entry regardless of their shell configuration.

Signed-off-by: ravindu644 <droidcasts@protonmail.com>
…sking

Harden the container runtime by dropping dangerous capabilities and
masking sensitive kernel interfaces in /proc and /sys.

- Implement ds_apply_capability_hardening() with a tiered model:
    - Universally drop CAP_SYS_MODULE and CAP_SYS_BOOT in all modes.
    - In standard mode, drop RAWIO, PTRACE, PACCT, MAC_*, and power caps.
    - Hardware mode preserves most caps for low-level device interaction.
- Implement ds_apply_jail_mask() for filesystem-level isolation:
    - Always mask /proc/sysrq-trigger, /proc/kcore, and debug interfaces.
    - Universally remount /proc/sys/kernel/sysrq as read-only.
    - Standard mode applies strict masks to /proc/asound, /sys/firmware, etc.
- Add robust error checking for prctl() calls and dynamic drop logging.
- Ensure the hardening occurs late in the boot sequence to avoid breaking
  unshare and namespace setup.

Signed-off-by: ravindu644 <droidcasts@protonmail.com>
…er_rootfs() and run_in_rootfs()

Signed-off-by: ravindu644 <droidcasts@protonmail.com>
…smatches and blocking x32 ABI syscalls on x86-64.
Signed-off-by: ravindu644 <droidcasts@protonmail.com>
@ravindu644 ravindu644 merged commit 5ce53e9 into main Mar 12, 2026
1 check passed
@ravindu644 ravindu644 deleted the test-docker branch March 14, 2026 15:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant