canonical-ubuntu-qa team mailing list archive
-
canonical-ubuntu-qa team
-
Mailing list archive
-
Message #01750
[Bug 2040484] Re: ubuntu_seccomp pseudo-syscall fails on s390
The test generates a BPF with libseccomp API then runs a BPF simulator.
The libseccomp commit 51c46f80c1edee863bbc4eb21b03decc44e69a45 ("all:
block negative syscall numbers from the filter") seems to indicate this
is fixing and testing problems on the filter (which I read as BPF
filter), so this is unlikely a kernel problem.
However, it might be uncovering a libseccomp bug on s390.
Cascardo.
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Canonical
Platform QA Team, which is subscribed to ubuntu-kernel-tests.
https://bugs.launchpad.net/bugs/2040484
Title:
ubuntu_seccomp pseudo-syscall fails on s390
Status in ubuntu-kernel-tests:
New
Bug description:
libseccomp upstream has changed the test code for 29-sim-
pseudo_syscall.c, which has broken it for s390. Perhaps s390 has been
broken since forever and the test change is just uncovering it. We
need to investigate if the fix would be needed in the test, libseccomp
or the kernel. This seems to affect at least 4.4 and 5.4 kernels, but
may affect everything.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/2040484/+subscriptions
References