GNU bug report logs - #56359
seccomp test failures on RHEL 9.0

Previous Next

Package: emacs;

Reported by: Glenn Morris <rgm <at> gnu.org>

Date: Sat, 2 Jul 2022 17:46:02 UTC

Severity: minor

Found in versions 29.0.50, 28.2.50, 28.1.90

Full log


View this message in rfc822 format

From: Philipp Stephani <p.stephani2 <at> gmail.com>
To: Glenn Morris <rgm <at> gnu.org>
Cc: 56359 <at> debbugs.gnu.org
Subject: bug#56359: seccomp test failures on RHEL 9.0
Date: Sat, 16 Jul 2022 12:50:01 +0200

> Am 16.07.2022 um 01:35 schrieb Glenn Morris <rgm <at> gnu.org>:
> 
> Philipp Stephani wrote:
> 
>> Does the attached patch fix the issue?
> 
> Not entirely. I have to also allow "clone3", then it passes.

Hmm, I'm not sure we should allow clone3 unconditionally since it can do lots of things, and I'd expect that its capabilities will only grow over time. OTOH, BPF (or at least the libseccomp library) don't support pointer indirections which would be needed to inspect the structure fields. See https://lwn.net/Articles/822256/.
Any opinions?



This bug report was last modified 2 years and 16 days ago.

Previous Next


GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.