Passes through prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, address)
Bug #1726394 reported by
Julian Andres Klode
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
QEMU |
Fix Released
|
Undecided
|
Unassigned | ||
qemu (Debian) |
Fix Released
|
Unknown
|
|||
qemu (Ubuntu) |
Fix Released
|
Medium
|
Unassigned | ||
Xenial |
Won't Fix
|
Undecided
|
Unassigned | ||
Zesty |
Won't Fix
|
Undecided
|
Unassigned | ||
Artful |
Won't Fix
|
Undecided
|
Unassigned |
Bug Description
qemu-user passes through prctl(PR_
I guess you should just return EINVAL, but not sure. I'd really like something that can be identified, so seccomp errors can be ignored when it's not supported.
Changed in qemu (Ubuntu): | |
status: | Triaged → Fix Committed |
Changed in qemu (Debian): | |
status: | Unknown → Confirmed |
Changed in qemu (Debian): | |
status: | Confirmed → Fix Released |
To post a comment you must log in.
Returning EINVAL would make sense, as that's what a pre-seccomp kernel or a kernel built without seccomp support would do.