The Eoan Ermine has reached end of life, so this bug will not be fixed
for that release
** Changed in: libseccomp (Ubuntu Eoan)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libseccomp in Ubuntu.
https://bugs.launchpad.net/bugs/1875092
Title:
support v5.4 syscalls
Status in libseccomp package in Ubuntu:
Fix Released
Status in libseccomp source package in Xenial:
New
Status in libseccomp source package in Bionic:
New
Status in libseccomp source package in Eoan:
Won't Fix
Bug description:
[Impact]
* update libssecomp syscalls, for example current seccomp on xenial
and up, cannot correctly filter calls for focal armhf chroots on v5.4
kernels, due to new syscalls usage.
[Test Case]
* Boot v5.4 kernel
* Use seccomp to try to resolve new syscall numbers
* Rebuild snapd snap against bileto ppa with this change
* Test that this rebuild snapd snap, can correctly launch confined python
armhf interpreter on arm64 v5.4 kernel (i.e. uc20 raspi arm64 beta image)
[Regression Potential]
* The issue only impacts when one is running on a newer / hwe kernel,
and tries to seccomp filter newer binaries that use new syscalls. No
changes are made to any existing syscalls or apis.
[Other Info]
* Bileto PPA with this change is being prepared with this change.
xenial: https://bileto.ubuntu.com/#/ticket/4041
bionic: https://bileto.ubuntu.com/#/ticket/4040
eoan: https://bileto.ubuntu.com/#/ticket/4039
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libseccomp/+bug/1875092/+subscriptions
--
Mailing list: https://launchpad.net/~touch-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~touch-packages
More help : https://help.launchpad.net/ListHelp