Public bug reported:

As the seccomp manpage points out, after seeing a SECCOMP_RET_TRACE, a
tracer can set nr to -1 to skip the syscall. Similarly, one task could
be debugging another seccomp'd task, simply doing PTRACE_SYSCALL without
using SECCOMP_PTRACE, and want to make the tracee skip a syscall by
setting nr to -1.

However, the way libseccomp checks for X86_SYSCALL_BIT wrongly catches
nr == -1. This kills any application using -1 to skip a syscall.  This
means that any such application running under lxd, which uses libseccomp
to set its seccomp policies, fails.

libseccomp upstream has been fixed, see
https://github.com/seccomp/libseccomp/issues/80 .  Ideally this fix
would be cherrypicked into both artful and xenial.

** Affects: libseccomp (Ubuntu)
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1695808

Title:
  tasks killed for nop (-1)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libseccomp/+bug/1695808/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to