seccomp-bpf missing on ARM in precise
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Triaged
|
Medium
|
Unassigned | ||
Precise |
Fix Released
|
Medium
|
Unassigned |
Bug Description
While seccomp-bpf was backported into precise, it was only for x86. Now that the ARM support is upstream too, it would be great to have the same level of support on ARM in the LTS kernel.
I'll prepare patches.
[Impact]
ARM devices lack seccomp-bpf protections when running seccomp-aware applications (e.g. Chrome)
[Test Case]
git clone https:/
cd seccomp/tests
make
./seccomp_bpf_tests
All tests should pass
[Regression Potential]
Low: ARM currently has no seccomp-bpf support, so this is very unlikely to cause regressions. The changes that are common between x86 and ARM bring Precise closer to upstream seccomp-bpf, so this is similarly unlike to cause regressions (as this code is more correct than what is currently in Precise). Changes have been minimized, and tested.
Changed in linux (Ubuntu): | |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Precise): | |
importance: | Undecided → Medium |
tags: | added: kernel-da-key kernel-stable-key |
tags: | added: bot-stop-nagging |
Changed in linux (Ubuntu): | |
status: | Incomplete → Triaged |
Changed in linux (Ubuntu Precise): | |
status: | Incomplete → Triaged |
description: | updated |
tags: | removed: bot-stop-nagging |
This bug is missing log files that will aid in diagnosing the problem. From a terminal window please run:
apport-collect 1183616
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.
This change has been made by an automated script, maintained by the Ubuntu Kernel Team.