-
Notifications
You must be signed in to change notification settings - Fork 171
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
BUG: add support for the faccessat2() syscall #314
Comments
Hi @trofi, what version of libseccomp are you using? I ask because the Here is a the definition in the v2.5.0 release tag (HINT: the syscalls.csv file is searchable in GitHub): |
Oh, interesting. I'm using release
Could it be that release tarball (and git tree) contains pregenerated list of syscalls from that file that was not updated after csv change? |
Good find. Looks like we're missing the appropriate #defines for |
Ha, yes, it looks like you guys are right! I went ahead and added this to the v2.5.2 milestone so it should be in the next v2.5.x maintenance release. I also created issue #315 to have the |
Tumbleweed uses glibc 2.33, which introduced incompatibility (uses faccessat2) [1], which requires libseccomp v2.5.0. The newest Ubuntu in Travis (actually any Ubuntu) has 2.4.3, thus temporarily remove openSUSE Tumbleweed. [1] seccomp/libseccomp#314 Signed-off-by: Petr Vorel <pvorel@suse.cz>
Tumbleweed uses glibc 2.33, which introduced incompatibility (uses faccessat2) [1], which requires libseccomp v2.5.0. The newest Ubuntu in Travis (actually any Ubuntu) has 2.4.3, thus temporarily remove openSUSE Tumbleweed. [1] seccomp/libseccomp#314 Signed-off-by: Petr Vorel <pvorel@suse.cz>
Tumbleweed uses glibc 2.33, which introduced incompatibility (uses faccessat2) [1], which requires libseccomp v2.5.0. The newest Ubuntu in Travis (actually any Ubuntu) has 2.4.3, thus temporarily remove openSUSE Tumbleweed. [1] seccomp/libseccomp#314 Signed-off-by: Petr Vorel <pvorel@suse.cz>
This should be resolve with PR #322 so I'm going to close this out; the fix will be in the next v2.5.x release. |
In
pax-utils
(libseccomp user) we recently discovered thatglibc-2.33
started usingfaccessat2
syscall: https://bugs.gentoo.org/768435Would it be reasonable to add it to list of known syscalls it
seccomp-syscalls.h
?Thanks!
The text was updated successfully, but these errors were encountered: