Bug 1800495
| Summary: | Missing valgrind seccomp support causes qemu guest failed to boot up with “-sandbox=on” | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Yiqian Wei <yiwei> |
| Component: | valgrind | Assignee: | Mark Wielaard <mjw> |
| valgrind sub component: | system-version | QA Contact: | qe-baseos-tools-bugs |
| Status: | CLOSED CANTFIX | Docs Contact: | |
| Severity: | low | ||
| Priority: | low | CC: | chayang, coli, ehabkost, fweimer, jakub, jinzhao, juzhang, ohudlick, virt-maint, xfu, yiwei |
| Version: | --- | Keywords: | FutureFeature, Triaged |
| Target Milestone: | rc | Flags: | pm-rhel:
mirror+
|
| Target Release: | 8.0 | ||
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2020-02-19 10:01:18 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Yiqian Wei
2020-02-07 09:32:09 UTC
1. didn't reproduce it only with "sandbox=on/off" 2. it's not a regression issue since can reproduce it on "qemu-kvm-4.1.0-23.module+el8.1.1+5467+ba2d821b.x86_64" version The unhandled syscall is coming from valgrind and 317 is seccomp. QEMU probes to see if it has seccomp and fails, so doesn't add the sandbox options which is why we get the error: 'qemu-kvm: -sandbox on: There is no option group 'sandbox'' so from QEMU's point of view this is just missing sandbox support. So it looks like Valgrind is missing seccomp support. I see an upstream valgrind bug; https://bugs.kde.org/show_bug.cgi?id=380183 But really this is a feature request for it. I'll flip this to valgrind - NOT_A_QEMU_BUG. seccomp is a little tricky for valgrind since valgrind itself might use system calls not used by the application running under valgrind (they share the same process and address space). And the arguments are also tricky to interpret since depending on operation and flags this might be an arbitrary BPF program. We could simply return ENOSYS for seccomp and not produce the error/warning message. But I assume that doesn't really help in this case. Marking as feature request, lowering priority and severity. Marking this closed cantfix because it is not clear how to provide this feature. There is an upstream bug that has more discussion: https://bugs.kde.org/show_bug.cgi?id=345414 Please do reopen this bug if you really need this feature. |