RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1177724 - BUG: libseccomp man pages use the term "process" in many places where it should read "thread"
Summary: BUG: libseccomp man pages use the term "process" in many places where it shou...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: libseccomp
Version: 7.1
Hardware: Unspecified
OS: Unspecified
medium
low
Target Milestone: rc
: ---
Assignee: Paul Moore
QA Contact: Virtualization Bugs
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-12-30 05:47 UTC by Luyao Huang
Modified: 2015-11-19 10:49 UTC (History)
8 users (show)

Fixed In Version: libseccomp-2.2.1-0.el7
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-11-19 10:49:34 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2015:2321 0 normal SHIPPED_LIVE libseccomp bug fix and enhancement update 2015-11-19 10:05:58 UTC

Description Luyao Huang 2014-12-30 05:47:23 UTC
Description of problem:
improve the manual of seccomp_init about "the process"

Version-Release number of selected component (if applicable):
libseccomp-2.1.1-2.el7.x86_64

How reproducible:
100%

Steps to Reproduce:
1.# man seccomp_init
...
       SCMP_ACT_KILL
              The process will be killed by the kernel when it calls a syscall that does not match any of the configured seccomp filter rules.

       SCMP_ACT_TRAP
              The process will throw a SIGSYS signal when it calls a syscall that does not match any of the configured seccomp filter rules.

       SCMP_ACT_ERRNO(uint16_t errno)
              The process will receive a return value of errno when it calls a syscall that does not match any of the configured seccomp filter rules.
...
2.
3.

Actual results:
from man of libseccomp , it said "the process will be killed" after i do some test and check the manual of prctl(), i think it should be "the thread"

Expected results:
should give a more clearly manual for libseccomp

Additional info:

# man prctl
      PR_SET_SECCOMP (since Linux 2.6.23)
              Set the secure computing (seccomp) mode for the calling thread, to limit the available system calls.  The seccomp mode is selected via arg2.  (The seccomp constants are defined in <linux/sec‐
              comp.h>.)

              With arg2 set to SECCOMP_MODE_STRICT the only system calls that the thread is permitted to make are read(2), write(2), _exit(2), and sigreturn(2).  Other system calls result in  the  delivery
              of a SIGKILL signal.  Strict secure computing mode is useful for number-crunching applications that may need to execute untrusted byte code, perhaps obtained by reading from a pipe or socket.
              This operation is available only if the kernel is configured with CONFIG_SECCOMP enabled.

              With arg2 set to SECCOMP_MODE_FILTER (since Linux 3.5) the system calls allowed are defined by a pointer to a Berkeley Packet Filter passed in arg3.  This argument  is  a  pointer  to  struct
              sock_fprog; it can be designed to filter arbitrary system calls and system call arguments.  This mode is available only if the kernel is configured with CONFIG_SECCOMP_FILTER enabled.

              If  SECCOMP_MODE_FILTER  filters  permit  fork(2),  then  the  seccomp  mode  is inherited by children created by fork(2); if execve(2) is permitted, then the seccomp mode is preserved across
              execve(2).  If the filters permit prctl() calls, then additional filters can be added; they are run in order until the first non-allow result is seen.

              For further information, see the kernel source file Documentation/prctl/seccomp_filter.txt.

Comment 2 Paul Moore 2015-01-30 21:47:11 UTC
This has been corrected upstream with the following commit and will be included in the next libseccomp release:

https://github.com/seccomp/libseccomp/commit/00a8d27439b5749b7b62f8210fb1eb5a05ca0a13

Comment 3 Paul Moore 2015-02-12 21:43:55 UTC
A new libseccomp release, v2.2.0, fixes this problem upstream:

 * https://groups.google.com/forum/#!topic/libseccomp/vOem_SXoDp8

Comment 4 Paul Moore 2015-02-13 17:36:42 UTC
Fix included in RHBZ #1100904.

Comment 7 weliao 2015-08-31 06:14:52 UTC
Hi,  Paul:
from man of libseccomp,I saw "If the thread is being traced and the tracing process specified the PTRACE_O_TRACESECCOMP option in the call to ptrace(2), the tracing process will be notified, via PTRACE_EVENT_SECCOMP , and
              the value provided in msg_num can be retrieved using the PTRACE_GETEVENTMSG option."  --- Here "tracing process" and "tracing process" need change to "thread" ?

Version-Release number of selected component (if applicable):
   libseccomp-devel-2.2.1-1.el7.x86_64

man seccomp_init
 SCMP_ACT_KILL
              The thread will be killed by the kernel when it calls a syscall that does not match any of the configured seccomp filter rules.

       SCMP_ACT_TRAP
              The thread will throw a SIGSYS signal when it calls a syscall that does not match any of the configured seccomp filter rules.

       SCMP_ACT_ERRNO(uint16_t errno)
              The thread will receive a return value of errno when it calls a syscall that does not match any of the configured seccomp filter rules.

       SCMP_ACT_TRACE(uint16_t msg_num)
              If the thread is being traced and the tracing process specified the PTRACE_O_TRACESECCOMP option in the call to ptrace(2), the tracing process will be notified, via PTRACE_EVENT_SECCOMP , and
              the value provided in msg_num can be retrieved using the PTRACE_GETEVENTMSG option.

Comment 8 Paul Moore 2015-08-31 14:59:04 UTC
That text, as written in the manpage, looks correct to me.

Comment 9 juzhang 2015-09-07 02:25:34 UTC
According to comment7 and comment8, set this issue as verified.

Comment 10 errata-xmlrpc 2015-11-19 10:49:34 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2015-2321.html


Note You need to log in before you can comment on or make changes to this bug.