Public bug reported: The seccomp regression tests are failing due to SRU kernels not having the relevant commit:
Author: Kees Cook <keesc...@chromium.org> Date: Tue Feb 17 13:48:00 2015 -0800 seccomp: cap SECCOMP_RET_ERRNO data to MAX_ERRNO The value resulting from the SECCOMP_RET_DATA mask could exceed MAX_ERRNO when setting errno during a SECCOMP_RET_ERRNO filter action. This makes sure we have a reliable value being set, so that an invalid errno will not be ignored by userspace. Signed-off-by: Kees Cook <keesc...@chromium.org> Reported-by: Dmitry V. Levin <l...@altlinux.org> Cc: Andy Lutomirski <l...@amacapital.net> Cc: Will Drewry <w...@chromium.org> Signed-off-by: Andrew Morton <a...@linux-foundation.org> Signed-off-by: Linus Torvalds <torva...@linux-foundation.org> SRU Justification Impact: Upstream regression tests are reporting errors. Test Case: Run the upstream regression tests and verify they are passing cleanly. ** Affects: linux (Ubuntu) Importance: Undecided Assignee: Brad Figg (brad-figg) Status: In Progress ** Changed in: linux (Ubuntu) Status: New => Triaged ** Changed in: linux (Ubuntu) Status: Triaged => In Progress ** Changed in: linux (Ubuntu) Assignee: (unassigned) => Brad Figg (brad-figg) ** Description changed: The seccomp regression tests are failing due to SRU kernels not having the relevant commit: Author: Kees Cook <keesc...@chromium.org> Date: Tue Feb 17 13:48:00 2015 -0800 - seccomp: cap SECCOMP_RET_ERRNO data to MAX_ERRNO - - The value resulting from the SECCOMP_RET_DATA mask could exceed MAX_ERRNO - when setting errno during a SECCOMP_RET_ERRNO filter action. This makes - sure we have a reliable value being set, so that an invalid errno will not - be ignored by userspace. - - Signed-off-by: Kees Cook <keesc...@chromium.org> - Reported-by: Dmitry V. Levin <l...@altlinux.org> - Cc: Andy Lutomirski <l...@amacapital.net> - Cc: Will Drewry <w...@chromium.org> - Signed-off-by: Andrew Morton <a...@linux-foundation.org> - Signed-off-by: Linus Torvalds <torva...@linux-foundation.org> + seccomp: cap SECCOMP_RET_ERRNO data to MAX_ERRNO + + The value resulting from the SECCOMP_RET_DATA mask could exceed MAX_ERRNO + when setting errno during a SECCOMP_RET_ERRNO filter action. This makes + sure we have a reliable value being set, so that an invalid errno will not + be ignored by userspace. + + Signed-off-by: Kees Cook <keesc...@chromium.org> + Reported-by: Dmitry V. Levin <l...@altlinux.org> + Cc: Andy Lutomirski <l...@amacapital.net> + Cc: Will Drewry <w...@chromium.org> + Signed-off-by: Andrew Morton <a...@linux-foundation.org> + Signed-off-by: Linus Torvalds <torva...@linux-foundation.org> + + SRU Justification + + Impact: + Upstream regression tests are reporting errors. + + Test Case: + Run the upstream regression tests and verify they are passing + cleanly. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1496073 Title: Request cherry-pick of upstream kernel patch which caps SECCOMP_RET_ERRNO to MAX_ERRNO Status in linux package in Ubuntu: In Progress Bug description: The seccomp regression tests are failing due to SRU kernels not having the relevant commit: Author: Kees Cook <keesc...@chromium.org> Date: Tue Feb 17 13:48:00 2015 -0800 seccomp: cap SECCOMP_RET_ERRNO data to MAX_ERRNO The value resulting from the SECCOMP_RET_DATA mask could exceed MAX_ERRNO when setting errno during a SECCOMP_RET_ERRNO filter action. This makes sure we have a reliable value being set, so that an invalid errno will not be ignored by userspace. Signed-off-by: Kees Cook <keesc...@chromium.org> Reported-by: Dmitry V. Levin <l...@altlinux.org> Cc: Andy Lutomirski <l...@amacapital.net> Cc: Will Drewry <w...@chromium.org> Signed-off-by: Andrew Morton <a...@linux-foundation.org> Signed-off-by: Linus Torvalds <torva...@linux-foundation.org> SRU Justification Impact: Upstream regression tests are reporting errors. Test Case: Run the upstream regression tests and verify they are passing cleanly. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1496073/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp