Public bug reported:

The seccomp regression tests are failing due to SRU kernels not having
the relevant commit:

Author: Kees Cook <[email protected]>
Date:   Tue Feb 17 13:48:00 2015 -0800

    seccomp: cap SECCOMP_RET_ERRNO data to MAX_ERRNO

    The value resulting from the SECCOMP_RET_DATA mask could exceed MAX_ERRNO
    when setting errno during a SECCOMP_RET_ERRNO filter action.  This makes
    sure we have a reliable value being set, so that an invalid errno will not
    be ignored by userspace.

    Signed-off-by: Kees Cook <[email protected]>
    Reported-by: Dmitry V. Levin <[email protected]>
    Cc: Andy Lutomirski <[email protected]>
    Cc: Will Drewry <[email protected]>
    Signed-off-by: Andrew Morton <[email protected]>
    Signed-off-by: Linus Torvalds <[email protected]>

SRU Justification

    Impact:
        Upstream regression tests are reporting errors.

    Test Case:
        Run the upstream regression tests and verify they are passing
        cleanly.

** Affects: linux (Ubuntu)
     Importance: Undecided
     Assignee: Brad Figg (brad-figg)
         Status: In Progress

** Changed in: linux (Ubuntu)
       Status: New => Triaged

** Changed in: linux (Ubuntu)
       Status: Triaged => In Progress

** Changed in: linux (Ubuntu)
     Assignee: (unassigned) => Brad Figg (brad-figg)

** Description changed:

  The seccomp regression tests are failing due to SRU kernels not having
  the relevant commit:
  
  Author: Kees Cook <[email protected]>
  Date:   Tue Feb 17 13:48:00 2015 -0800
  
-     seccomp: cap SECCOMP_RET_ERRNO data to MAX_ERRNO
-     
-     The value resulting from the SECCOMP_RET_DATA mask could exceed MAX_ERRNO
-     when setting errno during a SECCOMP_RET_ERRNO filter action.  This makes
-     sure we have a reliable value being set, so that an invalid errno will not
-     be ignored by userspace.
-     
-     Signed-off-by: Kees Cook <[email protected]>
-     Reported-by: Dmitry V. Levin <[email protected]>
-     Cc: Andy Lutomirski <[email protected]>
-     Cc: Will Drewry <[email protected]>
-     Signed-off-by: Andrew Morton <[email protected]>
-     Signed-off-by: Linus Torvalds <[email protected]>
+     seccomp: cap SECCOMP_RET_ERRNO data to MAX_ERRNO
+ 
+     The value resulting from the SECCOMP_RET_DATA mask could exceed MAX_ERRNO
+     when setting errno during a SECCOMP_RET_ERRNO filter action.  This makes
+     sure we have a reliable value being set, so that an invalid errno will not
+     be ignored by userspace.
+ 
+     Signed-off-by: Kees Cook <[email protected]>
+     Reported-by: Dmitry V. Levin <[email protected]>
+     Cc: Andy Lutomirski <[email protected]>
+     Cc: Will Drewry <[email protected]>
+     Signed-off-by: Andrew Morton <[email protected]>
+     Signed-off-by: Linus Torvalds <[email protected]>
+ 
+ SRU Justification
+ 
+     Impact:
+         Upstream regression tests are reporting errors.
+ 
+     Test Case:
+         Run the upstream regression tests and verify they are passing
+         cleanly.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1496073

Title:
  Request cherry-pick of upstream kernel patch which caps
  SECCOMP_RET_ERRNO to MAX_ERRNO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1496073/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to