Public bug reported: The seccomp regression tests are failing due to SRU kernels not having the relevant commit:
Author: Kees Cook <[email protected]> Date: Tue Feb 17 13:48:00 2015 -0800 seccomp: cap SECCOMP_RET_ERRNO data to MAX_ERRNO The value resulting from the SECCOMP_RET_DATA mask could exceed MAX_ERRNO when setting errno during a SECCOMP_RET_ERRNO filter action. This makes sure we have a reliable value being set, so that an invalid errno will not be ignored by userspace. Signed-off-by: Kees Cook <[email protected]> Reported-by: Dmitry V. Levin <[email protected]> Cc: Andy Lutomirski <[email protected]> Cc: Will Drewry <[email protected]> Signed-off-by: Andrew Morton <[email protected]> Signed-off-by: Linus Torvalds <[email protected]> SRU Justification Impact: Upstream regression tests are reporting errors. Test Case: Run the upstream regression tests and verify they are passing cleanly. ** Affects: linux (Ubuntu) Importance: Undecided Assignee: Brad Figg (brad-figg) Status: In Progress ** Changed in: linux (Ubuntu) Status: New => Triaged ** Changed in: linux (Ubuntu) Status: Triaged => In Progress ** Changed in: linux (Ubuntu) Assignee: (unassigned) => Brad Figg (brad-figg) ** Description changed: The seccomp regression tests are failing due to SRU kernels not having the relevant commit: Author: Kees Cook <[email protected]> Date: Tue Feb 17 13:48:00 2015 -0800 - seccomp: cap SECCOMP_RET_ERRNO data to MAX_ERRNO - - The value resulting from the SECCOMP_RET_DATA mask could exceed MAX_ERRNO - when setting errno during a SECCOMP_RET_ERRNO filter action. This makes - sure we have a reliable value being set, so that an invalid errno will not - be ignored by userspace. - - Signed-off-by: Kees Cook <[email protected]> - Reported-by: Dmitry V. Levin <[email protected]> - Cc: Andy Lutomirski <[email protected]> - Cc: Will Drewry <[email protected]> - Signed-off-by: Andrew Morton <[email protected]> - Signed-off-by: Linus Torvalds <[email protected]> + seccomp: cap SECCOMP_RET_ERRNO data to MAX_ERRNO + + The value resulting from the SECCOMP_RET_DATA mask could exceed MAX_ERRNO + when setting errno during a SECCOMP_RET_ERRNO filter action. This makes + sure we have a reliable value being set, so that an invalid errno will not + be ignored by userspace. + + Signed-off-by: Kees Cook <[email protected]> + Reported-by: Dmitry V. Levin <[email protected]> + Cc: Andy Lutomirski <[email protected]> + Cc: Will Drewry <[email protected]> + Signed-off-by: Andrew Morton <[email protected]> + Signed-off-by: Linus Torvalds <[email protected]> + + SRU Justification + + Impact: + Upstream regression tests are reporting errors. + + Test Case: + Run the upstream regression tests and verify they are passing + cleanly. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1496073 Title: Request cherry-pick of upstream kernel patch which caps SECCOMP_RET_ERRNO to MAX_ERRNO To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1496073/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
