Received: by 10.223.185.116 with SMTP id b49csp1339691wrg; Wed, 21 Feb 2018 17:05:07 -0800 (PST) X-Google-Smtp-Source: AH8x224Udu+QO4V/R3w46492nd6OY9yhz/5Fb+QgsvsJ2qOSqDwxRMKzq/VIoIzbJ/Es5E8Yw7eS X-Received: by 2002:a17:902:5269:: with SMTP id z96-v6mr4821618plh.385.1519261507409; Wed, 21 Feb 2018 17:05:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519261507; cv=none; d=google.com; s=arc-20160816; b=zg/BkumGQP+OdFCwBwuvvCMTF3rggG9DcSTqqWwyvB0imOAqDwgCQId2Q8ETKHp67H f40upqF1qlsRF9HW9ilS95wE1Wi3NEIqDMIN7Je5y8GX+SDaaVGpEoWNS3yhT5gf2k2n zQwmZ/mJFW8OO/a+GBR+5ruWQf6hQ/hVnh+ZGtUS7gihb/SCOHxw78fPsKy4+ihzZd+z B1ZL3tiCJW/Cr1MoeUibwPFZcB6MR+qXE/I1V7grt+Z0GD2ovRcaKRxR3BfgFgAZbVoS bosfzdsHAwGD2QYbZmY1WUZdnbTEZ0xnIV77Fo7tGskvVocFsh1FAO752wqXf7+yE7sb UU3g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition:mime-version :message-id:subject:cc:to:from:date:dkim-signature :arc-authentication-results; bh=HwivA7BF592Mz85TD9+fMLEf0yhHiuH5mtMYfSBYh6Q=; b=xMkzSXLU0IwfXXvErwmk9JONy8kboElJp4NArK83/BYZ5cwwhoZfSDdJ2Yvza2/BmF 7Bj3ooLzI6QK8mTcCmJwc3XN/KXt55zu6mTixe1CBTH1BkLFcHO6cQM4x1+/ugsusZ1e 7kG41Qal6GpBFNNpCFlsFCEU1VmzCqJg/AOv5CCMrWu7Vcyt7Mib1UVgdTAGi++aCKm2 Mje4oTlgCpcxrq8g+yyUEcKMYIWpyxJXw0BsPW7Q075QmHi/ii57REP5e1cmEskKXyeq jtO1khwgUVRJ7vD9PJDrvKDgZ1l7bmx835VKnKf7FVHqeilyn2h9z2KhGwG1EVW9SDV7 SRHA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=MRZ45Yva; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l25si2959913pgc.127.2018.02.21.17.04.52; Wed, 21 Feb 2018 17:05:07 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=MRZ45Yva; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751635AbeBVBEP (ORCPT + 99 others); Wed, 21 Feb 2018 20:04:15 -0500 Received: from mail-pg0-f65.google.com ([74.125.83.65]:38280 "EHLO mail-pg0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751413AbeBVBEO (ORCPT ); Wed, 21 Feb 2018 20:04:14 -0500 Received: by mail-pg0-f65.google.com with SMTP id l24so1377291pgc.5 for ; Wed, 21 Feb 2018 17:04:14 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=date:from:to:cc:subject:message-id:mime-version:content-disposition; bh=HwivA7BF592Mz85TD9+fMLEf0yhHiuH5mtMYfSBYh6Q=; b=MRZ45Yva/o6jbgtNDIcLybG9s2akhGEEkJMRlbh9tssZdvnzW41ngGk825O9HpFAuq PXo9mMKsAEI2/u58ncmBrliwRyEScsSHpy89CvqpDUFkvV+sUUbi+QaAjYzxE1JvDJJz cj+9odDG++O701WakfPasKaDbQmVOKR5SHPA4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:mime-version :content-disposition; bh=HwivA7BF592Mz85TD9+fMLEf0yhHiuH5mtMYfSBYh6Q=; b=Eze1dk+oujq21X3UjU0h+SsqKPrcF91xvYYWmjNlOUOLEvemlQhBne+bWai3NwZIxK ZwQtIzUJV9U4yd/QJz42GLxe6oiZ3NyR1QK7QTSr+ENLllKcLxmZJEfUVasiEbRV5rib isOfl9Tu0Liyp07Pzl2Pr7EXV+UYr1/UH/a7+S4w9yCB9XWJxXBY9QSBlZMEnEdYi5D3 EGJ2n36CU6ipU3heuNd9shyrBoLkF+AnAHvQf1JQ+9yHE9d6s1zKkWJ6o+nAZUhCTps7 E9lnSWZQ6OC6b1Axbzk71h+4XvYNTXfWFqjUwXM8xiSK8tNX7ghLonEUn7zXd9XlHnCV BRcQ== X-Gm-Message-State: APf1xPBukurahvFzP7BpE78Qts+uO3ndZP8qhPHM/4U1SnolSKm8Lb9W UucFPIX06Mfhx1VsWIBK9iL0Ww== X-Received: by 10.99.125.29 with SMTP id y29mr4143277pgc.277.1519261454283; Wed, 21 Feb 2018 17:04:14 -0800 (PST) Received: from www.outflux.net (173-164-112-133-Oregon.hfc.comcastbusiness.net. [173.164.112.133]) by smtp.gmail.com with ESMTPSA id 12sm73070601pfr.147.2018.02.21.17.04.12 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 21 Feb 2018 17:04:13 -0800 (PST) Date: Wed, 21 Feb 2018 17:04:11 -0800 From: Kees Cook To: James Morris Cc: linux-kernel@vger.kernel.org, "Dmitry V. Levin" , Eugene Syromiatnikov , Tycho Andersen Subject: [GIT PULL] seccomp updates for v4.16-rc3 Message-ID: <20180222010411.GA34870@beast> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi James, Please pull these seccomp changes for v4.16-rc3. These are fixes for the get_metadata interface that landed during -rc1. While the new selftest is strictly not a bug fix, I think it's in the same spirit of avoiding bugs. Thanks! -Kees The following changes since commit 26500475ac1b499d8636ff281311d633909f5d20: ptrace, seccomp: add support for retrieving seccomp metadata (2017-11-28 15:41:01 -0800) are available in the git repository at: https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/seccomp-v4.16-rc3 for you to fetch changes up to d057dc4e35e16050befa3dda943876dab39cbf80: seccomp: add a selftest for get_metadata (2018-02-21 16:56:03 -0800) ---------------------------------------------------------------- - Fix seccomp GET_METADATA to deal with fields sizes correctly (Tycho Andersen) - Add selftest to make sure GET_METADATA doesn't regress (Tycho Andersen) ---------------------------------------------------------------- Tycho Andersen (3): seccomp, ptrace: switch get_metadata types to arch independent ptrace, seccomp: tweak get_metadata behavior slightly seccomp: add a selftest for get_metadata include/uapi/linux/ptrace.h | 4 +- kernel/seccomp.c | 6 ++- tools/testing/selftests/seccomp/seccomp_bpf.c | 61 +++++++++++++++++++++++++++ 3 files changed, 67 insertions(+), 4 deletions(-) -- Kees Cook Pixel Security