Received: by 10.223.185.116 with SMTP id b49csp5297065wrg; Tue, 27 Feb 2018 10:47:44 -0800 (PST) X-Google-Smtp-Source: AH8x225J4fNdoHW+2/4hjXhAt4jO/XiO1B2WY6w12p8dBBXD/LAMekPcUltBb2mBS5SD9cWM92d+ X-Received: by 10.99.114.77 with SMTP id c13mr12209178pgn.8.1519757264069; Tue, 27 Feb 2018 10:47:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519757264; cv=none; d=google.com; s=arc-20160816; b=CFrHimVP/7ym4teKsUG7ZXnF9pqcLC3TAl07OXsRc0PM7VlwWlBFYDX5Sm6biFd/G4 T6w0jtrVUOzoRaLv1nSt0xadgfG4qtMwcTxeDqIZlyT5EXy4rnr4wyi4PVNfO0CMRlZA +xuuLh3gvMv7EVB2sKM7i1qFWe5/EwC8F2qU9+bZnjkUVsJRpbT8Bj9lGRYD0Lq9BcAj +qihiCu73kTp9bY8NUvMZbIksPDbXX/YXDbMtuVKBV1NfGjCVu+5d3ZX31Eqa+WGe8S9 h0R7PQW6qnd0Ksg9F8j+NrmFbxxs1PF2Q4s4y3bsgb1UM0kXDpWR0Qjkv3WsKNfwOGXI iqWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id :subject:cc:to:from:date:arc-authentication-results; bh=iyIvtngUElLym0Dy8PI5G8xPz/JAUFvHhhXqKVGQRO0=; b=Knac/IA5/F3fSU3gKpHZzWqjjJvdjwWC1GkPDAOt+ec1Yr35K9nqHMEtmMv7FAvABy aG502Nnfv0x5xawukYbcX1t0AW/OcSovWvKh/QigW6hxCnjHTuCvyd0THoFs8lKAL7DJ U6lPNo77u/tZSnuc1Cfew/NMRmXsVUvuay7LoqWutaASldNqKxTzYshdk04y2gOmyQzc qHKuNqjvFv9nLyOj/r/50+x5XIztnTAgP7ZTG8D3SLN8iI1gZ7S3HxFTWo/9kMQ3QiFF 8CjYR7QY0Lozhe9gUze17mQnH5xInGBQafI2CsnD7SHt7yvNdi6aWNI2fJ6bnY54ZWyM gusg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n127si7305221pga.543.2018.02.27.10.47.29; Tue, 27 Feb 2018 10:47:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751646AbeB0Squ (ORCPT + 99 others); Tue, 27 Feb 2018 13:46:50 -0500 Received: from namei.org ([65.99.196.166]:50822 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750952AbeB0Sqs (ORCPT ); Tue, 27 Feb 2018 13:46:48 -0500 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id w1RIkiUC024106; Tue, 27 Feb 2018 18:46:44 GMT Date: Wed, 28 Feb 2018 05:46:44 +1100 (AEDT) From: James Morris To: Linus Torvalds cc: linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org Subject: [GIT PULL] seccomp fix for v4.16-rc4 Message-ID: User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Linus, Please pull, from Kees: "This disables the seccomp samples when cross compiling. We're seen too many build issues here, so it's best to just disable it, especially since they're just the samples." The following changes since commit 3be23274755ee85771270a23af7691dc9b3a95db: tpm: fix potential buffer overruns caused by bit glitches on the bus (2018-02-26 15:43:46 -0800) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git fixes-v4.16-rc4 for you to fetch changes up to 757744eb5f47c4492dfc04155c2c2c325fbcb4fc: Merge tag 'seccomp-v4.16-rc4' of https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux into fixes-v4.16-rc4 (2018-02-27 10:39:29 -0800) ---------------------------------------------------------------- James Morris (1): Merge tag 'seccomp-v4.16-rc4' of https://git.kernel.org/.../kees/linux into fixes-v4.16-rc4 Michal Hocko (1): samples/seccomp: do not compile when cross compiled samples/seccomp/Makefile | 10 +--------- 1 file changed, 1 insertion(+), 9 deletions(-) diff --git a/samples/seccomp/Makefile b/samples/seccomp/Makefile index 0e349b8..ba942e3 100644 --- a/samples/seccomp/Makefile +++ b/samples/seccomp/Makefile @@ -1,4 +1,5 @@ # SPDX-License-Identifier: GPL-2.0 +ifndef CROSS_COMPILE hostprogs-$(CONFIG_SAMPLE_SECCOMP) := bpf-fancy dropper bpf-direct HOSTCFLAGS_bpf-fancy.o += -I$(objtree)/usr/include @@ -16,7 +17,6 @@ HOSTCFLAGS_bpf-direct.o += -idirafter $(objtree)/include bpf-direct-objs := bpf-direct.o # Try to match the kernel target. -ifndef CROSS_COMPILE ifndef CONFIG_64BIT # s390 has -m31 flag to build 31 bit binaries @@ -35,12 +35,4 @@ HOSTLOADLIBES_bpf-fancy += $(MFLAG) HOSTLOADLIBES_dropper += $(MFLAG) endif always := $(hostprogs-m) -else -# MIPS system calls are defined based on the -mabi that is passed -# to the toolchain which may or may not be a valid option -# for the host toolchain. So disable tests if target architecture -# is MIPS but the host isn't. -ifndef CONFIG_MIPS -always := $(hostprogs-m) -endif endif