Return-path: Received: from mail-yx0-f174.google.com ([209.85.213.174]:34623 "EHLO mail-yx0-f174.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752401Ab1KVHQr convert rfc822-to-8bit (ORCPT ); Tue, 22 Nov 2011 02:16:47 -0500 MIME-Version: 1.0 In-Reply-To: References: <201111212249.31196.rjw@sisk.pl> From: Andy Lutomirski Date: Mon, 21 Nov 2011 23:16:25 -0800 Message-ID: (sfid-20111122_081651_767245_B71C6381) Subject: Re: 3.2-rc2+: Reported regressions from 3.0 and 3.1 To: Linus Torvalds Cc: "Rafael J. Wysocki" , Linux Kernel Mailing List , Maciej Rutecki , Florian Mickler , Andrew Morton , Kernel Testers List , Network Development , Linux ACPI , Linux PM List , Linux SCSI List , Linux Wireless List , DRI Content-Type: text/plain; charset=ISO-8859-1 Sender: linux-wireless-owner@vger.kernel.org List-ID: On Mon, Nov 21, 2011 at 2:34 PM, Andy Lutomirski wrote: > On Mon, Nov 21, 2011 at 2:11 PM, Linus Torvalds > wrote: >> On Mon, Nov 21, 2011 at 1:49 PM, Rafael J. Wysocki wrote: >>> >>> Subject ? ?: [3.1 REGRESSION] Commit 5cec93c216db77c45f7ce970d46283bcb1933884 breaks the Chromium seccomp sandbox >>> Submitter ?: Nix >>> Date ? ? ? : 2011-11-14 0:40 >>> Message-ID : 8762inleno.fsf@spindle.srvr.nix >>> References : http://marc.info/?l=linux-kernel&m=132123396226377&w=2 >> This is apparently fixed in seccompsandbox. See: https://code.google.com/p/seccompsandbox/issues/detail?id=17 https://code.google.com/p/seccompsandbox/source/detail?r=178 Unless someone objects, I'll consider this to not be a kernel regression worth fixing. --Andy