From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756882AbbBFWcM (ORCPT ); Fri, 6 Feb 2015 17:32:12 -0500 Received: from pegasus3.altlinux.org ([194.107.17.103]:51949 "EHLO pegasus3.altlinux.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755550AbbBFWcJ (ORCPT ); Fri, 6 Feb 2015 17:32:09 -0500 Date: Sat, 7 Feb 2015 01:32:07 +0300 From: "Dmitry V. Levin" To: Kees Cook Cc: akpm@linux-foundation.org, linux-kernel@vger.kernel.org, Andy Lutomirski , Will Drewry Subject: Re: [PATCH] seccomp: cap SECCOMP_RET_ERRNO data to MAX_ERRNO Message-ID: <20150206223207.GA3829@altlinux.org> References: <20150206210309.GA32377@www.outflux.net> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20150206210309.GA32377@www.outflux.net> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Feb 06, 2015 at 01:03:09PM -0800, Kees Cook wrote: > The value resulting from the SECCOMP_RET_DATA mask could exceed MAX_ERRNO > when setting errno during a SECCOMP_RET_ERRNO filter action. This makes sure > we have a reliable value being set, so that an invalid errno will not be > ignored by userspace. Acked-by: Dmitry V. Levin -- ldv