-----Original Message----- From: Naresh Kamboju [mailto:naresh.kamboju@linaro.org] Sent: Friday, June 1, 2018 12:55 AM To: Daniel Sangorrin daniel.sangorrin@toshiba.co.jp Cc: Greg Kroah-Hartman gregkh@linuxfoundation.org; open list linux-kernel@vger.kernel.org; linux- stable stable@vger.kernel.org; Davidlohr Bueso dbueso@suse.de; Joe Lawrence joe.lawrence@redhat.com; Andrea Arcangeli aarcange@redhat.com; Manfred Spraul manfred@colorfullife.com; Andrew Morton akpm@linux-foundation.org; Linus Torvalds torvalds@linux-foundation.org Subject: Re: [PATCH 4.4 011/268] Revert "ipc/shm: Fix shmat mmap nil-page protection"
On 31 May 2018 at 13:06, Daniel Sangorrin daniel.sangorrin@toshiba.co.jp wrote:
-----Original Message----- From: 'Greg Kroah-Hartman' [mailto:gregkh@linuxfoundation.org]
..
Thanks for letting us know, but this was reported already. See the emails on lkml with the subject: Subject: Re: [PATCH 4.16 000/272] 4.16.13-stable review from Davidlohr Bueso Message-ID: 20180528213039.yy2madue67njkmw5@linux-n805
where he discusses that the LTP test is incorrect and that the kernel change is correct and that LTP is going to be fixed because of this.
My two cents, If you are referring to cve-2017-5669.c LTP test case is been fixed few hours ago by Rafael Tinoco,
- shm_addr = shmat(shm_id, ((void *)1), SHM_RND);
- shm_addr = shmat(shm_id, ((void *)1), SHM_RND | SHM_REMAP);
LTP patch pull request and it is been merged. https://github.com/linux-test-project/ltp/pull/324
Thanks a lot Naresh. I confirmed that the latest LTP cve-2017-5669 now PASSes.
Thanks, Daniel