Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2954823imm; Mon, 28 May 2018 20:51:50 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqsxq4NbDcgYmyadVyJiHc7dmFy7fMQIn+mV4dyZd79CaI4VeyjLaAmKPc1D/gXFkf5tJOz X-Received: by 2002:a17:902:548f:: with SMTP id e15-v6mr16475308pli.314.1527565910161; Mon, 28 May 2018 20:51:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527565910; cv=none; d=google.com; s=arc-20160816; b=bCHiJNw3KXHSjKzGQQM/olfFfWF+XywRxEfqQynTIh9W4Uo7uKP27Txb75hr8Yhgf3 B4ItOWkDD0dnC2iZjo6bkAw1jXjNIQSWb0q5th1rpArDsbuGxqriYsmMI6q3lasKSZeC MTWaRK3EVsyDTUddwW/K9NgvUBnnhD5F1wvjZASWBSDVbPiPsVUDJm3OSzW0cyJNncKn F2rHWIZFGQLkniUR1MHgwmDTU1FOUIrYktWS/6cLgFnY15BhvcME5Ju02DZKlIVu2LQJ h6B9uZLxVc7zeUH/9zx6GT3kIHOEctkTYWatQ5xmJpY3qbFkJqiMRz5XBfGjpFfXYCge 4swg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=ZHUL7LPbTMpMqA0cXToHi6e5VDoz1eAIIiPt1XKEXr8=; b=xDZlGfjtHfFt3nwCOQQpWvAvjbtfErLO4FuFytrx3CTcB8XuEY5xKYbsMV983CpeU0 osuzgXDJB1dwf78mEYGBTl/ydBTWDsSHq1pLa07w1pMaeLcKhtCHzgQCZAyZVmoJaGNl FDQmr+/Aca0hddIT46PUAvRO3eSV5DLhnSbrE9gpIJhlKxnTAoWEhfNKH94kvQ4yXVoo FS8IzXNaxhaDoN/TBkwTr7rDiEi1IlSQwlFaFnlgGWSE5gHbxFE5iRqbUH97Y1fqHlhr gtBz9H14DQGa7RZo5GT6RqGEmPXDtXLVfNcCAhUBiD1hKRU3lTKqAPEAwqfSlyUMMe7Y U4Eg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=BFiJMbqJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v7-v6si16719245pgo.135.2018.05.28.20.51.35; Mon, 28 May 2018 20:51:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=BFiJMbqJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933890AbeE1UK2 (ORCPT + 99 others); Mon, 28 May 2018 16:10:28 -0400 Received: from mail-wm0-f65.google.com ([74.125.82.65]:36483 "EHLO mail-wm0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932362AbeE1UK0 (ORCPT ); Mon, 28 May 2018 16:10:26 -0400 Received: by mail-wm0-f65.google.com with SMTP id v131-v6so15556068wma.1 for ; Mon, 28 May 2018 13:10:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=ZHUL7LPbTMpMqA0cXToHi6e5VDoz1eAIIiPt1XKEXr8=; b=BFiJMbqJJnFI6dePlXYQEo9FiJEwOnUBdWWopA7SHL9vpqYvWGaFsHvm+VBl5yLgsb zgtr3JY0DSCGinBb0/zT8jlatTmCH4BaY8cmROcGyW3SqI2VYAwtOdayknSrNjAoIs1n MdM5S/1EWZBZSG16rckFm1ZgoJq9GZFcCDVzM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=ZHUL7LPbTMpMqA0cXToHi6e5VDoz1eAIIiPt1XKEXr8=; b=gmWsGzDcxUFjfyWxHCP7ndMGb+rqrIC6KQbzJ2iWlBe+nXbLCRMj0JjLWmZbUSL2KQ thpaxWhNdysFf/mE8c/vU/T8J3s6uKGIjv8YAs+3dK53AJ6VLB4RYYE2SFPR/m8ItDt9 p8GHV6fnZQ93vFl2GuNcYYh3Z3nAiABC0QIhOSRGjX8qcgtjw8TJKoJn/5ydMSxcPdhX D6QafCB3DOiKT6EB27VzvYm2zSW7KXwXVDxo/4JjElCkkfklWYHFntGDRZcl+N3ikiSr yjBrseqsg8yAbdlljOMRqsAINk+akaRtisPDe5zAYrFSgfg62324hl5PTKRhlRxZ3hef ZaeQ== X-Gm-Message-State: ALKqPwf9FJ6mO0L8oeO0PVoSoYFtj/X18H/ZOd+BMjxPAmy//KB9Cb4t ceKMrDp+ke856JTgVxU8JE/+yVgBGBYb5isMNTa3tg== X-Received: by 2002:a2e:7c02:: with SMTP id x2-v6mr9299276ljc.96.1527538224672; Mon, 28 May 2018 13:10:24 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a19:5619:0:0:0:0:0 with HTTP; Mon, 28 May 2018 13:10:23 -0700 (PDT) In-Reply-To: <20180528100240.256525891@linuxfoundation.org> References: <20180528100240.256525891@linuxfoundation.org> From: Naresh Kamboju Date: Tue, 29 May 2018 01:40:23 +0530 Message-ID: Subject: Re: [PATCH 4.16 000/272] 4.16.13-stable review To: Greg Kroah-Hartman Cc: open list , Shuah Khan , patches@kernelci.org, lkft-triage@lists.linaro.org, Ben Hutchings , linux- stable , Andrew Morton , Linus Torvalds , Guenter Roeck , dave@stgolabs.net Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 28 May 2018 at 15:30, Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 4.16.13 release. > There are 272 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Wed May 30 10:01:02 UTC 2018. > Anything received after that time might be too late. > > The whole patch series can be found in one patch at: > https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.16.13-rc1.gz > or in the git tree and branch at: > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.16.y > and the diffstat can be found below. > > thanks, > > greg k-h > > Davidlohr Bueso > ipc/shm: fix shmat() nil address after round-down when remapping > > Davidlohr Bueso > Revert "ipc/shm: Fix shmat mmap nil-page protection" Regression on 4.16, 4,14, 4.9 and 4.4 and all devices. Regressions (compared to build v4.16.12) ------------------------------------------------------------------------ On all devices, ltp-syscalls-tests: * cve-2017-5669 ltp-cve-tests: * cve-2017-5669 Test log: ------------ cve-2017-5669.c:62: INFO: Attempting to attach shared memory to null page cve-2017-5669.c:74: INFO: Mapped shared memory to (nil) cve-2017-5669.c:78: FAIL: We have mapped a VM address within the first 64Kb cve-2017-5669.c:84: INFO: Touching shared memory to see if anything strange happens Summary: passed 0 failed 1 skipped 0 warnings 0 The root cause is, "Revert "ipc/shm: Fix shmat mmap nil-page protection"", which explicitly rolls back the original change and mentions that the LTP test case needs to be updated accordingly. This regression initially detected on 4.17.0-rc5-next-20180516 Need more investigation on this issue. Ref: LKFT: next: LTS-4.16,4.14 and 4.9: LTP test case cve-2017-5669 failed on all devices https://bugs.linaro.org/show_bug.cgi?id=3835 https://bugzilla.kernel.org/show_bug.cgi?id=192931 https://patchwork.kernel.org/patch/9552307/ Best regards Naresh Kamboju