Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2955963imm; Mon, 28 May 2018 20:53:42 -0700 (PDT) X-Google-Smtp-Source: ADUXVKI2HXgoBiyhNvQ1Sy1P+ZE3YgtLALsQyB1plsKsQvqKbNAF2elSGZ3X1YkLE/4g+GqylwjU X-Received: by 2002:a62:cc51:: with SMTP id a78-v6mr4208164pfg.219.1527566022660; Mon, 28 May 2018 20:53:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527566022; cv=none; d=google.com; s=arc-20160816; b=f3B6zk9bFwgVXNQo6I5Vd1Fb81h9CvgH7MHSNMuBf95vTfUMbt8HWj6+QnZAc/uiGD Jlk9k9P++ZUZDIrNy2EMwBKRCSw1HIQWAmiSW0qcbBGTOirPYEW1UeCx5AU1fU+AV4Qo 7LZkawbBmnmLkjNbRYZVm8B5/H/pxtChTdnxvxeco7e80gXASJ9FoeYjknksWA7tRLvP d5UyWPqm7zJdTmIHY4SLdjp8szECHTN0h1vE18OwP2CezESKnyoRzCSa5s332I0bA61+ g9RlvhxX9guQWdt91pdD2DZmknS2sAI7TuktW7tgBmw0823waflq2l1uE8a5+fPIS6Wc g6rw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=YF7jI2/qZ5mIPqG+gtBrjJqIqbJjbur/nDrVfbr9yns=; b=Uax/EJJ5abRkBDV084LFytTw2zSJhuTNUvh4cp38AfaFvuBMrsZ6gYO7W7oDrq4g9W UZOZiECF2yXkcYJ6UpiLdX7YCMTpiDdOGxKj9hcILx4k+cbOTtM/mkliT8EMwRddCtse 0faWGBp5nzwOy2ZAwPdAeR7CEos24O+61FBAgFMVGOvXXmd6DSuHuziPVdIdVPASEzZx ZpybPc3vKVAmONuyQ3MdhKiGmY1IiPeKm64xp5kC8q+Af31p3cNUMJvQJr7hg+i2KNAU syb2KaTlLaLBxeUIUXHfOrNghne5Wy3mYxN8K/jyNUf1wP/146DbpF3r5aa+xFD773EK awXA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 203-v6si31569725pfz.160.2018.05.28.20.53.28; Mon, 28 May 2018 20:53:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934386AbeE1Vrc (ORCPT + 99 others); Mon, 28 May 2018 17:47:32 -0400 Received: from mx2.suse.de ([195.135.220.15]:33653 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933771AbeE1Vra (ORCPT ); Mon, 28 May 2018 17:47:30 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext-too.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id CF6F2AF1F; Mon, 28 May 2018 21:47:28 +0000 (UTC) Date: Mon, 28 May 2018 14:30:39 -0700 From: Davidlohr Bueso To: Naresh Kamboju Cc: Greg Kroah-Hartman , open list , Shuah Khan , patches@kernelci.org, lkft-triage@lists.linaro.org, Ben Hutchings , linux- stable , Andrew Morton , Linus Torvalds , Guenter Roeck Subject: Re: [PATCH 4.16 000/272] 4.16.13-stable review Message-ID: <20180528213039.yy2madue67njkmw5@linux-n805> References: <20180528100240.256525891@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170421 (1.8.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 29 May 2018, Naresh Kamboju wrote: >On 28 May 2018 at 15:30, Greg Kroah-Hartman wrote: >On all devices, > ltp-syscalls-tests: > * cve-2017-5669 > > ltp-cve-tests: > * cve-2017-5669 > >Test log: >------------ >cve-2017-5669.c:62: INFO: Attempting to attach shared memory to null page >cve-2017-5669.c:74: INFO: Mapped shared memory to (nil) >cve-2017-5669.c:78: FAIL: We have mapped a VM address within the first 64Kb >cve-2017-5669.c:84: INFO: Touching shared memory to see if anything >strange happens >Summary: >passed 0 >failed 1 >skipped 0 >warnings 0 > > >The root cause is, >"Revert "ipc/shm: Fix shmat mmap nil-page protection"", >which explicitly rolls back the original change and mentions that >the LTP test case needs to be updated accordingly. This is expected in that the ltp testcase was made based on wrong assumptions. Furthermore, the reversion is being done because without it we breaks userspace; X11 most noticeably -- that alone indicates that the cve testcase is bogus. > >This regression initially detected on 4.17.0-rc5-next-20180516 >Need more investigation on this issue. The correct way of proceeding is to update the ltp testcase to deal with the remap option only, which I mentioned and they are Cc'ed. Thanks, Davidlohr