Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3020426imm; Sun, 3 Jun 2018 17:38:28 -0700 (PDT) X-Google-Smtp-Source: ADUXVKJ7N+UikHJiTO5dERC0If0I94s/asBl4Zm9SlENOLQ0N+0MI3RsVRTLgOoYxe9Gwcx2hpsg X-Received: by 2002:a17:902:9a4c:: with SMTP id x12-v6mr19333455plv.213.1528072708836; Sun, 03 Jun 2018 17:38:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528072708; cv=none; d=google.com; s=arc-20160816; b=pfaRzIrwALoH2uuwilxgr/Ul6VVlpo+oeiyKUZwKZ8FZ/wHxpTfcjri8Htqd6GLJbo OBN/ys8j5y/DDveZ5/trSl9pLoXUj1nx5Pty/sV7M/geHKqvrtAdFjqGvQSVvrYM46Cx pOXBQqBI+4+tmzPZ+JsIIwI1KhObZSVuIpSgNdgFJQRQ+VHV8U0dA15FsivFTW6/9Ejc a3hFcwEA1Tg8nRL6u2/bPTZKnlbvbAxvEuQEc9T5FZDKZ5rTolx2Vrf6m62QBmweckms BTQp+/dijwxa+6GA/dGxPrIPAjHdlrRXDJC0jB7bF3SWSPEDeFt0hJvM6MfW/BnH+zgE u5rA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:thread-index:content-language :content-transfer-encoding:mime-version:message-id:date:subject :in-reply-to:references:cc:to:from:arc-authentication-results; bh=4m0Y1siJkdr2AC/0fFdFbzdxeUKrPnq5+kVlOwl6YVo=; b=vPGAdkgKFSYYjYyX+zMEqiwcpMUfLA1NzEF9OsUfFh0IDePyjM/rWJsbkhhVJB94qh d2sG8V4O+Upi8rF7EvnYk/Wj9LLRjIfznimgsOBcVHodVCNMcTILisBM/b5DHTkMvRZ9 xp8oxpZe2ySdt1on/J96k5DrnN5mI+RUUDS7GO7gvU4hlZOK6lGmn4Vejsya9pVDEPtA 3Xgxqo0c/bMsa0xOatYF8RISWNve1ZmjPr8PV2xAyVChMqouy5G+SNCpynl6bAtZ4a/X 2GoP9T3VIi5IyPbwIgNrz1jJi7KSZVii7kPZbb1yCtUFPDFHx021DjNJ8S3/mNMmaeiH cTbw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=toshiba.co.jp Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q71-v6si9666614pfl.317.2018.06.03.17.38.13; Sun, 03 Jun 2018 17:38:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=toshiba.co.jp Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751735AbeFDAhr (ORCPT + 99 others); Sun, 3 Jun 2018 20:37:47 -0400 Received: from mo-csw1115.securemx.jp ([210.130.202.157]:46642 "EHLO mo-csw.securemx.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751489AbeFDAhp (ORCPT ); Sun, 3 Jun 2018 20:37:45 -0400 Received: by mo-csw.securemx.jp (mx-mo-csw1115) id w540bDPb000500; Mon, 4 Jun 2018 09:37:14 +0900 X-Iguazu-Qid: 2wGrB9zg0Z3h3TUwxH X-Iguazu-QSIG: v=1; s=0; t=1528072633; q=2wGrB9zg0Z3h3TUwxH; m=dIWelfEpasRadKHeHvjULdnJseWkFarIFXh9obXHPUM= Received: from imx2.toshiba.co.jp (imx2.toshiba.co.jp [106.186.93.51]) by relay.securemx.jp (mx-mr1111) id w540bBCk001769; Mon, 4 Jun 2018 09:37:11 +0900 Received: from hop001.toshiba.co.jp ([133.199.164.63]) by imx2.toshiba.co.jp with ESMTP id w540bBuV016273; Mon, 4 Jun 2018 09:37:11 +0900 (JST) From: "Daniel Sangorrin" To: "'Naresh Kamboju'" Cc: "'Greg Kroah-Hartman'" , "'open list'" , "'linux- stable'" , "'Davidlohr Bueso'" , "'Joe Lawrence'" , "'Andrea Arcangeli'" , "'Manfred Spraul'" , "'Andrew Morton'" , "'Linus Torvalds'" References: <20180528100202.045206534@linuxfoundation.org> <20180528100203.357731085@linuxfoundation.org> <005601d3f888$37f266f0$a7d734d0$@toshiba.co.jp> <20180531063408.GA7744@kroah.com> <000001d3f8b2$07fc2ab0$17f48010$@toshiba.co.jp> In-Reply-To: Subject: RE: [PATCH 4.4 011/268] Revert "ipc/shm: Fix shmat mmap nil-page protection" Date: Mon, 4 Jun 2018 09:37:09 +0900 X-TSB-HOP: ON Message-ID: <000601d3fb9c$2bea1f30$83be5d90$@toshiba.co.jp> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 16.0 Content-Language: ja Thread-Index: AQIIWZ/WGnaRCO8XjPKf6QObGDbsxQGPOkphAztm2LEBjYCP2QK2GXLrAkwA+AKji7L9YA== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > -----Original Message----- > From: Naresh Kamboju [mailto:naresh.kamboju@linaro.org] > Sent: Friday, June 1, 2018 12:55 AM > To: Daniel Sangorrin > Cc: Greg Kroah-Hartman ; open list > ; linux- stable ; > Davidlohr Bueso ; Joe Lawrence ; > Andrea Arcangeli ; Manfred Spraul > ; Andrew Morton ; > Linus Torvalds > Subject: Re: [PATCH 4.4 011/268] Revert "ipc/shm: Fix shmat mmap nil-page > protection" > > On 31 May 2018 at 13:06, Daniel Sangorrin > wrote: > >> -----Original Message----- > >> From: 'Greg Kroah-Hartman' [mailto:gregkh@linuxfoundation.org] > > .. > >> Thanks for letting us know, but this was reported already. See the > >> emails on lkml with the subject: > >> Subject: Re: [PATCH 4.16 000/272] 4.16.13-stable review > >> from Davidlohr Bueso > >> Message-ID: <20180528213039.yy2madue67njkmw5@linux-n805> > >> > >> where he discusses that the LTP test is incorrect and that the kernel > >> change is correct and that LTP is going to be fixed because of this. > > My two cents, > If you are referring to cve-2017-5669.c > LTP test case is been fixed few hours ago by Rafael Tinoco, > > - shm_addr = shmat(shm_id, ((void *)1), SHM_RND); > + shm_addr = shmat(shm_id, ((void *)1), SHM_RND | SHM_REMAP); > > LTP patch pull request and it is been merged. > https://github.com/linux-test-project/ltp/pull/324 Thanks a lot Naresh. I confirmed that the latest LTP cve-2017-5669 now PASSes. Thanks, Daniel