Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp1679375imm; Thu, 14 Jun 2018 01:56:42 -0700 (PDT) X-Google-Smtp-Source: ADUXVKI4aIlzPLmJxgMNuVN+22QCQ7usE5zsNb0wmEeGGn72eVJX1G4JqmieadOsAlu61nRuxAbb X-Received: by 2002:a62:3101:: with SMTP id x1-v6mr8439851pfx.246.1528966601938; Thu, 14 Jun 2018 01:56:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528966601; cv=none; d=google.com; s=arc-20160816; b=mDjfTGAl4CwdS46Rbps0HozlHmetNRMGjd7sauUSWwvpwxJDV432pHfaVYPzNrE7NR slBW/KCHWm/OzHpzmbbwXmWJ6RjaiQb2YsCrkOsRIKFQcwjbPlJOT99UGu2Ef2Dot7/S /t8ObQNMD5SO+HG0iAyeMi7YaPV0awTT1v2JNXpZrbjoxnnY1ZLzP9tCfTDXoVKLMuDT k06OzrdqgUOqVBaDg0NYs6c2L9MzGRQ1fWD9MtEyhZ3nFsauISfD2OkUD+VDueCN2KCX mxxKghO9Cs6xG75lvdIjWKdmjrzcZ7uuIPN+7DuKr2abTQgzzcC+6RZ14H6n1eMfXiPT tsng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:references:in-reply-to:mime-version :dkim-signature:arc-authentication-results; bh=LPRnoUPEW/a4jnkOUBLsUbYcREeZ1Qh3ZcYi9Av43G8=; b=wsX+74tdOkbtW3LBHmc82EXvPvygF/mm0UbOyM4TjHv7y/wp3e3IVQlxkc3wdHAjv5 ARpQNWkTVCzAhVAartIMLnMQFg3tQHFtn8WMx80Sfj9QgK7HaAa3knxmjDuM74NHlZtm jJcARXgEV5eSm0H8qwFMdo7ChiFppHzTp2w9R7V34wXOVS+gKQZqoJQTbCPr0MJ1CbDG MZz0YsdTAiCwv32eI/1ZOrX6/Xiro7hihpqzOXo3KBSJNZuPn8sLTRhA5FnBljK2eLk7 fzd4gg6IW2RAMy25uWZ43NmaHprB2TQC5wiTTl++ydEZ7zenpQohToqD6KzYwfhaYCs2 azFw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b="QsmtF/nb"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y36-v6si140243pga.89.2018.06.14.01.56.27; Thu, 14 Jun 2018 01:56:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b="QsmtF/nb"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754807AbeFNIyb (ORCPT + 99 others); Thu, 14 Jun 2018 04:54:31 -0400 Received: from mail-lf0-f67.google.com ([209.85.215.67]:41199 "EHLO mail-lf0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752781AbeFNIy2 (ORCPT ); Thu, 14 Jun 2018 04:54:28 -0400 Received: by mail-lf0-f67.google.com with SMTP id d24-v6so8173495lfa.8 for ; Thu, 14 Jun 2018 01:54:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=LPRnoUPEW/a4jnkOUBLsUbYcREeZ1Qh3ZcYi9Av43G8=; b=QsmtF/nbuNSLrSwv841PpqQGZ7YEcMObyfhBvS0rI/H5OyX64ZoorENBgb3wq4yy5F YjaVHSv8y7Y7zvAlH9SpMm6TF5PRqDBIMh1P2kJm6TGY4BYNNpjW1M3yTev4crRJ6WzA pyhvY5d/+1N+LbAIdvkbMSh+dAWqRMN17jU8s= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=LPRnoUPEW/a4jnkOUBLsUbYcREeZ1Qh3ZcYi9Av43G8=; b=XpNuZBJ4W4iViC8AEMOGnLp9c+KpvmPl6k5AQOk29zR9YVVBtDcXYEaXSqKdvJ2jmy sHNfIiZHEDumJApYOd5/tKxgXvTt838uky19mjK2YHJgsQ/GKuOaynSXXvhvdXl04ZzR +0TMYdttzxLlo/d8ucxF2OJLiKimc4XRj3pXEoF7d7avj3FSuri0bUKMqm3R9qL3/FsF PJgfNqMO9P9r+MhjmWtQvIjLS9+/xOaqNr+OTCkkc+qYy31Gx0WvSGDhgyYb2asvYUw5 aLOlmT7IZ+YyIb32xQGo0adCUCqKYUxeJBCpwVqZK2ohPgXEWUC+ppOTpmXIp3L/cbOj rrng== X-Gm-Message-State: APt69E0GJ0IdWx5pE26503L38MBJsZFop9KUZPsOTGklMvTCV9NnBTiU k7FUIWIGgB4i+9PzRcjUWRdBcJhMao+CGoKOxdDNJw== X-Received: by 2002:a19:e910:: with SMTP id g16-v6mr5177706lfh.44.1528966466934; Thu, 14 Jun 2018 01:54:26 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a19:ee14:0:0:0:0:0 with HTTP; Thu, 14 Jun 2018 01:54:25 -0700 (PDT) In-Reply-To: <20180614063448.GB6021@kroah.com> References: <20180612164816.587001852@linuxfoundation.org> <20180613210044.GA15146@kroah.com> <20180614063448.GB6021@kroah.com> From: Naresh Kamboju Date: Thu, 14 Jun 2018 14:24:25 +0530 Message-ID: Subject: Re: [PATCH 4.4 00/24] 4.4.137-stable review To: Greg Kroah-Hartman Cc: Rafael Tinoco , open list , Shuah Khan , patches@kernelci.org, lkft-triage@lists.linaro.org, Ben Hutchings , linux- stable , Andrew Morton , Linus Torvalds , Guenter Roeck , ltp@lists.linux.it Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 14 June 2018 at 12:04, Greg Kroah-Hartman w= rote: > On Wed, Jun 13, 2018 at 10:48:50PM -0300, Rafael Tinoco wrote: >> On 13 June 2018 at 18:08, Rafael David Tinoco >> wrote: >> > On Wed, Jun 13, 2018 at 6:00 PM, Greg Kroah-Hartman >> > wrote: >> >> On Wed, Jun 13, 2018 at 05:47:49PM -0300, Rafael Tinoco wrote: >> >>> Results from Linaro=E2=80=99s test farm. >> >>> Regressions detected. >> >>> >> >>> NOTE: >> >>> >> >>> 1) LTP vma03 test (cve-2011-2496) broken on v4.4-137-rc1 because of: >> >>> >> >>> 6ea1dc96a03a mmap: relax file size limit for regular files >> >>> bd2f9ce5bacb mmap: introduce sane default mmap limits >> >>> >> >>> discussion: >> >>> >> >>> https://github.com/linux-test-project/ltp/issues/341 >> >>> >> >>> mainline commit (v4.13-rc7): >> >>> >> >>> 0cc3b0ec23ce Clarify (and fix) MAX_LFS_FILESIZE macros >> >>> >> >>> should be backported to 4.4.138-rc2 and fixes the issue. >> >> >> >> Really? That commit says it fixes c2a9737f45e2 ("vfs,mm: fix a dead >> >> loop in truncate_inode_pages_range()") which is not in 4.4.y at all. >> >> >> >> Did you test this out? >> > >> > Yes, the LTP contains the tests (last comment is the final test for >> > arm32, right before Jan tests i686). >> > >> > Fixing MAX_LFS_FILESIZE fixes the new limit for mmap() brought by >> > those 2 commits (file_mmap_size_max()). >> > offset tested by the LTP test is 0xfffffffe000. >> > file_mmap_size_max gives: 0xFFFFFFFF000 as max value, but only after >> > the mentioned patch. >> > >> > Original intent for this fix was other though. >> >> To clarify this a bit further. >> >> The LTP CVE test is breaking in the first call to mmap(), even before >> trying to remap and test the security issue. That start happening in >> this round because of those mmap() changes and the offset used in the >> LTP test. Linus changed limit checks and made them to be related to >> MAX_LFS_FILESIZE. Unfortunately, in 4.4 stable, we were missing the >> fix for MAX_LFS_FILESIZE (which before commit 0cc3b0ec23ce was less >> than the REAL 32 bit limit). >> >> Commit 0cc3b0ec23ce was made because an user noticed the FS limit not >> being what it should be. In our case, the 4.4 stable kernel, we are >> facing this 32 bit lower limit (than the real 32 bit real limit), >> because of the LTP CVE test, so we need this fix to have the real 32 >> bit limit set for that macro (mmap limits did not use that macro >> before). >> >> I have tested in arm32 and Jan Stancek, who first responded to LTP >> issue, has tested this in i686 and both worked after that patch was >> included to v4.4-137-rc1 (my last test was even with 4.4.138-rc1). >> >> Hope that helps a bit. > > Ok, thanks, it didn't apply cleanly but I've fixed it up now. On the latest 4.4.138-rc1, LTP "cve-2011-2496" test still fails on arm32 beagleboard x15 and qemu_arm. Summary ------------------------------------------------------------------------ kernel: 4.4.138-rc1 git repo: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stab= le-rc.git git branch: linux-4.4.y git commit: 7d690c56754ef7be647fbcf7bcdceebd59926b3f git describe: v4.4.137-15-g7d690c56754e Test details: https://qa-reports.linaro.org/lkft/linux-stable-rc-4.4-oe/bui= ld/v4.4.137-15-g7d690c56754e On the side note, Kernel selftests version upgrade to 4.17. - Naresh