[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+G9fYte-o6ALhcyd_uBs+B=Q5biogk6wFZUH8pjkCoS+zWWhA@mail.gmail.com>
Date: Thu, 31 May 2018 21:25:03 +0530
From: Naresh Kamboju <naresh.kamboju@...aro.org>
To: Daniel Sangorrin <daniel.sangorrin@...hiba.co.jp>
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
open list <linux-kernel@...r.kernel.org>,
linux- stable <stable@...r.kernel.org>,
Davidlohr Bueso <dbueso@...e.de>,
Joe Lawrence <joe.lawrence@...hat.com>,
Andrea Arcangeli <aarcange@...hat.com>,
Manfred Spraul <manfred@...orfullife.com>,
Andrew Morton <akpm@...ux-foundation.org>,
Linus Torvalds <torvalds@...ux-foundation.org>
Subject: Re: [PATCH 4.4 011/268] Revert "ipc/shm: Fix shmat mmap nil-page protection"
On 31 May 2018 at 13:06, Daniel Sangorrin
<daniel.sangorrin@...hiba.co.jp> wrote:
>> -----Original Message-----
>> From: 'Greg Kroah-Hartman' [mailto:gregkh@...uxfoundation.org]
> ..
>> Thanks for letting us know, but this was reported already. See the
>> emails on lkml with the subject:
>> Subject: Re: [PATCH 4.16 000/272] 4.16.13-stable review
>> from Davidlohr Bueso
>> Message-ID: <20180528213039.yy2madue67njkmw5@...ux-n805>
>>
>> where he discusses that the LTP test is incorrect and that the kernel
>> change is correct and that LTP is going to be fixed because of this.
My two cents,
If you are referring to cve-2017-5669.c
LTP test case is been fixed few hours ago by Rafael Tinoco,
- shm_addr = shmat(shm_id, ((void *)1), SHM_RND);
+ shm_addr = shmat(shm_id, ((void *)1), SHM_RND | SHM_REMAP);
LTP patch pull request and it is been merged.
https://github.com/linux-test-project/ltp/pull/324
>
> OK, thank you for the information!
>
- Naresh
> Regards,
> Daniel
>
>
Powered by blists - more mailing lists