-
Notifications
You must be signed in to change notification settings - Fork 1.1k
dirtyc0w_shmem: Add minimum kernel version 6.0 check #1274
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
BEFORE AFTER (Ignored) Execute the test case: Test case is IGNORED. [c7aaf7e0] Starting arm64-v8a vts_ltp_test_arm_64 with 1 test 09-24 16:16:17 I/ConsoleReporter: [1/1 arm64-v8a vts_ltp_test_arm_64 c7aaf7e0] cve.cve-2022-2590_64bit#cve.cve-2022-2590_64bit ignore =============== Results ================== =============== Consumed Time ============== Total aggregated tests run time: 8s ============== TOP 1 Slow Modules ============== ============== Modules Preparation Times ============== Total preparation time: 5m 46s || Total tear down time: 8s ======================================================= =============== Summary =============== Total Run time: 7m 24s 1/1 modules completed Total Tests : 1 PASSED : 0 FAILED : 0 IGNORED : 1 ============== End of Results ============= |
The CVE 2022-2590 vulnerability applicable only on kernels 6.0 and above. Add min_kver = "6.0" to skip the test on older kernels. Test Module: vts_ltp_test_arm_64 Test Case: cve.cve-2022-2590_64bit#cve.cve-2022-2590_64bit GBUG: 418679607 Signed-off-by: Madhu Ananthula <[email protected]>
|
FYI, you get much more attention in ML, as you did before https://lore.kernel.org/ltp/[email protected]/.
According to CVE description the affected versions are 5.16-5.19.6, because it fixes a bug |
Hi @pevik Thanks for the comments. -> your original approach to require kernel v5.16 was better. (I was wrong on ML asking for 6.0) sure will change the min_version from 6.0 -> 5.16 Kindly confirm on the approval. will raise the New PR. Thanks, |
But in that case it should IMHO we usually require minimal kernel version in a case when we cannot detect missing functionality. So I would keep it as is.
FYI LTP has (probably undocumented) policy do not hide bugs. It's not this case, but if some older kernel was vulnerable and cannot be fixed we don't want to hide it. |
|
Hi @pevik , Thanks for the comments, But what is the wayforward for cases like this? is this to be taken care by Google itself Thanks, |
As I wrote, in my case on old kernel test exit with FYI the test works well on SLES 15-SP5 kernel based on 5.14. That is older than 5.16, which provided the fix. And I still consider good to run the test, even it should not be vulnerable for CVE-2022-2590 because the regression was brought later, it still get tested for the functionality (different backport can bring the same vulnerability). Missing functionality (TCONF) is detected on SLES 15-SP3 kernel based on 5.3 (no need to set minimal kernel version). Also some Debian kernel 5.10 detect this TCONF. Now I noted Test Failed in your original report. Could you please post the actual output of LTP test? It does not help when you post just messages from your framework which runs LTP. Also it would help if you provide also your kernel config. I suppose it's some missing kernel configuration which is required by the test. Because normally 5.4 should TCONF, not fail. |
I have no idea who supports your kernel (whether Google or Qualcomm or somebody else), that's a different question completely unrelated to LTP project. |
The CVE 2022-2590 vulnerability applicable only on kernels 6.0 and above.
Add min_kver = "6.0" to skip the test on older kernels.
Test Module: vts_ltp_test_arm_64
Test Case: cve.cve-2022-2590_64bit#cve.cve-2022-2590_64bit
GBUG: 418679607
Signed-off-by: Madhu Ananthula [email protected]