[LTP] [PATCH v2] security/dirtyc0w_shmem: Add new test for CVE-2022-2590
Martin Doucha
mdoucha@suse.cz
Fri Nov 25 10:53:18 CET 2022
Hi,
On 23. 11. 22 11:35, David Hildenbrand wrote:
> + pid = SAFE_FORK();
> + if (!pid) {
> + SAFE_SETGID(nobody_gid);
> + SAFE_SETUID(nobody_uid);
> + SAFE_EXECLP("dirtyc0w_shmem_child", "dirtyc0w_shmem_child", NULL);
Manpage says that the last argument of execlp() must be (char*)NULL,
including the explicit typecast.
> +#else /* UFFD_FEATURE_MINOR_SHMEM */
> +#include "tst_test.h"
> +TST_TEST_TCONF("System does not have userfaultfd minor fault support for shmem");
> +#endif /* UFFD_FEATURE_MINOR_SHMEM */
When the child exits through this TST_TEST_TCONF(), the
TST_CHECKPOINT_WAIT() in parent will fail. The parent process should not
even fork() when UFFD_FEATURE_MINOR_SHMEM is not defined in config.h.
--
Martin Doucha mdoucha@suse.cz
QA Engineer for Software Maintenance
SUSE LINUX, s.r.o.
CORSO IIa
Krizikova 148/34
186 00 Prague 8
Czech Republic
More information about the ltp
mailing list