[LTP] [PATCH v2] dirtyc0w_shmem: Add minimum kernel version 6.0 check
Madhu Ananthula
mananthu@qti.qualcomm.com
Fri Nov 28 07:48:08 CET 2025
The CVE 2022-2590 vulnerability applicable only on kernels 6.0 and above.
Add min_kver = "6.0" to skip the test on older kernels.
Test Module: vts_ltp_test_arm_64
Test Case: cve.cve-2022-2590_64bit#cve.cve-2022-2590_64bit
GBUG: 418679607
Signed-off-by: Madhu Ananthula <mananthu@qti.qualcomm.com>
---
testcases/kernel/security/dirtyc0w_shmem/dirtyc0w_shmem.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/testcases/kernel/security/dirtyc0w_shmem/dirtyc0w_shmem.c b/testcases/kernel/security/dirtyc0w_shmem/dirtyc0w_shmem.c
index 2c7ad00f2..9cf495704 100644
--- a/testcases/kernel/security/dirtyc0w_shmem/dirtyc0w_shmem.c
+++ b/testcases/kernel/security/dirtyc0w_shmem/dirtyc0w_shmem.c
@@ -103,6 +103,7 @@ static void cleanup(void)
}
static struct tst_test test = {
+ .min_kver = "6.0",
.needs_checkpoints = 1,
.child_needs_reinit =1,
.forks_child = 1,
--
2.25.1
More information about the ltp
mailing list