* [LTP] [PATCH v1 1/1] runtest/cve: Add some existing CVE tests to runtest file
@ 2023-06-20 8:03 Souta Kawahara
2023-06-20 8:34 ` Li Wang
2023-06-21 0:20 ` [LTP] [PATCH v2 " Souta Kawahara
0 siblings, 2 replies; 10+ messages in thread
From: Souta Kawahara @ 2023-06-20 8:03 UTC (permalink / raw)
To: ltp
Signed-off-by: Souta Kawahara <souta.kawahara@miraclelinux.com>
---
runtest/cve | 13 +++++++++++++
1 file changed, 13 insertions(+)
diff --git a/runtest/cve b/runtest/cve
index f9a449fe7..aa10093c0 100644
--- a/runtest/cve
+++ b/runtest/cve
@@ -19,11 +19,13 @@ cve-2016-10044 cve-2016-10044
cve-2017-2618 cve-2017-2618
cve-2017-2636 pty05
cve-2017-2671 cve-2017-2671
+cve-2017-5669 shmat03
cve-2017-5754 meltdown
cve-2017-6951 request_key05
cve-2017-7308 setsockopt02
cve-2017-7472 keyctl04
cve-2017-7616 set_mempolicy05
+cve-2017-8890 accept02
cve-2017-10661 timerfd_settime02
cve-2017-12192 keyctl07
cve-2017-12193 add_key04
@@ -41,16 +43,19 @@ cve-2017-17805 af_alg02
cve-2017-17806 af_alg01
cve-2017-17807 request_key04
cve-2017-18075 pcrypt_aead01
+cve-2017-18344 timer_create03
cve-2017-1000111 setsockopt07
cve-2017-1000112 setsockopt05
cve-2017-1000364 stack_clash
cve-2017-1000380 snd_timer01
cve-2017-1000405 thp04
cve-2018-5803 sctp_big_chunk
+cve-2018-6927 futex_cmp_requeue02
cve-2018-7566 snd_seq01
cve-2018-8897 ptrace09
cve-2018-9568 connect02
cve-2018-10124 kill13
+cve-2018-11508 adjtimex03
cve-2018-12896 timer_settime03
cve-2018-13405 creat09
cve-2018-18445 bpf_prog04
@@ -66,15 +71,23 @@ cve-2020-14386 sendto03
cve-2020-14416 pty03
cve-2020-25705 icmp_rate_limit01
cve-2020-29373 io_uring02
+cve-2020-36557 pty06
cve-2021-3444 bpf_prog05
cve-2021-3609 can_bcm01
+cve-2021-3653 kvm_svm01
+cve-2021-3656 kvm_svm02
cve-2021-4034 execve06
+cve-2021-4197_1 cgroup_core01
+cve-2021-4197_2 cgroup_core02
+cve-2021-4204 bpf_prog06
cve-2021-22555 setsockopt08 -i 100
cve-2021-26708 vsock01
cve-2021-22600 setsockopt09
+cve-2021-38198 kvm_pagefault01
cve-2021-38604 mq_notify03
cve-2022-0847 dirtypipe
cve-2022-2590 dirtyc0w_shmem
+cve-2022-23222 bpf_prog07
# Tests below may cause kernel memory leak
cve-2020-25704 perf_event_open03
cve-2022-0185 fsconfig03
--
2.31.1
--
Mailing list info: https://lists.linux.it/listinfo/ltp
^ permalink raw reply related [flat|nested] 10+ messages in thread
* Re: [LTP] [PATCH v1 1/1] runtest/cve: Add some existing CVE tests to runtest file
2023-06-20 8:03 [LTP] [PATCH v1 1/1] runtest/cve: Add some existing CVE tests to runtest file Souta Kawahara
@ 2023-06-20 8:34 ` Li Wang
2023-06-20 21:08 ` Petr Vorel
2023-06-21 0:20 ` [LTP] [PATCH v2 " Souta Kawahara
1 sibling, 1 reply; 10+ messages in thread
From: Li Wang @ 2023-06-20 8:34 UTC (permalink / raw)
To: Souta Kawahara, Cyril Hrubis; +Cc: ltp
Hi Souta and Cyril,
On Tue, Jun 20, 2023 at 4:13 PM Souta Kawahara <
souta.kawahara@miraclelinux.com> wrote:
> Signed-off-by: Souta Kawahara <souta.kawahara@miraclelinux.com>
> ---
> runtest/cve | 13 +++++++++++++
> 1 file changed, 13 insertions(+)
>
> diff --git a/runtest/cve b/runtest/cve
> index f9a449fe7..aa10093c0 100644
> --- a/runtest/cve
> +++ b/runtest/cve
> @@ -19,11 +19,13 @@ cve-2016-10044 cve-2016-10044
> cve-2017-2618 cve-2017-2618
> cve-2017-2636 pty05
> cve-2017-2671 cve-2017-2671
> +cve-2017-5669 shmat03
>
This one looks like being dropped from the CVE list purposely,
according to:
commit 2588dafd4651706ed7ae34ae3b744b0ee8cd6384
Author: Cyril Hrubis <chrubis@suse.cz>
Date: Wed Aug 14 14:13:28 2019 +0200
syscalls/shmat03: Remove it from runtest/cve
The original POC[1] and CVE-2017-5669 are not tested by this test
anymore as it turned out that the CVE was bogus. See:
https://marc.info/?l=linux-mm&m=152510978123755&w=2
And the test became regression test for:
commit 8f89c007b6dec16a1793cb88de88fcc02117bbbc
Author: Davidlohr Bueso <dave@stgolabs.net>
Date: Fri May 25 14:47:30 2018 -0700
ipc/shm: fix shmat() nil address after round-down when remapping
Hence we will keep the test but remove it from the CVE runtest file and
adjust
the top level comment in the test code.
[1] https://bugzilla.kernel.org/attachment.cgi?id=252511
from https://bugzilla.kernel.org/show_bug.cgi?id=192931
cve-2017-5754 meltdown
> cve-2017-6951 request_key05
> cve-2017-7308 setsockopt02
> cve-2017-7472 keyctl04
> cve-2017-7616 set_mempolicy05
> +cve-2017-8890 accept02
> cve-2017-10661 timerfd_settime02
> cve-2017-12192 keyctl07
> cve-2017-12193 add_key04
> @@ -41,16 +43,19 @@ cve-2017-17805 af_alg02
> cve-2017-17806 af_alg01
> cve-2017-17807 request_key04
> cve-2017-18075 pcrypt_aead01
> +cve-2017-18344 timer_create03
> cve-2017-1000111 setsockopt07
> cve-2017-1000112 setsockopt05
> cve-2017-1000364 stack_clash
> cve-2017-1000380 snd_timer01
> cve-2017-1000405 thp04
> cve-2018-5803 sctp_big_chunk
> +cve-2018-6927 futex_cmp_requeue02
> cve-2018-7566 snd_seq01
> cve-2018-8897 ptrace09
> cve-2018-9568 connect02
> cve-2018-10124 kill13
> +cve-2018-11508 adjtimex03
> cve-2018-12896 timer_settime03
> cve-2018-13405 creat09
> cve-2018-18445 bpf_prog04
> @@ -66,15 +71,23 @@ cve-2020-14386 sendto03
> cve-2020-14416 pty03
> cve-2020-25705 icmp_rate_limit01
> cve-2020-29373 io_uring02
> +cve-2020-36557 pty06
> cve-2021-3444 bpf_prog05
> cve-2021-3609 can_bcm01
> +cve-2021-3653 kvm_svm01
> +cve-2021-3656 kvm_svm02
> cve-2021-4034 execve06
> +cve-2021-4197_1 cgroup_core01
> +cve-2021-4197_2 cgroup_core02
> +cve-2021-4204 bpf_prog06
> cve-2021-22555 setsockopt08 -i 100
> cve-2021-26708 vsock01
> cve-2021-22600 setsockopt09
> +cve-2021-38198 kvm_pagefault01
> cve-2021-38604 mq_notify03
> cve-2022-0847 dirtypipe
> cve-2022-2590 dirtyc0w_shmem
> +cve-2022-23222 bpf_prog07
> # Tests below may cause kernel memory leak
> cve-2020-25704 perf_event_open03
> cve-2022-0185 fsconfig03
> --
> 2.31.1
>
The rest part looks good.
--
Regards,
Li Wang
--
Mailing list info: https://lists.linux.it/listinfo/ltp
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [LTP] [PATCH v1 1/1] runtest/cve: Add some existing CVE tests to runtest file
2023-06-20 8:34 ` Li Wang
@ 2023-06-20 21:08 ` Petr Vorel
2023-06-21 0:19 ` 河原颯太
0 siblings, 1 reply; 10+ messages in thread
From: Petr Vorel @ 2023-06-20 21:08 UTC (permalink / raw)
To: Li Wang; +Cc: ltp
Hi Li, all,
...
> > +cve-2017-5669 shmat03
> This one looks like being dropped from the CVE list purposely,
> according to:
> commit 2588dafd4651706ed7ae34ae3b744b0ee8cd6384
> Author: Cyril Hrubis <chrubis@suse.cz>
> Date: Wed Aug 14 14:13:28 2019 +0200
> syscalls/shmat03: Remove it from runtest/cve
> The original POC[1] and CVE-2017-5669 are not tested by this test
> anymore as it turned out that the CVE was bogus. See:
> https://marc.info/?l=linux-mm&m=152510978123755&w=2
> And the test became regression test for:
> commit 8f89c007b6dec16a1793cb88de88fcc02117bbbc
> Author: Davidlohr Bueso <dave@stgolabs.net>
> Date: Fri May 25 14:47:30 2018 -0700
> ipc/shm: fix shmat() nil address after round-down when remapping
> Hence we will keep the test but remove it from the CVE runtest file and
Good catch, Li. I'm for merging this without "cve-2017-5669 shmat03" line.
With this change:
Reviewed-by: Petr Vorel <pvorel@suse.cz>
> adjust
> the top level comment in the test code.
Do you plan to do this?
Kind regards,
Petr
--
Mailing list info: https://lists.linux.it/listinfo/ltp
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [LTP] [PATCH v1 1/1] runtest/cve: Add some existing CVE tests to runtest file
2023-06-20 21:08 ` Petr Vorel
@ 2023-06-21 0:19 ` 河原颯太
0 siblings, 0 replies; 10+ messages in thread
From: 河原颯太 @ 2023-06-21 0:19 UTC (permalink / raw)
To: Petr Vorel; +Cc: ltp
Hi all.
Thankyou for all your review!
2023年6月21日(水) 6:08 Petr Vorel <pvorel@suse.cz>:
>
> Hi Li, all,
>
> ...
> > > +cve-2017-5669 shmat03
>
> > This one looks like being dropped from the CVE list purposely,
> > according to:
>
> > commit 2588dafd4651706ed7ae34ae3b744b0ee8cd6384
> > Author: Cyril Hrubis <chrubis@suse.cz>
> > Date: Wed Aug 14 14:13:28 2019 +0200
>
> > syscalls/shmat03: Remove it from runtest/cve
>
> > The original POC[1] and CVE-2017-5669 are not tested by this test
> > anymore as it turned out that the CVE was bogus. See:
>
> > https://marc.info/?l=linux-mm&m=152510978123755&w=2
>
> > And the test became regression test for:
>
> > commit 8f89c007b6dec16a1793cb88de88fcc02117bbbc
> > Author: Davidlohr Bueso <dave@stgolabs.net>
> > Date: Fri May 25 14:47:30 2018 -0700
>
> > ipc/shm: fix shmat() nil address after round-down when remapping
>
> > Hence we will keep the test but remove it from the CVE runtest file and
>
> Good catch, Li. I'm for merging this without "cve-2017-5669 shmat03" line.
> With this change:
> Reviewed-by: Petr Vorel <pvorel@suse.cz>
>
> > adjust
> > the top level comment in the test code.
> Do you plan to do this?
This seems to have already been done.
according to the diff part of "2588dafd4651706ed7ae34ae3b744b0ee8cd6384":
diff --git a/testcases/kernel/syscalls/ipc/shmat/shmat03.c
b/testcases/kernel/syscalls/ipc/shmat/shmat03.c
index 13ea39c63..18d3db028 100644
--- a/testcases/kernel/syscalls/ipc/shmat/shmat03.c
+++ b/testcases/kernel/syscalls/ipc/shmat/shmat03.c
@@ -4,26 +4,28 @@
* Copyright (c) 2017 Fujitsu Ltd. (Xiao Yang <yangx.jy@cn.fujitsu.com>)
*/
/*
- * Test for CVE-2017-5669 which allows us to map the nil page using shmat.
+ * Originated as a test for CVE-2017-5669 but as it turns out the CVE was bogus
+ * to begin with and the test was changed into a regression test for commit:
*
Regards,
Souta Kawahara <souta.kawahara@miraclelinux.com>
--
Mailing list info: https://lists.linux.it/listinfo/ltp
^ permalink raw reply related [flat|nested] 10+ messages in thread
* [LTP] [PATCH v2 1/1] runtest/cve: Add some existing CVE tests to runtest file
2023-06-20 8:03 [LTP] [PATCH v1 1/1] runtest/cve: Add some existing CVE tests to runtest file Souta Kawahara
2023-06-20 8:34 ` Li Wang
@ 2023-06-21 0:20 ` Souta Kawahara
2023-06-21 2:37 ` Li Wang
2023-06-21 9:07 ` Martin Doucha
1 sibling, 2 replies; 10+ messages in thread
From: Souta Kawahara @ 2023-06-21 0:20 UTC (permalink / raw)
To: ltp
Signed-off-by: Souta Kawahara <souta.kawahara@miraclelinux.com>
---
runtest/cve | 12 ++++++++++++
1 file changed, 12 insertions(+)
diff --git a/runtest/cve b/runtest/cve
index f9a449fe7..bbc552bea 100644
--- a/runtest/cve
+++ b/runtest/cve
@@ -24,6 +24,7 @@ cve-2017-6951 request_key05
cve-2017-7308 setsockopt02
cve-2017-7472 keyctl04
cve-2017-7616 set_mempolicy05
+cve-2017-8890 accept02
cve-2017-10661 timerfd_settime02
cve-2017-12192 keyctl07
cve-2017-12193 add_key04
@@ -41,16 +42,19 @@ cve-2017-17805 af_alg02
cve-2017-17806 af_alg01
cve-2017-17807 request_key04
cve-2017-18075 pcrypt_aead01
+cve-2017-18344 timer_create03
cve-2017-1000111 setsockopt07
cve-2017-1000112 setsockopt05
cve-2017-1000364 stack_clash
cve-2017-1000380 snd_timer01
cve-2017-1000405 thp04
cve-2018-5803 sctp_big_chunk
+cve-2018-6927 futex_cmp_requeue02
cve-2018-7566 snd_seq01
cve-2018-8897 ptrace09
cve-2018-9568 connect02
cve-2018-10124 kill13
+cve-2018-11508 adjtimex03
cve-2018-12896 timer_settime03
cve-2018-13405 creat09
cve-2018-18445 bpf_prog04
@@ -66,15 +70,23 @@ cve-2020-14386 sendto03
cve-2020-14416 pty03
cve-2020-25705 icmp_rate_limit01
cve-2020-29373 io_uring02
+cve-2020-36557 pty06
cve-2021-3444 bpf_prog05
cve-2021-3609 can_bcm01
+cve-2021-3653 kvm_svm01
+cve-2021-3656 kvm_svm02
cve-2021-4034 execve06
+cve-2021-4197_1 cgroup_core01
+cve-2021-4197_2 cgroup_core02
+cve-2021-4204 bpf_prog06
cve-2021-22555 setsockopt08 -i 100
cve-2021-26708 vsock01
cve-2021-22600 setsockopt09
+cve-2021-38198 kvm_pagefault01
cve-2021-38604 mq_notify03
cve-2022-0847 dirtypipe
cve-2022-2590 dirtyc0w_shmem
+cve-2022-23222 bpf_prog07
# Tests below may cause kernel memory leak
cve-2020-25704 perf_event_open03
cve-2022-0185 fsconfig03
--
2.31.1
--
Mailing list info: https://lists.linux.it/listinfo/ltp
^ permalink raw reply related [flat|nested] 10+ messages in thread
* Re: [LTP] [PATCH v2 1/1] runtest/cve: Add some existing CVE tests to runtest file
2023-06-21 0:20 ` [LTP] [PATCH v2 " Souta Kawahara
@ 2023-06-21 2:37 ` Li Wang
2023-06-21 9:07 ` Martin Doucha
1 sibling, 0 replies; 10+ messages in thread
From: Li Wang @ 2023-06-21 2:37 UTC (permalink / raw)
To: Souta Kawahara; +Cc: ltp
Pushed, thanks for the quick response.
--
Regards,
Li Wang
--
Mailing list info: https://lists.linux.it/listinfo/ltp
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [LTP] [PATCH v2 1/1] runtest/cve: Add some existing CVE tests to runtest file
2023-06-21 0:20 ` [LTP] [PATCH v2 " Souta Kawahara
2023-06-21 2:37 ` Li Wang
@ 2023-06-21 9:07 ` Martin Doucha
2023-06-21 11:52 ` Li Wang
1 sibling, 1 reply; 10+ messages in thread
From: Martin Doucha @ 2023-06-21 9:07 UTC (permalink / raw)
To: Souta Kawahara, ltp, Li Wang
Hi,
On 21. 06. 23 2:20, Souta Kawahara wrote:
> Signed-off-by: Souta Kawahara <souta.kawahara@miraclelinux.com>
> ---
> runtest/cve | 12 ++++++++++++
> 1 file changed, 12 insertions(+)
>
> diff --git a/runtest/cve b/runtest/cve
> index f9a449fe7..bbc552bea 100644
> --- a/runtest/cve
> +++ b/runtest/cve
> @@ -24,6 +24,7 @@ cve-2017-6951 request_key05
> cve-2017-7308 setsockopt02
> cve-2017-7472 keyctl04
> cve-2017-7616 set_mempolicy05
> +cve-2017-8890 accept02
> cve-2017-10661 timerfd_settime02
> cve-2017-12192 keyctl07
> cve-2017-12193 add_key04
> @@ -41,16 +42,19 @@ cve-2017-17805 af_alg02
> cve-2017-17806 af_alg01
> cve-2017-17807 request_key04
> cve-2017-18075 pcrypt_aead01
> +cve-2017-18344 timer_create03
> cve-2017-1000111 setsockopt07
> cve-2017-1000112 setsockopt05
> cve-2017-1000364 stack_clash
> cve-2017-1000380 snd_timer01
> cve-2017-1000405 thp04
> cve-2018-5803 sctp_big_chunk
> +cve-2018-6927 futex_cmp_requeue02
> cve-2018-7566 snd_seq01
> cve-2018-8897 ptrace09
> cve-2018-9568 connect02
> cve-2018-10124 kill13
> +cve-2018-11508 adjtimex03
> cve-2018-12896 timer_settime03
> cve-2018-13405 creat09
> cve-2018-18445 bpf_prog04
> @@ -66,15 +70,23 @@ cve-2020-14386 sendto03
> cve-2020-14416 pty03
> cve-2020-25705 icmp_rate_limit01
> cve-2020-29373 io_uring02
> +cve-2020-36557 pty06
> cve-2021-3444 bpf_prog05
> cve-2021-3609 can_bcm01
> +cve-2021-3653 kvm_svm01
> +cve-2021-3656 kvm_svm02
All kvm_* tests are intended only for baremetal testing and they're
built only for x86 machines. On any other arch, you'll get errors that
the test program does not exist. In other words, they don't belong in
this runfile.
> cve-2021-4034 execve06
> +cve-2021-4197_1 cgroup_core01
> +cve-2021-4197_2 cgroup_core02
> +cve-2021-4204 bpf_prog06
> cve-2021-22555 setsockopt08 -i 100
> cve-2021-26708 vsock01
> cve-2021-22600 setsockopt09
> +cve-2021-38198 kvm_pagefault01
Also this one.
> cve-2021-38604 mq_notify03
> cve-2022-0847 dirtypipe
> cve-2022-2590 dirtyc0w_shmem
> +cve-2022-23222 bpf_prog07
> # Tests below may cause kernel memory leak
> cve-2020-25704 perf_event_open03
> cve-2022-0185 fsconfig03
--
Martin Doucha mdoucha@suse.cz
SW Quality Engineer
SUSE LINUX, s.r.o.
CORSO IIa
Krizikova 148/34
186 00 Prague 8
Czech Republic
--
Mailing list info: https://lists.linux.it/listinfo/ltp
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [LTP] [PATCH v2 1/1] runtest/cve: Add some existing CVE tests to runtest file
2023-06-21 9:07 ` Martin Doucha
@ 2023-06-21 11:52 ` Li Wang
2023-06-21 12:41 ` Martin Doucha
0 siblings, 1 reply; 10+ messages in thread
From: Li Wang @ 2023-06-21 11:52 UTC (permalink / raw)
To: Martin Doucha; +Cc: ltp
Martin Doucha <mdoucha@suse.cz> wrote:
> > cve-2021-3444 bpf_prog05
> > cve-2021-3609 can_bcm01
> > +cve-2021-3653 kvm_svm01
> > +cve-2021-3656 kvm_svm02
>
> All kvm_* tests are intended only for baremetal testing and they're
> built only for x86 machines. On any other arch, you'll get errors that
> the test program does not exist. In other words, they don't belong in
> this runfile.
>
Thanks for the info. I look a while why can't build them
as fake programs and only exit with TCONF on non-x86,
but seems it has some platform-dependent assembly language
and the linker rule unsupport that.
Okay, I will make an additional patch to kick out them.
--
Regards,
Li Wang
--
Mailing list info: https://lists.linux.it/listinfo/ltp
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [LTP] [PATCH v2 1/1] runtest/cve: Add some existing CVE tests to runtest file
2023-06-21 11:52 ` Li Wang
@ 2023-06-21 12:41 ` Martin Doucha
2023-06-21 12:52 ` Cyril Hrubis
0 siblings, 1 reply; 10+ messages in thread
From: Martin Doucha @ 2023-06-21 12:41 UTC (permalink / raw)
To: Li Wang; +Cc: ltp
On 21. 06. 23 13:52, Li Wang wrote:
> Thanks for the info. I look a while why can't build them
> as fake programs and only exit with TCONF on non-x86,
> but seems it has some platform-dependent assembly language
> and the linker rule unsupport that.
The KVM Makefile is complicated because we build a raw machine code
binary which will be executed in the VM and then link it inside the test
program as a data blob. Adding extra conditions to skip the blob
compilation and safely TCONF in the test programs would make everything
even more complicated so it's not worth the effort at this point because
the KVM test coverage is still quite small.
--
Martin Doucha mdoucha@suse.cz
SW Quality Engineer
SUSE LINUX, s.r.o.
CORSO IIa
Krizikova 148/34
186 00 Prague 8
Czech Republic
--
Mailing list info: https://lists.linux.it/listinfo/ltp
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [LTP] [PATCH v2 1/1] runtest/cve: Add some existing CVE tests to runtest file
2023-06-21 12:41 ` Martin Doucha
@ 2023-06-21 12:52 ` Cyril Hrubis
0 siblings, 0 replies; 10+ messages in thread
From: Cyril Hrubis @ 2023-06-21 12:52 UTC (permalink / raw)
To: Martin Doucha; +Cc: ltp
Hi!
> > Thanks for the info. I look a while why can't build them
> > as fake programs and only exit with TCONF on non-x86,
> > but seems it has some platform-dependent assembly language
> > and the linker rule unsupport that.
>
> The KVM Makefile is complicated because we build a raw machine code
> binary which will be executed in the VM and then link it inside the test
> program as a data blob. Adding extra conditions to skip the blob
> compilation and safely TCONF in the test programs would make everything
> even more complicated so it's not worth the effort at this point because
> the KVM test coverage is still quite small.
I guess that proper solution could be implemented in the new generation
LTP executor. For instance if these tests have arch tag in tst_test set
to x86_64 the executor can read the metadata and wouldn't even attempt
to run these tests.
The whole point of the metadata parsing is to make the test execution
more flexible, since the runtest file based approach does not scale and
was outdated even ten years ago...
--
Cyril Hrubis
chrubis@suse.cz
--
Mailing list info: https://lists.linux.it/listinfo/ltp
^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2023-06-21 12:52 UTC | newest]
Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-06-20 8:03 [LTP] [PATCH v1 1/1] runtest/cve: Add some existing CVE tests to runtest file Souta Kawahara
2023-06-20 8:34 ` Li Wang
2023-06-20 21:08 ` Petr Vorel
2023-06-21 0:19 ` 河原颯太
2023-06-21 0:20 ` [LTP] [PATCH v2 " Souta Kawahara
2023-06-21 2:37 ` Li Wang
2023-06-21 9:07 ` Martin Doucha
2023-06-21 11:52 ` Li Wang
2023-06-21 12:41 ` Martin Doucha
2023-06-21 12:52 ` Cyril Hrubis
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox