From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.5 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, T_DKIMWL_WL_HIGH,USER_AGENT_MUTT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 23FC0C28EBD for ; Sun, 9 Jun 2019 14:50:06 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id E3A6B2083D for ; Sun, 9 Jun 2019 14:50:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1560091806; bh=hGl7xz2P5Qx18s3E5Uq3MjSkKhmAwEH4t3jJGsTUYmw=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=fTN6CunnsW51W9b84OCupkr86SMqVgD7EijOkR2khnwd9/2wIpAuxktZmzIULZlJf G3pErDIGV2RzYHIioJ0hBcH+6DfKGGz/pPQreaQSX84QB/8Ca8b0LGDmhikfljKgMz SkRW0y6VGvorFqzIUKVtI6IVFkG2ztV71Bd1RZ5k= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729033AbfFIOuF (ORCPT ); Sun, 9 Jun 2019 10:50:05 -0400 Received: from mail.kernel.org ([198.145.29.99]:40762 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727041AbfFIOuE (ORCPT ); Sun, 9 Jun 2019 10:50:04 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B017820684; Sun, 9 Jun 2019 14:50:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1560091804; bh=hGl7xz2P5Qx18s3E5Uq3MjSkKhmAwEH4t3jJGsTUYmw=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=UeH7+uF++dgCQwnfpCs6jfddzA8IG/dUU1Va9U+G0E+IS1aLaqShE9wRxpZPc2tmw SHbzds0P7ql8331Wcu9OaSgosMn8vJu0VvGyO/UTYtqcg+99zV7r9AcisBv/9/dzVY XSF9/OSOdaGHSsMV1R3cOsxD7lX4lgHqtMtWRg94= Date: Sun, 9 Jun 2019 16:50:01 +0200 From: Greg KH To: Joseph Qi Cc: Nadav Amit , "linux-kernel@vger.kernel.org" , the arch/x86 maintainers , "Peter Zijlstra (Intel)" , Ingo Molnar , Caspar Zhang , jiufei Xue , Sasha Levin Subject: Re: [bug report][stable] kernel tried to execute NX-protected page - exploit attempt? (uid: 0) Message-ID: <20190609145001.GA26365@kroah.com> References: <5817eaac-29cc-6331-af3b-b9d85a7c1cd7@linux.alibaba.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.12.0 (2019-05-25) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Jun 09, 2019 at 09:10:45PM +0800, Joseph Qi wrote: > Hi Nadav, > Thanks for the comments. > I'll test the 3 patches in the mentioned thread. This should all be fixed in the latest release that happened today. If not, please let us know. thanks, greg k-h