Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932651AbcDTLvb (ORCPT ); Wed, 20 Apr 2016 07:51:31 -0400 Received: from mail-io0-f182.google.com ([209.85.223.182]:34548 "EHLO mail-io0-f182.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932253AbcDTLv3 (ORCPT ); Wed, 20 Apr 2016 07:51:29 -0400 Subject: Re: [PATCH 14/16] vfs: Implement mount_super_once To: "Eric W. Biederman" , "H. Peter Anvin" References: <877ffyzy1j.fsf_-_@x220.int.ebiederm.org> <1460734532-20134-1-git-send-email-ebiederm@xmission.com> <1460734532-20134-14-git-send-email-ebiederm@xmission.com> <8737qhpifz.fsf@x220.int.ebiederm.org> <25D92F7D-32F9-4913-9995-2F6B430FA29E@zytor.com> <87inzdju98.fsf@x220.int.ebiederm.org> <87C89963-F554-481F-81FF-5DC395062943@zytor.com> <8737qhdknk.fsf@x220.int.ebiederm.org> Cc: Linus Torvalds , Andy Lutomirski , security@debian.org, "security@kernel.org" , Al Viro , "security@ubuntu.com >> security" , Peter Hurley , Serge Hallyn , Willy Tarreau , Aurelien Jarno , One Thousand Gnomes , Jann Horn , Greg KH , Linux Kernel Mailing List , Jiri Slaby , Florian Weimer From: "Austin S. Hemmelgarn" Message-ID: <57176D1D.70709@gmail.com> Date: Wed, 20 Apr 2016 07:50:53 -0400 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2 MIME-Version: 1.0 In-Reply-To: <8737qhdknk.fsf@x220.int.ebiederm.org> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-Antivirus: avast! (VPS 160420-0, 2016-04-20), Outbound message X-Antivirus-Status: Clean Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1001 Lines: 22 On 2016-04-19 23:27, Eric W. Biederman wrote: > "H. Peter Anvin" writes: > >> On April 19, 2016 12:25:03 PM PDT, "H. Peter Anvin" wrote: >>> >>> Perhaps a (privileged) option to exempt from the global limit, then. >>> Something we can implement if asked for. >>> >>> However, I wouldn't be 100% that the reserved pool isn't used. Someone >>> added it presumably for a reason. An administrator could say it and >>> we'd have no idea. >> >> ... and if I personally was running a container-hosting system, I >> would *absolutely* set it to make sure the administrator could not get >> locked out. > > That is likely easier done by setting: > echo RIDICULOUSLY_LARGE_NUMBER > /proc/sys/kernel/pty/max This may protect against administrative lockout on a sane system with responsible users, but it doesn't protect you from lockout due to a DoS attack, while the reserved pool does (or at least, it makes sure you can still allocate a few PTY's even when under attack).