Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753520AbdHXPzU (ORCPT ); Thu, 24 Aug 2017 11:55:20 -0400 Received: from out02.mta.xmission.com ([166.70.13.232]:47405 "EHLO out02.mta.xmission.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752759AbdHXPzS (ORCPT ); Thu, 24 Aug 2017 11:55:18 -0400 From: ebiederm@xmission.com (Eric W. Biederman) To: Stefan Lippers-Hollmann Cc: Linus Torvalds , Christian Brauner , Christian Brauner , Linux Kernel Mailing List , "Serge E. Hallyn" , Al Viro , Thorsten Leemhuis References: <20170816171211.4021-1-christian.brauner@ubuntu.com> <20170816194805.hnof3aqiqykwki7p@gmail.com> <87pobvruzt.fsf@xmission.com> <87ziazqdfr.fsf@xmission.com> <20170824022436.44adb497@mir> <87378hhi3y.fsf@xmission.com> <87wp5tfynr.fsf@xmission.com> <20170824062432.1e05e6f8@mir> Date: Thu, 24 Aug 2017 10:54:58 -0500 In-Reply-To: <20170824062432.1e05e6f8@mir> (Stefan Lippers-Hollmann's message of "Thu, 24 Aug 2017 06:24:32 +0200") Message-ID: <874lsxezal.fsf@xmission.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-XM-SPF: eid=1dkuTP-0004gp-TH;;;mid=<874lsxezal.fsf@xmission.com>;;;hst=in01.mta.xmission.com;;;ip=67.3.200.44;;;frm=ebiederm@xmission.com;;;spf=neutral X-XM-AID: U2FsdGVkX18Dm1wvuMXjRe+3DivsvYT3DAKnU3Tkxos= X-SA-Exim-Connect-IP: 67.3.200.44 X-SA-Exim-Mail-From: ebiederm@xmission.com X-Spam-Report: * -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP * 0.0 TVD_RCVD_IP Message was received from an IP address * 0.7 XMSubLong Long Subject * 1.5 XMNoVowels Alpha-numberic number with no vowels * 0.0 T_TM2_M_HEADER_IN_MSG BODY: No description available. * 0.8 BAYES_50 BODY: Bayes spam probability is 40 to 60% * [score: 0.5000] * -0.0 DCC_CHECK_NEGATIVE Not listed in DCC * [sa02 1397; Body=1 Fuz1=1 Fuz2=1] * 0.0 T_TooManySym_03 6+ unique symbols in subject * 0.0 T_TooManySym_02 5+ unique symbols in subject * 0.0 T_TooManySym_01 4+ unique symbols in subject X-Spam-DCC: XMission; sa02 1397; Body=1 Fuz1=1 Fuz2=1 X-Spam-Combo: **;Stefan Lippers-Hollmann X-Spam-Relay-Country: X-Spam-Timing: total 5456 ms - load_scoreonly_sql: 0.25 (0.0%), signal_user_changed: 4.7 (0.1%), b_tie_ro: 2.8 (0.1%), parse: 1.84 (0.0%), extract_message_metadata: 35 (0.6%), get_uri_detail_list: 2.7 (0.0%), tests_pri_-1000: 20 (0.4%), tests_pri_-950: 3.1 (0.1%), tests_pri_-900: 2.00 (0.0%), tests_pri_-400: 34 (0.6%), check_bayes: 32 (0.6%), b_tokenize: 11 (0.2%), b_tok_get_all: 9 (0.2%), b_comp_prob: 4.6 (0.1%), b_tok_touch_all: 3.5 (0.1%), b_finish: 1.07 (0.0%), tests_pri_0: 533 (9.8%), check_dkim_signature: 1.14 (0.0%), check_dkim_adsp: 5 (0.1%), tests_pri_500: 4814 (88.2%), poll_dns_idle: 4795 (87.9%), rewrite_mail: 0.00 (0.0%) Subject: Re: [PATCH 0/1] devpts: use dynamic_dname() to generate proc name X-Spam-Flag: No X-SA-Exim-Version: 4.2.1 (built Thu, 05 May 2016 13:38:54 -0600) X-SA-Exim-Scanned: Yes (on in01.mta.xmission.com) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1519 Lines: 38 Stefan Lippers-Hollmann writes: > Hi > > On 2017-08-23, Eric W. Biederman wrote: >> Linus Torvalds writes: >> > On Wed, Aug 23, 2017 at 6:49 PM, Linus Torvalds wrote: > [...] >> This is so far untested (except for compiling) but I think this will >> work. >> >> I factor out devpts_ptmx_path out of devpts_acquire so the code >> doesn't have to do unnecessary and confusing work, and add the >> new function devpts_mnt. >> >> I revert the code to keep anything except a dentry in >> tty->link->driver_data. >> >> And reduce the peer opening to a single function ptm_open_peer. >> >> It takes lines of code but the result is very straightforward code. > > I've given this a quick test, while it seems to fix the initial problem > with umounting /dev/ptmx, it does introduce a new one - trying to open > an xterm (KDE5's konsole to be exact) doesn't open a shell (the shell > window remains totally empty) and trying to ssh into the system fails > with "PTY allocation request failed on channel 0", logging in via a > real tty and creating a new pbuilder chroot from there succeeds. Weird. There is at least one leak inducing bug in there. So perhaps that is the cause. *Scratches my head* Are you also testing the new ioctl? I will resend shortly with a version that has no differences in the old code from v4.12 (other than the refactoring in fs/devpts/inode.c). Which should make it very hard to have a regression. Eric