Received: by 10.223.176.46 with SMTP id f43csp2225174wra; Thu, 25 Jan 2018 06:49:32 -0800 (PST) X-Google-Smtp-Source: AH8x227L89zBQ0H8iOrrnGEPa0GXyNYujW7Y00NSpLFLydooXzQX2/YUCq5UmZWwPgjwB6XM/YRg X-Received: by 10.98.69.209 with SMTP id n78mr16499502pfi.6.1516891772379; Thu, 25 Jan 2018 06:49:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516891772; cv=none; d=google.com; s=arc-20160816; b=soz7rYRrf4KMpSUkFjQ/T5lZMmUfKgP43ArLD/nwr34xikAf8C0NYYzaUKPOF50+dQ op+83uiV9mr2FjL7D3cfCDzGSHeuZ1ROzkZG4t0/vtHznniCbt+Ise56+gIFIMoXgvfS nIOIBb0rXElccAl4jUV00Iuaxs5jSeAIc61Q1y17R8+5bhhm9Wcx6fuQN3Unh5Fauqlu Sbm+l6C4Ijhcals718L/PHuHTTh8RympHJQmucR6ro2c4vVEefmgmXKU4kYqWZxmPUVz NHLHqiVgqJu8/YkjZdSo8VWYEA5LOIncJ0GKVF5drMdzCKY8tY4/c4Zfd6PmEDE6IBV/ CiGg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=KeV3YQ3Ty90IMDh0PPSDBwbkM1OOkNDv2/H9SxvblZw=; b=zXeIzdTXttFisYqIKgPgCfnlVRZPgzOv3rGopwQcOS09F/J+Kb9pVg1cAlykqc35CP 2BBZFA9OL3/rdhrE1fkjXmRenOTmWwmVXf0wicmcIB2b1DwBpFbIz9hk7QVPeNGtJYqh dAh5oa4/4hrikCAg7dDJ2HlAPO3Efr4PK5IK4DnatsIB/H9vVOr2EdQQWtqQEnwSxNVK TPt1eRH7y4dTHcK06TQgeFHrg6H353S0g5wQ3S4Rs0Bv83+/+xDoVNPp2wefPPURZwKk cCY9jpZYaLeBGubZGDqbTc0gYE/cTJqJSo2lgG0BeJawmCqMxu9Biomh/ahrGembrOie C/kA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l12si1651347pgu.265.2018.01.25.06.49.17; Thu, 25 Jan 2018 06:49:32 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751374AbeAYOrh (ORCPT + 99 others); Thu, 25 Jan 2018 09:47:37 -0500 Received: from mail-wm0-f66.google.com ([74.125.82.66]:38771 "EHLO mail-wm0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750911AbeAYOrf (ORCPT ); Thu, 25 Jan 2018 09:47:35 -0500 Received: by mail-wm0-f66.google.com with SMTP id 141so15299649wme.3; Thu, 25 Jan 2018 06:47:35 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=KeV3YQ3Ty90IMDh0PPSDBwbkM1OOkNDv2/H9SxvblZw=; b=CX0HF1aHL2KOqWZEFYO8d1Qr2tM0fvJXv70vH5pSOQqyDR2Nc2HFtgjQ5GUgwyIQSl Ar5slCf0RcglQK+lw0Dli1RIVAtrpbzfrW1pwVoIFd3CTIGuDmxHl5F/f36OOD8PICiS CXl091rRhoMoXOxK48I9KCOi/WqFx8nV9kVLNpzEDfzEy0Fk91hi/BMoV4nCfCX2y9ZQ 2Sm8+MgAmUjLXhX0t+/VbKMZSr8OdAhFl7LolPQEpFZfVZyCUB+z7nA5OV2Sepe9Q0Jo dP8k78hd+pjDQ9NOO9Vbz+gb9bn5I8SOEg0UeqHj8hl+PrbNGqrM+qqIDTK/Y+vre+NZ bYSQ== X-Gm-Message-State: AKwxyte7WC0bJwI2KX5ir8uz6q4gPahrZRn7Pm37JMBs5RP38CHemzBO FV8VHTl8Raw/cNkghNIO9AY= X-Received: by 10.28.19.210 with SMTP id 201mr7109791wmt.4.1516891654570; Thu, 25 Jan 2018 06:47:34 -0800 (PST) Received: from ?IPv6:2a01:4240:2e27:ad85:aaaa::19f? (f.9.1.0.0.0.0.0.0.0.0.0.a.a.a.a.5.8.d.a.7.2.e.2.0.4.2.4.1.0.a.2.v6.cust.nbox.cz. [2a01:4240:2e27:ad85:aaaa::19f]) by smtp.gmail.com with ESMTPSA id v22sm5215389wra.58.2018.01.25.06.47.32 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 25 Jan 2018 06:47:33 -0800 (PST) Subject: Re: [PATCH 4.14 17/89] futex: Prevent overflow by strengthen input validation To: Thomas Gleixner Cc: Greg Kroah-Hartman , linux-kernel@vger.kernel.org, stable@vger.kernel.org, Li Jinyue , peterz@infradead.org, dvhart@infradead.org, "torvalds@linux-foundation.org" References: <20180122083954.683903493@linuxfoundation.org> <20180122083956.427607580@linuxfoundation.org> <20567b49-e0a3-e9e0-d520-74bbfc20d414@suse.cz> From: Jiri Slaby Message-ID: Date: Thu, 25 Jan 2018 15:47:32 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.5.2 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=iso-8859-2 Content-Language: en-GB Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/25/2018, 03:30 PM, Thomas Gleixner wrote: > So what's the problem? The problem I see is that every stable kernel now requires updated strace with their commit from yesterday to build correctly. In particular, the new stable kernels cause rpm build failures of strace in all our distros (based on those stable kernels). Sure, we can patch strace in every distro every nth kernel update, but it's mere impractical. Kernel should not break userspace, right? BTW why was the patch applied to stable? We actually do pass -fno-strict-overflow. thanks, -- js suse labs