Received: by 10.223.176.46 with SMTP id f43csp2268418wra; Thu, 25 Jan 2018 07:24:12 -0800 (PST) X-Google-Smtp-Source: AH8x2257Ffge1UFleTSFvIqaggFdPfbMDRk+Ypai+ohAVHJQn9s+toqoqKzaQWJ5JGMSc/W91ZwL X-Received: by 10.98.17.193 with SMTP id 62mr16336949pfr.126.1516893851940; Thu, 25 Jan 2018 07:24:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516893851; cv=none; d=google.com; s=arc-20160816; b=SEemffIslqk25jItwSY5jPcXB56qU4D108DwxJ8tEPWH0sVxMzL3sksdwUKVkNYGSi bhshNEpPddTIqF5StoEEQR1wTM6XxUe0u/X975G6CFeq7CU+g4dejLK9+YP2NbgeZP0n A/he8sHQO9MOQz0Fzm/ZRupmkuv/U2tSUCc3LJjXbEMkn0fqqb5OV7v3mhZiu2RXP99C 39eUKE1HCvPw1941JummbC7ZPJYBvsKSbAbB3xx4Yzu25nHUOtTbT1hXzG4lWjcPglqE M1qcvN0ZIxXaHATtHDpENgyiXIoKSrH7MdjQsOC4yJ1Wvx7AiigZrlcdvDIpBIuIL1ae R/zQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=GqGOpY/nCM7DMLKvskmph1IUQUwfCFbHLXxV5TedxAI=; b=RKEI449PcbT9/YtbrC/Yy+REatyw2HfMvUi60orvKl9dR14hNuxu6t47a2kQ22ngAv sFXSZPXmFrresr6JeqvLLi8sFXKdlRrEhv5qaOxE2mKioTMRJTafQuYs4JY520wC6OYV ACVPgxg7hd0w/HLDdmJ9/h8P3fvDzihNuG0yqr+gEvtDhim/IHzfXxikmStN+GtMlsV5 xzAeU3Yd2ku4w3sPJtnzDj5VYAa56LwaKigH1oL3Jxt2L0Ah9z2PNJGhSsQtDOT+UhPD ZR9aNq1ErGkMQAxwEn31QuVTKOqe/vzkW0WKH2A51lPX8b+2nWpRSeefxYqLpQhJbbC4 3RnQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f6-v6si2113340plo.800.2018.01.25.07.23.57; Thu, 25 Jan 2018 07:24:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751645AbeAYPV4 (ORCPT + 99 others); Thu, 25 Jan 2018 10:21:56 -0500 Received: from mail-wm0-f65.google.com ([74.125.82.65]:34481 "EHLO mail-wm0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751155AbeAYPVy (ORCPT ); Thu, 25 Jan 2018 10:21:54 -0500 Received: by mail-wm0-f65.google.com with SMTP id j21so23055431wmh.1; Thu, 25 Jan 2018 07:21:53 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=GqGOpY/nCM7DMLKvskmph1IUQUwfCFbHLXxV5TedxAI=; b=KAmfdl4E8hZfiHpd1TVcJzHparV+TxQXXNkWcqXPKBWMRmbkPl5ZQysNxA/qKcgJ7F xG3DPEBrdJARTdqLDd3Xxkxn6l+wDsMXL6zT21r953MgrjUO9GYhcfaGZoKbzBDy3hfQ RRJCykuNCQbgt19lJCjEBNgE55ma78OuJU4eQP5YarRjDdVrrTghsQ3ZtkM6jpaioaRg UOy2gSY2p5VqXOIvtd1bT+aYGNnw0+eQ/ZAHqHBJkKR4c5rXqFhT77IBuALXiInGGvgB EtQttOwNEnz7YZAnV8wD2fJ7T0xteWdT29aP6qO9Ym2G1NPmU6C/thVWzVyrssSTHRxM yeXw== X-Gm-Message-State: AKwxytfOteyBBofVy62IGoNkwJunfYEb974MU08URsHjy0PpU/FC2A/8 UL5rJeBwqw2Xogc6NXVmShM= X-Received: by 10.28.99.137 with SMTP id x131mr7514972wmb.12.1516893713184; Thu, 25 Jan 2018 07:21:53 -0800 (PST) Received: from ?IPv6:2a01:4240:2e27:ad85:aaaa::19f? (f.9.1.0.0.0.0.0.0.0.0.0.a.a.a.a.5.8.d.a.7.2.e.2.0.4.2.4.1.0.a.2.v6.cust.nbox.cz. [2a01:4240:2e27:ad85:aaaa::19f]) by smtp.gmail.com with ESMTPSA id k7sm5451711wrg.38.2018.01.25.07.21.51 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 25 Jan 2018 07:21:52 -0800 (PST) Subject: Re: [PATCH 4.14 17/89] futex: Prevent overflow by strengthen input validation To: Greg Kroah-Hartman Cc: Thomas Gleixner , linux-kernel@vger.kernel.org, stable@vger.kernel.org, Li Jinyue , peterz@infradead.org, dvhart@infradead.org, "torvalds@linux-foundation.org" References: <20180122083954.683903493@linuxfoundation.org> <20180122083956.427607580@linuxfoundation.org> <20567b49-e0a3-e9e0-d520-74bbfc20d414@suse.cz> <20180125151219.GA16752@kroah.com> From: Jiri Slaby Message-ID: <99cabcaa-8829-d50e-afbc-920d9dbbe903@suse.cz> Date: Thu, 25 Jan 2018 16:21:51 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.5.2 MIME-Version: 1.0 In-Reply-To: <20180125151219.GA16752@kroah.com> Content-Type: text/plain; charset=iso-8859-2 Content-Language: en-GB Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/25/2018, 04:12 PM, Greg Kroah-Hartman wrote: > On Thu, Jan 25, 2018 at 03:47:32PM +0100, Jiri Slaby wrote: >> On 01/25/2018, 03:30 PM, Thomas Gleixner wrote: >>> So what's the problem? >> >> The problem I see is that every stable kernel now requires updated >> strace with their commit from yesterday to build correctly. In >> particular, the new stable kernels cause rpm build failures of strace in >> all our distros (based on those stable kernels). Sure, we can patch >> strace in every distro every nth kernel update, but it's mere >> impractical. Kernel should not break userspace, right? > > Well, when userspace is doing something stupid... :) No doubt... But does that mean we no longer maintain the "no userspace breakage even if it is stupid" rule? >> BTW why was the patch applied to stable? We actually do pass >> -fno-strict-overflow. > > The same reason it was applied upstream, it fixes a reported > issue. > > Does that mean that all UBSAN overflow error reports are not valid > because of how we build the kernel? IMO yes, because with the option, signed overflow is not undefined. In the long term, it would be nice to get rid of *all* signed integer overflows and kill the compiler option from Makefile. Therefore the fixes are indeed very valid in upstream. thanks, -- js suse labs