Received: by 10.192.165.156 with SMTP id m28csp134427imm; Thu, 12 Apr 2018 18:20:36 -0700 (PDT) X-Google-Smtp-Source: AIpwx49nMt9tVwws56eBhgbvwrtnMc89Kr2OHAQP7tJf2kDTjYozFzYiZmKF1juR2CwqHkDDN763 X-Received: by 2002:a17:902:2d24:: with SMTP id o33-v6mr3235763plb.143.1523582436288; Thu, 12 Apr 2018 18:20:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523582436; cv=none; d=google.com; s=arc-20160816; b=ke4H//sw+CxFLic7nV3cDhmOSvkVsr995JHwGy1heiSW8wKNSiS8xSonNYKLzkHdoP 3CMaGYmdqy1JgKCJxngs0AhnGeRUflJiXD9vIUblCW3wnKAGjU55RDd0N5J1H5atSPYf 5wWguKsVsgyPhdfLgAOwJ92RaKdQpM/laCT/yDli5pHsG0mdK5WFnPw0pdK3g8BD/kBV MfZj7l5o8tz6RCvNzcKkgiSkbtsGRAA7SCgx8E/4sB57vLSn/WuiitbGP7Pf2J1G5PMi 8MXkz62V7AVYAmNmRh3H9Yq0PQ/gMMWPbkQI30x2txj99Ib4hh3Y3GFphDIBLC5jt8Jp WpCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dmarc-filter :arc-authentication-results; bh=l1gD9B6ijPLNBy79hnI8GxiT5HgUc3nHk0ibOUzq6c8=; b=a8hFtzkh4KtCeY4sn1G5lHwvX/tvbG9z2oP1plsXI8zNtylHoYCVkWR+EfjZ35Aqgg SxLYY3AEN9+CFjorBjdcAHka7bBhrmC4N/MNHdpEpUM+pBI5W4UWz+H+UsZwn9gvUDf+ E3S5UCniDHDqKH37AzjUrYqp4+u3t4flGAJ4Wctwb7zzZum9DvRyMRNi/LZzbvUlvltv moeW/WlI1jnaMYT3OY2mIS47/vwdX8DxxYtK/8lWZJb2GZz182OUKpLP+DY3QudzBdXv kRT3fUVDM6YXiXyltVHy5Niir2t0/qohylOzPNt1D0ogK2NjnKUSvkpFmIeaPAA2e7Um 8CSQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n10si3458801pfe.57.2018.04.12.18.20.20; Thu, 12 Apr 2018 18:20:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752846AbeDMAun (ORCPT + 99 others); Thu, 12 Apr 2018 20:50:43 -0400 Received: from mail.kernel.org ([198.145.29.99]:49192 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751963AbeDMAul (ORCPT ); Thu, 12 Apr 2018 20:50:41 -0400 Received: from mail-vk0-f51.google.com (mail-vk0-f51.google.com [209.85.213.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4AC3D217A6; Fri, 13 Apr 2018 00:50:41 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 4AC3D217A6 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=mcgrof@kernel.org Received: by mail-vk0-f51.google.com with SMTP id x204so4411597vkd.7; Thu, 12 Apr 2018 17:50:41 -0700 (PDT) X-Gm-Message-State: ALQs6tA9RrXYdoWwvc6swjEnW3l106yu9twFUgE2JtTVJY0JouYDwDX/ UlYXpo26GV9JBisgls+jyxnoIwXxs2nR253Cw5s= X-Received: by 10.31.65.13 with SMTP id o13mr2301265vka.38.1523580640407; Thu, 12 Apr 2018 17:50:40 -0700 (PDT) MIME-Version: 1.0 Received: by 10.159.59.74 with HTTP; Thu, 12 Apr 2018 17:50:19 -0700 (PDT) In-Reply-To: <20180409002239.163177-188-alexander.levin@microsoft.com> References: <20180409002239.163177-1-alexander.levin@microsoft.com> <20180409002239.163177-188-alexander.levin@microsoft.com> From: "Luis R. Rodriguez" Date: Thu, 12 Apr 2018 17:50:19 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH AUTOSEL for 4.9 188/293] fs: warn in case userspace lied about modprobe return To: Sasha Levin Cc: "stable@vger.kernel.org" , "linux-kernel@vger.kernel.org" , Jessica Yu , Al Viro Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Apr 8, 2018 at 5:25 PM, Sasha Levin wrote: > From: "Luis R. Rodriguez" > > [ Upstream commit 41124db869b7e00e12052555f8987867ac01d70c ] > > kmod <= v19 was broken -- it could return 0 to modprobe calls, > incorrectly assuming that a kernel module was built-in, whereas in > reality the module was just forming in the kernel. The reason for this > is an incorrect userspace heuristics. A userspace kmod fix is available > for it [0], however should userspace break again we could go on with > an failed get_fs_type() which is hard to debug as the request_module() > is detected as returning 0. The first suspect would be that there is > something worth with the kernel's module loader and obviously in this > case that is not the issue. > > Since these issues are painful to debug complain when we know userspace > has outright lied to us. > > [0] http://git.kernel.org/cgit/utils/kernel/kmod/kmod.git/commit/libkmod/libkmod-module.c?id=fd44a98ae2eb5eb32161088954ab21e58e19dfc4 > > Suggested-by: Rusty Russell > Cc: Jessica Yu > Signed-off-by: Luis R. Rodriguez > Signed-off-by: Al Viro > Signed-off-by: Sasha Levin Acked-by: Luis R. Rodriguez The issue is real, and specially older kernels with older userspace can suffer with pain. It doesn't follow the typical stable candidate-fix, however, such simple check *can* help rule out tons of stupid debugging where the culprit really was userspace. Luis