Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp840242imj; Fri, 15 Feb 2019 07:40:18 -0800 (PST) X-Google-Smtp-Source: AHgI3IYNVkZeRZGXjhJpxBdNotqltQ3KdTsmKXBvgrb5O7wkAGrjoSA1dvPA/wxsfKeSea/iu3yc X-Received: by 2002:a62:9683:: with SMTP id s3mr10383651pfk.60.1550245218336; Fri, 15 Feb 2019 07:40:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550245218; cv=none; d=google.com; s=arc-20160816; b=fXOzIDS7yv+c3v3qbdSW1Btw/NqVDr+tA2FSLRanp4mOO1jjwwEuXpmE7ndX1Qqxs0 4qBmybrQDy75gFoShvb6pWGUNUE8Nic+tjpRqfi4Aey96gZESKlfVHJvesWBp7JYc0iG bfOkw0AzGPH0tI99c0WcQGcG3CpgUG9dAAqHFV3dLPAU47/QN4sOL2Jy8cGHNbahWffj 4ODzprFQGgig7Vb95xXSd+5KeU9o+DeuXQFPoNYRTF4tH9F6B9ftnyisfq9wnfCLN24+ BMUBilQ4kCDsG4dmgZWp4qODtgPfbzqTJjv12HHeA5uuAPTiDHf8cqLH0BijbF1Xpp67 0AnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=GkmTvzabKlNbHhB/07yEMmCdwhpH32OGfIPKmeIm7jA=; b=WMGtP0WBFYVNATJl2KOh8XSYGQfjb3PCn7OFGc1l+BCgvLNbc2h5aWtYk+uGVDSAWt aMr/068Gmmrg2OLEX3wvO2zVkYf0ekR3/b9f/GyHTWJZZUY+9wP2CeMr+4dHzIcaHQez VYX9UQCjYTUee760XVlcxvADjQ8CCMaTwMbAU7b8lWsWHzQmI0MmHjbVR9DK8GVP8/GK b8zwIgo42qnTk0r5I+yNtu4mJR+EzuNeCqkj7T9pB3D2gw/J93IZStr40dD55uUqR+F2 O5hSSpngRLwWTK6nw02m5yaylfDUI/6HAD5EJ8ucN0RjxeQsM5sid1RUOkhOdXk9JgaH 1Eig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b74si5674155pfe.47.2019.02.15.07.40.02; Fri, 15 Feb 2019 07:40:18 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392137AbfBOJKF (ORCPT + 99 others); Fri, 15 Feb 2019 04:10:05 -0500 Received: from mx2.suse.de ([195.135.220.15]:38812 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2389014AbfBOJKC (ORCPT ); Fri, 15 Feb 2019 04:10:02 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 5E509ABAC; Fri, 15 Feb 2019 09:10:01 +0000 (UTC) Date: Fri, 15 Feb 2019 10:10:00 +0100 From: Michal Hocko To: Greg Kroah-Hartman Cc: Andrew Morton , stable@vger.kernel.org, Linus Torvalds , Richard Weinberger , Samuel Dionne-Riel , LKML , graham@grahamc.com, Oleg Nesterov , Kees Cook Subject: Re: Userspace regression in LTS and stable kernels Message-ID: <20190215091000.GT4525@dhcp22.suse.cz> References: <20190214122027.c0df36282d65dc9979248117@linux-foundation.org> <20190215070022.GD14473@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190215070022.GD14473@kroah.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri 15-02-19 08:00:22, Greg KH wrote: > On Thu, Feb 14, 2019 at 12:20:27PM -0800, Andrew Morton wrote: > > On Thu, 14 Feb 2019 09:56:46 -0800 Linus Torvalds wrote: > > > > > On Wed, Feb 13, 2019 at 3:37 PM Richard Weinberger > > > wrote: > > > > > > > > Your shebang line exceeds BINPRM_BUF_SIZE. > > > > Before the said commit the kernel silently truncated the shebang line > > > > (and corrupted it), > > > > now it tells the user that the line is too long. > > > > > > It doesn't matter if it "corrupted" things by truncating it. All that > > > matters is "it used to work, now it doesn't" > > > > > > Yes, maybe it never *should* have worked. And yes, it's sad that > > > people apparently had cases that depended on this odd behavior, but > > > there we are. > > > > > > I see that Kees has a patch to fix it up. > > > > > > > Greg, I think we have a problem here. > > > > 8099b047ecc431518 ("exec: load_script: don't blindly truncate shebang > > string") wasn't marked for backporting. And, presumably as a > > consequence, Kees's fix "exec: load_script: allow interpreter argument > > truncation" was not marked for backporting. > > > > 8099b047ecc431518 hasn't even appeared in a Linus released kernel, yet > > it is now present in 4.9.x, 4.14.x, 4.19.x and 4.20.x. > > It came in 5.0-rc1, so it fits the "in a Linus released kernel" > requirement. If we are to wait until it shows up in a -final, that > would be months too late for almost all of these types of patches that > are picked up. rc1 is just a too early. Waiting few more rcs or even a final release for something that people do not see as an issue should be just fine. Consider this particular patch and tell me why it had to be rushed in the first place. The original code was broken for _years_ but I do not remember anybody would be complaining. > > I don't know if Oleg considered backporting that patch. I certainly > > did (I always do), and I decided against doing so. Yet there it is. > > This came in through Sasha's tools, which give people a week or so to > say "hey, this isn't a stable patch!" and it seems everyone ignored that > :( I thought we were through this already. Automagic autoselection of patches in the core kernel (or mmotm tree patches in particular) is too dangerous. We try hard to consider each and every patch for stable. Even if something slips through then it is much more preferred to ask for a stable backport in the respective email thread and wait for a conclusion before adding it. -- Michal Hocko SUSE Labs