Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp843228imj; Fri, 15 Feb 2019 07:43:24 -0800 (PST) X-Google-Smtp-Source: AHgI3IbWTu6r0A2E7y/TyfNK5f8UWF64RG0nGea78zhCn+ZepwtjbeCbNF4z+AM5rncPfPTsXsiY X-Received: by 2002:a62:5c85:: with SMTP id q127mr5677851pfb.97.1550245404143; Fri, 15 Feb 2019 07:43:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550245404; cv=none; d=google.com; s=arc-20160816; b=tZ18JfXx4aDPt5qfrxYA7MiQfCY0BcvzkdhD0vz04ndmHoI4WL7yt6j5BLXAitPGBD cKLj9UdDDsgLPSdJvv1SVe04qWtUOurVCpNDQwZ0pj0Q8HWZVui8mJOwQbaA+CkXtK64 6j0+j/xzXAS2VmmwjtzC+L1xdfslF7EhdMHlQwU6EFEozeLvyRiI3EqCH7MPncMn2rh6 0S8ABhpwnSRC4DeP5JkKIKlW0NMbHALxY6x2UoxvV2S8y2Oz+/UKWp63DAFGV9spnbcy t/gTwC5bAsJZPXtVMRNVWfn+RmiFSE3F+p5UUDLkNMjlUUqy0amyYfNplLYMkrJeCvgt tfYg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=nqhIT2BqiS73IyL2o0U23gpSqFB5IbM6vBp0ZYPvEL0=; b=dnLuFgUs0sLrDOV02SA2gWEPHlXif4FxcPfeOcnPu6qXB7/RemLjmR/pBJaZ2rh4Ra 9IoYA19VnKOjHeVeS9TccvPVe3+Y8/OJ4oPyYxGEYMgphyLQVaLnW6fD5uRQ1xbxkvW8 0xungKwiZcbZdmxKWMCsHomScDq3LaxGxtXy43eiAuNnN7gb5TkJrZRxDqBbvjAYTrdb Pf4rkRyfZ88HBGwDRYqHZchN6kiupOe/vKc4Z4zqEXIhH7D5v1tm58RhJy4UWcU1rQqq oqcWMGUdv6uOkB2elTB5G2styvvYLQeXVk6XstFnTXs7PaehpN2bTjmZO7pJhGfE8Fyw XTRA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=u0oWt6I2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e4si540034pgs.492.2019.02.15.07.43.08; Fri, 15 Feb 2019 07:43:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=u0oWt6I2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392463AbfBOJWF (ORCPT + 99 others); Fri, 15 Feb 2019 04:22:05 -0500 Received: from mail.kernel.org ([198.145.29.99]:52676 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727174AbfBOJWF (ORCPT ); Fri, 15 Feb 2019 04:22:05 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7E2FE21924; Fri, 15 Feb 2019 09:21:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550222519; bh=X6UzpgOGmO/BbjvSs333tpbchi6leRPQor5DjTTJLm0=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=u0oWt6I2H2bVlv/y+ckjjrSkt8SZcfIGrb+/FcAh0EW9nfCTVJu/n8hGk9NI+ikhx qBudU0QoYcSf6iNqAhfQxDJqPbDyhgCAMv642KZX5IpK+OQ2ghOmaXHeX+z7j3+o3l s1pEcbgKYWpH3en3aOiTfZ92KEu6RyQR7QDKLxY8= Date: Fri, 15 Feb 2019 10:20:13 +0100 From: Greg Kroah-Hartman To: Michal Hocko Cc: Andrew Morton , stable@vger.kernel.org, Linus Torvalds , Richard Weinberger , Samuel Dionne-Riel , LKML , graham@grahamc.com, Oleg Nesterov , Kees Cook Subject: Re: Userspace regression in LTS and stable kernels Message-ID: <20190215092013.GA32575@kroah.com> References: <20190214122027.c0df36282d65dc9979248117@linux-foundation.org> <20190215070022.GD14473@kroah.com> <20190215091000.GT4525@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190215091000.GT4525@dhcp22.suse.cz> User-Agent: Mutt/1.11.3 (2019-02-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Feb 15, 2019 at 10:10:00AM +0100, Michal Hocko wrote: > On Fri 15-02-19 08:00:22, Greg KH wrote: > > On Thu, Feb 14, 2019 at 12:20:27PM -0800, Andrew Morton wrote: > > > On Thu, 14 Feb 2019 09:56:46 -0800 Linus Torvalds wrote: > > > > > > > On Wed, Feb 13, 2019 at 3:37 PM Richard Weinberger > > > > wrote: > > > > > > > > > > Your shebang line exceeds BINPRM_BUF_SIZE. > > > > > Before the said commit the kernel silently truncated the shebang line > > > > > (and corrupted it), > > > > > now it tells the user that the line is too long. > > > > > > > > It doesn't matter if it "corrupted" things by truncating it. All that > > > > matters is "it used to work, now it doesn't" > > > > > > > > Yes, maybe it never *should* have worked. And yes, it's sad that > > > > people apparently had cases that depended on this odd behavior, but > > > > there we are. > > > > > > > > I see that Kees has a patch to fix it up. > > > > > > > > > > Greg, I think we have a problem here. > > > > > > 8099b047ecc431518 ("exec: load_script: don't blindly truncate shebang > > > string") wasn't marked for backporting. And, presumably as a > > > consequence, Kees's fix "exec: load_script: allow interpreter argument > > > truncation" was not marked for backporting. > > > > > > 8099b047ecc431518 hasn't even appeared in a Linus released kernel, yet > > > it is now present in 4.9.x, 4.14.x, 4.19.x and 4.20.x. > > > > It came in 5.0-rc1, so it fits the "in a Linus released kernel" > > requirement. If we are to wait until it shows up in a -final, that > > would be months too late for almost all of these types of patches that > > are picked up. > > rc1 is just a too early. Waiting few more rcs or even a final release > for something that people do not see as an issue should be just fine. > Consider this particular patch and tell me why it had to be rushed in > the first place. The original code was broken for _years_ but I do not > remember anybody would be complaining. This patch was in 4.20.10, which was released on Feb 12 while 5.0-rc1 came out on Jan 6. Over a month delay. > > > I don't know if Oleg considered backporting that patch. I certainly > > > did (I always do), and I decided against doing so. Yet there it is. > > > > This came in through Sasha's tools, which give people a week or so to > > say "hey, this isn't a stable patch!" and it seems everyone ignored that > > :( > > I thought we were through this already. Automagic autoselection of > patches in the core kernel (or mmotm tree patches in particular) is too > dangerous. We try hard to consider each and every patch for stable. Even > if something slips through then it is much more preferred to ask for a > stable backport in the respective email thread and wait for a conclusion > before adding it. We have a list of blacklisted files/subsystems for people that do not want this to happen to their area of the kernel. The patch seemed to make sense, and it passed all known tests that we currently have. Sometimes things will slip through like this, it happens. And really, a 3 day turn-around-time to resolve this is pretty good, don't you think? It also seems like we need another test to catch this problem from ever happening again :) thanks, greg k-h