Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp853762imj; Fri, 15 Feb 2019 07:54:28 -0800 (PST) X-Google-Smtp-Source: AHgI3IZJP4rwRjxJI52pNIWyUF4BllU+Amesdm0rH2k6z6Y6fR48glKjR0ARTganHXw3GJ+26ny8 X-Received: by 2002:a63:c204:: with SMTP id b4mr5965437pgd.335.1550246068520; Fri, 15 Feb 2019 07:54:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550246068; cv=none; d=google.com; s=arc-20160816; b=mkUjwZj4cD5JkL60TguH6lhaIY0aGoAf8lZqCLmgw/zY0mX/rGQWHmexd46nvUdo23 ZkOholGRPKmieo/3plTJ/cToQxgXotBSpQqn7SX0ZTwla55/9K8pMdVo2+cXYDtDnPOH dd8vpQ5BQ1AUfBcn7+EIbgzM6ceo1J8ZdJUR1idaJ4Vohl4W8coQGHVQMV/Ph1Zww4cb admOsDwOtCB8C5Fw9SL5YdU1BpGkki+a7dBmYnu6EM/AAIhMgqBRda7aVpq4y9oJFyi/ U1TVdTWVlOW1DwHQ3LbS3gEdSMAgTQP8d/V0h0leHF/BIoDi6xiScxH5bZ0ZbvX/gl5b F62g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=psuk5x5mj4ChVDtL+L+kIUIgRInQ6cipakEaB/RJ15A=; b=C4rB8/7uLC/1xWVqMjRp7EUjlMu4YCTZlQM/FxMp+TYIXS5FXWHJV5bk2dawiKSdU8 h6Po02o5/tDTeeAqvO4FaMQXxAsYv+VIlXm/bRsAbxIrSMUt8BvvcSQcmGQZvlHzCJVe rQh1/7TRQ5W5fJqjACAAwtO0faedBk08gSk7aeurNZ2BUhdlxzCV4B66RUYLeYbxtCGa 19at+fKToZJGIwnaPLwByhb/mu4ZScdwL7nia85nLLgD2oRfuycKvWy2H3jcI9cJN5yd MdKJmwfaKyc62lcDxt3AVlxFHkWUnWgVL5lKOLNndXxGQZ2WfloP9WArciS0DDt6Sbx7 /u3g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ay4si5699117plb.235.2019.02.15.07.54.12; Fri, 15 Feb 2019 07:54:28 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388771AbfBOJmJ (ORCPT + 99 others); Fri, 15 Feb 2019 04:42:09 -0500 Received: from mx2.suse.de ([195.135.220.15]:58328 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2405116AbfBOJmI (ORCPT ); Fri, 15 Feb 2019 04:42:08 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 5DCF4AFBF; Fri, 15 Feb 2019 09:42:06 +0000 (UTC) Date: Fri, 15 Feb 2019 10:42:05 +0100 From: Michal Hocko To: Greg Kroah-Hartman Cc: Andrew Morton , stable@vger.kernel.org, Linus Torvalds , Richard Weinberger , Samuel Dionne-Riel , LKML , graham@grahamc.com, Oleg Nesterov , Kees Cook Subject: Re: Userspace regression in LTS and stable kernels Message-ID: <20190215094205.GW4525@dhcp22.suse.cz> References: <20190214122027.c0df36282d65dc9979248117@linux-foundation.org> <20190215070022.GD14473@kroah.com> <20190215091000.GT4525@dhcp22.suse.cz> <20190215092013.GA32575@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190215092013.GA32575@kroah.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri 15-02-19 10:20:13, Greg KH wrote: > On Fri, Feb 15, 2019 at 10:10:00AM +0100, Michal Hocko wrote: > > On Fri 15-02-19 08:00:22, Greg KH wrote: > > > On Thu, Feb 14, 2019 at 12:20:27PM -0800, Andrew Morton wrote: > > > > On Thu, 14 Feb 2019 09:56:46 -0800 Linus Torvalds wrote: > > > > > > > > > On Wed, Feb 13, 2019 at 3:37 PM Richard Weinberger > > > > > wrote: > > > > > > > > > > > > Your shebang line exceeds BINPRM_BUF_SIZE. > > > > > > Before the said commit the kernel silently truncated the shebang line > > > > > > (and corrupted it), > > > > > > now it tells the user that the line is too long. > > > > > > > > > > It doesn't matter if it "corrupted" things by truncating it. All that > > > > > matters is "it used to work, now it doesn't" > > > > > > > > > > Yes, maybe it never *should* have worked. And yes, it's sad that > > > > > people apparently had cases that depended on this odd behavior, but > > > > > there we are. > > > > > > > > > > I see that Kees has a patch to fix it up. > > > > > > > > > > > > > Greg, I think we have a problem here. > > > > > > > > 8099b047ecc431518 ("exec: load_script: don't blindly truncate shebang > > > > string") wasn't marked for backporting. And, presumably as a > > > > consequence, Kees's fix "exec: load_script: allow interpreter argument > > > > truncation" was not marked for backporting. > > > > > > > > 8099b047ecc431518 hasn't even appeared in a Linus released kernel, yet > > > > it is now present in 4.9.x, 4.14.x, 4.19.x and 4.20.x. > > > > > > It came in 5.0-rc1, so it fits the "in a Linus released kernel" > > > requirement. If we are to wait until it shows up in a -final, that > > > would be months too late for almost all of these types of patches that > > > are picked up. > > > > rc1 is just a too early. Waiting few more rcs or even a final release > > for something that people do not see as an issue should be just fine. > > Consider this particular patch and tell me why it had to be rushed in > > the first place. The original code was broken for _years_ but I do not > > remember anybody would be complaining. > > This patch was in 4.20.10, which was released on Feb 12 while 5.0-rc1 > came out on Jan 6. Over a month delay. Obviously not long enough. > > > > I don't know if Oleg considered backporting that patch. I certainly > > > > did (I always do), and I decided against doing so. Yet there it is. > > > > > > This came in through Sasha's tools, which give people a week or so to > > > say "hey, this isn't a stable patch!" and it seems everyone ignored that > > > :( > > > > I thought we were through this already. Automagic autoselection of > > patches in the core kernel (or mmotm tree patches in particular) is too > > dangerous. We try hard to consider each and every patch for stable. Even > > if something slips through then it is much more preferred to ask for a > > stable backport in the respective email thread and wait for a conclusion > > before adding it. > > We have a list of blacklisted files/subsystems for people that do not > want this to happen to their area of the kernel. The patch seemed to > make sense, and it passed all known tests that we currently have. Yes, the patch makes sense (I wouldn't give my acked-by otherwise). But this is one of the area where things that make sense might still break because it is hard to assume what userspace depends on. > Sometimes things will slip through like this, it happens. And really, a > 3 day turn-around-time to resolve this is pretty good, don't you think? Yes, but that doesn't make any difference on the fact that this was not marked for stable and I still think this is not a stable material - at least not at this moment. > It also seems like we need another test to catch this problem from ever > happening again :) Agreed on this. -- Michal Hocko SUSE Labs