Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp13822621ybl; Sun, 29 Dec 2019 21:50:30 -0800 (PST) X-Google-Smtp-Source: APXvYqy/QHymphVLWbJw+LYEONd1EciKJ5lU/umh5gC8NMaF2eGUOhuSSYaCT8B00BdZzQiW60Du X-Received: by 2002:a9d:6b91:: with SMTP id b17mr67025906otq.321.1577685030185; Sun, 29 Dec 2019 21:50:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577685030; cv=none; d=google.com; s=arc-20160816; b=xqva5lcn8/X0ebWAYBVav9AeZpCONIRh4pB9RIVZcwZu/7t5cEc+M3kgq9Q0H0hm3R yVCQ2mrE1qCvVuapPoUyQYiBpXBNO2/VLbRPRdJ8XXDT4j/9TbeHSxsdLOYZ/BDrvaKW jwmpO4dbwPPed9Wd6Rb35nO76+j4XpVaPF4ZlpN7sLv9M+2asZuY3yVwcM80XB1HDiAP vstBStH7ARIpx0fJb8ky4HnWqB7P/TGhQ3zu82wQwkz8BEOFEPhl4enRFKk+0LcD0+1j 7DWIFgxwyAmLwgZPQRc8NL+GgSBEafUpPlvangupXAIuxdvkT24Nwh+mKlmKcH8yE77Z wHOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=S4WXRzv4qD8SINgYhdWBVCM2r7RwUdHKO6OwWMNnFWY=; b=h7gV4Lz6uih7AXxOVGD/5WMU+pFky6ZOoKvJ6wMmsJBqWHC+T/oU3E7ZX2Pwu17QKR psWvo2MGdgHMFRTI61pBbCzIg6DWxcYL7hswWcl3NCGWOm6HykK1PzXY0/QLNFZr0NM0 +a+LTcy1Wj2WvRzn0wIsVeKOqOdVJdVxJ3xbRxGPmtxxMdczkCta4+Y+bl5sUCUzO+Sn pkGfENS9CedKYkZi78S8NrJIyg3zENq3gQrgtsF0t0iCqE37CGcmwFQg4WBvD87syhdr xey0DBAs+heqD1HQ3yoYsaQUbE8hLZrZVBSNkhiygvLyCrOJSmNT/7/mOFaSfwvu44Tk CV0A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t17si14901973oth.149.2019.12.29.21.50.19; Sun, 29 Dec 2019 21:50:30 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727228AbfL3Ft3 (ORCPT + 99 others); Mon, 30 Dec 2019 00:49:29 -0500 Received: from mout-p-202.mailbox.org ([80.241.56.172]:36948 "EHLO mout-p-202.mailbox.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727069AbfL3Ft3 (ORCPT ); Mon, 30 Dec 2019 00:49:29 -0500 Received: from smtp1.mailbox.org (smtp1.mailbox.org [80.241.60.240]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (No client certificate requested) by mout-p-202.mailbox.org (Postfix) with ESMTPS id 47mRMV2kFdzQlB0; Mon, 30 Dec 2019 06:49:26 +0100 (CET) X-Virus-Scanned: amavisd-new at heinlein-support.de Received: from smtp1.mailbox.org ([80.241.60.240]) by spamfilter06.heinlein-hosting.de (spamfilter06.heinlein-hosting.de [80.241.56.125]) (amavisd-new, port 10030) with ESMTP id Osl2T2x5pLfL; Mon, 30 Dec 2019 06:49:22 +0100 (CET) Date: Mon, 30 Dec 2019 16:49:13 +1100 From: Aleksa Sarai To: Al Viro Cc: David Howells , Eric Biederman , Linus Torvalds , stable@vger.kernel.org, Christian Brauner , Serge Hallyn , dev@opencontainers.org, containers@lists.linux-foundation.org, linux-api@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH RFC 0/1] mount: universally disallow mounting over symlinks Message-ID: <20191230054913.c5avdjqbygtur2l7@yavin.dot.cyphar.com> References: <20191230052036.8765-1-cyphar@cyphar.com> <20191230054413.GX4203@ZenIV.linux.org.uk> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="vstjrid4bmeb3iov" Content-Disposition: inline In-Reply-To: <20191230054413.GX4203@ZenIV.linux.org.uk> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --vstjrid4bmeb3iov Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On 2019-12-30, Al Viro wrote: > On Mon, Dec 30, 2019 at 04:20:35PM +1100, Aleksa Sarai wrote: >=20 > > A reasonably detailed explanation of the issues is provided in the patch > > itself, but the full traces produced by both the oopses and deadlocks is > > included below (it makes little sense to include them in the commit sin= ce we > > are disabling this feature, not directly fixing the bugs themselves). > >=20 > > I've posted this as an RFC on whether this feature should be allowed at > > all (and if anyone knows of legitimate uses for it), or if we should > > work on fixing these other kernel bugs that it exposes. >=20 > Umm... Are all of those traces > a) reproducible on mainline and This was on viro/for-next, I'll retry it on v5.5-rc4. > b) reproducible as the first oopsen? The NULL and garbage pointer derefs are reproducible as the first oops. Looking at my logs, it looks like the deadlocks were always triggered after the oops, but that might just have been a mistake on my part while testing things. > As it is, quite a few might be secondary results of earlier memory > corruption... Yeah, I thought that might be the case but decided to include them anyway (the /proc/self/stack RCU stall is definitely the result of other corruption and stalls). --=20 Aleksa Sarai Senior Software Engineer (Containers) SUSE Linux GmbH --vstjrid4bmeb3iov Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEABYIAB0WIQSxZm6dtfE8gxLLfYqdlLljIbnQEgUCXgmP1gAKCRCdlLljIbnQ En8yAP4heusqckPwVD1E6oISJdz6Un9hh96337R1CzO+HkhhwgEAwXuurrT9WDJY vzW4vyGjAMtEZpNg3y1cdnODYnBG6Qs= =FWL9 -----END PGP SIGNATURE----- --vstjrid4bmeb3iov--