On Thu, 11 Oct 2012 00:42:56 +0400
Cyrill Gorcunov <[email protected]> wrote:

> The free_pid_ns function done in recursion fashion:
> 
> free_pid_ns(parent)
>   put_pid_ns(parent)
>     kref_put(&ns->kref, free_pid_ns);
>       free_pid_ns
> 
> thus if there was a huge nesting of namespaces the userspace
> may trigger avalanche calling of free_pid_ns leading to
> kernel stack exhausting and a panic eventually.
> 
> This patch turns the recursion into iterative loop.
> 
> v5 (from oleg@):
>  - Drop @ret variable
>  - Make put_pid_ns non-inline since it grows in size,
>    in turn make free_pid_ns static

OK, let's try that.  I'll sit on this until -rc2 to give it a bit of
time to cook.

A -stable backport might be needed.  What capabilities does userspace
need to be able to trigger the kernel stack overflow?
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to