From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754757AbcAVVWB (ORCPT ); Fri, 22 Jan 2016 16:22:01 -0500 Received: from zeniv.linux.org.uk ([195.92.253.2]:53160 "EHLO ZenIV.linux.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752289AbcAVVWA (ORCPT ); Fri, 22 Jan 2016 16:22:00 -0500 Date: Fri, 22 Jan 2016 21:21:57 +0000 From: Al Viro To: Dmitry Vyukov Cc: David Howells , LKML , Miklos Szeredi , syzkaller , Kostya Serebryany , Alexander Potapenko , Eric Dumazet , Sasha Levin , Robert Swiecki , Kees Cook Subject: Re: fs: sandboxed process brings host down Message-ID: <20160122212157.GG17997@ZenIV.linux.org.uk> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jan 22, 2016 at 10:06:14PM +0100, Dmitry Vyukov wrote: > Hello, > > While running syzkaller fuzzer I hit the following problem. Supervisor > process sandboxes worker processes that do random activities with > CLONE_NEWUSER | CLONE_NEWNS | CLONE_NEWPID | CLONE_NEWUTS | > CLONE_NEWNET | CLONE_NEWIPC | CLONE_IO, setrlimit, chroot, etc. > Because of that worker process gains ability to bring whole machine > down (does not happen without the sandbox). AFAICS, what you are doing is essentially mount --rbind / / in infinite loop in luserns. Which ends up eating all memory. There's any number of ways to do the same. We can play whack-a-mole with them until the kernel is completely ossified with accounting code of different sorts. Or one can disable userns and be done with that.