From mboxrd@z Thu Jan 1 00:00:00 1970 From: Richard Weinberger Subject: Re: [PATCH][Resend v2] Fix infinite loop in search_binary_handler() Date: Tue, 5 Jul 2011 11:55:18 +0200 Message-ID: <201107051155.18465.richard@nod.at> References: <1309779003-8668-1-git-send-email-richard@nod.at> <201107050017.30365.richard@nod.at> <201107050124.p651OExY025046@www262.sakura.ne.jp> Mime-Version: 1.0 Content-Type: Text/Plain; charset="iso-2022-jp" Content-Transfer-Encoding: 7bit Cc: viro@zeniv.linux.org.uk, akpm@linux-foundation.org, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org To: Tetsuo Handa Return-path: In-Reply-To: <201107050124.p651OExY025046@www262.sakura.ne.jp> Sender: linux-kernel-owner@vger.kernel.org List-Id: linux-fsdevel.vger.kernel.org Am Dienstag 05 Juli 2011, 03:24:14 schrieb Tetsuo Handa: > Richard Weinberger wrote: > > With MAX_KMOD_CONCURRENT=3 it takes only a few seconds until > > the modprobe storm ends. > > OK. Many years ago, I got a few reports that the kernel panics after > printing > > request_module: runaway loop modprobe binfmt-464c > > line. This was because they installed by error a binary x86_32 kernel rpm > on x86_64 userland tools. So, this error is not specific to UML. > > > How shall we proceed? > > Applying my ad-hoc patch > > or lowering MAX_KMOD_CONCURRENT? > > What about disallowing request_module() for ____call_usermodehelper() > threads? This patch helps. But IMHO adding a new attribute to task_struct is a bit overkill. Why is your variant better than my strcmp() in fs/exec.c? Thanks, //richard