lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Sun, 4 May 2008 23:42:46 -0400
From:	Ulrich Drepper <drepper@...hat.com>
To:	linux-kernel@...r.kernel.org, netdev@...r.kernel.org
Cc:	akpm@...ux-foundation.org, davidel@...ilserver.org,
	mtk.manpages@...il.com, torvalds@...ux-foundation.org
Subject: [PATCH 00/18] flag parameters

This series replaces the individual patches I sent out before.  They
introduce changes for all the file descriptor-generating syscalls which
do not have a flags parameter (or where it is not handled).

I think I addressed all the comments people made on the previous patches.
New in this series is support for pipe and inotify_init.  These are
straight-forward extensions like the rest.  Both require new userlevel
interfaces, though.  We need new userlevel interfaces for:

 - paccept
 - epoll_create2
 - dup3
 - pipe2
 - inotify_init1

We do /not/ need new interfaces for

 - signalfd4
 - eventfd2
 - timerfd_create
 - socket
 - socketpair

These either have flags parameters in the interface exported by glibc
or (in case of the socket functions) overload a parameter with a bitset.

In addition to support for setting the close-on-exec flag I also added
support to set the non-blocking mode.  This is how most modern, scalable
code should work and adding the support comes almost for free.  Support
to enable non-blocking is not added for dup3 (for obvious reasons)
and epoll_create2.  For the latter I have not found any support in the
kernel.  In case I missed something let me know and  I'll add the few
lines of code.

Each semantic change has a test program.  For archs other than x86 and
x86-64 you'll have to add the appropriate syscall number.

The patches all apply individually in sequence and the source tree
remains compilable and runnable.

Regarding the little mapping tables for the flags.  There are multiple
copies with the same values (for now).  We could play tricks for mergable
ELF sections to avoid this minimal duplication.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ