lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 11 Nov 2016 12:53:39 -0500
From:   Mike Marshall <hubcap@...ibond.com>
To:     Nikolaus Rath <Nikolaus@...h.org>
Cc:     Miklos Szeredi <mszeredi@...hat.com>,
        Andrew Gallagher <andrewjcg@...com>,
        lkml <linux-kernel@...r.kernel.org>,
        linux-fsdevel <linux-fsdevel@...r.kernel.org>
Subject: Re: commit d7afaec0b564f0609e116f5: fuse: add FUSE_NO_OPEN_SUPPORT
 flag to INIT

There was a memorable place in the Orangefs code where
the original programmer did that (pick something appropriate
from errno.h) and put in a comment about how it was a more
reasonable return code...

When Al Viro saw it, he said it was:

... stupid.  Expected error value is not EOPNOTSUPP; pardon the bluntness,
but your idea of what would be less misleading doesn't matter - what matters
is what the _callers_ of link(2), mknod(2), etc. are expecting.  Which is to
say, what does the userland code expect to get.  It's outright promised in
POSIX, actually.



On Fri, Nov 11, 2016 at 12:27 PM, Nikolaus Rath <Nikolaus@...h.org> wrote:
> On Nov 11 2016, Mike Marshall <hubcap@...ibond.com> wrote:
>> On Fri, Nov 11, 2016 at 11:28 AM, Nikolaus Rath <Nikolaus@...h.org> wrote:
>>> On Nov 11 2016, Miklos Szeredi <mszeredi@...hat.com> wrote:
>>>> On Fri, Nov 11, 2016 at 5:57 AM, Nikolaus Rath <Nikolaus@...h.org> wrote:
>>>>> On Nov 11 2016, Miklos Szeredi <mszeredi@...hat.com> wrote:
>>>>>> On Thu, Nov 10, 2016 at 11:31 PM, Nikolaus Rath <Nikolaus@...h.org> wrote:
>>>>>>> Hi Andrew,
>>>>>>>
>>>>>>> In commit d7afaec0b564f0609e116f5 you added a new FUSE_NO_OPEN_SUPPORT
>>>>>>> flag. But as far as I can tell, the flag is simply accepted without
>>>>>>> having any effect (including in libfuse).
>>>>>>>
>>>>>>> I tried to find related later commits, but did not find anything either.
>>>>>>>
>>>>>>> Am I missing something?
>>>>>>
>>>>>> Hmm, if fuse fs detects this flag, then it can return ENOSYS from open
>>>>>> resulting in this and subsequent opens succeeding without further
>>>>>> calls to userspace.    If fuse fs doesn't detect this flag, it should
>>>>>> not return -ENOSYS, as that will result in the open failing, it should
>>>>>> instead implement a no-op open method.
>>>>>
>>>>> That doesn't sound like a good approach to me. That way, the file system
>>>>> has to *know* that this flag has been introduced in order to behave
>>>>> correctly, i.e. filesystems that predate the introduction of the flag
>>>>> will suddenly behave differently.
>>>>>
>>>>> I think the correct behavior would be to for the kernel to check if
>>>>> userspace passed the flag, and treat ENOSYS specially if and only if the
>>>>> flag was passed.
>>>>
>>>> ENOSYS is not a valid return value for any existing syscall.  Fuse
>>>> uses that fact to attach this special meaning to ENOSYS.  So
>>>> compatibility is not an issue here, old filesystems should never
>>>> return ENOSYS from open.
>>>
>>> Oh, I was under the impression that any FUSE handler is free to return
>>> any error it wants. Where does one have to look to determine which
>>> return values are valid?
>>>
>> I try to choose error codes from the appropriate man
>> page when vfs calls into Orangefs with
>> whatever_operations.action... there's probably better
>> ways, like reading the vfs code and seeing what it
>> expects <g>...
>
> Yeah, I'd expect most people to do that. But FUSE file systems are often
> a little more exotic and produce error conditions that don't match well
> with any of the codes documented in the manpages. If there is no good
> fit, I'd expect that most people would (as I have done so far) simply
> pick something more appropriate from errno(3). If some of these codes
> are forbidden (or only a subset allowed) I'd really like to document
> this. It's not reasonable to expect every libfuse user to start browsing
> the Linux VFS code to determine if they can use a particular error code.
>
>
> Best,
> -Nikolaus
>
> --
> GPG encrypted emails preferred. Key id: 0xD113FCAC3C4E599F
> Fingerprint: ED31 791B 2C5C 1613 AF38 8B8A D113 FCAC 3C4E 599F
>
>              »Time flies like an arrow, fruit flies like a Banana.«

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ