lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 20 Aug 2009 09:48:08 -0500 From: Eric Sandeen <sandeen@...hat.com> To: "Aneesh Kumar K.V" <aneesh.kumar@...ux.vnet.ibm.com> CC: ext4 development <linux-ext4@...r.kernel.org> Subject: Re: RFC: guard against more "dangerous" userspace options Aneesh Kumar K.V wrote: > On Tue, Aug 11, 2009 at 03:43:24PM -0500, Eric Sandeen wrote: >> I'll keep it short and sweet: >> >> Can we add a consistent "--eatmydata" type of hurdle to jump over before >> people are allowed to use either the so-far-less-tested tools and/or >> options therein? >> >> I'm thinking of, so far: > ...... >> tune2fs -I <bigger> > > I have sent patches which should make this better. Any chance to get that reviwed and > applied > > -aneesh Better, or _safe_? :) No offense and I certainly appreciate that work. If you feel it's robust enough now to safely unleash on users, I'll drop it from my list. :) -Eric -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists