lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20101230115012.07fa8ec8@notabene.brown>
Date:	Thu, 30 Dec 2010 11:50:12 +1100
From:	Neil Brown <neilb@...e.de>
To:	Olaf van der Spek <olafvdspek@...il.com>
Cc:	Christian Stroetmann <stroetmann@...olinux.com>,
	linux-fsdevel <linux-fsdevel@...r.kernel.org>,
	linux-ext4 <linux-ext4@...r.kernel.org>,
	"Ted Ts'o" <tytso@....edu>, Nick Piggin <npiggin@...il.com>
Subject: Re: Atomic non-durable file write API

On Wed, 29 Dec 2010 18:14:04 +0100 Olaf van der Spek <olafvdspek@...il.com>
wrote:

> On Wed, Dec 29, 2010 at 5:30 PM, Christian Stroetmann
> <stroetmann@...olinux.com> wrote:
> >> Additional steps compared to what? The temp file, fsync, rename case?
> >
> > read the paragraphs as a whole
> 
> Reading stuff again isn't going to change my question.
> 

OK, the fun I over.  I guess it is time to actually answer your question,
rather than just teasing you with partial answers and hints about performance
impact ....

Your question, as I understand it is:

   You see a hypothetical problem for which you cannot see a solution in
   Linux, but for which you also cannot present a concrete use-case where
   this problem needs to be addresses.
   You want to know what the recommended solution is.


   The reality is that the solution was devises and implemented many years ago
   and is deeply embedded in the core design principles of Unix and Linux.
   The reason that you cannot present a use-case is that there isn't one.
   Unix was design so that this hypothetical need will never arise.

   There is a strong parallel with computer viruses.  You could say "viruses
   could be a problem, and while I cannot actually present one that is a
   problem, I want to know what the recommended solution to viruses is"
   The answer is, of course, that Unix/Linux is largely immune to viruses,
   not because of any specific anti-virus feature that was designed and
   implemented, but because the over-all design approach of Unix makes
   viruses hard to spread and rather ineffectual if one ever did take hold.

At least, I think that is the correct answer.  However if you actually have
a concrete use-case, then maybe there is a better answer.  I wouldn't know
without seeing the use-case.


(And I was joking about the teasing and the hints - it just seemed to make a
better story if I told it that way :-)

NeilBrown
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ