lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 06 Feb 2014 08:18:49 +0800 From: Ian Kent <raven@...maw.net> To: harri@...ics.de Cc: bugzilla-daemon@...zilla.kernel.org, linux-ext4@...r.kernel.org, autofs@...r.kernel.org, Theodore Ts'o <tytso@....edu> Subject: Re: [Bug 53951] race condition on mounting local disks with autofs On Wed, 2014-02-05 at 12:49 -0500, Theodore Ts'o wrote: > Original bug report, from https://bugzilla.kernel.org/show_bug.cgi?id=53951: > > Harald Dunkel 2013-02-16 15:55:40 UTC > > I am using autofs to mount a local disk to /misc/data6 on > request. Problem: It seems that the first access silently fails, if > the disk is not yet mounted. Does it! Or is it the mix of system calls that are made, some of which won't trigger the mount and others that will. I know from experience that find(1) does a fairly unusual mix of these calls. Does it still happen if you append a "/" to /misc/data6. Since there are a number of system calls that won't trigger mounts, which is required to avoid mount storms, there needs to be some way to selectively force mount triggering and appending a "/" to a path is the way it's done (at least it should function that way). Mind you the mix of calls won't matter if the automount is mounted "nobrowse" since mount point directories that don't yet exist should trigger a mount on any access. The default installed autofs configuration sets this but if you wiped out the configuration and didn't retain that setting then the automount will be mounted "browse", the internal program default. What are you using for that setting? Ian -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists