lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160823154849.GA15892@thunk.org>
Date:   Tue, 23 Aug 2016 15:48:49 +0000
From:   tytso@....edu
To:     Marcos Mello <marcosfrm@...il.com>
Cc:     linux-ext4@...r.kernel.org
Subject: Re: Kernel does not respect tune2fs -E mount_opts=foo

The problem you are running into is not something we can fix,
unfortunately, or at least not in a full and general way.  The problem
is that there are certain mount options which are parsed by the mount
command (in userspace) and then translated to a mount flag, which is
then passed to the mount command as a bitmask, and which is
interpreted by the VFS layer before calling the file system.

The mount options field in the superblock is parsed by the ext4 file
system along with options that were not parsed by the mount binary,
passed to the VFS, which then passed it to ext4 file system driver.

In theory, we could interpret relatime in ext4 and replicate its
effects.  For relatime, this is trivial to do.  There may be other
mount options which are interepted by the mount userspace program, and
implemented in the VFS, where this would be much less easy to do.

> Other options like noacl, nouser_xattr, are ignored too. This
> filesystem is not listed in fstab.

This is exactly the same issue.

Cheers,

					- Ted
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ