lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <a36005b50704201217l649195f0q204c2434445e7160@mail.gmail.com>
Date:	Fri, 20 Apr 2007 12:17:02 -0700
From:	"Ulrich Drepper" <drepper@...il.com>
To:	"Andreas Gruenbacher" <agruen@...e.de>
Cc:	"Alan Cox" <alan@...rguk.ukuu.org.uk>, jjohansen@...e.de,
	linux-kernel@...r.kernel.org,
	linux-security-module@...r.kernel.org,
	linux-fsdevel@...r.kernel.org, chrisw@...s-sol.org,
	"Andrew Morton" <akpm@...ux-foundation.org>
Subject: Re: [d_path 0/7] Fixes to d_path: Respin

On 4/20/07, Andreas Gruenbacher <agruen@...e.de> wrote:
> The code also seems to stop at the first matching mount point. You can have
> the same device mounted on the same mount point multiple times but with
> different mount options, e.g., [...]

You can unfortunately do many stupid things.  That's the user's
problem.  The point is that everything works fine in an environment
which does not have such bogus mounts.  Namespaces are also the
problem of somebody else.  The people who came up with them didn't
think about the ramifications.  None of these problems can be
reasonably and reliably fixed with more support from the kernel.


> I gave a chroot example that showed that in the current
> implementation, you can get pretty random clashes between mounts; there are
> other cases with lazy unmounts as well.

Irrelevant as well.  If you create chroot problems it's your problem.

The fact is that if you have a normal setup the code works fine.  All
other situations cannot be handled with the current kernel interface.

This does not give anybody the right to say "since the code doesn't
always work we can break it completely".  That's completely
unacceptable.

If you want to improve the situation, do it.  Provide a solution for
the problems we are having in implementing statvfs.  Then we can talk
about stopping to use /proc/mounts for statvfs and you can change it
in a way which would harm the old implementation.  That's *my* view,
but I know there will be lots of people who would even object to that.
 The /proc filesystem is part of the kernel API and cannot be lightly
broken.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ