lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <m1abq5y07f.fsf@ebiederm.dsl.xmission.com> Date: Fri, 26 Oct 2007 16:34:28 -0600 From: ebiederm@...ssion.com (Eric W. Biederman) To: "Kir Kolyshkin" <kir@...nvz.org> Cc: <containers@...ts.osdl.org>, <akpm@...ux-foundation.org>, <linux-kernel@...r.kernel.org>, <torvalds@...ux-foundation.org> Subject: Re: [Devel] [PATCH] pidns: Place under CONFIG_EXPERIMENTAL (take 2) "Kir Kolyshkin" <kir@...oft.com> writes: > Speaking of this particular patch -- I don't understand how you fix > "innumerable little bugs" by providing stubs instead of real functions. I think it would be a disaster to use pid namespaces as currently implemented 2.6.24-rc1 in a production environment. There are lots of little bugs and I am certain know one knows what they are all right now. Therefore not creating more then the initial pid namespace in a production environment sounds like the responsible thing to do for 2.6.24. This patch enables people to guarantee they don't run software that will create additional pid namespaces and expose them to the bugs we have not yet found, and it says look out. Don't mess with this unless you know what you are doing. That message of Look out be careful is what I really care about sending to users of the kernel. The best way I know to do that is to mark the feature (EXPERIMENTAL) and have a config option for the feature that depends on CONFIG_EXPERIMENTAL. Eric - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists