lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4EB145FB.70906@windriver.com>
Date:	Wed, 2 Nov 2011 08:30:35 -0500
From:	Jason Wessel <jason.wessel@...driver.com>
To:	David Decotigny <david.decotigny@...gle.com>
CC:	Randy Dunlap <rdunlap@...otime.net>,
	Rusty Russell <rusty@...tcorp.com.au>,
	<linux-doc@...r.kernel.org>, <linux-kernel@...r.kernel.org>,
	<kgdb-bugreport@...ts.sourceforge.net>,
	Greg Kroah-Hartman <gregkh@...e.de>,
	Michal Schmidt <mschmidt@...hat.com>,
	Richard Kennedy <richard@....demon.co.uk>,
	Linus Walleij <linus.walleij@...ricsson.com>,
	Dmitry Torokhov <dtor@...are.com>,
	Kay Sievers <kay.sievers@...y.org>,
	Lucas De Marchi <lucas.demarchi@...fusion.mobi>,
	Satoru Moriya <satoru.moriya@....com>,
	David Decotigny <decot@...gle.com>
Subject: Re: [PATCH v2 3/3] param: make /sys/module/*/paramaters optional

On 11/01/2011 06:50 PM, David Decotigny wrote:
> From: David Decotigny <decot@...gle.com>
>
> With this patch, we allow systems that don't want to pay the price for
> /sys/module/*/paramaters to be compiled without that feature. This
> abiltity can in turn encourage module developers to expose more of
> their parameters with fewer hesitations (eg. memory concerns, etc.);
> this is desirable to help debugging/auditing of live (larger) systems.
>
> The new knob to control that is CONFIG_SYSFS_MODULE_PARAM available in
> Kconfig in expert mode: File systems / Pseudo filesystems / sysfs file
> system support / Module parameters in sysfs. It is enabled by default,
> keeping /sys/module/*/paramaters/ available as before.
>
> As an illustration, on my copy I see 1658 module_param() macros with
> perm == 0: most of these could be exposed to user (perm != 0).

Speaking as an embedded developer who works on very small systems that you can still debug, I am really curious what you actually save here?

For dynamic kgdb/kdb this patch is a death sentence.  It would make us have to resurrect the procfs entries for the control point.  There is no possible way to dynamically turn kgdb on and off at all if you remove the /sys/module/kgdboc/parameters/kgdboc entry, and this is certainly something where the typical use case is dynamic enablement.

Jason.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ