lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87obfeivc3.fsf@xmission.com>
Date:	Wed, 20 Feb 2013 12:28:12 -0800
From:	ebiederm@...ssion.com (Eric W. Biederman)
To:	Alan Stern <stern@...land.harvard.edu>
Cc:	Li Fei <fei.li@...el.com>, <pavel@....cz>, <rjw@...k.pl>,
	<len.brown@...el.com>, <mingo@...hat.com>, <peterz@...radead.org>,
	<akpm@...ux-foundation.org>, <viro@...iv.linux.org.uk>,
	<gorcunov@...nvz.org>, <rientjes@...gle.com>,
	<linux-kernel@...r.kernel.org>, <linux-pm@...r.kernel.org>,
	<chuansheng.liu@...el.com>, <biao.wang@...el.com>
Subject: Re: [PATCH] freezer: configure user space process frozen along with kernel threads

Alan Stern <stern@...land.harvard.edu> writes:

> On Wed, 20 Feb 2013, Eric W. Biederman wrote:
>
>> Why can't the fuse filesystem freeze when there are requests pending?
>
> It _can_ freeze (that is, the fuse daemon can).  The problem is that
> tasks _using_ the fuse filsystem can't if the daemon doesn't respond. 

Which is what I meant when I said that the fuse filesystem couldn't
freeze.
 
> These tasks are stuck in uninterruptible wait states deep in the
> filesystem layer, probably holding important locks.  They can't be
> frozen until the outstanding requests complete.

Why is it that processes that can be preempted can't be frozen?

At most I would suggest that processes be frozen in reverse priority
order.  Which unless there is a priority inversion should solve this
problem without an additional proc file.

Adding a userspace interface that doesn't come close to doing the right
thing automatically and that is brittle and will likely fail in ways
even stranger and harder to track ways than fuse is failing today seems
like totally the wrong direction to go.  Not adding any permission
checks to the proc files just compounds the problem.

Eric
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ