lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Sat, 3 Sep 2016 11:01:58 -0700
From:   Linus Torvalds <torvalds@...ux-foundation.org>
To:     Dmitry Torokhov <dmitry.torokhov@...il.com>
Cc:     "open list:DOCUMENTATION" <linux-doc@...r.kernel.org>,
        cocci@...teme.lip6.fr, Jacek Anaszewski <j.anaszewski@...sung.com>,
        David Woodhouse <dwmw2@...radead.org>,
        Christian Lamparter <chunkeey@...glemail.com>,
        Julia Lawall <Julia.Lawall@...6.fr>,
        Andrew Morton <akpm@...ux-foundation.org>,
        linuxppc-dev <linuxppc-dev@...ts.ozlabs.org>,
        Mimi Zohar <zohar@...ux.vnet.ibm.com>,
        Andy Lutomirski <luto@...capital.net>,
        Richard Purdie <rpurdie@...ys.net>,
        Wu Fengguang <fengguang.wu@...el.com>,
        Johannes Berg <johannes@...solutions.net>,
        "Luis R. Rodriguez" <mcgrof@...nel.org>,
        Michal Marek <mmarek@...e.com>,
        Hauke Mehrtens <hauke@...ke-m.de>,
        Mark Brown <broonie@...nel.org>, Jiri Slaby <jslaby@...e.com>,
        Ming Lei <ming.lei@...onical.com>,
        Daniel Vetter <daniel.vetter@...ll.ch>,
        Kevin Cernekee <cernekee@...il.com>,
        Jeff Mahoney <jeffm@...e.com>,
        Greg KH <gregkh@...uxfoundation.org>,
        Bjorn Andersson <bjorn.andersson@...aro.org>,
        Jonathan Corbet <corbet@....net>, Felix Fietkau <nbd@....name>,
        David Howells <dhowells@...hat.com>,
        Vikram Mulukutla <markivx@...eaurora.org>,
        Alessandro Rubini <rubini@...dd.com>,
        Tom Gundersen <teg@...m.no>, Kees Cook <keescook@...omium.org>,
        Takashi Iwai <tiwai@...e.de>, Gilles.Muller@...6.fr,
        linux-serial <linux-serial@...r.kernel.org>,
        Roman Pen <r.peniaev@...il.com>, Kay Sievers <kay@...y.org>,
        Stephen Boyd <stephen.boyd@...aro.org>, nicolas.palix@...g.fr,
        "Abhay_Salunke@...l.com" <Abhay_Salunke@...l.com>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        Thierry Martinez <martinez@...p.org>,
        Josh Boyer <jwboyer@...oraproject.org>
Subject: Re: [RFC] fs: add userspace critical mounts event support

On Sat, Sep 3, 2016 at 10:49 AM, Dmitry Torokhov
<dmitry.torokhov@...il.com> wrote:
>
> Unfortunately module loading and availability of firmware is very
> loosely coupled.

The whole "let's add a new magical proc entry to say that all
filesystems are mounted" is all about the user space coupling them.

I'm just saying that if user space must know about when firmware is
ready to be loaded anyway, just do it rigth. Not with some hacky "you
can now do random things" flag. But by having user space actually say
"put this module together with this firmware".

If you just put the two pieces together, then the module "will just work".

And quite frankly, that sounds like a much better maintenance practice
anyway. If some module doesn't work without the firmware, then dammit,
the two *should* go together. Putting them in two different places
would be *INSANE*.

                    Linus

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ