lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <AANLkTimQQpBzBodQhZk3NANLHnZjbbxJsuwO9RjBhEcF@mail.gmail.com> Date: Sun, 20 Jun 2010 15:37:32 +0200 From: Kay Sievers <kay.sievers@...y.org> To: "Eric W. Biederman" <ebiederm@...ssion.com> Cc: Johannes Berg <johannes@...solutions.net>, Greg KH <greg@...ah.com>, netdev <netdev@...r.kernel.org> Subject: Re: [PATCH] Driver-core: Always create class directories fixing the broken network drivers. On Sun, Jun 20, 2010 at 14:29, Eric W. Biederman <ebiederm@...ssion.com> wrote: > Kay Sievers <kay.sievers@...y.org> writes: >> On Sun, Jun 20, 2010 at 13:33, Johannes Berg <johannes@...solutions.net> wrote: >>> On Sun, 2010-06-20 at 12:52 +0200, Kay Sievers wrote: >>> >>>> As mentioned earlier, It's pretty fragile to change things in this >>>> area, and I prefer the broken network driver-core interactions to be >>>> fixed instead - even when they are more complicated. >>> >>> Can you _please_ offer a proper way to fix it then? >> >> Sorry, I have no real experience with the issues created by the >> assumption that network driver need to be able to get unloaded while >> in use. That's very special, always requires a >> compiled-into-the-kernel part of the subsystem, and makes it hard to >> work with, as we can not use any of the usual core infrastructure to >> solve that. > > So please look at https://bugzilla.kernel.org/show_bug.cgi?id=16215 > > That simply creates and destroys the network device as things come > and go. I'm still not sure, any help here would be appreciated. > I think the bnep case is much more serious because it is real hardware > not a testing simulation, and it is the second instance of this. > > Calling the change broken when I can boot up and run X in that > configuration just fine is a vast overstatement. Oh, I seriously would love this rule - it would make my work so much easier. But I need to make it totally clear: "Adding intermediate directories into 'input' sysfs it absolutely broken, regardless if your box comes up or not. :) X is using udev, and udev aggressively hides these details and forbids matching such details, but many other tools which read sysfs directly, including ones using the conceptually broken 'device' symlink will for sure break with such changes. > Especially > when you don't acknowledge that the device layer is broken. Stacking devices from different classes is broken, and not a direct problem of the core. It is just not supported. The core might just need to refuse that in the first place, but that's a different issue. > I will agree that insane amounts of backwards compatibility are a good > idea. So I will cook up a version of my patch that adds a hack to the > device layer to only apply this change to devices of class net. > > That should save let us postpone the architectural dreams for another > day. It's not a dream, it needs to be fixed where it is used. We can not allow to stack classes. Kay -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists