Date of linux-2.4.36 wrong

2008-01-11 Thread David Newall
Heads up: linux-2.4.36 on kernel.org is dated 01/01/07 (ie six months before linux-2.4.35.) Surely a mistake. -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [RFC][PATCH] per-task I/O throttling

2008-01-11 Thread David Newall
Andrea Righi wrote: [I/O-intensive] processes can noticeably impact the system responsiveness for some time and playing with tasks' priority is not always an acceptable solution. Why? -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL

Re: Wasting our Freedom

2007-09-17 Thread David Newall
Jacob Meuser wrote: when I see the linux community start to take credit for works they did not create and I see the linux community respond to warnings that people in the community are going overboard and jeopardizing the linux community, which we do all benefit from, with a more or less

Re: sys_chroot+sys_fchdir Fix

2007-09-19 Thread David Newall
Normal users cannot use chroot() themselves so they can't use chroot to get back out I think Bill is right, that this is to fix a method that non-root processes can use to escape their chroot. The exploit, which is documented in chroot(2)*, is to chdir(..) your way out. Who'd have thought

Re: sys_chroot+sys_fchdir Fix

2007-09-20 Thread David Newall
Philipp Marek wrote: - User starts a small wrapper, - that opens /, - chroot()s into a directory and starts fsvs. - fsvs gets its libraries loaded - and chroot()s back to the original system. Isn't that what pivot_root was meant for? - To unsubscribe from this list: send the line unsubscribe

Re: sys_chroot+sys_fchdir Fix

2007-09-20 Thread David Newall
Philipp Marek wrote: AFAIK pivot_root() changes the / mapping for *all* processes, no? The manual page is confusing. It even admits to being intentionally vague. However the goal seems clear: pivot_root() moves the root file system of the current process to the directory put_old

Re: [poll] Is the megafreeze development model broken?

2007-11-13 Thread David Newall
Tuomo Valkonen wrote: Well, I'm using two years old 2.6.7 kernel, because the newer ones have become utter and total crap. (See the link in the previous post.) It will likely be my last Linux kernel ever, that I will use until this system becomes simply too obsolete, at which point, if not

Re: High priority tasks break SMP balancer?

2007-11-16 Thread David Newall
There are a couple of points I would make about your python test harness. Your program compares real+system jiffies for both cpus; an ideal result would be 1.00. The measurement is taken over a relatively short period of approximately a half-second, and you kill the CPU hogs before taking

DMA4 reserved for cascade

2007-11-19 Thread David Newall
There seems something too-specific to PC-architecture in kernel/dma.c, which is that DMA4 is reserved for cascade. Perhaps it should be reserved in architecture-specific initialisation. What do other architectures do with that? - To unsubscribe from this list: send the line unsubscribe

Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.

2007-12-16 Thread David Newall
Tetsuo Handa wrote: If Bob is malicious and creates /dev/sda1 with block-8-2 attribute [...] Bob can't do that. Only root can. -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at

Re: /dev/urandom uses uninit bytes, leaks user data

2007-12-17 Thread David Newall
Theodore Tso wrote: On Mon, Dec 17, 2007 at 07:52:53PM -0500, Andy Lutomirski wrote: It runs on a freshly booted machine (no DSA involved, so we're not automatically hosed), so an attacker knows the initial pool state. Not just a freshly booted system. The system has to be a

Re: /dev/urandom uses uninit bytes, leaks user data

2007-12-17 Thread David Newall
Theodore Tso wrote: On Tue, Dec 18, 2007 at 01:43:28PM +1030, David Newall wrote: On a server, keyboard and mouse are rarely used. As you've described it, that leaves only the disk, and during the boot process, disk accesses and timing are somewhat predictable. Whether this is sufficient

Re: RFC: permit link(2) to work across --bind mounts ?

2007-12-18 Thread David Newall
Mark Lord wrote: But.. pity there's no mount flag override for smaller systems, where bind mounts might be more useful with link(2) actually working. I don't see it. You always can make hard link on the underlying filesystem. If you need to make it on the bound mount, that is, if you can't

Re: RFC: permit link(2) to work across --bind mounts ?

2007-12-19 Thread David Newall
Mark Lord wrote: David Newall wrote: Mark Lord wrote: But.. pity there's no mount flag override for smaller systems, where bind mounts might be more useful with link(2) actually working. I don't see it. You always can make hard link on the underlying filesystem. If you need to make

Re: almost daily Kernel oops with 2.6.23.9 - and now 2.6.23.11 as well

2007-12-20 Thread David Newall
On Montag, 17. Dezember 2007, you wrote: and another one, this time tainted with the nvidia module: 5194.130985] Unable to handle kernel paging request at 0300 RIP: Numbers like that don't suggest hardware faults. All those zeros: It's far too round. Sounds very like software.

Re: Kernel bug: bluetooth meets TTY layer

2007-12-20 Thread David Newall
Hi Arjan, I've not been able to find this file, drivers/bluetooth/hci_tty.c, but anyway, This seems to be what happens: Hci_uart_close() flushes using hci_uart_flush(). Subsequently, in hci_dev_do_close(), (one step in hci_unregister_dev()), hci_uart_flush() is called again. The comment in

Re: Trailing periods in kernel messages

2007-12-21 Thread David Newall
David Miller wrote: From: Jan Engelhardt [EMAIL PROTECTED] Date: Fri, 21 Dec 2007 11:10:38 +0100 (CET) Can we get back to programming? With respect to the vast majority of log messages, nobody confounded by punctuation is truly trying to analyze a problem! -- To unsubscribe from this

Re: Trailing periods in kernel messages

2007-12-21 Thread David Newall
David Miller wrote: From: David Newall [EMAIL PROTECTED] Date: Sat, 22 Dec 2007 00:13:07 +1030 David Miller wrote: From: Jan Engelhardt [EMAIL PROTECTED] Date: Fri, 21 Dec 2007 11:10:38 +0100 (CET) Can we get back to programming? With respect to the vast majority

Re: Testing RAM from userspace / question about memmap= arguments

2007-12-22 Thread David Newall
Pavel Machek wrote: On Sat 2007-12-22 13:42:47, Richard D wrote: Cant you, modify bootmem allocator to test with memtest patterns and then use kexec (as Pavel suggested) to test the one where kernel was sitting earlier? I do not think you need to modify anything in kernel. Just use

Re: Testing RAM from userspace / question about memmap= arguments

2007-12-22 Thread David Newall
Pavel Machek wrote: memtest has following problems: 0) it is kind of hard to run memtest over ssh It's kind of hard to run anything over SSH if it has to be run before userspace is up. But the kernel can collect results from a modified memtest, after it chains back.

Re: Testing RAM from userspace / question about memmap= arguments

2007-12-22 Thread David Newall
Pavel Machek wrote: On Sun 2007-12-23 07:06:58, David Newall wrote: It's kind of hard to run anything over SSH if it has to be run before userspace is up. But the kernel can collect results from a modified memtest, after it chains back. memtest can be ran from userspace, that's

Re: Kernel Development Objective-C

2007-11-30 Thread David Newall
Jan Engelhardt wrote: On Nov 30 2007 11:20, Xavier Bestel wrote: On Fri, 2007-11-30 at 19:09 +0900, KOSAKI Motohiro wrote: Has Objective-C ever been considered for kernel development? Why not C# instead ? Why not Haskell nor Erlang instead ? :-D I heard of

Re: Kernel Development Objective-C

2007-12-01 Thread David Newall
Chris Snook wrote: Ben Crowhurst wrote: Has Objective-C ever been considered for kernel development? No. Kernel programming requires what is essentially assembly language with a lot of syntactic sugar, which C provides. I somewhat disagree. Kernel programming requires and deserves the

Re: New Address Family: Inter Process Networking (IPN)

2007-12-05 Thread David Newall
Kyle Moffett wrote: On Dec 06, 2007, at 00:30:16, Renzo Davoli wrote: AF_IPN is different. AF_IPN is the broadcast and peer-to-peer extension of AF_UNIX. It supports communication among *user* processes. Ok, you say it's different, but then you describe how IP unicast and broadcast work.

Re: New Address Family: Inter Process Networking (IPN)

2007-12-06 Thread David Newall
Andi Kleen wrote: Renzo also described something new (in the socket() arena): the multi-reader, multi-writer is just not available in IP. How is that different from a multicast group? Good question. I don't know much about multicast IP. It's a bit new for me. I knew it uses

Re: Is it possible to give the user the option to cancel forkbombs?

2007-11-22 Thread David Newall
(``-_-´´) -- Fernando wrote: I used to see stuff like this happening on my University students test servers. Once they started doing forks inside for(;;), the server would go down. Then they replaced the servers by vwmare machines, and now reboots are faster. UNIX (and Linux) already has a

Re: 2.6.24: Serial disabled in BIOS but serial modules still loaded (probably PnP related)

2007-11-24 Thread David Newall
Michael H. Warfield wrote: On Sat, 2007-11-24 at 23:36 +0300, Andrey Borzenkov wrote: I have no COM port on notebook (without port replicator which I do not have) so COM is disabled in BIOS. No ttyS* is detected during boot (and no device created) but I just noticed that serial modules are

Re: Small System Paging Problem - OOM-killer goes nuts

2007-11-26 Thread David Newall
Josh Goldsmith wrote: The problem comes when I try to untar a large file (in this case linux-2.6.23.tar.bz2). Regardless if I kill off every other process, eventually the oom-killer will appear and kill either the tar or the shell. What's the actual command you are executing? - To

Re: Small System Paging Problem - OOM-killer goes nuts

2007-11-26 Thread David Newall
Josh Goldsmith wrote: David: The exact command this time was a tar jxf linux-2.6.23.tar.bz2 as part of an emerge (gentoo). Gnu tar version 1.18 but has happened with prior versions too. I replicated it after my post by manually untarring it on the command line and can almost always

Re: help

2007-12-10 Thread David Newall
Thanos Chatziathanassiou wrote: help I KNOW OF PLACES, ACTIONS, AND THINGS. MOST OF MY VOCABULARY DESCRIBES PLACES AND IS USED TO MOVE YOU THERE. TO MOVE TRY WORDS LIKE FOREST, BUILDING, DOWNSTREAM, ENTER, EAST, WEST NORTH, SOUTH, UP, OR DOWN. I KNOW ABOUT A FEW SPECIAL OBJECTS, LIKE A BLACK

Re: RFC: outb 0x80 in inb_p, outb_p harmful on some modern AMD64 with MCP51 laptops

2007-12-10 Thread David Newall
Where did the 8us delay come from? The documentation and source is careful not to say how long the delay is. Would changing it to, say 1us, be technically wrong? Is code that requires 8us correct? -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a

Re: RFC: outb 0x80 in inb_p, outb_p harmful on some modern AMD64 with MCP51 laptops

2007-12-10 Thread David Newall
H. Peter Anvin wrote: David Newall wrote: Where did the 8us delay come from? The documentation and source is careful not to say how long the delay is. Would changing it to, say 1us, be technically wrong? Is code that requires 8us correct? I think a single ISA bus transaction is 1 µs, so

Re: RFC: outb 0x80 in inb_p, outb_p harmful on some modern AMD64 with MCP51 laptops

2007-12-11 Thread David Newall
Rene Herman wrote: On 11-12-07 08:40, Paul Rolland wrote: Well, if the delay is so much unspecified, what about _reading_ port 0x80 ? Will the delay be shorter ? The delay is completely and fully specified in terms of the ISA/LPC clock That would be the delay on the i386 (sic)

Re: RFC: outb 0x80 in inb_p, outb_p harmful on some modern AMD64 with MCP51 laptops

2007-12-11 Thread David Newall
Rene Herman wrote: This particular discussion isn't about anything in general but solely about the delay an outb_p gives you on x86 since what is under discussion is not using an output to port 0x80 on that platform to generate it. That could be true if outb_p were used only in architecture

Re: [RESULTS] Port 0x80 I/O speed

2007-12-12 Thread David Newall
linux-os (Dick Johnson) wrote: But there are some things that get set up long before udelay() is calibrated! The interrupt controllers, the timer, etc. You can't just substitute or you will end up with machines that won't boot! The initial value could be set conservatively high. -- To

Re: RFC: outb 0x80 in inb_p, outb_p harmful on some modern AMD64 with MCP51 laptops

2007-12-12 Thread David Newall
Alan Cox wrote: without need. Not surprising since it has such a vague specific meaning. One could say, Linux on i386 is liberally sprinkled with vague specific ? sorry don't follow you. The _p variants are a universal fixture, defined as ending with a pause, but without

Re: printf internals

2007-12-13 Thread David Newall
Siva Prasad wrote: I am looking at how exactly does the printf in user programs succeeds in displaying characters to the serial console. Is it a student assignment? This is so not the right mailing list. -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a

Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.

2007-12-16 Thread David Newall
Tetsuo Handa wrote: /dev needs to be writable, but this means that files on /dev might be tampered with. I infer that you mean /dev needs to be writable by anyone, not by just its owner or owner and group (conventionally root/root.) This goes against conventional wisdom, which is that

Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.

2007-12-16 Thread David Newall
Tetsuo Handa wrote: David Newall wrote: Tetsuo Handa wrote: /dev needs to be writable, but this means that files on /dev might be tampered with. I infer that you mean /dev needs to be writable by anyone, not by just its owner or owner and group (conventionally root/root

Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.

2007-12-16 Thread David Newall
Tetsuo Handa wrote: I meant that /dev must be mounted for read-write mode Again, why? You won't be able to login to the system because /sbin/mingetty fails to chown/chmod /dev/tty* if /dev is mounted for read-only mode. Good point. So, if only root can modify files in /dev,

Re: RFC: permit link(2) to work across --bind mounts ?

2007-12-29 Thread David Newall
dean gaudet wrote: On Wed, 19 Dec 2007, David Newall wrote: Mark Lord wrote: But.. pity there's no mount flag override for smaller systems, where bind mounts might be more useful with link(2) actually working. I don't see it. You always can make hard link on the underlying

Re: RFC: permit link(2) to work across --bind mounts ?

2007-12-29 Thread David Newall
dean gaudet wrote: Pffuff. That's what volume managers are for! You do have (at least) two independent spindles in your RAID1 array, which give you less need to worry about head-stack contention. this system is write intensive and writes go to all spindles, so you're assertion is wrong.

Re: [2.6.25 patch] remove a.out interpreter for ELF executables

2008-01-05 Thread David Newall
On Tue, 1 Jan 2008 15:36:32 +0100 Andi Kleen [EMAIL PROTECTED] wrote: ftp://ftp.firstfloor.org/pub/ak/x86_64/quilt/patches/remove-aout-interpreter Also removal of the old unused iBCS hooks while I was on it ftp://ftp.firstfloor.org/pub/ak/x86_64/quilt/patches/remove-ibcs-support Is iBCS

Re: Linux machines dieing in swap storms

2007-10-25 Thread David Newall
Richard Purdie wrote: I've got a problem I keep running into. My computers have buggy software which can sometimes run out of control. Ulimit them. - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at

Re: Linux Security *Module* Framework (Was: LSM conversion to static interface)

2007-11-01 Thread David Newall
Jan Engelhardt wrote: On Nov 1 2007 12:51, Peter Dolding wrote: This is above me doing code. No matter how many fixes I do to the core that will not fix dysfunction in the LSM section. Strict policies on fixing the main security model will be required. If there is no one wanting to

Re: [RFC PATCH 0/5] Shadow directories

2007-10-18 Thread David Newall
Jaroslav Sykora wrote: Let's say we have an archive file hello.zip with a hello world program source code. We want to do this: cat hello.zip^/hello.c gcc hello.zip^/hello.c -o hello etc.. Wouldn't you do this as a user space filesystem? - To unsubscribe from this

Re: [RFC PATCH 0/5] Shadow directories

2007-10-18 Thread David Newall
David Newall wrote: Jaroslav Sykora wrote: Let's say we have an archive file hello.zip with a hello world program source code. We want to do this: cat hello.zip^/hello.c gcc hello.zip^/hello.c -o hello etc.. Wouldn't you do this as a user space filesystem? Which is what you

Re: [RFC PATCH 0/5] Shadow directories

2007-10-18 Thread David Newall
David Newall wrote: David Newall wrote: Jaroslav Sykora wrote: Let's say we have an archive file hello.zip with a hello world program source code. We want to do this: cat hello.zip^/hello.c gcc hello.zip^/hello.c -o hello etc.. Wouldn't you do this as a user space filesystem

Re: [RFC PATCH 0/5] Shadow directories

2007-10-18 Thread David Newall
Jaroslav Sykora wrote: If anybody can think of any other solution of the redirector problem, possibly even non-kernel based one, let me know and I'd be glad :-) If I understand your problem, you wish to treat an archive file as if it was a directory. Thus, in the ideal situation, you could

Re: [RFC PATCH 0/5] Shadow directories

2007-10-18 Thread David Newall
Al Viro wrote: On Fri, Oct 19, 2007 at 06:07:45AM +0930, David Newall wrote: considerations of this whole scheme. Linux, like most Unix systems, has never allowed hard links to directories for a number of reasons; The claim is wrong. UNIX systems have traditionally allowed

Re: [PATCH] USB: mark USB drivers as being GPL only

2008-02-08 Thread David Newall
Greg KH wrote: A driver is not an application as you tried to reference in your prior quotes. I think your treating what the learned Professors said to literally. It is a tiny portion of the whole kernel, The Copyright Act draws no such a distinction. and as such, does fall under the

Handshaking on USB serial devices

2008-02-13 Thread David Newall
Consider a USB-attached serial port that is set to do RTS/CTS (or DSR/DTR) handshaking: What stops the kernel sending more data to it when the remote end lowers CTS (or DTR)? -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More

Re: Handshaking on USB serial devices

2008-02-14 Thread David Newall
Greg KH wrote: On Thu, Feb 14, 2008 at 01:15:37AM +1030, David Newall wrote: Consider a USB-attached serial port that is set to do RTS/CTS (or DSR/DTR) handshaking: What stops the kernel sending more data to it when the remote end lowers CTS (or DTR)? The tty layer should look

Re: Handshaking on USB serial devices

2008-02-14 Thread David Newall
Alan Cox wrote: To make it clear: Even aside from the buffer in 2.6's pl2303.c, there's a race: An in-flight write URB can fill all hardware buffers, making unsafe what previously appeared to be a safe write. I think it's essential to delay submission of the URB on a stop-transmit condition.

Re: Feature Removals for 2.6.25

2008-02-14 Thread David Newall
Arjan van de Ven wrote: Bill Davidsen wrote: Note that because the hardware is old, it's highly likely that most of it will be retired before that sk98lin driver needs a change. I can't see anyone using sk98lin on a new system, so it would be less contentious to let the hardware (or users)

Re: Handshaking on USB serial devices

2008-02-14 Thread David Newall
Alan Cox wrote: byte of a packet is being thrown away about .1% of the time for the pl2303, but I'm not sure if the FTDI driver still suffers from a similar rash. I A 20 byte low speed message is too small for flow control to account for it. I agree. I've observed the first byte of

Re: Handshaking on USB serial devices

2008-02-14 Thread David Newall
Greg KH wrote: On Thu, Feb 14, 2008 at 07:55:44PM +1030, David Newall wrote: The current 2.6 driver maintains it's own buffer. I think that's a bad thing: usbserial already buffers writes, and the extra buffer copy seems unnecessary, however it does solve the putchar problem. Buffered

Re: sys_chroot+sys_fchdir Fix

2007-09-21 Thread David Newall
Bill Davidsen wrote: there is no question that pivot_root is intended to have breadth for more than one process. I think it's clear from the man page that the original idea was to be able to pivot_root for individual processes. The reason it doesn't do that, the reason it affects all

Re: 2.6.23-rc7 - _random_ IRQ23 : nobody cared

2007-09-24 Thread David Newall
Paul Rolland (???) wrote: Hell, IRQ 23 is shared between libata and my modem !!! Tried using the modem? - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at

Re: bug in fsck or ext2/ext3?

2007-09-24 Thread David Newall
Dave Jones wrote: On Mon, Sep 24, 2007 at 05:56:39PM +0100, Antoine Martin wrote: # rm -fr tmp/chroot.broken rm: cannot remove directory (...) Same result when trying to do anything to those files chown/chmod/touch: Operation not permitted Various files in the directories it complains

Re: sys_chroot+sys_fchdir Fix

2007-09-24 Thread David Newall
Serge E. Hallyn wrote: No reason for any new parameters to pivot_root. Just clone your mounts namespace first. unshare(CLONE_NEWNS); chdir(new_dir); pivot_root(new_dir, oldroot); Since pivot_root actually fiddles with the vfsmnts, this is really the only way to go

Re: sys_chroot+sys_fchdir Fix

2007-09-25 Thread David Newall
Serge E. Hallyn wrote: Quoting David Newall ([EMAIL PROTECTED]): It might be tidy if pivot_root could be used (instead of a hack based on a chroot bug), but it'd still be unportable. It can. Please re-read my previous msg. I read it. Currently pivot_root can't be used to affect

Re: sys_chroot+sys_fchdir Fix

2007-09-25 Thread David Newall
Serge E. Hallyn wrote: Quoting David Newall ([EMAIL PROTECTED]): Serge E. Hallyn wrote: Quoting David Newall ([EMAIL PROTECTED]): It might be tidy if pivot_root could be used (instead of a hack based on a chroot bug), but it'd still be unportable. It can

Chroot bug (was: sys_chroot+sys_fchdir Fix)

2007-09-25 Thread David Newall
Miloslav Semler pointed out that a root process can chdir(..) out of its chroot. Although this is documented in the man page, it conflicts with the essential function, which is to change the root directory of the process. In addition to any creative uses, for example Philipp Marek's loading

Re: Chroot bug

2007-09-25 Thread David Newall
Alan Cox wrote: Marek's loading dynamic libraries, it seems clear that the prime purpose of chroot is to aid security. Being able to cd your way out is handy Does it - I can't find any evidence for that. It seems self-evident to me. What do you think is it prime purpose? A root

Re: Chroot bug

2007-09-25 Thread David Newall
Jan Engelhardt wrote: On Sep 26 2007 00:40, David Newall wrote: Miloslav Semler pointed out that a root process can chdir(..) out of its chroot. So what? Just do this: chdir into the root after chroot. I don't think so. His exploit just got me all the way out of a chroot within

Re: Chroot bug

2007-09-25 Thread David Newall
Jan Engelhardt wrote: On Sep 26 2007 01:11, David Newall wrote: Jan Engelhardt wrote: On Sep 26 2007 00:40, David Newall wrote: Miloslav Semler pointed out that a root process can chdir(..) out of its chroot. So what? Just do this: chdir into the root after chroot

Re: Chroot bug

2007-09-25 Thread David Newall
Alan Cox wrote: On Wed, 26 Sep 2007 01:05:07 +0930 David Newall [EMAIL PROTECTED] wrote: Alan Cox wrote: Marek's loading dynamic libraries, it seems clear that the prime purpose of chroot is to aid security. Being able to cd your way out is handy Does it - I can't find

Re: Chroot bug

2007-09-26 Thread David Newall
Alan Cox wrote: Good call. Though I suppose, since it's used 24x7 to aid security on countless production servers, that security dwarfs testing. Still, debugging, yes that's valid. I don't suppose it makes and difference; whatever the purpose, a chroot that doesn't change the root is

Re: Chroot bug

2007-09-26 Thread David Newall
Kyle Moffett wrote: David, please do tell myself and Adrian how locking down chroot() the way you want will avoid letting root break out through any of the above ways? As has been said, there are thousands of ways to break out of a chroot. It's just that one of them should not be that

Re: sys_chroot+sys_fchdir Fix

2007-09-26 Thread David Newall
Al Viro wrote: Oh, for fsck sake... Folks, it's standard-required behaviour. Ability to chroot() implies the ability to break out of it. Could we please add that (along with reference to SuS) to l-k FAQ and be done with that nonsense? I'm pretty confident that it's only standard behavior

Re: Chroot bug

2007-09-26 Thread David Newall
Alan Cox wrote: The dot-dot entry in the root directory is interpreted to mean the root directory itself. Thus, dot-dot cannot be used to access files outside the subtree rooted at the root directory. Which is behaviour chroot preserves properly. And yet it is the dot-dot entry

Re: Chroot bug

2007-09-26 Thread David Newall
Olivier Galibert wrote: chroot does not allow you to walk out if you're in. You're mistaken. Or more properly, further use of chroot lets you walk out. This really has been said before, and before, and before. chroot(subtree); // enter chroot chdir(/);// now at subtree

Re: sys_chroot+sys_fchdir Fix

2007-09-26 Thread David Newall
Alan Cox wrote: On Wed, 26 Sep 2007 20:04:14 +0930 David Newall [EMAIL PROTECTED] wrote: Al Viro wrote: Oh, for fsck sake... Folks, it's standard-required behaviour. Ability to chroot() implies the ability to break out of it. Could we please add that (along with reference to SuS

Re: sys_chroot+sys_fchdir Fix

2007-09-26 Thread David Newall
Alan Cox wrote: Now see I've been working on Unix systems since 1988 or so and in that time I've learned to read the documentation properly (you haven't) My, my, you can be unpleasant when you try. There's no need for it. As it happens I have years of UNIX experience on you. (Newbie!)

Re: sys_chroot+sys_fchdir Fix

2007-09-26 Thread David Newall
Alan, Alan Cox wrote: therefore it must be right. You present no reasoning to explain why the behavior is correct; instead you use insults. I've exhausted my tolerance for rudeness. Well if citing standards documents at people is rudeness so be it. Did you just tell a porky? Did

Re: sys_chroot+sys_fchdir Fix

2007-09-26 Thread David Newall
Alan Cox wrote: You quoted the standard, I merely pointed out you forgot to read it properly. Thats your problem not mine. How bizarre. Last email you claimed to quote the standards (but you never did.) Your becoming an embarrassment. You were rude, and multiple times. Please just

Re: sys_chroot+sys_fchdir Fix

2007-09-26 Thread David Newall
Alan Cox wrote: ** Plonk ** Welcome to my killfile. Well that's a relief. - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at

Re: sys_chroot+sys_fchdir Fix

2007-09-26 Thread David Newall
Christer Weinigel wrote: *spends five minutes with Google* From the OpenBSD FAQ (an operating system most know for being really, really focused on security): http://www.openbsd.org/faq/faq10.html Any application which has to assume root privileges to operate is pointless to

Re: sys_chroot+sys_fchdir Fix

2007-09-26 Thread David Newall
Adrian Bunk wrote: You are claiming They went so far as to say that dot-dot wouldn't let you out? I phrased it in a somewhat conversational way. The promise, which I've now quoted from multiple sources, is expressed variously, including: The dot-dot entry in the root directory is

Re: sys_chroot+sys_fchdir Fix

2007-09-27 Thread David Newall
Adrian Bunk wrote: You claimed: -- snip -- Look, when chroot was being designed, I think they intended that even root should be unable to get out. They went so far as to say that dot-dot wouldn't let you out; and it doesn't. -- snip -- You were clearly saying that whom you call they

Re: sys_chroot+sys_fchdir Fix

2007-09-27 Thread David Newall
Bill Davidsen wrote: It seems there are (at least) two parts to this, one regarding changing working directory which is clearly stated in the standards and must work as it does, and the various issues regarding getting out of the chroot after the cwd has entered that changed root. That second

Chroot bug take 3

2007-09-29 Thread David Newall
/. I hope I haven't crossed the line between determined and annoying. I thought we were done, but now I find meat still on this bone. Posit a normal process having some filesystem root, and a current working directory (pwd) lying within that root subtree. When chroot is performed, pwd is

Re: One process with multiple user ids.

2007-10-02 Thread David Newall
Giuliano Gagliardi wrote: I have a server that has to switch to different user ids, but because it does other complex things, I would rather not have it run as root. I only need the server to be able to switch to certain pre-defined user ids. Why don't you use group security instead of user

Re: Point of gpl-only modules (flame)

2007-10-03 Thread David Newall
linux-os (Dick Johnson) wrote: Just don't expect the kernel developers to authorize its use, or show you how to do it! Well of course you can be totally up-front and public about it. That, after all, is the point of GPL. - To unsubscribe from this list: send the line unsubscribe

Re: Problem to recognize that the file system is full

2007-09-06 Thread David Newall
Jan Engelhardt wrote: On Sep 4 2007 13:53, Guilherme Vilela wrote: I'm tryng to mount a nfs file system with the option async and run a program that writes to the file system. The problem is that the program keep writing even when the file system is full. man 5 exports async This

Re: stripping down the kernel-parameters.txt file

2007-09-12 Thread David Newall
Robert P. J. Day wrote: while killing some time between compiles and ridding the kernel-parameters.txt file of out-of-date or incorrect cruft, it occurs to me that that file is borderline valueless since it apparently tries to document every possible boot-time parameter, including those

Re: stripping down the kernel-parameters.txt file

2007-09-12 Thread David Newall
Robert P. J. Day wrote: if the goal is to simply put all of the basic boot-time kernel parms along with the module-specific ones into a single file, sorted in alphabetical order, then i contend that this is, in fact, silly. Or even, messy. There's no doubt that it should be maintained with

help

2007-08-27 Thread David Newall
help - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/

Re: [PATCH 4/5] Net: ath5k, license is GPLv2

2007-08-30 Thread David Newall
Is it actually necessary to change the license? With the dual-license, you can keep a single code-base for both BSD and Linux platforms, which seems terribly important to me. It'd be awful to lose that. It would be a maintenance nightmare for BSD. Is it even possible--in real life, I

Re: [PATCH] sysctl: Deprecate sys_sysctl in a user space visible fashion.

2007-08-30 Thread David Newall
Eric W. Biederman wrote: This isn't Oh some apps are using it let's get them to stop, because it is inconvenient. This is No apps seems to be using this, we keep goofing up the maintenance and no one notices, and so it is likely a source of security problems and other nasties This first

Re: [PATCH] Reserve N process to root

2007-10-09 Thread David Newall
Gustavo Chain wrote: I think it's necessary to reserve some pids to the super user. 5 must be sufficient. Why? (Sorry if I missed something.) Shouldn't you test for error return before the pid is allocated? Otherwise, I think, you have to free it. Thus: long do_fork(unsigned long

Re: [PATCH] Reserve N process to root

2007-10-09 Thread David Newall
Gustavo Chain wrote: El Wed, 10 Oct 2007 11:19:27 +0930 David Newall [EMAIL PROTECTED] escribió: Gustavo Chain wrote: I think it's necessary to reserve some pids to the super user. 5 must be sufficient. Why? (Sorry if I missed something.) ¿ To prevent a posible DoS

Re: [PATCH] Reserve N process to root

2007-10-10 Thread David Newall
Gustavo Chain wrote: El Wed, 10 Oct 2007 15:14:06 +0930 David Newall [EMAIL PROTECTED] escribió: Gustavo Chain wrote: El Wed, 10 Oct 2007 11:19:27 +0930 David Newall [EMAIL PROTECTED] escribió: Gustavo Chain wrote: I think it's necessary to reserve some pids

Re: [PATCH] Reserve N process to root

2007-10-10 Thread David Newall
[EMAIL PROTECTED] wrote: What David meant was that root will always have a slot doesn't *actually* help unless you *also* have a way to actually *spawn* such a process. In order to do the ps, kill, and so on that you need to recover, you need to already have either a root shell available, or a

Re: [OT] Argument with an OS professor over profile=3

2007-10-10 Thread David Newall
Russ Dill wrote: I've been having a back and forth going for a while with my TA and OS professor on the meaning of profile=3 and have been unable to convince either of them. The basic question is if profile=3 is passed to kernel with an 8MB text section, how big is the allocated profile buffer.

Re: What still uses the block layer?

2007-10-13 Thread David Newall
Matthew Wilcox wrote: You really need to get the fuck over yourself. That is so rude. You need to learn some manners. - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at

Re: OOM killer gripe (was Re: What still uses the block layer?)

2007-10-16 Thread David Newall
Nick Piggin wrote: On Monday 15 October 2007 19:52, Rob Landley wrote: On Monday 15 October 2007 8:37:44 am Nick Piggin wrote: You really shouldn't configure so much [swap] unless you do want the kernel to actually use it all, right? Two words: Software suspend. I've actually

Re: [PATCH] USB: mark USB drivers as being GPL only

2008-02-03 Thread David Newall
Greg KH wrote: It comes down to the simple fact, if you wish to use Linux, abide by the license it comes under. To do otherwise is both disenginous and illegal[1]. By the way, I'm almost certain that the COPYING file is the first, last and only document specifying licence conditions, and

Re: [PATCH] USB: mark USB drivers as being GPL only

2008-02-03 Thread David Newall
Greg KH wrote: It comes down to the simple fact, if you wish to use Linux, abide by the license it comes under. To do otherwise is both disenginous and illegal[1]. I think you're being dishonest. This isn't really about Linux and it being licensed under GPL, is it? Not if you're being 100%

  1   2   3   4   >