From: ebiederm@xmission.com (Eric W. Biederman)
To: "Wang\, Xiaoming" <xiaoming.wang@intel.com>
Cc: Tejun Heo <tj@kernel.org>,
"akpm\@linux-foundation.org" <akpm@linux-foundation.org>,
"oleg\@redhat.com" <oleg@redhat.com>,
"andriy.shevchenko\@linux.intel.com"
<andriy.shevchenko@linux.intel.com>,
"linux\@rasmusvillemoes.dk" <linux@rasmusvillemoes.dk>,
"eparis\@redhat.com" <eparis@redhat.com>,
"chenhanxiao\@cn.fujitsu.com" <chenhanxiao@cn.fujitsu.com>,
"tglx\@linutronix.de" <tglx@linutronix.de>,
"linux-kernel\@vger.kernel.org" <linux-kernel@vger.kernel.org>,
"Schallberger\, Timothy M" <timothy.m.schallberger@intel.com>,
"Zhang\, Dongxing" <dongxing.zhang@intel.com>
Subject: Re: [PATCH] proc: move the adding option Ngid to the end of proc/PID/status
Date: Tue, 21 Apr 2015 10:19:42 -0500 [thread overview]
Message-ID: <87k2x5tsoh.fsf@x220.int.ebiederm.org> (raw)
In-Reply-To: <FA47D36D6EC9FE4CB463299737C09B9901D3428B@shsmsx102.ccr.corp.intel.com> (Xiaoming Wang's message of "Fri, 17 Apr 2015 05:36:56 +0000")
"Wang, Xiaoming" <xiaoming.wang@intel.com> writes:
> Dear tejun
>
>> -----Original Message-----
>> From: htejun@gmail.com [mailto:htejun@gmail.com] On Behalf Of Tejun Heo
>> Sent: Friday, April 17, 2015 11:42 AM
>> To: Wang, Xiaoming
>> Cc: akpm@linux-foundation.org; oleg@redhat.com;
>> andriy.shevchenko@linux.intel.com; linux@rasmusvillemoes.dk;
>> ebiederm@xmission.com; eparis@redhat.com; chenhanxiao@cn.fujitsu.com;
>> tglx@linutronix.de; linux-kernel@vger.kernel.org; Schallberger, Timothy M;
>> Zhang, Dongxing
>> Subject: Re: [PATCH] proc: move the adding option Ngid to the end of
>> proc/PID/status
>>
>> On Thu, Apr 16, 2015 at 11:37 PM, Wang, Xiaoming
>> <xiaoming.wang@intel.com> wrote:
>> >> git describe --contains says 3.13 and it's about 1.5 years ago.
>> >>
>> > Yes this kernel change is 1.5 years ago.
>> > As we known not all user update the kernel so frequently.
>> > They just use the stable one.
>> > We met this issue when update to 3.13 now.
>> > A lot of application failed to run which run well previously.
>> > Do you have any idea on this issue?
>>
>> Not really. It's a sucky situation. How many applications are we talking about? I
>> tried to find information on libsecuritysdk but couldn't find it anywhere.
>>
> This lib libsecuritysdk is included in application.
> Taobao, weibo, tmall, alipay, etc
> It refer to security .
*cough* snake oil *cough*
Buggy non-robust code that is sold as providing a security function
deeply disturbs me. In this case libsecuritysdk is clearly buggy. The
point of labels at the beginning of lines is so that order is irrelevant.
If this had been reported by someone who cares enough to test any time
during the 6 weeks of an rc series or even shortly after a stable
release we would have take this patch immediately. Because breaking
userspace is something we don't want to do, and it would have been clear
what the trade-offs are.
In this case Tejun is right. We need to weigh the risk of fixing one
application against the risk of breaking others. So far there has been
no analysis about the possibility what other software might be affected
by this change.
With respect to testing, linux is developed as a community and it is the
responsibility for everyone in the community to pitch in and do what
they can for the bits they care about.
As best as I can infer libsecuritysdk is doing it's best to ensure that
a debugger is not attached while the library is being run. The code
appears to be binary and proprietary. So the entire community of
developers can not go out and read the code and see what is going on.
This places a higher burden on those who develop and maintian
libsecuritysdk to test and to verify their software will work with
future versions of the linux kernel, and to more promptly bring issues
to our attention.
In this instance until due dilligence has been done to indicate that
making the change proposed will not result in another bug report in
another 1.5 years from now about a different piece of software I am
inclined to strongly suggest we do nothing.
Further is there any indication that even with this small change that
the applications that use libsecuritysdk will work on 4.1-rc1 when it
comes out in the next couple of days? Or even that those applications
work on 4.0?
Eric
next prev parent reply other threads:[~2015-04-21 15:24 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-04-17 2:13 [PATCH] proc: move the adding option Ngid to the end of proc/PID/status Wang Xiaoming
2015-04-17 2:56 ` Tejun Heo
2015-04-17 3:15 ` Wang, Xiaoming
2015-04-17 3:26 ` Tejun Heo
2015-04-17 3:37 ` Wang, Xiaoming
2015-04-17 3:42 ` Tejun Heo
2015-04-17 5:36 ` Wang, Xiaoming
2015-04-21 15:19 ` Eric W. Biederman [this message]
-- strict thread matches above, loose matches on Subject: below --
2015-04-17 13:23 Alexey Dobriyan
2015-04-17 14:26 ` Tejun Heo
2015-04-17 15:05 ` Alexey Dobriyan
2015-04-17 15:12 ` Tejun Heo
2015-04-21 8:19 ` Wang, Xiaoming
2015-04-21 14:00 ` Alexey Dobriyan
2015-04-21 15:11 ` Tejun Heo
2015-04-23 20:32 ` Alexey Dobriyan
2015-04-24 15:50 ` Tejun Heo
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=87k2x5tsoh.fsf@x220.int.ebiederm.org \
--to=ebiederm@xmission.com \
--cc=akpm@linux-foundation.org \
--cc=andriy.shevchenko@linux.intel.com \
--cc=chenhanxiao@cn.fujitsu.com \
--cc=dongxing.zhang@intel.com \
--cc=eparis@redhat.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux@rasmusvillemoes.dk \
--cc=oleg@redhat.com \
--cc=tglx@linutronix.de \
--cc=timothy.m.schallberger@intel.com \
--cc=tj@kernel.org \
--cc=xiaoming.wang@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox