From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755576AbcAOWla (ORCPT ); Fri, 15 Jan 2016 17:41:30 -0500 Received: from ipmail05.adl6.internode.on.net ([150.101.137.143]:62796 "EHLO ipmail05.adl6.internode.on.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755124AbcAOWl1 (ORCPT ); Fri, 15 Jan 2016 17:41:27 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A2AiEQANdZlWPGwtLHleKAECgw+BP4Jkg3qBeJ9uAQEBAQEBBotciUeGCQQCAoEyTQEBAQEBAQcBAQEBQAE/QQ4Bg2QBAQEDATocIwULCAMYCSUPBSUDBxoThXyCFwfBJAEBAQEGAgEgGIV1hUeJPQWXGY1VjwqDTIsRhQIqNIQmggoBAQE Date: Sat, 16 Jan 2016 09:41:23 +1100 From: Dave Chinner To: Arnd Bergmann Cc: y2038@lists.linaro.org, linux-fsdevel@vger.kernel.org, Deepa Dinamani , linux-kernel@vger.kernel.org Subject: Re: [Y2038] [RFC 02/15] vfs: Change all structures to support 64 bit time Message-ID: <20160115224123.GT10456@dastard> References: <1452144972-15802-1-git-send-email-deepa.kernel@gmail.com> <4774139.hV6lmEpfqG@wuerfel> <20160115022733.GL6033@dastard> <7254587.VgG2py0ZUI@wuerfel> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <7254587.VgG2py0ZUI@wuerfel> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jan 15, 2016 at 06:01:36PM +0100, Arnd Bergmann wrote: > On Friday 15 January 2016 13:27:34 Dave Chinner wrote: > > The point I'm making is that we'll have to modify all the existing > > filesystem code to supply a valid timestamp range to the VFS at > > mount time for the range checking/clamping, similar to how we do the > > granularity specification right now. That means we can do rejection > > of non-y2038k compliant filesystems at runtime based on what the > > filesystem tells the VFS it supports.. Set up the default to be > > reject if rw, allow if ro, and provide a mount option to override ad > > allow mounting rw. > > We can't really default to "reject if rw", because that would break > all systems using ext3 or xfs, unless users modify their fstab > or set the flag that makes the partition y2038 compliant. Right, I was refering to the behaviour of a y2038k compliant kernel, A current non-compliant kernel will have the default behaviour you are suggesting. > The compile-time option that I'm thinking of would change the default > beween "always allow" and "reject if rw", based on whether the > system cares about this issue or not. Almost everyone today won't > care about it at all and would be rather annoyed by being unable > to mount their rootfs, but some people care about the behavior > a lot. Yup, that's exactly what I was implying. > Having a global sysctl or mount option as an override would be good, > maybe both if that isn't over-engineering the problem when we already > have a compile-time option. Distros should not be forces to ship multiple kernels just to provide all the different runtime compliance behaviours their users require. Make the policy runtime enforcable, but select the default behaviour and supported policies via compile time options. Cheers, Dave -- Dave Chinner david@fromorbit.com