From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753152AbaKZPjq (ORCPT ); Wed, 26 Nov 2014 10:39:46 -0500 Received: from mail-la0-f52.google.com ([209.85.215.52]:44727 "EHLO mail-la0-f52.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750963AbaKZPjo (ORCPT ); Wed, 26 Nov 2014 10:39:44 -0500 MIME-Version: 1.0 In-Reply-To: References: <1416546149-24799-1-git-send-email-gregkh@linuxfoundation.org> <1416546149-24799-2-git-send-email-gregkh@linuxfoundation.org> From: Andy Lutomirski Date: Wed, 26 Nov 2014 07:39:22 -0800 Message-ID: Subject: Re: kdbus: add documentation To: David Herrmann Cc: Greg Kroah-Hartman , Arnd Bergmann , "Eric W. Biederman" , One Thousand Gnomes , Tom Gundersen , Jiri Kosina , Linux API , "linux-kernel@vger.kernel.org" , Daniel Mack , Djalal Harouni Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Nov 26, 2014 at 7:30 AM, Andy Lutomirski wrote: > Then find a clean way that's gated on having the right /proc access, > which is not guaranteed to exist on all of your eventual users' > systems, and, if that access doesn't exist because the admin or > sandbox designer has sensibly revoked it, then kdbus shouldn't > override them. One idea: add a sysctl that defaults to off that enables these metadata items, and keep it disabled on production systems. Then you get your debugging and everyone else gets unsurprising behavior. --Andy > > --Andy -- Andy Lutomirski AMA Capital Management, LLC From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andy Lutomirski Subject: Re: kdbus: add documentation Date: Wed, 26 Nov 2014 07:39:22 -0800 Message-ID: References: <1416546149-24799-1-git-send-email-gregkh@linuxfoundation.org> <1416546149-24799-2-git-send-email-gregkh@linuxfoundation.org> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Return-path: In-Reply-To: Sender: linux-api-owner-u79uwXL29TY76Z2rM5mHXA@public.gmane.org To: David Herrmann Cc: Greg Kroah-Hartman , Arnd Bergmann , "Eric W. Biederman" , One Thousand Gnomes , Tom Gundersen , Jiri Kosina , Linux API , "linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org" , Daniel Mack , Djalal Harouni List-Id: linux-api@vger.kernel.org On Wed, Nov 26, 2014 at 7:30 AM, Andy Lutomirski wrote: > Then find a clean way that's gated on having the right /proc access, > which is not guaranteed to exist on all of your eventual users' > systems, and, if that access doesn't exist because the admin or > sandbox designer has sensibly revoked it, then kdbus shouldn't > override them. One idea: add a sysctl that defaults to off that enables these metadata items, and keep it disabled on production systems. Then you get your debugging and everyone else gets unsurprising behavior. --Andy > > --Andy -- Andy Lutomirski AMA Capital Management, LLC