LWN: Comments on "Blacklisting insecure filesystems in openSUSE" https://lwn.net/Articles/779243/ This is a special feed containing comments posted to the individual LWN article titled "Blacklisting insecure filesystems in openSUSE". en-us Fri, 19 Sep 2025 09:31:50 +0000 Fri, 19 Sep 2025 09:31:50 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/785794/ https://lwn.net/Articles/785794/ Rudd-O <div class="FormattedComment"> Communism, of course.<br> </div> Fri, 12 Apr 2019 08:56:14 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/780558/ https://lwn.net/Articles/780558/ Wol <div class="FormattedComment"> And in practice it very often isn't!<br> <p> It's basically down to supply and demand. Why did we have the Renaissance? Because average *median* wealth rose dramatically as a result of the Black Death. That was what brought down the feudal system in a large chunk of Europe. We had the same effect after the First and Second World Wars.<br> <p> Sadly now we have the opposite effect, where we have too many people chasing too little work, and even while the average *mean* wealth may be rising, the *median* wealth is falling. And politicians love to talk about the mean, while forgetting that in a skewed distribution like incomes, it has very little meaning.<br> <p> Cheers,<br> Wol<br> </div> Fri, 22 Feb 2019 19:15:36 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/780016/ https://lwn.net/Articles/780016/ Cyberax <div class="FormattedComment"> And it actually works just fine most of the time, if Rust's current limitations are acceptable.<br> </div> Mon, 18 Feb 2019 00:21:14 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/780002/ https://lwn.net/Articles/780002/ intgr What?! Microkernels are from the stone age, clearly today the solution is to <a href="https://github.com/ansuz/RIIR">Rewrite it in Rust</a>. Sun, 17 Feb 2019 14:03:55 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779957/ https://lwn.net/Articles/779957/ Cyberax <div class="FormattedComment"> I have just lost data from a btrfs RAID5 NAS. We had power outages going and the external enclosure was b0rked by it, causing drives to appear and disappear. BTRFS has corrupted the filesystem beyond repair.<br> <p> I do have a secondary cloud backup so it's all good.<br> <p> However, there's no way I'm going to trust btrfs with ANYTHING important.<br> </div> Fri, 15 Feb 2019 19:01:01 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779946/ https://lwn.net/Articles/779946/ jhhaller <div class="FormattedComment"> The btrfs status page gives a high level view of RAID56, the details are more subtle. There are a combination of issues related to the write hole potentially corrupting metadata, and no unclean dismount flags suggesting a log replay is needed. But if one uses RAID10 for metadata and RAID 5 for data, the problem should be no worse than other filesystems when there is an unclean dismount. RAID 6 doesn't really support multi-drive failure when the metadata is RAID 10, as one can only lose one drive before there is a possibility of data loss in the RAID 10 metadata. The most recent status is a thread in the email archives here: <a href="https://lore.kernel.org/linux-btrfs/5d7f63b2-d340-7c3a-679b-26e97ac258a6@gmail.com/">https://lore.kernel.org/linux-btrfs/5d7f63b2-d340-7c3a-67...</a> - follow the thread.<br> </div> Fri, 15 Feb 2019 16:46:29 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779877/ https://lwn.net/Articles/779877/ rahulsundaram <div class="FormattedComment"> <font class="QuotedText">&gt; Well, that's not *necessarily* the case, but in practice it very often is.</font><br> <p> What is the source of said belief?<br> </div> Fri, 15 Feb 2019 02:07:26 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779874/ https://lwn.net/Articles/779874/ kmweber <div class="FormattedComment"> <font class="QuotedText">&gt; Just because one person gains wealth doesn't mean that somebody else must be made poorer. </font><br> <p> Well, that's not *necessarily* the case, but in practice it very often is.<br> </div> Fri, 15 Feb 2019 01:21:31 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779839/ https://lwn.net/Articles/779839/ nix <div class="FormattedComment"> I was wondering why the NCSDK chose LEON, not why the ESA chose to make LEON a SPARC implementation. :)<br> </div> Thu, 14 Feb 2019 16:41:58 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779750/ https://lwn.net/Articles/779750/ k8to <div class="FormattedComment"> Hmm, if you mean an arch with a neutral consortium etc guiding it, then I'm not aware of many arches that have met that bar in any point in time. Are there any besides Sparc and I guess hyper-v?<br> <p> If you mean something with a lot of manufacturers where you could get parts in whatever form you wanted, I think MIPS had hit that stride by 1991. Don't think anything else was close.<br> </div> Wed, 13 Feb 2019 22:31:31 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779741/ https://lwn.net/Articles/779741/ johannbg <div class="FormattedComment"> Looks like it's getting disabled instead of fixed thou but if it builds ship it! ;) <br> </div> Wed, 13 Feb 2019 19:36:16 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779720/ https://lwn.net/Articles/779720/ roblucid <div class="FormattedComment"> Broken code gets shipped so someone else fixes it :)<br> </div> Wed, 13 Feb 2019 16:18:47 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779610/ https://lwn.net/Articles/779610/ johannbg <div class="FormattedComment"> Downstreams should not have to make the types of discussions and decisions.<br> <p> Is this not failure on behalf of the kernel community? <br> <p> I mean is it not it's responsability to remove insecure code and or drop it if they cant or if it's unmaintained and just shows that the upstream kernel community deprecation policies, aren't effective enough or non-existant?<br> <p> How long does a module have to be unmaintained before it eventually gets removed from the kernel?<br> <p> Which team is responable for the filesystem layer in the kernel community or the modules in question?<br> <p> So fourth and so on...<br> </div> Tue, 12 Feb 2019 22:32:23 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779509/ https://lwn.net/Articles/779509/ marcH <div class="FormattedComment"> <a href="https://space.stackexchange.com/questions/729/why-did-the-esa-choose-sparc-for-leon">https://space.stackexchange.com/questions/729/why-did-the...</a> has pointers.<br> <p> The choice was made in 1991. What other open and mature ISA was there at the time?<br> </div> Tue, 12 Feb 2019 06:38:59 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779492/ https://lwn.net/Articles/779492/ xorbe <div class="FormattedComment"> Apparently a message was posted for 48 hours prior to F2FS being blacklisted. Turns out some users were unhappy about that. Who knew that 48 hours on a devel mailing list might have not reached a wide enough user base audience for comment? The mind boggles!<br> </div> Mon, 11 Feb 2019 21:22:59 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779486/ https://lwn.net/Articles/779486/ marcH <div class="FormattedComment"> tl;dr : if your expectations for this mailing list were higher than for social media, lower them.<br> </div> Mon, 11 Feb 2019 20:44:01 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779479/ https://lwn.net/Articles/779479/ clump <div class="FormattedComment"> I am really impressed developers got Linux working on things like SPARC32 hardware. I've run Linux distros on old SPARC machines, one PA-RISC machine, an SGI Indigo, and others. To the best of my knowledge, most of the porting and maintenance was volunteer work.<br> <p> Nowadays Linux runs on just about everything, but there are strong economic reasons for this. I don't really have the desire or space for older hardware. A Raspberry Pi is remarkably inexpensive and makes a very capable, low-power Linux device. <br> </div> Mon, 11 Feb 2019 18:44:35 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779425/ https://lwn.net/Articles/779425/ khim RAID56 is not just "advanced". It's red on <a href="https://btrfs.wiki.kernel.org/index.php/Status">Status</a> page. And always was red. The fact that people are trying to use it (and are then burned) so often makes me wonder: why attempt to use it does not cause warning in CAPITAL LETTERS from kernel? Mon, 11 Feb 2019 13:58:10 +0000 Blacklisting insecure network protocols? https://lwn.net/Articles/779424/ https://lwn.net/Articles/779424/ epa <div class="FormattedComment"> Those have to be explicitly enabled. They don't get run when you insert a USB stick. Which is all the SuSE developers are proposing here -- an explicit step to enable these ancient filesystems.<br> </div> Mon, 11 Feb 2019 12:34:55 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779419/ https://lwn.net/Articles/779419/ mjthayer <div class="FormattedComment"> Linux distributions always have a few questions for the user at install time. How about adding a simple security-level question? "Do you want security or flexibility? If the second, do not use this system for anything which requires logging in to anything."<br> </div> Mon, 11 Feb 2019 09:35:06 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779418/ https://lwn.net/Articles/779418/ mjthayer <div class="FormattedComment"> <font class="QuotedText">&gt; Filesystem implementations that are meant for enabling access to legacy media should not be in the kernel, they should be implemented using FUSE.</font><br> <p> I could see that happening for more things in the kernel than just filesystems (someone mentioned Decnet and amateur radio protocols below). At the point where people decide its less work than keeping them at kernel-level security. And these days people are building up lots of experience with lots of forms of virtualisation. In the long term I could well see the Linux kernel becoming much more micro-kernel-like than it is today (though not in an academically clean way). Maybe.<br> </div> Mon, 11 Feb 2019 09:32:07 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779415/ https://lwn.net/Articles/779415/ viiru <div class="FormattedComment"> <font class="QuotedText">&gt; I'd still love to see the long tail of filesystem drivers converted to FUSE filesystems, which would allow mounting them by default with </font><br> <font class="QuotedText">&gt; a security-isolated driver. (The code could still come from the existing kernel driver.)</font><br> <p> Indeed, this is what I think the "helpful" suggestion "Another "helpful" participant repeatedly told the community to implement a microkernel model for filesystems so that security problems could be contained." should be read as. Filesystem implementations that are meant for enabling access to legacy media should not be in the kernel, they should be implemented using FUSE.<br> </div> Mon, 11 Feb 2019 09:21:41 +0000 Blacklisting insecure network protocols? https://lwn.net/Articles/779409/ https://lwn.net/Articles/779409/ shemminger <div class="FormattedComment"> What about Decnet, and all the amateur radio protocols?<br> Syskiller keeps finding holes in every one of the old protocols it touches.<br> <p> </div> Mon, 11 Feb 2019 04:47:17 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779402/ https://lwn.net/Articles/779402/ nix <div class="FormattedComment"> Interesting! (And it says something about the march of technology that this medium-big-iron architecture first found its way into satellites and now into *part* of a USB-key-sized neural-net contraption. I wonder why they chose LEON... low power requirements, probably. I can't believe they cared about radiation hardening :) )<br> </div> Mon, 11 Feb 2019 00:26:17 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779384/ https://lwn.net/Articles/779384/ drag <div class="FormattedComment"> There are a lot of people who have a zero-level grasp of economics. <br> <p> One of the first really basic things to understand is that wealth is not a zero sum game. Just because one person gains wealth doesn't mean that somebody else must be made poorer. That is not now the world works. That isn't how wealth works. <br> <p> It's also not how Open Source software works. <br> <p> There are over 7 billion of people on the planet. There are hundreds of thousands of new people born every day. There are hundreds of millions of people approaching the age were they can start using computers in a meaningful way on their own. There are hundreds of millions of people getting to the point were they are technically aware and can have the ability to choose their own operating system.<br> <p> For OpenSUSE to become more popular it does not require that it steals users from Debian or Ubuntu. It's not even desirable or useful to think of things in that way either. Ubuntu existing and being popular has made OpenSUSE a better operating system. Redhat succeeding and becoming popular in the enterprise has made OpenSUSE a better operating system. <br> <p> You are really all on the same team here. Competition is good and diversity is good. But it competition doesn't mean that you are in a combat or war against a adversary. Diversity doesn't mean you need to engage in group politics and fear those that are different. You can gain from your competition even if they gain more then you do. Nobody has to lose anything. <br> <p> For OpenSUSE to 'Win' all it needs to do is:<br> <p> 1. Create compelling reasons to use OpenSUSE.<br> <p> 2. Make sure that people are aware of these reasons.<br> <p> 3. Live up to the expectations they create in the minds of new users. <br> <p> I expect, as far as the file system stuff goes, that new users expect that their brand new Linux operating system is secure enough that they can plug in that random USB key the found in the parking lot and not get immediately owned by a attacker. <br> <p> Probably what is needed is to provide a desktop notification and dmesg output that states that the file system module has been blacklisted because it is known to be insecure. Then provide a way for users to learn a work around if they really really want to do it. You don't have to make it easy for people to screw themselves over, but you can't afford to make them frustrated and confused about what is going on.<br> <p> <p> <p> </div> Sun, 10 Feb 2019 05:31:06 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779375/ https://lwn.net/Articles/779375/ bjacob <div class="FormattedComment"> LEON is popular in more than just satellites. It is part of Intel's (acquired) Movidius hardware platform for embedded AI applications.<br> <a href="https://movidius.github.io/ncsdk/ncs.html">https://movidius.github.io/ncsdk/ncs.html</a><br> </div> Sat, 09 Feb 2019 23:28:19 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779373/ https://lwn.net/Articles/779373/ dezgeg <div class="FormattedComment"> Well, I guess someone needs to be the first one. Sounds like a perfect time for someone from the openSUSE community to try ;)<br> </div> Sat, 09 Feb 2019 22:49:06 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779366/ https://lwn.net/Articles/779366/ nix <div class="FormattedComment"> Yeah, it's been over a decade since SPARC32 kernels really worked. Not terribly surprising, given that more or less the only SPARC32 processor in actual use any more is the LEON, and you're not going to be using one of those unless you're building a satellite.<br> </div> Sat, 09 Feb 2019 21:54:07 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779354/ https://lwn.net/Articles/779354/ mangix <div class="FormattedComment"> I've previously reported the f2fs error. No comment. The code actually has several endian related bugs from a quick glance at fsck output as well as the code.<br> <p> Reported the btrfs issue just now. Given that my issue has probably been there for a long time, I'm not hopeful.<br> </div> Sat, 09 Feb 2019 19:46:50 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779349/ https://lwn.net/Articles/779349/ mageta <div class="FormattedComment"> Did you report them? I've been using btrfs with SLES12 and 15 on s390x for 3+ years now (as it is the default filesystem on SLES), and have not seen a single panic/warning, or at least I can't remember one. I didn't use any advanced features like raid and such, but at least snapshots worked also fine.<br> </div> Sat, 09 Feb 2019 14:41:56 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779348/ https://lwn.net/Articles/779348/ josh <div class="FormattedComment"> Are any distributions using that by default, though?<br> </div> Sat, 09 Feb 2019 13:30:12 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779345/ https://lwn.net/Articles/779345/ warrax <div class="FormattedComment"> Something something microkernels something :)<br> </div> Sat, 09 Feb 2019 12:20:23 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779342/ https://lwn.net/Articles/779342/ pabs <div class="FormattedComment"> Is anyone working on merging LKL into Linux mainline these days?<br> </div> Sat, 09 Feb 2019 09:24:07 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779340/ https://lwn.net/Articles/779340/ dezgeg <div class="FormattedComment"> lklfuse from <a href="https://github.com/lkl/linux">https://github.com/lkl/linux</a> allows this today.<br> </div> Sat, 09 Feb 2019 07:58:01 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779339/ https://lwn.net/Articles/779339/ josh <div class="FormattedComment"> I'd still love to see the long tail of filesystem drivers converted to FUSE filesystems, which would allow mounting them by default with a security-isolated driver. (The code could still come from the existing kernel driver.)<br> </div> Sat, 09 Feb 2019 06:35:38 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779338/ https://lwn.net/Articles/779338/ mangix <div class="FormattedComment"> I have. From kernel 3.18 to 4.19.<br> </div> Sat, 09 Feb 2019 06:15:13 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779336/ https://lwn.net/Articles/779336/ flussence <div class="FormattedComment"> <font class="QuotedText">&gt;To thrive, Linux distros have to attract users from other Linux distros.</font><br> <p> I can't tell if this diatribe over a hypothetical mass migration between Linux On The Desktop™ distros by angry weirdos demanding slick graphical automount of flash drives containing filesystems from before flash drives existed is supposed to be satirical or not. On top of that, it's bizarre to see someone so openly talk about FOSS ecosystem projects infighting and cannibalising each other like it's a good thing when security is at stake.<br> <p> Microsoft disabled autorun.inf ACE by default over a decade ago, IIRC. I doubt they lost even one millionth of a percent of market share to SUSE over that decision.<br> </div> Sat, 09 Feb 2019 04:06:34 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779337/ https://lwn.net/Articles/779337/ jeffm <div class="FormattedComment"> We ship btrfs as the default root file system for SLE12 and SLE15 on all architectures including s390x, which is big endian. The hiccups we have encountered aren't endian related, but rather in the way s390x handles page dirtying. I haven't seen an s390x-specific btrfs bug in some time and it's not for lack of deployments.<br> </div> Sat, 09 Feb 2019 03:57:07 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779335/ https://lwn.net/Articles/779335/ clump <div class="FormattedComment"> If a distribution allows some feature, a user could reasonably expect that the feature is supported. I'd rather have something be unavailable than have a false impression of support or security updates. <br> <p> Perhaps similar to your example, I'd tried compiling upstream kernels on Debian running on SPARC32 quite a while ago. Unfortunately for me, SPARC32 wasn't really well supported even when I wasn't doing unsupported things. My kernels failed to compile and I learned that nobody expected them to. But that's a different story than the distro itself providing something that nobody expects to work. <br> </div> Sat, 09 Feb 2019 00:49:39 +0000 Blacklisting insecure filesystems in openSUSE https://lwn.net/Articles/779326/ https://lwn.net/Articles/779326/ flewellyn <div class="FormattedComment"> <font class="QuotedText">&gt; "... it's probably still fair to say that few people expected the massive discussion that resulted..."</font><br> <p> Really? It's been my experience that, no matter how ill-used a piece of code or a feature is, no matter how ancient or obsolete, no matter how bug-ridden and insecure, if a project considers deprecating it, much less removing it, there is going to be SOMEONE out there who insists that this will irrevocably disrupt their workflow. Probably multiple someones. And every single one of those someones is going to descend on the mailing list and make noise.<br> <p> XKCD even has a comic about this: <a href="https://xkcd.com/1172/">https://xkcd.com/1172/</a><br> </div> Fri, 08 Feb 2019 20:00:21 +0000