On 19.01, Pablo Neira Ayuso wrote: > On Sun, Jan 18, 2015 at 10:28:32PM +0100, Jan Engelhardt wrote: > > On Sunday 2015-01-18 22:13, Pablo Neira Ayuso wrote: > > > > >This patch introduces a semaphore > > >index b18022e..80eed2c 100644 > > >--- a/iptables/xshared.c > > >+++ b/iptables/xshared.c > > >+static int xtables_check_owner(int semid) > > >+{ > > >+ int ret; > > >+ struct semid_ds ds; > > >+ > > >+ ret = semctl(semid, 0, IPC_STAT, &ds); > > > > Is there a particular reason you are not using the POSIX semaphores? > > [sem_open/shm_open as per sem_overview(7)]. > > Please, read the patch description: > > "This patch introduces a semaphore that is identified by the path to > the iptables binary, it also relies on SEM_UNDO so the kernel performs > the up() operation at process exit to avoid races with signals. This > also avoids file locks that require a writable filesystem." Is it wise to use the path? Not that its very common, but multiple binaries would still race. Any reason you chose not to use something globally unique? -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html