Wizard-level questions

Dan Bernstein brnstnd at kramden.acf.nyu.edu
Thu Feb 7 08:46:01 AEST 1991


In article <19029 at rpp386.cactus.org> jfh at rpp386.cactus.org (John F Haugh II) writes:
> In article <395 at appserv.Eng.Sun.COM> lm at slovax.Eng.Sun.COM (Larry McVoy) writes:
> >In article <16048 at sdcc6.ucsd.edu> cs163wcr at sdcc10.ucsd.edu (I support the U.N.) writes:
> >>[1] Can you access a file by its i-node number?  Something like
> >>	(for C code) FILE *iopen (int inode, char *mode) ?
> >Program included below.  This program does an internal file tree walk
> >to find the inode.  Slow, but quite portable, contrary to a supposed
> >wizard's opinion.

I'm still wondering who you were trying to insult, Larry... Can we ask
that you make sure your code satisfies the spec given before posting it?

> Dan incorrectly
> stated that it was a security whole if it could be executed
> by mortal users - no, it is only a security whole if it is made
> to work for mortal users.

I stand corrected. Thanks.

> Furthermore, it does not appear to address mount
> points at all.

Oops, another problem I missed. Good point.

---Dan



More information about the Comp.unix.wizards mailing list