Wizard-level questions
Dan Bernstein
brnstnd at kramden.acf.nyu.edu
Thu Feb 7 08:46:01 AEST 1991
In article <19029 at rpp386.cactus.org> jfh at rpp386.cactus.org (John F Haugh II) writes:
> In article <395 at appserv.Eng.Sun.COM> lm at slovax.Eng.Sun.COM (Larry McVoy) writes:
> >In article <16048 at sdcc6.ucsd.edu> cs163wcr at sdcc10.ucsd.edu (I support the U.N.) writes:
> >>[1] Can you access a file by its i-node number? Something like
> >> (for C code) FILE *iopen (int inode, char *mode) ?
> >Program included below. This program does an internal file tree walk
> >to find the inode. Slow, but quite portable, contrary to a supposed
> >wizard's opinion.
I'm still wondering who you were trying to insult, Larry... Can we ask
that you make sure your code satisfies the spec given before posting it?
> Dan incorrectly
> stated that it was a security whole if it could be executed
> by mortal users - no, it is only a security whole if it is made
> to work for mortal users.
I stand corrected. Thanks.
> Furthermore, it does not appear to address mount
> points at all.
Oops, another problem I missed. Good point.
---Dan
More information about the Comp.unix.wizards
mailing list