lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 17 Jan 2020 11:42:55 +0000
From:   David Howells <>
To:     Omar Sandoval <>
Cc:, "Colin Walters" <>,
        "Al Viro" <>,,
        "Christoph Hellwig" <>, "Theodore Ts'o" <>,,
        "Darrick J. Wong" <>,
        "Chris Mason" <>,,,
        linux-ext4 <>,
        xfs <>,,
Subject: Re: Making linkat() able to overwrite the target

Hi Omar,

Do you still have your AT_REPLACE patches?  You said that you'd post a v4
series, though I don't see it.  I could make use of such a feature in
cachefiles inside the kernel.  For my original question, see:

And do you have ext4 support for it?

Colin Walters <> wrote:

> On Tue, Jan 14, 2020, at 1:06 PM, David Howells wrote:
> > Yes, I suggested AT_LINK_REPLACE as said magical flag.
> This came up before right?


Powered by blists - more mailing lists