lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20071016222159.533aea4c@laptopd505.fenrus.org> Date: Tue, 16 Oct 2007 22:21:59 -0700 From: Arjan van de Ven <arjan@...radead.org> To: Max Kellermann <max@...mpel.org> Cc: linux-security-module@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH] /proc Security Hooks On Wed, 17 Oct 2007 07:13:57 +0200 Max Kellermann <max@...mpel.org> wrote: > On 2007/10/16 21:54, Arjan van de Ven <arjan@...radead.org> wrote: > > On Tue, 16 Oct 2007 21:38:50 +0200 > > Max Kellermann <mk@...all.com> wrote: > > > This patch attempts to unify duplicated code found in modules like > > > Linux VServer. > > > > can you please merge this patch only when you also merge the first > > user > > of it? That's the only way we can keep the LSM hooks sane... is to > > see > > them in thew conect of a user. > > I wrote a module which uses this, but it's non-free and only used on > my employer's servers. But I could have a closer look at the Vserver > code and try to make it use my patch. doesn't sound like something we'd want overhead for in the generic kernel.... - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists