lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20080529134903.615127628@szeredi.hu>
Date:	Thu, 29 May 2008 15:49:03 +0200
From:	Miklos Szeredi <miklos@...redi.hu>
To:	linux-security-module@...r.kernel.org,
	linux-fsdevel@...r.kernel.org
Cc:	jmorris@...ei.org, sds@...ho.nsa.gov, eparis@...hat.com,
	casey@...aufler-ca.com, agruen@...e.de, jjohansen@...e.de,
	penguin-kernel@...ove.SAKURA.ne.jp, hch@...radead.org,
	viro@...IV.linux.org.uk, linux-kernel@...r.kernel.org
Subject: [patch 00/15] security: pass path instead of inode to security ops

This series is in preparation for the AppArmor merge.  It's rather
boring, except perhaps the last two patches, which deal with
permission().

VFS API is touched very little, since the path has already been passed
down by callers.

This is based on the vfs-cleanups(*) tree + the 8 patches posted
recently (which will be added to this tree shortly).  If no problems
are found I'll create a new "apparmor" branch on that tree and commit
these patches there.

Thanks,
Miklos

(*) git://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/vfs.git vfs-cleanups

--
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ