lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Sat, 4 Oct 2008 20:15:54 +0900
From:	Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>
To:	dhowells@...hat.com
Cc:	linux-security-module@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] CRED: ptrace_attach() should use the target process\'s mutex

Hello.

David Howells wrote:
> 
> Tetsuo Handa <penguin-kernel@...ove.sakura.ne.jp> wrote:
> 
> > Subject: Add in_execve flag into task_struct.
> > 
> > This patch allows LSM modules determine whether current process is in an
> > execve operation or not so that they can behave differently while an execve
> > operation is in progress.
> 
> This doesn't apply on top of my patches.  How about the attached variant?

Yes. Behavior will be the same.

> I've also:
> 
>  (1) Extended the patch description.  Please check that I've summed up TOMOYA's
>      process correctly.

Description is correct. But please apply "sed -e 's/TOMOYA/TOMOYO/g'".
TOMOYO Linux was introduced as TOMOYA Linux by mistake at OLS2008.
The origin of the name is at http://I-love.SAKURA.ne.jp/tomoyo/index.html.en :-)

>  (2) Used current directly rather than caching it in a variable.  I don't
>      think it's worth doing that, given the amount you make use of it, but I
>      can revert this change if you'd really prefer.

OK.

Please proceed. Thanks.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ