lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAHpGcMKF=RQ=zxqfr4hW=ky0tt4jV3qMEuNgc1W-oE3SNj1cEw@mail.gmail.com>
Date:	Fri, 24 Apr 2015 13:25:02 +0200
From:	Andreas Grünbacher <andreas.gruenbacher@...il.com>
To:	"J. Bruce Fields" <bfields@...ldses.org>
Cc:	linux-kernel@...r.kernel.org, linux-fsdevel@...r.kernel.org,
	linux-nfs@...r.kernel.org
Subject: Re: [RFC 02/39] uapi: Remove kernel internal declaration

2015-04-20 20:57 GMT+02:00 J. Bruce Fields <bfields@...ldses.org>:
> On Fri, Mar 27, 2015 at 05:50:00PM +0100, Andreas Gruenbacher wrote:
>> The enum nfs4_acl_whotype is only used in nfs4d's internal nfs4 acl
>> representation. No longer expose it to user space.
>
> I'll go ahead and apply that now.

There's other very low-hanging fruit for nfsd as well:

nfsd: Checking for acl support does not require fetching any acls
https://git.kernel.org/cgit/linux/kernel/git/agruen/linux-richacl.git/commit/?h=richacl-2015-04-24&id=b3a09e6f1071ea01de64aa3071cb533e79fb4b18

nfsd: Remove dead declarations
https://git.kernel.org/cgit/linux/kernel/git/agruen/linux-richacl.git/commit/?h=richacl-2015-04-24&id=e6e2fa620584c6e2375572191fff7337a902805a

And for nfs:

nfs: Remove unused xdr page offsets in getacl/setacl arguments
https://git.kernel.org/cgit/linux/kernel/git/agruen/linux-richacl.git/commit/?h=richacl-2015-04-24&id=082664972e957e6585c059865a397185ba7d5c88

Thanks,
Andreas
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ