[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <77e8575a68e862c5c0e64803bf2582b5@paul-moore.com>
Date: Tue, 05 Dec 2023 16:25:28 -0500
From: Paul Moore <paul@...l-moore.com>
To: "Seth Forshee (DigitalOcean)" <sforshee@...nel.org>,
Christian Brauner <brauner@...nel.org>,
Serge Hallyn <serge@...lyn.com>,
Eric Paris <eparis@...hat.com>,
James Morris <jmorris@...ei.org>,
Alexander Viro <viro@...iv.linux.org.uk>,
Miklos Szeredi <miklos@...redi.hu>,
Amir Goldstein <amir73il@...il.com>
Cc: linux-kernel@...r.kernel.org, linux-fsdevel@...r.kernel.org,
linux-security-module@...r.kernel.org, audit@...r.kernel.org,
linux-unionfs@...r.kernel.org,
"Seth Forshee (DigitalOcean)" <sforshee@...nel.org>
Subject: Re: [PATCH 14/16] commoncap: remove cap_inode_getsecurity()
On Nov 29, 2023 "Seth Forshee (DigitalOcean)" <sforshee@...nel.org> wrote:
>
> Reading of fscaps xattrs is now done via vfs_get_fscaps(), so there is
> no longer any need to do it from security_inode_getsecurity(). Remove
> cap_inode_getsecurity() and its associated helpers which are now unused.
>
> We don't allow reading capabilities xattrs this way anyomre, so remove
> the handler and associated helpers.
>
> Signed-off-by: Seth Forshee (DigitalOcean) <sforshee@...nel.org>
> ---
> include/linux/security.h | 5 +-
> security/commoncap.c | 132 -----------------------------------------------
> 2 files changed, 1 insertion(+), 136 deletions(-)
Once again, you should get Serge's ACK on the commoncap.c stuff, but
no objections from a LSM perspective.
Acked-by: Paul Moore <paul@...l-moore.com> (LSM)
--
paul-moore.com
Powered by blists - more mailing lists