lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEjxPJ75Nwb2AGbT2uDe1WACjxiL5hcg0q+WHfu1T3YFN2_UAg@mail.gmail.com>
Date: Wed, 13 Aug 2025 11:43:31 -0400
From: Stephen Smalley <stephen.smalley.work@...il.com>
To: David Sterba <dsterba@...e.com>
Cc: linux-doc@...r.kernel.org, Jonathan Corbet <corbet@....net>, 
	Ondrej Mosnacek <omosnace@...hat.com>, Paul Moore <paul@...l-moore.com>, selinux@...r.kernel.org, 
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH] docs: Remove remainders of reiserfs

On Wed, Aug 13, 2025 at 6:04 AM David Sterba <dsterba@...e.com> wrote:
>
> Reiserfs has been removed in 6.13, there are still some mentions in the
> documentation about it and the tools. Remove those that don't seem
> relevant anymore but keep references to reiserfs' r5 hash used by some
> code.
>
> There's one change in a script scripts/selinux/install_policy.sh but it
> does not seem to be relevant either.
>
> Signed-off-by: David Sterba <dsterba@...e.com>
> ---

> diff --git a/scripts/selinux/install_policy.sh b/scripts/selinux/install_policy.sh
> index db40237e60ce7e..77368a73f11171 100755
> --- a/scripts/selinux/install_policy.sh
> +++ b/scripts/selinux/install_policy.sh
> @@ -74,7 +74,7 @@ cd /etc/selinux/dummy/contexts/files
>  $SF -F file_contexts /
>
>  mounts=`cat /proc/$$/mounts | \
> -       grep -E "ext[234]|jfs|xfs|reiserfs|jffs2|gfs2|btrfs|f2fs|ocfs2" | \
> +       grep -E "ext[234]|jfs|xfs|jffs2|gfs2|btrfs|f2fs|ocfs2" | \
>         awk '{ print $2 '}`
>  $SF -F file_contexts $mounts
>

Just commenting on the selinux part, this entire list of filesystem
types could likely be removed and replaced by just running "fixfiles
relabel" instead, which on modern kernels (>= 2.6.30) will check for
the "seclabel" option in /proc/self/mounts entries to determine which
filesystems support security labeling.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ