Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Fri, 18 Oct 2002 18:40:04 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Fri, 18 Oct 2002 18:40:04 -0400 Received: from cerebus.wirex.com ([65.102.14.138]:55033 "EHLO figure1.int.wirex.com") by vger.kernel.org with ESMTP id ; Fri, 18 Oct 2002 18:40:03 -0400 Date: Fri, 18 Oct 2002 15:36:50 -0700 From: Chris Wright To: Stephen Smalley Cc: Christoph Hellwig , linux-kernel@vger.kernel.org, linux-security-module@wirex.com Subject: Re: [PATCH] remove sys_security Message-ID: <20021018153650.G26442@figure1.int.wirex.com> Mail-Followup-To: Stephen Smalley , Christoph Hellwig , linux-kernel@vger.kernel.org, linux-security-module@wirex.com References: <20021018173339.A7481@infradead.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: ; from sds@tislabs.com on Fri, Oct 18, 2002 at 01:15:04PM -0400 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 819 Lines: 22 * Stephen Smalley (sds@tislabs.com) wrote: > > On Fri, 18 Oct 2002, Christoph Hellwig wrote: > > > It adds infrastructure to implement syscalls without peer review. > > And then it ends being crap like the selinux syscalls. > > Yes, I think you've made your point. Go ahead, remove sys_security. Looks like we should remove this. The interface is awkward, and there are many examples of how it's not needed and is broken by design. I know SubDomain can get by without it. thanks, -chris -- Linux Security Modules http://lsm.immunix.org http://lsm.bkbits.net - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/