On Mon, 12 Jun 2006 14:29:20 +0200 Miklos Szeredi <miklos@xxxxxxxxxx> wrote: > +/* > + * It would be nice to scramble the ID space, so that the value of the > + * files_struct pointer is not exposed to userspace. Symmetric crypto > + * functions are overkill, since the inverse function doesn't need to > + * be implemented (though it does have to exist). Is there something > + * simpler? > + */ > +static inline u64 fuse_lock_owner_id(fl_owner_t id) > +{ > + return (unsigned long) id; > +} Add a constant, not-known-to-userspace offset to all ids? - To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html