All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <1305300181.2466.72.camel@twins>

diff --git a/a/1.txt b/N1/1.txt
index a26bf4b..55e4881 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,7 +1,7 @@
 On Fri, 2011-05-13 at 11:10 -0400, Eric Paris wrote:
 > Then again, I certainly don't see a
 > reason that this syscall hardening patch should be held up while a whole
-> new concept in computer security is contemplated... 
+> new concept in computer security is contemplated...=20
 
 Which makes me wonder why this syscall hardening stuff is done outside
 of LSM? Why isn't is part of the LSM so that say SELinux can have a
diff --git a/a/content_digest b/N1/content_digest
index 15cc2a3..28f8968 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -10,48 +10,47 @@
  "Subject\0Re: [PATCH 3/5] v2 seccomp_filters: Enable ftrace-based system call filtering\0"
  "Date\0Fri, 13 May 2011 17:23:01 +0200\0"
  "To\0Eric Paris <eparis@redhat.com>\0"
- "Cc\0Ingo Molnar <mingo@elte.hu>"
-  James Morris <jmorris@namei.org>
-  Will Drewry <wad@chromium.org>
-  linux-kernel@vger.kernel.org
-  Steven Rostedt <rostedt@goodmis.org>
+ "Cc\0linux-mips@linux-mips.org"
+  linux-sh@vger.kernel.org
   Frederic Weisbecker <fweisbec@gmail.com>
-  kees.cook@canonical.com
-  agl@chromium.org
-  Serge E. Hallyn <serge@hallyn.com>
-  Ingo Molnar <mingo@redhat.com>
-  Andrew Morton <akpm@linux-foundation.org>
-  Tejun Heo <tj@kernel.org>
-  Michal Marek <mmarek@suse.cz>
+  Heiko Carstens <heiko.carstens@de.ibm.com>
   Oleg Nesterov <oleg@redhat.com>
-  Jiri Slaby <jslaby@suse.cz>
   David Howells <dhowells@redhat.com>
-  Russell King <linux@arm.linux.org.uk>
-  Michal Simek <monstr@monstr.eu>
-  Ralf Baechle <ralf@linux-mips.org>
-  Benjamin Herrenschmidt <benh@kernel.crashing.org>
   Paul Mackerras <paulus@samba.org>
-  Martin Schwidefsky <schwidefsky@de.ibm.com>
-  Heiko Carstens <heiko.carstens@de.ibm.com>
-  linux390@de.ibm.com
-  Paul Mundt <lethal@linux-sh.org>
-  David S. Miller <davem@davemloft.net>
-  Thomas Gleixner <tglx@linutronix.de>
   H. Peter Anvin <hpa@zytor.com>
+  sparclinux@vger.kernel.org
+  Jiri Slaby <jslaby@suse.cz>
+  linux-s390@vger.kernel.org
+  Russell King <linux@arm.linux.org.uk>
   x86@kernel.org
+  James Morris <jmorris@namei.org>
+  Linus Torvalds <torvalds@linux-foundation.org>
+  Ingo Molnar <mingo@redhat.com>
+  Ingo Molnar <mingo@elte.hu>
+  Serge E. Hallyn <serge@hallyn.com>
+  Steven Rostedt <rostedt@goodmis.org>
+  Tejun Heo <tj@kernel.org>
+  Thomas Gleixner <tglx@linutronix.de>
+  kees.cook@canonical.com
   linux-arm-kernel@lists.infradead.org
-  linux-mips@linux-mips.org
+  Michal Marek <mmarek@suse.cz>
+  Michal Simek <monstr@monstr.eu>
+  Will Drewry <wad@chromium.org>
   linuxppc-dev@lists.ozlabs.org
-  linux-s390@vger.kernel.org
-  linux-sh@vger.kernel.org
-  sparclinux@vger.kernel.org
- " Linus Torvalds <torvalds@linux-foundation.org>\0"
+  linux-kernel@vger.kernel.org
+  Ralf Baechle <ralf@linux-mips.org>
+  Paul Mundt <lethal@linux-sh.org>
+  Martin Schwidefsky <schwidefsky@de.ibm.com>
+  linux390@de.ibm.com
+  Andrew Morton <akpm@linux-foundation.org>
+  agl@chromium.org
+ " David S. Miller <davem@davemloft.net>\0"
  "\00:1\0"
  "b\0"
  "On Fri, 2011-05-13 at 11:10 -0400, Eric Paris wrote:\n"
  "> Then again, I certainly don't see a\n"
  "> reason that this syscall hardening patch should be held up while a whole\n"
- "> new concept in computer security is contemplated... \n"
+ "> new concept in computer security is contemplated...=20\n"
  "\n"
  "Which makes me wonder why this syscall hardening stuff is done outside\n"
  "of LSM? Why isn't is part of the LSM so that say SELinux can have a\n"
@@ -59,4 +58,4 @@
  "\n"
  Making it part of the LSM also avoids having to add this prctl().
 
-87cc8ad408940e9ddc66748a87f9c9a70e0f8f9ac052223234221e31ef5c3585
+6b9e36733c9ce5fded7285e7c5ff99b05120f6c00063ff9fcffb27ed8a8e9fcc

diff --git a/a/content_digest b/N2/content_digest
index 15cc2a3..ae7dcd1 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -6,46 +6,10 @@
  "ref\0alpine.LRH.2.00.1105131018040.3047@tundra.namei.org\0"
  "ref\020110513121034.GG21022@elte.hu\0"
  "ref\01305299455.2076.26.camel@localhost.localdomain\0"
- "From\0Peter Zijlstra <peterz@infradead.org>\0"
- "Subject\0Re: [PATCH 3/5] v2 seccomp_filters: Enable ftrace-based system call filtering\0"
+ "From\0peterz@infradead.org (Peter Zijlstra)\0"
+ "Subject\0[PATCH 3/5] v2 seccomp_filters: Enable ftrace-based system call filtering\0"
  "Date\0Fri, 13 May 2011 17:23:01 +0200\0"
- "To\0Eric Paris <eparis@redhat.com>\0"
- "Cc\0Ingo Molnar <mingo@elte.hu>"
-  James Morris <jmorris@namei.org>
-  Will Drewry <wad@chromium.org>
-  linux-kernel@vger.kernel.org
-  Steven Rostedt <rostedt@goodmis.org>
-  Frederic Weisbecker <fweisbec@gmail.com>
-  kees.cook@canonical.com
-  agl@chromium.org
-  Serge E. Hallyn <serge@hallyn.com>
-  Ingo Molnar <mingo@redhat.com>
-  Andrew Morton <akpm@linux-foundation.org>
-  Tejun Heo <tj@kernel.org>
-  Michal Marek <mmarek@suse.cz>
-  Oleg Nesterov <oleg@redhat.com>
-  Jiri Slaby <jslaby@suse.cz>
-  David Howells <dhowells@redhat.com>
-  Russell King <linux@arm.linux.org.uk>
-  Michal Simek <monstr@monstr.eu>
-  Ralf Baechle <ralf@linux-mips.org>
-  Benjamin Herrenschmidt <benh@kernel.crashing.org>
-  Paul Mackerras <paulus@samba.org>
-  Martin Schwidefsky <schwidefsky@de.ibm.com>
-  Heiko Carstens <heiko.carstens@de.ibm.com>
-  linux390@de.ibm.com
-  Paul Mundt <lethal@linux-sh.org>
-  David S. Miller <davem@davemloft.net>
-  Thomas Gleixner <tglx@linutronix.de>
-  H. Peter Anvin <hpa@zytor.com>
-  x86@kernel.org
-  linux-arm-kernel@lists.infradead.org
-  linux-mips@linux-mips.org
-  linuxppc-dev@lists.ozlabs.org
-  linux-s390@vger.kernel.org
-  linux-sh@vger.kernel.org
-  sparclinux@vger.kernel.org
- " Linus Torvalds <torvalds@linux-foundation.org>\0"
+ "To\0linux-arm-kernel@lists.infradead.org\0"
  "\00:1\0"
  "b\0"
  "On Fri, 2011-05-13 at 11:10 -0400, Eric Paris wrote:\n"
@@ -59,4 +23,4 @@
  "\n"
  Making it part of the LSM also avoids having to add this prctl().
 
-87cc8ad408940e9ddc66748a87f9c9a70e0f8f9ac052223234221e31ef5c3585
+ecc12796e7c17c9c6e4da9249155136408fb42a45f72ea33f8e6f03255eccbfb

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.