diff for duplicates of <1305300181.2466.72.camel@twins> diff --git a/a/1.txt b/N1/1.txt index a26bf4b..55e4881 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -1,7 +1,7 @@ On Fri, 2011-05-13 at 11:10 -0400, Eric Paris wrote: > Then again, I certainly don't see a > reason that this syscall hardening patch should be held up while a whole -> new concept in computer security is contemplated... +> new concept in computer security is contemplated...=20 Which makes me wonder why this syscall hardening stuff is done outside of LSM? Why isn't is part of the LSM so that say SELinux can have a diff --git a/a/content_digest b/N1/content_digest index 15cc2a3..28f8968 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -10,48 +10,47 @@ "Subject\0Re: [PATCH 3/5] v2 seccomp_filters: Enable ftrace-based system call filtering\0" "Date\0Fri, 13 May 2011 17:23:01 +0200\0" "To\0Eric Paris <eparis@redhat.com>\0" - "Cc\0Ingo Molnar <mingo@elte.hu>" - James Morris <jmorris@namei.org> - Will Drewry <wad@chromium.org> - linux-kernel@vger.kernel.org - Steven Rostedt <rostedt@goodmis.org> + "Cc\0linux-mips@linux-mips.org" + linux-sh@vger.kernel.org Frederic Weisbecker <fweisbec@gmail.com> - kees.cook@canonical.com - agl@chromium.org - Serge E. Hallyn <serge@hallyn.com> - Ingo Molnar <mingo@redhat.com> - Andrew Morton <akpm@linux-foundation.org> - Tejun Heo <tj@kernel.org> - Michal Marek <mmarek@suse.cz> + Heiko Carstens <heiko.carstens@de.ibm.com> Oleg Nesterov <oleg@redhat.com> - Jiri Slaby <jslaby@suse.cz> David Howells <dhowells@redhat.com> - Russell King <linux@arm.linux.org.uk> - Michal Simek <monstr@monstr.eu> - Ralf Baechle <ralf@linux-mips.org> - Benjamin Herrenschmidt <benh@kernel.crashing.org> Paul Mackerras <paulus@samba.org> - Martin Schwidefsky <schwidefsky@de.ibm.com> - Heiko Carstens <heiko.carstens@de.ibm.com> - linux390@de.ibm.com - Paul Mundt <lethal@linux-sh.org> - David S. Miller <davem@davemloft.net> - Thomas Gleixner <tglx@linutronix.de> H. Peter Anvin <hpa@zytor.com> + sparclinux@vger.kernel.org + Jiri Slaby <jslaby@suse.cz> + linux-s390@vger.kernel.org + Russell King <linux@arm.linux.org.uk> x86@kernel.org + James Morris <jmorris@namei.org> + Linus Torvalds <torvalds@linux-foundation.org> + Ingo Molnar <mingo@redhat.com> + Ingo Molnar <mingo@elte.hu> + Serge E. Hallyn <serge@hallyn.com> + Steven Rostedt <rostedt@goodmis.org> + Tejun Heo <tj@kernel.org> + Thomas Gleixner <tglx@linutronix.de> + kees.cook@canonical.com linux-arm-kernel@lists.infradead.org - linux-mips@linux-mips.org + Michal Marek <mmarek@suse.cz> + Michal Simek <monstr@monstr.eu> + Will Drewry <wad@chromium.org> linuxppc-dev@lists.ozlabs.org - linux-s390@vger.kernel.org - linux-sh@vger.kernel.org - sparclinux@vger.kernel.org - " Linus Torvalds <torvalds@linux-foundation.org>\0" + linux-kernel@vger.kernel.org + Ralf Baechle <ralf@linux-mips.org> + Paul Mundt <lethal@linux-sh.org> + Martin Schwidefsky <schwidefsky@de.ibm.com> + linux390@de.ibm.com + Andrew Morton <akpm@linux-foundation.org> + agl@chromium.org + " David S. Miller <davem@davemloft.net>\0" "\00:1\0" "b\0" "On Fri, 2011-05-13 at 11:10 -0400, Eric Paris wrote:\n" "> Then again, I certainly don't see a\n" "> reason that this syscall hardening patch should be held up while a whole\n" - "> new concept in computer security is contemplated... \n" + "> new concept in computer security is contemplated...=20\n" "\n" "Which makes me wonder why this syscall hardening stuff is done outside\n" "of LSM? Why isn't is part of the LSM so that say SELinux can have a\n" @@ -59,4 +58,4 @@ "\n" Making it part of the LSM also avoids having to add this prctl(). -87cc8ad408940e9ddc66748a87f9c9a70e0f8f9ac052223234221e31ef5c3585 +6b9e36733c9ce5fded7285e7c5ff99b05120f6c00063ff9fcffb27ed8a8e9fcc
diff --git a/a/content_digest b/N2/content_digest index 15cc2a3..ae7dcd1 100644 --- a/a/content_digest +++ b/N2/content_digest @@ -6,46 +6,10 @@ "ref\0alpine.LRH.2.00.1105131018040.3047@tundra.namei.org\0" "ref\020110513121034.GG21022@elte.hu\0" "ref\01305299455.2076.26.camel@localhost.localdomain\0" - "From\0Peter Zijlstra <peterz@infradead.org>\0" - "Subject\0Re: [PATCH 3/5] v2 seccomp_filters: Enable ftrace-based system call filtering\0" + "From\0peterz@infradead.org (Peter Zijlstra)\0" + "Subject\0[PATCH 3/5] v2 seccomp_filters: Enable ftrace-based system call filtering\0" "Date\0Fri, 13 May 2011 17:23:01 +0200\0" - "To\0Eric Paris <eparis@redhat.com>\0" - "Cc\0Ingo Molnar <mingo@elte.hu>" - James Morris <jmorris@namei.org> - Will Drewry <wad@chromium.org> - linux-kernel@vger.kernel.org - Steven Rostedt <rostedt@goodmis.org> - Frederic Weisbecker <fweisbec@gmail.com> - kees.cook@canonical.com - agl@chromium.org - Serge E. Hallyn <serge@hallyn.com> - Ingo Molnar <mingo@redhat.com> - Andrew Morton <akpm@linux-foundation.org> - Tejun Heo <tj@kernel.org> - Michal Marek <mmarek@suse.cz> - Oleg Nesterov <oleg@redhat.com> - Jiri Slaby <jslaby@suse.cz> - David Howells <dhowells@redhat.com> - Russell King <linux@arm.linux.org.uk> - Michal Simek <monstr@monstr.eu> - Ralf Baechle <ralf@linux-mips.org> - Benjamin Herrenschmidt <benh@kernel.crashing.org> - Paul Mackerras <paulus@samba.org> - Martin Schwidefsky <schwidefsky@de.ibm.com> - Heiko Carstens <heiko.carstens@de.ibm.com> - linux390@de.ibm.com - Paul Mundt <lethal@linux-sh.org> - David S. Miller <davem@davemloft.net> - Thomas Gleixner <tglx@linutronix.de> - H. Peter Anvin <hpa@zytor.com> - x86@kernel.org - linux-arm-kernel@lists.infradead.org - linux-mips@linux-mips.org - linuxppc-dev@lists.ozlabs.org - linux-s390@vger.kernel.org - linux-sh@vger.kernel.org - sparclinux@vger.kernel.org - " Linus Torvalds <torvalds@linux-foundation.org>\0" + "To\0linux-arm-kernel@lists.infradead.org\0" "\00:1\0" "b\0" "On Fri, 2011-05-13 at 11:10 -0400, Eric Paris wrote:\n" @@ -59,4 +23,4 @@ "\n" Making it part of the LSM also avoids having to add this prctl(). -87cc8ad408940e9ddc66748a87f9c9a70e0f8f9ac052223234221e31ef5c3585 +ecc12796e7c17c9c6e4da9249155136408fb42a45f72ea33f8e6f03255eccbfb
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.