diff for duplicates of <20140701095356.GC2242@google.com> diff --git a/a/1.txt b/N1/1.txt index 38697ea..26d699f 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -1,5 +1,5 @@ On Mon, Jun 30, 2014 at 01:40:40PM -0700, Andi Kleen wrote: -> David Drysdale <drysdale-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org> writes: +> David Drysdale <drysdale@google.com> writes: > > > Add a new O_BENEATH_ONLY flag for openat(2) which restricts the > > provided path, rejecting (with -EACCES) paths that are not beneath @@ -13,7 +13,7 @@ On Mon, Jun 30, 2014 at 01:40:40PM -0700, Andi Kleen wrote: > -Andi > > -- -> ak-VuQAYsv1563Yd54FQh9/CA@public.gmane.org -- Speaking for myself only +> ak@linux.intel.com -- Speaking for myself only Bind mounts won't get rejected because they just look like normal path components. In other words, if dir/subdir is a bind mount to diff --git a/a/content_digest b/N1/content_digest index 1ee0d6d..2cb2206 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -1,23 +1,22 @@ "ref\01404124096-21445-1-git-send-email-drysdale@google.com\0" "ref\01404124096-21445-2-git-send-email-drysdale@google.com\0" "ref\087mwcuw2pj.fsf@tassilo.jf.intel.com\0" - "ref\087mwcuw2pj.fsf-KWJ+5VKanrL29G5dvP0v1laTQe2KTcn/@public.gmane.org\0" - "From\0David Drysdale <drysdale-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org>\0" + "From\0David Drysdale <drysdale@google.com>\0" "Subject\0Re: [PATCH 01/11] fs: add O_BENEATH_ONLY flag to openat(2)\0" "Date\0Tue, 1 Jul 2014 10:53:56 +0100\0" - "To\0Andi Kleen <andi-Vw/NltI1exuRpAAqCnN02g@public.gmane.org>\0" - "Cc\0linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org" - linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - Greg Kroah-Hartman <gregkh-hQyY1W1yCW8ekmWlsbkhG0B+6BGkLq7r@public.gmane.org> - Alexander Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org> - Meredydd Luff <meredydd-zPN50pYk8eUaUu29zAJCuw@public.gmane.org> - Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org> - James Morris <james.l.morris-QHcLZuEGTsvQT0dZR+AlfA@public.gmane.org> - " linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org\0" + "To\0Andi Kleen <andi@firstfloor.org>\0" + "Cc\0linux-security-module@vger.kernel.org" + linux-kernel@vger.kernel.org + Greg Kroah-Hartman <gregkh@linuxfoundation.org> + Alexander Viro <viro@zeniv.linux.org.uk> + Meredydd Luff <meredydd@senatehouse.org> + Kees Cook <keescook@chromium.org> + James Morris <james.l.morris@oracle.com> + " linux-api@vger.kernel.org\0" "\00:1\0" "b\0" "On Mon, Jun 30, 2014 at 01:40:40PM -0700, Andi Kleen wrote:\n" - "> David Drysdale <drysdale-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org> writes:\n" + "> David Drysdale <drysdale@google.com> writes:\n" "> \n" "> > Add a new O_BENEATH_ONLY flag for openat(2) which restricts the\n" "> > provided path, rejecting (with -EACCES) paths that are not beneath\n" @@ -31,7 +30,7 @@ "> -Andi\n" "> \n" "> -- \n" - "> ak-VuQAYsv1563Yd54FQh9/CA@public.gmane.org -- Speaking for myself only\n" + "> ak@linux.intel.com -- Speaking for myself only\n" "\n" "Bind mounts won't get rejected because they just look like normal\n" "path components. In other words, if dir/subdir is a bind mount to\n" @@ -39,4 +38,4 @@ " fd = openat(AT_FDCWD, \"dir/subdir\", O_RDONLY|O_BENEATH_ONLY);\n" will work fine. -4543677563bd86c6293ae40e014480b01460e360120cc61dc2ae1d897e23b29b +75d445f2f161dbc1eeeb35642b46f3dda61ad4d3f0cd04361934004fe5e6987f
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.