diff for duplicates of <20141003201409.GM10583@worktop.programming.kicks-ass.net> diff --git a/a/1.txt b/N1/1.txt index 093ed15..0add1d4 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -1,7 +1,7 @@ On Fri, Oct 03, 2014 at 10:27:47AM -0700, Andy Lutomirski wrote: > [adding linux-api. whoops.] > -> On Fri, Oct 3, 2014 at 10:18 AM, Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org> wrote: +> On Fri, Oct 3, 2014 at 10:18 AM, Andy Lutomirski <luto@amacapital.net> wrote: > > PR_SET_TSC / PR_TSC_SIGSEGV is a security feature to prevent heavily > > sandboxed programs from learning the time, presumably to avoid > > disclosing the wall clock and to make timing attacks much harder to diff --git a/a/content_digest b/N1/content_digest index b313763..99387b3 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -1,27 +1,26 @@ "ref\0fc0c2447cbc39257941c6b118388c024b719353a.1412356529.git.luto@amacapital.net\0" "ref\0CALCETrUfCrvidOS6VvUpWFAcHUrPUs58zSQqGRC5UOTS=E37rw@mail.gmail.com\0" - "ref\0CALCETrUfCrvidOS6VvUpWFAcHUrPUs58zSQqGRC5UOTS=E37rw-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org\0" - "From\0Peter Zijlstra <peterz-wEGCiKHe2LqWVfeAwA7xHQ@public.gmane.org>\0" + "From\0Peter Zijlstra <peterz@infradead.org>\0" "Subject\0Re: [PATCH] x86,seccomp,prctl: Remove PR_TSC_SIGSEGV and seccomp TSC filtering\0" "Date\0Fri, 3 Oct 2014 22:14:09 +0200\0" - "To\0Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org>\0" - "Cc\0linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>" - Ingo Molnar <mingo-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> - Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org> - Andrea Arcangeli <aarcange-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> - Erik Bosman <ebn310-vHs5IaWfoDhmR6Xm/wNWPw@public.gmane.org> - H. Peter Anvin <hpa-YMNOUZJC4hwAvxtiuMwx3w@public.gmane.org> - Linux API <linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org> - Michael Kerrisk-manpages <mtk.manpages-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> - Paul Mackerras <paulus-eUNUBHrolfbYtjvyW6yDsg@public.gmane.org> - Arnaldo Carvalho de Melo <acme-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org> - " X86 ML <x86-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>\0" + "To\0Andy Lutomirski <luto@amacapital.net>\0" + "Cc\0linux-kernel@vger.kernel.org <linux-kernel@vger.kernel.org>" + Ingo Molnar <mingo@redhat.com> + Kees Cook <keescook@chromium.org> + Andrea Arcangeli <aarcange@redhat.com> + Erik Bosman <ebn310@few.vu.nl> + H. Peter Anvin <hpa@zytor.com> + Linux API <linux-api@vger.kernel.org> + Michael Kerrisk-manpages <mtk.manpages@gmail.com> + Paul Mackerras <paulus@samba.org> + Arnaldo Carvalho de Melo <acme@kernel.org> + " X86 ML <x86@kernel.org>\0" "\00:1\0" "b\0" "On Fri, Oct 03, 2014 at 10:27:47AM -0700, Andy Lutomirski wrote:\n" "> [adding linux-api. whoops.]\n" "> \n" - "> On Fri, Oct 3, 2014 at 10:18 AM, Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org> wrote:\n" + "> On Fri, Oct 3, 2014 at 10:18 AM, Andy Lutomirski <luto@amacapital.net> wrote:\n" "> > PR_SET_TSC / PR_TSC_SIGSEGV is a security feature to prevent heavily\n" "> > sandboxed programs from learning the time, presumably to avoid\n" "> > disclosing the wall clock and to make timing attacks much harder to\n" @@ -55,4 +54,4 @@ "users, which might have also disabled the syscall. Note that is is\n" possible to disable RDPMC while still allowing the syscall. -84c3d83727a05146fd9963716b8bcb6b4c67abd05656ba043774cf32930cef9f +d8e04c4b650ee72432d9b16e65f4be06270227cf1c7fa65ca2595b0c3d5d6dfa
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.