diff for duplicates of <87efkam3u8.fsf@xmission.com> diff --git a/a/1.txt b/N1/1.txt index f8278bd..e73b244 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -1,4 +1,4 @@ -Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org> writes: +Casey Schaufler <casey@schaufler-ca.com> writes: > On 3/23/2018 12:16 PM, Eric W. Biederman wrote: >> All of the implementations of security hooks that take msg_queue only @@ -9,7 +9,7 @@ Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org> writes: >> Making this change will allow struct msg_queue to become private to >> ipc/msg.c. >> ->> Signed-off-by: "Eric W. Biederman" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org> +>> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> >> --- >> include/linux/lsm_hooks.h | 12 ++++++------ >> include/linux/security.h | 25 ++++++++++++------------- @@ -33,3 +33,11 @@ That said I am happy to add a clean up patch that makes the obvious cleanups and simplifications to smack_lsm.c. Eric + + + + +-- +To unsubscribe from this list: send the line "unsubscribe linux-security-module" in +the body of a message to majordomo at vger.kernel.org +More majordomo info at http://vger.kernel.org/majordomo-info.html diff --git a/a/content_digest b/N1/content_digest index c38617c..ef424d0 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -1,28 +1,13 @@ "ref\087vadmobdw.fsf_-_@xmission.com\0" "ref\020180323191614.32489-3-ebiederm@xmission.com\0" "ref\0bb73b0ea-bcda-a996-8f14-48d9dd1b0940@schaufler-ca.com\0" - "ref\0bb73b0ea-bcda-a996-8f14-48d9dd1b0940-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org\0" - "From\0ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org (Eric W. Biederman)\0" - "Subject\0Re: [REVIEW][PATCH 03/11] msg/security: Pass kern_ipc_perm not msg_queue into the msg_queue security hooks\0" + "From\0ebiederm@xmission.com (Eric W. Biederman)\0" + "Subject\0[REVIEW][PATCH 03/11] msg/security: Pass kern_ipc_perm not msg_queue into the msg_queue security hooks\0" "Date\0Sat, 24 Mar 2018 00:37:19 -0500\0" - "To\0Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org>\0" - "Cc\0esyr-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org" - jannh-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org - khlebnikov-XoJtRXgx1JseBXzfvpsJ4g@public.gmane.org - linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - Linux Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org> - serge.hallyn-GeWIH/nMZzLQT0dZR+AlfA@public.gmane.org - linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - prakash.sangappa-QHcLZuEGTsvQT0dZR+AlfA@public.gmane.org - linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org - oleg-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org - akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org - Nagarathnam Muthusamy <nagarathnam.muthusamy-QHcLZuEGTsvQT0dZR+AlfA@public.gmane.org> - " Pavel Emelyanov <xemul-GEFAQzZX7r8dnm+yROfE0A@public.gmane.org>\0" + "To\0linux-security-module@vger.kernel.org\0" "\00:1\0" "b\0" - "Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org> writes:\n" + "Casey Schaufler <casey@schaufler-ca.com> writes:\n" "\n" "> On 3/23/2018 12:16 PM, Eric W. Biederman wrote:\n" ">> All of the implementations of security hooks that take msg_queue only\n" @@ -33,7 +18,7 @@ ">> Making this change will allow struct msg_queue to become private to\n" ">> ipc/msg.c.\n" ">>\n" - ">> Signed-off-by: \"Eric W. Biederman\" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>\n" + ">> Signed-off-by: \"Eric W. Biederman\" <ebiederm@xmission.com>\n" ">> ---\n" ">> include/linux/lsm_hooks.h | 12 ++++++------\n" ">> include/linux/security.h | 25 ++++++++++++-------------\n" @@ -56,6 +41,14 @@ "That said I am happy to add a clean up patch that makes the obvious\n" "cleanups and simplifications to smack_lsm.c.\n" "\n" - Eric + "Eric\n" + "\n" + "\n" + "\n" + "\n" + "--\n" + "To unsubscribe from this list: send the line \"unsubscribe linux-security-module\" in\n" + "the body of a message to majordomo at vger.kernel.org\n" + More majordomo info at http://vger.kernel.org/majordomo-info.html -752adf1c844a1a3231d62e439ba4f4e22b1360b757be7a9e782c88d6af7a3db3 +9d155c8482f8109c76b4cf05eddf772638c5e6e92cbb1a4bd8381e005000e9ec
diff --git a/a/1.txt b/N2/1.txt index f8278bd..9e45d23 100644 --- a/a/1.txt +++ b/N2/1.txt @@ -1,4 +1,4 @@ -Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org> writes: +Casey Schaufler <casey@schaufler-ca.com> writes: > On 3/23/2018 12:16 PM, Eric W. Biederman wrote: >> All of the implementations of security hooks that take msg_queue only @@ -9,7 +9,7 @@ Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org> writes: >> Making this change will allow struct msg_queue to become private to >> ipc/msg.c. >> ->> Signed-off-by: "Eric W. Biederman" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org> +>> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> >> --- >> include/linux/lsm_hooks.h | 12 ++++++------ >> include/linux/security.h | 25 ++++++++++++------------- diff --git a/a/content_digest b/N2/content_digest index c38617c..cd80d77 100644 --- a/a/content_digest +++ b/N2/content_digest @@ -1,28 +1,27 @@ "ref\087vadmobdw.fsf_-_@xmission.com\0" "ref\020180323191614.32489-3-ebiederm@xmission.com\0" "ref\0bb73b0ea-bcda-a996-8f14-48d9dd1b0940@schaufler-ca.com\0" - "ref\0bb73b0ea-bcda-a996-8f14-48d9dd1b0940-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org\0" - "From\0ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org (Eric W. Biederman)\0" + "From\0ebiederm@xmission.com (Eric W. Biederman)\0" "Subject\0Re: [REVIEW][PATCH 03/11] msg/security: Pass kern_ipc_perm not msg_queue into the msg_queue security hooks\0" "Date\0Sat, 24 Mar 2018 00:37:19 -0500\0" - "To\0Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org>\0" - "Cc\0esyr-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org" - jannh-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org - khlebnikov-XoJtRXgx1JseBXzfvpsJ4g@public.gmane.org - linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - Linux Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org> - serge.hallyn-GeWIH/nMZzLQT0dZR+AlfA@public.gmane.org - linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - prakash.sangappa-QHcLZuEGTsvQT0dZR+AlfA@public.gmane.org - linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org - oleg-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org - akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org - Nagarathnam Muthusamy <nagarathnam.muthusamy-QHcLZuEGTsvQT0dZR+AlfA@public.gmane.org> - " Pavel Emelyanov <xemul-GEFAQzZX7r8dnm+yROfE0A@public.gmane.org>\0" + "To\0Casey Schaufler <casey@schaufler-ca.com>\0" + "Cc\0Linux Containers <containers@lists.linux-foundation.org>" + linux-kernel@vger.kernel.org + linux-api@vger.kernel.org + khlebnikov@yandex-team.ru + prakash.sangappa@oracle.com + luto@kernel.org + akpm@linux-foundation.org + oleg@redhat.com + serge.hallyn@ubuntu.com + esyr@redhat.com + jannh@google.com + linux-security-module@vger.kernel.org + Pavel Emelyanov <xemul@openvz.org> + " Nagarathnam Muthusamy <nagarathnam.muthusamy@oracle.com>\0" "\00:1\0" "b\0" - "Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org> writes:\n" + "Casey Schaufler <casey@schaufler-ca.com> writes:\n" "\n" "> On 3/23/2018 12:16 PM, Eric W. Biederman wrote:\n" ">> All of the implementations of security hooks that take msg_queue only\n" @@ -33,7 +32,7 @@ ">> Making this change will allow struct msg_queue to become private to\n" ">> ipc/msg.c.\n" ">>\n" - ">> Signed-off-by: \"Eric W. Biederman\" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>\n" + ">> Signed-off-by: \"Eric W. Biederman\" <ebiederm@xmission.com>\n" ">> ---\n" ">> include/linux/lsm_hooks.h | 12 ++++++------\n" ">> include/linux/security.h | 25 ++++++++++++-------------\n" @@ -58,4 +57,4 @@ "\n" Eric -752adf1c844a1a3231d62e439ba4f4e22b1360b757be7a9e782c88d6af7a3db3 +e5be7166f7a3bada0b047efd86a4c27ec17c9a17930131a9b7ce6d2b547cccec
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.