diff for duplicates of <20200526205322.23465-12-mic@digikod.net> diff --git a/a/1.txt b/N1/1.txt index c64f92c..c01a06f 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -1,11 +1,11 @@ Add a basic sandbox tool to launch a command which can only access a whitelist of file hierarchies in a read-only or read-write way. -Signed-off-by: Mickaël Salaün <mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org> -Cc: James Morris <jmorris-gx6/JNMH7DfYtjvyW6yDsg@public.gmane.org> -Cc: Jann Horn <jannh-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org> -Cc: Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org> -Cc: Serge E. Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org> +Signed-off-by: Mickaël Salaün <mic@digikod.net> +Cc: James Morris <jmorris@namei.org> +Cc: Jann Horn <jannh@google.com> +Cc: Kees Cook <keescook@chromium.org> +Cc: Serge E. Hallyn <serge@hallyn.com> --- Changes since v16: @@ -35,7 +35,7 @@ Changes since v11: new Landlock syscall. Previous changes: -https://lore.kernel.org/lkml/20190721213116.23476-9-mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org/ +https://lore.kernel.org/lkml/20190721213116.23476-9-mic@digikod.net/ --- samples/Kconfig | 7 ++ samples/Makefile | 1 + @@ -116,7 +116,7 @@ index 000000000000..e0059706c11f + * Simple Landlock sandbox manager able to launch a process restricted by a + * user-defined filesystem access-control security policy. + * -+ * Copyright © 2017-2020 Mickaël Salaün <mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org> ++ * Copyright © 2017-2020 Mickaël Salaün <mic@digikod.net> + * Copyright © 2020 ANSSI + */ + diff --git a/a/content_digest b/N1/content_digest index 49eced9..ad82990 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -1,38 +1,43 @@ "ref\020200526205322.23465-1-mic@digikod.net\0" - "ref\020200526205322.23465-1-mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org\0" - "From\0Micka\303\253l Sala\303\274n <mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org>\0" + "From\0Micka\303\253l Sala\303\274n <mic@digikod.net>\0" "Subject\0[PATCH v18 11/12] samples/landlock: Add a sandbox manager example\0" "Date\0Tue, 26 May 2020 22:53:21 +0200\0" - "To\0linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org\0" - "Cc\0Micka\303\253l Sala\303\274n <mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org>" - Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org> - Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org> - Anton Ivanov <anton.ivanov-eaSgp5hN2EAtwqFdIEgyzdBPR1lH4CV8@public.gmane.org> - Arnd Bergmann <arnd-r2nGTMty4D4@public.gmane.org> - Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org> - James Morris <jmorris-gx6/JNMH7DfYtjvyW6yDsg@public.gmane.org> - Jann Horn <jannh-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org> - Jeff Dike <jdike-OPE4K8JWMJJBDgjK7y7TUQ@public.gmane.org> - Jonathan Corbet <corbet-T1hC0tSOHrs@public.gmane.org> - Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org> - Michael Kerrisk <mtk.manpages-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> - " Micka\303\253l Sala\303\274n <mickael.salaun-D9rjmswh09VWj0EZb7rXcA@public.gmane.org>" - Richard Weinberger <richard-/L3Ra7n9ekc@public.gmane.org> - Serge E . Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org> - Shuah Khan <shuah-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org> - Vincent Dagonneau <vincent.dagonneau-D9rjmswh09VWj0EZb7rXcA@public.gmane.org> - kernel-hardening-ZwoEplunGu1jrUoiu81ncdBPR1lH4CV8@public.gmane.org - " linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org\0" + "To\0linux-kernel@vger.kernel.org\0" + "Cc\0Micka\303\253l Sala\303\274n <mic@digikod.net>" + Al Viro <viro@zeniv.linux.org.uk> + Andy Lutomirski <luto@amacapital.net> + Anton Ivanov <anton.ivanov@cambridgegreys.com> + Arnd Bergmann <arnd@arndb.de> + Casey Schaufler <casey@schaufler-ca.com> + James Morris <jmorris@namei.org> + Jann Horn <jannh@google.com> + Jeff Dike <jdike@addtoit.com> + Jonathan Corbet <corbet@lwn.net> + Kees Cook <keescook@chromium.org> + Michael Kerrisk <mtk.manpages@gmail.com> + " Micka\303\253l Sala\303\274n <mickael.salaun@ssi.gouv.fr>" + Richard Weinberger <richard@nod.at> + Serge E . Hallyn <serge@hallyn.com> + Shuah Khan <shuah@kernel.org> + Vincent Dagonneau <vincent.dagonneau@ssi.gouv.fr> + kernel-hardening@lists.openwall.com + linux-api@vger.kernel.org + linux-arch@vger.kernel.org + linux-doc@vger.kernel.org + linux-fsdevel@vger.kernel.org + linux-kselftest@vger.kernel.org + linux-security-module@vger.kernel.org + " x86@kernel.org\0" "\00:1\0" "b\0" "Add a basic sandbox tool to launch a command which can only access a\n" "whitelist of file hierarchies in a read-only or read-write way.\n" "\n" - "Signed-off-by: Micka\303\253l Sala\303\274n <mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org>\n" - "Cc: James Morris <jmorris-gx6/JNMH7DfYtjvyW6yDsg@public.gmane.org>\n" - "Cc: Jann Horn <jannh-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org>\n" - "Cc: Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org>\n" - "Cc: Serge E. Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>\n" + "Signed-off-by: Micka\303\253l Sala\303\274n <mic@digikod.net>\n" + "Cc: James Morris <jmorris@namei.org>\n" + "Cc: Jann Horn <jannh@google.com>\n" + "Cc: Kees Cook <keescook@chromium.org>\n" + "Cc: Serge E. Hallyn <serge@hallyn.com>\n" "---\n" "\n" "Changes since v16:\n" @@ -62,7 +67,7 @@ " new Landlock syscall.\n" "\n" "Previous changes:\n" - "https://lore.kernel.org/lkml/20190721213116.23476-9-mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org/\n" + "https://lore.kernel.org/lkml/20190721213116.23476-9-mic@digikod.net/\n" "---\n" " samples/Kconfig | 7 ++\n" " samples/Makefile | 1 +\n" @@ -143,7 +148,7 @@ "+ * Simple Landlock sandbox manager able to launch a process restricted by a\n" "+ * user-defined filesystem access-control security policy.\n" "+ *\n" - "+ * Copyright \302\251 2017-2020 Micka\303\253l Sala\303\274n <mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org>\n" + "+ * Copyright \302\251 2017-2020 Micka\303\253l Sala\303\274n <mic@digikod.net>\n" "+ * Copyright \302\251 2020 ANSSI\n" "+ */\n" "+\n" @@ -369,4 +374,4 @@ "-- \n" 2.26.2 -ffc70b8c3ef083c11bf125cfe5e7e326a0c48241cb2942aff233d5539a87868e +80d3b13cb9c7314b0ed9ef20bfed64eeeb57a8b999c61e05dcf28530b327d94a
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox