All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <157909516006.20155.16914270465856385214.stgit@warthog.procyon.org.uk>

diff --git a/a/1.txt b/N1/1.txt
index 8cfdba9..329817b 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -33,7 +33,7 @@ index ecea41ce919b..71b6f37d49c1 100644
 --- a/security/smack/smack_lsm.c
 +++ b/security/smack/smack_lsm.c
 @@ -4273,7 +4273,7 @@ static int smack_key_permission(key_ref_t key_ref,
- 	if (tkp == NULL)
+ 	if (tkp = NULL)
  		return -EACCES;
  
 -	if (smack_privileged_cred(CAP_MAC_OVERRIDE, cred))
@@ -60,18 +60,18 @@ index ecea41ce919b..71b6f37d49c1 100644
 +	struct smack_known *tkp = smk_of_current();
 +	int rc;
 +
-+	if (key == NULL)
++	if (key = NULL)
 +		return -EINVAL;
 +	/*
 +	 * If the key hasn't been initialized give it access so that
 +	 * it may do so.
 +	 */
-+	if (key->security == NULL)
++	if (key->security = NULL)
 +		return 0;
 +	/*
 +	 * This should not occur
 +	 */
-+	if (tkp == NULL)
++	if (tkp = NULL)
 +		return -EACCES;
 +
 +	if (smack_privileged_cred(CAP_MAC_OVERRIDE, current_cred()))
@@ -105,7 +105,7 @@ index ecea41ce919b..71b6f37d49c1 100644
 +	int rc;
 +
 +	/* Always let maintenance notifications through. */
-+	if (n->type == WATCH_TYPE_META)
++	if (n->type = WATCH_TYPE_META)
 +		return 0;
 +
 +	if (!cred)
diff --git a/a/content_digest b/N1/content_digest
index 390a951..ef7f19e 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -20,15 +20,12 @@
   " Stephen Smalley <sds\@tycho.nsa.gov>",
   " nicolas.dichtel\@6wind.com",
   " raven\@themaw.net",
-  " Christian Brauner <christian\@brauner.io>",
-  " dhowells\@redhat.com",
+  " Christian Brauner <christian\@brauner.io>dhowells\@redhat.com",
   " keyrings\@vger.kernel.org",
   " linux-usb\@vger.kernel.org",
   " linux-block\@vger.kernel.org",
   " linux-security-module\@vger.kernel.org",
-  " linux-fsdevel\@vger.kernel.org",
-  " linux-api\@vger.kernel.org",
-  " linux-security-module\@vger.kernel.org",
+  " linux-fsdevel\@vger.kernel.org\@vger.kernel.org",
   " linux-kernel\@vger.kernel.org\0"
 ]
 [
@@ -73,7 +70,7 @@
   "--- a/security/smack/smack_lsm.c\n",
   "+++ b/security/smack/smack_lsm.c\n",
   "\@\@ -4273,7 +4273,7 \@\@ static int smack_key_permission(key_ref_t key_ref,\n",
-  " \tif (tkp == NULL)\n",
+  " \tif (tkp = NULL)\n",
   " \t\treturn -EACCES;\n",
   " \n",
   "-\tif (smack_privileged_cred(CAP_MAC_OVERRIDE, cred))\n",
@@ -100,18 +97,18 @@
   "+\tstruct smack_known *tkp = smk_of_current();\n",
   "+\tint rc;\n",
   "+\n",
-  "+\tif (key == NULL)\n",
+  "+\tif (key = NULL)\n",
   "+\t\treturn -EINVAL;\n",
   "+\t/*\n",
   "+\t * If the key hasn't been initialized give it access so that\n",
   "+\t * it may do so.\n",
   "+\t */\n",
-  "+\tif (key->security == NULL)\n",
+  "+\tif (key->security = NULL)\n",
   "+\t\treturn 0;\n",
   "+\t/*\n",
   "+\t * This should not occur\n",
   "+\t */\n",
-  "+\tif (tkp == NULL)\n",
+  "+\tif (tkp = NULL)\n",
   "+\t\treturn -EACCES;\n",
   "+\n",
   "+\tif (smack_privileged_cred(CAP_MAC_OVERRIDE, current_cred()))\n",
@@ -145,7 +142,7 @@
   "+\tint rc;\n",
   "+\n",
   "+\t/* Always let maintenance notifications through. */\n",
-  "+\tif (n->type == WATCH_TYPE_META)\n",
+  "+\tif (n->type = WATCH_TYPE_META)\n",
   "+\t\treturn 0;\n",
   "+\n",
   "+\tif (!cred)\n",
@@ -181,4 +178,4 @@
   " \tLSM_HOOK_INIT(audit_rule_init, smack_audit_rule_init),"
 ]
 
-0a9ef66daf6709a8c8b6ff6203af0240590ca38193b6d4c690331fc39aeb253d
+440c62d3b1308615e66488b3f9f3b312c7fe3d3c744ea1a0d57bc3b4398cf5ed

diff --git a/a/content_digest b/N2/content_digest
index 390a951..f08abed 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -20,15 +20,13 @@
   " Stephen Smalley <sds\@tycho.nsa.gov>",
   " nicolas.dichtel\@6wind.com",
   " raven\@themaw.net",
-  " Christian Brauner <christian\@brauner.io>",
-  " dhowells\@redhat.com",
+  " Christian Brauner <christian\@brauner.io>dhowells\@redhat.com",
   " keyrings\@vger.kernel.org",
   " linux-usb\@vger.kernel.org",
   " linux-block\@vger.kernel.org",
   " linux-security-module\@vger.kernel.org",
   " linux-fsdevel\@vger.kernel.org",
-  " linux-api\@vger.kernel.org",
-  " linux-security-module\@vger.kernel.org",
+  " linux-api\@vger.kernel.orglinux-security-module\@vger.kernel.org",
   " linux-kernel\@vger.kernel.org\0"
 ]
 [
@@ -181,4 +179,4 @@
   " \tLSM_HOOK_INIT(audit_rule_init, smack_audit_rule_init),"
 ]
 
-0a9ef66daf6709a8c8b6ff6203af0240590ca38193b6d4c690331fc39aeb253d
+1dd781db63c355fbce28ee390ba8367202c9f6839169565b353d64897192e2a2

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.