Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp2881081ybk; Mon, 18 May 2020 10:10:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwtl9kDYZphhubMi8CE/mcsn4YZypVjkWsU3QvuUBJnF/+A9dxILak3iPSsVFbxLxd2Lz51 X-Received: by 2002:a17:906:7ac8:: with SMTP id k8mr16551186ejo.235.1589821813536; Mon, 18 May 2020 10:10:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589821813; cv=none; d=google.com; s=arc-20160816; b=BEZLbMi+fz3bPz+xm6YzjctQDx1zFW4V3yNOjNKoN3O6VINi/2nhOG/VSX3ySk3iwv 6GJT86XSpsz5J8P1YTuVu4dZN44HPhqRugeWM4KOzb1sI8L6dFNLlr3xX/FURLiNc+Bv hOzQK07Q2cjZ2LXZGgu3P0UsGTCIZ8u47f7g3+V1Q4ammhkDsU01d4kpccZxTyzrih3m Zj0kkkTQsfleBJrVMEHgliWgZfbENihCcUB5QY38gCG39pHW5Nc2QNzHzJXil+hNF95q lj96rQzobr9fhTxO/twBa3zhOySiKkKSnH+MSjerszuJiWe3jRRUZBAYrepNcGVXnHmI no4A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:date:from :dkim-signature; bh=RyhOgb/8Rufgb9hiOiGCtN26x5fPOfDFAQP3o8klQ4U=; b=eZFwdXIi+V6PUKv/5mWvfecYddFVC+vt8Mckhcdp95vxjEqxPmkwy9UK9lA8Rec2m8 9NCbvsOAJdRXYhZIlHwHYFc4sk3SyuV7+5q9DSKf8tYx49wRx3M3eLWFQo75L0OzcDtX OviZUajfb8wRiTz5Yab1jBBPraoS9MtmJQFnuIB3B7X1Nsqr+9Mcu/VqvMBaQ9PY5rDI sG9GdR7g9bA/DEP4uaK7vJ8ZmtprLnCXcQM4qnuf4qWAzGZS1YS7Hv8B+bY+Ss01XKCy Jz4Iulmj3YIVJ6jK9H5gGA87pV1cFivW4JHYkmX1t7DIe0e/TZT6KnnBkfLuuYqVRsvI GBrQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=qriz8T3G; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x15si1275825edr.405.2020.05.18.10.09.49; Mon, 18 May 2020 10:10:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=qriz8T3G; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728228AbgERRGW (ORCPT + 99 others); Mon, 18 May 2020 13:06:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54256 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726958AbgERRGV (ORCPT ); Mon, 18 May 2020 13:06:21 -0400 Received: from mail-qv1-xf42.google.com (mail-qv1-xf42.google.com [IPv6:2607:f8b0:4864:20::f42]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4DBA9C061A0C; Mon, 18 May 2020 10:06:20 -0700 (PDT) Received: by mail-qv1-xf42.google.com with SMTP id x13so5089271qvr.2; Mon, 18 May 2020 10:06:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:date:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=RyhOgb/8Rufgb9hiOiGCtN26x5fPOfDFAQP3o8klQ4U=; b=qriz8T3G0SCi/XbYeLmYI9+XDLau22Sr+OTMKnnDrWllPxaGpWVTW4D2R5+di0etUg bj6aFvooloTmlcv/vUpw9s56Cnht60322gM7YvjJjUpecMlrS5Gui5gVN7vQMyrbxNx+ o5Zep9lLoAhCmV4ryY5EWEGdbhqCGnmyxnUXZmzRJ6UebMIVs0IMaKyOhD+dvzvpxA4B iwgv1dP72/7l4wfNkvdiwHrDzNeYOuMKm3tPEQqBuyXt2yhxMOneCJqGcSruP4vUHOhx HgSX/bjYhYw+ScgneJvvWRyGvyMW+rh6A5aO6x4Zvk6ofHpHumpxLLsz0z7WrRgJgBBM Q/tw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:date:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=RyhOgb/8Rufgb9hiOiGCtN26x5fPOfDFAQP3o8klQ4U=; b=rU/f2+OpDVN7nqLEafYida2l/nfQaAf98rb2mwo0ZedfwDck9ZeGvZoDvH1fy76bLo gujuJazoZ5cedpP/LYIvO2YTfdmGAj82IzhfS2oez1Dhom7fwGgyyhaLxl8L6Ce/fye6 EL5x8zF+piY3UHA3trHHRrJEso97zcqrz/eNTiF+IONSKDWe1et1KcSoMUVracbMprva 8XdON3EDEO7TWNkyQZgoWwve9JVMDbVnCQ98ToUldFB1l+UIfUx32YOX1F5+XaI/c27w MmRMhpMOqlXFkOm6jhzp80gvRrkAkbR3plTpTRP0iSkyWCKtbBQJO7jAC/dKHXsyyTjk /CJg== X-Gm-Message-State: AOAM532CsPpO5a7Hp36yCeUPpfGzv2TzSXr9GUokcHwd/Nd9+XnIKtdm 0nq4izpECWa89RVCR2fka2s= X-Received: by 2002:a05:6214:1248:: with SMTP id q8mr8107875qvv.130.1589821578106; Mon, 18 May 2020 10:06:18 -0700 (PDT) Received: from quaco.ghostprotocols.net ([179.97.37.151]) by smtp.gmail.com with ESMTPSA id z10sm5879075qtu.22.2020.05.18.10.06.16 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 18 May 2020 10:06:17 -0700 (PDT) From: Arnaldo Carvalho de Melo X-Google-Original-From: Arnaldo Carvalho de Melo Received: by quaco.ghostprotocols.net (Postfix, from userid 1000) id 2AA2E40AFD; Mon, 18 May 2020 14:06:15 -0300 (-03) Date: Mon, 18 May 2020 14:06:15 -0300 To: Alexey Budankov Cc: Arnaldo Carvalho de Melo , Jiri Olsa , Namhyung Kim , Alexander Shishkin , Peter Zijlstra , Ingo Molnar , Andi Kleen , linux-kernel , "selinux@vger.kernel.org" , "linux-security-module@vger.kernel.org" Subject: Re: [PATCH v3 3/3] perf docs: introduce security.txt file to document related issues Message-ID: <20200518170615.GL24211@kernel.org> References: <0fffd9e2-1f22-a0c2-c2e3-cb7f4bb89d66@linux.intel.com> <290ded0a-c422-3749-5180-918fed1ee30f@linux.intel.com> <20200518155936.GG24211@kernel.org> <1f6eb4c7-dec1-355c-024e-8405f4ef7f3e@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1f6eb4c7-dec1-355c-024e-8405f4ef7f3e@linux.intel.com> X-Url: http://acmel.wordpress.com Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Em Mon, May 18, 2020 at 07:50:21PM +0300, Alexey Budankov escreveu: > > On 18.05.2020 18:59, Arnaldo Carvalho de Melo wrote: > > Em Thu, Apr 30, 2020 at 10:16:34AM +0300, Alexey Budankov escreveu: > >> > >> Publish instructions on how to apply LSM hooks for access control > >> to perf_event_open() syscall on Fedora distro with Targeted SELinux > >> policy and then manage access to the syscall. > > > > I'm fixing these up: > > > > [acme@five perf]$ am /wb/1.patch > > Applying: perf docs: introduce security.txt file to document related issues > > .git/rebase-apply/patch:46: space before tab in indent. > > wake_alarm > > .git/rebase-apply/patch:47: space before tab in indent. > > block_suspend > > .git/rebase-apply/patch:48: space before tab in indent. > > audit_read > > .git/rebase-apply/patch:51: trailing whitespace. > > > > .git/rebase-apply/patch:54: trailing whitespace. > > This is output of diff utility. > Hopefully it is still applicable after fixes. > I will test this either jointly with the changes at 2/3. So, I've pushed to the tmp.perf/core branch, after testing what is there I'll move it to perf/core for 5.8, - Arnaldo