All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20140815201629.GF11476@ubuntumail>

diff --git a/a/1.txt b/N1/1.txt
index dd02803..2912dad 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,8 +1,8 @@
-Quoting Andy Lutomirski (luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org):
-> On Fri, Aug 15, 2014 at 12:37 PM, Serge Hallyn <serge.hallyn-GeWIH/nMZzLQT0dZR+AlfA@public.gmane.org> wrote:
-> > Quoting Andy Lutomirski (luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org):
-> >> On Fri, Aug 15, 2014 at 12:05 PM, Serge Hallyn <serge.hallyn-GeWIH/nMZzLQT0dZR+AlfA@public.gmane.org> wrote:
-> >> > Quoting Andy Lutomirski (luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org):
+Quoting Andy Lutomirski (luto@amacapital.net):
+> On Fri, Aug 15, 2014 at 12:37 PM, Serge Hallyn <serge.hallyn@ubuntu.com> wrote:
+> > Quoting Andy Lutomirski (luto@amacapital.net):
+> >> On Fri, Aug 15, 2014 at 12:05 PM, Serge Hallyn <serge.hallyn@ubuntu.com> wrote:
+> >> > Quoting Andy Lutomirski (luto@amacapital.net):
 > >> >> Currently, creating a new mount (as opposed to bindmount) in a
 > >> >> non-root userns will implicitly set nodev unless the fs is devpts.
 > >> >> Something like this will be necessary for file systems that allow
diff --git a/a/content_digest b/N1/content_digest
index 3d36e03..b7b94b3 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -4,25 +4,24 @@
  "ref\0CALCETrVKq1Fxnsd9jKDi5_fcKfCJxBZ1w-zGXD3FR-pF-jLsmQ@mail.gmail.com\0"
  "ref\020140815193746.GE11476@ubuntumail\0"
  "ref\0CALCETrWB0qBiyfJbapFnjxoNyNvS+aHvgc_eob3fC1j=cv+v5w@mail.gmail.com\0"
- "ref\0CALCETrWB0qBiyfJbapFnjxoNyNvS+aHvgc_eob3fC1j=cv+v5w-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org\0"
- "From\0Serge Hallyn <serge.hallyn-GeWIH/nMZzLQT0dZR+AlfA@public.gmane.org>\0"
+ "From\0Serge Hallyn <serge.hallyn@ubuntu.com>\0"
  "Subject\0Re: [PATCH] fs: Remove implicit nodev for new mounts in non-root userns\0"
  "Date\0Fri, 15 Aug 2014 20:16:29 +0000\0"
- "To\0Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org>\0"
- "Cc\0Linux Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>"
-  linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
-  stable <stable-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
-  Kenton Varda <kenton-AuYgBwuPrUQTaNkGU808tA@public.gmane.org>
-  Eric W. Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>
-  Linux FS Devel <linux-fsdevel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
- " Linus Torvalds <torvalds-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org>\0"
+ "To\0Andy Lutomirski <luto@amacapital.net>\0"
+ "Cc\0Linux Containers <containers@lists.linux-foundation.org>"
+  linux-kernel@vger.kernel.org <linux-kernel@vger.kernel.org>
+  stable <stable@vger.kernel.org>
+  Kenton Varda <kenton@sandstorm.io>
+  Eric W. Biederman <ebiederm@xmission.com>
+  Linux FS Devel <linux-fsdevel@vger.kernel.org>
+ " Linus Torvalds <torvalds@linux-foundation.org>\0"
  "\00:1\0"
  "b\0"
- "Quoting Andy Lutomirski (luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org):\n"
- "> On Fri, Aug 15, 2014 at 12:37 PM, Serge Hallyn <serge.hallyn-GeWIH/nMZzLQT0dZR+AlfA@public.gmane.org> wrote:\n"
- "> > Quoting Andy Lutomirski (luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org):\n"
- "> >> On Fri, Aug 15, 2014 at 12:05 PM, Serge Hallyn <serge.hallyn-GeWIH/nMZzLQT0dZR+AlfA@public.gmane.org> wrote:\n"
- "> >> > Quoting Andy Lutomirski (luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org):\n"
+ "Quoting Andy Lutomirski (luto@amacapital.net):\n"
+ "> On Fri, Aug 15, 2014 at 12:37 PM, Serge Hallyn <serge.hallyn@ubuntu.com> wrote:\n"
+ "> > Quoting Andy Lutomirski (luto@amacapital.net):\n"
+ "> >> On Fri, Aug 15, 2014 at 12:05 PM, Serge Hallyn <serge.hallyn@ubuntu.com> wrote:\n"
+ "> >> > Quoting Andy Lutomirski (luto@amacapital.net):\n"
  "> >> >> Currently, creating a new mount (as opposed to bindmount) in a\n"
  "> >> >> non-root userns will implicitly set nodev unless the fs is devpts.\n"
  "> >> >> Something like this will be necessary for file systems that allow\n"
@@ -87,4 +86,4 @@
  "\n"
  Thanks, Andy.
 
-96046a187e60d48bda9e6760633590a31715dc09b6b4b0008a30e098d3c451e4
+2d68489a96ed87e4f7a9d9700839bb11028569ef0e291ed80b0f5e5eadc9b7bc

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.