All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <87bodww9hv.fsf@xmission.com>

diff --git a/a/1.txt b/N1/1.txt
index 9589f4d..6ee65cb 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,6 +1,6 @@
-"Serge E. Hallyn" <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org> writes:
+"Serge E. Hallyn" <serge@hallyn.com> writes:
 
-> Quoting Eric W. Biederman (ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org):
+> Quoting Eric W. Biederman (ebiederm@xmission.com):
 
 >> A child user namespace having capabilities against processes in it's
 >> parent seems totally bizarre and pretty dangerous from a capabilities
diff --git a/a/content_digest b/N1/content_digest
index 11773be..5ad90f8 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -9,21 +9,20 @@
  "ref\020121214161514.GA9962@mail.hallyn.com\0"
  "ref\087r4ms5wpm.fsf@xmission.com\0"
  "ref\020121214202921.GA11450@mail.hallyn.com\0"
- "ref\020121214202921.GA11450-7LNsyQBKDXoIagZqoN9o3w@public.gmane.org\0"
- "From\0ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org (Eric W. Biederman)\0"
+ "From\0ebiederm@xmission.com (Eric W. Biederman)\0"
  "Subject\0Re: [RFC][PATCH] Fix cap_capable to only allow owners in the parent user namespace to have caps.\0"
  "Date\0Fri, 14 Dec 2012 14:32:12 -0800\0"
- "To\0Serge E. Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>\0"
- "Cc\0linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org"
-  containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org
-  Linus Torvalds <torvalds-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org>
-  Linux Kernel Mailing List <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
- " Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org>\0"
+ "To\0Serge E. Hallyn <serge@hallyn.com>\0"
+ "Cc\0Linus Torvalds <torvalds@linux-foundation.org>"
+  containers@lists.linux-foundation.org
+  Linux Kernel Mailing List <linux-kernel@vger.kernel.org>
+  Andy Lutomirski <luto@amacapital.net>
+ " linux-security-module@vger.kernel.org\0"
  "\00:1\0"
  "b\0"
- "\"Serge E. Hallyn\" <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org> writes:\n"
+ "\"Serge E. Hallyn\" <serge@hallyn.com> writes:\n"
  "\n"
- "> Quoting Eric W. Biederman (ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org):\n"
+ "> Quoting Eric W. Biederman (ebiederm@xmission.com):\n"
  "\n"
  ">> A child user namespace having capabilities against processes in it's\n"
  ">> parent seems totally bizarre and pretty dangerous from a capabilities\n"
@@ -50,4 +49,4 @@
  "\n"
  Eric
 
-2292ae76c3859363f3ca0c9a782c3508d1c27f55c3600ff0d6b3ce2482e013d5
+145ac15bcd1f207135f369b51a402b8db57d59d8f2fa5829d86a23119dc95d43

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.