All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <87efkam3u8.fsf@xmission.com>

diff --git a/a/1.txt b/N1/1.txt
index f8278bd..e73b244 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,4 +1,4 @@
-Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org> writes:
+Casey Schaufler <casey@schaufler-ca.com> writes:
 
 > On 3/23/2018 12:16 PM, Eric W. Biederman wrote:
 >> All of the implementations of security hooks that take msg_queue only
@@ -9,7 +9,7 @@ Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org> writes:
 >> Making this change will allow struct msg_queue to become private to
 >> ipc/msg.c.
 >>
->> Signed-off-by: "Eric W. Biederman" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>
+>> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
 >> ---
 >>  include/linux/lsm_hooks.h  | 12 ++++++------
 >>  include/linux/security.h   | 25 ++++++++++++-------------
@@ -33,3 +33,11 @@ That said I am happy to add a clean up patch that makes the obvious
 cleanups and simplifications to smack_lsm.c.
 
 Eric
+
+
+
+
+--
+To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
+the body of a message to majordomo at vger.kernel.org
+More majordomo info at  http://vger.kernel.org/majordomo-info.html
diff --git a/a/content_digest b/N1/content_digest
index c38617c..ef424d0 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,28 +1,13 @@
  "ref\087vadmobdw.fsf_-_@xmission.com\0"
  "ref\020180323191614.32489-3-ebiederm@xmission.com\0"
  "ref\0bb73b0ea-bcda-a996-8f14-48d9dd1b0940@schaufler-ca.com\0"
- "ref\0bb73b0ea-bcda-a996-8f14-48d9dd1b0940-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org\0"
- "From\0ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org (Eric W. Biederman)\0"
- "Subject\0Re: [REVIEW][PATCH 03/11] msg/security: Pass kern_ipc_perm not msg_queue into the msg_queue security hooks\0"
+ "From\0ebiederm@xmission.com (Eric W. Biederman)\0"
+ "Subject\0[REVIEW][PATCH 03/11] msg/security: Pass kern_ipc_perm not msg_queue into the msg_queue security hooks\0"
  "Date\0Sat, 24 Mar 2018 00:37:19 -0500\0"
- "To\0Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org>\0"
- "Cc\0esyr-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org"
-  jannh-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org
-  khlebnikov-XoJtRXgx1JseBXzfvpsJ4g@public.gmane.org
-  linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  Linux Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>
-  serge.hallyn-GeWIH/nMZzLQT0dZR+AlfA@public.gmane.org
-  linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  prakash.sangappa-QHcLZuEGTsvQT0dZR+AlfA@public.gmane.org
-  linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org
-  oleg-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org
-  akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org
-  Nagarathnam Muthusamy <nagarathnam.muthusamy-QHcLZuEGTsvQT0dZR+AlfA@public.gmane.org>
- " Pavel Emelyanov <xemul-GEFAQzZX7r8dnm+yROfE0A@public.gmane.org>\0"
+ "To\0linux-security-module@vger.kernel.org\0"
  "\00:1\0"
  "b\0"
- "Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org> writes:\n"
+ "Casey Schaufler <casey@schaufler-ca.com> writes:\n"
  "\n"
  "> On 3/23/2018 12:16 PM, Eric W. Biederman wrote:\n"
  ">> All of the implementations of security hooks that take msg_queue only\n"
@@ -33,7 +18,7 @@
  ">> Making this change will allow struct msg_queue to become private to\n"
  ">> ipc/msg.c.\n"
  ">>\n"
- ">> Signed-off-by: \"Eric W. Biederman\" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>\n"
+ ">> Signed-off-by: \"Eric W. Biederman\" <ebiederm@xmission.com>\n"
  ">> ---\n"
  ">>  include/linux/lsm_hooks.h  | 12 ++++++------\n"
  ">>  include/linux/security.h   | 25 ++++++++++++-------------\n"
@@ -56,6 +41,14 @@
  "That said I am happy to add a clean up patch that makes the obvious\n"
  "cleanups and simplifications to smack_lsm.c.\n"
  "\n"
- Eric
+ "Eric\n"
+ "\n"
+ "\n"
+ "\n"
+ "\n"
+ "--\n"
+ "To unsubscribe from this list: send the line \"unsubscribe linux-security-module\" in\n"
+ "the body of a message to majordomo at vger.kernel.org\n"
+ More majordomo info at  http://vger.kernel.org/majordomo-info.html
 
-752adf1c844a1a3231d62e439ba4f4e22b1360b757be7a9e782c88d6af7a3db3
+9d155c8482f8109c76b4cf05eddf772638c5e6e92cbb1a4bd8381e005000e9ec

diff --git a/a/1.txt b/N2/1.txt
index f8278bd..9e45d23 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -1,4 +1,4 @@
-Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org> writes:
+Casey Schaufler <casey@schaufler-ca.com> writes:
 
 > On 3/23/2018 12:16 PM, Eric W. Biederman wrote:
 >> All of the implementations of security hooks that take msg_queue only
@@ -9,7 +9,7 @@ Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org> writes:
 >> Making this change will allow struct msg_queue to become private to
 >> ipc/msg.c.
 >>
->> Signed-off-by: "Eric W. Biederman" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>
+>> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
 >> ---
 >>  include/linux/lsm_hooks.h  | 12 ++++++------
 >>  include/linux/security.h   | 25 ++++++++++++-------------
diff --git a/a/content_digest b/N2/content_digest
index c38617c..cd80d77 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -1,28 +1,27 @@
  "ref\087vadmobdw.fsf_-_@xmission.com\0"
  "ref\020180323191614.32489-3-ebiederm@xmission.com\0"
  "ref\0bb73b0ea-bcda-a996-8f14-48d9dd1b0940@schaufler-ca.com\0"
- "ref\0bb73b0ea-bcda-a996-8f14-48d9dd1b0940-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org\0"
- "From\0ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org (Eric W. Biederman)\0"
+ "From\0ebiederm@xmission.com (Eric W. Biederman)\0"
  "Subject\0Re: [REVIEW][PATCH 03/11] msg/security: Pass kern_ipc_perm not msg_queue into the msg_queue security hooks\0"
  "Date\0Sat, 24 Mar 2018 00:37:19 -0500\0"
- "To\0Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org>\0"
- "Cc\0esyr-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org"
-  jannh-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org
-  khlebnikov-XoJtRXgx1JseBXzfvpsJ4g@public.gmane.org
-  linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  Linux Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>
-  serge.hallyn-GeWIH/nMZzLQT0dZR+AlfA@public.gmane.org
-  linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  prakash.sangappa-QHcLZuEGTsvQT0dZR+AlfA@public.gmane.org
-  linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org
-  oleg-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org
-  akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org
-  Nagarathnam Muthusamy <nagarathnam.muthusamy-QHcLZuEGTsvQT0dZR+AlfA@public.gmane.org>
- " Pavel Emelyanov <xemul-GEFAQzZX7r8dnm+yROfE0A@public.gmane.org>\0"
+ "To\0Casey Schaufler <casey@schaufler-ca.com>\0"
+ "Cc\0Linux Containers <containers@lists.linux-foundation.org>"
+  linux-kernel@vger.kernel.org
+  linux-api@vger.kernel.org
+  khlebnikov@yandex-team.ru
+  prakash.sangappa@oracle.com
+  luto@kernel.org
+  akpm@linux-foundation.org
+  oleg@redhat.com
+  serge.hallyn@ubuntu.com
+  esyr@redhat.com
+  jannh@google.com
+  linux-security-module@vger.kernel.org
+  Pavel Emelyanov <xemul@openvz.org>
+ " Nagarathnam Muthusamy <nagarathnam.muthusamy@oracle.com>\0"
  "\00:1\0"
  "b\0"
- "Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org> writes:\n"
+ "Casey Schaufler <casey@schaufler-ca.com> writes:\n"
  "\n"
  "> On 3/23/2018 12:16 PM, Eric W. Biederman wrote:\n"
  ">> All of the implementations of security hooks that take msg_queue only\n"
@@ -33,7 +32,7 @@
  ">> Making this change will allow struct msg_queue to become private to\n"
  ">> ipc/msg.c.\n"
  ">>\n"
- ">> Signed-off-by: \"Eric W. Biederman\" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>\n"
+ ">> Signed-off-by: \"Eric W. Biederman\" <ebiederm@xmission.com>\n"
  ">> ---\n"
  ">>  include/linux/lsm_hooks.h  | 12 ++++++------\n"
  ">>  include/linux/security.h   | 25 ++++++++++++-------------\n"
@@ -58,4 +57,4 @@
  "\n"
  Eric
 
-752adf1c844a1a3231d62e439ba4f4e22b1360b757be7a9e782c88d6af7a3db3
+e5be7166f7a3bada0b047efd86a4c27ec17c9a17930131a9b7ce6d2b547cccec

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.