All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <87wpadpb3m.fsf@xmission.com>

diff --git a/a/1.txt b/N1/1.txt
index 2c75bdf..ec9d2f2 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,5 +1,5 @@
 
-"Serge E. Hallyn" <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org> writes:
+"Serge E. Hallyn" <serge@hallyn.com> writes:
 
 > Root in a non-initial user ns cannot be trusted to write a traditional
 > security.capability xattr.  If it were allowed to do so, then any
@@ -262,3 +262,10 @@ index 8abb9bf4ec17..32e32f437ef5 100644
 +	 */
  	if (strcmp(name, XATTR_NAME_CAPS) == 0)
  		return 0;
+ 
+
+
+--
+To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
+the body of a message to majordomo at vger.kernel.org
+More majordomo info at  http://vger.kernel.org/majordomo-info.html
diff --git a/a/content_digest b/N1/content_digest
index 0f9cb69..16c56ab 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,21 +1,12 @@
  "ref\020170419164824.GA27843@mail.hallyn.com\0"
- "ref\020170419164824.GA27843-7LNsyQBKDXoIagZqoN9o3w@public.gmane.org\0"
- "From\0ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org (Eric W. Biederman)\0"
- "Subject\0Re: [PATCH] Introduce v3 namespaced file capabilities\0"
+ "From\0ebiederm@xmission.com (Eric W. Biederman)\0"
+ "Subject\0[PATCH] Introduce v3 namespaced file capabilities\0"
  "Date\0Fri, 21 Apr 2017 18:58:05 -0500\0"
- "To\0Serge E. Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>\0"
- "Cc\0Seth Forshee <seth.forshee-Z7WLFzj8eWMS+FvcfC7Uqw@public.gmane.org>"
-  lkml <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
-  linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org>
-  Andreas Gruenbacher <agruenba-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
-  Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>
- " Andrew G. Morgan <morgan-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>\0"
+ "To\0linux-security-module@vger.kernel.org\0"
  "\00:1\0"
  "b\0"
  "\n"
- "\"Serge E. Hallyn\" <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org> writes:\n"
+ "\"Serge E. Hallyn\" <serge@hallyn.com> writes:\n"
  "\n"
  "> Root in a non-initial user ns cannot be trusted to write a traditional\n"
  "> security.capability xattr.  If it were allowed to do so, then any\n"
@@ -277,6 +268,13 @@
  "+\t * __vfs_setxattr_noperm()\n"
  "+\t */\n"
  " \tif (strcmp(name, XATTR_NAME_CAPS) == 0)\n"
- " \t\treturn 0;"
+ " \t\treturn 0;\n"
+ " \n"
+ "\n"
+ "\n"
+ "--\n"
+ "To unsubscribe from this list: send the line \"unsubscribe linux-security-module\" in\n"
+ "the body of a message to majordomo at vger.kernel.org\n"
+ More majordomo info at  http://vger.kernel.org/majordomo-info.html
 
-487a01e088a18981411750c1e7f2ef2fb82604f7d929e6952c37000f0408a836
+6ba9aa8a681080d2623c133246036d66519dc5271130a6eac38d2a73f182fcfe

diff --git a/a/1.txt b/N2/1.txt
index 2c75bdf..8e7a9b9 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -1,5 +1,5 @@
 
-"Serge E. Hallyn" <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org> writes:
+"Serge E. Hallyn" <serge@hallyn.com> writes:
 
 > Root in a non-initial user ns cannot be trusted to write a traditional
 > security.capability xattr.  If it were allowed to do so, then any
diff --git a/a/content_digest b/N2/content_digest
index 0f9cb69..2df5255 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -1,21 +1,20 @@
  "ref\020170419164824.GA27843@mail.hallyn.com\0"
- "ref\020170419164824.GA27843-7LNsyQBKDXoIagZqoN9o3w@public.gmane.org\0"
- "From\0ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org (Eric W. Biederman)\0"
+ "From\0ebiederm@xmission.com (Eric W. Biederman)\0"
  "Subject\0Re: [PATCH] Introduce v3 namespaced file capabilities\0"
  "Date\0Fri, 21 Apr 2017 18:58:05 -0500\0"
- "To\0Serge E. Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>\0"
- "Cc\0Seth Forshee <seth.forshee-Z7WLFzj8eWMS+FvcfC7Uqw@public.gmane.org>"
-  lkml <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
-  linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org>
-  Andreas Gruenbacher <agruenba-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
-  Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>
- " Andrew G. Morgan <morgan-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>\0"
+ "To\0Serge E. Hallyn <serge@hallyn.com>\0"
+ "Cc\0Seth Forshee <seth.forshee@canonical.com>"
+  lkml <linux-kernel@vger.kernel.org>
+  linux-api@vger.kernel.org
+  linux-security-module@vger.kernel.org
+  Kees Cook <keescook@chromium.org>
+  Andreas Gruenbacher <agruenba@redhat.com>
+  Andy Lutomirski <luto@kernel.org>
+ " Andrew G. Morgan <morgan@kernel.org>\0"
  "\00:1\0"
  "b\0"
  "\n"
- "\"Serge E. Hallyn\" <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org> writes:\n"
+ "\"Serge E. Hallyn\" <serge@hallyn.com> writes:\n"
  "\n"
  "> Root in a non-initial user ns cannot be trusted to write a traditional\n"
  "> security.capability xattr.  If it were allowed to do so, then any\n"
@@ -279,4 +278,4 @@
  " \tif (strcmp(name, XATTR_NAME_CAPS) == 0)\n"
  " \t\treturn 0;"
 
-487a01e088a18981411750c1e7f2ef2fb82604f7d929e6952c37000f0408a836
+7e3ca41985bb33e4bc1d7a39eda95a20d0403e8674dfa5351825601992e34697

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.