diff for duplicates of <87wpadpb3m.fsf@xmission.com> diff --git a/a/1.txt b/N1/1.txt index 2c75bdf..ec9d2f2 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -1,5 +1,5 @@ -"Serge E. Hallyn" <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org> writes: +"Serge E. Hallyn" <serge@hallyn.com> writes: > Root in a non-initial user ns cannot be trusted to write a traditional > security.capability xattr. If it were allowed to do so, then any @@ -262,3 +262,10 @@ index 8abb9bf4ec17..32e32f437ef5 100644 + */ if (strcmp(name, XATTR_NAME_CAPS) == 0) return 0; + + + +-- +To unsubscribe from this list: send the line "unsubscribe linux-security-module" in +the body of a message to majordomo at vger.kernel.org +More majordomo info at http://vger.kernel.org/majordomo-info.html diff --git a/a/content_digest b/N1/content_digest index 0f9cb69..16c56ab 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -1,21 +1,12 @@ "ref\020170419164824.GA27843@mail.hallyn.com\0" - "ref\020170419164824.GA27843-7LNsyQBKDXoIagZqoN9o3w@public.gmane.org\0" - "From\0ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org (Eric W. Biederman)\0" - "Subject\0Re: [PATCH] Introduce v3 namespaced file capabilities\0" + "From\0ebiederm@xmission.com (Eric W. Biederman)\0" + "Subject\0[PATCH] Introduce v3 namespaced file capabilities\0" "Date\0Fri, 21 Apr 2017 18:58:05 -0500\0" - "To\0Serge E. Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>\0" - "Cc\0Seth Forshee <seth.forshee-Z7WLFzj8eWMS+FvcfC7Uqw@public.gmane.org>" - lkml <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org> - linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org> - Andreas Gruenbacher <agruenba-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> - Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org> - " Andrew G. Morgan <morgan-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>\0" + "To\0linux-security-module@vger.kernel.org\0" "\00:1\0" "b\0" "\n" - "\"Serge E. Hallyn\" <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org> writes:\n" + "\"Serge E. Hallyn\" <serge@hallyn.com> writes:\n" "\n" "> Root in a non-initial user ns cannot be trusted to write a traditional\n" "> security.capability xattr. If it were allowed to do so, then any\n" @@ -277,6 +268,13 @@ "+\t * __vfs_setxattr_noperm()\n" "+\t */\n" " \tif (strcmp(name, XATTR_NAME_CAPS) == 0)\n" - " \t\treturn 0;" + " \t\treturn 0;\n" + " \n" + "\n" + "\n" + "--\n" + "To unsubscribe from this list: send the line \"unsubscribe linux-security-module\" in\n" + "the body of a message to majordomo at vger.kernel.org\n" + More majordomo info at http://vger.kernel.org/majordomo-info.html -487a01e088a18981411750c1e7f2ef2fb82604f7d929e6952c37000f0408a836 +6ba9aa8a681080d2623c133246036d66519dc5271130a6eac38d2a73f182fcfe
diff --git a/a/1.txt b/N2/1.txt index 2c75bdf..8e7a9b9 100644 --- a/a/1.txt +++ b/N2/1.txt @@ -1,5 +1,5 @@ -"Serge E. Hallyn" <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org> writes: +"Serge E. Hallyn" <serge@hallyn.com> writes: > Root in a non-initial user ns cannot be trusted to write a traditional > security.capability xattr. If it were allowed to do so, then any diff --git a/a/content_digest b/N2/content_digest index 0f9cb69..2df5255 100644 --- a/a/content_digest +++ b/N2/content_digest @@ -1,21 +1,20 @@ "ref\020170419164824.GA27843@mail.hallyn.com\0" - "ref\020170419164824.GA27843-7LNsyQBKDXoIagZqoN9o3w@public.gmane.org\0" - "From\0ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org (Eric W. Biederman)\0" + "From\0ebiederm@xmission.com (Eric W. Biederman)\0" "Subject\0Re: [PATCH] Introduce v3 namespaced file capabilities\0" "Date\0Fri, 21 Apr 2017 18:58:05 -0500\0" - "To\0Serge E. Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>\0" - "Cc\0Seth Forshee <seth.forshee-Z7WLFzj8eWMS+FvcfC7Uqw@public.gmane.org>" - lkml <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org> - linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org> - Andreas Gruenbacher <agruenba-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> - Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org> - " Andrew G. Morgan <morgan-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>\0" + "To\0Serge E. Hallyn <serge@hallyn.com>\0" + "Cc\0Seth Forshee <seth.forshee@canonical.com>" + lkml <linux-kernel@vger.kernel.org> + linux-api@vger.kernel.org + linux-security-module@vger.kernel.org + Kees Cook <keescook@chromium.org> + Andreas Gruenbacher <agruenba@redhat.com> + Andy Lutomirski <luto@kernel.org> + " Andrew G. Morgan <morgan@kernel.org>\0" "\00:1\0" "b\0" "\n" - "\"Serge E. Hallyn\" <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org> writes:\n" + "\"Serge E. Hallyn\" <serge@hallyn.com> writes:\n" "\n" "> Root in a non-initial user ns cannot be trusted to write a traditional\n" "> security.capability xattr. If it were allowed to do so, then any\n" @@ -279,4 +278,4 @@ " \tif (strcmp(name, XATTR_NAME_CAPS) == 0)\n" " \t\treturn 0;" -487a01e088a18981411750c1e7f2ef2fb82604f7d929e6952c37000f0408a836 +7e3ca41985bb33e4bc1d7a39eda95a20d0403e8674dfa5351825601992e34697
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.