All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <87wqw15wqb.fsf@xmission.com>

diff --git a/a/1.txt b/N1/1.txt
index a658792..409f01e 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,4 +1,4 @@
-Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org> writes:
+Vasily Kulikov <segoon@openwall.com> writes:
 
 > Currently there is completely no limiting in number of user namespaces
 > created by unprivileged users.  One can freely create thousands of
@@ -75,7 +75,7 @@ you will get softirq action.  There is also for whatever it is worth
 the network memory control group, that should limit networking things.
 I haven't had a chance to look how sane it is in practice.
 
-> Signed-off-by: Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>
+> Signed-off-by: Vasily Kulikov <segoon@openwall.com>
 > -- 
 >  include/linux/sched.h   |    3 +++
 >  kernel/user_namespace.c |   26 ++++++++++++++++++++++++++
diff --git a/a/content_digest b/N1/content_digest
index 8ca0ce1..db6af12 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,15 +1,16 @@
  "ref\020121228175627.GA7683@cachalot\0"
- "From\0ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org (Eric W. Biederman)\0"
- "Subject\0Re: [PATCH/RFC] user_ns: fix missing limiting of user_ns counts\0"
+ "From\0ebiederm@xmission.com (Eric W. Biederman)\0"
+ "Subject\0[kernel-hardening] Re: [PATCH/RFC] user_ns: fix missing limiting of user_ns counts\0"
  "Date\0Fri, 28 Dec 2012 20:05:32 -0800\0"
- "To\0Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>\0"
- "Cc\0Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>"
-  Serge E. Hallyn <serge.hallyn-GeWIH/nMZzLQT0dZR+AlfA@public.gmane.org>
-  linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
- " kernel-hardening-ZwoEplunGu1jrUoiu81ncdBPR1lH4CV8@public.gmane.org\0"
+ "To\0Vasily Kulikov <segoon@openwall.com>\0"
+ "Cc\0Containers <containers@lists.linux-foundation.org>"
+  Serge Hallyn <serge.hallyn@canonical.com>
+  Serge E. Hallyn <serge.hallyn@ubuntu.com>
+  linux-kernel@vger.kernel.org
+ " kernel-hardening@lists.openwall.com\0"
  "\00:1\0"
  "b\0"
- "Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org> writes:\n"
+ "Vasily Kulikov <segoon@openwall.com> writes:\n"
  "\n"
  "> Currently there is completely no limiting in number of user namespaces\n"
  "> created by unprivileged users.  One can freely create thousands of\n"
@@ -86,7 +87,7 @@
  "the network memory control group, that should limit networking things.\n"
  "I haven't had a chance to look how sane it is in practice.\n"
  "\n"
- "> Signed-off-by: Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>\n"
+ "> Signed-off-by: Vasily Kulikov <segoon@openwall.com>\n"
  "> -- \n"
  ">  include/linux/sched.h   |    3 +++\n"
  ">  kernel/user_namespace.c |   26 ++++++++++++++++++++++++++\n"
@@ -169,4 +170,4 @@
  ">  }\n"
  >  EXPORT_SYMBOL(free_user_ns);
 
-48c23879bf3dff197537b43fe809bb296f63c99aa699f3a7b3b6c8912819b1f6
+4beb77de6af226cddf214fd6f8e1df56f6193aafc738a17d1b2554d44c91e7f0

diff --git a/a/1.txt b/N2/1.txt
index a658792..409f01e 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -1,4 +1,4 @@
-Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org> writes:
+Vasily Kulikov <segoon@openwall.com> writes:
 
 > Currently there is completely no limiting in number of user namespaces
 > created by unprivileged users.  One can freely create thousands of
@@ -75,7 +75,7 @@ you will get softirq action.  There is also for whatever it is worth
 the network memory control group, that should limit networking things.
 I haven't had a chance to look how sane it is in practice.
 
-> Signed-off-by: Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>
+> Signed-off-by: Vasily Kulikov <segoon@openwall.com>
 > -- 
 >  include/linux/sched.h   |    3 +++
 >  kernel/user_namespace.c |   26 ++++++++++++++++++++++++++
diff --git a/a/content_digest b/N2/content_digest
index 8ca0ce1..7fbe01a 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -1,15 +1,16 @@
  "ref\020121228175627.GA7683@cachalot\0"
- "From\0ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org (Eric W. Biederman)\0"
+ "From\0ebiederm@xmission.com (Eric W. Biederman)\0"
  "Subject\0Re: [PATCH/RFC] user_ns: fix missing limiting of user_ns counts\0"
  "Date\0Fri, 28 Dec 2012 20:05:32 -0800\0"
- "To\0Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>\0"
- "Cc\0Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>"
-  Serge E. Hallyn <serge.hallyn-GeWIH/nMZzLQT0dZR+AlfA@public.gmane.org>
-  linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
- " kernel-hardening-ZwoEplunGu1jrUoiu81ncdBPR1lH4CV8@public.gmane.org\0"
+ "To\0Vasily Kulikov <segoon@openwall.com>\0"
+ "Cc\0Containers <containers@lists.linux-foundation.org>"
+  Serge Hallyn <serge.hallyn@canonical.com>
+  Serge E. Hallyn <serge.hallyn@ubuntu.com>
+  linux-kernel@vger.kernel.org
+ " kernel-hardening@lists.openwall.com\0"
  "\00:1\0"
  "b\0"
- "Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org> writes:\n"
+ "Vasily Kulikov <segoon@openwall.com> writes:\n"
  "\n"
  "> Currently there is completely no limiting in number of user namespaces\n"
  "> created by unprivileged users.  One can freely create thousands of\n"
@@ -86,7 +87,7 @@
  "the network memory control group, that should limit networking things.\n"
  "I haven't had a chance to look how sane it is in practice.\n"
  "\n"
- "> Signed-off-by: Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>\n"
+ "> Signed-off-by: Vasily Kulikov <segoon@openwall.com>\n"
  "> -- \n"
  ">  include/linux/sched.h   |    3 +++\n"
  ">  kernel/user_namespace.c |   26 ++++++++++++++++++++++++++\n"
@@ -169,4 +170,4 @@
  ">  }\n"
  >  EXPORT_SYMBOL(free_user_ns);
 
-48c23879bf3dff197537b43fe809bb296f63c99aa699f3a7b3b6c8912819b1f6
+caf64347e55d7f0e9f05ba0fe822a82a27db8625bc9568c8badb1fc79125f541

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.