public inbox for linux-arch@vger.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20200526205322.23465-12-mic@digikod.net>

diff --git a/a/1.txt b/N1/1.txt
index c64f92c..c01a06f 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,11 +1,11 @@
 Add a basic sandbox tool to launch a command which can only access a
 whitelist of file hierarchies in a read-only or read-write way.
 
-Signed-off-by: Mickaël Salaün <mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org>
-Cc: James Morris <jmorris-gx6/JNMH7DfYtjvyW6yDsg@public.gmane.org>
-Cc: Jann Horn <jannh-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org>
-Cc: Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org>
-Cc: Serge E. Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>
+Signed-off-by: Mickaël Salaün <mic@digikod.net>
+Cc: James Morris <jmorris@namei.org>
+Cc: Jann Horn <jannh@google.com>
+Cc: Kees Cook <keescook@chromium.org>
+Cc: Serge E. Hallyn <serge@hallyn.com>
 ---
 
 Changes since v16:
@@ -35,7 +35,7 @@ Changes since v11:
   new Landlock syscall.
 
 Previous changes:
-https://lore.kernel.org/lkml/20190721213116.23476-9-mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org/
+https://lore.kernel.org/lkml/20190721213116.23476-9-mic@digikod.net/
 ---
  samples/Kconfig              |   7 ++
  samples/Makefile             |   1 +
@@ -116,7 +116,7 @@ index 000000000000..e0059706c11f
 + * Simple Landlock sandbox manager able to launch a process restricted by a
 + * user-defined filesystem access-control security policy.
 + *
-+ * Copyright © 2017-2020 Mickaël Salaün <mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org>
++ * Copyright © 2017-2020 Mickaël Salaün <mic@digikod.net>
 + * Copyright © 2020 ANSSI
 + */
 +
diff --git a/a/content_digest b/N1/content_digest
index 49eced9..ad82990 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,38 +1,43 @@
  "ref\020200526205322.23465-1-mic@digikod.net\0"
- "ref\020200526205322.23465-1-mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org\0"
- "From\0Micka\303\253l Sala\303\274n <mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org>\0"
+ "From\0Micka\303\253l Sala\303\274n <mic@digikod.net>\0"
  "Subject\0[PATCH v18 11/12] samples/landlock: Add a sandbox manager example\0"
  "Date\0Tue, 26 May 2020 22:53:21 +0200\0"
- "To\0linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org\0"
- "Cc\0Micka\303\253l Sala\303\274n <mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org>"
-  Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
-  Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org>
-  Anton Ivanov <anton.ivanov-eaSgp5hN2EAtwqFdIEgyzdBPR1lH4CV8@public.gmane.org>
-  Arnd Bergmann <arnd-r2nGTMty4D4@public.gmane.org>
-  Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org>
-  James Morris <jmorris-gx6/JNMH7DfYtjvyW6yDsg@public.gmane.org>
-  Jann Horn <jannh-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org>
-  Jeff Dike <jdike-OPE4K8JWMJJBDgjK7y7TUQ@public.gmane.org>
-  Jonathan Corbet <corbet-T1hC0tSOHrs@public.gmane.org>
-  Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org>
-  Michael Kerrisk <mtk.manpages-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
- " Micka\303\253l Sala\303\274n <mickael.salaun-D9rjmswh09VWj0EZb7rXcA@public.gmane.org>"
-  Richard Weinberger <richard-/L3Ra7n9ekc@public.gmane.org>
-  Serge E . Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>
-  Shuah Khan <shuah-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>
-  Vincent Dagonneau <vincent.dagonneau-D9rjmswh09VWj0EZb7rXcA@public.gmane.org>
-  kernel-hardening-ZwoEplunGu1jrUoiu81ncdBPR1lH4CV8@public.gmane.org
- " linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org\0"
+ "To\0linux-kernel@vger.kernel.org\0"
+ "Cc\0Micka\303\253l Sala\303\274n <mic@digikod.net>"
+  Al Viro <viro@zeniv.linux.org.uk>
+  Andy Lutomirski <luto@amacapital.net>
+  Anton Ivanov <anton.ivanov@cambridgegreys.com>
+  Arnd Bergmann <arnd@arndb.de>
+  Casey Schaufler <casey@schaufler-ca.com>
+  James Morris <jmorris@namei.org>
+  Jann Horn <jannh@google.com>
+  Jeff Dike <jdike@addtoit.com>
+  Jonathan Corbet <corbet@lwn.net>
+  Kees Cook <keescook@chromium.org>
+  Michael Kerrisk <mtk.manpages@gmail.com>
+ " Micka\303\253l Sala\303\274n <mickael.salaun@ssi.gouv.fr>"
+  Richard Weinberger <richard@nod.at>
+  Serge E . Hallyn <serge@hallyn.com>
+  Shuah Khan <shuah@kernel.org>
+  Vincent Dagonneau <vincent.dagonneau@ssi.gouv.fr>
+  kernel-hardening@lists.openwall.com
+  linux-api@vger.kernel.org
+  linux-arch@vger.kernel.org
+  linux-doc@vger.kernel.org
+  linux-fsdevel@vger.kernel.org
+  linux-kselftest@vger.kernel.org
+  linux-security-module@vger.kernel.org
+ " x86@kernel.org\0"
  "\00:1\0"
  "b\0"
  "Add a basic sandbox tool to launch a command which can only access a\n"
  "whitelist of file hierarchies in a read-only or read-write way.\n"
  "\n"
- "Signed-off-by: Micka\303\253l Sala\303\274n <mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org>\n"
- "Cc: James Morris <jmorris-gx6/JNMH7DfYtjvyW6yDsg@public.gmane.org>\n"
- "Cc: Jann Horn <jannh-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org>\n"
- "Cc: Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org>\n"
- "Cc: Serge E. Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>\n"
+ "Signed-off-by: Micka\303\253l Sala\303\274n <mic@digikod.net>\n"
+ "Cc: James Morris <jmorris@namei.org>\n"
+ "Cc: Jann Horn <jannh@google.com>\n"
+ "Cc: Kees Cook <keescook@chromium.org>\n"
+ "Cc: Serge E. Hallyn <serge@hallyn.com>\n"
  "---\n"
  "\n"
  "Changes since v16:\n"
@@ -62,7 +67,7 @@
  "  new Landlock syscall.\n"
  "\n"
  "Previous changes:\n"
- "https://lore.kernel.org/lkml/20190721213116.23476-9-mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org/\n"
+ "https://lore.kernel.org/lkml/20190721213116.23476-9-mic@digikod.net/\n"
  "---\n"
  " samples/Kconfig              |   7 ++\n"
  " samples/Makefile             |   1 +\n"
@@ -143,7 +148,7 @@
  "+ * Simple Landlock sandbox manager able to launch a process restricted by a\n"
  "+ * user-defined filesystem access-control security policy.\n"
  "+ *\n"
- "+ * Copyright \302\251 2017-2020 Micka\303\253l Sala\303\274n <mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org>\n"
+ "+ * Copyright \302\251 2017-2020 Micka\303\253l Sala\303\274n <mic@digikod.net>\n"
  "+ * Copyright \302\251 2020 ANSSI\n"
  "+ */\n"
  "+\n"
@@ -369,4 +374,4 @@
  "-- \n"
  2.26.2
 
-ffc70b8c3ef083c11bf125cfe5e7e326a0c48241cb2942aff233d5539a87868e
+80d3b13cb9c7314b0ed9ef20bfed64eeeb57a8b999c61e05dcf28530b327d94a

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox