All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20131022190406.GA10600@mail.hallyn.com>

diff --git a/a/1.txt b/N1/1.txt
index 331aca6..da5aa70 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,4 +1,4 @@
-Quoting Eric W. Biederman (ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org):
+Quoting Eric W. Biederman (ebiederm@xmission.com):
 > 
 > In preparation for allowing mountpoints to be renamed and unlinked
 > in remote filesystems and in other mount namespaces test if on a dentry
@@ -11,7 +11,7 @@ Quoting Eric W. Biederman (ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org):
 > and safer by simply using UMOUNT_NOFOLLOW when unmounting a mount
 > in a directory owned by an arbitrary user.
 > 
-> Miklos Szeredi <miklos-sUDqSbJrdHQHWmgEVkV9KA@public.gmane.org> reports this is approach is good
+> Miklos Szeredi <miklos@szeredi.hu> reports this is approach is good
 > enough to remove concerns about new kernels mixed with old versions
 > of fusermount.
 > 
@@ -24,9 +24,9 @@ Quoting Eric W. Biederman (ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org):
 > Therefore this patch arranges to enforce the existing mount point
 > semantics for local mount namespace.
 > 
-> Signed-off-by: "Eric W. Biederman" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>
+> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
 
-Acked-by: Serge Hallyn <serge.hallyn-Z7WLFzj8eWMS+FvcfC7Uqw@public.gmane.org>
+Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
 
 > ---
 >  fs/namei.c |   25 +++++++++++++++++++++++++
diff --git a/a/content_digest b/N1/content_digest
index 91e8d43..53c5b17 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -29,10 +29,7 @@
   "ref\00087d2n6xpan.fsf_-_\@xmission.com\0"
 ]
 [
-  "ref\00087d2n6xpan.fsf_-_-aS9lmoZGLiVWk0Htik3J/w\@public.gmane.org\0"
-]
-[
-  "From\0Serge E. Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA\@public.gmane.org>\0"
+  "From\0Serge E. Hallyn <serge\@hallyn.com>\0"
 ]
 [
   "Subject\0Re: [REVIEW][PATCH 1/4] vfs: Don't allow overwriting mounts in the current mount namespace\0"
@@ -41,17 +38,19 @@
   "Date\0Tue, 22 Oct 2013 19:04:06 +0000\0"
 ]
 [
-  "To\0Eric W. Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w\@public.gmane.org>\0"
+  "To\0Eric W. Biederman <ebiederm\@xmission.com>\0"
 ]
 [
-  "Cc\0Miklos Szeredi <miklos-sUDqSbJrdHQHWmgEVkV9KA\@public.gmane.org>",
-  " Linux Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA\@public.gmane.org>",
-  " Kernel Mailing List <linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org>",
-  " Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ\@public.gmane.org>",
-  " Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn\@public.gmane.org>",
-  " Linux-Fsdevel <linux-fsdevel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org>",
-  " Matthias Schniedermeyer <ms-QGhoYOTWWTg\@public.gmane.org>",
-  " Linus Torvalds <torvalds-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b\@public.gmane.org>\0"
+  "Cc\0Miklos Szeredi <miklos\@szeredi.hu>",
+  " Andy Lutomirski <luto\@amacapital.net>",
+  " Serge E. Hallyn <serge\@hallyn.com>",
+  " Al Viro <viro\@zeniv.linux.org.uk>",
+  " Linux-Fsdevel <linux-fsdevel\@vger.kernel.org>",
+  " Kernel Mailing List <linux-kernel\@vger.kernel.org>",
+  " Rob Landley <rob\@landley.net>",
+  " Linus Torvalds <torvalds\@linux-foundation.org>",
+  " Matthias Schniedermeyer <ms\@citd.de>",
+  " Linux Containers <containers\@lists.linux-foundation.org>\0"
 ]
 [
   "\0000:1\0"
@@ -60,7 +59,7 @@
   "b\0"
 ]
 [
-  "Quoting Eric W. Biederman (ebiederm-aS9lmoZGLiVWk0Htik3J/w\@public.gmane.org):\n",
+  "Quoting Eric W. Biederman (ebiederm\@xmission.com):\n",
   "> \n",
   "> In preparation for allowing mountpoints to be renamed and unlinked\n",
   "> in remote filesystems and in other mount namespaces test if on a dentry\n",
@@ -73,7 +72,7 @@
   "> and safer by simply using UMOUNT_NOFOLLOW when unmounting a mount\n",
   "> in a directory owned by an arbitrary user.\n",
   "> \n",
-  "> Miklos Szeredi <miklos-sUDqSbJrdHQHWmgEVkV9KA\@public.gmane.org> reports this is approach is good\n",
+  "> Miklos Szeredi <miklos\@szeredi.hu> reports this is approach is good\n",
   "> enough to remove concerns about new kernels mixed with old versions\n",
   "> of fusermount.\n",
   "> \n",
@@ -86,9 +85,9 @@
   "> Therefore this patch arranges to enforce the existing mount point\n",
   "> semantics for local mount namespace.\n",
   "> \n",
-  "> Signed-off-by: \"Eric W. Biederman\" <ebiederm-aS9lmoZGLiVWk0Htik3J/w\@public.gmane.org>\n",
+  "> Signed-off-by: \"Eric W. Biederman\" <ebiederm\@xmission.com>\n",
   "\n",
-  "Acked-by: Serge Hallyn <serge.hallyn-Z7WLFzj8eWMS+FvcfC7Uqw\@public.gmane.org>\n",
+  "Acked-by: Serge Hallyn <serge.hallyn\@canonical.com>\n",
   "\n",
   "> ---\n",
   ">  fs/namei.c |   25 +++++++++++++++++++++++++\n",
@@ -155,4 +154,4 @@
   "> 1.7.5.4"
 ]
 
-acd464f77d21039b26a91aa8e3180692c27ba02bd724ed44f173f7320952b20d
+3a6f68736cc1d447b1843bcc299d46e0f51380b9edbc41685dec31617b1a0e0b

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.