All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <1514092328.5221.116.camel@linux.vnet.ibm.com>

diff --git a/a/1.txt b/N1/1.txt
index 10cb6f7..1cc9a85 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -8,9 +8,9 @@ On Fri, 2017-12-22 at 22:03 -0600, Serge E. Hallyn wrote:
 > > non-root users. Update evm_calc_hmac_or_hash() to refuse to
 > > calculate new hmacs for mounts for non-init user namespaces.
 > > 
-> > Cc: linux-integrity@vger.kernel.org
-> > Cc: linux-security-module@vger.kernel.org
-> > Cc: linux-kernel@vger.kernel.org
+> > Cc: linux-integrity at vger.kernel.org
+> > Cc: linux-security-module at vger.kernel.org
+> > Cc: linux-kernel at vger.kernel.org
 > > Cc: James Morris <james.l.morris@oracle.com>
 > > Cc: Mimi Zohar <zohar@linux.vnet.ibm.com>
 > 
@@ -19,9 +19,9 @@ On Fri, 2017-12-22 at 22:03 -0600, Serge E. Hallyn wrote:
 > does this change seem sufficient to you?
 
 I think this is the correct behavior in the context of fuse file
-systems.  This patch, the "ima: define a new policy option named
+systems. ?This patch, the "ima: define a new policy option named
 force" patch, and an updated IMA policy should be upstreamed together.
- The cover letter should provide the motivation for these patches.
+?The cover letter should provide the motivation for these patches.
 
 Mimi
 
@@ -49,4 +49,9 @@ Mimi
 > >  	desc = init_desc(type);
 > > -- 
 > > 2.13.6
->
+> 
+
+--
+To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
+the body of a message to majordomo at vger.kernel.org
+More majordomo info at  http://vger.kernel.org/majordomo-info.html
diff --git a/a/content_digest b/N1/content_digest
index 028f7ee..8decf3f 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,21 +1,10 @@
  "ref\0cover.1512741134.git.dongsu@kinvolk.io\0"
  "ref\01f2233a1a028f1eb1e9bea7d06efa6d34e69e752.1512041070.git.dongsu@kinvolk.io\0"
  "ref\020171223040348.GK6837@mail.hallyn.com\0"
- "From\0Mimi Zohar <zohar@linux.vnet.ibm.com>\0"
- "Subject\0Re: [PATCH 11/11] evm: Don't update hmacs in user ns mounts\0"
+ "From\0zohar@linux.vnet.ibm.com (Mimi Zohar)\0"
+ "Subject\0[PATCH 11/11] evm: Don't update hmacs in user ns mounts\0"
  "Date\0Sun, 24 Dec 2017 00:12:08 -0500\0"
- "To\0Serge E. Hallyn <serge@hallyn.com>"
- " Dongsu Park <dongsu@kinvolk.io>\0"
- "Cc\0linux-kernel@vger.kernel.org"
-  containers@lists.linux-foundation.org
-  Alban Crequy <alban@kinvolk.io>
-  Eric W . Biederman <ebiederm@xmission.com>
-  Miklos Szeredi <mszeredi@redhat.com>
-  Seth Forshee <seth.forshee@canonical.com>
-  Sargun Dhillon <sargun@sargun.me>
-  linux-integrity@vger.kernel.org
-  linux-security-module@vger.kernel.org
- " James Morris <james.l.morris@oracle.com>\0"
+ "To\0linux-security-module@vger.kernel.org\0"
  "\00:1\0"
  "b\0"
  "Hi Serge,\n"
@@ -28,9 +17,9 @@
  "> > non-root users. Update evm_calc_hmac_or_hash() to refuse to\n"
  "> > calculate new hmacs for mounts for non-init user namespaces.\n"
  "> > \n"
- "> > Cc: linux-integrity@vger.kernel.org\n"
- "> > Cc: linux-security-module@vger.kernel.org\n"
- "> > Cc: linux-kernel@vger.kernel.org\n"
+ "> > Cc: linux-integrity at vger.kernel.org\n"
+ "> > Cc: linux-security-module at vger.kernel.org\n"
+ "> > Cc: linux-kernel at vger.kernel.org\n"
  "> > Cc: James Morris <james.l.morris@oracle.com>\n"
  "> > Cc: Mimi Zohar <zohar@linux.vnet.ibm.com>\n"
  "> \n"
@@ -39,9 +28,9 @@
  "> does this change seem sufficient to you?\n"
  "\n"
  "I think this is the correct behavior in the context of fuse file\n"
- "systems.  This patch, the \"ima: define a new policy option named\n"
+ "systems. ?This patch, the \"ima: define a new policy option named\n"
  "force\" patch, and an updated IMA policy should be upstreamed together.\n"
- " The cover letter should provide the motivation for these patches.\n"
+ "?The cover letter should provide the motivation for these patches.\n"
  "\n"
  "Mimi\n"
  "\n"
@@ -69,6 +58,11 @@
  "> >  \tdesc = init_desc(type);\n"
  "> > -- \n"
  "> > 2.13.6\n"
- >
+ "> \n"
+ "\n"
+ "--\n"
+ "To unsubscribe from this list: send the line \"unsubscribe linux-security-module\" in\n"
+ "the body of a message to majordomo at vger.kernel.org\n"
+ More majordomo info at  http://vger.kernel.org/majordomo-info.html
 
-8cc23db7bce7c7b4e137053ea46cfbe42292c1674e1545840710c30fa326dff4
+5ebe3732effe253d2e72187718929b399053514b8e7141053769d6b8e52c9428

diff --git a/a/1.txt b/N2/1.txt
index 10cb6f7..388fe68 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -19,9 +19,9 @@ On Fri, 2017-12-22 at 22:03 -0600, Serge E. Hallyn wrote:
 > does this change seem sufficient to you?
 
 I think this is the correct behavior in the context of fuse file
-systems.  This patch, the "ima: define a new policy option named
+systems.  This patch, the "ima: define a new policy option named
 force" patch, and an updated IMA policy should be upstreamed together.
- The cover letter should provide the motivation for these patches.
+ The cover letter should provide the motivation for these patches.
 
 Mimi
 
diff --git a/a/content_digest b/N2/content_digest
index 028f7ee..4cc509d 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -39,9 +39,9 @@
  "> does this change seem sufficient to you?\n"
  "\n"
  "I think this is the correct behavior in the context of fuse file\n"
- "systems.  This patch, the \"ima: define a new policy option named\n"
+ "systems. \302\240This patch, the \"ima: define a new policy option named\n"
  "force\" patch, and an updated IMA policy should be upstreamed together.\n"
- " The cover letter should provide the motivation for these patches.\n"
+ "\302\240The cover letter should provide the motivation for these patches.\n"
  "\n"
  "Mimi\n"
  "\n"
@@ -71,4 +71,4 @@
  "> > 2.13.6\n"
  >
 
-8cc23db7bce7c7b4e137053ea46cfbe42292c1674e1545840710c30fa326dff4
+1276c2e5b0f9edd0fcef4cc4acb60a5602b7b33210ae7fef963545b5fcab8d60

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.