All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <1524083228.3272.331.camel@linux.vnet.ibm.com>

diff --git a/a/1.txt b/N1/1.txt
index 5633a74..5402f3f 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -18,7 +18,7 @@ On Wed, 2018-04-18 at 15:12 -0500, Eric W. Biederman wrote:
 > >> 
 > >> 
 > >> > My initial thought was to stage IMA namespacing with just IMA-audit
-> >> > first, followed by either IMA-measurement or IMA-appraisal.  This
+> >> > first, followed by either IMA-measurement or IMA-appraisal.  This
 > >> > would allow us to get the basic IMA namespacing framework working and
 > >> > defer dealing with the securityfs related namespacing of the IMA
 > >> > policy and measurement list issues to later.
@@ -45,12 +45,7 @@ On Wed, 2018-04-18 at 15:12 -0500, Eric W. Biederman wrote:
 > be a special case, and that does not sound correct.
 
 This is not any different than any of the other security/ima/ files
-(eg. policy, ascii_runtime_measurements, ...).  The next IMA
+(eg. policy, ascii_runtime_measurements, ...).  The next IMA
 namespacing stage would add support for these files.
 
 Mimi
-
-_______________________________________________
-Containers mailing list
-Containers@lists.linux-foundation.org
-https://lists.linuxfoundation.org/mailman/listinfo/containers
diff --git a/a/content_digest b/N1/content_digest
index 4c9b180..e6d199c 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -5,21 +5,22 @@
  "ref\0d8c30d7d-c679-9323-7a25-d3148e9b96c6@canonical.com\0"
  "ref\01524081472.3272.319.camel@linux.vnet.ibm.com\0"
  "ref\087wox4s282.fsf@xmission.com\0"
- "ref\087wox4s282.fsf-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org\0"
- "From\0Mimi Zohar <zohar-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>\0"
+ "From\0Mimi Zohar <zohar@linux.vnet.ibm.com>\0"
  "Subject\0Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support\0"
  "Date\0Wed, 18 Apr 2018 16:27:08 -0400\0"
- "To\0Eric W. Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>\0"
- "Cc\0John Johansen <john.johansen-Z7WLFzj8eWMS+FvcfC7Uqw@public.gmane.org>"
-  Mehmet Kayaalp <mkayaalp-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>
-  sunyuqiong1988-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org
-  containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org
-  linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  david.safford-JJi787mZWgc@public.gmane.org
-  James Bottomley <James.Bottomley-d9PhHud1JfjCXq6kfMZ53/egYHeGw8Jk@public.gmane.org>
-  linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  mkayaalp-4hyTIkVWTs8LubxHQvXPfYdd74u8MsAO@public.gmane.org
- " linux-integrity-u79uwXL29TY76Z2rM5mHXA@public.gmane.org\0"
+ "To\0Eric W. Biederman <ebiederm@xmission.com>\0"
+ "Cc\0John Johansen <john.johansen@canonical.com>"
+  Stefan Berger <stefanb@linux.vnet.ibm.com>
+  linux-integrity@vger.kernel.org
+  containers@lists.linux-foundation.org
+  linux-kernel@vger.kernel.org
+  linux-security-module@vger.kernel.org
+  serge@hallyn.com
+  sunyuqiong1988@gmail.com
+  david.safford@ge.com
+  mkayaalp@cs.binghamton.edu
+  James Bottomley <James.Bottomley@hansenpartnership.com>
+ " Mehmet Kayaalp <mkayaalp@linux.vnet.ibm.com>\0"
  "\00:1\0"
  "b\0"
  "On Wed, 2018-04-18 at 15:12 -0500, Eric W. Biederman wrote:\n"
@@ -42,7 +43,7 @@
  "> >> \n"
  "> >> \n"
  "> >> > My initial thought was to stage IMA namespacing with just IMA-audit\n"
- "> >> > first, followed by either IMA-measurement or IMA-appraisal. \302\240This\n"
+ "> >> > first, followed by either IMA-measurement or IMA-appraisal.  This\n"
  "> >> > would allow us to get the basic IMA namespacing framework working and\n"
  "> >> > defer dealing with the securityfs related namespacing of the IMA\n"
  "> >> > policy and measurement list issues to later.\n"
@@ -69,14 +70,9 @@
  "> be a special case, and that does not sound correct.\n"
  "\n"
  "This is not any different than any of the other security/ima/ files\n"
- "(eg. policy, ascii_runtime_measurements, ...). \302\240The next IMA\n"
+ "(eg. policy, ascii_runtime_measurements, ...).  The next IMA\n"
  "namespacing stage would add support for these files.\n"
  "\n"
- "Mimi\n"
- "\n"
- "_______________________________________________\n"
- "Containers mailing list\n"
- "Containers@lists.linux-foundation.org\n"
- https://lists.linuxfoundation.org/mailman/listinfo/containers
+ Mimi
 
-592070eaaf92fbb17560e69f76cd15d2b89f89e0538f23c8d428d1c43dc46942
+65aa160053e30bb7445b4ed3e65ac93c7203f57a949163832b1bf5e50ce3e901

diff --git a/a/1.txt b/N2/1.txt
index 5633a74..97e61df 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -18,7 +18,7 @@ On Wed, 2018-04-18 at 15:12 -0500, Eric W. Biederman wrote:
 > >> 
 > >> 
 > >> > My initial thought was to stage IMA namespacing with just IMA-audit
-> >> > first, followed by either IMA-measurement or IMA-appraisal.  This
+> >> > first, followed by either IMA-measurement or IMA-appraisal. ?This
 > >> > would allow us to get the basic IMA namespacing framework working and
 > >> > defer dealing with the securityfs related namespacing of the IMA
 > >> > policy and measurement list issues to later.
@@ -45,12 +45,12 @@ On Wed, 2018-04-18 at 15:12 -0500, Eric W. Biederman wrote:
 > be a special case, and that does not sound correct.
 
 This is not any different than any of the other security/ima/ files
-(eg. policy, ascii_runtime_measurements, ...).  The next IMA
+(eg. policy, ascii_runtime_measurements, ...). ?The next IMA
 namespacing stage would add support for these files.
 
 Mimi
 
-_______________________________________________
-Containers mailing list
-Containers@lists.linux-foundation.org
-https://lists.linuxfoundation.org/mailman/listinfo/containers
+--
+To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
+the body of a message to majordomo at vger.kernel.org
+More majordomo info at  http://vger.kernel.org/majordomo-info.html
diff --git a/a/content_digest b/N2/content_digest
index 4c9b180..c8713aa 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -5,21 +5,10 @@
  "ref\0d8c30d7d-c679-9323-7a25-d3148e9b96c6@canonical.com\0"
  "ref\01524081472.3272.319.camel@linux.vnet.ibm.com\0"
  "ref\087wox4s282.fsf@xmission.com\0"
- "ref\087wox4s282.fsf-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org\0"
- "From\0Mimi Zohar <zohar-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>\0"
- "Subject\0Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support\0"
+ "From\0zohar@linux.vnet.ibm.com (Mimi Zohar)\0"
+ "Subject\0[RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support\0"
  "Date\0Wed, 18 Apr 2018 16:27:08 -0400\0"
- "To\0Eric W. Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>\0"
- "Cc\0John Johansen <john.johansen-Z7WLFzj8eWMS+FvcfC7Uqw@public.gmane.org>"
-  Mehmet Kayaalp <mkayaalp-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>
-  sunyuqiong1988-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org
-  containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org
-  linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  david.safford-JJi787mZWgc@public.gmane.org
-  James Bottomley <James.Bottomley-d9PhHud1JfjCXq6kfMZ53/egYHeGw8Jk@public.gmane.org>
-  linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  mkayaalp-4hyTIkVWTs8LubxHQvXPfYdd74u8MsAO@public.gmane.org
- " linux-integrity-u79uwXL29TY76Z2rM5mHXA@public.gmane.org\0"
+ "To\0linux-security-module@vger.kernel.org\0"
  "\00:1\0"
  "b\0"
  "On Wed, 2018-04-18 at 15:12 -0500, Eric W. Biederman wrote:\n"
@@ -42,7 +31,7 @@
  "> >> \n"
  "> >> \n"
  "> >> > My initial thought was to stage IMA namespacing with just IMA-audit\n"
- "> >> > first, followed by either IMA-measurement or IMA-appraisal. \302\240This\n"
+ "> >> > first, followed by either IMA-measurement or IMA-appraisal. ?This\n"
  "> >> > would allow us to get the basic IMA namespacing framework working and\n"
  "> >> > defer dealing with the securityfs related namespacing of the IMA\n"
  "> >> > policy and measurement list issues to later.\n"
@@ -69,14 +58,14 @@
  "> be a special case, and that does not sound correct.\n"
  "\n"
  "This is not any different than any of the other security/ima/ files\n"
- "(eg. policy, ascii_runtime_measurements, ...). \302\240The next IMA\n"
+ "(eg. policy, ascii_runtime_measurements, ...). ?The next IMA\n"
  "namespacing stage would add support for these files.\n"
  "\n"
  "Mimi\n"
  "\n"
- "_______________________________________________\n"
- "Containers mailing list\n"
- "Containers@lists.linux-foundation.org\n"
- https://lists.linuxfoundation.org/mailman/listinfo/containers
+ "--\n"
+ "To unsubscribe from this list: send the line \"unsubscribe linux-security-module\" in\n"
+ "the body of a message to majordomo at vger.kernel.org\n"
+ More majordomo info at  http://vger.kernel.org/majordomo-info.html
 
-592070eaaf92fbb17560e69f76cd15d2b89f89e0538f23c8d428d1c43dc46942
+7927d521c79ad331378f9aaa2e8f59a495ebf55d2a1fa14c3e8ea05971e237f6

diff --git a/a/1.txt b/N3/1.txt
index 5633a74..acaebc0 100644
--- a/a/1.txt
+++ b/N3/1.txt
@@ -49,8 +49,3 @@ This is not any different than any of the other security/ima/ files
 namespacing stage would add support for these files.
 
 Mimi
-
-_______________________________________________
-Containers mailing list
-Containers@lists.linux-foundation.org
-https://lists.linuxfoundation.org/mailman/listinfo/containers
diff --git a/a/content_digest b/N3/content_digest
index 4c9b180..c3d0b2a 100644
--- a/a/content_digest
+++ b/N3/content_digest
@@ -5,21 +5,22 @@
  "ref\0d8c30d7d-c679-9323-7a25-d3148e9b96c6@canonical.com\0"
  "ref\01524081472.3272.319.camel@linux.vnet.ibm.com\0"
  "ref\087wox4s282.fsf@xmission.com\0"
- "ref\087wox4s282.fsf-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org\0"
- "From\0Mimi Zohar <zohar-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>\0"
+ "From\0Mimi Zohar <zohar@linux.vnet.ibm.com>\0"
  "Subject\0Re: [RFC PATCH v3 1/3] ima: extend clone() with IMA namespace support\0"
  "Date\0Wed, 18 Apr 2018 16:27:08 -0400\0"
- "To\0Eric W. Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>\0"
- "Cc\0John Johansen <john.johansen-Z7WLFzj8eWMS+FvcfC7Uqw@public.gmane.org>"
-  Mehmet Kayaalp <mkayaalp-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>
-  sunyuqiong1988-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org
-  containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org
-  linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  david.safford-JJi787mZWgc@public.gmane.org
-  James Bottomley <James.Bottomley-d9PhHud1JfjCXq6kfMZ53/egYHeGw8Jk@public.gmane.org>
-  linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  mkayaalp-4hyTIkVWTs8LubxHQvXPfYdd74u8MsAO@public.gmane.org
- " linux-integrity-u79uwXL29TY76Z2rM5mHXA@public.gmane.org\0"
+ "To\0Eric W. Biederman <ebiederm@xmission.com>\0"
+ "Cc\0John Johansen <john.johansen@canonical.com>"
+  Stefan Berger <stefanb@linux.vnet.ibm.com>
+  linux-integrity@vger.kernel.org
+  containers@lists.linux-foundation.org
+  linux-kernel@vger.kernel.org
+  linux-security-module@vger.kernel.org
+  serge@hallyn.com
+  sunyuqiong1988@gmail.com
+  david.safford@ge.com
+  mkayaalp@cs.binghamton.edu
+  James Bottomley <James.Bottomley@hansenpartnership.com>
+ " Mehmet Kayaalp <mkayaalp@linux.vnet.ibm.com>\0"
  "\00:1\0"
  "b\0"
  "On Wed, 2018-04-18 at 15:12 -0500, Eric W. Biederman wrote:\n"
@@ -72,11 +73,6 @@
  "(eg. policy, ascii_runtime_measurements, ...). \302\240The next IMA\n"
  "namespacing stage would add support for these files.\n"
  "\n"
- "Mimi\n"
- "\n"
- "_______________________________________________\n"
- "Containers mailing list\n"
- "Containers@lists.linux-foundation.org\n"
- https://lists.linuxfoundation.org/mailman/listinfo/containers
+ Mimi
 
-592070eaaf92fbb17560e69f76cd15d2b89f89e0538f23c8d428d1c43dc46942
+fcb9adb2fdfb7e483fb5701c76076e460cc72a29fb7bbe633f0a9a9f9a3c593d

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.