All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <1493751682.3680.11.camel@linux.vnet.ibm.com>

diff --git a/a/1.txt b/N1/1.txt
index ce2f344..c9ac458 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,7 +1,7 @@
 Hi David,
 
 On Mon, 2017-04-10 at 14:19 +0100, David Howells wrote:
-> Mimi Zohar <zohar@linux.vnet.ibm.com> wrote:
+> Mimi Zohar <zohar-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org> wrote:
 > 
 > > From an IMA perspective, either a file hash or signature are valid,
 > > but for this usage it must be a signature.
diff --git a/a/content_digest b/N1/content_digest
index 97ab845..1c1e2a6 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -26,7 +26,10 @@
   "ref\00013679.1491830392\@warthog.procyon.org.uk\0"
 ]
 [
-  "From\0Mimi Zohar <zohar\@linux.vnet.ibm.com>\0"
+  "ref\00013679.1491830392-S6HVgzuS8uM4Awkfq6JHfwNdhmdF6hFW\@public.gmane.org\0"
+]
+[
+  "From\0Mimi Zohar <zohar-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8\@public.gmane.org>\0"
 ]
 [
   "Subject\0Re: [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set\0"
@@ -35,20 +38,20 @@
   "Date\0Tue, 02 May 2017 15:01:22 -0400\0"
 ]
 [
-  "To\0David Howells <dhowells\@redhat.com>\0"
+  "To\0David Howells <dhowells-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>\0"
 ]
 [
-  "Cc\0Dave Young <dyoung\@redhat.com>",
-  " linux-kernel\@vger.kernel.org",
-  " Matthew Garrett <mjg59\@srcf.ucam.org>",
-  " linux-efi\@vger.kernel.org",
-  " gnomes\@lxorguk.ukuu.org.uk",
-  " Chun-Yi Lee <jlee\@suse.com>",
-  " gregkh\@linuxfoundation.org",
-  " kexec\@lists.infradead.org",
-  " linux-security-module\@vger.kernel.org",
-  " keyrings\@vger.kernel.org",
-  " matthew.garrett\@nebula.com\0"
+  "Cc\0Dave Young <dyoung-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+  " linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+  " Matthew Garrett <mjg59-1xO5oi07KQx4cg9Nei1l7Q\@public.gmane.org>",
+  " linux-efi-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+  " gnomes-qBU/x9rampVanCEyBjwyrvXRex20P6io\@public.gmane.org",
+  " Chun-Yi Lee <jlee-IBi9RG/b67k\@public.gmane.org>",
+  " gregkh-hQyY1W1yCW8ekmWlsbkhG0B+6BGkLq7r\@public.gmane.org",
+  " kexec-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r\@public.gmane.org",
+  " linux-security-module-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+  " keyrings-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+  " matthew.garrett-05XSO3Yj/JvQT0dZR+AlfA\@public.gmane.org\0"
 ]
 [
   "\0000:1\0"
@@ -60,7 +63,7 @@
   "Hi David,\n",
   "\n",
   "On Mon, 2017-04-10 at 14:19 +0100, David Howells wrote:\n",
-  "> Mimi Zohar <zohar\@linux.vnet.ibm.com> wrote:\n",
+  "> Mimi Zohar <zohar-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8\@public.gmane.org> wrote:\n",
   "> \n",
   "> > From an IMA perspective, either a file hash or signature are valid,\n",
   "> > but for this usage it must be a signature.\n",
@@ -78,4 +81,4 @@
   "Mimi"
 ]
 
-fe637d68303f9a7d7fb131a6df00b18582b9b17a70831a6f7324ec4e3b0bfd76
+d32ef3836874066ebe2a04a50a78ac06b633229880ae164b91359f7055618054

diff --git a/a/1.txt b/N2/1.txt
index ce2f344..1599d91 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -10,10 +10,15 @@ On Mon, 2017-04-10 at 14:19 +0100, David Howells wrote:
 > hash rather than on a key, I would've thought that should be fine.
 
 File hashes can be modified on the running system, so they're normally
-used, in conjunction with EVM, to detect off line modification of
+used,?in conjunction with EVM, to detect off line modification of
 mutable files and prevent their usage.
 
-These patches https://lkml.org/lkml/2017/5/2/465 should provide some
+These patches https://lkml.org/lkml/2017/5/2/465?should provide some
 of the missing functionality.
 
-Mimi
\ No newline at end of file
+Mimi
+
+--
+To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
+the body of a message to majordomo at vger.kernel.org
+More majordomo info at  http://vger.kernel.org/majordomo-info.html
\ No newline at end of file
diff --git a/a/content_digest b/N2/content_digest
index 97ab845..fc5cd6c 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -26,29 +26,16 @@
   "ref\00013679.1491830392\@warthog.procyon.org.uk\0"
 ]
 [
-  "From\0Mimi Zohar <zohar\@linux.vnet.ibm.com>\0"
+  "From\0zohar\@linux.vnet.ibm.com (Mimi Zohar)\0"
 ]
 [
-  "Subject\0Re: [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set\0"
+  "Subject\0[PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set\0"
 ]
 [
   "Date\0Tue, 02 May 2017 15:01:22 -0400\0"
 ]
 [
-  "To\0David Howells <dhowells\@redhat.com>\0"
-]
-[
-  "Cc\0Dave Young <dyoung\@redhat.com>",
-  " linux-kernel\@vger.kernel.org",
-  " Matthew Garrett <mjg59\@srcf.ucam.org>",
-  " linux-efi\@vger.kernel.org",
-  " gnomes\@lxorguk.ukuu.org.uk",
-  " Chun-Yi Lee <jlee\@suse.com>",
-  " gregkh\@linuxfoundation.org",
-  " kexec\@lists.infradead.org",
-  " linux-security-module\@vger.kernel.org",
-  " keyrings\@vger.kernel.org",
-  " matthew.garrett\@nebula.com\0"
+  "To\0linux-security-module\@vger.kernel.org\0"
 ]
 [
   "\0000:1\0"
@@ -69,13 +56,18 @@
   "> hash rather than on a key, I would've thought that should be fine.\n",
   "\n",
   "File hashes can be modified on the running system, so they're normally\n",
-  "used,\302\240in conjunction with EVM, to detect off line modification of\n",
+  "used,?in conjunction with EVM, to detect off line modification of\n",
   "mutable files and prevent their usage.\n",
   "\n",
-  "These patches https://lkml.org/lkml/2017/5/2/465\302\240should provide some\n",
+  "These patches https://lkml.org/lkml/2017/5/2/465?should provide some\n",
   "of the missing functionality.\n",
   "\n",
-  "Mimi"
+  "Mimi\n",
+  "\n",
+  "--\n",
+  "To unsubscribe from this list: send the line \"unsubscribe linux-security-module\" in\n",
+  "the body of a message to majordomo at vger.kernel.org\n",
+  "More majordomo info at  http://vger.kernel.org/majordomo-info.html"
 ]
 
-fe637d68303f9a7d7fb131a6df00b18582b9b17a70831a6f7324ec4e3b0bfd76
+952ed7983fab6d34e0a1eefede244a44147499f3ecd6b7f3d95f05cb97f129f4

diff --git a/a/1.txt b/N3/1.txt
index ce2f344..b20324a 100644
--- a/a/1.txt
+++ b/N3/1.txt
@@ -16,4 +16,10 @@ mutable files and prevent their usage.
 These patches https://lkml.org/lkml/2017/5/2/465 should provide some
 of the missing functionality.
 
-Mimi
\ No newline at end of file
+Mimi
+
+
+_______________________________________________
+kexec mailing list
+kexec@lists.infradead.org
+http://lists.infradead.org/mailman/listinfo/kexec
\ No newline at end of file
diff --git a/a/content_digest b/N3/content_digest
index 97ab845..bdefa30 100644
--- a/a/content_digest
+++ b/N3/content_digest
@@ -38,17 +38,17 @@
   "To\0David Howells <dhowells\@redhat.com>\0"
 ]
 [
-  "Cc\0Dave Young <dyoung\@redhat.com>",
-  " linux-kernel\@vger.kernel.org",
-  " Matthew Garrett <mjg59\@srcf.ucam.org>",
+  "Cc\0Matthew Garrett <mjg59\@srcf.ucam.org>",
   " linux-efi\@vger.kernel.org",
   " gnomes\@lxorguk.ukuu.org.uk",
-  " Chun-Yi Lee <jlee\@suse.com>",
   " gregkh\@linuxfoundation.org",
   " kexec\@lists.infradead.org",
+  " linux-kernel\@vger.kernel.org",
+  " Chun-Yi Lee <jlee\@suse.com>",
   " linux-security-module\@vger.kernel.org",
   " keyrings\@vger.kernel.org",
-  " matthew.garrett\@nebula.com\0"
+  " matthew.garrett\@nebula.com",
+  " Dave Young <dyoung\@redhat.com>\0"
 ]
 [
   "\0000:1\0"
@@ -75,7 +75,13 @@
   "These patches https://lkml.org/lkml/2017/5/2/465\302\240should provide some\n",
   "of the missing functionality.\n",
   "\n",
-  "Mimi"
+  "Mimi\n",
+  "\n",
+  "\n",
+  "_______________________________________________\n",
+  "kexec mailing list\n",
+  "kexec\@lists.infradead.org\n",
+  "http://lists.infradead.org/mailman/listinfo/kexec"
 ]
 
-fe637d68303f9a7d7fb131a6df00b18582b9b17a70831a6f7324ec4e3b0bfd76
+a52083da65152418cd07051fdedfea3a60202048cb494dfb517e539b36021c62

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.