All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <1491551101.4184.48.camel@linux.vnet.ibm.com>

diff --git a/a/1.txt b/N1/1.txt
index 9096393..c247e41 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -17,7 +17,7 @@ not been included.
 > > > > Cc: Matthew Garrett <mjg59@srcf.ucam.org>
 > > > > Signed-off-by: Chun-Yi Lee <jlee@suse.com>
 > > > > Signed-off-by: David Howells <dhowells@redhat.com>
-> > > > cc: kexec@lists.infradead.org
+> > > > cc: kexec at lists.infradead.org
 > > > > ---
 > > > > 
 > > > >  kernel/kexec_file.c |    6 ++++++
@@ -40,7 +40,7 @@ not been included.
 > > > >  
 > > 
 > > IMA can be used to verify file signatures too, based on the LSM hooks
-> > in  kernel_read_file_from_fd().  CONFIG_KEXEC_VERIFY_SIG should not be
+> > in ?kernel_read_file_from_fd(). ?CONFIG_KEXEC_VERIFY_SIG should not be
 > > required.
 > 
 > Mimi, I remember we talked somthing before about the two signature 
@@ -52,11 +52,11 @@ not been included.
 Right, we discussed that the same method of measuring the kexec image
 and initramfs, for extending trusted boot to the OS, could also be
 used for verifying the kexec image and initramfs signatures, for
-extending secure boot to the OS.  The file hash would be calculated
+extending secure boot to the OS. ?The file hash would be calculated
 once for both.
 
 All of your concerns could be addressed with very minor changes to
-IMA.  (Continued in response to David.)
+IMA. ?(Continued in response to David.)
 
 > > 
 > > > 	/* Make sure we have a legal set of flags */
@@ -66,7 +66,7 @@ IMA.  (Continued in response to David.)
 > > > > 
 > > > > _______________________________________________
 > > > > kexec mailing list
-> > > > kexec@lists.infradead.org
+> > > > kexec at lists.infradead.org
 > > > > http://lists.infradead.org/mailman/listinfo/kexec
 > > > 
 > > > Acked-by: Dave Young <dyoung@redhat.com>
@@ -75,8 +75,13 @@ IMA.  (Continued in response to David.)
 > > > Dave
 > > > --
 > > > To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
-> > > the body of a message to majordomo@vger.kernel.org
+> > > the body of a message to majordomo at vger.kernel.org
 > > > More majordomo info at  http://vger.kernel.org/majordomo-info.html
 > > > 
 > > 
->
\ No newline at end of file
+> 
+
+--
+To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
+the body of a message to majordomo at vger.kernel.org
+More majordomo info at  http://vger.kernel.org/majordomo-info.html
\ No newline at end of file
diff --git a/a/content_digest b/N1/content_digest
index 74fa613..7e8dccd 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -14,29 +14,16 @@
   "ref\00020170407061935.GB10100\@dhcp-128-65.nay.redhat.com\0"
 ]
 [
-  "From\0Mimi Zohar <zohar\@linux.vnet.ibm.com>\0"
+  "From\0zohar\@linux.vnet.ibm.com (Mimi Zohar)\0"
 ]
 [
-  "Subject\0Re: [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set\0"
+  "Subject\0[PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set\0"
 ]
 [
   "Date\0Fri, 07 Apr 2017 03:45:01 -0400\0"
 ]
 [
-  "To\0Dave Young <dyoung\@redhat.com>\0"
-]
-[
-  "Cc\0David Howells <dhowells\@redhat.com>",
-  " linux-kernel\@vger.kernel.org",
-  " Matthew Garrett <mjg59\@srcf.ucam.org>",
-  " linux-efi\@vger.kernel.org",
-  " gnomes\@lxorguk.ukuu.org.uk",
-  " Chun-Yi Lee <jlee\@suse.com>",
-  " gregkh\@linuxfoundation.org",
-  " kexec\@lists.infradead.org",
-  " linux-security-module\@vger.kernel.org",
-  " keyrings\@vger.kernel.org",
-  " matthew.garrett\@nebula.com\0"
+  "To\0linux-security-module\@vger.kernel.org\0"
 ]
 [
   "\0000:1\0"
@@ -64,7 +51,7 @@
   "> > > > Cc: Matthew Garrett <mjg59\@srcf.ucam.org>\n",
   "> > > > Signed-off-by: Chun-Yi Lee <jlee\@suse.com>\n",
   "> > > > Signed-off-by: David Howells <dhowells\@redhat.com>\n",
-  "> > > > cc: kexec\@lists.infradead.org\n",
+  "> > > > cc: kexec at lists.infradead.org\n",
   "> > > > ---\n",
   "> > > > \n",
   "> > > >  kernel/kexec_file.c |    6 ++++++\n",
@@ -87,7 +74,7 @@
   "> > > >  \n",
   "> > \n",
   "> > IMA can be used to verify file signatures too, based on the LSM hooks\n",
-  "> > in \302\240kernel_read_file_from_fd(). \302\240CONFIG_KEXEC_VERIFY_SIG should not be\n",
+  "> > in ?kernel_read_file_from_fd(). ?CONFIG_KEXEC_VERIFY_SIG should not be\n",
   "> > required.\n",
   "> \n",
   "> Mimi, I remember we talked somthing before about the two signature \n",
@@ -99,11 +86,11 @@
   "Right, we discussed that the same method of measuring the kexec image\n",
   "and initramfs, for extending trusted boot to the OS, could also be\n",
   "used for verifying the kexec image and initramfs signatures, for\n",
-  "extending secure boot to the OS. \302\240The file hash would be calculated\n",
+  "extending secure boot to the OS. ?The file hash would be calculated\n",
   "once for both.\n",
   "\n",
   "All of your concerns could be addressed with very minor changes to\n",
-  "IMA. \302\240(Continued in response to David.)\n",
+  "IMA. ?(Continued in response to David.)\n",
   "\n",
   "> > \n",
   "> > > \t/* Make sure we have a legal set of flags */\n",
@@ -113,7 +100,7 @@
   "> > > > \n",
   "> > > > _______________________________________________\n",
   "> > > > kexec mailing list\n",
-  "> > > > kexec\@lists.infradead.org\n",
+  "> > > > kexec at lists.infradead.org\n",
   "> > > > http://lists.infradead.org/mailman/listinfo/kexec\n",
   "> > > \n",
   "> > > Acked-by: Dave Young <dyoung\@redhat.com>\n",
@@ -122,11 +109,16 @@
   "> > > Dave\n",
   "> > > --\n",
   "> > > To unsubscribe from this list: send the line \"unsubscribe linux-security-module\" in\n",
-  "> > > the body of a message to majordomo\@vger.kernel.org\n",
+  "> > > the body of a message to majordomo at vger.kernel.org\n",
   "> > > More majordomo info at  http://vger.kernel.org/majordomo-info.html\n",
   "> > > \n",
   "> > \n",
-  ">"
+  "> \n",
+  "\n",
+  "--\n",
+  "To unsubscribe from this list: send the line \"unsubscribe linux-security-module\" in\n",
+  "the body of a message to majordomo at vger.kernel.org\n",
+  "More majordomo info at  http://vger.kernel.org/majordomo-info.html"
 ]
 
-26bf807ebe6f8828c5ef8db2dc26cf525a9ccfb6c547f76896ff5c79712cc567
+e5717e5da485c834e5b4924df8d288bed9568e804c5a13558d0032dcdc3ca6db

diff --git a/a/1.txt b/N2/1.txt
index 9096393..4e8cdcf 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -79,4 +79,10 @@ IMA.  (Continued in response to David.)
 > > > More majordomo info at  http://vger.kernel.org/majordomo-info.html
 > > > 
 > > 
->
\ No newline at end of file
+> 
+
+
+_______________________________________________
+kexec mailing list
+kexec@lists.infradead.org
+http://lists.infradead.org/mailman/listinfo/kexec
\ No newline at end of file
diff --git a/a/content_digest b/N2/content_digest
index 74fa613..e31c351 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -26,14 +26,14 @@
   "To\0Dave Young <dyoung\@redhat.com>\0"
 ]
 [
-  "Cc\0David Howells <dhowells\@redhat.com>",
-  " linux-kernel\@vger.kernel.org",
-  " Matthew Garrett <mjg59\@srcf.ucam.org>",
+  "Cc\0Matthew Garrett <mjg59\@srcf.ucam.org>",
   " linux-efi\@vger.kernel.org",
   " gnomes\@lxorguk.ukuu.org.uk",
   " Chun-Yi Lee <jlee\@suse.com>",
   " gregkh\@linuxfoundation.org",
   " kexec\@lists.infradead.org",
+  " linux-kernel\@vger.kernel.org",
+  " David Howells <dhowells\@redhat.com>",
   " linux-security-module\@vger.kernel.org",
   " keyrings\@vger.kernel.org",
   " matthew.garrett\@nebula.com\0"
@@ -126,7 +126,13 @@
   "> > > More majordomo info at  http://vger.kernel.org/majordomo-info.html\n",
   "> > > \n",
   "> > \n",
-  ">"
+  "> \n",
+  "\n",
+  "\n",
+  "_______________________________________________\n",
+  "kexec mailing list\n",
+  "kexec\@lists.infradead.org\n",
+  "http://lists.infradead.org/mailman/listinfo/kexec"
 ]
 
-26bf807ebe6f8828c5ef8db2dc26cf525a9ccfb6c547f76896ff5c79712cc567
+7229f639d09812e51e9482c3e9e17a9d736995b9cae71ec139287a72d78aa341

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.