All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <1491551180.4184.50.camel@linux.vnet.ibm.com>

diff --git a/a/1.txt b/N1/1.txt
index cc5492c..0a375e1 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -7,13 +7,18 @@ On Fri, 2017-04-07 at 08:09 +0100, David Howells wrote:
 > > > >  
 > > 
 > > IMA can be used to verify file signatures too, based on the LSM hooks
-> > in  kernel_read_file_from_fd().  CONFIG_KEXEC_VERIFY_SIG should not be
+> > in ?kernel_read_file_from_fd(). ?CONFIG_KEXEC_VERIFY_SIG should not be
 > > required.
 > 
 > Okay, fair enough.  I can stick in an OR with an IS_ENABLED on some IMA
 > symbol.  CONFIG_IMA_KEXEC maybe?  And also require IMA be enabled?
 
-Not quite, since as Dave pointed out, IMA is policy driven.  As a
+Not quite, since as Dave pointed out, IMA is policy driven. ?As a
 policy is installed, we could set a flag.
 
-Mimi
\ No newline at end of file
+Mimi
+
+--
+To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
+the body of a message to majordomo at vger.kernel.org
+More majordomo info at  http://vger.kernel.org/majordomo-info.html
\ No newline at end of file
diff --git a/a/content_digest b/N1/content_digest
index 40ccffd..1c9e528 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -14,29 +14,16 @@
   "ref\00021572.1491548994\@warthog.procyon.org.uk\0"
 ]
 [
-  "From\0Mimi Zohar <zohar\@linux.vnet.ibm.com>\0"
+  "From\0zohar\@linux.vnet.ibm.com (Mimi Zohar)\0"
 ]
 [
-  "Subject\0Re: [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set\0"
+  "Subject\0[PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set\0"
 ]
 [
   "Date\0Fri, 07 Apr 2017 03:46:20 -0400\0"
 ]
 [
-  "To\0David Howells <dhowells\@redhat.com>\0"
-]
-[
-  "Cc\0Dave Young <dyoung\@redhat.com>",
-  " linux-kernel\@vger.kernel.org",
-  " Matthew Garrett <mjg59\@srcf.ucam.org>",
-  " linux-efi\@vger.kernel.org",
-  " gnomes\@lxorguk.ukuu.org.uk",
-  " Chun-Yi Lee <jlee\@suse.com>",
-  " gregkh\@linuxfoundation.org",
-  " kexec\@lists.infradead.org",
-  " linux-security-module\@vger.kernel.org",
-  " keyrings\@vger.kernel.org",
-  " matthew.garrett\@nebula.com\0"
+  "To\0linux-security-module\@vger.kernel.org\0"
 ]
 [
   "\0000:1\0"
@@ -54,16 +41,21 @@
   "> > > >  \n",
   "> > \n",
   "> > IMA can be used to verify file signatures too, based on the LSM hooks\n",
-  "> > in \302\240kernel_read_file_from_fd(). \302\240CONFIG_KEXEC_VERIFY_SIG should not be\n",
+  "> > in ?kernel_read_file_from_fd(). ?CONFIG_KEXEC_VERIFY_SIG should not be\n",
   "> > required.\n",
   "> \n",
   "> Okay, fair enough.  I can stick in an OR with an IS_ENABLED on some IMA\n",
   "> symbol.  CONFIG_IMA_KEXEC maybe?  And also require IMA be enabled?\n",
   "\n",
-  "Not quite, since as Dave pointed out, IMA is policy driven. \302\240As a\n",
+  "Not quite, since as Dave pointed out, IMA is policy driven. ?As a\n",
   "policy is installed, we could set a flag.\n",
   "\n",
-  "Mimi"
+  "Mimi\n",
+  "\n",
+  "--\n",
+  "To unsubscribe from this list: send the line \"unsubscribe linux-security-module\" in\n",
+  "the body of a message to majordomo at vger.kernel.org\n",
+  "More majordomo info at  http://vger.kernel.org/majordomo-info.html"
 ]
 
-b758d0aa358d4b70ec176ac88027d3261701aab81f09ce0499fd95a1378e345e
+c126d6ab63abdeea989eb790098f63221cb40b1cc86d8c3e925760b67c3e0501

diff --git a/a/1.txt b/N2/1.txt
index cc5492c..39d7cf9 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -16,4 +16,10 @@ On Fri, 2017-04-07 at 08:09 +0100, David Howells wrote:
 Not quite, since as Dave pointed out, IMA is policy driven.  As a
 policy is installed, we could set a flag.
 
-Mimi
\ No newline at end of file
+Mimi
+
+
+_______________________________________________
+kexec mailing list
+kexec@lists.infradead.org
+http://lists.infradead.org/mailman/listinfo/kexec
\ No newline at end of file
diff --git a/a/content_digest b/N2/content_digest
index 40ccffd..b1a27e0 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -26,17 +26,17 @@
   "To\0David Howells <dhowells\@redhat.com>\0"
 ]
 [
-  "Cc\0Dave Young <dyoung\@redhat.com>",
-  " linux-kernel\@vger.kernel.org",
-  " Matthew Garrett <mjg59\@srcf.ucam.org>",
+  "Cc\0Matthew Garrett <mjg59\@srcf.ucam.org>",
   " linux-efi\@vger.kernel.org",
   " gnomes\@lxorguk.ukuu.org.uk",
-  " Chun-Yi Lee <jlee\@suse.com>",
   " gregkh\@linuxfoundation.org",
   " kexec\@lists.infradead.org",
+  " linux-kernel\@vger.kernel.org",
+  " Chun-Yi Lee <jlee\@suse.com>",
   " linux-security-module\@vger.kernel.org",
   " keyrings\@vger.kernel.org",
-  " matthew.garrett\@nebula.com\0"
+  " matthew.garrett\@nebula.com",
+  " Dave Young <dyoung\@redhat.com>\0"
 ]
 [
   "\0000:1\0"
@@ -63,7 +63,13 @@
   "Not quite, since as Dave pointed out, IMA is policy driven. \302\240As a\n",
   "policy is installed, we could set a flag.\n",
   "\n",
-  "Mimi"
+  "Mimi\n",
+  "\n",
+  "\n",
+  "_______________________________________________\n",
+  "kexec mailing list\n",
+  "kexec\@lists.infradead.org\n",
+  "http://lists.infradead.org/mailman/listinfo/kexec"
 ]
 
-b758d0aa358d4b70ec176ac88027d3261701aab81f09ce0499fd95a1378e345e
+8afb599d8876dc041165acd296a05ebde909e64885401ff8fa808c13ad63bf29

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.