diff for duplicates of <1491551180.4184.50.camel@linux.vnet.ibm.com>
diff --git a/a/1.txt b/N1/1.txt
index cc5492c..0a375e1 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -7,13 +7,18 @@ On Fri, 2017-04-07 at 08:09 +0100, David Howells wrote:
> > > >
> >
> > IMA can be used to verify file signatures too, based on the LSM hooks
-> > in kernel_read_file_from_fd(). CONFIG_KEXEC_VERIFY_SIG should not be
+> > in ?kernel_read_file_from_fd(). ?CONFIG_KEXEC_VERIFY_SIG should not be
> > required.
>
> Okay, fair enough. I can stick in an OR with an IS_ENABLED on some IMA
> symbol. CONFIG_IMA_KEXEC maybe? And also require IMA be enabled?
-Not quite, since as Dave pointed out, IMA is policy driven. As a
+Not quite, since as Dave pointed out, IMA is policy driven. ?As a
policy is installed, we could set a flag.
-Mimi
\ No newline at end of file
+Mimi
+
+--
+To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
+the body of a message to majordomo at vger.kernel.org
+More majordomo info at http://vger.kernel.org/majordomo-info.html
\ No newline at end of file
diff --git a/a/content_digest b/N1/content_digest
index 40ccffd..1c9e528 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -14,29 +14,16 @@
"ref\00021572.1491548994\@warthog.procyon.org.uk\0"
]
[
- "From\0Mimi Zohar <zohar\@linux.vnet.ibm.com>\0"
+ "From\0zohar\@linux.vnet.ibm.com (Mimi Zohar)\0"
]
[
- "Subject\0Re: [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set\0"
+ "Subject\0[PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set\0"
]
[
"Date\0Fri, 07 Apr 2017 03:46:20 -0400\0"
]
[
- "To\0David Howells <dhowells\@redhat.com>\0"
-]
-[
- "Cc\0Dave Young <dyoung\@redhat.com>",
- " linux-kernel\@vger.kernel.org",
- " Matthew Garrett <mjg59\@srcf.ucam.org>",
- " linux-efi\@vger.kernel.org",
- " gnomes\@lxorguk.ukuu.org.uk",
- " Chun-Yi Lee <jlee\@suse.com>",
- " gregkh\@linuxfoundation.org",
- " kexec\@lists.infradead.org",
- " linux-security-module\@vger.kernel.org",
- " keyrings\@vger.kernel.org",
- " matthew.garrett\@nebula.com\0"
+ "To\0linux-security-module\@vger.kernel.org\0"
]
[
"\0000:1\0"
@@ -54,16 +41,21 @@
"> > > > \n",
"> > \n",
"> > IMA can be used to verify file signatures too, based on the LSM hooks\n",
- "> > in \302\240kernel_read_file_from_fd(). \302\240CONFIG_KEXEC_VERIFY_SIG should not be\n",
+ "> > in ?kernel_read_file_from_fd(). ?CONFIG_KEXEC_VERIFY_SIG should not be\n",
"> > required.\n",
"> \n",
"> Okay, fair enough. I can stick in an OR with an IS_ENABLED on some IMA\n",
"> symbol. CONFIG_IMA_KEXEC maybe? And also require IMA be enabled?\n",
"\n",
- "Not quite, since as Dave pointed out, IMA is policy driven. \302\240As a\n",
+ "Not quite, since as Dave pointed out, IMA is policy driven. ?As a\n",
"policy is installed, we could set a flag.\n",
"\n",
- "Mimi"
+ "Mimi\n",
+ "\n",
+ "--\n",
+ "To unsubscribe from this list: send the line \"unsubscribe linux-security-module\" in\n",
+ "the body of a message to majordomo at vger.kernel.org\n",
+ "More majordomo info at http://vger.kernel.org/majordomo-info.html"
]
-b758d0aa358d4b70ec176ac88027d3261701aab81f09ce0499fd95a1378e345e
+c126d6ab63abdeea989eb790098f63221cb40b1cc86d8c3e925760b67c3e0501
diff --git a/a/1.txt b/N2/1.txt
index cc5492c..39d7cf9 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -16,4 +16,10 @@ On Fri, 2017-04-07 at 08:09 +0100, David Howells wrote:
Not quite, since as Dave pointed out, IMA is policy driven. As a
policy is installed, we could set a flag.
-Mimi
\ No newline at end of file
+Mimi
+
+
+_______________________________________________
+kexec mailing list
+kexec@lists.infradead.org
+http://lists.infradead.org/mailman/listinfo/kexec
\ No newline at end of file
diff --git a/a/content_digest b/N2/content_digest
index 40ccffd..b1a27e0 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -26,17 +26,17 @@
"To\0David Howells <dhowells\@redhat.com>\0"
]
[
- "Cc\0Dave Young <dyoung\@redhat.com>",
- " linux-kernel\@vger.kernel.org",
- " Matthew Garrett <mjg59\@srcf.ucam.org>",
+ "Cc\0Matthew Garrett <mjg59\@srcf.ucam.org>",
" linux-efi\@vger.kernel.org",
" gnomes\@lxorguk.ukuu.org.uk",
- " Chun-Yi Lee <jlee\@suse.com>",
" gregkh\@linuxfoundation.org",
" kexec\@lists.infradead.org",
+ " linux-kernel\@vger.kernel.org",
+ " Chun-Yi Lee <jlee\@suse.com>",
" linux-security-module\@vger.kernel.org",
" keyrings\@vger.kernel.org",
- " matthew.garrett\@nebula.com\0"
+ " matthew.garrett\@nebula.com",
+ " Dave Young <dyoung\@redhat.com>\0"
]
[
"\0000:1\0"
@@ -63,7 +63,13 @@
"Not quite, since as Dave pointed out, IMA is policy driven. \302\240As a\n",
"policy is installed, we could set a flag.\n",
"\n",
- "Mimi"
+ "Mimi\n",
+ "\n",
+ "\n",
+ "_______________________________________________\n",
+ "kexec mailing list\n",
+ "kexec\@lists.infradead.org\n",
+ "http://lists.infradead.org/mailman/listinfo/kexec"
]
-b758d0aa358d4b70ec176ac88027d3261701aab81f09ce0499fd95a1378e345e
+8afb599d8876dc041165acd296a05ebde909e64885401ff8fa808c13ad63bf29
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.