diff for duplicates of <20170407080144.GC10737@dhcp-128-65.nay.redhat.com>
diff --git a/a/1.txt b/N1/1.txt
index bb52c67..707341d 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -18,7 +18,7 @@ On 04/07/17 at 03:45am, Mimi Zohar wrote:
> > > > > Cc: Matthew Garrett <mjg59@srcf.ucam.org>
> > > > > Signed-off-by: Chun-Yi Lee <jlee@suse.com>
> > > > > Signed-off-by: David Howells <dhowells@redhat.com>
-> > > > > cc: kexec@lists.infradead.org
+> > > > > cc: kexec at lists.infradead.org
> > > > > ---
> > > > >
> > > > > kernel/kexec_file.c | 6 ++++++
@@ -41,7 +41,7 @@ On 04/07/17 at 03:45am, Mimi Zohar wrote:
> > > > >
> > >
> > > IMA can be used to verify file signatures too, based on the LSM hooks
-> > > in kernel_read_file_from_fd(). CONFIG_KEXEC_VERIFY_SIG should not be
+> > > in ?kernel_read_file_from_fd(). ?CONFIG_KEXEC_VERIFY_SIG should not be
> > > required.
> >
> > Mimi, I remember we talked somthing before about the two signature
@@ -53,11 +53,11 @@ On 04/07/17 at 03:45am, Mimi Zohar wrote:
> Right, we discussed that the same method of measuring the kexec image
> and initramfs, for extending trusted boot to the OS, could also be
> used for verifying the kexec image and initramfs signatures, for
-> extending secure boot to the OS. The file hash would be calculated
+> extending secure boot to the OS. ?The file hash would be calculated
> once for both.
>
> All of your concerns could be addressed with very minor changes to
-> IMA. (Continued in response to David.)
+> IMA. ?(Continued in response to David.)
Thanks! As long as IMA can ensure not breaking the lockdown it should be
fine to add an check for either !CONFIG_KEXEC_VERIFY_SIG or !IMA
@@ -72,7 +72,7 @@ enforced.
> > > > >
> > > > > _______________________________________________
> > > > > kexec mailing list
-> > > > > kexec@lists.infradead.org
+> > > > > kexec at lists.infradead.org
> > > > > http://lists.infradead.org/mailman/listinfo/kexec
> > > >
> > > > Acked-by: Dave Young <dyoung@redhat.com>
@@ -81,9 +81,13 @@ enforced.
> > > > Dave
> > > > --
> > > > To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
-> > > > the body of a message to majordomo@vger.kernel.org
+> > > > the body of a message to majordomo at vger.kernel.org
> > > > More majordomo info at http://vger.kernel.org/majordomo-info.html
> > > >
> > >
> >
->
\ No newline at end of file
+>
+--
+To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
+the body of a message to majordomo at vger.kernel.org
+More majordomo info at http://vger.kernel.org/majordomo-info.html
\ No newline at end of file
diff --git a/a/content_digest b/N1/content_digest
index f2aa1e8..b74a395 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -17,29 +17,16 @@
"ref\0001491551101.4184.48.camel\@linux.vnet.ibm.com\0"
]
[
- "From\0Dave Young <dyoung\@redhat.com>\0"
+ "From\0dyoung\@redhat.com (Dave Young)\0"
]
[
- "Subject\0Re: [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set\0"
+ "Subject\0[PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set\0"
]
[
"Date\0Fri, 7 Apr 2017 16:01:44 +0800\0"
]
[
- "To\0Mimi Zohar <zohar\@linux.vnet.ibm.com>\0"
-]
-[
- "Cc\0David Howells <dhowells\@redhat.com>",
- " linux-kernel\@vger.kernel.org",
- " Matthew Garrett <mjg59\@srcf.ucam.org>",
- " linux-efi\@vger.kernel.org",
- " gnomes\@lxorguk.ukuu.org.uk",
- " Chun-Yi Lee <jlee\@suse.com>",
- " gregkh\@linuxfoundation.org",
- " kexec\@lists.infradead.org",
- " linux-security-module\@vger.kernel.org",
- " keyrings\@vger.kernel.org",
- " matthew.garrett\@nebula.com\0"
+ "To\0linux-security-module\@vger.kernel.org\0"
]
[
"\0000:1\0"
@@ -68,7 +55,7 @@
"> > > > > Cc: Matthew Garrett <mjg59\@srcf.ucam.org>\n",
"> > > > > Signed-off-by: Chun-Yi Lee <jlee\@suse.com>\n",
"> > > > > Signed-off-by: David Howells <dhowells\@redhat.com>\n",
- "> > > > > cc: kexec\@lists.infradead.org\n",
+ "> > > > > cc: kexec at lists.infradead.org\n",
"> > > > > ---\n",
"> > > > > \n",
"> > > > > kernel/kexec_file.c | 6 ++++++\n",
@@ -91,7 +78,7 @@
"> > > > > \n",
"> > > \n",
"> > > IMA can be used to verify file signatures too, based on the LSM hooks\n",
- "> > > in \302\240kernel_read_file_from_fd(). \302\240CONFIG_KEXEC_VERIFY_SIG should not be\n",
+ "> > > in ?kernel_read_file_from_fd(). ?CONFIG_KEXEC_VERIFY_SIG should not be\n",
"> > > required.\n",
"> > \n",
"> > Mimi, I remember we talked somthing before about the two signature \n",
@@ -103,11 +90,11 @@
"> Right, we discussed that the same method of measuring the kexec image\n",
"> and initramfs, for extending trusted boot to the OS, could also be\n",
"> used for verifying the kexec image and initramfs signatures, for\n",
- "> extending secure boot to the OS. \302\240The file hash would be calculated\n",
+ "> extending secure boot to the OS. ?The file hash would be calculated\n",
"> once for both.\n",
"> \n",
"> All of your concerns could be addressed with very minor changes to\n",
- "> IMA. \302\240(Continued in response to David.)\n",
+ "> IMA. ?(Continued in response to David.)\n",
"\n",
"Thanks! As long as IMA can ensure not breaking the lockdown it should be\n",
"fine to add an check for either !CONFIG_KEXEC_VERIFY_SIG or !IMA\n",
@@ -122,7 +109,7 @@
"> > > > > \n",
"> > > > > _______________________________________________\n",
"> > > > > kexec mailing list\n",
- "> > > > > kexec\@lists.infradead.org\n",
+ "> > > > > kexec at lists.infradead.org\n",
"> > > > > http://lists.infradead.org/mailman/listinfo/kexec\n",
"> > > > \n",
"> > > > Acked-by: Dave Young <dyoung\@redhat.com>\n",
@@ -131,12 +118,16 @@
"> > > > Dave\n",
"> > > > --\n",
"> > > > To unsubscribe from this list: send the line \"unsubscribe linux-security-module\" in\n",
- "> > > > the body of a message to majordomo\@vger.kernel.org\n",
+ "> > > > the body of a message to majordomo at vger.kernel.org\n",
"> > > > More majordomo info at http://vger.kernel.org/majordomo-info.html\n",
"> > > > \n",
"> > > \n",
"> > \n",
- ">"
+ "> \n",
+ "--\n",
+ "To unsubscribe from this list: send the line \"unsubscribe linux-security-module\" in\n",
+ "the body of a message to majordomo at vger.kernel.org\n",
+ "More majordomo info at http://vger.kernel.org/majordomo-info.html"
]
-819449ae9d23e3bd23a8732f6a6d9fffed97cf3f5db84d14b15ad82448bffd5a
+96dedf26c93ffa6f1bc745a3f4fcbf9ed93e96921eaec3fe8dedef9904fdb93d
diff --git a/a/1.txt b/N2/1.txt
index bb52c67..652edea 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -86,4 +86,9 @@ enforced.
> > > >
> > >
> >
->
\ No newline at end of file
+>
+
+_______________________________________________
+kexec mailing list
+kexec@lists.infradead.org
+http://lists.infradead.org/mailman/listinfo/kexec
\ No newline at end of file
diff --git a/a/content_digest b/N2/content_digest
index f2aa1e8..8b5d1aa 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -29,14 +29,14 @@
"To\0Mimi Zohar <zohar\@linux.vnet.ibm.com>\0"
]
[
- "Cc\0David Howells <dhowells\@redhat.com>",
- " linux-kernel\@vger.kernel.org",
- " Matthew Garrett <mjg59\@srcf.ucam.org>",
+ "Cc\0Matthew Garrett <mjg59\@srcf.ucam.org>",
" linux-efi\@vger.kernel.org",
" gnomes\@lxorguk.ukuu.org.uk",
" Chun-Yi Lee <jlee\@suse.com>",
" gregkh\@linuxfoundation.org",
" kexec\@lists.infradead.org",
+ " linux-kernel\@vger.kernel.org",
+ " David Howells <dhowells\@redhat.com>",
" linux-security-module\@vger.kernel.org",
" keyrings\@vger.kernel.org",
" matthew.garrett\@nebula.com\0"
@@ -136,7 +136,12 @@
"> > > > \n",
"> > > \n",
"> > \n",
- ">"
+ "> \n",
+ "\n",
+ "_______________________________________________\n",
+ "kexec mailing list\n",
+ "kexec\@lists.infradead.org\n",
+ "http://lists.infradead.org/mailman/listinfo/kexec"
]
-819449ae9d23e3bd23a8732f6a6d9fffed97cf3f5db84d14b15ad82448bffd5a
+49c15fe1cc8560e0c2b7ce0c73a2735d3f4b37fd4bce1204801e239fb84680e5
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.