All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20170407080144.GC10737@dhcp-128-65.nay.redhat.com>

diff --git a/a/1.txt b/N1/1.txt
index bb52c67..707341d 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -18,7 +18,7 @@ On 04/07/17 at 03:45am, Mimi Zohar wrote:
 > > > > > Cc: Matthew Garrett <mjg59@srcf.ucam.org>
 > > > > > Signed-off-by: Chun-Yi Lee <jlee@suse.com>
 > > > > > Signed-off-by: David Howells <dhowells@redhat.com>
-> > > > > cc: kexec@lists.infradead.org
+> > > > > cc: kexec at lists.infradead.org
 > > > > > ---
 > > > > > 
 > > > > >  kernel/kexec_file.c |    6 ++++++
@@ -41,7 +41,7 @@ On 04/07/17 at 03:45am, Mimi Zohar wrote:
 > > > > >  
 > > > 
 > > > IMA can be used to verify file signatures too, based on the LSM hooks
-> > > in  kernel_read_file_from_fd().  CONFIG_KEXEC_VERIFY_SIG should not be
+> > > in ?kernel_read_file_from_fd(). ?CONFIG_KEXEC_VERIFY_SIG should not be
 > > > required.
 > > 
 > > Mimi, I remember we talked somthing before about the two signature 
@@ -53,11 +53,11 @@ On 04/07/17 at 03:45am, Mimi Zohar wrote:
 > Right, we discussed that the same method of measuring the kexec image
 > and initramfs, for extending trusted boot to the OS, could also be
 > used for verifying the kexec image and initramfs signatures, for
-> extending secure boot to the OS.  The file hash would be calculated
+> extending secure boot to the OS. ?The file hash would be calculated
 > once for both.
 > 
 > All of your concerns could be addressed with very minor changes to
-> IMA.  (Continued in response to David.)
+> IMA. ?(Continued in response to David.)
 
 Thanks! As long as IMA can ensure not breaking the lockdown it should be
 fine to add an check for either !CONFIG_KEXEC_VERIFY_SIG or !IMA
@@ -72,7 +72,7 @@ enforced.
 > > > > > 
 > > > > > _______________________________________________
 > > > > > kexec mailing list
-> > > > > kexec@lists.infradead.org
+> > > > > kexec at lists.infradead.org
 > > > > > http://lists.infradead.org/mailman/listinfo/kexec
 > > > > 
 > > > > Acked-by: Dave Young <dyoung@redhat.com>
@@ -81,9 +81,13 @@ enforced.
 > > > > Dave
 > > > > --
 > > > > To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
-> > > > the body of a message to majordomo@vger.kernel.org
+> > > > the body of a message to majordomo at vger.kernel.org
 > > > > More majordomo info at  http://vger.kernel.org/majordomo-info.html
 > > > > 
 > > > 
 > > 
->
\ No newline at end of file
+> 
+--
+To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
+the body of a message to majordomo at vger.kernel.org
+More majordomo info at  http://vger.kernel.org/majordomo-info.html
\ No newline at end of file
diff --git a/a/content_digest b/N1/content_digest
index f2aa1e8..b74a395 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -17,29 +17,16 @@
   "ref\0001491551101.4184.48.camel\@linux.vnet.ibm.com\0"
 ]
 [
-  "From\0Dave Young <dyoung\@redhat.com>\0"
+  "From\0dyoung\@redhat.com (Dave Young)\0"
 ]
 [
-  "Subject\0Re: [PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set\0"
+  "Subject\0[PATCH 09/24] kexec_file: Disable at runtime if securelevel has been set\0"
 ]
 [
   "Date\0Fri, 7 Apr 2017 16:01:44 +0800\0"
 ]
 [
-  "To\0Mimi Zohar <zohar\@linux.vnet.ibm.com>\0"
-]
-[
-  "Cc\0David Howells <dhowells\@redhat.com>",
-  " linux-kernel\@vger.kernel.org",
-  " Matthew Garrett <mjg59\@srcf.ucam.org>",
-  " linux-efi\@vger.kernel.org",
-  " gnomes\@lxorguk.ukuu.org.uk",
-  " Chun-Yi Lee <jlee\@suse.com>",
-  " gregkh\@linuxfoundation.org",
-  " kexec\@lists.infradead.org",
-  " linux-security-module\@vger.kernel.org",
-  " keyrings\@vger.kernel.org",
-  " matthew.garrett\@nebula.com\0"
+  "To\0linux-security-module\@vger.kernel.org\0"
 ]
 [
   "\0000:1\0"
@@ -68,7 +55,7 @@
   "> > > > > Cc: Matthew Garrett <mjg59\@srcf.ucam.org>\n",
   "> > > > > Signed-off-by: Chun-Yi Lee <jlee\@suse.com>\n",
   "> > > > > Signed-off-by: David Howells <dhowells\@redhat.com>\n",
-  "> > > > > cc: kexec\@lists.infradead.org\n",
+  "> > > > > cc: kexec at lists.infradead.org\n",
   "> > > > > ---\n",
   "> > > > > \n",
   "> > > > >  kernel/kexec_file.c |    6 ++++++\n",
@@ -91,7 +78,7 @@
   "> > > > >  \n",
   "> > > \n",
   "> > > IMA can be used to verify file signatures too, based on the LSM hooks\n",
-  "> > > in \302\240kernel_read_file_from_fd(). \302\240CONFIG_KEXEC_VERIFY_SIG should not be\n",
+  "> > > in ?kernel_read_file_from_fd(). ?CONFIG_KEXEC_VERIFY_SIG should not be\n",
   "> > > required.\n",
   "> > \n",
   "> > Mimi, I remember we talked somthing before about the two signature \n",
@@ -103,11 +90,11 @@
   "> Right, we discussed that the same method of measuring the kexec image\n",
   "> and initramfs, for extending trusted boot to the OS, could also be\n",
   "> used for verifying the kexec image and initramfs signatures, for\n",
-  "> extending secure boot to the OS. \302\240The file hash would be calculated\n",
+  "> extending secure boot to the OS. ?The file hash would be calculated\n",
   "> once for both.\n",
   "> \n",
   "> All of your concerns could be addressed with very minor changes to\n",
-  "> IMA. \302\240(Continued in response to David.)\n",
+  "> IMA. ?(Continued in response to David.)\n",
   "\n",
   "Thanks! As long as IMA can ensure not breaking the lockdown it should be\n",
   "fine to add an check for either !CONFIG_KEXEC_VERIFY_SIG or !IMA\n",
@@ -122,7 +109,7 @@
   "> > > > > \n",
   "> > > > > _______________________________________________\n",
   "> > > > > kexec mailing list\n",
-  "> > > > > kexec\@lists.infradead.org\n",
+  "> > > > > kexec at lists.infradead.org\n",
   "> > > > > http://lists.infradead.org/mailman/listinfo/kexec\n",
   "> > > > \n",
   "> > > > Acked-by: Dave Young <dyoung\@redhat.com>\n",
@@ -131,12 +118,16 @@
   "> > > > Dave\n",
   "> > > > --\n",
   "> > > > To unsubscribe from this list: send the line \"unsubscribe linux-security-module\" in\n",
-  "> > > > the body of a message to majordomo\@vger.kernel.org\n",
+  "> > > > the body of a message to majordomo at vger.kernel.org\n",
   "> > > > More majordomo info at  http://vger.kernel.org/majordomo-info.html\n",
   "> > > > \n",
   "> > > \n",
   "> > \n",
-  ">"
+  "> \n",
+  "--\n",
+  "To unsubscribe from this list: send the line \"unsubscribe linux-security-module\" in\n",
+  "the body of a message to majordomo at vger.kernel.org\n",
+  "More majordomo info at  http://vger.kernel.org/majordomo-info.html"
 ]
 
-819449ae9d23e3bd23a8732f6a6d9fffed97cf3f5db84d14b15ad82448bffd5a
+96dedf26c93ffa6f1bc745a3f4fcbf9ed93e96921eaec3fe8dedef9904fdb93d

diff --git a/a/1.txt b/N2/1.txt
index bb52c67..652edea 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -86,4 +86,9 @@ enforced.
 > > > > 
 > > > 
 > > 
->
\ No newline at end of file
+> 
+
+_______________________________________________
+kexec mailing list
+kexec@lists.infradead.org
+http://lists.infradead.org/mailman/listinfo/kexec
\ No newline at end of file
diff --git a/a/content_digest b/N2/content_digest
index f2aa1e8..8b5d1aa 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -29,14 +29,14 @@
   "To\0Mimi Zohar <zohar\@linux.vnet.ibm.com>\0"
 ]
 [
-  "Cc\0David Howells <dhowells\@redhat.com>",
-  " linux-kernel\@vger.kernel.org",
-  " Matthew Garrett <mjg59\@srcf.ucam.org>",
+  "Cc\0Matthew Garrett <mjg59\@srcf.ucam.org>",
   " linux-efi\@vger.kernel.org",
   " gnomes\@lxorguk.ukuu.org.uk",
   " Chun-Yi Lee <jlee\@suse.com>",
   " gregkh\@linuxfoundation.org",
   " kexec\@lists.infradead.org",
+  " linux-kernel\@vger.kernel.org",
+  " David Howells <dhowells\@redhat.com>",
   " linux-security-module\@vger.kernel.org",
   " keyrings\@vger.kernel.org",
   " matthew.garrett\@nebula.com\0"
@@ -136,7 +136,12 @@
   "> > > > \n",
   "> > > \n",
   "> > \n",
-  ">"
+  "> \n",
+  "\n",
+  "_______________________________________________\n",
+  "kexec mailing list\n",
+  "kexec\@lists.infradead.org\n",
+  "http://lists.infradead.org/mailman/listinfo/kexec"
 ]
 
-819449ae9d23e3bd23a8732f6a6d9fffed97cf3f5db84d14b15ad82448bffd5a
+49c15fe1cc8560e0c2b7ce0c73a2735d3f4b37fd4bce1204801e239fb84680e5

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.