All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20190404003249.14356-6-matthewgarrett@google.com>

diff --git a/a/1.txt b/N1/1.txt
index cecd9e0..c1ce4d9 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,4 +1,4 @@
-From: Dave Young <dyoung@redhat.com>
+From: Dave Young <dyoung-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
 
 Kexec reboot in case secure boot being enabled does not keep the secure
 boot mode in new kernel, so later one can load unsigned kernel via legacy
@@ -11,10 +11,10 @@ kernel.
 secure_boot flag in boot_params is set in EFI stub, but kexec bypasses the
 stub.  Fixing this issue by copying secure_boot flag across kexec reboot.
 
-Signed-off-by: Dave Young <dyoung@redhat.com>
-Signed-off-by: David Howells <dhowells@redhat.com>
-Signed-off-by: Matthew Garrett <mjg59@google.com>
-cc: kexec@lists.infradead.org
+Signed-off-by: Dave Young <dyoung-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
+Signed-off-by: David Howells <dhowells-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
+Signed-off-by: Matthew Garrett <mjg59-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org>
+cc: kexec-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org
 ---
  arch/x86/kernel/kexec-bzimage64.c | 1 +
  1 file changed, 1 insertion(+)
diff --git a/a/content_digest b/N1/content_digest
index 285e2b8..8ad19b4 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -2,7 +2,10 @@
   "ref\00020190404003249.14356-1-matthewgarrett\@google.com\0"
 ]
 [
-  "From\0Matthew Garrett <matthewgarrett\@google.com>\0"
+  "ref\00020190404003249.14356-1-matthewgarrett-hpIqsD4AKlfQT0dZR+AlfA\@public.gmane.org\0"
+]
+[
+  "From\0Matthew Garrett <matthewgarrett-hpIqsD4AKlfQT0dZR+AlfA\@public.gmane.org>\0"
 ]
 [
   "Subject\0[PATCH V32 05/27] Copy secure_boot flag in boot params across kexec reboot\0"
@@ -11,17 +14,17 @@
   "Date\0Wed,  3 Apr 2019 17:32:27 -0700\0"
 ]
 [
-  "To\0jmorris\@namei.org\0"
+  "To\0jmorris-gx6/JNMH7DfYtjvyW6yDsg\@public.gmane.org\0"
 ]
 [
-  "Cc\0linux-security-module\@vger.kernel.org",
-  " linux-kernel\@vger.kernel.org",
-  " dhowells\@redhat.com",
-  " linux-api\@vger.kernel.org",
-  " luto\@kernel.org",
-  " Dave Young <dyoung\@redhat.com>",
-  " Matthew Garrett <mjg59\@google.com>",
-  " kexec\@lists.infradead.org\0"
+  "Cc\0linux-api-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+  " kexec-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r\@public.gmane.org",
+  " linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+  " Matthew Garrett <mjg59-hpIqsD4AKlfQT0dZR+AlfA\@public.gmane.org>",
+  " dhowells-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org",
+  " linux-security-module-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+  " luto-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org",
+  " Dave Young <dyoung-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>\0"
 ]
 [
   "\0000:1\0"
@@ -30,7 +33,7 @@
   "b\0"
 ]
 [
-  "From: Dave Young <dyoung\@redhat.com>\n",
+  "From: Dave Young <dyoung-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>\n",
   "\n",
   "Kexec reboot in case secure boot being enabled does not keep the secure\n",
   "boot mode in new kernel, so later one can load unsigned kernel via legacy\n",
@@ -43,10 +46,10 @@
   "secure_boot flag in boot_params is set in EFI stub, but kexec bypasses the\n",
   "stub.  Fixing this issue by copying secure_boot flag across kexec reboot.\n",
   "\n",
-  "Signed-off-by: Dave Young <dyoung\@redhat.com>\n",
-  "Signed-off-by: David Howells <dhowells\@redhat.com>\n",
-  "Signed-off-by: Matthew Garrett <mjg59\@google.com>\n",
-  "cc: kexec\@lists.infradead.org\n",
+  "Signed-off-by: Dave Young <dyoung-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>\n",
+  "Signed-off-by: David Howells <dhowells-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>\n",
+  "Signed-off-by: Matthew Garrett <mjg59-hpIqsD4AKlfQT0dZR+AlfA\@public.gmane.org>\n",
+  "cc: kexec-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r\@public.gmane.org\n",
   "---\n",
   " arch/x86/kernel/kexec-bzimage64.c | 1 +\n",
   " 1 file changed, 1 insertion(+)\n",
@@ -67,4 +70,4 @@
   "2.21.0.392.gf8f6787159e-goog"
 ]
 
-6a6adc3b2f3c1d1ae1cef86e6cfa5fdbfc200026712793a421eee2ab280261ba
+5de6a74adb27b8a8f6e171e2ddf2aed03246a7149d7a9fa65a066439e9ebc0ee

diff --git a/a/1.txt b/N2/1.txt
index cecd9e0..441a2e9 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -32,4 +32,10 @@ index 278cd07228dd..d49554b948fd 100644
  	ei->efi_systab = current_ei->efi_systab;
  	ei->efi_systab_hi = current_ei->efi_systab_hi;
 -- 
-2.21.0.392.gf8f6787159e-goog
\ No newline at end of file
+2.21.0.392.gf8f6787159e-goog
+
+
+_______________________________________________
+kexec mailing list
+kexec@lists.infradead.org
+http://lists.infradead.org/mailman/listinfo/kexec
\ No newline at end of file
diff --git a/a/content_digest b/N2/content_digest
index 285e2b8..04a3b51 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -14,14 +14,14 @@
   "To\0jmorris\@namei.org\0"
 ]
 [
-  "Cc\0linux-security-module\@vger.kernel.org",
+  "Cc\0linux-api\@vger.kernel.org",
+  " kexec\@lists.infradead.org",
   " linux-kernel\@vger.kernel.org",
+  " Matthew Garrett <mjg59\@google.com>",
   " dhowells\@redhat.com",
-  " linux-api\@vger.kernel.org",
+  " linux-security-module\@vger.kernel.org",
   " luto\@kernel.org",
-  " Dave Young <dyoung\@redhat.com>",
-  " Matthew Garrett <mjg59\@google.com>",
-  " kexec\@lists.infradead.org\0"
+  " Dave Young <dyoung\@redhat.com>\0"
 ]
 [
   "\0000:1\0"
@@ -64,7 +64,13 @@
   " \tei->efi_systab = current_ei->efi_systab;\n",
   " \tei->efi_systab_hi = current_ei->efi_systab_hi;\n",
   "-- \n",
-  "2.21.0.392.gf8f6787159e-goog"
+  "2.21.0.392.gf8f6787159e-goog\n",
+  "\n",
+  "\n",
+  "_______________________________________________\n",
+  "kexec mailing list\n",
+  "kexec\@lists.infradead.org\n",
+  "http://lists.infradead.org/mailman/listinfo/kexec"
 ]
 
-6a6adc3b2f3c1d1ae1cef86e6cfa5fdbfc200026712793a421eee2ab280261ba
+7deebfa97617adcfca1930673a2d373fdbbe7012fb5b4e67a8fdbb6b446caa13

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.