diff for duplicates of <20190404003249.14356-6-matthewgarrett@google.com>
diff --git a/a/1.txt b/N1/1.txt
index cecd9e0..c1ce4d9 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,4 +1,4 @@
-From: Dave Young <dyoung@redhat.com>
+From: Dave Young <dyoung-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
Kexec reboot in case secure boot being enabled does not keep the secure
boot mode in new kernel, so later one can load unsigned kernel via legacy
@@ -11,10 +11,10 @@ kernel.
secure_boot flag in boot_params is set in EFI stub, but kexec bypasses the
stub. Fixing this issue by copying secure_boot flag across kexec reboot.
-Signed-off-by: Dave Young <dyoung@redhat.com>
-Signed-off-by: David Howells <dhowells@redhat.com>
-Signed-off-by: Matthew Garrett <mjg59@google.com>
-cc: kexec@lists.infradead.org
+Signed-off-by: Dave Young <dyoung-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
+Signed-off-by: David Howells <dhowells-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
+Signed-off-by: Matthew Garrett <mjg59-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org>
+cc: kexec-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org
---
arch/x86/kernel/kexec-bzimage64.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/a/content_digest b/N1/content_digest
index 285e2b8..8ad19b4 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -2,7 +2,10 @@
"ref\00020190404003249.14356-1-matthewgarrett\@google.com\0"
]
[
- "From\0Matthew Garrett <matthewgarrett\@google.com>\0"
+ "ref\00020190404003249.14356-1-matthewgarrett-hpIqsD4AKlfQT0dZR+AlfA\@public.gmane.org\0"
+]
+[
+ "From\0Matthew Garrett <matthewgarrett-hpIqsD4AKlfQT0dZR+AlfA\@public.gmane.org>\0"
]
[
"Subject\0[PATCH V32 05/27] Copy secure_boot flag in boot params across kexec reboot\0"
@@ -11,17 +14,17 @@
"Date\0Wed, 3 Apr 2019 17:32:27 -0700\0"
]
[
- "To\0jmorris\@namei.org\0"
+ "To\0jmorris-gx6/JNMH7DfYtjvyW6yDsg\@public.gmane.org\0"
]
[
- "Cc\0linux-security-module\@vger.kernel.org",
- " linux-kernel\@vger.kernel.org",
- " dhowells\@redhat.com",
- " linux-api\@vger.kernel.org",
- " luto\@kernel.org",
- " Dave Young <dyoung\@redhat.com>",
- " Matthew Garrett <mjg59\@google.com>",
- " kexec\@lists.infradead.org\0"
+ "Cc\0linux-api-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " kexec-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r\@public.gmane.org",
+ " linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " Matthew Garrett <mjg59-hpIqsD4AKlfQT0dZR+AlfA\@public.gmane.org>",
+ " dhowells-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org",
+ " linux-security-module-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " luto-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org",
+ " Dave Young <dyoung-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>\0"
]
[
"\0000:1\0"
@@ -30,7 +33,7 @@
"b\0"
]
[
- "From: Dave Young <dyoung\@redhat.com>\n",
+ "From: Dave Young <dyoung-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>\n",
"\n",
"Kexec reboot in case secure boot being enabled does not keep the secure\n",
"boot mode in new kernel, so later one can load unsigned kernel via legacy\n",
@@ -43,10 +46,10 @@
"secure_boot flag in boot_params is set in EFI stub, but kexec bypasses the\n",
"stub. Fixing this issue by copying secure_boot flag across kexec reboot.\n",
"\n",
- "Signed-off-by: Dave Young <dyoung\@redhat.com>\n",
- "Signed-off-by: David Howells <dhowells\@redhat.com>\n",
- "Signed-off-by: Matthew Garrett <mjg59\@google.com>\n",
- "cc: kexec\@lists.infradead.org\n",
+ "Signed-off-by: Dave Young <dyoung-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>\n",
+ "Signed-off-by: David Howells <dhowells-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>\n",
+ "Signed-off-by: Matthew Garrett <mjg59-hpIqsD4AKlfQT0dZR+AlfA\@public.gmane.org>\n",
+ "cc: kexec-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r\@public.gmane.org\n",
"---\n",
" arch/x86/kernel/kexec-bzimage64.c | 1 +\n",
" 1 file changed, 1 insertion(+)\n",
@@ -67,4 +70,4 @@
"2.21.0.392.gf8f6787159e-goog"
]
-6a6adc3b2f3c1d1ae1cef86e6cfa5fdbfc200026712793a421eee2ab280261ba
+5de6a74adb27b8a8f6e171e2ddf2aed03246a7149d7a9fa65a066439e9ebc0ee
diff --git a/a/1.txt b/N2/1.txt
index cecd9e0..441a2e9 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -32,4 +32,10 @@ index 278cd07228dd..d49554b948fd 100644
ei->efi_systab = current_ei->efi_systab;
ei->efi_systab_hi = current_ei->efi_systab_hi;
--
-2.21.0.392.gf8f6787159e-goog
\ No newline at end of file
+2.21.0.392.gf8f6787159e-goog
+
+
+_______________________________________________
+kexec mailing list
+kexec@lists.infradead.org
+http://lists.infradead.org/mailman/listinfo/kexec
\ No newline at end of file
diff --git a/a/content_digest b/N2/content_digest
index 285e2b8..04a3b51 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -14,14 +14,14 @@
"To\0jmorris\@namei.org\0"
]
[
- "Cc\0linux-security-module\@vger.kernel.org",
+ "Cc\0linux-api\@vger.kernel.org",
+ " kexec\@lists.infradead.org",
" linux-kernel\@vger.kernel.org",
+ " Matthew Garrett <mjg59\@google.com>",
" dhowells\@redhat.com",
- " linux-api\@vger.kernel.org",
+ " linux-security-module\@vger.kernel.org",
" luto\@kernel.org",
- " Dave Young <dyoung\@redhat.com>",
- " Matthew Garrett <mjg59\@google.com>",
- " kexec\@lists.infradead.org\0"
+ " Dave Young <dyoung\@redhat.com>\0"
]
[
"\0000:1\0"
@@ -64,7 +64,13 @@
" \tei->efi_systab = current_ei->efi_systab;\n",
" \tei->efi_systab_hi = current_ei->efi_systab_hi;\n",
"-- \n",
- "2.21.0.392.gf8f6787159e-goog"
+ "2.21.0.392.gf8f6787159e-goog\n",
+ "\n",
+ "\n",
+ "_______________________________________________\n",
+ "kexec mailing list\n",
+ "kexec\@lists.infradead.org\n",
+ "http://lists.infradead.org/mailman/listinfo/kexec"
]
-6a6adc3b2f3c1d1ae1cef86e6cfa5fdbfc200026712793a421eee2ab280261ba
+7deebfa97617adcfca1930673a2d373fdbbe7012fb5b4e67a8fdbb6b446caa13
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.