All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <CA+5PVA6HayQJEDFisvXYJKyoKDbJh53fWki=Arbn_9t=NppGrw@mail.gmail.com>

diff --git a/a/1.txt b/N1/1.txt
index e4c9cda..df9a2ee 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,10 +1,10 @@
-On Wed, Sep 4, 2013 at 4:09 PM,  <jerry.hoemann@hp.com> wrote:
+On Wed, Sep 4, 2013 at 4:09 PM,  <jerry.hoemann-VXdhtT5mjnY@public.gmane.org> wrote:
 > On Tue, Sep 03, 2013 at 07:50:15PM -0400, Matthew Garrett wrote:
 >> kexec permits the loading and execution of arbitrary code in ring 0, which
 >> is something that module signing enforcement is meant to prevent. It makes
 >> sense to disable kexec in this situation.
 >>
->> Signed-off-by: Matthew Garrett <matthew.garrett@nebula.com>
+>> Signed-off-by: Matthew Garrett <matthew.garrett-05XSO3Yj/JvQT0dZR+AlfA@public.gmane.org>
 >
 >
 > Matthew,
diff --git a/a/content_digest b/N1/content_digest
index 92de1e6..2cd80a9 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -8,7 +8,10 @@
   "ref\00020130904200959.GE8540\@anatevka.fc.hp.com\0"
 ]
 [
-  "From\0Josh Boyer <jwboyer\@fedoraproject.org>\0"
+  "ref\00020130904200959.GE8540-dMAi7lA+vBPDUbYHzcRnttBPR1lH4CV8\@public.gmane.org\0"
+]
+[
+  "From\0Josh Boyer <jwboyer-rxtnV0ftBwyoClj4AeEUq9i2O/JbrIOy\@public.gmane.org>\0"
 ]
 [
   "Subject\0Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions\0"
@@ -17,16 +20,16 @@
   "Date\0Wed, 4 Sep 2013 16:14:00 -0400\0"
 ]
 [
-  "To\0jerry.hoemann\@hp.com\0"
+  "To\0jerry.hoemann-VXdhtT5mjnY\@public.gmane.org\0"
 ]
 [
-  "Cc\0Matthew Garrett <matthew.garrett\@nebula.com>",
-  " Linux-Kernel\@vger. Kernel. Org <linux-kernel\@vger.kernel.org>",
-  " linux-efi\@vger.kernel.org <linux-efi\@vger.kernel.org>",
-  " Kees Cook <keescook\@chromium.org>",
-  " H. Peter Anvin <hpa\@zytor.com>",
-  " kexec <kexec\@lists.infradead.org>",
-  " Vivek Goyal <vgoyal\@redhat.com>\0"
+  "Cc\0Matthew Garrett <matthew.garrett-05XSO3Yj/JvQT0dZR+AlfA\@public.gmane.org>",
+  " Linux-Kernel\@vger. Kernel. Org <linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org>",
+  " linux-efi-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org <linux-efi-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org>",
+  " Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw\@public.gmane.org>",
+  " H. Peter Anvin <hpa-YMNOUZJC4hwAvxtiuMwx3w\@public.gmane.org>",
+  " kexec <kexec-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r\@public.gmane.org>",
+  " Vivek Goyal <vgoyal-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>\0"
 ]
 [
   "\0000:1\0"
@@ -35,13 +38,13 @@
   "b\0"
 ]
 [
-  "On Wed, Sep 4, 2013 at 4:09 PM,  <jerry.hoemann\@hp.com> wrote:\n",
+  "On Wed, Sep 4, 2013 at 4:09 PM,  <jerry.hoemann-VXdhtT5mjnY\@public.gmane.org> wrote:\n",
   "> On Tue, Sep 03, 2013 at 07:50:15PM -0400, Matthew Garrett wrote:\n",
   ">> kexec permits the loading and execution of arbitrary code in ring 0, which\n",
   ">> is something that module signing enforcement is meant to prevent. It makes\n",
   ">> sense to disable kexec in this situation.\n",
   ">>\n",
-  ">> Signed-off-by: Matthew Garrett <matthew.garrett\@nebula.com>\n",
+  ">> Signed-off-by: Matthew Garrett <matthew.garrett-05XSO3Yj/JvQT0dZR+AlfA\@public.gmane.org>\n",
   ">\n",
   ">\n",
   "> Matthew,\n",
@@ -61,4 +64,4 @@
   "josh"
 ]
 
-e26f7b06b02bae5b99a91f822f9a4975fc60f0ecc50018cdf276d02cc85e0e93
+f720af736d94fee8c4039603862a363b46fe1f8a7d201b3b24f6d12b532622f8

diff --git a/a/1.txt b/N2/1.txt
index e4c9cda..fd8d0b9 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -21,4 +21,9 @@ I believe it should be posted somewhere relatively soon.  We're also
 planning on talking about it at the Secure Boot microconference at
 Linux Plumbers in two weeks.
 
-josh
\ No newline at end of file
+josh
+
+_______________________________________________
+kexec mailing list
+kexec@lists.infradead.org
+http://lists.infradead.org/mailman/listinfo/kexec
\ No newline at end of file
diff --git a/a/content_digest b/N2/content_digest
index 92de1e6..4e3e623 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -21,11 +21,11 @@
 ]
 [
   "Cc\0Matthew Garrett <matthew.garrett\@nebula.com>",
-  " Linux-Kernel\@vger. Kernel. Org <linux-kernel\@vger.kernel.org>",
   " linux-efi\@vger.kernel.org <linux-efi\@vger.kernel.org>",
   " Kees Cook <keescook\@chromium.org>",
-  " H. Peter Anvin <hpa\@zytor.com>",
   " kexec <kexec\@lists.infradead.org>",
+  " Linux-Kernel\@vger. Kernel. Org <linux-kernel\@vger.kernel.org>",
+  " H. Peter Anvin <hpa\@zytor.com>",
   " Vivek Goyal <vgoyal\@redhat.com>\0"
 ]
 [
@@ -58,7 +58,12 @@
   "planning on talking about it at the Secure Boot microconference at\n",
   "Linux Plumbers in two weeks.\n",
   "\n",
-  "josh"
+  "josh\n",
+  "\n",
+  "_______________________________________________\n",
+  "kexec mailing list\n",
+  "kexec\@lists.infradead.org\n",
+  "http://lists.infradead.org/mailman/listinfo/kexec"
 ]
 
-e26f7b06b02bae5b99a91f822f9a4975fc60f0ecc50018cdf276d02cc85e0e93
+696074ec70fd81c2383ae2218b267cec3c6a34f8720b4a335e064ce3d8a2eea8

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.