diff for duplicates of <CA+5PVA6HayQJEDFisvXYJKyoKDbJh53fWki=Arbn_9t=NppGrw@mail.gmail.com>
diff --git a/a/1.txt b/N1/1.txt
index e4c9cda..df9a2ee 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,10 +1,10 @@
-On Wed, Sep 4, 2013 at 4:09 PM, <jerry.hoemann@hp.com> wrote:
+On Wed, Sep 4, 2013 at 4:09 PM, <jerry.hoemann-VXdhtT5mjnY@public.gmane.org> wrote:
> On Tue, Sep 03, 2013 at 07:50:15PM -0400, Matthew Garrett wrote:
>> kexec permits the loading and execution of arbitrary code in ring 0, which
>> is something that module signing enforcement is meant to prevent. It makes
>> sense to disable kexec in this situation.
>>
->> Signed-off-by: Matthew Garrett <matthew.garrett@nebula.com>
+>> Signed-off-by: Matthew Garrett <matthew.garrett-05XSO3Yj/JvQT0dZR+AlfA@public.gmane.org>
>
>
> Matthew,
diff --git a/a/content_digest b/N1/content_digest
index 92de1e6..2cd80a9 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -8,7 +8,10 @@
"ref\00020130904200959.GE8540\@anatevka.fc.hp.com\0"
]
[
- "From\0Josh Boyer <jwboyer\@fedoraproject.org>\0"
+ "ref\00020130904200959.GE8540-dMAi7lA+vBPDUbYHzcRnttBPR1lH4CV8\@public.gmane.org\0"
+]
+[
+ "From\0Josh Boyer <jwboyer-rxtnV0ftBwyoClj4AeEUq9i2O/JbrIOy\@public.gmane.org>\0"
]
[
"Subject\0Re: [PATCH V3 08/11] kexec: Disable at runtime if the kernel enforces module loading restrictions\0"
@@ -17,16 +20,16 @@
"Date\0Wed, 4 Sep 2013 16:14:00 -0400\0"
]
[
- "To\0jerry.hoemann\@hp.com\0"
+ "To\0jerry.hoemann-VXdhtT5mjnY\@public.gmane.org\0"
]
[
- "Cc\0Matthew Garrett <matthew.garrett\@nebula.com>",
- " Linux-Kernel\@vger. Kernel. Org <linux-kernel\@vger.kernel.org>",
- " linux-efi\@vger.kernel.org <linux-efi\@vger.kernel.org>",
- " Kees Cook <keescook\@chromium.org>",
- " H. Peter Anvin <hpa\@zytor.com>",
- " kexec <kexec\@lists.infradead.org>",
- " Vivek Goyal <vgoyal\@redhat.com>\0"
+ "Cc\0Matthew Garrett <matthew.garrett-05XSO3Yj/JvQT0dZR+AlfA\@public.gmane.org>",
+ " Linux-Kernel\@vger. Kernel. Org <linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org>",
+ " linux-efi-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org <linux-efi-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org>",
+ " Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw\@public.gmane.org>",
+ " H. Peter Anvin <hpa-YMNOUZJC4hwAvxtiuMwx3w\@public.gmane.org>",
+ " kexec <kexec-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r\@public.gmane.org>",
+ " Vivek Goyal <vgoyal-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>\0"
]
[
"\0000:1\0"
@@ -35,13 +38,13 @@
"b\0"
]
[
- "On Wed, Sep 4, 2013 at 4:09 PM, <jerry.hoemann\@hp.com> wrote:\n",
+ "On Wed, Sep 4, 2013 at 4:09 PM, <jerry.hoemann-VXdhtT5mjnY\@public.gmane.org> wrote:\n",
"> On Tue, Sep 03, 2013 at 07:50:15PM -0400, Matthew Garrett wrote:\n",
">> kexec permits the loading and execution of arbitrary code in ring 0, which\n",
">> is something that module signing enforcement is meant to prevent. It makes\n",
">> sense to disable kexec in this situation.\n",
">>\n",
- ">> Signed-off-by: Matthew Garrett <matthew.garrett\@nebula.com>\n",
+ ">> Signed-off-by: Matthew Garrett <matthew.garrett-05XSO3Yj/JvQT0dZR+AlfA\@public.gmane.org>\n",
">\n",
">\n",
"> Matthew,\n",
@@ -61,4 +64,4 @@
"josh"
]
-e26f7b06b02bae5b99a91f822f9a4975fc60f0ecc50018cdf276d02cc85e0e93
+f720af736d94fee8c4039603862a363b46fe1f8a7d201b3b24f6d12b532622f8
diff --git a/a/1.txt b/N2/1.txt
index e4c9cda..fd8d0b9 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -21,4 +21,9 @@ I believe it should be posted somewhere relatively soon. We're also
planning on talking about it at the Secure Boot microconference at
Linux Plumbers in two weeks.
-josh
\ No newline at end of file
+josh
+
+_______________________________________________
+kexec mailing list
+kexec@lists.infradead.org
+http://lists.infradead.org/mailman/listinfo/kexec
\ No newline at end of file
diff --git a/a/content_digest b/N2/content_digest
index 92de1e6..4e3e623 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -21,11 +21,11 @@
]
[
"Cc\0Matthew Garrett <matthew.garrett\@nebula.com>",
- " Linux-Kernel\@vger. Kernel. Org <linux-kernel\@vger.kernel.org>",
" linux-efi\@vger.kernel.org <linux-efi\@vger.kernel.org>",
" Kees Cook <keescook\@chromium.org>",
- " H. Peter Anvin <hpa\@zytor.com>",
" kexec <kexec\@lists.infradead.org>",
+ " Linux-Kernel\@vger. Kernel. Org <linux-kernel\@vger.kernel.org>",
+ " H. Peter Anvin <hpa\@zytor.com>",
" Vivek Goyal <vgoyal\@redhat.com>\0"
]
[
@@ -58,7 +58,12 @@
"planning on talking about it at the Secure Boot microconference at\n",
"Linux Plumbers in two weeks.\n",
"\n",
- "josh"
+ "josh\n",
+ "\n",
+ "_______________________________________________\n",
+ "kexec mailing list\n",
+ "kexec\@lists.infradead.org\n",
+ "http://lists.infradead.org/mailman/listinfo/kexec"
]
-e26f7b06b02bae5b99a91f822f9a4975fc60f0ecc50018cdf276d02cc85e0e93
+696074ec70fd81c2383ae2218b267cec3c6a34f8720b4a335e064ce3d8a2eea8
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.