All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <1351143839.18115.57.camel@falcor>

diff --git a/a/1.txt b/N1/1.txt
index 4b0b3e6..8b72463 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -56,7 +56,7 @@ thanks!
 > > > the kernel to verify that the kernel it's about to boot is signed and 
 > > > for it not to take any untrusted executable code from userspace.
 
-From an IMA, as opposed to an IMA-appraisal, perspective, kexec is
+>From an IMA, as opposed to an IMA-appraisal, perspective, kexec is
 problematic.  IMA maintains a measurement list and extends a PCR with
 the file hash.  The measurement list and PCR value are used to attest to
 the integrity of the running system.  As the original measurement list
@@ -92,9 +92,3 @@ in addition, if not in lieu of a signature.
 thanks,
 
 Mimi
-
-
-_______________________________________________
-kexec mailing list
-kexec@lists.infradead.org
-http://lists.infradead.org/mailman/listinfo/kexec
diff --git a/a/content_digest b/N1/content_digest
index dbee7af..0592f29 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -13,17 +13,17 @@
  "Subject\0Re: [RFC] Kdump with signed images\0"
  "Date\0Thu, 25 Oct 2012 01:43:59 -0400\0"
  "To\0Vivek Goyal <vgoyal@redhat.com>\0"
- "Cc\0Kasatkin"
-  Dmitry <dmitry.kasatkin@intel.com>
-  Kees Cook <keescook@chromium.org>
+ "Cc\0Eric W. Biederman <ebiederm@xmission.com>"
+  Matthew Garrett <mjg@redhat.com>
+  Khalid Aziz <khalid@gonehiking.org>
   kexec@lists.infradead.org
-  linux kernel mailing list <linux-kernel@vger.kernel.org>
   horms@verge.net.au
-  Eric W. Biederman <ebiederm@xmission.com>
-  H. Peter Anvin <hpa@zytor.com>
-  Matthew Garrett <mjg@redhat.com>
   Dave Young <dyoung@redhat.com>
- " Khalid Aziz <khalid@gonehiking.org>\0"
+  H. Peter Anvin <hpa@zytor.com>
+  linux kernel mailing list <linux-kernel@vger.kernel.org>
+  Kasatkin
+  Dmitry <dmitry.kasatkin@intel.com>
+ " Kees Cook <keescook@chromium.org>\0"
  "\00:1\0"
  "b\0"
  "On Wed, 2012-10-24 at 13:19 -0400, Vivek Goyal wrote:\n"
@@ -84,7 +84,7 @@
  "> > > the kernel to verify that the kernel it's about to boot is signed and \n"
  "> > > for it not to take any untrusted executable code from userspace.\n"
  "\n"
- "From an IMA, as opposed to an IMA-appraisal, perspective, kexec is\n"
+ ">From an IMA, as opposed to an IMA-appraisal, perspective, kexec is\n"
  "problematic.  IMA maintains a measurement list and extends a PCR with\n"
  "the file hash.  The measurement list and PCR value are used to attest to\n"
  "the integrity of the running system.  As the original measurement list\n"
@@ -119,12 +119,6 @@
  "\n"
  "thanks,\n"
  "\n"
- "Mimi\n"
- "\n"
- "\n"
- "_______________________________________________\n"
- "kexec mailing list\n"
- "kexec@lists.infradead.org\n"
- http://lists.infradead.org/mailman/listinfo/kexec
+ Mimi
 
-2e0f19fa68be29392b87990049bf559a7568add7fe9cd84e28dfdb26e868986a
+42b9d413e0912fc10b5595020b8167edef82f3dbb546c171b37ce35349ff6aa0

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.