diff for duplicates of <1538048015.3459.76.camel@linux.ibm.com> diff --git a/a/1.txt b/N1/1.txt index 01c245e..5cab056 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -64,9 +64,3 @@ Mimi > pr_err("impossible to appraise a module without a file descriptor. sig_enforce kernel parameter might help\n"); > return -EACCES; /* INTEGRITY_UNKNOWN */ > } - - -_______________________________________________ -kexec mailing list -kexec@lists.infradead.org -http://lists.infradead.org/mailman/listinfo/kexec diff --git a/a/content_digest b/N1/content_digest index 35badde..1432128 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -5,13 +5,13 @@ "Date\0Thu, 27 Sep 2018 07:33:35 -0400\0" "To\0Nayna Jain <nayna@linux.vnet.ibm.com>" " linux-integrity@vger.kernel.org\0" - "Cc\0linux-efi@vger.kernel.org" - kexec <kexec@lists.infradead.org> + "Cc\0linux-security-module@vger.kernel.org" + linux-efi@vger.kernel.org linux-kernel@vger.kernel.org dhowells@redhat.com + jforbes@redhat.com Seth Forshee <seth.forshee@canonical.com> - linux-security-module@vger.kernel.org - " jforbes@redhat.com\0" + " kexec <kexec@lists.infradead.org>\0" "\00:1\0" "b\0" "[Cc'ing the kexec mailing list, and Seth]\n" @@ -79,12 +79,6 @@ "> +\t\t\t\t && (ima_appraise & IMA_APPRAISE_MODULES))) {\n" "> \t\t\tpr_err(\"impossible to appraise a module without a file descriptor. sig_enforce kernel parameter might help\\n\");\n" "> \t\t\treturn -EACCES;\t/* INTEGRITY_UNKNOWN */\n" - "> \t\t}\n" - "\n" - "\n" - "_______________________________________________\n" - "kexec mailing list\n" - "kexec@lists.infradead.org\n" - http://lists.infradead.org/mailman/listinfo/kexec + "> \t\t}" -d60d54c070d6a7bfb539e61c38719d0b1ed1db1187efead972d69d45afdacb53 +a46363f60c8818595c35b67dd25284c125efd5cff5ea94f4e8a9e48c1790e3b5
diff --git a/a/1.txt b/N2/1.txt index 01c245e..5cab056 100644 --- a/a/1.txt +++ b/N2/1.txt @@ -64,9 +64,3 @@ Mimi > pr_err("impossible to appraise a module without a file descriptor. sig_enforce kernel parameter might help\n"); > return -EACCES; /* INTEGRITY_UNKNOWN */ > } - - -_______________________________________________ -kexec mailing list -kexec@lists.infradead.org -http://lists.infradead.org/mailman/listinfo/kexec diff --git a/a/content_digest b/N2/content_digest index 35badde..5c261fa 100644 --- a/a/content_digest +++ b/N2/content_digest @@ -1,17 +1,9 @@ "ref\020180926122210.14642-1-nayna@linux.vnet.ibm.com\0" "ref\020180926122210.14642-3-nayna@linux.vnet.ibm.com\0" - "From\0Mimi Zohar <zohar@linux.ibm.com>\0" - "Subject\0Re: [PATCH v4 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag\0" + "From\0zohar@linux.ibm.com (Mimi Zohar)\0" + "Subject\0[PATCH v4 2/6] ima: prevent kexec_load syscall based on runtime secureboot flag\0" "Date\0Thu, 27 Sep 2018 07:33:35 -0400\0" - "To\0Nayna Jain <nayna@linux.vnet.ibm.com>" - " linux-integrity@vger.kernel.org\0" - "Cc\0linux-efi@vger.kernel.org" - kexec <kexec@lists.infradead.org> - linux-kernel@vger.kernel.org - dhowells@redhat.com - Seth Forshee <seth.forshee@canonical.com> - linux-security-module@vger.kernel.org - " jforbes@redhat.com\0" + "To\0linux-security-module@vger.kernel.org\0" "\00:1\0" "b\0" "[Cc'ing the kexec mailing list, and Seth]\n" @@ -79,12 +71,6 @@ "> +\t\t\t\t && (ima_appraise & IMA_APPRAISE_MODULES))) {\n" "> \t\t\tpr_err(\"impossible to appraise a module without a file descriptor. sig_enforce kernel parameter might help\\n\");\n" "> \t\t\treturn -EACCES;\t/* INTEGRITY_UNKNOWN */\n" - "> \t\t}\n" - "\n" - "\n" - "_______________________________________________\n" - "kexec mailing list\n" - "kexec@lists.infradead.org\n" - http://lists.infradead.org/mailman/listinfo/kexec + "> \t\t}" -d60d54c070d6a7bfb539e61c38719d0b1ed1db1187efead972d69d45afdacb53 +045f2ebdc1d9cd6d94ea194bdf047794d1bf57d592e74b3181f9757ef00403da
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.