diff for duplicates of <1538054412.3459.105.camel@linux.ibm.com> diff --git a/a/1.txt b/N1/1.txt index 151cd2f..85dcea1 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -9,7 +9,7 @@ Eventually this patch might be needed if/when we need to differentiate between different secure boot modes. Only if CONFIG_IMA_APPRAISE_BOOTPARAM is enabled, can the IMA appraise -mode be modified on the boot command line. Instead of this patch, how +mode be modified on the boot command line. Instead of this patch, how about making the ability to change the IMA appraise mode also dependent on CONFIG_IMA_ARCH_POLICY not being enabled? diff --git a/a/content_digest b/N1/content_digest index 364556a..b6d8933 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -23,7 +23,7 @@ "between different secure boot modes.\n" "\n" "Only if CONFIG_IMA_APPRAISE_BOOTPARAM is enabled, can the IMA appraise\n" - "mode be modified on the boot command line. \302\240Instead of this patch, how\n" + "mode be modified on the boot command line. Instead of this patch, how\n" "about making the ability to change the IMA appraise mode also\n" "dependent on CONFIG_IMA_ARCH_POLICY not being enabled?\n" "\n" @@ -108,4 +108,4 @@ "> \t/*\n" "> \t * Insert the builtin \"secure_boot\" policy rules requiring file" -6e32b5881bd8f6a7bfcd0c4079317e3a351a3fae4d851589d1f5eb2fdecad586 +a6be26f139dd046b7fde9a23682ff2e4941f3b27aeddf7912b267bdd0f7eb0f9
diff --git a/a/1.txt b/N2/1.txt index 151cd2f..1dc7989 100644 --- a/a/1.txt +++ b/N2/1.txt @@ -9,7 +9,7 @@ Eventually this patch might be needed if/when we need to differentiate between different secure boot modes. Only if CONFIG_IMA_APPRAISE_BOOTPARAM is enabled, can the IMA appraise -mode be modified on the boot command line. Instead of this patch, how +mode be modified on the boot command line. ?Instead of this patch, how about making the ability to change the IMA appraise mode also dependent on CONFIG_IMA_ARCH_POLICY not being enabled? diff --git a/a/content_digest b/N2/content_digest index 364556a..bdfdf2c 100644 --- a/a/content_digest +++ b/N2/content_digest @@ -1,15 +1,9 @@ "ref\020180926122210.14642-1-nayna@linux.vnet.ibm.com\0" "ref\020180926122210.14642-6-nayna@linux.vnet.ibm.com\0" - "From\0Mimi Zohar <zohar@linux.ibm.com>\0" - "Subject\0Re: [PATCH v4 5/6] ima: add support for external setting of ima_appraise\0" + "From\0zohar@linux.ibm.com (Mimi Zohar)\0" + "Subject\0[PATCH v4 5/6] ima: add support for external setting of ima_appraise\0" "Date\0Thu, 27 Sep 2018 09:20:12 -0400\0" - "To\0Nayna Jain <nayna@linux.vnet.ibm.com>" - " linux-integrity@vger.kernel.org\0" - "Cc\0linux-security-module@vger.kernel.org" - linux-efi@vger.kernel.org - linux-kernel@vger.kernel.org - dhowells@redhat.com - " jforbes@redhat.com\0" + "To\0linux-security-module@vger.kernel.org\0" "\00:1\0" "b\0" "Hi Nayna,\n" @@ -23,7 +17,7 @@ "between different secure boot modes.\n" "\n" "Only if CONFIG_IMA_APPRAISE_BOOTPARAM is enabled, can the IMA appraise\n" - "mode be modified on the boot command line. \302\240Instead of this patch, how\n" + "mode be modified on the boot command line. ?Instead of this patch, how\n" "about making the ability to change the IMA appraise mode also\n" "dependent on CONFIG_IMA_ARCH_POLICY not being enabled?\n" "\n" @@ -108,4 +102,4 @@ "> \t/*\n" "> \t * Insert the builtin \"secure_boot\" policy rules requiring file" -6e32b5881bd8f6a7bfcd0c4079317e3a351a3fae4d851589d1f5eb2fdecad586 +fa27dd2ec7d0d69e5001af88cc5b102269c649464cd242c31e90990f2fc6141b
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.