All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20170705171857.GA5246@lst.de>

diff --git a/a/1.txt b/N1/1.txt
index bdb7ea7..b05c1c8 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -11,7 +11,7 @@ On Wed, Jul 05, 2017 at 06:02:15PM +0100, Matthew Garrett wrote:
 > > 
 > > Right, pseudo filesystems are using ->read. The existing builtin
 > > measurement policies exclude a number of pseudo filesystems, but not
-> > efivarfs. ?Unfortunately, we do not know what type of custom policies
+> > efivarfs. �Unfortunately, we do not know what type of custom policies
 > > are currently being used.
 > 
 > efi variables contain information that may influence userspace behaviour 
@@ -19,7 +19,3 @@ On Wed, Jul 05, 2017 at 06:02:15PM +0100, Matthew Garrett wrote:
 > argument that they should be measured.
 
 Then efivars should grow a ->integrity_read method.
---
-To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
-the body of a message to majordomo at vger.kernel.org
-More majordomo info at  http://vger.kernel.org/majordomo-info.html
diff --git a/a/content_digest b/N1/content_digest
index ce6c9ea..1660e44 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -3,10 +3,18 @@
  "ref\020170628144111.GI2359@lst.de\0"
  "ref\01499266209.3059.91.camel@linux.vnet.ibm.com\0"
  "ref\020170705170215.GA14148@srcf.ucam.org\0"
- "From\0hch@lst.de (Christoph Hellwig)\0"
- "Subject\0[PATCH v2 10/10] ima: use existing read file operation method to calculate file hash\0"
+ "From\0Christoph Hellwig <hch@lst.de>\0"
+ "Subject\0Re: [PATCH v2 10/10] ima: use existing read file operation method to calculate file hash\0"
  "Date\0Wed, 5 Jul 2017 19:18:57 +0200\0"
- "To\0linux-security-module@vger.kernel.org\0"
+ "To\0Matthew Garrett <mjg59@srcf.ucam.org>\0"
+ "Cc\0Mimi Zohar <zohar@linux.vnet.ibm.com>"
+  Christoph Hellwig <hch@lst.de>
+  Al Viro <viro@zeniv.linux.org.uk>
+  James Morris <jmorris@namei.org>
+  linux-fsdevel@vger.kernel.org
+  linux-ima-devel@lists.sourceforge.net
+  linux-security-module@vger.kernel.org
+ " linux-ima-user <linux-ima-user@lists.sourceforge.net>\0"
  "\00:1\0"
  "b\0"
  "On Wed, Jul 05, 2017 at 06:02:15PM +0100, Matthew Garrett wrote:\n"
@@ -22,17 +30,13 @@
  "> > \n"
  "> > Right, pseudo filesystems are using ->read. The existing builtin\n"
  "> > measurement policies exclude a number of pseudo filesystems, but not\n"
- "> > efivarfs. ?Unfortunately, we do not know what type of custom policies\n"
+ "> > efivarfs. \303\257\302\277\302\275Unfortunately, we do not know what type of custom policies\n"
  "> > are currently being used.\n"
  "> \n"
  "> efi variables contain information that may influence userspace behaviour \n"
  "> and can also be modified out of band, so I think there's a reasonable \n"
  "> argument that they should be measured.\n"
  "\n"
- "Then efivars should grow a ->integrity_read method.\n"
- "--\n"
- "To unsubscribe from this list: send the line \"unsubscribe linux-security-module\" in\n"
- "the body of a message to majordomo at vger.kernel.org\n"
- More majordomo info at  http://vger.kernel.org/majordomo-info.html
+ Then efivars should grow a ->integrity_read method.
 
-2c1e892f5a36fc78416353473cc0cca20295074e72528fc4d10a55b975aff0e0
+8bef4165c3d05e8bfdfc1b1b5c127519b05650bcfbdbef37cd0a13c093060edf

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.