diff for duplicates of <20170705171857.GA5246@lst.de> diff --git a/a/1.txt b/N1/1.txt index bdb7ea7..b05c1c8 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -11,7 +11,7 @@ On Wed, Jul 05, 2017 at 06:02:15PM +0100, Matthew Garrett wrote: > > > > Right, pseudo filesystems are using ->read. The existing builtin > > measurement policies exclude a number of pseudo filesystems, but not -> > efivarfs. ?Unfortunately, we do not know what type of custom policies +> > efivarfs. �Unfortunately, we do not know what type of custom policies > > are currently being used. > > efi variables contain information that may influence userspace behaviour @@ -19,7 +19,3 @@ On Wed, Jul 05, 2017 at 06:02:15PM +0100, Matthew Garrett wrote: > argument that they should be measured. Then efivars should grow a ->integrity_read method. --- -To unsubscribe from this list: send the line "unsubscribe linux-security-module" in -the body of a message to majordomo at vger.kernel.org -More majordomo info at http://vger.kernel.org/majordomo-info.html diff --git a/a/content_digest b/N1/content_digest index ce6c9ea..1660e44 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -3,10 +3,18 @@ "ref\020170628144111.GI2359@lst.de\0" "ref\01499266209.3059.91.camel@linux.vnet.ibm.com\0" "ref\020170705170215.GA14148@srcf.ucam.org\0" - "From\0hch@lst.de (Christoph Hellwig)\0" - "Subject\0[PATCH v2 10/10] ima: use existing read file operation method to calculate file hash\0" + "From\0Christoph Hellwig <hch@lst.de>\0" + "Subject\0Re: [PATCH v2 10/10] ima: use existing read file operation method to calculate file hash\0" "Date\0Wed, 5 Jul 2017 19:18:57 +0200\0" - "To\0linux-security-module@vger.kernel.org\0" + "To\0Matthew Garrett <mjg59@srcf.ucam.org>\0" + "Cc\0Mimi Zohar <zohar@linux.vnet.ibm.com>" + Christoph Hellwig <hch@lst.de> + Al Viro <viro@zeniv.linux.org.uk> + James Morris <jmorris@namei.org> + linux-fsdevel@vger.kernel.org + linux-ima-devel@lists.sourceforge.net + linux-security-module@vger.kernel.org + " linux-ima-user <linux-ima-user@lists.sourceforge.net>\0" "\00:1\0" "b\0" "On Wed, Jul 05, 2017 at 06:02:15PM +0100, Matthew Garrett wrote:\n" @@ -22,17 +30,13 @@ "> > \n" "> > Right, pseudo filesystems are using ->read. The existing builtin\n" "> > measurement policies exclude a number of pseudo filesystems, but not\n" - "> > efivarfs. ?Unfortunately, we do not know what type of custom policies\n" + "> > efivarfs. \303\257\302\277\302\275Unfortunately, we do not know what type of custom policies\n" "> > are currently being used.\n" "> \n" "> efi variables contain information that may influence userspace behaviour \n" "> and can also be modified out of band, so I think there's a reasonable \n" "> argument that they should be measured.\n" "\n" - "Then efivars should grow a ->integrity_read method.\n" - "--\n" - "To unsubscribe from this list: send the line \"unsubscribe linux-security-module\" in\n" - "the body of a message to majordomo at vger.kernel.org\n" - More majordomo info at http://vger.kernel.org/majordomo-info.html + Then efivars should grow a ->integrity_read method. -2c1e892f5a36fc78416353473cc0cca20295074e72528fc4d10a55b975aff0e0 +8bef4165c3d05e8bfdfc1b1b5c127519b05650bcfbdbef37cd0a13c093060edf
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.