All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <1449000658-11475-1-git-send-email-dcashman@android.com>

diff --git a/a/1.txt b/N1/1.txt
index 5724a51..8bf02d7 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -39,3 +39,9 @@ dcashman (4):
 
 -- 
 2.6.0.rc2.230.g3dd15c0
+
+--
+To unsubscribe, send a message with 'unsubscribe linux-mm' in
+the body to majordomo@kvack.org.  For more info on Linux MM,
+see: http://www.linux-mm.org/ .
+Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
diff --git a/a/content_digest b/N1/content_digest
index 08ad6ef..c0ccf0c 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,7 +1,37 @@
- "From\0dcashman@android.com (Daniel Cashman)\0"
+ "From\0Daniel Cashman <dcashman@android.com>\0"
  "Subject\0[PATCH v5 0/4] Allow customizable random offset to mmap_base address.\0"
  "Date\0Tue,  1 Dec 2015 12:10:54 -0800\0"
- "To\0linux-arm-kernel@lists.infradead.org\0"
+ "To\0linux-kernel@vger.kernel.org\0"
+ "Cc\0linux@arm.linux.org.uk"
+  akpm@linux-foundation.org
+  keescook@chromium.org
+  mingo@kernel.org
+  linux-arm-kernel@lists.infradead.org
+  corbet@lwn.net
+  dzickus@redhat.com
+  ebiederm@xmission.com
+  xypron.glpk@gmx.de
+  jpoimboe@redhat.com
+  kirill.shutemov@linux.intel.com
+  n-horiguchi@ah.jp.nec.com
+  aarcange@redhat.com
+  mgorman@suse.de
+  tglx@linutronix.de
+  rientjes@google.com
+  linux-mm@kvack.org
+  linux-doc@vger.kernel.org
+  salyzyn@android.com
+  jeffv@google.com
+  nnk@google.com
+  catalin.marinas@arm.com
+  will.deacon@arm.com
+  hpa@zytor.com
+  x86@kernel.org
+  hecmargi@upv.es
+  bp@suse.de
+  dcashman@google.com
+  arnd@arndb.de
+ " Daniel Cashman <dcashman@android.com>\0"
  "\00:1\0"
  "b\0"
  "Address Space Layout Randomization (ASLR) provides a barrier to exploitation of user-space processes in the presence of security vulnerabilities by making it more difficult to find desired code/data which could help an attack. This is done by adding a random offset to the location of regions in the process address space, with a greater range of potential offset values corresponding to better protection/a larger search-space for brute force, but also to greater potential for fragmentation.\n"
@@ -44,6 +74,12 @@
  " 11 files changed, 211 insertions(+), 10 deletions(-)\n"
  "\n"
  "-- \n"
- 2.6.0.rc2.230.g3dd15c0
+ "2.6.0.rc2.230.g3dd15c0\n"
+ "\n"
+ "--\n"
+ "To unsubscribe, send a message with 'unsubscribe linux-mm' in\n"
+ "the body to majordomo@kvack.org.  For more info on Linux MM,\n"
+ "see: http://www.linux-mm.org/ .\n"
+ "Don't email: <a href=mailto:\"dont@kvack.org\"> email@kvack.org </a>"
 
-885afdc59a461462c4229109910ad03c8cf31e844f03459fb12ad01e8001b67b
+fad7b72172ff8d2d9bc2277b2df1abf6ee1884b29d8b56b23e9434d3d687cdb6

diff --git a/a/content_digest b/N2/content_digest
index 08ad6ef..02b0db8 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -1,7 +1,37 @@
- "From\0dcashman@android.com (Daniel Cashman)\0"
+ "From\0Daniel Cashman <dcashman@android.com>\0"
  "Subject\0[PATCH v5 0/4] Allow customizable random offset to mmap_base address.\0"
  "Date\0Tue,  1 Dec 2015 12:10:54 -0800\0"
- "To\0linux-arm-kernel@lists.infradead.org\0"
+ "To\0linux-kernel@vger.kernel.org\0"
+ "Cc\0linux@arm.linux.org.uk"
+  akpm@linux-foundation.org
+  keescook@chromium.org
+  mingo@kernel.org
+  linux-arm-kernel@lists.infradead.org
+  corbet@lwn.net
+  dzickus@redhat.com
+  ebiederm@xmission.com
+  xypron.glpk@gmx.de
+  jpoimboe@redhat.com
+  kirill.shutemov@linux.intel.com
+  n-horiguchi@ah.jp.nec.com
+  aarcange@redhat.com
+  mgorman@suse.de
+  tglx@linutronix.de
+  rientjes@google.com
+  linux-mm@kvack.org
+  linux-doc@vger.kernel.org
+  salyzyn@android.com
+  jeffv@google.com
+  nnk@google.com
+  catalin.marinas@arm.com
+  will.deacon@arm.com
+  hpa@zytor.com
+  x86@kernel.org
+  hecmargi@upv.es
+  bp@suse.de
+  dcashman@google.com
+  arnd@arndb.de
+ " Daniel Cashman <dcashman@android.com>\0"
  "\00:1\0"
  "b\0"
  "Address Space Layout Randomization (ASLR) provides a barrier to exploitation of user-space processes in the presence of security vulnerabilities by making it more difficult to find desired code/data which could help an attack. This is done by adding a random offset to the location of regions in the process address space, with a greater range of potential offset values corresponding to better protection/a larger search-space for brute force, but also to greater potential for fragmentation.\n"
@@ -46,4 +76,4 @@
  "-- \n"
  2.6.0.rc2.230.g3dd15c0
 
-885afdc59a461462c4229109910ad03c8cf31e844f03459fb12ad01e8001b67b
+8bc1def020dee854af92497b07b349c9c8f6bfaa282fba63cfc724ad43d50bb9

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.