diff for duplicates of <1449000658-11475-1-git-send-email-dcashman@android.com> diff --git a/a/1.txt b/N1/1.txt index 5724a51..8bf02d7 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -39,3 +39,9 @@ dcashman (4): -- 2.6.0.rc2.230.g3dd15c0 + +-- +To unsubscribe, send a message with 'unsubscribe linux-mm' in +the body to majordomo@kvack.org. For more info on Linux MM, +see: http://www.linux-mm.org/ . +Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a> diff --git a/a/content_digest b/N1/content_digest index 08ad6ef..c0ccf0c 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -1,7 +1,37 @@ - "From\0dcashman@android.com (Daniel Cashman)\0" + "From\0Daniel Cashman <dcashman@android.com>\0" "Subject\0[PATCH v5 0/4] Allow customizable random offset to mmap_base address.\0" "Date\0Tue, 1 Dec 2015 12:10:54 -0800\0" - "To\0linux-arm-kernel@lists.infradead.org\0" + "To\0linux-kernel@vger.kernel.org\0" + "Cc\0linux@arm.linux.org.uk" + akpm@linux-foundation.org + keescook@chromium.org + mingo@kernel.org + linux-arm-kernel@lists.infradead.org + corbet@lwn.net + dzickus@redhat.com + ebiederm@xmission.com + xypron.glpk@gmx.de + jpoimboe@redhat.com + kirill.shutemov@linux.intel.com + n-horiguchi@ah.jp.nec.com + aarcange@redhat.com + mgorman@suse.de + tglx@linutronix.de + rientjes@google.com + linux-mm@kvack.org + linux-doc@vger.kernel.org + salyzyn@android.com + jeffv@google.com + nnk@google.com + catalin.marinas@arm.com + will.deacon@arm.com + hpa@zytor.com + x86@kernel.org + hecmargi@upv.es + bp@suse.de + dcashman@google.com + arnd@arndb.de + " Daniel Cashman <dcashman@android.com>\0" "\00:1\0" "b\0" "Address Space Layout Randomization (ASLR) provides a barrier to exploitation of user-space processes in the presence of security vulnerabilities by making it more difficult to find desired code/data which could help an attack. This is done by adding a random offset to the location of regions in the process address space, with a greater range of potential offset values corresponding to better protection/a larger search-space for brute force, but also to greater potential for fragmentation.\n" @@ -44,6 +74,12 @@ " 11 files changed, 211 insertions(+), 10 deletions(-)\n" "\n" "-- \n" - 2.6.0.rc2.230.g3dd15c0 + "2.6.0.rc2.230.g3dd15c0\n" + "\n" + "--\n" + "To unsubscribe, send a message with 'unsubscribe linux-mm' in\n" + "the body to majordomo@kvack.org. For more info on Linux MM,\n" + "see: http://www.linux-mm.org/ .\n" + "Don't email: <a href=mailto:\"dont@kvack.org\"> email@kvack.org </a>" -885afdc59a461462c4229109910ad03c8cf31e844f03459fb12ad01e8001b67b +fad7b72172ff8d2d9bc2277b2df1abf6ee1884b29d8b56b23e9434d3d687cdb6
diff --git a/a/content_digest b/N2/content_digest index 08ad6ef..02b0db8 100644 --- a/a/content_digest +++ b/N2/content_digest @@ -1,7 +1,37 @@ - "From\0dcashman@android.com (Daniel Cashman)\0" + "From\0Daniel Cashman <dcashman@android.com>\0" "Subject\0[PATCH v5 0/4] Allow customizable random offset to mmap_base address.\0" "Date\0Tue, 1 Dec 2015 12:10:54 -0800\0" - "To\0linux-arm-kernel@lists.infradead.org\0" + "To\0linux-kernel@vger.kernel.org\0" + "Cc\0linux@arm.linux.org.uk" + akpm@linux-foundation.org + keescook@chromium.org + mingo@kernel.org + linux-arm-kernel@lists.infradead.org + corbet@lwn.net + dzickus@redhat.com + ebiederm@xmission.com + xypron.glpk@gmx.de + jpoimboe@redhat.com + kirill.shutemov@linux.intel.com + n-horiguchi@ah.jp.nec.com + aarcange@redhat.com + mgorman@suse.de + tglx@linutronix.de + rientjes@google.com + linux-mm@kvack.org + linux-doc@vger.kernel.org + salyzyn@android.com + jeffv@google.com + nnk@google.com + catalin.marinas@arm.com + will.deacon@arm.com + hpa@zytor.com + x86@kernel.org + hecmargi@upv.es + bp@suse.de + dcashman@google.com + arnd@arndb.de + " Daniel Cashman <dcashman@android.com>\0" "\00:1\0" "b\0" "Address Space Layout Randomization (ASLR) provides a barrier to exploitation of user-space processes in the presence of security vulnerabilities by making it more difficult to find desired code/data which could help an attack. This is done by adding a random offset to the location of regions in the process address space, with a greater range of potential offset values corresponding to better protection/a larger search-space for brute force, but also to greater potential for fragmentation.\n" @@ -46,4 +76,4 @@ "-- \n" 2.6.0.rc2.230.g3dd15c0 -885afdc59a461462c4229109910ad03c8cf31e844f03459fb12ad01e8001b67b +8bc1def020dee854af92497b07b349c9c8f6bfaa282fba63cfc724ad43d50bb9
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.