All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20150127073713.GJ651@moon>

diff --git a/a/content_digest b/N1/content_digest
index c842884..06d287d 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -8,26 +8,25 @@
  "ref\020150126210054.GG651@moon\0"
  "ref\020150126154346.c63c512e5821e9e0ea31f759@linux-foundation.org\0"
  "ref\0CAGXu5jLDkg0hJSMm3CdoO-77yiK5GQWHSe3+1h7mq76LERpNBA@mail.gmail.com\0"
- "ref\0CAGXu5jLDkg0hJSMm3CdoO-77yiK5GQWHSe3+1h7mq76LERpNBA-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org\0"
- "From\0Cyrill Gorcunov <gorcunov-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>\0"
+ "From\0Cyrill Gorcunov <gorcunov@gmail.com>\0"
  "Subject\0Re: [RFC][PATCH v2] procfs: Always expose /proc/<pid>/map_files/ and make it readable\0"
  "Date\0Tue, 27 Jan 2015 10:37:13 +0300\0"
- "To\0Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org>\0"
- "Cc\0Andrew Morton <akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org>"
-  Kirill A. Shutemov <kirill-oKw7cIdHH8eLwutG50LtGA@public.gmane.org>
-  Calvin Owens <calvinowens-b10kYP2dOMg@public.gmane.org>
-  Alexey Dobriyan <adobriyan-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
-  Oleg Nesterov <oleg-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
-  Eric W. Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>
-  Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
-  Kirill A. Shutemov <kirill.shutemov-VuQAYsv1563Yd54FQh9/CA@public.gmane.org>
-  Peter Feiner <pfeiner-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org>
-  Grant Likely <grant.likely-s3s/WqlpOiPyB63q8FvJNQ@public.gmane.org>
-  Siddhesh Poyarekar <siddhesh.poyarekar-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
-  LKML <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
-  kernel-team-b10kYP2dOMg@public.gmane.org
-  Pavel Emelyanov <xemul-GEFAQzZX7r8dnm+yROfE0A@public.gmane.org>
- " Linux API <linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>\0"
+ "To\0Kees Cook <keescook@chromium.org>\0"
+ "Cc\0Andrew Morton <akpm@linux-foundation.org>"
+  Kirill A. Shutemov <kirill@shutemov.name>
+  Calvin Owens <calvinowens@fb.com>
+  Alexey Dobriyan <adobriyan@gmail.com>
+  Oleg Nesterov <oleg@redhat.com>
+  Eric W. Biederman <ebiederm@xmission.com>
+  Al Viro <viro@zeniv.linux.org.uk>
+  Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
+  Peter Feiner <pfeiner@google.com>
+  Grant Likely <grant.likely@secretlab.ca>
+  Siddhesh Poyarekar <siddhesh.poyarekar@gmail.com>
+  LKML <linux-kernel@vger.kernel.org>
+  kernel-team@fb.com
+  Pavel Emelyanov <xemul@openvz.org>
+ " Linux API <linux-api@vger.kernel.org>\0"
  "\00:1\0"
  "b\0"
  "On Mon, Jan 26, 2015 at 04:15:26PM -0800, Kees Cook wrote:\n"
@@ -76,4 +75,4 @@
  "> > permissions like this will create new vulnerabilities.  And the\n"
  > > map_files implementation is surprisingly complex.  Is it bug-free?
 
-53c81d3aa755f16d93c89db30f9a2c57bad3e93ffb2e83f1a9b9d8a7f8b25b6c
+f418611d6e679efe60dd5a5ad07f2e31495dd37ee204cc9b1726fa5f973c1b9f

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.