diff for duplicates of <20150127073713.GJ651@moon> diff --git a/a/content_digest b/N1/content_digest index c842884..06d287d 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -8,26 +8,25 @@ "ref\020150126210054.GG651@moon\0" "ref\020150126154346.c63c512e5821e9e0ea31f759@linux-foundation.org\0" "ref\0CAGXu5jLDkg0hJSMm3CdoO-77yiK5GQWHSe3+1h7mq76LERpNBA@mail.gmail.com\0" - "ref\0CAGXu5jLDkg0hJSMm3CdoO-77yiK5GQWHSe3+1h7mq76LERpNBA-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org\0" - "From\0Cyrill Gorcunov <gorcunov-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>\0" + "From\0Cyrill Gorcunov <gorcunov@gmail.com>\0" "Subject\0Re: [RFC][PATCH v2] procfs: Always expose /proc/<pid>/map_files/ and make it readable\0" "Date\0Tue, 27 Jan 2015 10:37:13 +0300\0" - "To\0Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org>\0" - "Cc\0Andrew Morton <akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org>" - Kirill A. Shutemov <kirill-oKw7cIdHH8eLwutG50LtGA@public.gmane.org> - Calvin Owens <calvinowens-b10kYP2dOMg@public.gmane.org> - Alexey Dobriyan <adobriyan-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> - Oleg Nesterov <oleg-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> - Eric W. Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org> - Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org> - Kirill A. Shutemov <kirill.shutemov-VuQAYsv1563Yd54FQh9/CA@public.gmane.org> - Peter Feiner <pfeiner-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org> - Grant Likely <grant.likely-s3s/WqlpOiPyB63q8FvJNQ@public.gmane.org> - Siddhesh Poyarekar <siddhesh.poyarekar-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> - LKML <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org> - kernel-team-b10kYP2dOMg@public.gmane.org - Pavel Emelyanov <xemul-GEFAQzZX7r8dnm+yROfE0A@public.gmane.org> - " Linux API <linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>\0" + "To\0Kees Cook <keescook@chromium.org>\0" + "Cc\0Andrew Morton <akpm@linux-foundation.org>" + Kirill A. Shutemov <kirill@shutemov.name> + Calvin Owens <calvinowens@fb.com> + Alexey Dobriyan <adobriyan@gmail.com> + Oleg Nesterov <oleg@redhat.com> + Eric W. Biederman <ebiederm@xmission.com> + Al Viro <viro@zeniv.linux.org.uk> + Kirill A. Shutemov <kirill.shutemov@linux.intel.com> + Peter Feiner <pfeiner@google.com> + Grant Likely <grant.likely@secretlab.ca> + Siddhesh Poyarekar <siddhesh.poyarekar@gmail.com> + LKML <linux-kernel@vger.kernel.org> + kernel-team@fb.com + Pavel Emelyanov <xemul@openvz.org> + " Linux API <linux-api@vger.kernel.org>\0" "\00:1\0" "b\0" "On Mon, Jan 26, 2015 at 04:15:26PM -0800, Kees Cook wrote:\n" @@ -76,4 +75,4 @@ "> > permissions like this will create new vulnerabilities. And the\n" > > map_files implementation is surprisingly complex. Is it bug-free? -53c81d3aa755f16d93c89db30f9a2c57bad3e93ffb2e83f1a9b9d8a7f8b25b6c +f418611d6e679efe60dd5a5ad07f2e31495dd37ee204cc9b1726fa5f973c1b9f
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.