diff for duplicates of <57CF28C5.3090006@intel.com> diff --git a/a/1.txt b/N1/1.txt index 73f64ec..82ff300 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -10,9 +10,3 @@ On 09/06/2016 01:31 AM, Anshuman Khandual wrote: Don't we have some prohibition on dumping out kernel addresses like this so that attackers can't trivially defeat kernel layout randomization? - --- -To unsubscribe, send a message with 'unsubscribe linux-mm' in -the body to majordomo@kvack.org. For more info on Linux MM, -see: http://www.linux-mm.org/ . -Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a> diff --git a/a/content_digest b/N1/content_digest index c3cb00f..14f13d8 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -21,12 +21,6 @@ "> (0) (node 0) (zone DMA c00000000140c000)\n" "\n" "Don't we have some prohibition on dumping out kernel addresses like this\n" - "so that attackers can't trivially defeat kernel layout randomization?\n" - "\n" - "--\n" - "To unsubscribe, send a message with 'unsubscribe linux-mm' in\n" - "the body to majordomo@kvack.org. For more info on Linux MM,\n" - "see: http://www.linux-mm.org/ .\n" - "Don't email: <a href=mailto:\"dont@kvack.org\"> email@kvack.org </a>" + so that attackers can't trivially defeat kernel layout randomization? -7e6f94ac8ef9d07a8ba05991420e1b2b0e6d5277b06c3c053607c425443aba85 +e814bb1bb173520bb50eaa2c7e2d2f4fcc7e54f9a52da0b589556ab53be4ca85
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.