All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <57CF28C5.3090006@intel.com>

diff --git a/a/1.txt b/N1/1.txt
index 73f64ec..82ff300 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -10,9 +10,3 @@ On 09/06/2016 01:31 AM, Anshuman Khandual wrote:
 
 Don't we have some prohibition on dumping out kernel addresses like this
 so that attackers can't trivially defeat kernel layout randomization?
-
---
-To unsubscribe, send a message with 'unsubscribe linux-mm' in
-the body to majordomo@kvack.org.  For more info on Linux MM,
-see: http://www.linux-mm.org/ .
-Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
diff --git a/a/content_digest b/N1/content_digest
index c3cb00f..14f13d8 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -21,12 +21,6 @@
  ">         (0) (node 0) (zone DMA c00000000140c000)\n"
  "\n"
  "Don't we have some prohibition on dumping out kernel addresses like this\n"
- "so that attackers can't trivially defeat kernel layout randomization?\n"
- "\n"
- "--\n"
- "To unsubscribe, send a message with 'unsubscribe linux-mm' in\n"
- "the body to majordomo@kvack.org.  For more info on Linux MM,\n"
- "see: http://www.linux-mm.org/ .\n"
- "Don't email: <a href=mailto:\"dont@kvack.org\"> email@kvack.org </a>"
+ so that attackers can't trivially defeat kernel layout randomization?
 
-7e6f94ac8ef9d07a8ba05991420e1b2b0e6d5277b06c3c053607c425443aba85
+e814bb1bb173520bb50eaa2c7e2d2f4fcc7e54f9a52da0b589556ab53be4ca85

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.