All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <878wl7o12j.fsf@basil.nowhere.org>

diff --git a/a/content_digest b/N1/content_digest
index 6970a49..bff4a77 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -13,16 +13,16 @@
  "Subject\0Re: [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole\0"
  "Date\0Fri, 08 May 2009 21:18:44 +0200\0"
  "To\0Markus Gutschke (\303\234\303\222\303\220) <markus@google.com>\0"
- "Cc\0Ingo Molnar <mingo@elte.hu>"
-  Linus Torvalds <torvalds@linux-foundation.org>
-  Roland McGrath <roland@redhat.com>
-  Andrew Morton <akpm@linux-foundation.org>
+ "Cc\0linux-mips@linux-mips.org"
   x86@kernel.org
   linux-kernel@vger.kernel.org
   stable@kernel.org
-  linux-mips@linux-mips.org
+  linuxppc-dev@ozlabs.org
   sparclinux@vger.kernel.org
- " linuxppc-dev@ozlabs.org\0"
+  Ingo Molnar <mingo@elte.hu>
+  Linus Torvalds <torvalds@linux-foundation.org>
+  Andrew Morton <akpm@linux-foundation.org>
+ " Roland McGrath <roland@redhat.com>\0"
  "\00:1\0"
  "b\0"
  "\"Markus Gutschke (\303\234\303\222\303\220)\" <markus@google.com> writes:\n"
@@ -39,4 +39,4 @@
  "-- \n"
  ak@linux.intel.com -- Speaking for myself only.
 
-890cabd96d6f47a28afe8c4c7fc01698ef3c46d4b38757238fc7eca6152eb16f
+02dab085a2f43ea666c69eb24b7b571b1c84af471c0db3979e7e59039a597b3a

diff --git a/a/1.txt b/N2/1.txt
index 359dac2..68b43de 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -1,4 +1,4 @@
-"Markus Gutschke (ÜÒÐ)" <markus@google.com> writes:
+"Markus Gutschke (мва)" <markus@google.com> writes:
 >
 > There are a large number of system calls that "normal" C/C++ code uses
 > quite frequently, and that are not security sensitive. A typical
@@ -11,3 +11,7 @@ they're vsyscalls that run in ring 3 only.
 
 -- 
 ak@linux.intel.com -- Speaking for myself only.
+--
+To unsubscribe from this list: send the line "unsubscribe sparclinux" in
+the body of a message to majordomo@vger.kernel.org
+More majordomo info at  http://vger.kernel.org/majordomo-info.html
diff --git a/a/content_digest b/N2/content_digest
index 6970a49..64b39bc 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -11,7 +11,7 @@
  "ref\0904b25810905061508n6d9cb8dbg71de5b1e0332ede7@mail.gmail.com\0"
  "From\0Andi Kleen <andi@firstfloor.org>\0"
  "Subject\0Re: [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole\0"
- "Date\0Fri, 08 May 2009 21:18:44 +0200\0"
+ "Date\0Fri, 08 May 2009 19:18:44 +0000\0"
  "To\0Markus Gutschke (\303\234\303\222\303\220) <markus@google.com>\0"
  "Cc\0Ingo Molnar <mingo@elte.hu>"
   Linus Torvalds <torvalds@linux-foundation.org>
@@ -25,7 +25,7 @@
  " linuxppc-dev@ozlabs.org\0"
  "\00:1\0"
  "b\0"
- "\"Markus Gutschke (\303\234\303\222\303\220)\" <markus@google.com> writes:\n"
+ "\"Markus Gutschke (\320\274\320\262\320\260)\" <markus@google.com> writes:\n"
  ">\n"
  "> There are a large number of system calls that \"normal\" C/C++ code uses\n"
  "> quite frequently, and that are not security sensitive. A typical\n"
@@ -37,6 +37,10 @@
  "-Andi\n"
  "\n"
  "-- \n"
- ak@linux.intel.com -- Speaking for myself only.
+ "ak@linux.intel.com -- Speaking for myself only.\n"
+ "--\n"
+ "To unsubscribe from this list: send the line \"unsubscribe sparclinux\" in\n"
+ "the body of a message to majordomo@vger.kernel.org\n"
+ More majordomo info at  http://vger.kernel.org/majordomo-info.html
 
-890cabd96d6f47a28afe8c4c7fc01698ef3c46d4b38757238fc7eca6152eb16f
+2167307b06f4515fe51fcc0e9d615d27ac69ae246bf5206d74e6eee9db761a3b

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.