Linux Kernel Selftest development
 help / color / mirror / Atom feed
diff for duplicates of <20190528170244.GF32006@arrakis.emea.arm.com>

diff --git a/a/1.txt b/N1/1.txt
index 0fc25d2..e02db74 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,4 +1,4 @@
-On Thu, May 23, 2019 at 02:31:16PM -0700, Kees Cook wrote:
+On Thu, May 23, 2019@02:31:16PM -0700, Kees Cook wrote:
 > syzkaller already attempts to randomly inject non-canonical and
 > 0xFFFF....FFFF addresses for user pointers in syscalls in an effort to
 > find bugs like CVE-2017-5123 where waitid() via unchecked put_user() was
diff --git a/a/content_digest b/N1/content_digest
index 21030e7..6d29c3a 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -8,12 +8,12 @@
  "ref\0201905230917.DEE7A75EF0@keescook\0"
  "ref\020190523174345.6sv3kcipkvlwfmox@mbp\0"
  "ref\0201905231327.77CA8D0A36@keescook\0"
- "From\0catalin.marinas at arm.com (Catalin Marinas)\0"
+ "From\0catalin.marinas@arm.com (Catalin Marinas)\0"
  "Subject\0[PATCH v15 00/17] arm64: untag user pointers passed to the kernel\0"
  "Date\0Tue, 28 May 2019 18:02:45 +0100\0"
  "\00:1\0"
  "b\0"
- "On Thu, May 23, 2019 at 02:31:16PM -0700, Kees Cook wrote:\n"
+ "On Thu, May 23, 2019@02:31:16PM -0700, Kees Cook wrote:\n"
  "> syzkaller already attempts to randomly inject non-canonical and\n"
  "> 0xFFFF....FFFF addresses for user pointers in syscalls in an effort to\n"
  "> find bugs like CVE-2017-5123 where waitid() via unchecked put_user() was\n"
@@ -75,4 +75,4 @@
  "-- \n"
  Catalin
 
-c37b3e7bda2a4ddeef50da52cf374810f7f4d713f6a5c0c3d6a2b0b5864c65a1
+b81c885f62fec0031db5e11b8d528168e4b37f2f34459e612d767bf9fa75abb5

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox