Linux Kernel Selftest development
 help / color / mirror / Atom feed
diff for duplicates of <201906012156.55E2C45@keescook>

diff --git a/a/1.txt b/N1/1.txt
index 00ffc93..cb7c61d 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,5 +1,5 @@
-On Tue, May 28, 2019 at 06:02:45PM +0100, Catalin Marinas wrote:
-> On Thu, May 23, 2019 at 02:31:16PM -0700, Kees Cook wrote:
+On Tue, May 28, 2019@06:02:45PM +0100, Catalin Marinas wrote:
+> On Thu, May 23, 2019@02:31:16PM -0700, Kees Cook wrote:
 > > syzkaller already attempts to randomly inject non-canonical and
 > > 0xFFFF....FFFF addresses for user pointers in syscalls in an effort to
 > > find bugs like CVE-2017-5123 where waitid() via unchecked put_user() was
diff --git a/a/content_digest b/N1/content_digest
index c75f56e..66aa59f 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -8,13 +8,13 @@
  "ref\020190523174345.6sv3kcipkvlwfmox@mbp\0"
  "ref\0201905231327.77CA8D0A36@keescook\0"
  "ref\020190528170244.GF32006@arrakis.emea.arm.com\0"
- "From\0keescook at chromium.org (Kees Cook)\0"
+ "From\0keescook@chromium.org (Kees Cook)\0"
  "Subject\0[PATCH v15 00/17] arm64: untag user pointers passed to the kernel\0"
  "Date\0Sat, 1 Jun 2019 22:06:10 -0700\0"
  "\00:1\0"
  "b\0"
- "On Tue, May 28, 2019 at 06:02:45PM +0100, Catalin Marinas wrote:\n"
- "> On Thu, May 23, 2019 at 02:31:16PM -0700, Kees Cook wrote:\n"
+ "On Tue, May 28, 2019@06:02:45PM +0100, Catalin Marinas wrote:\n"
+ "> On Thu, May 23, 2019@02:31:16PM -0700, Kees Cook wrote:\n"
  "> > syzkaller already attempts to randomly inject non-canonical and\n"
  "> > 0xFFFF....FFFF addresses for user pointers in syscalls in an effort to\n"
  "> > find bugs like CVE-2017-5123 where waitid() via unchecked put_user() was\n"
@@ -90,4 +90,4 @@
  "-- \n"
  Kees Cook
 
-bb3a97a19671b9dd89b89781a788cacce4499b52a6016272fa33c0d75e32842c
+9c5a6974622b2f2b1e38467b970e739470a5ca3d573ea951494dd8a95f4d3b24

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox