All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <1510244046-3256-1-git-send-email-tixxdz@gmail.com>

diff --git a/a/1.txt b/N1/1.txt
index d35c0c1..94df0d1 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -102,12 +102,12 @@ Historically, lot of file systems inside Linux kernel view when instantiated
 were just a mirror of an already created and mounted filesystem. This was the
 case of devpts filesystem, it seems at that time the requirements were to
 optimize things and reuse the same memory, etc. This design used to work but not
-anymore with today’s containers, IoT, hostile environments and all the privacy
+anymore with today?s containers, IoT, hostile environments and all the privacy
 challenges that Linux faces.
 
 In that regards, devpts was updated so that each new mounts is a total
 independent file system by the following patches:
-“devpts: Make each mount of devpts an independent filesystem” by
+?devpts: Make each mount of devpts an independent filesystem? by
 Eric W. Biederman [3] [4]
 
 
@@ -255,4 +255,8 @@ Djalal Harouni (7):
  fs/proc/base.c                | 103 ++++++++++++++++-------
  fs/proc/inode.c               |  34 ++++++--
  fs/proc/internal.h            |   2 +-
- fs/proc/root.c                | 188 +++++++++++
\ No newline at end of file
+ fs/proc/root.c                | 188 +++++++++++
+--
+To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
+the body of a message to majordomo at vger.kernel.org
+More majordomo info at  http://vger.kernel.org/majordomo-info.html
\ No newline at end of file
diff --git a/a/content_digest b/N1/content_digest
index 2b123cd..bcdd27b 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,5 +1,5 @@
 [
-  "From\0Djalal Harouni <tixxdz\@gmail.com>\0"
+  "From\0tixxdz\@gmail.com (Djalal Harouni)\0"
 ]
 [
   "Subject\0[PATCH RFC v3 0/7] proc: modernize proc to support multiple private instances\0"
@@ -8,33 +8,7 @@
   "Date\0Thu,  9 Nov 2017 17:13:59 +0100\0"
 ]
 [
-  "To\0Kees Cook <keescook\@chromium.org>",
-  " Alexey Gladkov <gladkov.alexey\@gmail.com>",
-  " Andy Lutomirski <luto\@kernel.org>",
-  " Andrew Morton <akpm\@linux-foundation.org>",
-  " linux-fsdevel\@vger.kernel.org",
-  " linux-kernel\@vger.kernel.org",
-  " kernel-hardening\@lists.openwall.com",
-  " linux-security-module\@vger.kernel.org",
-  " linux-api\@vger.kernel.org\0"
-]
-[
-  "Cc\0Greg Kroah-Hartman <gregkh\@linuxfoundation.org>",
-  " Alexander Viro <viro\@zeniv.linux.org.uk>",
-  " Akinobu Mita <akinobu.mita\@gmail.com>",
-  " me\@tobin.cc",
-  " Oleg Nesterov <oleg\@redhat.com>",
-  " Jeff Layton <jlayton\@poochiereds.net>",
-  " Ingo Molnar <mingo\@kernel.org>",
-  " Alexey Dobriyan <adobriyan\@gmail.com>",
-  " ebiederm\@xmission.com",
-  " Linus Torvalds <torvalds\@linux-foundation.org>",
-  " Daniel Micay <danielmicay\@gmail.com>",
-  " Jonathan Corbet <corbet\@lwn.net>",
-  " bfields\@fieldses.org",
-  " Stephen Rothwell <sfr\@canb.auug.org.au>",
-  " solar\@openwall.com",
-  " Djalal Harouni <tixxdz\@gmail.com>\0"
+  "To\0linux-security-module\@vger.kernel.org\0"
 ]
 [
   "\0000:1\0"
@@ -147,12 +121,12 @@
   "were just a mirror of an already created and mounted filesystem. This was the\n",
   "case of devpts filesystem, it seems at that time the requirements were to\n",
   "optimize things and reuse the same memory, etc. This design used to work but not\n",
-  "anymore with today\342\200\231s containers, IoT, hostile environments and all the privacy\n",
+  "anymore with today?s containers, IoT, hostile environments and all the privacy\n",
   "challenges that Linux faces.\n",
   "\n",
   "In that regards, devpts was updated so that each new mounts is a total\n",
   "independent file system by the following patches:\n",
-  "\342\200\234devpts: Make each mount of devpts an independent filesystem\342\200\235 by\n",
+  "?devpts: Make each mount of devpts an independent filesystem? by\n",
   "Eric W. Biederman [3] [4]\n",
   "\n",
   "\n",
@@ -300,7 +274,11 @@
   " fs/proc/base.c                | 103 ++++++++++++++++-------\n",
   " fs/proc/inode.c               |  34 ++++++--\n",
   " fs/proc/internal.h            |   2 +-\n",
-  " fs/proc/root.c                | 188 +++++++++++"
+  " fs/proc/root.c                | 188 +++++++++++\n",
+  "--\n",
+  "To unsubscribe from this list: send the line \"unsubscribe linux-security-module\" in\n",
+  "the body of a message to majordomo at vger.kernel.org\n",
+  "More majordomo info at  http://vger.kernel.org/majordomo-info.html"
 ]
 
-b8b1d3e855eae8ddd4a2dfc81a4b358d13b865b0c1c5d4650739660ddcaf464b
+4f69f45b6e78ffb3018ad19ec33ba64d2c5fc72c2980b325fbb8e1b8bbf4768e

diff --git a/a/content_digest b/N2/content_digest
index 2b123cd..c5d4375 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -2,7 +2,7 @@
   "From\0Djalal Harouni <tixxdz\@gmail.com>\0"
 ]
 [
-  "Subject\0[PATCH RFC v3 0/7] proc: modernize proc to support multiple private instances\0"
+  "Subject\0[kernel-hardening] [PATCH RFC v3 0/7] proc: modernize proc to support multiple private instances\0"
 ]
 [
   "Date\0Thu,  9 Nov 2017 17:13:59 +0100\0"
@@ -303,4 +303,4 @@
   " fs/proc/root.c                | 188 +++++++++++"
 ]
 
-b8b1d3e855eae8ddd4a2dfc81a4b358d13b865b0c1c5d4650739660ddcaf464b
+4e7756dbe59272e77489895a79e6f0f563072b35e99b40cb7577c278be591c5c

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.