All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20110814160848.GA4333@albatros>

diff --git a/a/content_digest b/N1/content_digest
index 7db31a9..aaa7c44 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -26,10 +26,7 @@
   "ref\00020110814152729.GU5782\@one.firstfloor.org\0"
 ]
 [
-  "ref\00020110814152729.GU5782-qrUzlfsMFqo/4alezvVtWx2eb7JE58TQ\@public.gmane.org\0"
-]
-[
-  "From\0Vasiliy Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w\@public.gmane.org>\0"
+  "From\0Vasiliy Kulikov <segoon\@openwall.com>\0"
 ]
 [
   "Subject\0Re: [RFC] x86: restrict pid namespaces to 32 or 64 bit syscalls\0"
@@ -38,19 +35,20 @@
   "Date\0Sun, 14 Aug 2011 20:08:48 +0400\0"
 ]
 [
-  "To\0Andi Kleen <andi-Vw/NltI1exuRpAAqCnN02g\@public.gmane.org>\0"
+  "To\0Andi Kleen <andi\@firstfloor.org>\0"
 ]
 [
-  "Cc\0Will Drewry <wad-F7+t8E8rja9g9hUCZPvPmw\@public.gmane.org>",
-  " kernel-hardening-ZwoEplunGu1jrUoiu81ncdBPR1lH4CV8\@public.gmane.org",
-  " containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA\@public.gmane.org",
-  " x86-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org",
-  " linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
-  " linux-security-module-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
-  " Ingo Molnar <mingo-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
-  " Solar Designer <solar-cxoSlKxDwOJWk0Htik3J/w\@public.gmane.org>",
-  " H. Peter Anvin <hpa-YMNOUZJC4hwAvxtiuMwx3w\@public.gmane.org>",
-  " Thomas Gleixner <tglx-hfZtesqFncYOwBW4kG4KsQ\@public.gmane.org>\0"
+  "Cc\0H. Peter Anvin <hpa\@zytor.com>",
+  " Solar Designer <solar\@openwall.com>",
+  " Thomas Gleixner <tglx\@linutronix.de>",
+  " Ingo Molnar <mingo\@redhat.com>",
+  " James Morris <jmorris\@namei.org>",
+  " kernel-hardening\@lists.openwall.com",
+  " x86\@kernel.org",
+  " linux-kernel\@vger.kernel.org",
+  " linux-security-module\@vger.kernel.org",
+  " Will Drewry <wad\@chromium.org>",
+  " containers\@lists.linux-foundation.org\0"
 ]
 [
   "\0000:1\0"
@@ -92,4 +90,4 @@
   "http://www.openwall.com - bringing security into open computing environments"
 ]
 
-1e7ebb6d3e08661072786cabdd46f19607677ca9ac3b197efe2bfd69985749da
+d1062aca950dcc748065f44d07d3aca59cec09bc47b8457e3525bf167c6241b0

diff --git a/a/content_digest b/N2/content_digest
index 7db31a9..a8d702f 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -26,31 +26,29 @@
   "ref\00020110814152729.GU5782\@one.firstfloor.org\0"
 ]
 [
-  "ref\00020110814152729.GU5782-qrUzlfsMFqo/4alezvVtWx2eb7JE58TQ\@public.gmane.org\0"
+  "From\0Vasiliy Kulikov <segoon\@openwall.com>\0"
 ]
 [
-  "From\0Vasiliy Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w\@public.gmane.org>\0"
-]
-[
-  "Subject\0Re: [RFC] x86: restrict pid namespaces to 32 or 64 bit syscalls\0"
+  "Subject\0[kernel-hardening] Re: [RFC] x86: restrict pid namespaces to 32 or 64 bit syscalls\0"
 ]
 [
   "Date\0Sun, 14 Aug 2011 20:08:48 +0400\0"
 ]
 [
-  "To\0Andi Kleen <andi-Vw/NltI1exuRpAAqCnN02g\@public.gmane.org>\0"
+  "To\0Andi Kleen <andi\@firstfloor.org>\0"
 ]
 [
-  "Cc\0Will Drewry <wad-F7+t8E8rja9g9hUCZPvPmw\@public.gmane.org>",
-  " kernel-hardening-ZwoEplunGu1jrUoiu81ncdBPR1lH4CV8\@public.gmane.org",
-  " containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA\@public.gmane.org",
-  " x86-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org",
-  " linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
-  " linux-security-module-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
-  " Ingo Molnar <mingo-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
-  " Solar Designer <solar-cxoSlKxDwOJWk0Htik3J/w\@public.gmane.org>",
-  " H. Peter Anvin <hpa-YMNOUZJC4hwAvxtiuMwx3w\@public.gmane.org>",
-  " Thomas Gleixner <tglx-hfZtesqFncYOwBW4kG4KsQ\@public.gmane.org>\0"
+  "Cc\0H. Peter Anvin <hpa\@zytor.com>",
+  " Solar Designer <solar\@openwall.com>",
+  " Thomas Gleixner <tglx\@linutronix.de>",
+  " Ingo Molnar <mingo\@redhat.com>",
+  " James Morris <jmorris\@namei.org>",
+  " kernel-hardening\@lists.openwall.com",
+  " x86\@kernel.org",
+  " linux-kernel\@vger.kernel.org",
+  " linux-security-module\@vger.kernel.org",
+  " Will Drewry <wad\@chromium.org>",
+  " containers\@lists.linux-foundation.org\0"
 ]
 [
   "\0000:1\0"
@@ -92,4 +90,4 @@
   "http://www.openwall.com - bringing security into open computing environments"
 ]
 
-1e7ebb6d3e08661072786cabdd46f19607677ca9ac3b197efe2bfd69985749da
+1c00f90506324e05a281bc56d6e426af843afb8e1e1ef4f756fb678a9f472503

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.