diff for duplicates of <20160915040054.GA65308@ast-mbp.thefacebook.com>
diff --git a/a/content_digest b/N1/content_digest
index b62546f..6b93e86 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -49,12 +49,7 @@
" Sargun Dhillon <sargun\@sargun.me>",
" Serge E . Hallyn <serge\@hallyn.com>",
" Tejun Heo <tj\@kernel.org>",
- " Will Drewry <wad\@chromium.org>",
- " kernel-hardening\@lists.openwall.com <kernel-hardening\@lists.openwall.com>",
- " Linux API <linux-api\@vger.kernel.org>",
- " LSM List <linux-security-module\@vger.kernel.org>",
- " Network Development <netdev\@vger.kernel.org>",
- " open list:CONTROL GROUP (CGROUP) <cgroups\@vger.kernel.org>\0"
+ " Will Drewry <wad\@chromium.org>\0"
]
[
"\0000:1\0"
@@ -107,4 +102,4 @@
"with passing whatever information."
]
-5dc6e36d53d8a1fe84dd5b4819abe74f397155d3da1221d54823745a59c601e4
+5506336c68f00d0f9982cbbd84ca136a8f59c98a244f921246c461497725af7a
diff --git a/a/content_digest b/N2/content_digest
index b62546f..4354e96 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -50,11 +50,7 @@
" Serge E . Hallyn <serge\@hallyn.com>",
" Tejun Heo <tj\@kernel.org>",
" Will Drewry <wad\@chromium.org>",
- " kernel-hardening\@lists.openwall.com <kernel-hardening\@lists.openwall.com>",
- " Linux API <linux-api\@vger.kernel.org>",
- " LSM List <linux-security-module\@vger.kernel.org>",
- " Network Development <netdev\@vger.kernel.org>",
- " open list:CONTROL GROUP (CGROUP) <cgroups\@vger.kernel.org>\0"
+ " kernel-hardening\@lists.openwall.com\0"
]
[
"\0000:1\0"
@@ -107,4 +103,4 @@
"with passing whatever information."
]
-5dc6e36d53d8a1fe84dd5b4819abe74f397155d3da1221d54823745a59c601e4
+aa671948f268885aa165d246c2f62f06b1708937f850eced54ef6c59f3b6bf83
diff --git a/a/content_digest b/N3/content_digest
index b62546f..7c5fe6d 100644
--- a/a/content_digest
+++ b/N3/content_digest
@@ -23,7 +23,7 @@
"From\0Alexei Starovoitov <alexei.starovoitov\@gmail.com>\0"
]
[
- "Subject\0Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle unprivileged hooks\0"
+ "Subject\0[kernel-hardening] Re: [RFC v3 18/22] cgroup,landlock: Add CGRP_NO_NEW_PRIVS to handle unprivileged hooks\0"
]
[
"Date\0Wed, 14 Sep 2016 21:00:56 -0700\0"
@@ -107,4 +107,4 @@
"with passing whatever information."
]
-5dc6e36d53d8a1fe84dd5b4819abe74f397155d3da1221d54823745a59c601e4
+dc66f4f566d178916da86df1e289ef5bc04cf19deb8553c99c000047d0a41ec3
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.