diff for duplicates of <CAMp4zn8u3kg-nhiZ5rSUCLGveAzHr6FoP1x=iJasF2W0S56WfA@mail.gmail.com>
diff --git a/a/1.txt b/N1/1.txt
index 4033739..1fa9820 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,4 +1,4 @@
-On Sun, Nov 13, 2016 at 6:23 AM, Mickaël Salaün <mic@digikod.net> wrote:
+On Sun, Nov 13, 2016 at 6:23 AM, Mickaël Salaün <mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org> wrote:
> Hi,
>
> After the BoF at LPC last week, we came to a multi-step roadmap to
@@ -383,10 +383,10 @@ On Sun, Nov 13, 2016 at 6:23 AM, Mickaël Salaün <mic@digikod.net> wrote:
>> constructive comments on the usability, architecture, code and userland API of
>> Landlock LSM.
>>
->> [1] https://lkml.kernel.org/r/20160914072415.26021-1-mic@digikod.net
+>> [1] https://lkml.kernel.org/r/20160914072415.26021-1-mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org
>> [2] https://crypto.stanford.edu/cs155/papers/traps.pdf
>> [3] https://lkml.kernel.org/r/1477390454-12553-1-git-send-email-daniel@zonque.org
->> [4] https://lkml.kernel.org/r/20160829114542.GA20836@ircssh.c.rugged-nimbus-611.internal
+>> [4] https://lkml.kernel.org/r/20160829114542.GA20836-I4sfFR6g6EicJoAdRrHjTitQHAD/DGy2@public.gmane.orgbus-611.internal
>>
>> Regards,
>>
diff --git a/a/content_digest b/N1/content_digest
index 884663c..ccf45d8 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -5,7 +5,10 @@
"ref\0005828776A.1010104\@digikod.net\0"
]
[
- "From\0Sargun Dhillon <sargun\@sargun.me>\0"
+ "ref\0005828776A.1010104-WFhQfpSGs3bR7s880joybQ\@public.gmane.org\0"
+]
+[
+ "From\0Sargun Dhillon <sargun-GaZTRHToo+CzQB+pC5nmwQ\@public.gmane.org>\0"
]
[
"Subject\0Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing\0"
@@ -14,30 +17,30 @@
"Date\0Mon, 14 Nov 2016 02:35:55 -0800\0"
]
[
- "To\0Micka\303\253l Sala\303\274n <mic\@digikod.net>\0"
+ "To\0Micka\303\253l Sala\303\274n <mic-WFhQfpSGs3bR7s880joybQ\@public.gmane.org>\0"
]
[
- "Cc\0LKML <linux-kernel\@vger.kernel.org>",
- " Alexei Starovoitov <ast\@kernel.org>",
- " Andy Lutomirski <luto\@amacapital.net>",
- " Daniel Borkmann <daniel\@iogearbox.net>",
- " Daniel Mack <daniel\@zonque.org>",
- " David Drysdale <drysdale\@google.com>",
- " David S . Miller <davem\@davemloft.net>",
- " Eric W . Biederman <ebiederm\@xmission.com>",
- " James Morris <james.l.morris\@oracle.com>",
- " Jann Horn <jann\@thejh.net>",
- " Kees Cook <keescook\@chromium.org>",
- " Paul Moore <pmoore\@redhat.com>",
- " Serge E . Hallyn <serge\@hallyn.com>",
- " Tejun Heo <tj\@kernel.org>",
- " Thomas Graf <tgraf\@suug.ch>",
- " Will Drewry <wad\@chromium.org>",
- " kernel-hardening\@lists.openwall.com",
- " Linux API <linux-api\@vger.kernel.org>",
- " LSM <linux-security-module\@vger.kernel.org>",
- " netdev <netdev\@vger.kernel.org>",
- " open list:CONTROL GROUP (CGROUP) <cgroups\@vger.kernel.org>\0"
+ "Cc\0LKML <linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org>",
+ " Alexei Starovoitov <ast-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org>",
+ " Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ\@public.gmane.org>",
+ " Daniel Borkmann <daniel-FeC+5ew28dpmcu3hnIyYJQ\@public.gmane.org>",
+ " Daniel Mack <daniel-cYrQPVfZoowdnm+yROfE0A\@public.gmane.org>",
+ " David Drysdale <drysdale-hpIqsD4AKlfQT0dZR+AlfA\@public.gmane.org>",
+ " David S . Miller <davem-fT/PcQaiUtIeIZ0/mPfg9Q\@public.gmane.org>",
+ " Eric W . Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w\@public.gmane.org>",
+ " James Morris <james.l.morris-QHcLZuEGTsvQT0dZR+AlfA\@public.gmane.org>",
+ " Jann Horn <jann-XZ1E9jl8jIdeoWH0uzbU5w\@public.gmane.org>",
+ " Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw\@public.gmane.org>",
+ " Paul Moore <pmoore-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+ " Serge E . Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA\@public.gmane.org>",
+ " Tejun Heo <tj-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org>",
+ " Thomas Graf <tgraf-G/eBtMaohhA\@public.gmane.org>",
+ " Will Drewry <wad-F7+t8E8rja9g9hUCZPvPmw\@public.gmane.org>",
+ " kernel-hardening-ZwoEplunGu1jrUoiu81ncdBPR1lH4CV8\@public.gmane.org",
+ " Linux API <linux-api-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org>",
+ " LSM <linux-security-module-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org>",
+ " netdev <netdev-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org>",
+ " open list:CONTROL GROUP (CGRO\0"
]
[
"\0000:1\0"
@@ -46,7 +49,7 @@
"b\0"
]
[
- "On Sun, Nov 13, 2016 at 6:23 AM, Micka\303\253l Sala\303\274n <mic\@digikod.net> wrote:\n",
+ "On Sun, Nov 13, 2016 at 6:23 AM, Micka\303\253l Sala\303\274n <mic-WFhQfpSGs3bR7s880joybQ\@public.gmane.org> wrote:\n",
"> Hi,\n",
">\n",
"> After the BoF at LPC last week, we came to a multi-step roadmap to\n",
@@ -431,10 +434,10 @@
">> constructive comments on the usability, architecture, code and userland API of\n",
">> Landlock LSM.\n",
">>\n",
- ">> [1] https://lkml.kernel.org/r/20160914072415.26021-1-mic\@digikod.net\n",
+ ">> [1] https://lkml.kernel.org/r/20160914072415.26021-1-mic-WFhQfpSGs3bR7s880joybQ\@public.gmane.org\n",
">> [2] https://crypto.stanford.edu/cs155/papers/traps.pdf\n",
">> [3] https://lkml.kernel.org/r/1477390454-12553-1-git-send-email-daniel\@zonque.org\n",
- ">> [4] https://lkml.kernel.org/r/20160829114542.GA20836\@ircssh.c.rugged-nimbus-611.internal\n",
+ ">> [4] https://lkml.kernel.org/r/20160829114542.GA20836-I4sfFR6g6EicJoAdRrHjTitQHAD/DGy2\@public.gmane.orgbus-611.internal\n",
">>\n",
">> Regards,\n",
">>\n",
@@ -514,4 +517,4 @@
"in other types of programs?"
]
-6c530fd5c61062ce2338bae4ed96f19e549f1251d9b719458976c1fb6de87893
+cd0ce8d8f96d99d13611c3f5b7b9cbb119bb0ec39380d27edd6c4ce72b4cf3dc
diff --git a/a/content_digest b/N2/content_digest
index 884663c..712625f 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -8,7 +8,7 @@
"From\0Sargun Dhillon <sargun\@sargun.me>\0"
]
[
- "Subject\0Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing\0"
+ "Subject\0[kernel-hardening] Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing\0"
]
[
"Date\0Mon, 14 Nov 2016 02:35:55 -0800\0"
@@ -514,4 +514,4 @@
"in other types of programs?"
]
-6c530fd5c61062ce2338bae4ed96f19e549f1251d9b719458976c1fb6de87893
+1abe4ebc7c733e99c5248ee276542f91f86edd4f0cb32b9c15b18fd2bea7c424
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.