All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <CAMp4zn8u3kg-nhiZ5rSUCLGveAzHr6FoP1x=iJasF2W0S56WfA@mail.gmail.com>

diff --git a/a/1.txt b/N1/1.txt
index 4033739..1fa9820 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,4 +1,4 @@
-On Sun, Nov 13, 2016 at 6:23 AM, Mickaël Salaün <mic@digikod.net> wrote:
+On Sun, Nov 13, 2016 at 6:23 AM, Mickaël Salaün <mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org> wrote:
 > Hi,
 >
 > After the BoF at LPC last week, we came to a multi-step roadmap to
@@ -383,10 +383,10 @@ On Sun, Nov 13, 2016 at 6:23 AM, Mickaël Salaün <mic@digikod.net> wrote:
 >> constructive comments on the usability, architecture, code and userland API of
 >> Landlock LSM.
 >>
->> [1] https://lkml.kernel.org/r/20160914072415.26021-1-mic@digikod.net
+>> [1] https://lkml.kernel.org/r/20160914072415.26021-1-mic-WFhQfpSGs3bR7s880joybQ@public.gmane.org
 >> [2] https://crypto.stanford.edu/cs155/papers/traps.pdf
 >> [3] https://lkml.kernel.org/r/1477390454-12553-1-git-send-email-daniel@zonque.org
->> [4] https://lkml.kernel.org/r/20160829114542.GA20836@ircssh.c.rugged-nimbus-611.internal
+>> [4] https://lkml.kernel.org/r/20160829114542.GA20836-I4sfFR6g6EicJoAdRrHjTitQHAD/DGy2@public.gmane.orgbus-611.internal
 >>
 >> Regards,
 >>
diff --git a/a/content_digest b/N1/content_digest
index 884663c..ccf45d8 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -5,7 +5,10 @@
   "ref\0005828776A.1010104\@digikod.net\0"
 ]
 [
-  "From\0Sargun Dhillon <sargun\@sargun.me>\0"
+  "ref\0005828776A.1010104-WFhQfpSGs3bR7s880joybQ\@public.gmane.org\0"
+]
+[
+  "From\0Sargun Dhillon <sargun-GaZTRHToo+CzQB+pC5nmwQ\@public.gmane.org>\0"
 ]
 [
   "Subject\0Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing\0"
@@ -14,30 +17,30 @@
   "Date\0Mon, 14 Nov 2016 02:35:55 -0800\0"
 ]
 [
-  "To\0Micka\303\253l Sala\303\274n <mic\@digikod.net>\0"
+  "To\0Micka\303\253l Sala\303\274n <mic-WFhQfpSGs3bR7s880joybQ\@public.gmane.org>\0"
 ]
 [
-  "Cc\0LKML <linux-kernel\@vger.kernel.org>",
-  " Alexei Starovoitov <ast\@kernel.org>",
-  " Andy Lutomirski <luto\@amacapital.net>",
-  " Daniel Borkmann <daniel\@iogearbox.net>",
-  " Daniel Mack <daniel\@zonque.org>",
-  " David Drysdale <drysdale\@google.com>",
-  " David S . Miller <davem\@davemloft.net>",
-  " Eric W . Biederman <ebiederm\@xmission.com>",
-  " James Morris <james.l.morris\@oracle.com>",
-  " Jann Horn <jann\@thejh.net>",
-  " Kees Cook <keescook\@chromium.org>",
-  " Paul Moore <pmoore\@redhat.com>",
-  " Serge E . Hallyn <serge\@hallyn.com>",
-  " Tejun Heo <tj\@kernel.org>",
-  " Thomas Graf <tgraf\@suug.ch>",
-  " Will Drewry <wad\@chromium.org>",
-  " kernel-hardening\@lists.openwall.com",
-  " Linux API <linux-api\@vger.kernel.org>",
-  " LSM <linux-security-module\@vger.kernel.org>",
-  " netdev <netdev\@vger.kernel.org>",
-  " open list:CONTROL GROUP (CGROUP) <cgroups\@vger.kernel.org>\0"
+  "Cc\0LKML <linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org>",
+  " Alexei Starovoitov <ast-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org>",
+  " Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ\@public.gmane.org>",
+  " Daniel Borkmann <daniel-FeC+5ew28dpmcu3hnIyYJQ\@public.gmane.org>",
+  " Daniel Mack <daniel-cYrQPVfZoowdnm+yROfE0A\@public.gmane.org>",
+  " David Drysdale <drysdale-hpIqsD4AKlfQT0dZR+AlfA\@public.gmane.org>",
+  " David S . Miller <davem-fT/PcQaiUtIeIZ0/mPfg9Q\@public.gmane.org>",
+  " Eric W . Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w\@public.gmane.org>",
+  " James Morris <james.l.morris-QHcLZuEGTsvQT0dZR+AlfA\@public.gmane.org>",
+  " Jann Horn <jann-XZ1E9jl8jIdeoWH0uzbU5w\@public.gmane.org>",
+  " Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw\@public.gmane.org>",
+  " Paul Moore <pmoore-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+  " Serge E . Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA\@public.gmane.org>",
+  " Tejun Heo <tj-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org>",
+  " Thomas Graf <tgraf-G/eBtMaohhA\@public.gmane.org>",
+  " Will Drewry <wad-F7+t8E8rja9g9hUCZPvPmw\@public.gmane.org>",
+  " kernel-hardening-ZwoEplunGu1jrUoiu81ncdBPR1lH4CV8\@public.gmane.org",
+  " Linux API <linux-api-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org>",
+  " LSM <linux-security-module-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org>",
+  " netdev <netdev-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org>",
+  " open list:CONTROL GROUP (CGRO\0"
 ]
 [
   "\0000:1\0"
@@ -46,7 +49,7 @@
   "b\0"
 ]
 [
-  "On Sun, Nov 13, 2016 at 6:23 AM, Micka\303\253l Sala\303\274n <mic\@digikod.net> wrote:\n",
+  "On Sun, Nov 13, 2016 at 6:23 AM, Micka\303\253l Sala\303\274n <mic-WFhQfpSGs3bR7s880joybQ\@public.gmane.org> wrote:\n",
   "> Hi,\n",
   ">\n",
   "> After the BoF at LPC last week, we came to a multi-step roadmap to\n",
@@ -431,10 +434,10 @@
   ">> constructive comments on the usability, architecture, code and userland API of\n",
   ">> Landlock LSM.\n",
   ">>\n",
-  ">> [1] https://lkml.kernel.org/r/20160914072415.26021-1-mic\@digikod.net\n",
+  ">> [1] https://lkml.kernel.org/r/20160914072415.26021-1-mic-WFhQfpSGs3bR7s880joybQ\@public.gmane.org\n",
   ">> [2] https://crypto.stanford.edu/cs155/papers/traps.pdf\n",
   ">> [3] https://lkml.kernel.org/r/1477390454-12553-1-git-send-email-daniel\@zonque.org\n",
-  ">> [4] https://lkml.kernel.org/r/20160829114542.GA20836\@ircssh.c.rugged-nimbus-611.internal\n",
+  ">> [4] https://lkml.kernel.org/r/20160829114542.GA20836-I4sfFR6g6EicJoAdRrHjTitQHAD/DGy2\@public.gmane.orgbus-611.internal\n",
   ">>\n",
   ">> Regards,\n",
   ">>\n",
@@ -514,4 +517,4 @@
   "in other types of programs?"
 ]
 
-6c530fd5c61062ce2338bae4ed96f19e549f1251d9b719458976c1fb6de87893
+cd0ce8d8f96d99d13611c3f5b7b9cbb119bb0ec39380d27edd6c4ce72b4cf3dc

diff --git a/a/content_digest b/N2/content_digest
index 884663c..712625f 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -8,7 +8,7 @@
   "From\0Sargun Dhillon <sargun\@sargun.me>\0"
 ]
 [
-  "Subject\0Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing\0"
+  "Subject\0[kernel-hardening] Re: [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing\0"
 ]
 [
   "Date\0Mon, 14 Nov 2016 02:35:55 -0800\0"
@@ -514,4 +514,4 @@
   "in other types of programs?"
 ]
 
-6c530fd5c61062ce2338bae4ed96f19e549f1251d9b719458976c1fb6de87893
+1abe4ebc7c733e99c5248ee276542f91f86edd4f0cb32b9c15b18fd2bea7c424

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.