All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <1535669391.28781.7.camel@intel.com>

diff --git a/a/content_digest b/N1/content_digest
index 53a4ba2..f419588 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -27,7 +27,9 @@
   Mike Kravetz <mike.kravetz@oracle.com>
   Nadav Amit <nadav.amit@gmail.com>
   Oleg Nesterov <oleg@redhat.com>
- " Peter Zijlstra <peterz@infradead.org>\0"
+  Peter Zijlstra <peterz@infradead.org>
+  Ravi V. Shankar <ravi.v.shankar@intel.com>
+ " Vedvyas Shanbhogue <vedvyas.shanbhogue@intel.com>\0"
  "\00:1\0"
  "b\0"
  "On Thu, 2018-08-30 at 22:39 +0200, Pavel Machek wrote:\n"
@@ -108,4 +110,4 @@
  "\n"
  I will work on these, thanks!
 
-8eed486e0e97f472603f603a1f5183c070d6d29aaa71fc5488ed9aedc9cafb40
+ac5404f290cc36407246db3f83037a9b58d4a21dd5f73ff8fbba63eb81c0e081

diff --git a/a/1.txt b/N2/1.txt
index 7758e12..13da1e4 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -8,11 +8,11 @@ On Thu, 2018-08-30 at 22:39 +0200, Pavel Machek wrote:
 > > --- a/Documentation/admin-guide/kernel-parameters.txt
 > > +++ b/Documentation/admin-guide/kernel-parameters.txt
 > > @@ -2764,6 +2764,12 @@
-> >  			noexec=on: enable non-executable mappings
+> > A 			noexec=on: enable non-executable mappings
 > > (default)
-> >  			noexec=off: disable non-executable
+> > A 			noexec=off: disable non-executable
 > > mappings
-> >  
+> > A 
 > > +	no_cet_ibt	[X86-64] Disable indirect branch
 > > tracking for user-mode
 > > +			applications
@@ -43,7 +43,7 @@ On Thu, 2018-08-30 at 22:39 +0200, Pavel Machek wrote:
 > 
 > > 
 > > It can be implemented
-> > +to protect both the kernel and applications.  In the first phase,
+> > +to protect both the kernel and applications.A A In the first phase,
 > > +only the user-mode protection is implemented for the 64-bit
 > > kernel.
 > > +Thirty-two bit applications are supported under the compatibility
@@ -64,7 +64,7 @@ On Thu, 2018-08-30 at 22:39 +0200, Pavel Machek wrote:
 > > +------
 > > +
 > > +The main program and its signal handlers use the same
-> > SHSTK.  Because
+> > SHSTK.A A Because
 > > +the SHSTK stores only return addresses, we can estimate a large
 > > +enough SHSTK to cover the condition that both the program stack
 > > and
@@ -72,6 +72,6 @@ On Thu, 2018-08-30 at 22:39 +0200, Pavel Machek wrote:
 > English? Is it estimate or is it large enough? "a large" -- "a"
 > should
 > be deleted AFAICT.
->  
+> A 
 
 I will work on these, thanks!
diff --git a/a/content_digest b/N2/content_digest
index 53a4ba2..6f688ed 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -27,7 +27,9 @@
   Mike Kravetz <mike.kravetz@oracle.com>
   Nadav Amit <nadav.amit@gmail.com>
   Oleg Nesterov <oleg@redhat.com>
- " Peter Zijlstra <peterz@infradead.org>\0"
+  Peter Zijlstra <peterz@infradead.org>
+  Ravi V. Shankar <ravi.v.shankar@intel.com>
+ " Vedvyas Shanbhogue <vedvyas.shanbhogue@intel.com>\0"
  "\00:1\0"
  "b\0"
  "On Thu, 2018-08-30 at 22:39 +0200, Pavel Machek wrote:\n"
@@ -40,11 +42,11 @@
  "> > --- a/Documentation/admin-guide/kernel-parameters.txt\n"
  "> > +++ b/Documentation/admin-guide/kernel-parameters.txt\n"
  "> > @@ -2764,6 +2764,12 @@\n"
- "> > \302\240\t\t\tnoexec=on: enable non-executable mappings\n"
+ "> > A \t\t\tnoexec=on: enable non-executable mappings\n"
  "> > (default)\n"
- "> > \302\240\t\t\tnoexec=off: disable non-executable\n"
+ "> > A \t\t\tnoexec=off: disable non-executable\n"
  "> > mappings\n"
- "> > \302\240\n"
+ "> > A \n"
  "> > +\tno_cet_ibt\t[X86-64] Disable indirect branch\n"
  "> > tracking for user-mode\n"
  "> > +\t\t\tapplications\n"
@@ -75,7 +77,7 @@
  "> \n"
  "> > \n"
  "> > It can be implemented\n"
- "> > +to protect both the kernel and applications.\302\240\302\240In the first phase,\n"
+ "> > +to protect both the kernel and applications.A A In the first phase,\n"
  "> > +only the user-mode protection is implemented for the 64-bit\n"
  "> > kernel.\n"
  "> > +Thirty-two bit applications are supported under the compatibility\n"
@@ -96,7 +98,7 @@
  "> > +------\n"
  "> > +\n"
  "> > +The main program and its signal handlers use the same\n"
- "> > SHSTK.\302\240\302\240Because\n"
+ "> > SHSTK.A A Because\n"
  "> > +the SHSTK stores only return addresses, we can estimate a large\n"
  "> > +enough SHSTK to cover the condition that both the program stack\n"
  "> > and\n"
@@ -104,8 +106,8 @@
  "> English? Is it estimate or is it large enough? \"a large\" -- \"a\"\n"
  "> should\n"
  "> be deleted AFAICT.\n"
- "> \302\240\n"
+ "> A \n"
  "\n"
  I will work on these, thanks!
 
-8eed486e0e97f472603f603a1f5183c070d6d29aaa71fc5488ed9aedc9cafb40
+1564e0e4c53910389db79db28b9be1bf5c948824ae35556d5b473e2861e92d18

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.