All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20160106125846.GC2671@codeblueprint.co.uk>

diff --git a/a/1.txt b/N1/1.txt
index 0a5981b..d79e0f4 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,5 +1,5 @@
-On Fri, 18 Dec, at 11:29:51AM, sylvain.chouleur-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org wrote:
-> From: Sylvain Chouleur <sylvain.chouleur-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
+On Fri, 18 Dec, at 11:29:51AM, sylvain.chouleur@gmail.com wrote:
+> From: Sylvain Chouleur <sylvain.chouleur@intel.com>
 > 
 > This patch adds an implementation of EFI runtime services wappers which
 > allow interrupts and preemption during execution of BIOS code.
@@ -22,7 +22,7 @@ On Fri, 18 Dec, at 11:29:51AM, sylvain.chouleur-Re5JQEeQqe8AvxtiuMwx3w@public.gm
 > interrupt context. EFI pstore is the only use case here, that's why we
 > require it to be disabled when activating interruptible runtime services.
 > 
-> Signed-off-by: Sylvain Chouleur <sylvain.chouleur-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
+> Signed-off-by: Sylvain Chouleur <sylvain.chouleur@intel.com>
 > ---
 >  arch/x86/Kconfig                          |  14 +++
 >  arch/x86/include/asm/efi.h                |   1 +
diff --git a/a/content_digest b/N1/content_digest
index c7b8a58..b8b4e3c 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,20 +1,19 @@
  "ref\01450434591-31104-1-git-send-email-sylvain.chouleur@gmail.com\0"
  "ref\01450434591-31104-2-git-send-email-sylvain.chouleur@gmail.com\0"
- "ref\01450434591-31104-2-git-send-email-sylvain.chouleur-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org\0"
- "From\0Matt Fleming <matt-mF/unelCI9GS6iBeEJttW/XRex20P6io@public.gmane.org>\0"
+ "From\0Matt Fleming <matt@codeblueprint.co.uk>\0"
  "Subject\0Re: [PATCH 2/2] efi: implement interruptible runtime services\0"
  "Date\0Wed, 6 Jan 2016 12:58:46 +0000\0"
- "To\0sylvain.chouleur-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org\0"
- "Cc\0linux-efi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org"
-  Sylvain Chouleur <sylvain.chouleur-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
-  linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  H. Peter Anvin <hpa-YMNOUZJC4hwAvxtiuMwx3w@public.gmane.org>
-  Ingo Molnar <mingo-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>
- " Thomas Gleixner <tglx-hfZtesqFncYOwBW4kG4KsQ@public.gmane.org>\0"
+ "To\0sylvain.chouleur@gmail.com\0"
+ "Cc\0linux-efi@vger.kernel.org"
+  Sylvain Chouleur <sylvain.chouleur@intel.com>
+  linux-kernel@vger.kernel.org
+  H. Peter Anvin <hpa@zytor.com>
+  Ingo Molnar <mingo@kernel.org>
+ " Thomas Gleixner <tglx@linutronix.de>\0"
  "\00:1\0"
  "b\0"
- "On Fri, 18 Dec, at 11:29:51AM, sylvain.chouleur-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org wrote:\n"
- "> From: Sylvain Chouleur <sylvain.chouleur-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>\n"
+ "On Fri, 18 Dec, at 11:29:51AM, sylvain.chouleur@gmail.com wrote:\n"
+ "> From: Sylvain Chouleur <sylvain.chouleur@intel.com>\n"
  "> \n"
  "> This patch adds an implementation of EFI runtime services wappers which\n"
  "> allow interrupts and preemption during execution of BIOS code.\n"
@@ -37,7 +36,7 @@
  "> interrupt context. EFI pstore is the only use case here, that's why we\n"
  "> require it to be disabled when activating interruptible runtime services.\n"
  "> \n"
- "> Signed-off-by: Sylvain Chouleur <sylvain.chouleur-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>\n"
+ "> Signed-off-by: Sylvain Chouleur <sylvain.chouleur@intel.com>\n"
  "> ---\n"
  ">  arch/x86/Kconfig                          |  14 +++\n"
  ">  arch/x86/include/asm/efi.h                |   1 +\n"
@@ -153,4 +152,4 @@
  "we don't start seeing people accidentally running with preemptible EFI\n"
  services on non-BXT hardware?
 
-7fe67665039b74ad47be54746fffab7a3badb575aa2818b5a7ae539d8e431910
+7f7deec9b957c6754413bc27329ec991950b5386107f10c3b1857f575be9424d

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.