diff for duplicates of <20160106125846.GC2671@codeblueprint.co.uk> diff --git a/a/1.txt b/N1/1.txt index 0a5981b..d79e0f4 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -1,5 +1,5 @@ -On Fri, 18 Dec, at 11:29:51AM, sylvain.chouleur-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org wrote: -> From: Sylvain Chouleur <sylvain.chouleur-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> +On Fri, 18 Dec, at 11:29:51AM, sylvain.chouleur@gmail.com wrote: +> From: Sylvain Chouleur <sylvain.chouleur@intel.com> > > This patch adds an implementation of EFI runtime services wappers which > allow interrupts and preemption during execution of BIOS code. @@ -22,7 +22,7 @@ On Fri, 18 Dec, at 11:29:51AM, sylvain.chouleur-Re5JQEeQqe8AvxtiuMwx3w@public.gm > interrupt context. EFI pstore is the only use case here, that's why we > require it to be disabled when activating interruptible runtime services. > -> Signed-off-by: Sylvain Chouleur <sylvain.chouleur-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> +> Signed-off-by: Sylvain Chouleur <sylvain.chouleur@intel.com> > --- > arch/x86/Kconfig | 14 +++ > arch/x86/include/asm/efi.h | 1 + diff --git a/a/content_digest b/N1/content_digest index c7b8a58..b8b4e3c 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -1,20 +1,19 @@ "ref\01450434591-31104-1-git-send-email-sylvain.chouleur@gmail.com\0" "ref\01450434591-31104-2-git-send-email-sylvain.chouleur@gmail.com\0" - "ref\01450434591-31104-2-git-send-email-sylvain.chouleur-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org\0" - "From\0Matt Fleming <matt-mF/unelCI9GS6iBeEJttW/XRex20P6io@public.gmane.org>\0" + "From\0Matt Fleming <matt@codeblueprint.co.uk>\0" "Subject\0Re: [PATCH 2/2] efi: implement interruptible runtime services\0" "Date\0Wed, 6 Jan 2016 12:58:46 +0000\0" - "To\0sylvain.chouleur-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org\0" - "Cc\0linux-efi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org" - Sylvain Chouleur <sylvain.chouleur-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> - linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - H. Peter Anvin <hpa-YMNOUZJC4hwAvxtiuMwx3w@public.gmane.org> - Ingo Molnar <mingo-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org> - " Thomas Gleixner <tglx-hfZtesqFncYOwBW4kG4KsQ@public.gmane.org>\0" + "To\0sylvain.chouleur@gmail.com\0" + "Cc\0linux-efi@vger.kernel.org" + Sylvain Chouleur <sylvain.chouleur@intel.com> + linux-kernel@vger.kernel.org + H. Peter Anvin <hpa@zytor.com> + Ingo Molnar <mingo@kernel.org> + " Thomas Gleixner <tglx@linutronix.de>\0" "\00:1\0" "b\0" - "On Fri, 18 Dec, at 11:29:51AM, sylvain.chouleur-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org wrote:\n" - "> From: Sylvain Chouleur <sylvain.chouleur-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>\n" + "On Fri, 18 Dec, at 11:29:51AM, sylvain.chouleur@gmail.com wrote:\n" + "> From: Sylvain Chouleur <sylvain.chouleur@intel.com>\n" "> \n" "> This patch adds an implementation of EFI runtime services wappers which\n" "> allow interrupts and preemption during execution of BIOS code.\n" @@ -37,7 +36,7 @@ "> interrupt context. EFI pstore is the only use case here, that's why we\n" "> require it to be disabled when activating interruptible runtime services.\n" "> \n" - "> Signed-off-by: Sylvain Chouleur <sylvain.chouleur-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>\n" + "> Signed-off-by: Sylvain Chouleur <sylvain.chouleur@intel.com>\n" "> ---\n" "> arch/x86/Kconfig | 14 +++\n" "> arch/x86/include/asm/efi.h | 1 +\n" @@ -153,4 +152,4 @@ "we don't start seeing people accidentally running with preemptible EFI\n" services on non-BXT hardware? -7fe67665039b74ad47be54746fffab7a3badb575aa2818b5a7ae539d8e431910 +7f7deec9b957c6754413bc27329ec991950b5386107f10c3b1857f575be9424d
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.