All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20190404154727.GA14030@cisco>

diff --git a/a/1.txt b/N1/1.txt
index 08c3379..53737ba 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,10 +1,10 @@
 On Wed, Apr 03, 2019 at 09:12:16PM -0700, Andy Lutomirski wrote:
-> On Wed, Apr 3, 2019 at 6:42 PM Tycho Andersen <tycho-E0fblnxP3wo@public.gmane.org> wrote:
+> On Wed, Apr 3, 2019 at 6:42 PM Tycho Andersen <tycho@tycho.ws> wrote:
 > >
 > > On Wed, Apr 03, 2019 at 05:12:56PM -0700, Andy Lutomirski wrote:
-> > > On Wed, Apr 3, 2019 at 10:36 AM Khalid Aziz <khalid.aziz-QHcLZuEGTsvQT0dZR+AlfA@public.gmane.org> wrote:
+> > > On Wed, Apr 3, 2019 at 10:36 AM Khalid Aziz <khalid.aziz@oracle.com> wrote:
 > > > >
-> > > > From: Tycho Andersen <tycho-E0fblnxP3wo@public.gmane.org>
+> > > > From: Tycho Andersen <tycho@tycho.ws>
 > > > >
 > > > > Oopsing might kill the task, via rewind_stack_do_exit() at the bottom, and
 > > > > that might sleep:
@@ -56,8 +56,8 @@ Thanks,
 Tycho
 
 
->From 34dce229a4f43f90db823671eb0b8da7c4906045 Mon Sep 17 00:00:00 2001
-From: Tycho Andersen <tycho-E0fblnxP3wo@public.gmane.org>
+From 34dce229a4f43f90db823671eb0b8da7c4906045 Mon Sep 17 00:00:00 2001
+From: Tycho Andersen <tycho@tycho.ws>
 Date: Thu, 4 Apr 2019 09:41:32 -0600
 Subject: [PATCH] x86/entry: re-enable interrupts before exiting
 
@@ -86,7 +86,7 @@ Aug 23 19:30:27 xpfo kernel: [   38.311680]  rewind_stack_do_exit+0x17/0x20
 do_exit() expects to be called in a well-defined environment, so let's
 re-enable interrupts after unwinding the stack, in case they were disabled.
 
-Signed-off-by: Tycho Andersen <tycho-E0fblnxP3wo@public.gmane.org>
+Signed-off-by: Tycho Andersen <tycho@tycho.ws>
 ---
  arch/x86/entry/entry_32.S | 6 ++++++
  arch/x86/entry/entry_64.S | 6 ++++++
diff --git a/a/content_digest b/N1/content_digest
index 90c8b7a..31d9bc8 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -3,45 +3,105 @@
  "ref\0CALCETrXvwuwkVSJ+S5s7wTBkNNj3fRVxpx9BvsXWrT=3ZdRnCw@mail.gmail.com\0"
  "ref\020190404013956.GA3365@cisco\0"
  "ref\0CALCETrVp37Xo3EMHkeedP1zxUMf9og=mceBa8c55e1F4G1DRSQ@mail.gmail.com\0"
- "ref\0CALCETrVp37Xo3EMHkeedP1zxUMf9og=mceBa8c55e1F4G1DRSQ-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org\0"
- "From\0Tycho Andersen <tycho-E0fblnxP3wo@public.gmane.org>\0"
+ "From\0Tycho Andersen <tycho@tycho.ws>\0"
  "Subject\0Re: [RFC PATCH v9 02/13] x86: always set IF before oopsing from page fault\0"
  "Date\0Thu, 4 Apr 2019 09:47:27 -0600\0"
- "To\0Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>\0"
- "Cc\0Mark Rutland <mark.rutland-5wv7dgnIgG8@public.gmane.org>"
-  marco.antonio.780-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org
-  Michal Hocko <mhocko-IBi9RG/b67k@public.gmane.org>
-  LKML <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
-  Greg KH <gregkh-hQyY1W1yCW8ekmWlsbkhG0B+6BGkLq7r@public.gmane.org>
-  Boris Ostrovsky <boris.ostrovsky-QHcLZuEGTsvQT0dZR+AlfA@public.gmane.org>
-  Catalin Marinas <catalin.marinas-5wv7dgnIgG8@public.gmane.org>
-  alexander.h.duyck-VuQAYsv1563Yd54FQh9/CA@public.gmane.org
-  Amir Goldstein <amir73il-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
-  X86 ML <x86-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org>
-  Keith Busch <keith.busch-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
-  Dave Hansen <dave.hansen-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
-  Khalid Aziz <khalid.aziz-QHcLZuEGTsvQT0dZR+AlfA@public.gmane.org>
-  deepa.srinivasan-QHcLZuEGTsvQT0dZR+AlfA@public.gmane.org
-  steven.sistare-QHcLZuEGTsvQT0dZR+AlfA@public.gmane.org
-  cpandya-sgV2jX0FEOL9JmXXK+q4OQ@public.gmane.org
-  Borislav Petkov <bp-Gina5bIWoIWzQB+pC5nmwQ@public.gmane.org>
-  Joao Martins <joao.m.martins-QHcLZuEGTsvQT0dZR+AlfA@public.gmane.org>
-  Christoph Hellwig <hch-jcswGhMUV9g@public.gmane.org>
-  Michal Hocko <mhocko-AlSwsSmVLrQ@public.gmane.org>
-  LSM List <linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
-  Andi Kleen <ak-VuQAYsv1563Yd54FQh9/CA@public.gmane.org>
-  H. Peter Anvin <hpa-YMNOUZJC4hwAvxtiuMwx3w@public.gmane.org>
-  Michael S. Tsirkin <mst-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
- " Jonathan Corbet <corbet-T1hC0tSOHrs@public.gmane.org>an\0"
+ "To\0Andy Lutomirski <luto@kernel.org>\0"
+ "Cc\0Khalid Aziz <khalid.aziz@oracle.com>"
+  Juerg Haefliger <juergh@gmail.com>
+  jsteckli@amazon.de
+  Andi Kleen <ak@linux.intel.com>
+  liran.alon@oracle.com
+  Kees Cook <keescook@google.com>
+  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
+  deepa.srinivasan@oracle.com
+  chris hyser <chris.hyser@oracle.com>
+  Tyler Hicks <tyhicks@canonical.com>
+  Woodhouse
+  David <dwmw@amazon.co.uk>
+  Andrew Cooper <andrew.cooper3@citrix.com>
+  Jon Masters <jcm@redhat.com>
+  Boris Ostrovsky <boris.ostrovsky@oracle.com>
+  kanth.ghatraju@oracle.com
+  Joao Martins <joao.m.martins@oracle.com>
+  Jim Mattson <jmattson@google.com>
+  pradeep.vincent@oracle.com
+  John Haxby <john.haxby@oracle.com>
+  Thomas Gleixner <tglx@linutronix.de>
+  Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
+  Christoph Hellwig <hch@lst.de>
+  steven.sistare@oracle.com
+  Laura Abbott <labbott@redhat.com>
+  Dave Hansen <dave.hansen@intel.com>
+  Peter Zijlstra <peterz@infradead.org>
+  Aaron Lu <aaron.lu@intel.com>
+  Andrew Morton <akpm@linux-foundation.org>
+  alexander.h.duyck@linux.intel.com
+  Amir Goldstein <amir73il@gmail.com>
+  Andrey Konovalov <andreyknvl@google.com>
+  aneesh.kumar@linux.ibm.com
+  anthony.yznaga@oracle.com
+  Ard Biesheuvel <ard.biesheuvel@linaro.org>
+  Arnd Bergmann <arnd@arndb.de>
+  arunks@codeaurora.org
+  Ben Hutchings <ben@decadent.org.uk>
+  Sebastian Andrzej Siewior <bigeasy@linutronix.de>
+  Borislav Petkov <bp@alien8.de>
+  brgl@bgdev.pl
+  Catalin Marinas <catalin.marinas@arm.com>
+  Jonathan Corbet <corbet@lwn.net>
+  cpandya@codeaurora.org
+  Daniel Vetter <daniel.vetter@ffwll.ch>
+  Dan Williams <dan.j.williams@intel.com>
+  Greg KH <gregkh@linuxfoundation.org>
+  Roman Gushchin <guro@fb.com>
+  Johannes Weiner <hannes@cmpxchg.org>
+  H. Peter Anvin <hpa@zytor.com>
+  Joonsoo Kim <iamjoonsoo.kim@lge.com>
+  James Morse <james.morse@arm.com>
+  Jann Horn <jannh@google.com>
+  Juergen Gross <jgross@suse.com>
+  Jiri Kosina <jkosina@suse.cz>
+  James Morris <jmorris@namei.org>
+  Joe Perches <joe@perches.com>
+  Souptick Joarder <jrdr.linux@gmail.com>
+  Joerg Roedel <jroedel@suse.de>
+  Keith Busch <keith.busch@intel.com>
+  Konstantin Khlebnikov <khlebnikov@yandex-team.ru>
+  Logan Gunthorpe <logang@deltatee.com>
+  marco.antonio.780@gmail.com
+  Mark Rutland <mark.rutland@arm.com>
+  Mel Gorman <mgorman@techsingularity.net>
+  Michal Hocko <mhocko@suse.com>
+  Michal Hocko <mhocko@suse.cz>
+  Mike Kravetz <mike.kravetz@oracle.com>
+  Ingo Molnar <mingo@redhat.com>
+  Michael S. Tsirkin <mst@redhat.com>
+  Marek Szyprowski <m.szyprowski@samsung.com>
+  Nicholas Piggin <npiggin@gmail.com>
+  osalvador@suse.de
+  Paul E. McKenney <paulmck@linux.vnet.ibm.com>
+  pavel.tatashin@microsoft.com
+  Randy Dunlap <rdunlap@infradead.org>
+  richard.weiyang@gmail.com
+  Serge E. Hallyn <serge@hallyn.com>
+  iommu@lists.linux-foundation.org
+  X86 ML <x86@kernel.org>
+  linux-arm-kernel <linux-arm-kernel@lists.infradead.org>
+  open list:DOCUMENTATION <linux-doc@vger.kernel.org>
+  LKML <linux-kernel@vger.kernel.org>
+  Linux-MM <linux-mm@kvack.org>
+  LSM List <linux-security-module@vger.kernel.org>
+ " Khalid Aziz <khalid@gonehiking.org>\0"
  "\00:1\0"
  "b\0"
  "On Wed, Apr 03, 2019 at 09:12:16PM -0700, Andy Lutomirski wrote:\n"
- "> On Wed, Apr 3, 2019 at 6:42 PM Tycho Andersen <tycho-E0fblnxP3wo@public.gmane.org> wrote:\n"
+ "> On Wed, Apr 3, 2019 at 6:42 PM Tycho Andersen <tycho@tycho.ws> wrote:\n"
  "> >\n"
  "> > On Wed, Apr 03, 2019 at 05:12:56PM -0700, Andy Lutomirski wrote:\n"
- "> > > On Wed, Apr 3, 2019 at 10:36 AM Khalid Aziz <khalid.aziz-QHcLZuEGTsvQT0dZR+AlfA@public.gmane.org> wrote:\n"
+ "> > > On Wed, Apr 3, 2019 at 10:36 AM Khalid Aziz <khalid.aziz@oracle.com> wrote:\n"
  "> > > >\n"
- "> > > > From: Tycho Andersen <tycho-E0fblnxP3wo@public.gmane.org>\n"
+ "> > > > From: Tycho Andersen <tycho@tycho.ws>\n"
  "> > > >\n"
  "> > > > Oopsing might kill the task, via rewind_stack_do_exit() at the bottom, and\n"
  "> > > > that might sleep:\n"
@@ -93,8 +153,8 @@
  "Tycho\n"
  "\n"
  "\n"
- ">From 34dce229a4f43f90db823671eb0b8da7c4906045 Mon Sep 17 00:00:00 2001\n"
- "From: Tycho Andersen <tycho-E0fblnxP3wo@public.gmane.org>\n"
+ "From 34dce229a4f43f90db823671eb0b8da7c4906045 Mon Sep 17 00:00:00 2001\n"
+ "From: Tycho Andersen <tycho@tycho.ws>\n"
  "Date: Thu, 4 Apr 2019 09:41:32 -0600\n"
  "Subject: [PATCH] x86/entry: re-enable interrupts before exiting\n"
  "\n"
@@ -123,7 +183,7 @@
  "do_exit() expects to be called in a well-defined environment, so let's\n"
  "re-enable interrupts after unwinding the stack, in case they were disabled.\n"
  "\n"
- "Signed-off-by: Tycho Andersen <tycho-E0fblnxP3wo@public.gmane.org>\n"
+ "Signed-off-by: Tycho Andersen <tycho@tycho.ws>\n"
  "---\n"
  " arch/x86/entry/entry_32.S | 6 ++++++\n"
  " arch/x86/entry/entry_64.S | 6 ++++++\n"
@@ -165,4 +225,4 @@
  "-- \n"
  2.19.1
 
-5e02381aeb57f2a32b5e4668e60d4669a86e45f54cac09b33b94cb6123cc8685
+51b442bd9eb22c15958a362d2009b7f7ea2c1b19d4ef1d056fc2ab01559914ac

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.