Linux Kernel Selftest development
 help / color / mirror / Atom feed
diff for duplicates of <201906072047.50371DBE2@keescook>

diff --git a/a/1.txt b/N1/1.txt
index ad20e72..ff1523d 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,4 +1,4 @@
-On Mon, Jun 03, 2019 at 06:55:05PM +0200, Andrey Konovalov wrote:
+On Mon, Jun 03, 2019@06:55:05PM +0200, Andrey Konovalov wrote:
 > This patch is a part of a series that extends arm64 kernel ABI to allow to
 > pass tagged user pointers (with the top byte set to something else other
 > than 0x00) as syscall arguments.
diff --git a/a/content_digest b/N1/content_digest
index 83d9d31..d9b6242 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,11 +1,11 @@
  "ref\0cover.1559580831.git.andreyknvl@google.com\0"
  "ref\014f17ef1902aa4f07a39f96879394e718a1f5dc1.1559580831.git.andreyknvl@google.com\0"
- "From\0keescook at chromium.org (Kees Cook)\0"
+ "From\0keescook@chromium.org (Kees Cook)\0"
  "Subject\0[PATCH v16 03/16] lib, arm64: untag user pointers in strn*_user\0"
  "Date\0Fri, 7 Jun 2019 20:48:07 -0700\0"
  "\00:1\0"
  "b\0"
- "On Mon, Jun 03, 2019 at 06:55:05PM +0200, Andrey Konovalov wrote:\n"
+ "On Mon, Jun 03, 2019@06:55:05PM +0200, Andrey Konovalov wrote:\n"
  "> This patch is a part of a series that extends arm64 kernel ABI to allow to\n"
  "> pass tagged user pointers (with the top byte set to something else other\n"
  "> than 0x00) as syscall arguments.\n"
@@ -80,4 +80,4 @@
  "-- \n"
  Kees Cook
 
-3bc799a30d97023f20f3bb30538eba518d904f3f300550c13adb6d7b67fbdf19
+8c7b68a5ab9879e6a5b36738b1684fd9f352159bda0a577b0ffc79c20b8a412d

diff --git a/a/1.txt b/N2/1.txt
index ad20e72..2ded7f8 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -12,10 +12,10 @@ On Mon, Jun 03, 2019 at 06:55:05PM +0200, Andrey Konovalov wrote:
 > Note, that this patch only temporarily untags the pointers to perform
 > validity checks, but then uses them as is to perform user memory accesses.
 > 
-> Reviewed-by: Catalin Marinas <catalin.marinas at arm.com>
-> Signed-off-by: Andrey Konovalov <andreyknvl at google.com>
+> Reviewed-by: Catalin Marinas <catalin.marinas@arm.com>
+> Signed-off-by: Andrey Konovalov <andreyknvl@google.com>
 
-Acked-by: Kees Cook <keescook at chromium.org>
+Acked-by: Kees Cook <keescook@chromium.org>
 
 -Kees
 
diff --git a/a/content_digest b/N2/content_digest
index 83d9d31..1f6794c 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -1,8 +1,48 @@
  "ref\0cover.1559580831.git.andreyknvl@google.com\0"
  "ref\014f17ef1902aa4f07a39f96879394e718a1f5dc1.1559580831.git.andreyknvl@google.com\0"
- "From\0keescook at chromium.org (Kees Cook)\0"
- "Subject\0[PATCH v16 03/16] lib, arm64: untag user pointers in strn*_user\0"
+ "From\0Kees Cook <keescook@chromium.org>\0"
+ "Subject\0Re: [PATCH v16 03/16] lib, arm64: untag user pointers in strn*_user\0"
  "Date\0Fri, 7 Jun 2019 20:48:07 -0700\0"
+ "To\0Andrey Konovalov <andreyknvl@google.com>\0"
+ "Cc\0linux-arm-kernel@lists.infradead.org"
+  linux-mm@kvack.org
+  linux-kernel@vger.kernel.org
+  amd-gfx@lists.freedesktop.org
+  dri-devel@lists.freedesktop.org
+  linux-rdma@vger.kernel.org
+  linux-media@vger.kernel.org
+  kvm@vger.kernel.org
+  linux-kselftest@vger.kernel.org
+  Catalin Marinas <catalin.marinas@arm.com>
+  Vincenzo Frascino <vincenzo.frascino@arm.com>
+  Will Deacon <will.deacon@arm.com>
+  Mark Rutland <mark.rutland@arm.com>
+  Andrew Morton <akpm@linux-foundation.org>
+  Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+  Yishai Hadas <yishaih@mellanox.com>
+  Felix Kuehling <Felix.Kuehling@amd.com>
+  Alexander Deucher <Alexander.Deucher@amd.com>
+  Christian Koenig <Christian.Koenig@amd.com>
+  Mauro Carvalho Chehab <mchehab@kernel.org>
+  Jens Wiklander <jens.wiklander@linaro.org>
+  Alex Williamson <alex.williamson@redhat.com>
+  Leon Romanovsky <leon@kernel.org>
+  Luc Van Oostenryck <luc.vanoostenryck@gmail.com>
+  Dave Martin <Dave.Martin@arm.com>
+  Khalid Aziz <khalid.aziz@oracle.com>
+  enh <enh@google.com>
+  Jason Gunthorpe <jgg@ziepe.ca>
+  Christoph Hellwig <hch@infradead.org>
+  Dmitry Vyukov <dvyukov@google.com>
+  Kostya Serebryany <kcc@google.com>
+  Evgeniy Stepanov <eugenis@google.com>
+  Lee Smith <Lee.Smith@arm.com>
+  Ramana Radhakrishnan <Ramana.Radhakrishnan@arm.com>
+  Jacob Bramley <Jacob.Bramley@arm.com>
+  Ruben Ayrapetyan <Ruben.Ayrapetyan@arm.com>
+  Robin Murphy <robin.murphy@arm.com>
+  Kevin Brodsky <kevin.brodsky@arm.com>
+ " Szabolcs Nagy <Szabolcs.Nagy@arm.com>\0"
  "\00:1\0"
  "b\0"
  "On Mon, Jun 03, 2019 at 06:55:05PM +0200, Andrey Konovalov wrote:\n"
@@ -19,10 +59,10 @@
  "> Note, that this patch only temporarily untags the pointers to perform\n"
  "> validity checks, but then uses them as is to perform user memory accesses.\n"
  "> \n"
- "> Reviewed-by: Catalin Marinas <catalin.marinas at arm.com>\n"
- "> Signed-off-by: Andrey Konovalov <andreyknvl at google.com>\n"
+ "> Reviewed-by: Catalin Marinas <catalin.marinas@arm.com>\n"
+ "> Signed-off-by: Andrey Konovalov <andreyknvl@google.com>\n"
  "\n"
- "Acked-by: Kees Cook <keescook at chromium.org>\n"
+ "Acked-by: Kees Cook <keescook@chromium.org>\n"
  "\n"
  "-Kees\n"
  "\n"
@@ -80,4 +120,4 @@
  "-- \n"
  Kees Cook
 
-3bc799a30d97023f20f3bb30538eba518d904f3f300550c13adb6d7b67fbdf19
+b371cc5a8155df3802e3e049cf4bbb00efa63b931f524559d393cae10a7d6ce3

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox