Linux Kernel Selftest development
 help / color / mirror / Atom feed
diff for duplicates of <201906072051.3047B3DC56@keescook>

diff --git a/a/1.txt b/N1/1.txt
index 31d1b2c..390c653 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,4 +1,4 @@
-On Mon, Jun 03, 2019 at 06:55:04PM +0200, Andrey Konovalov wrote:
+On Mon, Jun 03, 2019@06:55:04PM +0200, Andrey Konovalov wrote:
 > This patch is a part of a series that extends arm64 kernel ABI to allow to
 > pass tagged user pointers (with the top byte set to something else other
 > than 0x00) as syscall arguments.
diff --git a/a/content_digest b/N1/content_digest
index 9253083..161e6f3 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,11 +1,11 @@
  "ref\0cover.1559580831.git.andreyknvl@google.com\0"
  "ref\04327b260fb17c4776a1e3c844f388e4948cfb747.1559580831.git.andreyknvl@google.com\0"
- "From\0keescook at chromium.org (Kees Cook)\0"
+ "From\0keescook@chromium.org (Kees Cook)\0"
  "Subject\0[PATCH v16 02/16] arm64: untag user pointers in access_ok and __uaccess_mask_ptr\0"
  "Date\0Fri, 7 Jun 2019 20:51:08 -0700\0"
  "\00:1\0"
  "b\0"
- "On Mon, Jun 03, 2019 at 06:55:04PM +0200, Andrey Konovalov wrote:\n"
+ "On Mon, Jun 03, 2019@06:55:04PM +0200, Andrey Konovalov wrote:\n"
  "> This patch is a part of a series that extends arm64 kernel ABI to allow to\n"
  "> pass tagged user pointers (with the top byte set to something else other\n"
  "> than 0x00) as syscall arguments.\n"
@@ -76,4 +76,4 @@
  "-- \n"
  Kees Cook
 
-696548a444dfa7f764b4b2d27b1f03c051198896e5e9cb4c4cc07dd57d7f36b9
+c7c618489deb199b79c1ee2f29b8671ca6072c4cab78d035364f90e6bb52dc30

diff --git a/a/1.txt b/N2/1.txt
index 31d1b2c..8616935 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -14,10 +14,10 @@ On Mon, Jun 03, 2019 at 06:55:04PM +0200, Andrey Konovalov wrote:
 > Note, that this patch only temporarily untags the pointers to perform the
 > checks, but then passes them as is into the kernel internals.
 > 
-> Reviewed-by: Catalin Marinas <catalin.marinas at arm.com>
-> Signed-off-by: Andrey Konovalov <andreyknvl at google.com>
+> Reviewed-by: Catalin Marinas <catalin.marinas@arm.com>
+> Signed-off-by: Andrey Konovalov <andreyknvl@google.com>
 
-Reviewed-by: Kees Cook <keescook at chromium.org>
+Reviewed-by: Kees Cook <keescook@chromium.org>
 
 -Kees
 
diff --git a/a/content_digest b/N2/content_digest
index 9253083..53d334e 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -1,8 +1,48 @@
  "ref\0cover.1559580831.git.andreyknvl@google.com\0"
  "ref\04327b260fb17c4776a1e3c844f388e4948cfb747.1559580831.git.andreyknvl@google.com\0"
- "From\0keescook at chromium.org (Kees Cook)\0"
- "Subject\0[PATCH v16 02/16] arm64: untag user pointers in access_ok and __uaccess_mask_ptr\0"
+ "From\0Kees Cook <keescook@chromium.org>\0"
+ "Subject\0Re: [PATCH v16 02/16] arm64: untag user pointers in access_ok and __uaccess_mask_ptr\0"
  "Date\0Fri, 7 Jun 2019 20:51:08 -0700\0"
+ "To\0Andrey Konovalov <andreyknvl@google.com>\0"
+ "Cc\0linux-arm-kernel@lists.infradead.org"
+  linux-mm@kvack.org
+  linux-kernel@vger.kernel.org
+  amd-gfx@lists.freedesktop.org
+  dri-devel@lists.freedesktop.org
+  linux-rdma@vger.kernel.org
+  linux-media@vger.kernel.org
+  kvm@vger.kernel.org
+  linux-kselftest@vger.kernel.org
+  Catalin Marinas <catalin.marinas@arm.com>
+  Vincenzo Frascino <vincenzo.frascino@arm.com>
+  Will Deacon <will.deacon@arm.com>
+  Mark Rutland <mark.rutland@arm.com>
+  Andrew Morton <akpm@linux-foundation.org>
+  Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+  Yishai Hadas <yishaih@mellanox.com>
+  Felix Kuehling <Felix.Kuehling@amd.com>
+  Alexander Deucher <Alexander.Deucher@amd.com>
+  Christian Koenig <Christian.Koenig@amd.com>
+  Mauro Carvalho Chehab <mchehab@kernel.org>
+  Jens Wiklander <jens.wiklander@linaro.org>
+  Alex Williamson <alex.williamson@redhat.com>
+  Leon Romanovsky <leon@kernel.org>
+  Luc Van Oostenryck <luc.vanoostenryck@gmail.com>
+  Dave Martin <Dave.Martin@arm.com>
+  Khalid Aziz <khalid.aziz@oracle.com>
+  enh <enh@google.com>
+  Jason Gunthorpe <jgg@ziepe.ca>
+  Christoph Hellwig <hch@infradead.org>
+  Dmitry Vyukov <dvyukov@google.com>
+  Kostya Serebryany <kcc@google.com>
+  Evgeniy Stepanov <eugenis@google.com>
+  Lee Smith <Lee.Smith@arm.com>
+  Ramana Radhakrishnan <Ramana.Radhakrishnan@arm.com>
+  Jacob Bramley <Jacob.Bramley@arm.com>
+  Ruben Ayrapetyan <Ruben.Ayrapetyan@arm.com>
+  Robin Murphy <robin.murphy@arm.com>
+  Kevin Brodsky <kevin.brodsky@arm.com>
+ " Szabolcs Nagy <Szabolcs.Nagy@arm.com>\0"
  "\00:1\0"
  "b\0"
  "On Mon, Jun 03, 2019 at 06:55:04PM +0200, Andrey Konovalov wrote:\n"
@@ -21,10 +61,10 @@
  "> Note, that this patch only temporarily untags the pointers to perform the\n"
  "> checks, but then passes them as is into the kernel internals.\n"
  "> \n"
- "> Reviewed-by: Catalin Marinas <catalin.marinas at arm.com>\n"
- "> Signed-off-by: Andrey Konovalov <andreyknvl at google.com>\n"
+ "> Reviewed-by: Catalin Marinas <catalin.marinas@arm.com>\n"
+ "> Signed-off-by: Andrey Konovalov <andreyknvl@google.com>\n"
  "\n"
- "Reviewed-by: Kees Cook <keescook at chromium.org>\n"
+ "Reviewed-by: Kees Cook <keescook@chromium.org>\n"
  "\n"
  "-Kees\n"
  "\n"
@@ -76,4 +116,4 @@
  "-- \n"
  Kees Cook
 
-696548a444dfa7f764b4b2d27b1f03c051198896e5e9cb4c4cc07dd57d7f36b9
+f4b93696d2355ab46f207972b2600f89d384175469c7d1ee0b1d46824e989b1f

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox