All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20170724190757.11278-15-brijesh.singh@amd.com>

diff --git a/a/1.txt b/N1/1.txt
index 80baa14..3ab8916 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,4 +1,4 @@
-From: Tom Lendacky <thomas.lendacky@amd.com>
+From: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>
 
 Early in the boot process, add checks to determine if the kernel is
 running with Secure Encrypted Virtualization (SEV) active.
@@ -19,8 +19,8 @@ us to distinguish between SME and SEV, each of which have unique
 differences in how certain things are handled: e.g. DMA (always bounce
 buffered with SEV) or EFI tables (always access decrypted with SME).
 
-Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
-Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
+Signed-off-by: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>
+Signed-off-by: Brijesh Singh <brijesh.singh-5C7GfCeVMHo@public.gmane.org>
 ---
  arch/x86/boot/compressed/Makefile      |   2 +
  arch/x86/boot/compressed/head_64.S     |  16 +++++
@@ -105,7 +105,7 @@ index 0000000..696716e
 + *
 + * Copyright (C) 2017 Advanced Micro Devices, Inc.
 + *
-+ * Author: Tom Lendacky <thomas.lendacky@amd.com>
++ * Author: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>
 + *
 + * This program is free software; you can redistribute it and/or modify
 + * it under the terms of the GNU General Public License version 2 as
diff --git a/a/content_digest b/N1/content_digest
index a8d0a53..5a327fa 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -2,7 +2,10 @@
   "ref\00020170724190757.11278-1-brijesh.singh\@amd.com\0"
 ]
 [
-  "From\0Brijesh Singh <brijesh.singh\@amd.com>\0"
+  "ref\00020170724190757.11278-1-brijesh.singh-5C7GfCeVMHo\@public.gmane.org\0"
+]
+[
+  "From\0Brijesh Singh <brijesh.singh-5C7GfCeVMHo\@public.gmane.org>\0"
 ]
 [
   "Subject\0[RFC Part1 PATCH v3 14/17] x86/boot: Add early boot support when running with SEV active\0"
@@ -11,43 +14,32 @@
   "Date\0Mon, 24 Jul 2017 14:07:54 -0500\0"
 ]
 [
-  "To\0linux-kernel\@vger.kernel.org",
-  " x86\@kernel.org",
-  " linux-efi\@vger.kernel.org",
-  " linuxppc-dev\@lists.ozlabs.org",
-  " kvm\@vger.kernel.org\0"
+  "To\0linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+  " x86-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org",
+  " linux-efi-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+  " linuxppc-dev-uLR06cmDAlY/bJ5BZ2RsiQ\@public.gmane.org",
+  " kvm-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org\0"
 ]
 [
-  "Cc\0Thomas Gleixner <tglx\@linutronix.de>",
-  " Ingo Molnar <mingo\@redhat.com>",
-  " H . Peter Anvin <hpa\@zytor.com>",
-  " Borislav Petkov <bp\@suse.de>",
-  " Andy Lutomirski <luto\@kernel.org>",
-  " Tony Luck <tony.luck\@intel.com>",
-  " Piotr Luc <piotr.luc\@intel.com>",
-  " Tom Lendacky <thomas.lendacky\@amd.com>",
-  " Fenghua Yu <fenghua.yu\@intel.com>",
-  " Lu Baolu <baolu.lu\@linux.intel.com>",
-  " Reza Arbab <arbab\@linux.vnet.ibm.com>",
-  " David Howells <dhowells\@redhat.com>",
-  " Matt Fleming <matt\@codeblueprint.co.uk>",
-  " Kirill A . Shutemov <kirill.shutemov\@linux.intel.com>",
-  " Laura Abbott <labbott\@redhat.com>",
-  " Ard Biesheuvel <ard.biesheuvel\@linaro.org>",
-  " Andrew Morton <akpm\@linux-foundation.org>",
-  " Eric Biederman <ebiederm\@xmission.com>",
-  " Benjamin Herrenschmidt <benh\@kernel.crashing.org>",
-  " Paul Mackerras <paulus\@samba.org>",
-  " Konrad Rzeszutek Wilk <konrad.wilk\@oracle.com>",
-  " Jonathan Corbet <corbet\@lwn.net>",
-  " Dave Airlie <airlied\@redhat.com>",
-  " Kees Cook <keescook\@chromium.org>",
-  " Paolo Bonzini <pbonzini\@redhat.com>",
-  " Radim Kr\304\215m\303\241\305\231 <rkrcmar\@redhat.com>",
-  " Arnd Bergmann <arnd\@arndb.de>",
-  " Tejun Heo <tj\@kernel.org>",
-  " Christoph Lameter <cl\@linux.com>",
-  " Brijesh Singh <brijesh.singh\@amd.com>\0"
+  "Cc\0Thomas Gleixner <tglx-hfZtesqFncYOwBW4kG4KsQ\@public.gmane.org>",
+  " Ingo Molnar <mingo-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+  " H . Peter Anvin <hpa-YMNOUZJC4hwAvxtiuMwx3w\@public.gmane.org>",
+  " Borislav Petkov <bp-l3A5Bk7waGM\@public.gmane.org>",
+  " Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org>",
+  " Tony Luck <tony.luck-ral2JQCrhuEAvxtiuMwx3w\@public.gmane.org>",
+  " Piotr Luc <piotr.luc-ral2JQCrhuEAvxtiuMwx3w\@public.gmane.org>",
+  " Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>",
+  " Fenghua Yu <fenghua.yu-ral2JQCrhuEAvxtiuMwx3w\@public.gmane.org>",
+  " Lu Baolu <baolu.lu-VuQAYsv1563Yd54FQh9/CA\@public.gmane.org>",
+  " Reza Arbab <arbab-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8\@public.gmane.org>",
+  " David Howells <dhowells-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+  " Matt Fleming <matt-mF/unelCI9GS6iBeEJttW/XRex20P6io\@public.gmane.org>",
+  " Kirill A . Shutemov <kirill.shutemov-VuQAYsv1563Yd54FQh9/CA\@public.gmane.org>",
+  " Laura Abbott <labbott-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+  " Ard Biesheuvel <ard.biesheuvel-QSEj5FYQhm4dnm+yROfE0A\@public.gmane.org>",
+  " Andrew Morton <akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b\@public.gmane.org>",
+  " Eric Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w\@public.gmane.org>",
+  " Benjamin Herrenschmidt <benh-XVmvHMARGAS8U2dJNN8I7kB+6BGkLq7r\@public.gmane.org>Paul Mackerras <p>\0"
 ]
 [
   "\0000:1\0"
@@ -56,7 +48,7 @@
   "b\0"
 ]
 [
-  "From: Tom Lendacky <thomas.lendacky\@amd.com>\n",
+  "From: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>\n",
   "\n",
   "Early in the boot process, add checks to determine if the kernel is\n",
   "running with Secure Encrypted Virtualization (SEV) active.\n",
@@ -77,8 +69,8 @@
   "differences in how certain things are handled: e.g. DMA (always bounce\n",
   "buffered with SEV) or EFI tables (always access decrypted with SME).\n",
   "\n",
-  "Signed-off-by: Tom Lendacky <thomas.lendacky\@amd.com>\n",
-  "Signed-off-by: Brijesh Singh <brijesh.singh\@amd.com>\n",
+  "Signed-off-by: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>\n",
+  "Signed-off-by: Brijesh Singh <brijesh.singh-5C7GfCeVMHo\@public.gmane.org>\n",
   "---\n",
   " arch/x86/boot/compressed/Makefile      |   2 +\n",
   " arch/x86/boot/compressed/head_64.S     |  16 +++++\n",
@@ -163,7 +155,7 @@
   "+ *\n",
   "+ * Copyright (C) 2017 Advanced Micro Devices, Inc.\n",
   "+ *\n",
-  "+ * Author: Tom Lendacky <thomas.lendacky\@amd.com>\n",
+  "+ * Author: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>\n",
   "+ *\n",
   "+ * This program is free software; you can redistribute it and/or modify\n",
   "+ * it under the terms of the GNU General Public License version 2 as\n",
@@ -425,4 +417,4 @@
   "2.9.4"
 ]
 
-8ad6767fc7e8d35efad7a0d6750f1c2f2b508d025e47afd0f36f0f86f98c59a1
+882aa0366d83c097dd6ae11359dc6b32e3c13ead93a1284702da3a136ea58267

diff --git a/a/1.txt b/N2/1.txt
index 80baa14..3ab8916 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -1,4 +1,4 @@
-From: Tom Lendacky <thomas.lendacky@amd.com>
+From: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>
 
 Early in the boot process, add checks to determine if the kernel is
 running with Secure Encrypted Virtualization (SEV) active.
@@ -19,8 +19,8 @@ us to distinguish between SME and SEV, each of which have unique
 differences in how certain things are handled: e.g. DMA (always bounce
 buffered with SEV) or EFI tables (always access decrypted with SME).
 
-Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
-Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
+Signed-off-by: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>
+Signed-off-by: Brijesh Singh <brijesh.singh-5C7GfCeVMHo@public.gmane.org>
 ---
  arch/x86/boot/compressed/Makefile      |   2 +
  arch/x86/boot/compressed/head_64.S     |  16 +++++
@@ -105,7 +105,7 @@ index 0000000..696716e
 + *
 + * Copyright (C) 2017 Advanced Micro Devices, Inc.
 + *
-+ * Author: Tom Lendacky <thomas.lendacky@amd.com>
++ * Author: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>
 + *
 + * This program is free software; you can redistribute it and/or modify
 + * it under the terms of the GNU General Public License version 2 as
diff --git a/a/content_digest b/N2/content_digest
index a8d0a53..e150d9e 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -2,7 +2,10 @@
   "ref\00020170724190757.11278-1-brijesh.singh\@amd.com\0"
 ]
 [
-  "From\0Brijesh Singh <brijesh.singh\@amd.com>\0"
+  "ref\00020170724190757.11278-1-brijesh.singh-5C7GfCeVMHo\@public.gmane.org\0"
+]
+[
+  "From\0Brijesh Singh <brijesh.singh-5C7GfCeVMHo\@public.gmane.org>\0"
 ]
 [
   "Subject\0[RFC Part1 PATCH v3 14/17] x86/boot: Add early boot support when running with SEV active\0"
@@ -11,43 +14,33 @@
   "Date\0Mon, 24 Jul 2017 14:07:54 -0500\0"
 ]
 [
-  "To\0linux-kernel\@vger.kernel.org",
-  " x86\@kernel.org",
-  " linux-efi\@vger.kernel.org",
-  " linuxppc-dev\@lists.ozlabs.org",
-  " kvm\@vger.kernel.org\0"
+  "To\0linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+  " x86-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org",
+  " linux-efi-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+  " linuxppc-dev-uLR06cmDAlY/bJ5BZ2RsiQ\@public.gmane.org",
+  " kvm-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org\0"
 ]
 [
-  "Cc\0Thomas Gleixner <tglx\@linutronix.de>",
-  " Ingo Molnar <mingo\@redhat.com>",
-  " H . Peter Anvin <hpa\@zytor.com>",
-  " Borislav Petkov <bp\@suse.de>",
-  " Andy Lutomirski <luto\@kernel.org>",
-  " Tony Luck <tony.luck\@intel.com>",
-  " Piotr Luc <piotr.luc\@intel.com>",
-  " Tom Lendacky <thomas.lendacky\@amd.com>",
-  " Fenghua Yu <fenghua.yu\@intel.com>",
-  " Lu Baolu <baolu.lu\@linux.intel.com>",
-  " Reza Arbab <arbab\@linux.vnet.ibm.com>",
-  " David Howells <dhowells\@redhat.com>",
-  " Matt Fleming <matt\@codeblueprint.co.uk>",
-  " Kirill A . Shutemov <kirill.shutemov\@linux.intel.com>",
-  " Laura Abbott <labbott\@redhat.com>",
-  " Ard Biesheuvel <ard.biesheuvel\@linaro.org>",
-  " Andrew Morton <akpm\@linux-foundation.org>",
-  " Eric Biederman <ebiederm\@xmission.com>",
-  " Benjamin Herrenschmidt <benh\@kernel.crashing.org>",
-  " Paul Mackerras <paulus\@samba.org>",
-  " Konrad Rzeszutek Wilk <konrad.wilk\@oracle.com>",
-  " Jonathan Corbet <corbet\@lwn.net>",
-  " Dave Airlie <airlied\@redhat.com>",
-  " Kees Cook <keescook\@chromium.org>",
-  " Paolo Bonzini <pbonzini\@redhat.com>",
-  " Radim Kr\304\215m\303\241\305\231 <rkrcmar\@redhat.com>",
-  " Arnd Bergmann <arnd\@arndb.de>",
-  " Tejun Heo <tj\@kernel.org>",
-  " Christoph Lameter <cl\@linux.com>",
-  " Brijesh Singh <brijesh.singh\@amd.com>\0"
+  "Cc\0Thomas Gleixner <tglx-hfZtesqFncYOwBW4kG4KsQ\@public.gmane.org>",
+  " Ingo Molnar <mingo-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+  " H . Peter Anvin <hpa-YMNOUZJC4hwAvxtiuMwx3w\@public.gmane.org>",
+  " Borislav Petkov <bp-l3A5Bk7waGM\@public.gmane.org>",
+  " Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org>",
+  " Tony Luck <tony.luck-ral2JQCrhuEAvxtiuMwx3w\@public.gmane.org>",
+  " Piotr Luc <piotr.luc-ral2JQCrhuEAvxtiuMwx3w\@public.gmane.org>",
+  " Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>",
+  " Fenghua Yu <fenghua.yu-ral2JQCrhuEAvxtiuMwx3w\@public.gmane.org>",
+  " Lu Baolu <baolu.lu-VuQAYsv1563Yd54FQh9/CA\@public.gmane.org>",
+  " Reza Arbab <arbab-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8\@public.gmane.org>",
+  " David Howells <dhowells-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+  " Matt Fleming <matt-mF/unelCI9GS6iBeEJttW/XRex20P6io\@public.gmane.org>",
+  " Kirill A . Shutemov <kirill.shutemov-VuQAYsv1563Yd54FQh9/CA\@public.gmane.org>",
+  " Laura Abbott <labbott-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+  " Ard Biesheuvel <ard.biesheuvel-QSEj5FYQhm4dnm+yROfE0A\@public.gmane.org>",
+  " Andrew Morton <akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b\@public.gmane.org>",
+  " Eric Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w\@public.gmane.org>",
+  " Benjamin Herrenschmidt <benh-XVmvHMARGAS8U2dJNN8I7kB+6BGkLq7r\@public.gmane.org>",
+  " Paul Mackerras <p\0"
 ]
 [
   "\0000:1\0"
@@ -56,7 +49,7 @@
   "b\0"
 ]
 [
-  "From: Tom Lendacky <thomas.lendacky\@amd.com>\n",
+  "From: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>\n",
   "\n",
   "Early in the boot process, add checks to determine if the kernel is\n",
   "running with Secure Encrypted Virtualization (SEV) active.\n",
@@ -77,8 +70,8 @@
   "differences in how certain things are handled: e.g. DMA (always bounce\n",
   "buffered with SEV) or EFI tables (always access decrypted with SME).\n",
   "\n",
-  "Signed-off-by: Tom Lendacky <thomas.lendacky\@amd.com>\n",
-  "Signed-off-by: Brijesh Singh <brijesh.singh\@amd.com>\n",
+  "Signed-off-by: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>\n",
+  "Signed-off-by: Brijesh Singh <brijesh.singh-5C7GfCeVMHo\@public.gmane.org>\n",
   "---\n",
   " arch/x86/boot/compressed/Makefile      |   2 +\n",
   " arch/x86/boot/compressed/head_64.S     |  16 +++++\n",
@@ -163,7 +156,7 @@
   "+ *\n",
   "+ * Copyright (C) 2017 Advanced Micro Devices, Inc.\n",
   "+ *\n",
-  "+ * Author: Tom Lendacky <thomas.lendacky\@amd.com>\n",
+  "+ * Author: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>\n",
   "+ *\n",
   "+ * This program is free software; you can redistribute it and/or modify\n",
   "+ * it under the terms of the GNU General Public License version 2 as\n",
@@ -425,4 +418,4 @@
   "2.9.4"
 ]
 
-8ad6767fc7e8d35efad7a0d6750f1c2f2b508d025e47afd0f36f0f86f98c59a1
+c4d21ac0e41ee198272e6da0eed00cf96a6b85a4cc41f063b30e4d43beafd155

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.