diff for duplicates of <20170724190757.11278-15-brijesh.singh@amd.com>
diff --git a/a/1.txt b/N1/1.txt
index 80baa14..3ab8916 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,4 +1,4 @@
-From: Tom Lendacky <thomas.lendacky@amd.com>
+From: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>
Early in the boot process, add checks to determine if the kernel is
running with Secure Encrypted Virtualization (SEV) active.
@@ -19,8 +19,8 @@ us to distinguish between SME and SEV, each of which have unique
differences in how certain things are handled: e.g. DMA (always bounce
buffered with SEV) or EFI tables (always access decrypted with SME).
-Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
-Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
+Signed-off-by: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>
+Signed-off-by: Brijesh Singh <brijesh.singh-5C7GfCeVMHo@public.gmane.org>
---
arch/x86/boot/compressed/Makefile | 2 +
arch/x86/boot/compressed/head_64.S | 16 +++++
@@ -105,7 +105,7 @@ index 0000000..696716e
+ *
+ * Copyright (C) 2017 Advanced Micro Devices, Inc.
+ *
-+ * Author: Tom Lendacky <thomas.lendacky@amd.com>
++ * Author: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 2 as
diff --git a/a/content_digest b/N1/content_digest
index a8d0a53..5a327fa 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -2,7 +2,10 @@
"ref\00020170724190757.11278-1-brijesh.singh\@amd.com\0"
]
[
- "From\0Brijesh Singh <brijesh.singh\@amd.com>\0"
+ "ref\00020170724190757.11278-1-brijesh.singh-5C7GfCeVMHo\@public.gmane.org\0"
+]
+[
+ "From\0Brijesh Singh <brijesh.singh-5C7GfCeVMHo\@public.gmane.org>\0"
]
[
"Subject\0[RFC Part1 PATCH v3 14/17] x86/boot: Add early boot support when running with SEV active\0"
@@ -11,43 +14,32 @@
"Date\0Mon, 24 Jul 2017 14:07:54 -0500\0"
]
[
- "To\0linux-kernel\@vger.kernel.org",
- " x86\@kernel.org",
- " linux-efi\@vger.kernel.org",
- " linuxppc-dev\@lists.ozlabs.org",
- " kvm\@vger.kernel.org\0"
+ "To\0linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " x86-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org",
+ " linux-efi-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " linuxppc-dev-uLR06cmDAlY/bJ5BZ2RsiQ\@public.gmane.org",
+ " kvm-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org\0"
]
[
- "Cc\0Thomas Gleixner <tglx\@linutronix.de>",
- " Ingo Molnar <mingo\@redhat.com>",
- " H . Peter Anvin <hpa\@zytor.com>",
- " Borislav Petkov <bp\@suse.de>",
- " Andy Lutomirski <luto\@kernel.org>",
- " Tony Luck <tony.luck\@intel.com>",
- " Piotr Luc <piotr.luc\@intel.com>",
- " Tom Lendacky <thomas.lendacky\@amd.com>",
- " Fenghua Yu <fenghua.yu\@intel.com>",
- " Lu Baolu <baolu.lu\@linux.intel.com>",
- " Reza Arbab <arbab\@linux.vnet.ibm.com>",
- " David Howells <dhowells\@redhat.com>",
- " Matt Fleming <matt\@codeblueprint.co.uk>",
- " Kirill A . Shutemov <kirill.shutemov\@linux.intel.com>",
- " Laura Abbott <labbott\@redhat.com>",
- " Ard Biesheuvel <ard.biesheuvel\@linaro.org>",
- " Andrew Morton <akpm\@linux-foundation.org>",
- " Eric Biederman <ebiederm\@xmission.com>",
- " Benjamin Herrenschmidt <benh\@kernel.crashing.org>",
- " Paul Mackerras <paulus\@samba.org>",
- " Konrad Rzeszutek Wilk <konrad.wilk\@oracle.com>",
- " Jonathan Corbet <corbet\@lwn.net>",
- " Dave Airlie <airlied\@redhat.com>",
- " Kees Cook <keescook\@chromium.org>",
- " Paolo Bonzini <pbonzini\@redhat.com>",
- " Radim Kr\304\215m\303\241\305\231 <rkrcmar\@redhat.com>",
- " Arnd Bergmann <arnd\@arndb.de>",
- " Tejun Heo <tj\@kernel.org>",
- " Christoph Lameter <cl\@linux.com>",
- " Brijesh Singh <brijesh.singh\@amd.com>\0"
+ "Cc\0Thomas Gleixner <tglx-hfZtesqFncYOwBW4kG4KsQ\@public.gmane.org>",
+ " Ingo Molnar <mingo-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+ " H . Peter Anvin <hpa-YMNOUZJC4hwAvxtiuMwx3w\@public.gmane.org>",
+ " Borislav Petkov <bp-l3A5Bk7waGM\@public.gmane.org>",
+ " Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org>",
+ " Tony Luck <tony.luck-ral2JQCrhuEAvxtiuMwx3w\@public.gmane.org>",
+ " Piotr Luc <piotr.luc-ral2JQCrhuEAvxtiuMwx3w\@public.gmane.org>",
+ " Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>",
+ " Fenghua Yu <fenghua.yu-ral2JQCrhuEAvxtiuMwx3w\@public.gmane.org>",
+ " Lu Baolu <baolu.lu-VuQAYsv1563Yd54FQh9/CA\@public.gmane.org>",
+ " Reza Arbab <arbab-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8\@public.gmane.org>",
+ " David Howells <dhowells-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+ " Matt Fleming <matt-mF/unelCI9GS6iBeEJttW/XRex20P6io\@public.gmane.org>",
+ " Kirill A . Shutemov <kirill.shutemov-VuQAYsv1563Yd54FQh9/CA\@public.gmane.org>",
+ " Laura Abbott <labbott-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+ " Ard Biesheuvel <ard.biesheuvel-QSEj5FYQhm4dnm+yROfE0A\@public.gmane.org>",
+ " Andrew Morton <akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b\@public.gmane.org>",
+ " Eric Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w\@public.gmane.org>",
+ " Benjamin Herrenschmidt <benh-XVmvHMARGAS8U2dJNN8I7kB+6BGkLq7r\@public.gmane.org>Paul Mackerras <p>\0"
]
[
"\0000:1\0"
@@ -56,7 +48,7 @@
"b\0"
]
[
- "From: Tom Lendacky <thomas.lendacky\@amd.com>\n",
+ "From: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>\n",
"\n",
"Early in the boot process, add checks to determine if the kernel is\n",
"running with Secure Encrypted Virtualization (SEV) active.\n",
@@ -77,8 +69,8 @@
"differences in how certain things are handled: e.g. DMA (always bounce\n",
"buffered with SEV) or EFI tables (always access decrypted with SME).\n",
"\n",
- "Signed-off-by: Tom Lendacky <thomas.lendacky\@amd.com>\n",
- "Signed-off-by: Brijesh Singh <brijesh.singh\@amd.com>\n",
+ "Signed-off-by: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>\n",
+ "Signed-off-by: Brijesh Singh <brijesh.singh-5C7GfCeVMHo\@public.gmane.org>\n",
"---\n",
" arch/x86/boot/compressed/Makefile | 2 +\n",
" arch/x86/boot/compressed/head_64.S | 16 +++++\n",
@@ -163,7 +155,7 @@
"+ *\n",
"+ * Copyright (C) 2017 Advanced Micro Devices, Inc.\n",
"+ *\n",
- "+ * Author: Tom Lendacky <thomas.lendacky\@amd.com>\n",
+ "+ * Author: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>\n",
"+ *\n",
"+ * This program is free software; you can redistribute it and/or modify\n",
"+ * it under the terms of the GNU General Public License version 2 as\n",
@@ -425,4 +417,4 @@
"2.9.4"
]
-8ad6767fc7e8d35efad7a0d6750f1c2f2b508d025e47afd0f36f0f86f98c59a1
+882aa0366d83c097dd6ae11359dc6b32e3c13ead93a1284702da3a136ea58267
diff --git a/a/1.txt b/N2/1.txt
index 80baa14..3ab8916 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -1,4 +1,4 @@
-From: Tom Lendacky <thomas.lendacky@amd.com>
+From: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>
Early in the boot process, add checks to determine if the kernel is
running with Secure Encrypted Virtualization (SEV) active.
@@ -19,8 +19,8 @@ us to distinguish between SME and SEV, each of which have unique
differences in how certain things are handled: e.g. DMA (always bounce
buffered with SEV) or EFI tables (always access decrypted with SME).
-Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
-Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
+Signed-off-by: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>
+Signed-off-by: Brijesh Singh <brijesh.singh-5C7GfCeVMHo@public.gmane.org>
---
arch/x86/boot/compressed/Makefile | 2 +
arch/x86/boot/compressed/head_64.S | 16 +++++
@@ -105,7 +105,7 @@ index 0000000..696716e
+ *
+ * Copyright (C) 2017 Advanced Micro Devices, Inc.
+ *
-+ * Author: Tom Lendacky <thomas.lendacky@amd.com>
++ * Author: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 2 as
diff --git a/a/content_digest b/N2/content_digest
index a8d0a53..e150d9e 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -2,7 +2,10 @@
"ref\00020170724190757.11278-1-brijesh.singh\@amd.com\0"
]
[
- "From\0Brijesh Singh <brijesh.singh\@amd.com>\0"
+ "ref\00020170724190757.11278-1-brijesh.singh-5C7GfCeVMHo\@public.gmane.org\0"
+]
+[
+ "From\0Brijesh Singh <brijesh.singh-5C7GfCeVMHo\@public.gmane.org>\0"
]
[
"Subject\0[RFC Part1 PATCH v3 14/17] x86/boot: Add early boot support when running with SEV active\0"
@@ -11,43 +14,33 @@
"Date\0Mon, 24 Jul 2017 14:07:54 -0500\0"
]
[
- "To\0linux-kernel\@vger.kernel.org",
- " x86\@kernel.org",
- " linux-efi\@vger.kernel.org",
- " linuxppc-dev\@lists.ozlabs.org",
- " kvm\@vger.kernel.org\0"
+ "To\0linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " x86-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org",
+ " linux-efi-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " linuxppc-dev-uLR06cmDAlY/bJ5BZ2RsiQ\@public.gmane.org",
+ " kvm-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org\0"
]
[
- "Cc\0Thomas Gleixner <tglx\@linutronix.de>",
- " Ingo Molnar <mingo\@redhat.com>",
- " H . Peter Anvin <hpa\@zytor.com>",
- " Borislav Petkov <bp\@suse.de>",
- " Andy Lutomirski <luto\@kernel.org>",
- " Tony Luck <tony.luck\@intel.com>",
- " Piotr Luc <piotr.luc\@intel.com>",
- " Tom Lendacky <thomas.lendacky\@amd.com>",
- " Fenghua Yu <fenghua.yu\@intel.com>",
- " Lu Baolu <baolu.lu\@linux.intel.com>",
- " Reza Arbab <arbab\@linux.vnet.ibm.com>",
- " David Howells <dhowells\@redhat.com>",
- " Matt Fleming <matt\@codeblueprint.co.uk>",
- " Kirill A . Shutemov <kirill.shutemov\@linux.intel.com>",
- " Laura Abbott <labbott\@redhat.com>",
- " Ard Biesheuvel <ard.biesheuvel\@linaro.org>",
- " Andrew Morton <akpm\@linux-foundation.org>",
- " Eric Biederman <ebiederm\@xmission.com>",
- " Benjamin Herrenschmidt <benh\@kernel.crashing.org>",
- " Paul Mackerras <paulus\@samba.org>",
- " Konrad Rzeszutek Wilk <konrad.wilk\@oracle.com>",
- " Jonathan Corbet <corbet\@lwn.net>",
- " Dave Airlie <airlied\@redhat.com>",
- " Kees Cook <keescook\@chromium.org>",
- " Paolo Bonzini <pbonzini\@redhat.com>",
- " Radim Kr\304\215m\303\241\305\231 <rkrcmar\@redhat.com>",
- " Arnd Bergmann <arnd\@arndb.de>",
- " Tejun Heo <tj\@kernel.org>",
- " Christoph Lameter <cl\@linux.com>",
- " Brijesh Singh <brijesh.singh\@amd.com>\0"
+ "Cc\0Thomas Gleixner <tglx-hfZtesqFncYOwBW4kG4KsQ\@public.gmane.org>",
+ " Ingo Molnar <mingo-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+ " H . Peter Anvin <hpa-YMNOUZJC4hwAvxtiuMwx3w\@public.gmane.org>",
+ " Borislav Petkov <bp-l3A5Bk7waGM\@public.gmane.org>",
+ " Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org>",
+ " Tony Luck <tony.luck-ral2JQCrhuEAvxtiuMwx3w\@public.gmane.org>",
+ " Piotr Luc <piotr.luc-ral2JQCrhuEAvxtiuMwx3w\@public.gmane.org>",
+ " Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>",
+ " Fenghua Yu <fenghua.yu-ral2JQCrhuEAvxtiuMwx3w\@public.gmane.org>",
+ " Lu Baolu <baolu.lu-VuQAYsv1563Yd54FQh9/CA\@public.gmane.org>",
+ " Reza Arbab <arbab-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8\@public.gmane.org>",
+ " David Howells <dhowells-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+ " Matt Fleming <matt-mF/unelCI9GS6iBeEJttW/XRex20P6io\@public.gmane.org>",
+ " Kirill A . Shutemov <kirill.shutemov-VuQAYsv1563Yd54FQh9/CA\@public.gmane.org>",
+ " Laura Abbott <labbott-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+ " Ard Biesheuvel <ard.biesheuvel-QSEj5FYQhm4dnm+yROfE0A\@public.gmane.org>",
+ " Andrew Morton <akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b\@public.gmane.org>",
+ " Eric Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w\@public.gmane.org>",
+ " Benjamin Herrenschmidt <benh-XVmvHMARGAS8U2dJNN8I7kB+6BGkLq7r\@public.gmane.org>",
+ " Paul Mackerras <p\0"
]
[
"\0000:1\0"
@@ -56,7 +49,7 @@
"b\0"
]
[
- "From: Tom Lendacky <thomas.lendacky\@amd.com>\n",
+ "From: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>\n",
"\n",
"Early in the boot process, add checks to determine if the kernel is\n",
"running with Secure Encrypted Virtualization (SEV) active.\n",
@@ -77,8 +70,8 @@
"differences in how certain things are handled: e.g. DMA (always bounce\n",
"buffered with SEV) or EFI tables (always access decrypted with SME).\n",
"\n",
- "Signed-off-by: Tom Lendacky <thomas.lendacky\@amd.com>\n",
- "Signed-off-by: Brijesh Singh <brijesh.singh\@amd.com>\n",
+ "Signed-off-by: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>\n",
+ "Signed-off-by: Brijesh Singh <brijesh.singh-5C7GfCeVMHo\@public.gmane.org>\n",
"---\n",
" arch/x86/boot/compressed/Makefile | 2 +\n",
" arch/x86/boot/compressed/head_64.S | 16 +++++\n",
@@ -163,7 +156,7 @@
"+ *\n",
"+ * Copyright (C) 2017 Advanced Micro Devices, Inc.\n",
"+ *\n",
- "+ * Author: Tom Lendacky <thomas.lendacky\@amd.com>\n",
+ "+ * Author: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>\n",
"+ *\n",
"+ * This program is free software; you can redistribute it and/or modify\n",
"+ * it under the terms of the GNU General Public License version 2 as\n",
@@ -425,4 +418,4 @@
"2.9.4"
]
-8ad6767fc7e8d35efad7a0d6750f1c2f2b508d025e47afd0f36f0f86f98c59a1
+c4d21ac0e41ee198272e6da0eed00cf96a6b85a4cc41f063b30e4d43beafd155
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.