diff for duplicates of <20170724190757.11278-5-brijesh.singh@amd.com>
diff --git a/a/1.txt b/N1/1.txt
index 7cf6c74..95086fa 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,10 +1,10 @@
-From: Tom Lendacky <thomas.lendacky@amd.com>
+From: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>
When SEV is active the initrd/initramfs will already have already been
placed in memory encyrpted so do not try to encrypt it.
-Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
-Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
+Signed-off-by: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>
+Signed-off-by: Brijesh Singh <brijesh.singh-5C7GfCeVMHo@public.gmane.org>
---
arch/x86/kernel/setup.c | 6 ++++--
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/a/content_digest b/N1/content_digest
index d6891fc..2d3fe16 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -2,7 +2,10 @@
"ref\00020170724190757.11278-1-brijesh.singh\@amd.com\0"
]
[
- "From\0Brijesh Singh <brijesh.singh\@amd.com>\0"
+ "ref\00020170724190757.11278-1-brijesh.singh-5C7GfCeVMHo\@public.gmane.org\0"
+]
+[
+ "From\0Brijesh Singh <brijesh.singh-5C7GfCeVMHo\@public.gmane.org>\0"
]
[
"Subject\0[RFC Part1 PATCH v3 04/17] x86/mm: Don't attempt to encrypt initrd under SEV\0"
@@ -11,43 +14,32 @@
"Date\0Mon, 24 Jul 2017 14:07:44 -0500\0"
]
[
- "To\0linux-kernel\@vger.kernel.org",
- " x86\@kernel.org",
- " linux-efi\@vger.kernel.org",
- " linuxppc-dev\@lists.ozlabs.org",
- " kvm\@vger.kernel.org\0"
+ "To\0linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " x86-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org",
+ " linux-efi-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " linuxppc-dev-uLR06cmDAlY/bJ5BZ2RsiQ\@public.gmane.org",
+ " kvm-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org\0"
]
[
- "Cc\0Thomas Gleixner <tglx\@linutronix.de>",
- " Ingo Molnar <mingo\@redhat.com>",
- " H . Peter Anvin <hpa\@zytor.com>",
- " Borislav Petkov <bp\@suse.de>",
- " Andy Lutomirski <luto\@kernel.org>",
- " Tony Luck <tony.luck\@intel.com>",
- " Piotr Luc <piotr.luc\@intel.com>",
- " Tom Lendacky <thomas.lendacky\@amd.com>",
- " Fenghua Yu <fenghua.yu\@intel.com>",
- " Lu Baolu <baolu.lu\@linux.intel.com>",
- " Reza Arbab <arbab\@linux.vnet.ibm.com>",
- " David Howells <dhowells\@redhat.com>",
- " Matt Fleming <matt\@codeblueprint.co.uk>",
- " Kirill A . Shutemov <kirill.shutemov\@linux.intel.com>",
- " Laura Abbott <labbott\@redhat.com>",
- " Ard Biesheuvel <ard.biesheuvel\@linaro.org>",
- " Andrew Morton <akpm\@linux-foundation.org>",
- " Eric Biederman <ebiederm\@xmission.com>",
- " Benjamin Herrenschmidt <benh\@kernel.crashing.org>",
- " Paul Mackerras <paulus\@samba.org>",
- " Konrad Rzeszutek Wilk <konrad.wilk\@oracle.com>",
- " Jonathan Corbet <corbet\@lwn.net>",
- " Dave Airlie <airlied\@redhat.com>",
- " Kees Cook <keescook\@chromium.org>",
- " Paolo Bonzini <pbonzini\@redhat.com>",
- " Radim Kr\304\215m\303\241\305\231 <rkrcmar\@redhat.com>",
- " Arnd Bergmann <arnd\@arndb.de>",
- " Tejun Heo <tj\@kernel.org>",
- " Christoph Lameter <cl\@linux.com>",
- " Brijesh Singh <brijesh.singh\@amd.com>\0"
+ "Cc\0Thomas Gleixner <tglx-hfZtesqFncYOwBW4kG4KsQ\@public.gmane.org>",
+ " Ingo Molnar <mingo-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+ " H . Peter Anvin <hpa-YMNOUZJC4hwAvxtiuMwx3w\@public.gmane.org>",
+ " Borislav Petkov <bp-l3A5Bk7waGM\@public.gmane.org>",
+ " Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org>",
+ " Tony Luck <tony.luck-ral2JQCrhuEAvxtiuMwx3w\@public.gmane.org>",
+ " Piotr Luc <piotr.luc-ral2JQCrhuEAvxtiuMwx3w\@public.gmane.org>",
+ " Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>",
+ " Fenghua Yu <fenghua.yu-ral2JQCrhuEAvxtiuMwx3w\@public.gmane.org>",
+ " Lu Baolu <baolu.lu-VuQAYsv1563Yd54FQh9/CA\@public.gmane.org>",
+ " Reza Arbab <arbab-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8\@public.gmane.org>",
+ " David Howells <dhowells-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+ " Matt Fleming <matt-mF/unelCI9GS6iBeEJttW/XRex20P6io\@public.gmane.org>",
+ " Kirill A . Shutemov <kirill.shutemov-VuQAYsv1563Yd54FQh9/CA\@public.gmane.org>",
+ " Laura Abbott <labbott-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+ " Ard Biesheuvel <ard.biesheuvel-QSEj5FYQhm4dnm+yROfE0A\@public.gmane.org>",
+ " Andrew Morton <akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b\@public.gmane.org>",
+ " Eric Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w\@public.gmane.org>",
+ " Benjamin Herrenschmidt <benh-XVmvHMARGAS8U2dJNN8I7kB+6BGkLq7r\@public.gmane.org>Paul Mackerras <p>\0"
]
[
"\0000:1\0"
@@ -56,13 +48,13 @@
"b\0"
]
[
- "From: Tom Lendacky <thomas.lendacky\@amd.com>\n",
+ "From: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>\n",
"\n",
"When SEV is active the initrd/initramfs will already have already been\n",
"placed in memory encyrpted so do not try to encrypt it.\n",
"\n",
- "Signed-off-by: Tom Lendacky <thomas.lendacky\@amd.com>\n",
- "Signed-off-by: Brijesh Singh <brijesh.singh\@amd.com>\n",
+ "Signed-off-by: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>\n",
+ "Signed-off-by: Brijesh Singh <brijesh.singh-5C7GfCeVMHo\@public.gmane.org>\n",
"---\n",
" arch/x86/kernel/setup.c | 6 ++++--\n",
" 1 file changed, 4 insertions(+), 2 deletions(-)\n",
@@ -89,4 +81,4 @@
"2.9.4"
]
-ae9564cfea00b0b55fe5dda327fb762e705a8ef40831617808ef1a6ee23effc5
+d13a304ce06fcb55b230ba7fb1fb999387dbc2ebf4b5f7a8204a5787a858c351
diff --git a/a/1.txt b/N2/1.txt
index 7cf6c74..95086fa 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -1,10 +1,10 @@
-From: Tom Lendacky <thomas.lendacky@amd.com>
+From: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>
When SEV is active the initrd/initramfs will already have already been
placed in memory encyrpted so do not try to encrypt it.
-Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
-Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
+Signed-off-by: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>
+Signed-off-by: Brijesh Singh <brijesh.singh-5C7GfCeVMHo@public.gmane.org>
---
arch/x86/kernel/setup.c | 6 ++++--
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/a/content_digest b/N2/content_digest
index d6891fc..eeceae3 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -2,7 +2,10 @@
"ref\00020170724190757.11278-1-brijesh.singh\@amd.com\0"
]
[
- "From\0Brijesh Singh <brijesh.singh\@amd.com>\0"
+ "ref\00020170724190757.11278-1-brijesh.singh-5C7GfCeVMHo\@public.gmane.org\0"
+]
+[
+ "From\0Brijesh Singh <brijesh.singh-5C7GfCeVMHo\@public.gmane.org>\0"
]
[
"Subject\0[RFC Part1 PATCH v3 04/17] x86/mm: Don't attempt to encrypt initrd under SEV\0"
@@ -11,43 +14,33 @@
"Date\0Mon, 24 Jul 2017 14:07:44 -0500\0"
]
[
- "To\0linux-kernel\@vger.kernel.org",
- " x86\@kernel.org",
- " linux-efi\@vger.kernel.org",
- " linuxppc-dev\@lists.ozlabs.org",
- " kvm\@vger.kernel.org\0"
+ "To\0linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " x86-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org",
+ " linux-efi-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " linuxppc-dev-uLR06cmDAlY/bJ5BZ2RsiQ\@public.gmane.org",
+ " kvm-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org\0"
]
[
- "Cc\0Thomas Gleixner <tglx\@linutronix.de>",
- " Ingo Molnar <mingo\@redhat.com>",
- " H . Peter Anvin <hpa\@zytor.com>",
- " Borislav Petkov <bp\@suse.de>",
- " Andy Lutomirski <luto\@kernel.org>",
- " Tony Luck <tony.luck\@intel.com>",
- " Piotr Luc <piotr.luc\@intel.com>",
- " Tom Lendacky <thomas.lendacky\@amd.com>",
- " Fenghua Yu <fenghua.yu\@intel.com>",
- " Lu Baolu <baolu.lu\@linux.intel.com>",
- " Reza Arbab <arbab\@linux.vnet.ibm.com>",
- " David Howells <dhowells\@redhat.com>",
- " Matt Fleming <matt\@codeblueprint.co.uk>",
- " Kirill A . Shutemov <kirill.shutemov\@linux.intel.com>",
- " Laura Abbott <labbott\@redhat.com>",
- " Ard Biesheuvel <ard.biesheuvel\@linaro.org>",
- " Andrew Morton <akpm\@linux-foundation.org>",
- " Eric Biederman <ebiederm\@xmission.com>",
- " Benjamin Herrenschmidt <benh\@kernel.crashing.org>",
- " Paul Mackerras <paulus\@samba.org>",
- " Konrad Rzeszutek Wilk <konrad.wilk\@oracle.com>",
- " Jonathan Corbet <corbet\@lwn.net>",
- " Dave Airlie <airlied\@redhat.com>",
- " Kees Cook <keescook\@chromium.org>",
- " Paolo Bonzini <pbonzini\@redhat.com>",
- " Radim Kr\304\215m\303\241\305\231 <rkrcmar\@redhat.com>",
- " Arnd Bergmann <arnd\@arndb.de>",
- " Tejun Heo <tj\@kernel.org>",
- " Christoph Lameter <cl\@linux.com>",
- " Brijesh Singh <brijesh.singh\@amd.com>\0"
+ "Cc\0Thomas Gleixner <tglx-hfZtesqFncYOwBW4kG4KsQ\@public.gmane.org>",
+ " Ingo Molnar <mingo-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+ " H . Peter Anvin <hpa-YMNOUZJC4hwAvxtiuMwx3w\@public.gmane.org>",
+ " Borislav Petkov <bp-l3A5Bk7waGM\@public.gmane.org>",
+ " Andy Lutomirski <luto-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org>",
+ " Tony Luck <tony.luck-ral2JQCrhuEAvxtiuMwx3w\@public.gmane.org>",
+ " Piotr Luc <piotr.luc-ral2JQCrhuEAvxtiuMwx3w\@public.gmane.org>",
+ " Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>",
+ " Fenghua Yu <fenghua.yu-ral2JQCrhuEAvxtiuMwx3w\@public.gmane.org>",
+ " Lu Baolu <baolu.lu-VuQAYsv1563Yd54FQh9/CA\@public.gmane.org>",
+ " Reza Arbab <arbab-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8\@public.gmane.org>",
+ " David Howells <dhowells-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+ " Matt Fleming <matt-mF/unelCI9GS6iBeEJttW/XRex20P6io\@public.gmane.org>",
+ " Kirill A . Shutemov <kirill.shutemov-VuQAYsv1563Yd54FQh9/CA\@public.gmane.org>",
+ " Laura Abbott <labbott-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>",
+ " Ard Biesheuvel <ard.biesheuvel-QSEj5FYQhm4dnm+yROfE0A\@public.gmane.org>",
+ " Andrew Morton <akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b\@public.gmane.org>",
+ " Eric Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w\@public.gmane.org>",
+ " Benjamin Herrenschmidt <benh-XVmvHMARGAS8U2dJNN8I7kB+6BGkLq7r\@public.gmane.org>",
+ " Paul Mackerras <p\0"
]
[
"\0000:1\0"
@@ -56,13 +49,13 @@
"b\0"
]
[
- "From: Tom Lendacky <thomas.lendacky\@amd.com>\n",
+ "From: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>\n",
"\n",
"When SEV is active the initrd/initramfs will already have already been\n",
"placed in memory encyrpted so do not try to encrypt it.\n",
"\n",
- "Signed-off-by: Tom Lendacky <thomas.lendacky\@amd.com>\n",
- "Signed-off-by: Brijesh Singh <brijesh.singh\@amd.com>\n",
+ "Signed-off-by: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo\@public.gmane.org>\n",
+ "Signed-off-by: Brijesh Singh <brijesh.singh-5C7GfCeVMHo\@public.gmane.org>\n",
"---\n",
" arch/x86/kernel/setup.c | 6 ++++--\n",
" 1 file changed, 4 insertions(+), 2 deletions(-)\n",
@@ -89,4 +82,4 @@
"2.9.4"
]
-ae9564cfea00b0b55fe5dda327fb762e705a8ef40831617808ef1a6ee23effc5
+23d99acf092c3bcabdcbfde31fe645e72ba594bf2a821a93a78739179c096d77
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.