diff for duplicates of <20160510134358.GR2839@codeblueprint.co.uk> diff --git a/a/1.txt b/N1/1.txt index ef19ceb..6da7823 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -7,7 +7,7 @@ On Tue, 26 Apr, at 05:57:40PM, Tom Lendacky wrote: > When freeing boot services related memory, since it has been mapped as > un-encrypted, be sure to change the mapping to encrypted for future use. > -> Signed-off-by: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org> +> Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com> > --- > arch/x86/include/asm/cacheflush.h | 3 + > arch/x86/include/asm/mem_encrypt.h | 22 +++++++++++ diff --git a/a/content_digest b/N1/content_digest index 87ba270..a0d675d 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -1,32 +1,31 @@ "ref\020160426225553.13567.19459.stgit@tlendack-t1.amdoffice.net\0" "ref\020160426225740.13567.85438.stgit@tlendack-t1.amdoffice.net\0" - "ref\020160426225740.13567.85438.stgit-qCXWGYdRb2BnqfbPTmsdiZQ+2ll4COg0XqFh9Ls21Oc@public.gmane.org\0" - "From\0Matt Fleming <matt-mF/unelCI9GS6iBeEJttW/XRex20P6io@public.gmane.org>\0" + "From\0Matt Fleming <matt@codeblueprint.co.uk>\0" "Subject\0Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear\0" "Date\0Tue, 10 May 2016 14:43:58 +0100\0" - "To\0Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>\0" - "Cc\0linux-arch-u79uwXL29TY76Z2rM5mHXA@public.gmane.org" - linux-efi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - linux-doc-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - x86-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org - linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - kasan-dev-/JYPxA39Uh5TLH3MbocFFw@public.gmane.org - linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org - iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org - " Radim Kr\304\215m\303\241\305\231 <rkrcmar-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>" - Arnd Bergmann <arnd-r2nGTMty4D4@public.gmane.org> - Jonathan Corbet <corbet-T1hC0tSOHrs@public.gmane.org> - Joerg Roedel <joro-zLv9SwRftAIdnm+yROfE0A@public.gmane.org> - Konrad Rzeszutek Wilk <konrad.wilk-QHcLZuEGTsvQT0dZR+AlfA@public.gmane.org> - Paolo Bonzini <pbonzini-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> - Ingo Molnar <mingo-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> - Borislav Petkov <bp-Gina5bIWoIWzQB+pC5nmwQ@public.gmane.org> - H. Peter Anvin <hpa-YMNOUZJC4hwAvxtiuMwx3w@public.gmane.org> - Andrey Ryabinin <aryabinin-5HdwGun5lf+gSpxsJD1C4w@public.gmane.org> - Alexander Potapenko <glider-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org> - Thomas Gleixner <tglx-hfZtesqFncYOwBW4kG4KsQ@public.gmane.org> - " Dmitry Vyukov <dvyukov-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org>\0" + "To\0Tom Lendacky <thomas.lendacky@amd.com>\0" + "Cc\0linux-arch@vger.kernel.org" + linux-efi@vger.kernel.org + kvm@vger.kernel.org + linux-doc@vger.kernel.org + x86@kernel.org + linux-kernel@vger.kernel.org + kasan-dev@googlegroups.com + linux-mm@kvack.org + iommu@lists.linux-foundation.org + " Radim Kr\304\215m\303\241\305\231 <rkrcmar@redhat.com>" + Arnd Bergmann <arnd@arndb.de> + Jonathan Corbet <corbet@lwn.net> + Joerg Roedel <joro@8bytes.org> + Konrad Rzeszutek Wilk <konrad.wilk@oracle.com> + Paolo Bonzini <pbonzini@redhat.com> + Ingo Molnar <mingo@redhat.com> + Borislav Petkov <bp@alien8.de> + H. Peter Anvin <hpa@zytor.com> + Andrey Ryabinin <aryabinin@virtuozzo.com> + Alexander Potapenko <glider@google.com> + Thomas Gleixner <tglx@linutronix.de> + " Dmitry Vyukov <dvyukov@google.com>\0" "\00:1\0" "b\0" "On Tue, 26 Apr, at 05:57:40PM, Tom Lendacky wrote:\n" @@ -38,7 +37,7 @@ "> When freeing boot services related memory, since it has been mapped as\n" "> un-encrypted, be sure to change the mapping to encrypted for future use.\n" "> \n" - "> Signed-off-by: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>\n" + "> Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>\n" "> ---\n" "> arch/x86/include/asm/cacheflush.h | 3 +\n" "> arch/x86/include/asm/mem_encrypt.h | 22 +++++++++++\n" @@ -63,4 +62,4 @@ "These API changes place an undue burden on developers that don't even\n" care about SME. -c4425a057d0b21e6fec63f6d5d6bfb9c86fac17daedcb8c064e6b1cae90df0b8 +77e72b257a4dec13a0f35b457cfa9b6914128fb7acd19f17c4ba2f0b9d1b2b8b
diff --git a/a/1.txt b/N2/1.txt index ef19ceb..6939338 100644 --- a/a/1.txt +++ b/N2/1.txt @@ -7,7 +7,7 @@ On Tue, 26 Apr, at 05:57:40PM, Tom Lendacky wrote: > When freeing boot services related memory, since it has been mapped as > un-encrypted, be sure to change the mapping to encrypted for future use. > -> Signed-off-by: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org> +> Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com> > --- > arch/x86/include/asm/cacheflush.h | 3 + > arch/x86/include/asm/mem_encrypt.h | 22 +++++++++++ @@ -31,3 +31,9 @@ mapping attributes and map with/without encryption? These API changes place an undue burden on developers that don't even care about SME. + +-- +To unsubscribe, send a message with 'unsubscribe linux-mm' in +the body to majordomo@kvack.org. For more info on Linux MM, +see: http://www.linux-mm.org/ . +Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a> diff --git a/a/content_digest b/N2/content_digest index 87ba270..cc5c631 100644 --- a/a/content_digest +++ b/N2/content_digest @@ -1,32 +1,31 @@ "ref\020160426225553.13567.19459.stgit@tlendack-t1.amdoffice.net\0" "ref\020160426225740.13567.85438.stgit@tlendack-t1.amdoffice.net\0" - "ref\020160426225740.13567.85438.stgit-qCXWGYdRb2BnqfbPTmsdiZQ+2ll4COg0XqFh9Ls21Oc@public.gmane.org\0" - "From\0Matt Fleming <matt-mF/unelCI9GS6iBeEJttW/XRex20P6io@public.gmane.org>\0" + "From\0Matt Fleming <matt@codeblueprint.co.uk>\0" "Subject\0Re: [RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear\0" "Date\0Tue, 10 May 2016 14:43:58 +0100\0" - "To\0Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>\0" - "Cc\0linux-arch-u79uwXL29TY76Z2rM5mHXA@public.gmane.org" - linux-efi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - linux-doc-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - x86-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org - linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - kasan-dev-/JYPxA39Uh5TLH3MbocFFw@public.gmane.org - linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org - iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org - " Radim Kr\304\215m\303\241\305\231 <rkrcmar-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>" - Arnd Bergmann <arnd-r2nGTMty4D4@public.gmane.org> - Jonathan Corbet <corbet-T1hC0tSOHrs@public.gmane.org> - Joerg Roedel <joro-zLv9SwRftAIdnm+yROfE0A@public.gmane.org> - Konrad Rzeszutek Wilk <konrad.wilk-QHcLZuEGTsvQT0dZR+AlfA@public.gmane.org> - Paolo Bonzini <pbonzini-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> - Ingo Molnar <mingo-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> - Borislav Petkov <bp-Gina5bIWoIWzQB+pC5nmwQ@public.gmane.org> - H. Peter Anvin <hpa-YMNOUZJC4hwAvxtiuMwx3w@public.gmane.org> - Andrey Ryabinin <aryabinin-5HdwGun5lf+gSpxsJD1C4w@public.gmane.org> - Alexander Potapenko <glider-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org> - Thomas Gleixner <tglx-hfZtesqFncYOwBW4kG4KsQ@public.gmane.org> - " Dmitry Vyukov <dvyukov-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org>\0" + "To\0Tom Lendacky <thomas.lendacky@amd.com>\0" + "Cc\0linux-arch@vger.kernel.org" + linux-efi@vger.kernel.org + kvm@vger.kernel.org + linux-doc@vger.kernel.org + x86@kernel.org + linux-kernel@vger.kernel.org + kasan-dev@googlegroups.com + linux-mm@kvack.org + iommu@lists.linux-foundation.org + " Radim Kr\304\215m\303\241\305\231 <rkrcmar@redhat.com>" + Arnd Bergmann <arnd@arndb.de> + Jonathan Corbet <corbet@lwn.net> + Joerg Roedel <joro@8bytes.org> + Konrad Rzeszutek Wilk <konrad.wilk@oracle.com> + Paolo Bonzini <pbonzini@redhat.com> + Ingo Molnar <mingo@redhat.com> + Borislav Petkov <bp@alien8.de> + H. Peter Anvin <hpa@zytor.com> + Andrey Ryabinin <aryabinin@virtuozzo.com> + Alexander Potapenko <glider@google.com> + Thomas Gleixner <tglx@linutronix.de> + " Dmitry Vyukov <dvyukov@google.com>\0" "\00:1\0" "b\0" "On Tue, 26 Apr, at 05:57:40PM, Tom Lendacky wrote:\n" @@ -38,7 +37,7 @@ "> When freeing boot services related memory, since it has been mapped as\n" "> un-encrypted, be sure to change the mapping to encrypted for future use.\n" "> \n" - "> Signed-off-by: Tom Lendacky <thomas.lendacky-5C7GfCeVMHo@public.gmane.org>\n" + "> Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>\n" "> ---\n" "> arch/x86/include/asm/cacheflush.h | 3 +\n" "> arch/x86/include/asm/mem_encrypt.h | 22 +++++++++++\n" @@ -61,6 +60,12 @@ "mapping attributes and map with/without encryption?\n" "\n" "These API changes place an undue burden on developers that don't even\n" - care about SME. + "care about SME.\n" + "\n" + "--\n" + "To unsubscribe, send a message with 'unsubscribe linux-mm' in\n" + "the body to majordomo@kvack.org. For more info on Linux MM,\n" + "see: http://www.linux-mm.org/ .\n" + "Don't email: <a href=mailto:\"dont@kvack.org\"> email@kvack.org </a>" -c4425a057d0b21e6fec63f6d5d6bfb9c86fac17daedcb8c064e6b1cae90df0b8 +dc9d2a64c734b70d5697ff737d48a6543418b437025247d1f5d7e83839b5ec97
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.