Revision e75417739b1de4f6eb99f3f080c67bfd6812d562 authored by Greg Kroah-Hartman on 29 September 2018, 21:34:06 UTC, committed by Greg Kroah-Hartman on 29 September 2018, 21:34:06 UTC
Thomas writes: "A single fix for the AMD memory encryption boot code so it does not read random garbage instead of the cached encryption bit when a kexec kernel is allocated above the 32bit address limit." * 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: x86/boot: Fix kexec booting failure in the SEV bit detection code
LICENSE.SRC
Code in this directory written at the IDA Supercomputing Research Center
carries the following copyright and license.
Copyright 1993 United States Government as represented by the
Director, National Security Agency. This software may be used
and distributed according to the terms of the GNU General Public License,
incorporated herein by reference.
In addition to the disclaimers in the GPL, SRC expressly disclaims any
and all warranties, expressed or implied, concerning the enclosed software.
This software was developed at SRC for use in internal research, and the
intent in sharing this software is to promote the productive interchange
of ideas throughout the research community. All software is furnished
on an "as-is" basis. No further updates to this software should be
expected. Although updates may occur, no commitment exists.
Computing file changes ...