All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20140608103129.GC3279@lvm>

diff --git a/a/1.txt b/N1/1.txt
index 93e958c..777228c 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -2,7 +2,7 @@ On Thu, Jun 05, 2014 at 07:03:12PM +0200, Antonios Motakis wrote:
 > With an ARM SMMU, interrupt remapping should always be safe from the
 > SMMU's point of view, as it is properly handled by the GIC.
 > 
-> Signed-off-by: Antonios Motakis <a.motakis-lrHrjnjw1UfHK3s98zE1ajGjJy/sRE9J@public.gmane.org>
+> Signed-off-by: Antonios Motakis <a.motakis@virtualopensystems.com>
 > ---
 >  drivers/iommu/arm-smmu.c | 2 +-
 >  1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/a/content_digest b/N1/content_digest
index 814dd0f..ed33c8c 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,27 +1,16 @@
  "ref\01401987808-23596-1-git-send-email-a.motakis@virtualopensystems.com\0"
  "ref\01401987808-23596-5-git-send-email-a.motakis@virtualopensystems.com\0"
- "ref\01401987808-23596-5-git-send-email-a.motakis-lrHrjnjw1UfHK3s98zE1ajGjJy/sRE9J@public.gmane.org\0"
- "From\0Christoffer Dall <christoffer.dall-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org>\0"
- "Subject\0Re: [RFC PATCH v6 04/20] iommu/arm-smmu: add capability IOMMU_CAP_INTR_REMAP\0"
+ "From\0christoffer.dall@linaro.org (Christoffer Dall)\0"
+ "Subject\0[RFC PATCH v6 04/20] iommu/arm-smmu: add capability IOMMU_CAP_INTR_REMAP\0"
  "Date\0Sun, 8 Jun 2014 12:31:29 +0200\0"
- "To\0Antonios Motakis <a.motakis-lrHrjnjw1UfHK3s98zE1ajGjJy/sRE9J@public.gmane.org>\0"
- "Cc\0stuart.yoder-KZfg59tc24xl57MIdRCFDg@public.gmane.org"
-  kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  eric.auger-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org
-  open list <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
-  will.deacon-5wv7dgnIgG8@public.gmane.org
-  iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org
-  a.rigo-lrHrjnjw1UfHK3s98zE1ajGjJy/sRE9J@public.gmane.org
-  tech-lrHrjnjw1UfHK3s98zE1ajGjJy/sRE9J@public.gmane.org
-  kvmarm-FPEHb7Xf0XXUo1n7N8X6UoWGPAHP3yOg@public.gmane.org
- " moderated list:ARM SMMU DRIVER <linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org>\0"
+ "To\0linux-arm-kernel@lists.infradead.org\0"
  "\00:1\0"
  "b\0"
  "On Thu, Jun 05, 2014 at 07:03:12PM +0200, Antonios Motakis wrote:\n"
  "> With an ARM SMMU, interrupt remapping should always be safe from the\n"
  "> SMMU's point of view, as it is properly handled by the GIC.\n"
  "> \n"
- "> Signed-off-by: Antonios Motakis <a.motakis-lrHrjnjw1UfHK3s98zE1ajGjJy/sRE9J@public.gmane.org>\n"
+ "> Signed-off-by: Antonios Motakis <a.motakis@virtualopensystems.com>\n"
  "> ---\n"
  ">  drivers/iommu/arm-smmu.c | 2 +-\n"
  ">  1 file changed, 1 insertion(+), 1 deletion(-)\n"
@@ -49,4 +38,4 @@
  "Thanks,\n"
  -Christoffer
 
-394d92f4b9051b556e51d2bce331602f9ca29c9806486a28fef6e159bf14f489
+6bd37c2323cbd236eab56ab6b313f8b098d1ed8054e62893aadc931eb28841d0

diff --git a/a/1.txt b/N2/1.txt
index 93e958c..777228c 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -2,7 +2,7 @@ On Thu, Jun 05, 2014 at 07:03:12PM +0200, Antonios Motakis wrote:
 > With an ARM SMMU, interrupt remapping should always be safe from the
 > SMMU's point of view, as it is properly handled by the GIC.
 > 
-> Signed-off-by: Antonios Motakis <a.motakis-lrHrjnjw1UfHK3s98zE1ajGjJy/sRE9J@public.gmane.org>
+> Signed-off-by: Antonios Motakis <a.motakis@virtualopensystems.com>
 > ---
 >  drivers/iommu/arm-smmu.c | 2 +-
 >  1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/a/content_digest b/N2/content_digest
index 814dd0f..4954bc8 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -1,27 +1,29 @@
  "ref\01401987808-23596-1-git-send-email-a.motakis@virtualopensystems.com\0"
  "ref\01401987808-23596-5-git-send-email-a.motakis@virtualopensystems.com\0"
- "ref\01401987808-23596-5-git-send-email-a.motakis-lrHrjnjw1UfHK3s98zE1ajGjJy/sRE9J@public.gmane.org\0"
- "From\0Christoffer Dall <christoffer.dall-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org>\0"
+ "From\0Christoffer Dall <christoffer.dall@linaro.org>\0"
  "Subject\0Re: [RFC PATCH v6 04/20] iommu/arm-smmu: add capability IOMMU_CAP_INTR_REMAP\0"
  "Date\0Sun, 8 Jun 2014 12:31:29 +0200\0"
- "To\0Antonios Motakis <a.motakis-lrHrjnjw1UfHK3s98zE1ajGjJy/sRE9J@public.gmane.org>\0"
- "Cc\0stuart.yoder-KZfg59tc24xl57MIdRCFDg@public.gmane.org"
-  kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  eric.auger-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org
-  open list <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
-  will.deacon-5wv7dgnIgG8@public.gmane.org
-  iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org
-  a.rigo-lrHrjnjw1UfHK3s98zE1ajGjJy/sRE9J@public.gmane.org
-  tech-lrHrjnjw1UfHK3s98zE1ajGjJy/sRE9J@public.gmane.org
-  kvmarm-FPEHb7Xf0XXUo1n7N8X6UoWGPAHP3yOg@public.gmane.org
- " moderated list:ARM SMMU DRIVER <linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org>\0"
+ "To\0Antonios Motakis <a.motakis@virtualopensystems.com>\0"
+ "Cc\0alex.williamson@redhat.com"
+  kvmarm@lists.cs.columbia.edu
+  iommu@lists.linux-foundation.org
+  tech@virtualopensystems.com
+  a.rigo@virtualopensystems.com
+  kvm@vger.kernel.org
+  will.deacon@arm.com
+  kim.phillips@freescale.com
+  stuart.yoder@freescale.com
+  eric.auger@linaro.org
+  Joerg Roedel <joro@8bytes.org>
+  moderated list:ARM SMMU DRIVER <linux-arm-kernel@lists.infradead.org>
+ " open list <linux-kernel@vger.kernel.org>\0"
  "\00:1\0"
  "b\0"
  "On Thu, Jun 05, 2014 at 07:03:12PM +0200, Antonios Motakis wrote:\n"
  "> With an ARM SMMU, interrupt remapping should always be safe from the\n"
  "> SMMU's point of view, as it is properly handled by the GIC.\n"
  "> \n"
- "> Signed-off-by: Antonios Motakis <a.motakis-lrHrjnjw1UfHK3s98zE1ajGjJy/sRE9J@public.gmane.org>\n"
+ "> Signed-off-by: Antonios Motakis <a.motakis@virtualopensystems.com>\n"
  "> ---\n"
  ">  drivers/iommu/arm-smmu.c | 2 +-\n"
  ">  1 file changed, 1 insertion(+), 1 deletion(-)\n"
@@ -49,4 +51,4 @@
  "Thanks,\n"
  -Christoffer
 
-394d92f4b9051b556e51d2bce331602f9ca29c9806486a28fef6e159bf14f489
+007bf46a3731f1d26bce85cfbef67f9b086e1d438083dce91bb39cbc9d6c51fa

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.