All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20150107185322.GU7485@arm.com>

diff --git a/a/1.txt b/N1/1.txt
index 476892d..b97ca7e 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,7 +1,7 @@
 On Wed, Jan 07, 2015 at 06:35:41PM +0000, Mitchel Humpherys wrote:
-> On Wed, Jan 07 2015 at 10:04:20 AM, Will Deacon <will.deacon-5wv7dgnIgG8@public.gmane.org> wrote:
+> On Wed, Jan 07 2015 at 10:04:20 AM, Will Deacon <will.deacon@arm.com> wrote:
 > > On Wed, Jan 07, 2015 at 05:52:46PM +0000, Mitchel Humpherys wrote:
-> >> On Wed, Jan 07 2015 at 02:13:00 AM, Will Deacon <will.deacon-5wv7dgnIgG8@public.gmane.org> wrote:
+> >> On Wed, Jan 07 2015 at 02:13:00 AM, Will Deacon <will.deacon@arm.com> wrote:
 > >> > If would be better to check for the ARM_SMMU_OPT_SECURE_CFG_ACCESS feature
 > >> > and, if it's set then zero ARM_SMMU_GR0_STLBIALL at the correct address
 > >> > otherwise do the ARM_SMMU_GR0_TLBIALLH and ARM_SMMU_GR0_TLBIALLNSNH.
@@ -32,7 +32,7 @@ Hehe, I wasn't actually expecting a patch, but thanks!
 > platforms with ARM_SMMU_OPT_SECURE_CFG_ACCESS it's the only way to nuke
 > the whole TLB, so leave it in for them but rip it out for everyone else.
 > 
-> Signed-off-by: Mitchel Humpherys <mitchelh-sgV2jX0FEOL9JmXXK+q4OQ@public.gmane.org>
+> Signed-off-by: Mitchel Humpherys <mitchelh@codeaurora.org>
 > ---
 >  drivers/iommu/arm-smmu.c | 9 ++++++---
 >  1 file changed, 6 insertions(+), 3 deletions(-)
diff --git a/a/content_digest b/N1/content_digest
index e92547c..8d60519 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -7,20 +7,16 @@
  "ref\0vnkw4ms2cwb5.fsf@mitchelh-linux.qualcomm.com\0"
  "ref\020150107180420.GR7485@arm.com\0"
  "ref\0vnkwh9w2bfr6.fsf@mitchelh-linux.qualcomm.com\0"
- "ref\0vnkwh9w2bfr6.fsf-Yf+dfxj6toJBVvN7MMdr1KRtKmQZhJ7pQQ4Iyu8u01E@public.gmane.org\0"
- "From\0Will Deacon <will.deacon-5wv7dgnIgG8@public.gmane.org>\0"
- "Subject\0Re: [PATCH] iommu/arm-smmu: don't touch the secure STLBIALL register\0"
+ "From\0will.deacon@arm.com (Will Deacon)\0"
+ "Subject\0[PATCH] iommu/arm-smmu: don't touch the secure STLBIALL register\0"
  "Date\0Wed, 7 Jan 2015 18:53:22 +0000\0"
- "To\0Mitchel Humpherys <mitchelh-sgV2jX0FEOL9JmXXK+q4OQ@public.gmane.org>\0"
- "Cc\0iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org <iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>"
-  Rob Herring <robherring2-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
- " linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org <linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org>\0"
+ "To\0linux-arm-kernel@lists.infradead.org\0"
  "\00:1\0"
  "b\0"
  "On Wed, Jan 07, 2015 at 06:35:41PM +0000, Mitchel Humpherys wrote:\n"
- "> On Wed, Jan 07 2015 at 10:04:20 AM, Will Deacon <will.deacon-5wv7dgnIgG8@public.gmane.org> wrote:\n"
+ "> On Wed, Jan 07 2015 at 10:04:20 AM, Will Deacon <will.deacon@arm.com> wrote:\n"
  "> > On Wed, Jan 07, 2015 at 05:52:46PM +0000, Mitchel Humpherys wrote:\n"
- "> >> On Wed, Jan 07 2015 at 02:13:00 AM, Will Deacon <will.deacon-5wv7dgnIgG8@public.gmane.org> wrote:\n"
+ "> >> On Wed, Jan 07 2015 at 02:13:00 AM, Will Deacon <will.deacon@arm.com> wrote:\n"
  "> >> > If would be better to check for the ARM_SMMU_OPT_SECURE_CFG_ACCESS feature\n"
  "> >> > and, if it's set then zero ARM_SMMU_GR0_STLBIALL at the correct address\n"
  "> >> > otherwise do the ARM_SMMU_GR0_TLBIALLH and ARM_SMMU_GR0_TLBIALLNSNH.\n"
@@ -51,7 +47,7 @@
  "> platforms with ARM_SMMU_OPT_SECURE_CFG_ACCESS it's the only way to nuke\n"
  "> the whole TLB, so leave it in for them but rip it out for everyone else.\n"
  "> \n"
- "> Signed-off-by: Mitchel Humpherys <mitchelh-sgV2jX0FEOL9JmXXK+q4OQ@public.gmane.org>\n"
+ "> Signed-off-by: Mitchel Humpherys <mitchelh@codeaurora.org>\n"
  "> ---\n"
  ">  drivers/iommu/arm-smmu.c | 9 ++++++---\n"
  ">  1 file changed, 6 insertions(+), 3 deletions(-)\n"
@@ -84,4 +80,4 @@
  "\n"
  Will
 
-8191194c6d4b33ed8e265cc7980f098a6fe7d69f1b3867f37843d3314bfc34a4
+ca5689851d1bc10b462027621b3afafaa312d1110b9e91c3f71b28e5b15a8988

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.