All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20180517141058.00001c76@huawei.com>

diff --git a/a/1.txt b/N1/1.txt
index fbfdd05..ae854c2 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,5 +1,5 @@
 On Fri, 11 May 2018 20:06:03 +0100
-Jean-Philippe Brucker <jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org> wrote:
+Jean-Philippe Brucker <jean-philippe.brucker@arm.com> wrote:
 
 > Add bind() and unbind() operations to the IOMMU API. Bind() returns a
 > PASID that drivers can program in hardware, to let their devices access an
@@ -26,7 +26,7 @@ the code in the future.
 > to be cleanly isolated, and since we don't have any way to test groups or
 > hot-plug, we only allow singular groups for now.
 > 
-> Signed-off-by: Jean-Philippe Brucker <jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>
+> Signed-off-by: Jean-Philippe Brucker <jean-philippe.brucker@arm.com>
 
 Otherwise, looks good to me.
 
diff --git a/a/content_digest b/N1/content_digest
index 3a8284b..b08bfcb 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,31 +1,46 @@
  "ref\020180511190641.23008-1-jean-philippe.brucker@arm.com\0"
  "ref\020180511190641.23008-3-jean-philippe.brucker@arm.com\0"
- "ref\020180511190641.23008-3-jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org\0"
- "From\0Jonathan Cameron <Jonathan.Cameron-hv44wF8Li93QT0dZR+AlfA@public.gmane.org>\0"
+ "From\0Jonathan Cameron <Jonathan.Cameron@huawei.com>\0"
  "Subject\0Re: [PATCH v2 02/40] iommu/sva: Bind process address spaces to devices\0"
  "Date\0Thu, 17 May 2018 14:10:58 +0100\0"
- "To\0Jean-Philippe Brucker <jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>\0"
- "Cc\0kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org"
-  linux-pci-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  xuzaibo-hv44wF8Li93QT0dZR+AlfA@public.gmane.org
-  will.deacon-5wv7dgnIgG8@public.gmane.org
-  okaya-sgV2jX0FEOL9JmXXK+q4OQ@public.gmane.org
-  linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org
-  ashok.raj-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org
-  bharatku-gjFFaj9aHVfQT0dZR+AlfA@public.gmane.org
-  linux-acpi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  rfranz-YGCgFSpz5w/QT0dZR+AlfA@public.gmane.org
-  devicetree-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  rgummal-gjFFaj9aHVfQT0dZR+AlfA@public.gmane.org
-  linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org
-  dwmw2-wEGCiKHe2LqWVfeAwA7xHQ@public.gmane.org
-  ilias.apalodimas-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org
-  iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org
- " christian.koenig-5C7GfCeVMHo@public.gmane.org\0"
+ "To\0Jean-Philippe Brucker <jean-philippe.brucker@arm.com>\0"
+ "Cc\0<linux-arm-kernel@lists.infradead.org>"
+  <linux-pci@vger.kernel.org>
+  <linux-acpi@vger.kernel.org>
+  <devicetree@vger.kernel.org>
+  <iommu@lists.linux-foundation.org>
+  <kvm@vger.kernel.org>
+  <linux-mm@kvack.org>
+  <joro@8bytes.org>
+  <will.deacon@arm.com>
+  <robin.murphy@arm.com>
+  <alex.williamson@redhat.com>
+  <tn@semihalf.com>
+  <liubo95@huawei.com>
+  <thunder.leizhen@huawei.com>
+  <xieyisheng1@huawei.com>
+  <xuzaibo@huawei.com>
+  <ilias.apalodimas@linaro.org>
+  <liudongdong3@huawei.com>
+  <shunyong.yang@hxt-semitech.com>
+  <nwatters@codeaurora.org>
+  <okaya@codeaurora.org>
+  <jcrouse@codeaurora.org>
+  <rfranz@cavium.com>
+  <dwmw2@infradead.org>
+  <jacob.jun.pan@linux.intel.com>
+  <yi.l.liu@intel.com>
+  <ashok.raj@intel.com>
+  <kevin.tian@intel.com>
+  <baolu.lu@linux.intel.com>
+  <robdclark@gmail.com>
+  <christian.koenig@amd.com>
+  <bharatku@xilinx.com>
+ " <rgummal@xilinx.com>\0"
  "\00:1\0"
  "b\0"
  "On Fri, 11 May 2018 20:06:03 +0100\n"
- "Jean-Philippe Brucker <jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org> wrote:\n"
+ "Jean-Philippe Brucker <jean-philippe.brucker@arm.com> wrote:\n"
  "\n"
  "> Add bind() and unbind() operations to the IOMMU API. Bind() returns a\n"
  "> PASID that drivers can program in hardware, to let their devices access an\n"
@@ -52,7 +67,7 @@
  "> to be cleanly isolated, and since we don't have any way to test groups or\n"
  "> hot-plug, we only allow singular groups for now.\n"
  "> \n"
- "> Signed-off-by: Jean-Philippe Brucker <jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>\n"
+ "> Signed-off-by: Jean-Philippe Brucker <jean-philippe.brucker@arm.com>\n"
  "\n"
  "Otherwise, looks good to me.\n"
  "\n"
@@ -267,4 +282,4 @@
  ">  \n"
  >  #endif /* __LINUX_IOMMU_H */
 
-6bb954849605da00bf3c572d49f34043e91074ce78675b63327cef9806a447df
+83af4ee090f9c5e862027a7c6b11956bb9fdd492b776e2f97c17fea4c9d06b78

diff --git a/a/1.txt b/N2/1.txt
index fbfdd05..ae854c2 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -1,5 +1,5 @@
 On Fri, 11 May 2018 20:06:03 +0100
-Jean-Philippe Brucker <jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org> wrote:
+Jean-Philippe Brucker <jean-philippe.brucker@arm.com> wrote:
 
 > Add bind() and unbind() operations to the IOMMU API. Bind() returns a
 > PASID that drivers can program in hardware, to let their devices access an
@@ -26,7 +26,7 @@ the code in the future.
 > to be cleanly isolated, and since we don't have any way to test groups or
 > hot-plug, we only allow singular groups for now.
 > 
-> Signed-off-by: Jean-Philippe Brucker <jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>
+> Signed-off-by: Jean-Philippe Brucker <jean-philippe.brucker@arm.com>
 
 Otherwise, looks good to me.
 
diff --git a/a/content_digest b/N2/content_digest
index 3a8284b..f68a7a9 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -1,31 +1,13 @@
  "ref\020180511190641.23008-1-jean-philippe.brucker@arm.com\0"
  "ref\020180511190641.23008-3-jean-philippe.brucker@arm.com\0"
- "ref\020180511190641.23008-3-jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org\0"
- "From\0Jonathan Cameron <Jonathan.Cameron-hv44wF8Li93QT0dZR+AlfA@public.gmane.org>\0"
- "Subject\0Re: [PATCH v2 02/40] iommu/sva: Bind process address spaces to devices\0"
+ "From\0Jonathan.Cameron@huawei.com (Jonathan Cameron)\0"
+ "Subject\0[PATCH v2 02/40] iommu/sva: Bind process address spaces to devices\0"
  "Date\0Thu, 17 May 2018 14:10:58 +0100\0"
- "To\0Jean-Philippe Brucker <jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>\0"
- "Cc\0kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org"
-  linux-pci-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  xuzaibo-hv44wF8Li93QT0dZR+AlfA@public.gmane.org
-  will.deacon-5wv7dgnIgG8@public.gmane.org
-  okaya-sgV2jX0FEOL9JmXXK+q4OQ@public.gmane.org
-  linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org
-  ashok.raj-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org
-  bharatku-gjFFaj9aHVfQT0dZR+AlfA@public.gmane.org
-  linux-acpi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  rfranz-YGCgFSpz5w/QT0dZR+AlfA@public.gmane.org
-  devicetree-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  rgummal-gjFFaj9aHVfQT0dZR+AlfA@public.gmane.org
-  linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org
-  dwmw2-wEGCiKHe2LqWVfeAwA7xHQ@public.gmane.org
-  ilias.apalodimas-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org
-  iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org
- " christian.koenig-5C7GfCeVMHo@public.gmane.org\0"
+ "To\0linux-arm-kernel@lists.infradead.org\0"
  "\00:1\0"
  "b\0"
  "On Fri, 11 May 2018 20:06:03 +0100\n"
- "Jean-Philippe Brucker <jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org> wrote:\n"
+ "Jean-Philippe Brucker <jean-philippe.brucker@arm.com> wrote:\n"
  "\n"
  "> Add bind() and unbind() operations to the IOMMU API. Bind() returns a\n"
  "> PASID that drivers can program in hardware, to let their devices access an\n"
@@ -52,7 +34,7 @@
  "> to be cleanly isolated, and since we don't have any way to test groups or\n"
  "> hot-plug, we only allow singular groups for now.\n"
  "> \n"
- "> Signed-off-by: Jean-Philippe Brucker <jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>\n"
+ "> Signed-off-by: Jean-Philippe Brucker <jean-philippe.brucker@arm.com>\n"
  "\n"
  "Otherwise, looks good to me.\n"
  "\n"
@@ -267,4 +249,4 @@
  ">  \n"
  >  #endif /* __LINUX_IOMMU_H */
 
-6bb954849605da00bf3c572d49f34043e91074ce78675b63327cef9806a447df
+6b9b72d131f51c23776944778cb003e0311050b0a7fe55815f36acceb3910065

diff --git a/a/1.txt b/N3/1.txt
index fbfdd05..ae854c2 100644
--- a/a/1.txt
+++ b/N3/1.txt
@@ -1,5 +1,5 @@
 On Fri, 11 May 2018 20:06:03 +0100
-Jean-Philippe Brucker <jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org> wrote:
+Jean-Philippe Brucker <jean-philippe.brucker@arm.com> wrote:
 
 > Add bind() and unbind() operations to the IOMMU API. Bind() returns a
 > PASID that drivers can program in hardware, to let their devices access an
@@ -26,7 +26,7 @@ the code in the future.
 > to be cleanly isolated, and since we don't have any way to test groups or
 > hot-plug, we only allow singular groups for now.
 > 
-> Signed-off-by: Jean-Philippe Brucker <jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>
+> Signed-off-by: Jean-Philippe Brucker <jean-philippe.brucker@arm.com>
 
 Otherwise, looks good to me.
 
diff --git a/a/content_digest b/N3/content_digest
index 3a8284b..ba54539 100644
--- a/a/content_digest
+++ b/N3/content_digest
@@ -1,31 +1,46 @@
  "ref\020180511190641.23008-1-jean-philippe.brucker@arm.com\0"
  "ref\020180511190641.23008-3-jean-philippe.brucker@arm.com\0"
- "ref\020180511190641.23008-3-jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org\0"
- "From\0Jonathan Cameron <Jonathan.Cameron-hv44wF8Li93QT0dZR+AlfA@public.gmane.org>\0"
+ "From\0Jonathan Cameron <Jonathan.Cameron@huawei.com>\0"
  "Subject\0Re: [PATCH v2 02/40] iommu/sva: Bind process address spaces to devices\0"
  "Date\0Thu, 17 May 2018 14:10:58 +0100\0"
- "To\0Jean-Philippe Brucker <jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>\0"
- "Cc\0kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org"
-  linux-pci-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  xuzaibo-hv44wF8Li93QT0dZR+AlfA@public.gmane.org
-  will.deacon-5wv7dgnIgG8@public.gmane.org
-  okaya-sgV2jX0FEOL9JmXXK+q4OQ@public.gmane.org
-  linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org
-  ashok.raj-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org
-  bharatku-gjFFaj9aHVfQT0dZR+AlfA@public.gmane.org
-  linux-acpi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  rfranz-YGCgFSpz5w/QT0dZR+AlfA@public.gmane.org
-  devicetree-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  rgummal-gjFFaj9aHVfQT0dZR+AlfA@public.gmane.org
-  linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org
-  dwmw2-wEGCiKHe2LqWVfeAwA7xHQ@public.gmane.org
-  ilias.apalodimas-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org
-  iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org
- " christian.koenig-5C7GfCeVMHo@public.gmane.org\0"
+ "To\0Jean-Philippe Brucker <jean-philippe.brucker@arm.com>\0"
+ "Cc\0linux-arm-kernel@lists.infradead.org"
+  linux-pci@vger.kernel.org
+  linux-acpi@vger.kernel.org
+  devicetree@vger.kernel.org
+  iommu@lists.linux-foundation.org
+  kvm@vger.kernel.org
+  linux-mm@kvack.org
+  joro@8bytes.org
+  will.deacon@arm.com
+  robin.murphy@arm.com
+  alex.williamson@redhat.com
+  tn@semihalf.com
+  liubo95@huawei.com
+  thunder.leizhen@huawei.com
+  xieyisheng1@huawei.com
+  xuzaibo@huawei.com
+  ilias.apalodimas@linaro.org
+  liudongdong3@huawei.com
+  shunyong.yang@hxt-semitech.com
+  nwatters@codeaurora.org
+  okaya@codeaurora.org
+  jcrouse@codeaurora.org
+  rfranz@cavium.com
+  dwmw2@infradead.org
+  jacob.jun.pan@linux.intel.com
+  yi.l.liu@intel.com
+  ashok.raj@intel.com
+  kevin.tian@intel.com
+  baolu.lu@linux.intel.com
+  robdclark@gmail.com
+  christian.koenig@amd.com
+  bharatku@xilinx.com
+ " rgummal@xilinx.com\0"
  "\00:1\0"
  "b\0"
  "On Fri, 11 May 2018 20:06:03 +0100\n"
- "Jean-Philippe Brucker <jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org> wrote:\n"
+ "Jean-Philippe Brucker <jean-philippe.brucker@arm.com> wrote:\n"
  "\n"
  "> Add bind() and unbind() operations to the IOMMU API. Bind() returns a\n"
  "> PASID that drivers can program in hardware, to let their devices access an\n"
@@ -52,7 +67,7 @@
  "> to be cleanly isolated, and since we don't have any way to test groups or\n"
  "> hot-plug, we only allow singular groups for now.\n"
  "> \n"
- "> Signed-off-by: Jean-Philippe Brucker <jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>\n"
+ "> Signed-off-by: Jean-Philippe Brucker <jean-philippe.brucker@arm.com>\n"
  "\n"
  "Otherwise, looks good to me.\n"
  "\n"
@@ -267,4 +282,4 @@
  ">  \n"
  >  #endif /* __LINUX_IOMMU_H */
 
-6bb954849605da00bf3c572d49f34043e91074ce78675b63327cef9806a447df
+2ba6f9b97dc4362c456b989c194d9f094d7c19902e7f5b11818e306de7e8e467

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.