diff for duplicates of <92EBB4272BF81E4089A7126EC1E7B2846676C7EF@IRSMSX101.ger.corp.intel.com>
diff --git a/a/content_digest b/N1/content_digest
index e61762d..9a8bc9c 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -36,19 +36,19 @@
" Bjorn Helgaas <bhelgaas\@google.com>\0"
]
[
- "Cc\0Rajat Jain <rajatxjain\@gmail.com>",
- " Myron Stowe <myron.stowe\@redhat.com>",
+ "Cc\0Bjorn Helgaas <helgaas\@kernel.org>",
+ " Rajat Jain <rajatja\@google.com>",
+ " Rajat Jain <rajatxjain\@gmail.com>",
" David Daney <david.daney\@cavium.com>",
" linux-pci\@vger.kernel.org <linux-pci\@vger.kernel.org>",
" Timur Tabi <timur\@codeaurora.org>",
" linux-kernel\@vger.kernel.org <linux-kernel\@vger.kernel.org>",
" Julia Lawall <Julia.Lawall\@lip6.fr>",
- " Bjorn Helgaas <helgaas\@kernel.org>",
" linux-arm-msm <linux-arm-msm\@vger.kernel.org>",
- " Rajat Jain <rajatja\@google.com>",
" Yinghai Lu <yinghai\@kernel.org>",
" Shawn Lin <shawn.lin\@rock-chips.com>",
- " linux-arm <linux-arm-kernel\@lists.infradead.org>\0"
+ " linux-arm <linux-arm-kernel\@lists.infradead.org>",
+ " Myron Stowe <myron.stowe\@redhat.com>\0"
]
[
"\0000:1\0"
@@ -162,4 +162,4 @@
"Commercial Register: Amtsgericht Muenchen HRB 186928"
]
-ce370d1ea0913310e89c75ace444484333ab50a5e6a11f38cbc0b7bf97e4dca6
+56cf73052fe088804257dd7326b024dab6e6705380f89598867be958e2fc7b48
diff --git a/a/1.txt b/N2/1.txt
index c594f2c..b92a371 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -1,103 +1,88 @@
-Hi Bjorn/Kaya,
-
-
->
->On 4/17/2017 12:38 PM, Bjorn Helgaas wrote:
->>> Like you said, what do we do by default is the question. Should we opt
->>> for safe like we are doing, or try to save some power.
->> I think safety is paramount. Every user should be able to boot safely
->> without any kernel parameters. We don't want users to have a problem
->> booting and then have to search for a workaround like booting with
->> "pcie_aspm=off". Most users will never do that.
->>
->
->OK, no problem with leaving the behavior as it is.
->
->My initial approach was #2. We knew this way that user had full control
->over the ASPM policy by changing the BIOS option. Then, Mayurkumar
->complained that ASPM is not enabled following a hotplug insertion to an
->empty slot. That's when I switched to #3 as it sounded like a good thing
->to have for us.
->
->> Here's a long-term strawman proposal, see what you think:
->>
->> - Deprecate CONFIG_PCIEASPM_DEFAULT, CONFIG_PCIEASPM_POWERSAVE, etc.
->> - Default aspm_policy is POLICY_DEFAULT always.
->> - POLICY_DEFAULT means Linux doesn't touch anything: if BIOS enabled
->> ASPM, we leave it that way; we leave ASPM disabled on hot-added
->> devices.
->
-I am also ok with leaving the same behavior as now.
-But still following is something open I feel besides, Which may be there in your comments redundantly.
-The current problem is, pcie_aspm_exit_link_state() disables the ASPM configuration even
-if POLICY_DEFAULT was set.
-I am seeing already following problem(or may be influence) with it. The Endpoint I have does not have
-does not have "Presence detect change" mechanism. Hot plug is working with Link status events.
-When link is in L1 or L1SS and if EP is powered off, no Link status change event are triggered (It might be
-the expected behavior in L1 or L1SS). When next time EP is powered on there are link down and
-link up events coming one after other. BIOS enables ASPM on Root port and Endpoint, but while
-processing link status down, pcie_aspm_exit_link_state() clears the ASPM already which were enabled by BIOS.
-If we want to follow above approach then shall we consider having something similar as following?
-
-diff --git a/drivers/pci/pcie/aspm.c b/drivers/pci/pcie/aspm.c
-index 1dfa10c..bf5be6d 100644
---- a/drivers/pci/pcie/aspm.c
-+++ b/drivers/pci/pcie/aspm.c
-@@ -940,7 +940,8 @@ void pcie_aspm_exit_link_state(struct pci_dev *pdev)
- parent_link = link->parent;
-
- /* All functions are removed, so just disable ASPM for the link */
-- pcie_config_aspm_link(link, 0);
-+ if (aspm_policy != POLICY_DEFAULT)
-+ pcie_config_aspm_link(link, 0);
- list_del(&link->sibling);
- list_del(&link->link);
- /* Clock PM is for endpoint device */
-
-
->I can easily see people complaining the other way around. There
->could be some boot FW that doesn't know what ASPM is and this particular
->system could rely on the compile time option for enabling power options.
->Maybe, a command line option will be required for them to keep the existing
->behavior.
->
->> - Deprecate kernel boot parameters (possibly keep pcie_aspm=off for
->> debugging use).
->> - Use /sys/module/pcie_aspm/parameters/policy for run-time
->> system-wide control, including for future hot-added devices.
->> - Remove CONFIG_PCIEASPM_DEBUG and enable that code always, so we
->> have fine-grained run-time control.
->>
->
->Runtime control sounds like a better plan. We need hooks into the system
->power management policy.
->
->>> Maybe, we are missing a HPP option from the PCI spec.
->> That's an interesting idea. _HPX does have provision for manipulating
->> Link Control bits (see ACPI r5.0, sec 6.2.8.3), but I don't think very
->> many systems implement it. And there's currently no connection
->> between program_hpp_type2() and aspm.c, so I'm a little worried that
->> we might have issues if a system did implement an _HPX that sets any
->> of the ASPM bits.
->
->I looked at the spec some more. These are there to restore the register
->settings following hotplug insertion. I agree it won't play nice with ASPM
->as the control bits need to be enabled in coordination with the upstream
->device.
->
->I think the right approach is to let the userspace feed the required
->policy to the kernel like you suggested. Then, it needs to be per port
->via link_state to have the most flexibility.
->
->
->--
->Sinan Kaya
->Qualcomm Datacenter Technologies, Inc. as an affiliate of Qualcomm Technologies, Inc.
->Qualcomm Technologies, Inc. is a member of the Code Aurora Forum, a Linux Foundation Collaborative Project.
-Intel Deutschland GmbH
-Registered Address: Am Campeon 10-12, 85579 Neubiberg, Germany
-Tel: +49 89 99 8853-0, www.intel.de
-Managing Directors: Christin Eisenschmid, Christian Lamprechter
-Chairperson of the Supervisory Board: Nicole Lau
-Registered Office: Munich
-Commercial Register: Amtsgericht Muenchen HRB 186928
\ No newline at end of file
+SGkgQmpvcm4vS2F5YSwNCg0KDQo+DQo+T24gNC8xNy8yMDE3IDEyOjM4IFBNLCBCam9ybiBIZWxn
+YWFzIHdyb3RlOg0KPj4+IExpa2UgeW91IHNhaWQsIHdoYXQgZG8gd2UgZG8gYnkgZGVmYXVsdCBp
+cyB0aGUgcXVlc3Rpb24uIFNob3VsZCB3ZSBvcHQNCj4+PiBmb3Igc2FmZSBsaWtlIHdlIGFyZSBk
+b2luZywgb3IgdHJ5IHRvIHNhdmUgc29tZSBwb3dlci4NCj4+IEkgdGhpbmsgc2FmZXR5IGlzIHBh
+cmFtb3VudC4gIEV2ZXJ5IHVzZXIgc2hvdWxkIGJlIGFibGUgdG8gYm9vdCBzYWZlbHkNCj4+IHdp
+dGhvdXQgYW55IGtlcm5lbCBwYXJhbWV0ZXJzLiAgV2UgZG9uJ3Qgd2FudCB1c2VycyB0byBoYXZl
+IGEgcHJvYmxlbQ0KPj4gYm9vdGluZyBhbmQgdGhlbiBoYXZlIHRvIHNlYXJjaCBmb3IgYSB3b3Jr
+YXJvdW5kIGxpa2UgYm9vdGluZyB3aXRoDQo+PiAicGNpZV9hc3BtPW9mZiIuICBNb3N0IHVzZXJz
+IHdpbGwgbmV2ZXIgZG8gdGhhdC4NCj4+DQo+DQo+T0ssIG5vIHByb2JsZW0gd2l0aCBsZWF2aW5n
+IHRoZSBiZWhhdmlvciBhcyBpdCBpcy4NCj4NCj5NeSBpbml0aWFsIGFwcHJvYWNoIHdhcyAjMi4g
+V2Uga25ldyB0aGlzIHdheSB0aGF0IHVzZXIgaGFkIGZ1bGwgY29udHJvbA0KPm92ZXIgdGhlIEFT
+UE0gcG9saWN5IGJ5IGNoYW5naW5nIHRoZSBCSU9TIG9wdGlvbi4gVGhlbiwgTWF5dXJrdW1hcg0K
+PmNvbXBsYWluZWQgdGhhdCBBU1BNIGlzIG5vdCBlbmFibGVkIGZvbGxvd2luZyBhIGhvdHBsdWcg
+aW5zZXJ0aW9uIHRvIGFuDQo+ZW1wdHkgc2xvdC4gVGhhdCdzIHdoZW4gSSBzd2l0Y2hlZCB0byAj
+MyBhcyBpdCBzb3VuZGVkIGxpa2UgYSBnb29kIHRoaW5nDQo+dG8gaGF2ZSBmb3IgdXMuDQo+DQo+
+PiBIZXJlJ3MgYSBsb25nLXRlcm0gc3RyYXdtYW4gcHJvcG9zYWwsIHNlZSB3aGF0IHlvdSB0aGlu
+azoNCj4+DQo+PiAgIC0gRGVwcmVjYXRlIENPTkZJR19QQ0lFQVNQTV9ERUZBVUxULCBDT05GSUdf
+UENJRUFTUE1fUE9XRVJTQVZFLCBldGMuDQo+PiAgIC0gRGVmYXVsdCBhc3BtX3BvbGljeSBpcyBQ
+T0xJQ1lfREVGQVVMVCBhbHdheXMuDQo+PiAgIC0gUE9MSUNZX0RFRkFVTFQgbWVhbnMgTGludXgg
+ZG9lc24ndCB0b3VjaCBhbnl0aGluZzogaWYgQklPUyBlbmFibGVkDQo+PiBBU1BNLCB3ZSBsZWF2
+ZSBpdCB0aGF0IHdheTsgd2UgbGVhdmUgQVNQTSBkaXNhYmxlZCBvbiBob3QtYWRkZWQNCj4+IGRl
+dmljZXMuDQo+DQpJIGFtIGFsc28gb2sgd2l0aCBsZWF2aW5nIHRoZSBzYW1lIGJlaGF2aW9yIGFz
+IG5vdy4NCkJ1dCBzdGlsbCBmb2xsb3dpbmcgaXMgc29tZXRoaW5nIG9wZW4gSSBmZWVsIGJlc2lk
+ZXMsIFdoaWNoIG1heSBiZSB0aGVyZSBpbiB5b3VyIGNvbW1lbnRzIHJlZHVuZGFudGx5Lg0KVGhl
+IGN1cnJlbnQgcHJvYmxlbSBpcywgcGNpZV9hc3BtX2V4aXRfbGlua19zdGF0ZSgpIGRpc2FibGVz
+IHRoZSBBU1BNIGNvbmZpZ3VyYXRpb24gZXZlbg0KaWYgUE9MSUNZX0RFRkFVTFQgd2FzIHNldC4N
+CkkgYW0gc2VlaW5nIGFscmVhZHkgZm9sbG93aW5nIHByb2JsZW0ob3IgbWF5IGJlIGluZmx1ZW5j
+ZSkgd2l0aCBpdC4gVGhlIEVuZHBvaW50IEkgaGF2ZSBkb2VzIG5vdCBoYXZlDQpkb2VzIG5vdCBo
+YXZlICJQcmVzZW5jZSBkZXRlY3QgY2hhbmdlIiBtZWNoYW5pc20uIEhvdCBwbHVnIGlzIHdvcmtp
+bmcgd2l0aCBMaW5rIHN0YXR1cyBldmVudHMuDQpXaGVuIGxpbmsgaXMgaW4gTDEgb3IgTDFTUyBh
+bmQgaWYgRVAgaXMgcG93ZXJlZCBvZmYsIG5vIExpbmsgc3RhdHVzIGNoYW5nZSBldmVudCBhcmUg
+dHJpZ2dlcmVkIChJdCBtaWdodCBiZQ0KdGhlIGV4cGVjdGVkIGJlaGF2aW9yIGluIEwxIG9yIEwx
+U1MpLiAgV2hlbiBuZXh0IHRpbWUgRVAgaXMgcG93ZXJlZCBvbiB0aGVyZSBhcmUgbGluayBkb3du
+IGFuZA0KbGluayB1cCBldmVudHMgY29taW5nIG9uZSBhZnRlciBvdGhlci4gQklPUyBlbmFibGVz
+IEFTUE0gb24gUm9vdCBwb3J0IGFuZCBFbmRwb2ludCwgYnV0IHdoaWxlDQpwcm9jZXNzaW5nIGxp
+bmsgc3RhdHVzIGRvd24sIHBjaWVfYXNwbV9leGl0X2xpbmtfc3RhdGUoKSBjbGVhcnMgdGhlIEFT
+UE0gYWxyZWFkeSB3aGljaCB3ZXJlIGVuYWJsZWQgYnkgQklPUy4gDQpJZiB3ZSB3YW50IHRvIGZv
+bGxvdyBhYm92ZSBhcHByb2FjaCB0aGVuIHNoYWxsIHdlIGNvbnNpZGVyIGhhdmluZyBzb21ldGhp
+bmcgc2ltaWxhciBhcyBmb2xsb3dpbmc/DQoNCmRpZmYgLS1naXQgYS9kcml2ZXJzL3BjaS9wY2ll
+L2FzcG0uYyBiL2RyaXZlcnMvcGNpL3BjaWUvYXNwbS5jDQppbmRleCAxZGZhMTBjLi5iZjViZTZk
+IDEwMDY0NA0KLS0tIGEvZHJpdmVycy9wY2kvcGNpZS9hc3BtLmMNCisrKyBiL2RyaXZlcnMvcGNp
+L3BjaWUvYXNwbS5jDQpAQCAtOTQwLDcgKzk0MCw4IEBAIHZvaWQgcGNpZV9hc3BtX2V4aXRfbGlu
+a19zdGF0ZShzdHJ1Y3QgcGNpX2RldiAqcGRldikNCiAgICAgICAgcGFyZW50X2xpbmsgPSBsaW5r
+LT5wYXJlbnQ7DQoNCiAgICAgICAgLyogQWxsIGZ1bmN0aW9ucyBhcmUgcmVtb3ZlZCwgc28ganVz
+dCBkaXNhYmxlIEFTUE0gZm9yIHRoZSBsaW5rICovDQotICAgICAgIHBjaWVfY29uZmlnX2FzcG1f
+bGluayhsaW5rLCAwKTsNCisgICAgICAgaWYgKGFzcG1fcG9saWN5ICE9IFBPTElDWV9ERUZBVUxU
+KQ0KKyAgICAgICAgICAgICAgIHBjaWVfY29uZmlnX2FzcG1fbGluayhsaW5rLCAwKTsNCiAgICAg
+ICAgbGlzdF9kZWwoJmxpbmstPnNpYmxpbmcpOw0KICAgICAgICBsaXN0X2RlbCgmbGluay0+bGlu
+ayk7DQogICAgICAgIC8qIENsb2NrIFBNIGlzIGZvciBlbmRwb2ludCBkZXZpY2UgKi8NCiANCg0K
+PkkgY2FuIGVhc2lseSBzZWUgcGVvcGxlIGNvbXBsYWluaW5nIHRoZSBvdGhlciB3YXkgYXJvdW5k
+LiBUaGVyZQ0KPmNvdWxkIGJlIHNvbWUgYm9vdCBGVyB0aGF0IGRvZXNuJ3Qga25vdyB3aGF0IEFT
+UE0gaXMgYW5kIHRoaXMgcGFydGljdWxhcg0KPnN5c3RlbSBjb3VsZCByZWx5IG9uIHRoZSBjb21w
+aWxlIHRpbWUgb3B0aW9uIGZvciBlbmFibGluZyBwb3dlciBvcHRpb25zLg0KPk1heWJlLCBhIGNv
+bW1hbmQgbGluZSBvcHRpb24gd2lsbCBiZSByZXF1aXJlZCBmb3IgdGhlbSB0byBrZWVwIHRoZSBl
+eGlzdGluZw0KPmJlaGF2aW9yLg0KPg0KPj4gICAtIERlcHJlY2F0ZSBrZXJuZWwgYm9vdCBwYXJh
+bWV0ZXJzIChwb3NzaWJseSBrZWVwIHBjaWVfYXNwbT1vZmYgZm9yDQo+PiBkZWJ1Z2dpbmcgdXNl
+KS4NCj4+ICAgLSBVc2UgL3N5cy9tb2R1bGUvcGNpZV9hc3BtL3BhcmFtZXRlcnMvcG9saWN5IGZv
+ciBydW4tdGltZQ0KPj4gc3lzdGVtLXdpZGUgIGNvbnRyb2wsIGluY2x1ZGluZyBmb3IgZnV0dXJl
+IGhvdC1hZGRlZCBkZXZpY2VzLg0KPj4gICAtIFJlbW92ZSBDT05GSUdfUENJRUFTUE1fREVCVUcg
+YW5kIGVuYWJsZSB0aGF0IGNvZGUgYWx3YXlzLCBzbyB3ZQ0KPj4gaGF2ZSBmaW5lLWdyYWluZWQg
+cnVuLXRpbWUgY29udHJvbC4NCj4+DQo+DQo+UnVudGltZSBjb250cm9sIHNvdW5kcyBsaWtlIGEg
+YmV0dGVyIHBsYW4uIFdlIG5lZWQgaG9va3MgaW50byB0aGUgc3lzdGVtDQo+cG93ZXIgbWFuYWdl
+bWVudCBwb2xpY3kuDQo+DQo+Pj4gTWF5YmUsIHdlIGFyZSBtaXNzaW5nIGEgSFBQIG9wdGlvbiBm
+cm9tIHRoZSBQQ0kgc3BlYy4NCj4+IFRoYXQncyBhbiBpbnRlcmVzdGluZyBpZGVhLiAgX0hQWCBk
+b2VzIGhhdmUgcHJvdmlzaW9uIGZvciBtYW5pcHVsYXRpbmcNCj4+IExpbmsgQ29udHJvbCBiaXRz
+IChzZWUgQUNQSSByNS4wLCBzZWMgNi4yLjguMyksIGJ1dCBJIGRvbid0IHRoaW5rIHZlcnkNCj4+
+IG1hbnkgc3lzdGVtcyBpbXBsZW1lbnQgaXQuICBBbmQgdGhlcmUncyBjdXJyZW50bHkgbm8gY29u
+bmVjdGlvbg0KPj4gYmV0d2VlbiBwcm9ncmFtX2hwcF90eXBlMigpIGFuZCBhc3BtLmMsIHNvIEkn
+bSBhIGxpdHRsZSB3b3JyaWVkIHRoYXQNCj4+IHdlIG1pZ2h0IGhhdmUgaXNzdWVzIGlmIGEgc3lz
+dGVtIGRpZCBpbXBsZW1lbnQgYW4gX0hQWCB0aGF0IHNldHMgYW55DQo+PiBvZiB0aGUgQVNQTSBi
+aXRzLg0KPg0KPkkgbG9va2VkIGF0IHRoZSBzcGVjIHNvbWUgbW9yZS4gVGhlc2UgYXJlIHRoZXJl
+IHRvIHJlc3RvcmUgdGhlIHJlZ2lzdGVyDQo+c2V0dGluZ3MgZm9sbG93aW5nIGhvdHBsdWcgaW5z
+ZXJ0aW9uLiBJIGFncmVlIGl0IHdvbid0IHBsYXkgbmljZSB3aXRoIEFTUE0NCj5hcyB0aGUgY29u
+dHJvbCBiaXRzIG5lZWQgdG8gYmUgZW5hYmxlZCBpbiBjb29yZGluYXRpb24gd2l0aCB0aGUgdXBz
+dHJlYW0NCj5kZXZpY2UuDQo+DQo+SSB0aGluayB0aGUgcmlnaHQgYXBwcm9hY2ggaXMgdG8gbGV0
+IHRoZSB1c2Vyc3BhY2UgZmVlZCB0aGUgcmVxdWlyZWQNCj5wb2xpY3kgdG8gdGhlIGtlcm5lbCBs
+aWtlIHlvdSBzdWdnZXN0ZWQuIFRoZW4sIGl0IG5lZWRzIHRvIGJlIHBlciBwb3J0DQo+dmlhIGxp
+bmtfc3RhdGUgdG8gaGF2ZSB0aGUgbW9zdCBmbGV4aWJpbGl0eS4NCj4NCj4NCj4tLQ0KPlNpbmFu
+IEtheWENCj5RdWFsY29tbSBEYXRhY2VudGVyIFRlY2hub2xvZ2llcywgSW5jLiBhcyBhbiBhZmZp
+bGlhdGUgb2YgUXVhbGNvbW0gVGVjaG5vbG9naWVzLCBJbmMuDQo+UXVhbGNvbW0gVGVjaG5vbG9n
+aWVzLCBJbmMuIGlzIGEgbWVtYmVyIG9mIHRoZSBDb2RlIEF1cm9yYSBGb3J1bSwgYSBMaW51eCBG
+b3VuZGF0aW9uIENvbGxhYm9yYXRpdmUgUHJvamVjdC4NCkludGVsIERldXRzY2hsYW5kIEdtYkgK
+UmVnaXN0ZXJlZCBBZGRyZXNzOiBBbSBDYW1wZW9uIDEwLTEyLCA4NTU3OSBOZXViaWJlcmcsIEdl
+cm1hbnkKVGVsOiArNDkgODkgOTkgODg1My0wLCB3d3cuaW50ZWwuZGUKTWFuYWdpbmcgRGlyZWN0
+b3JzOiBDaHJpc3RpbiBFaXNlbnNjaG1pZCwgQ2hyaXN0aWFuIExhbXByZWNodGVyCkNoYWlycGVy
+c29uIG9mIHRoZSBTdXBlcnZpc29yeSBCb2FyZDogTmljb2xlIExhdQpSZWdpc3RlcmVkIE9mZmlj
+ZTogTXVuaWNoCkNvbW1lcmNpYWwgUmVnaXN0ZXI6IEFtdHNnZXJpY2h0IE11ZW5jaGVuIEhSQiAx
+ODY5MjgK
\ No newline at end of file
diff --git a/a/content_digest b/N2/content_digest
index e61762d..6a5e503 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -36,19 +36,19 @@
" Bjorn Helgaas <bhelgaas\@google.com>\0"
]
[
- "Cc\0Rajat Jain <rajatxjain\@gmail.com>",
- " Myron Stowe <myron.stowe\@redhat.com>",
+ "Cc\0Bjorn Helgaas <helgaas\@kernel.org>",
+ " Rajat Jain <rajatja\@google.com>",
+ " Rajat Jain <rajatxjain\@gmail.com>",
" David Daney <david.daney\@cavium.com>",
" linux-pci\@vger.kernel.org <linux-pci\@vger.kernel.org>",
" Timur Tabi <timur\@codeaurora.org>",
" linux-kernel\@vger.kernel.org <linux-kernel\@vger.kernel.org>",
" Julia Lawall <Julia.Lawall\@lip6.fr>",
- " Bjorn Helgaas <helgaas\@kernel.org>",
" linux-arm-msm <linux-arm-msm\@vger.kernel.org>",
- " Rajat Jain <rajatja\@google.com>",
" Yinghai Lu <yinghai\@kernel.org>",
" Shawn Lin <shawn.lin\@rock-chips.com>",
- " linux-arm <linux-arm-kernel\@lists.infradead.org>\0"
+ " linux-arm <linux-arm-kernel\@lists.infradead.org>",
+ " Myron Stowe <myron.stowe\@redhat.com>\0"
]
[
"\0000:1\0"
@@ -57,109 +57,94 @@
"b\0"
]
[
- "Hi Bjorn/Kaya,\n",
- "\n",
- "\n",
- ">\n",
- ">On 4/17/2017 12:38 PM, Bjorn Helgaas wrote:\n",
- ">>> Like you said, what do we do by default is the question. Should we opt\n",
- ">>> for safe like we are doing, or try to save some power.\n",
- ">> I think safety is paramount. Every user should be able to boot safely\n",
- ">> without any kernel parameters. We don't want users to have a problem\n",
- ">> booting and then have to search for a workaround like booting with\n",
- ">> \"pcie_aspm=off\". Most users will never do that.\n",
- ">>\n",
- ">\n",
- ">OK, no problem with leaving the behavior as it is.\n",
- ">\n",
- ">My initial approach was #2. We knew this way that user had full control\n",
- ">over the ASPM policy by changing the BIOS option. Then, Mayurkumar\n",
- ">complained that ASPM is not enabled following a hotplug insertion to an\n",
- ">empty slot. That's when I switched to #3 as it sounded like a good thing\n",
- ">to have for us.\n",
- ">\n",
- ">> Here's a long-term strawman proposal, see what you think:\n",
- ">>\n",
- ">> - Deprecate CONFIG_PCIEASPM_DEFAULT, CONFIG_PCIEASPM_POWERSAVE, etc.\n",
- ">> - Default aspm_policy is POLICY_DEFAULT always.\n",
- ">> - POLICY_DEFAULT means Linux doesn't touch anything: if BIOS enabled\n",
- ">> ASPM, we leave it that way; we leave ASPM disabled on hot-added\n",
- ">> devices.\n",
- ">\n",
- "I am also ok with leaving the same behavior as now.\n",
- "But still following is something open I feel besides, Which may be there in your comments redundantly.\n",
- "The current problem is, pcie_aspm_exit_link_state() disables the ASPM configuration even\n",
- "if POLICY_DEFAULT was set.\n",
- "I am seeing already following problem(or may be influence) with it. The Endpoint I have does not have\n",
- "does not have \"Presence detect change\" mechanism. Hot plug is working with Link status events.\n",
- "When link is in L1 or L1SS and if EP is powered off, no Link status change event are triggered (It might be\n",
- "the expected behavior in L1 or L1SS). When next time EP is powered on there are link down and\n",
- "link up events coming one after other. BIOS enables ASPM on Root port and Endpoint, but while\n",
- "processing link status down, pcie_aspm_exit_link_state() clears the ASPM already which were enabled by BIOS. \n",
- "If we want to follow above approach then shall we consider having something similar as following?\n",
- "\n",
- "diff --git a/drivers/pci/pcie/aspm.c b/drivers/pci/pcie/aspm.c\n",
- "index 1dfa10c..bf5be6d 100644\n",
- "--- a/drivers/pci/pcie/aspm.c\n",
- "+++ b/drivers/pci/pcie/aspm.c\n",
- "\@\@ -940,7 +940,8 \@\@ void pcie_aspm_exit_link_state(struct pci_dev *pdev)\n",
- " parent_link = link->parent;\n",
- "\n",
- " /* All functions are removed, so just disable ASPM for the link */\n",
- "- pcie_config_aspm_link(link, 0);\n",
- "+ if (aspm_policy != POLICY_DEFAULT)\n",
- "+ pcie_config_aspm_link(link, 0);\n",
- " list_del(&link->sibling);\n",
- " list_del(&link->link);\n",
- " /* Clock PM is for endpoint device */\n",
- " \n",
- "\n",
- ">I can easily see people complaining the other way around. There\n",
- ">could be some boot FW that doesn't know what ASPM is and this particular\n",
- ">system could rely on the compile time option for enabling power options.\n",
- ">Maybe, a command line option will be required for them to keep the existing\n",
- ">behavior.\n",
- ">\n",
- ">> - Deprecate kernel boot parameters (possibly keep pcie_aspm=off for\n",
- ">> debugging use).\n",
- ">> - Use /sys/module/pcie_aspm/parameters/policy for run-time\n",
- ">> system-wide control, including for future hot-added devices.\n",
- ">> - Remove CONFIG_PCIEASPM_DEBUG and enable that code always, so we\n",
- ">> have fine-grained run-time control.\n",
- ">>\n",
- ">\n",
- ">Runtime control sounds like a better plan. We need hooks into the system\n",
- ">power management policy.\n",
- ">\n",
- ">>> Maybe, we are missing a HPP option from the PCI spec.\n",
- ">> That's an interesting idea. _HPX does have provision for manipulating\n",
- ">> Link Control bits (see ACPI r5.0, sec 6.2.8.3), but I don't think very\n",
- ">> many systems implement it. And there's currently no connection\n",
- ">> between program_hpp_type2() and aspm.c, so I'm a little worried that\n",
- ">> we might have issues if a system did implement an _HPX that sets any\n",
- ">> of the ASPM bits.\n",
- ">\n",
- ">I looked at the spec some more. These are there to restore the register\n",
- ">settings following hotplug insertion. I agree it won't play nice with ASPM\n",
- ">as the control bits need to be enabled in coordination with the upstream\n",
- ">device.\n",
- ">\n",
- ">I think the right approach is to let the userspace feed the required\n",
- ">policy to the kernel like you suggested. Then, it needs to be per port\n",
- ">via link_state to have the most flexibility.\n",
- ">\n",
- ">\n",
- ">--\n",
- ">Sinan Kaya\n",
- ">Qualcomm Datacenter Technologies, Inc. as an affiliate of Qualcomm Technologies, Inc.\n",
- ">Qualcomm Technologies, Inc. is a member of the Code Aurora Forum, a Linux Foundation Collaborative Project.\n",
- "Intel Deutschland GmbH\n",
- "Registered Address: Am Campeon 10-12, 85579 Neubiberg, Germany\n",
- "Tel: +49 89 99 8853-0, www.intel.de\n",
- "Managing Directors: Christin Eisenschmid, Christian Lamprechter\n",
- "Chairperson of the Supervisory Board: Nicole Lau\n",
- "Registered Office: Munich\n",
- "Commercial Register: Amtsgericht Muenchen HRB 186928"
+ "SGkgQmpvcm4vS2F5YSwNCg0KDQo+DQo+T24gNC8xNy8yMDE3IDEyOjM4IFBNLCBCam9ybiBIZWxn\n",
+ "YWFzIHdyb3RlOg0KPj4+IExpa2UgeW91IHNhaWQsIHdoYXQgZG8gd2UgZG8gYnkgZGVmYXVsdCBp\n",
+ "cyB0aGUgcXVlc3Rpb24uIFNob3VsZCB3ZSBvcHQNCj4+PiBmb3Igc2FmZSBsaWtlIHdlIGFyZSBk\n",
+ "b2luZywgb3IgdHJ5IHRvIHNhdmUgc29tZSBwb3dlci4NCj4+IEkgdGhpbmsgc2FmZXR5IGlzIHBh\n",
+ "cmFtb3VudC4gIEV2ZXJ5IHVzZXIgc2hvdWxkIGJlIGFibGUgdG8gYm9vdCBzYWZlbHkNCj4+IHdp\n",
+ "dGhvdXQgYW55IGtlcm5lbCBwYXJhbWV0ZXJzLiAgV2UgZG9uJ3Qgd2FudCB1c2VycyB0byBoYXZl\n",
+ "IGEgcHJvYmxlbQ0KPj4gYm9vdGluZyBhbmQgdGhlbiBoYXZlIHRvIHNlYXJjaCBmb3IgYSB3b3Jr\n",
+ "YXJvdW5kIGxpa2UgYm9vdGluZyB3aXRoDQo+PiAicGNpZV9hc3BtPW9mZiIuICBNb3N0IHVzZXJz\n",
+ "IHdpbGwgbmV2ZXIgZG8gdGhhdC4NCj4+DQo+DQo+T0ssIG5vIHByb2JsZW0gd2l0aCBsZWF2aW5n\n",
+ "IHRoZSBiZWhhdmlvciBhcyBpdCBpcy4NCj4NCj5NeSBpbml0aWFsIGFwcHJvYWNoIHdhcyAjMi4g\n",
+ "V2Uga25ldyB0aGlzIHdheSB0aGF0IHVzZXIgaGFkIGZ1bGwgY29udHJvbA0KPm92ZXIgdGhlIEFT\n",
+ "UE0gcG9saWN5IGJ5IGNoYW5naW5nIHRoZSBCSU9TIG9wdGlvbi4gVGhlbiwgTWF5dXJrdW1hcg0K\n",
+ "PmNvbXBsYWluZWQgdGhhdCBBU1BNIGlzIG5vdCBlbmFibGVkIGZvbGxvd2luZyBhIGhvdHBsdWcg\n",
+ "aW5zZXJ0aW9uIHRvIGFuDQo+ZW1wdHkgc2xvdC4gVGhhdCdzIHdoZW4gSSBzd2l0Y2hlZCB0byAj\n",
+ "MyBhcyBpdCBzb3VuZGVkIGxpa2UgYSBnb29kIHRoaW5nDQo+dG8gaGF2ZSBmb3IgdXMuDQo+DQo+\n",
+ "PiBIZXJlJ3MgYSBsb25nLXRlcm0gc3RyYXdtYW4gcHJvcG9zYWwsIHNlZSB3aGF0IHlvdSB0aGlu\n",
+ "azoNCj4+DQo+PiAgIC0gRGVwcmVjYXRlIENPTkZJR19QQ0lFQVNQTV9ERUZBVUxULCBDT05GSUdf\n",
+ "UENJRUFTUE1fUE9XRVJTQVZFLCBldGMuDQo+PiAgIC0gRGVmYXVsdCBhc3BtX3BvbGljeSBpcyBQ\n",
+ "T0xJQ1lfREVGQVVMVCBhbHdheXMuDQo+PiAgIC0gUE9MSUNZX0RFRkFVTFQgbWVhbnMgTGludXgg\n",
+ "ZG9lc24ndCB0b3VjaCBhbnl0aGluZzogaWYgQklPUyBlbmFibGVkDQo+PiBBU1BNLCB3ZSBsZWF2\n",
+ "ZSBpdCB0aGF0IHdheTsgd2UgbGVhdmUgQVNQTSBkaXNhYmxlZCBvbiBob3QtYWRkZWQNCj4+IGRl\n",
+ "dmljZXMuDQo+DQpJIGFtIGFsc28gb2sgd2l0aCBsZWF2aW5nIHRoZSBzYW1lIGJlaGF2aW9yIGFz\n",
+ "IG5vdy4NCkJ1dCBzdGlsbCBmb2xsb3dpbmcgaXMgc29tZXRoaW5nIG9wZW4gSSBmZWVsIGJlc2lk\n",
+ "ZXMsIFdoaWNoIG1heSBiZSB0aGVyZSBpbiB5b3VyIGNvbW1lbnRzIHJlZHVuZGFudGx5Lg0KVGhl\n",
+ "IGN1cnJlbnQgcHJvYmxlbSBpcywgcGNpZV9hc3BtX2V4aXRfbGlua19zdGF0ZSgpIGRpc2FibGVz\n",
+ "IHRoZSBBU1BNIGNvbmZpZ3VyYXRpb24gZXZlbg0KaWYgUE9MSUNZX0RFRkFVTFQgd2FzIHNldC4N\n",
+ "CkkgYW0gc2VlaW5nIGFscmVhZHkgZm9sbG93aW5nIHByb2JsZW0ob3IgbWF5IGJlIGluZmx1ZW5j\n",
+ "ZSkgd2l0aCBpdC4gVGhlIEVuZHBvaW50IEkgaGF2ZSBkb2VzIG5vdCBoYXZlDQpkb2VzIG5vdCBo\n",
+ "YXZlICJQcmVzZW5jZSBkZXRlY3QgY2hhbmdlIiBtZWNoYW5pc20uIEhvdCBwbHVnIGlzIHdvcmtp\n",
+ "bmcgd2l0aCBMaW5rIHN0YXR1cyBldmVudHMuDQpXaGVuIGxpbmsgaXMgaW4gTDEgb3IgTDFTUyBh\n",
+ "bmQgaWYgRVAgaXMgcG93ZXJlZCBvZmYsIG5vIExpbmsgc3RhdHVzIGNoYW5nZSBldmVudCBhcmUg\n",
+ "dHJpZ2dlcmVkIChJdCBtaWdodCBiZQ0KdGhlIGV4cGVjdGVkIGJlaGF2aW9yIGluIEwxIG9yIEwx\n",
+ "U1MpLiAgV2hlbiBuZXh0IHRpbWUgRVAgaXMgcG93ZXJlZCBvbiB0aGVyZSBhcmUgbGluayBkb3du\n",
+ "IGFuZA0KbGluayB1cCBldmVudHMgY29taW5nIG9uZSBhZnRlciBvdGhlci4gQklPUyBlbmFibGVz\n",
+ "IEFTUE0gb24gUm9vdCBwb3J0IGFuZCBFbmRwb2ludCwgYnV0IHdoaWxlDQpwcm9jZXNzaW5nIGxp\n",
+ "bmsgc3RhdHVzIGRvd24sIHBjaWVfYXNwbV9leGl0X2xpbmtfc3RhdGUoKSBjbGVhcnMgdGhlIEFT\n",
+ "UE0gYWxyZWFkeSB3aGljaCB3ZXJlIGVuYWJsZWQgYnkgQklPUy4gDQpJZiB3ZSB3YW50IHRvIGZv\n",
+ "bGxvdyBhYm92ZSBhcHByb2FjaCB0aGVuIHNoYWxsIHdlIGNvbnNpZGVyIGhhdmluZyBzb21ldGhp\n",
+ "bmcgc2ltaWxhciBhcyBmb2xsb3dpbmc/DQoNCmRpZmYgLS1naXQgYS9kcml2ZXJzL3BjaS9wY2ll\n",
+ "L2FzcG0uYyBiL2RyaXZlcnMvcGNpL3BjaWUvYXNwbS5jDQppbmRleCAxZGZhMTBjLi5iZjViZTZk\n",
+ "IDEwMDY0NA0KLS0tIGEvZHJpdmVycy9wY2kvcGNpZS9hc3BtLmMNCisrKyBiL2RyaXZlcnMvcGNp\n",
+ "L3BjaWUvYXNwbS5jDQpAQCAtOTQwLDcgKzk0MCw4IEBAIHZvaWQgcGNpZV9hc3BtX2V4aXRfbGlu\n",
+ "a19zdGF0ZShzdHJ1Y3QgcGNpX2RldiAqcGRldikNCiAgICAgICAgcGFyZW50X2xpbmsgPSBsaW5r\n",
+ "LT5wYXJlbnQ7DQoNCiAgICAgICAgLyogQWxsIGZ1bmN0aW9ucyBhcmUgcmVtb3ZlZCwgc28ganVz\n",
+ "dCBkaXNhYmxlIEFTUE0gZm9yIHRoZSBsaW5rICovDQotICAgICAgIHBjaWVfY29uZmlnX2FzcG1f\n",
+ "bGluayhsaW5rLCAwKTsNCisgICAgICAgaWYgKGFzcG1fcG9saWN5ICE9IFBPTElDWV9ERUZBVUxU\n",
+ "KQ0KKyAgICAgICAgICAgICAgIHBjaWVfY29uZmlnX2FzcG1fbGluayhsaW5rLCAwKTsNCiAgICAg\n",
+ "ICAgbGlzdF9kZWwoJmxpbmstPnNpYmxpbmcpOw0KICAgICAgICBsaXN0X2RlbCgmbGluay0+bGlu\n",
+ "ayk7DQogICAgICAgIC8qIENsb2NrIFBNIGlzIGZvciBlbmRwb2ludCBkZXZpY2UgKi8NCiANCg0K\n",
+ "PkkgY2FuIGVhc2lseSBzZWUgcGVvcGxlIGNvbXBsYWluaW5nIHRoZSBvdGhlciB3YXkgYXJvdW5k\n",
+ "LiBUaGVyZQ0KPmNvdWxkIGJlIHNvbWUgYm9vdCBGVyB0aGF0IGRvZXNuJ3Qga25vdyB3aGF0IEFT\n",
+ "UE0gaXMgYW5kIHRoaXMgcGFydGljdWxhcg0KPnN5c3RlbSBjb3VsZCByZWx5IG9uIHRoZSBjb21w\n",
+ "aWxlIHRpbWUgb3B0aW9uIGZvciBlbmFibGluZyBwb3dlciBvcHRpb25zLg0KPk1heWJlLCBhIGNv\n",
+ "bW1hbmQgbGluZSBvcHRpb24gd2lsbCBiZSByZXF1aXJlZCBmb3IgdGhlbSB0byBrZWVwIHRoZSBl\n",
+ "eGlzdGluZw0KPmJlaGF2aW9yLg0KPg0KPj4gICAtIERlcHJlY2F0ZSBrZXJuZWwgYm9vdCBwYXJh\n",
+ "bWV0ZXJzIChwb3NzaWJseSBrZWVwIHBjaWVfYXNwbT1vZmYgZm9yDQo+PiBkZWJ1Z2dpbmcgdXNl\n",
+ "KS4NCj4+ICAgLSBVc2UgL3N5cy9tb2R1bGUvcGNpZV9hc3BtL3BhcmFtZXRlcnMvcG9saWN5IGZv\n",
+ "ciBydW4tdGltZQ0KPj4gc3lzdGVtLXdpZGUgIGNvbnRyb2wsIGluY2x1ZGluZyBmb3IgZnV0dXJl\n",
+ "IGhvdC1hZGRlZCBkZXZpY2VzLg0KPj4gICAtIFJlbW92ZSBDT05GSUdfUENJRUFTUE1fREVCVUcg\n",
+ "YW5kIGVuYWJsZSB0aGF0IGNvZGUgYWx3YXlzLCBzbyB3ZQ0KPj4gaGF2ZSBmaW5lLWdyYWluZWQg\n",
+ "cnVuLXRpbWUgY29udHJvbC4NCj4+DQo+DQo+UnVudGltZSBjb250cm9sIHNvdW5kcyBsaWtlIGEg\n",
+ "YmV0dGVyIHBsYW4uIFdlIG5lZWQgaG9va3MgaW50byB0aGUgc3lzdGVtDQo+cG93ZXIgbWFuYWdl\n",
+ "bWVudCBwb2xpY3kuDQo+DQo+Pj4gTWF5YmUsIHdlIGFyZSBtaXNzaW5nIGEgSFBQIG9wdGlvbiBm\n",
+ "cm9tIHRoZSBQQ0kgc3BlYy4NCj4+IFRoYXQncyBhbiBpbnRlcmVzdGluZyBpZGVhLiAgX0hQWCBk\n",
+ "b2VzIGhhdmUgcHJvdmlzaW9uIGZvciBtYW5pcHVsYXRpbmcNCj4+IExpbmsgQ29udHJvbCBiaXRz\n",
+ "IChzZWUgQUNQSSByNS4wLCBzZWMgNi4yLjguMyksIGJ1dCBJIGRvbid0IHRoaW5rIHZlcnkNCj4+\n",
+ "IG1hbnkgc3lzdGVtcyBpbXBsZW1lbnQgaXQuICBBbmQgdGhlcmUncyBjdXJyZW50bHkgbm8gY29u\n",
+ "bmVjdGlvbg0KPj4gYmV0d2VlbiBwcm9ncmFtX2hwcF90eXBlMigpIGFuZCBhc3BtLmMsIHNvIEkn\n",
+ "bSBhIGxpdHRsZSB3b3JyaWVkIHRoYXQNCj4+IHdlIG1pZ2h0IGhhdmUgaXNzdWVzIGlmIGEgc3lz\n",
+ "dGVtIGRpZCBpbXBsZW1lbnQgYW4gX0hQWCB0aGF0IHNldHMgYW55DQo+PiBvZiB0aGUgQVNQTSBi\n",
+ "aXRzLg0KPg0KPkkgbG9va2VkIGF0IHRoZSBzcGVjIHNvbWUgbW9yZS4gVGhlc2UgYXJlIHRoZXJl\n",
+ "IHRvIHJlc3RvcmUgdGhlIHJlZ2lzdGVyDQo+c2V0dGluZ3MgZm9sbG93aW5nIGhvdHBsdWcgaW5z\n",
+ "ZXJ0aW9uLiBJIGFncmVlIGl0IHdvbid0IHBsYXkgbmljZSB3aXRoIEFTUE0NCj5hcyB0aGUgY29u\n",
+ "dHJvbCBiaXRzIG5lZWQgdG8gYmUgZW5hYmxlZCBpbiBjb29yZGluYXRpb24gd2l0aCB0aGUgdXBz\n",
+ "dHJlYW0NCj5kZXZpY2UuDQo+DQo+SSB0aGluayB0aGUgcmlnaHQgYXBwcm9hY2ggaXMgdG8gbGV0\n",
+ "IHRoZSB1c2Vyc3BhY2UgZmVlZCB0aGUgcmVxdWlyZWQNCj5wb2xpY3kgdG8gdGhlIGtlcm5lbCBs\n",
+ "aWtlIHlvdSBzdWdnZXN0ZWQuIFRoZW4sIGl0IG5lZWRzIHRvIGJlIHBlciBwb3J0DQo+dmlhIGxp\n",
+ "bmtfc3RhdGUgdG8gaGF2ZSB0aGUgbW9zdCBmbGV4aWJpbGl0eS4NCj4NCj4NCj4tLQ0KPlNpbmFu\n",
+ "IEtheWENCj5RdWFsY29tbSBEYXRhY2VudGVyIFRlY2hub2xvZ2llcywgSW5jLiBhcyBhbiBhZmZp\n",
+ "bGlhdGUgb2YgUXVhbGNvbW0gVGVjaG5vbG9naWVzLCBJbmMuDQo+UXVhbGNvbW0gVGVjaG5vbG9n\n",
+ "aWVzLCBJbmMuIGlzIGEgbWVtYmVyIG9mIHRoZSBDb2RlIEF1cm9yYSBGb3J1bSwgYSBMaW51eCBG\n",
+ "b3VuZGF0aW9uIENvbGxhYm9yYXRpdmUgUHJvamVjdC4NCkludGVsIERldXRzY2hsYW5kIEdtYkgK\n",
+ "UmVnaXN0ZXJlZCBBZGRyZXNzOiBBbSBDYW1wZW9uIDEwLTEyLCA4NTU3OSBOZXViaWJlcmcsIEdl\n",
+ "cm1hbnkKVGVsOiArNDkgODkgOTkgODg1My0wLCB3d3cuaW50ZWwuZGUKTWFuYWdpbmcgRGlyZWN0\n",
+ "b3JzOiBDaHJpc3RpbiBFaXNlbnNjaG1pZCwgQ2hyaXN0aWFuIExhbXByZWNodGVyCkNoYWlycGVy\n",
+ "c29uIG9mIHRoZSBTdXBlcnZpc29yeSBCb2FyZDogTmljb2xlIExhdQpSZWdpc3RlcmVkIE9mZmlj\n",
+ "ZTogTXVuaWNoCkNvbW1lcmNpYWwgUmVnaXN0ZXI6IEFtdHNnZXJpY2h0IE11ZW5jaGVuIEhSQiAx\n",
+ "ODY5MjgK"
]
-ce370d1ea0913310e89c75ace444484333ab50a5e6a11f38cbc0b7bf97e4dca6
+ce019117dc98a0f8ead40a8bba90883d2e320616c842d03d8051b9ce5e111aaa
diff --git a/a/content_digest b/N3/content_digest
index e61762d..eaee2b0 100644
--- a/a/content_digest
+++ b/N3/content_digest
@@ -23,32 +23,16 @@
"ref\0c0c2f48f-d725-058e-a1ad-92ab4b6e7fb3\@codeaurora.org\0"
]
[
- "From\0Patel, Mayurkumar <mayurkumar.patel\@intel.com>\0"
+ "From\0mayurkumar.patel\@intel.com (Patel, Mayurkumar)\0"
]
[
- "Subject\0RE: [PATCH V8 4/5] PCI/ASPM: save power on values during bridge init\0"
+ "Subject\0[PATCH V8 4/5] PCI/ASPM: save power on values during bridge init\0"
]
[
"Date\0Fri, 21 Apr 2017 07:46:27 +0000\0"
]
[
- "To\0Sinan Kaya <okaya\@codeaurora.org>",
- " Bjorn Helgaas <bhelgaas\@google.com>\0"
-]
-[
- "Cc\0Rajat Jain <rajatxjain\@gmail.com>",
- " Myron Stowe <myron.stowe\@redhat.com>",
- " David Daney <david.daney\@cavium.com>",
- " linux-pci\@vger.kernel.org <linux-pci\@vger.kernel.org>",
- " Timur Tabi <timur\@codeaurora.org>",
- " linux-kernel\@vger.kernel.org <linux-kernel\@vger.kernel.org>",
- " Julia Lawall <Julia.Lawall\@lip6.fr>",
- " Bjorn Helgaas <helgaas\@kernel.org>",
- " linux-arm-msm <linux-arm-msm\@vger.kernel.org>",
- " Rajat Jain <rajatja\@google.com>",
- " Yinghai Lu <yinghai\@kernel.org>",
- " Shawn Lin <shawn.lin\@rock-chips.com>",
- " linux-arm <linux-arm-kernel\@lists.infradead.org>\0"
+ "To\0linux-arm-kernel\@lists.infradead.org\0"
]
[
"\0000:1\0"
@@ -162,4 +146,4 @@
"Commercial Register: Amtsgericht Muenchen HRB 186928"
]
-ce370d1ea0913310e89c75ace444484333ab50a5e6a11f38cbc0b7bf97e4dca6
+95cc5bb7051b65e998499326645b66c5df52c756f1a362e1c43390749209c22e
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.