All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <92EBB4272BF81E4089A7126EC1E7B2846676C7EF@IRSMSX101.ger.corp.intel.com>

diff --git a/a/content_digest b/N1/content_digest
index e61762d..9a8bc9c 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -36,19 +36,19 @@
   " Bjorn Helgaas <bhelgaas\@google.com>\0"
 ]
 [
-  "Cc\0Rajat Jain <rajatxjain\@gmail.com>",
-  " Myron Stowe <myron.stowe\@redhat.com>",
+  "Cc\0Bjorn Helgaas <helgaas\@kernel.org>",
+  " Rajat Jain <rajatja\@google.com>",
+  " Rajat Jain <rajatxjain\@gmail.com>",
   " David Daney <david.daney\@cavium.com>",
   " linux-pci\@vger.kernel.org <linux-pci\@vger.kernel.org>",
   " Timur Tabi <timur\@codeaurora.org>",
   " linux-kernel\@vger.kernel.org <linux-kernel\@vger.kernel.org>",
   " Julia Lawall <Julia.Lawall\@lip6.fr>",
-  " Bjorn Helgaas <helgaas\@kernel.org>",
   " linux-arm-msm <linux-arm-msm\@vger.kernel.org>",
-  " Rajat Jain <rajatja\@google.com>",
   " Yinghai Lu <yinghai\@kernel.org>",
   " Shawn Lin <shawn.lin\@rock-chips.com>",
-  " linux-arm <linux-arm-kernel\@lists.infradead.org>\0"
+  " linux-arm <linux-arm-kernel\@lists.infradead.org>",
+  " Myron Stowe <myron.stowe\@redhat.com>\0"
 ]
 [
   "\0000:1\0"
@@ -162,4 +162,4 @@
   "Commercial Register: Amtsgericht Muenchen HRB 186928"
 ]
 
-ce370d1ea0913310e89c75ace444484333ab50a5e6a11f38cbc0b7bf97e4dca6
+56cf73052fe088804257dd7326b024dab6e6705380f89598867be958e2fc7b48

diff --git a/a/1.txt b/N2/1.txt
index c594f2c..b92a371 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -1,103 +1,88 @@
-Hi Bjorn/Kaya,
-
-
->
->On 4/17/2017 12:38 PM, Bjorn Helgaas wrote:
->>> Like you said, what do we do by default is the question. Should we opt
->>> for safe like we are doing, or try to save some power.
->> I think safety is paramount.  Every user should be able to boot safely
->> without any kernel parameters.  We don't want users to have a problem
->> booting and then have to search for a workaround like booting with
->> "pcie_aspm=off".  Most users will never do that.
->>
->
->OK, no problem with leaving the behavior as it is.
->
->My initial approach was #2. We knew this way that user had full control
->over the ASPM policy by changing the BIOS option. Then, Mayurkumar
->complained that ASPM is not enabled following a hotplug insertion to an
->empty slot. That's when I switched to #3 as it sounded like a good thing
->to have for us.
->
->> Here's a long-term strawman proposal, see what you think:
->>
->>   - Deprecate CONFIG_PCIEASPM_DEFAULT, CONFIG_PCIEASPM_POWERSAVE, etc.
->>   - Default aspm_policy is POLICY_DEFAULT always.
->>   - POLICY_DEFAULT means Linux doesn't touch anything: if BIOS enabled
->> ASPM, we leave it that way; we leave ASPM disabled on hot-added
->> devices.
->
-I am also ok with leaving the same behavior as now.
-But still following is something open I feel besides, Which may be there in your comments redundantly.
-The current problem is, pcie_aspm_exit_link_state() disables the ASPM configuration even
-if POLICY_DEFAULT was set.
-I am seeing already following problem(or may be influence) with it. The Endpoint I have does not have
-does not have "Presence detect change" mechanism. Hot plug is working with Link status events.
-When link is in L1 or L1SS and if EP is powered off, no Link status change event are triggered (It might be
-the expected behavior in L1 or L1SS).  When next time EP is powered on there are link down and
-link up events coming one after other. BIOS enables ASPM on Root port and Endpoint, but while
-processing link status down, pcie_aspm_exit_link_state() clears the ASPM already which were enabled by BIOS. 
-If we want to follow above approach then shall we consider having something similar as following?
-
-diff --git a/drivers/pci/pcie/aspm.c b/drivers/pci/pcie/aspm.c
-index 1dfa10c..bf5be6d 100644
---- a/drivers/pci/pcie/aspm.c
-+++ b/drivers/pci/pcie/aspm.c
-@@ -940,7 +940,8 @@ void pcie_aspm_exit_link_state(struct pci_dev *pdev)
-        parent_link = link->parent;
-
-        /* All functions are removed, so just disable ASPM for the link */
--       pcie_config_aspm_link(link, 0);
-+       if (aspm_policy != POLICY_DEFAULT)
-+               pcie_config_aspm_link(link, 0);
-        list_del(&link->sibling);
-        list_del(&link->link);
-        /* Clock PM is for endpoint device */
- 
-
->I can easily see people complaining the other way around. There
->could be some boot FW that doesn't know what ASPM is and this particular
->system could rely on the compile time option for enabling power options.
->Maybe, a command line option will be required for them to keep the existing
->behavior.
->
->>   - Deprecate kernel boot parameters (possibly keep pcie_aspm=off for
->> debugging use).
->>   - Use /sys/module/pcie_aspm/parameters/policy for run-time
->> system-wide  control, including for future hot-added devices.
->>   - Remove CONFIG_PCIEASPM_DEBUG and enable that code always, so we
->> have fine-grained run-time control.
->>
->
->Runtime control sounds like a better plan. We need hooks into the system
->power management policy.
->
->>> Maybe, we are missing a HPP option from the PCI spec.
->> That's an interesting idea.  _HPX does have provision for manipulating
->> Link Control bits (see ACPI r5.0, sec 6.2.8.3), but I don't think very
->> many systems implement it.  And there's currently no connection
->> between program_hpp_type2() and aspm.c, so I'm a little worried that
->> we might have issues if a system did implement an _HPX that sets any
->> of the ASPM bits.
->
->I looked at the spec some more. These are there to restore the register
->settings following hotplug insertion. I agree it won't play nice with ASPM
->as the control bits need to be enabled in coordination with the upstream
->device.
->
->I think the right approach is to let the userspace feed the required
->policy to the kernel like you suggested. Then, it needs to be per port
->via link_state to have the most flexibility.
->
->
->--
->Sinan Kaya
->Qualcomm Datacenter Technologies, Inc. as an affiliate of Qualcomm Technologies, Inc.
->Qualcomm Technologies, Inc. is a member of the Code Aurora Forum, a Linux Foundation Collaborative Project.
-Intel Deutschland GmbH
-Registered Address: Am Campeon 10-12, 85579 Neubiberg, Germany
-Tel: +49 89 99 8853-0, www.intel.de
-Managing Directors: Christin Eisenschmid, Christian Lamprechter
-Chairperson of the Supervisory Board: Nicole Lau
-Registered Office: Munich
-Commercial Register: Amtsgericht Muenchen HRB 186928
\ No newline at end of file
+SGkgQmpvcm4vS2F5YSwNCg0KDQo+DQo+T24gNC8xNy8yMDE3IDEyOjM4IFBNLCBCam9ybiBIZWxn
+YWFzIHdyb3RlOg0KPj4+IExpa2UgeW91IHNhaWQsIHdoYXQgZG8gd2UgZG8gYnkgZGVmYXVsdCBp
+cyB0aGUgcXVlc3Rpb24uIFNob3VsZCB3ZSBvcHQNCj4+PiBmb3Igc2FmZSBsaWtlIHdlIGFyZSBk
+b2luZywgb3IgdHJ5IHRvIHNhdmUgc29tZSBwb3dlci4NCj4+IEkgdGhpbmsgc2FmZXR5IGlzIHBh
+cmFtb3VudC4gIEV2ZXJ5IHVzZXIgc2hvdWxkIGJlIGFibGUgdG8gYm9vdCBzYWZlbHkNCj4+IHdp
+dGhvdXQgYW55IGtlcm5lbCBwYXJhbWV0ZXJzLiAgV2UgZG9uJ3Qgd2FudCB1c2VycyB0byBoYXZl
+IGEgcHJvYmxlbQ0KPj4gYm9vdGluZyBhbmQgdGhlbiBoYXZlIHRvIHNlYXJjaCBmb3IgYSB3b3Jr
+YXJvdW5kIGxpa2UgYm9vdGluZyB3aXRoDQo+PiAicGNpZV9hc3BtPW9mZiIuICBNb3N0IHVzZXJz
+IHdpbGwgbmV2ZXIgZG8gdGhhdC4NCj4+DQo+DQo+T0ssIG5vIHByb2JsZW0gd2l0aCBsZWF2aW5n
+IHRoZSBiZWhhdmlvciBhcyBpdCBpcy4NCj4NCj5NeSBpbml0aWFsIGFwcHJvYWNoIHdhcyAjMi4g
+V2Uga25ldyB0aGlzIHdheSB0aGF0IHVzZXIgaGFkIGZ1bGwgY29udHJvbA0KPm92ZXIgdGhlIEFT
+UE0gcG9saWN5IGJ5IGNoYW5naW5nIHRoZSBCSU9TIG9wdGlvbi4gVGhlbiwgTWF5dXJrdW1hcg0K
+PmNvbXBsYWluZWQgdGhhdCBBU1BNIGlzIG5vdCBlbmFibGVkIGZvbGxvd2luZyBhIGhvdHBsdWcg
+aW5zZXJ0aW9uIHRvIGFuDQo+ZW1wdHkgc2xvdC4gVGhhdCdzIHdoZW4gSSBzd2l0Y2hlZCB0byAj
+MyBhcyBpdCBzb3VuZGVkIGxpa2UgYSBnb29kIHRoaW5nDQo+dG8gaGF2ZSBmb3IgdXMuDQo+DQo+
+PiBIZXJlJ3MgYSBsb25nLXRlcm0gc3RyYXdtYW4gcHJvcG9zYWwsIHNlZSB3aGF0IHlvdSB0aGlu
+azoNCj4+DQo+PiAgIC0gRGVwcmVjYXRlIENPTkZJR19QQ0lFQVNQTV9ERUZBVUxULCBDT05GSUdf
+UENJRUFTUE1fUE9XRVJTQVZFLCBldGMuDQo+PiAgIC0gRGVmYXVsdCBhc3BtX3BvbGljeSBpcyBQ
+T0xJQ1lfREVGQVVMVCBhbHdheXMuDQo+PiAgIC0gUE9MSUNZX0RFRkFVTFQgbWVhbnMgTGludXgg
+ZG9lc24ndCB0b3VjaCBhbnl0aGluZzogaWYgQklPUyBlbmFibGVkDQo+PiBBU1BNLCB3ZSBsZWF2
+ZSBpdCB0aGF0IHdheTsgd2UgbGVhdmUgQVNQTSBkaXNhYmxlZCBvbiBob3QtYWRkZWQNCj4+IGRl
+dmljZXMuDQo+DQpJIGFtIGFsc28gb2sgd2l0aCBsZWF2aW5nIHRoZSBzYW1lIGJlaGF2aW9yIGFz
+IG5vdy4NCkJ1dCBzdGlsbCBmb2xsb3dpbmcgaXMgc29tZXRoaW5nIG9wZW4gSSBmZWVsIGJlc2lk
+ZXMsIFdoaWNoIG1heSBiZSB0aGVyZSBpbiB5b3VyIGNvbW1lbnRzIHJlZHVuZGFudGx5Lg0KVGhl
+IGN1cnJlbnQgcHJvYmxlbSBpcywgcGNpZV9hc3BtX2V4aXRfbGlua19zdGF0ZSgpIGRpc2FibGVz
+IHRoZSBBU1BNIGNvbmZpZ3VyYXRpb24gZXZlbg0KaWYgUE9MSUNZX0RFRkFVTFQgd2FzIHNldC4N
+CkkgYW0gc2VlaW5nIGFscmVhZHkgZm9sbG93aW5nIHByb2JsZW0ob3IgbWF5IGJlIGluZmx1ZW5j
+ZSkgd2l0aCBpdC4gVGhlIEVuZHBvaW50IEkgaGF2ZSBkb2VzIG5vdCBoYXZlDQpkb2VzIG5vdCBo
+YXZlICJQcmVzZW5jZSBkZXRlY3QgY2hhbmdlIiBtZWNoYW5pc20uIEhvdCBwbHVnIGlzIHdvcmtp
+bmcgd2l0aCBMaW5rIHN0YXR1cyBldmVudHMuDQpXaGVuIGxpbmsgaXMgaW4gTDEgb3IgTDFTUyBh
+bmQgaWYgRVAgaXMgcG93ZXJlZCBvZmYsIG5vIExpbmsgc3RhdHVzIGNoYW5nZSBldmVudCBhcmUg
+dHJpZ2dlcmVkIChJdCBtaWdodCBiZQ0KdGhlIGV4cGVjdGVkIGJlaGF2aW9yIGluIEwxIG9yIEwx
+U1MpLiAgV2hlbiBuZXh0IHRpbWUgRVAgaXMgcG93ZXJlZCBvbiB0aGVyZSBhcmUgbGluayBkb3du
+IGFuZA0KbGluayB1cCBldmVudHMgY29taW5nIG9uZSBhZnRlciBvdGhlci4gQklPUyBlbmFibGVz
+IEFTUE0gb24gUm9vdCBwb3J0IGFuZCBFbmRwb2ludCwgYnV0IHdoaWxlDQpwcm9jZXNzaW5nIGxp
+bmsgc3RhdHVzIGRvd24sIHBjaWVfYXNwbV9leGl0X2xpbmtfc3RhdGUoKSBjbGVhcnMgdGhlIEFT
+UE0gYWxyZWFkeSB3aGljaCB3ZXJlIGVuYWJsZWQgYnkgQklPUy4gDQpJZiB3ZSB3YW50IHRvIGZv
+bGxvdyBhYm92ZSBhcHByb2FjaCB0aGVuIHNoYWxsIHdlIGNvbnNpZGVyIGhhdmluZyBzb21ldGhp
+bmcgc2ltaWxhciBhcyBmb2xsb3dpbmc/DQoNCmRpZmYgLS1naXQgYS9kcml2ZXJzL3BjaS9wY2ll
+L2FzcG0uYyBiL2RyaXZlcnMvcGNpL3BjaWUvYXNwbS5jDQppbmRleCAxZGZhMTBjLi5iZjViZTZk
+IDEwMDY0NA0KLS0tIGEvZHJpdmVycy9wY2kvcGNpZS9hc3BtLmMNCisrKyBiL2RyaXZlcnMvcGNp
+L3BjaWUvYXNwbS5jDQpAQCAtOTQwLDcgKzk0MCw4IEBAIHZvaWQgcGNpZV9hc3BtX2V4aXRfbGlu
+a19zdGF0ZShzdHJ1Y3QgcGNpX2RldiAqcGRldikNCiAgICAgICAgcGFyZW50X2xpbmsgPSBsaW5r
+LT5wYXJlbnQ7DQoNCiAgICAgICAgLyogQWxsIGZ1bmN0aW9ucyBhcmUgcmVtb3ZlZCwgc28ganVz
+dCBkaXNhYmxlIEFTUE0gZm9yIHRoZSBsaW5rICovDQotICAgICAgIHBjaWVfY29uZmlnX2FzcG1f
+bGluayhsaW5rLCAwKTsNCisgICAgICAgaWYgKGFzcG1fcG9saWN5ICE9IFBPTElDWV9ERUZBVUxU
+KQ0KKyAgICAgICAgICAgICAgIHBjaWVfY29uZmlnX2FzcG1fbGluayhsaW5rLCAwKTsNCiAgICAg
+ICAgbGlzdF9kZWwoJmxpbmstPnNpYmxpbmcpOw0KICAgICAgICBsaXN0X2RlbCgmbGluay0+bGlu
+ayk7DQogICAgICAgIC8qIENsb2NrIFBNIGlzIGZvciBlbmRwb2ludCBkZXZpY2UgKi8NCiANCg0K
+PkkgY2FuIGVhc2lseSBzZWUgcGVvcGxlIGNvbXBsYWluaW5nIHRoZSBvdGhlciB3YXkgYXJvdW5k
+LiBUaGVyZQ0KPmNvdWxkIGJlIHNvbWUgYm9vdCBGVyB0aGF0IGRvZXNuJ3Qga25vdyB3aGF0IEFT
+UE0gaXMgYW5kIHRoaXMgcGFydGljdWxhcg0KPnN5c3RlbSBjb3VsZCByZWx5IG9uIHRoZSBjb21w
+aWxlIHRpbWUgb3B0aW9uIGZvciBlbmFibGluZyBwb3dlciBvcHRpb25zLg0KPk1heWJlLCBhIGNv
+bW1hbmQgbGluZSBvcHRpb24gd2lsbCBiZSByZXF1aXJlZCBmb3IgdGhlbSB0byBrZWVwIHRoZSBl
+eGlzdGluZw0KPmJlaGF2aW9yLg0KPg0KPj4gICAtIERlcHJlY2F0ZSBrZXJuZWwgYm9vdCBwYXJh
+bWV0ZXJzIChwb3NzaWJseSBrZWVwIHBjaWVfYXNwbT1vZmYgZm9yDQo+PiBkZWJ1Z2dpbmcgdXNl
+KS4NCj4+ICAgLSBVc2UgL3N5cy9tb2R1bGUvcGNpZV9hc3BtL3BhcmFtZXRlcnMvcG9saWN5IGZv
+ciBydW4tdGltZQ0KPj4gc3lzdGVtLXdpZGUgIGNvbnRyb2wsIGluY2x1ZGluZyBmb3IgZnV0dXJl
+IGhvdC1hZGRlZCBkZXZpY2VzLg0KPj4gICAtIFJlbW92ZSBDT05GSUdfUENJRUFTUE1fREVCVUcg
+YW5kIGVuYWJsZSB0aGF0IGNvZGUgYWx3YXlzLCBzbyB3ZQ0KPj4gaGF2ZSBmaW5lLWdyYWluZWQg
+cnVuLXRpbWUgY29udHJvbC4NCj4+DQo+DQo+UnVudGltZSBjb250cm9sIHNvdW5kcyBsaWtlIGEg
+YmV0dGVyIHBsYW4uIFdlIG5lZWQgaG9va3MgaW50byB0aGUgc3lzdGVtDQo+cG93ZXIgbWFuYWdl
+bWVudCBwb2xpY3kuDQo+DQo+Pj4gTWF5YmUsIHdlIGFyZSBtaXNzaW5nIGEgSFBQIG9wdGlvbiBm
+cm9tIHRoZSBQQ0kgc3BlYy4NCj4+IFRoYXQncyBhbiBpbnRlcmVzdGluZyBpZGVhLiAgX0hQWCBk
+b2VzIGhhdmUgcHJvdmlzaW9uIGZvciBtYW5pcHVsYXRpbmcNCj4+IExpbmsgQ29udHJvbCBiaXRz
+IChzZWUgQUNQSSByNS4wLCBzZWMgNi4yLjguMyksIGJ1dCBJIGRvbid0IHRoaW5rIHZlcnkNCj4+
+IG1hbnkgc3lzdGVtcyBpbXBsZW1lbnQgaXQuICBBbmQgdGhlcmUncyBjdXJyZW50bHkgbm8gY29u
+bmVjdGlvbg0KPj4gYmV0d2VlbiBwcm9ncmFtX2hwcF90eXBlMigpIGFuZCBhc3BtLmMsIHNvIEkn
+bSBhIGxpdHRsZSB3b3JyaWVkIHRoYXQNCj4+IHdlIG1pZ2h0IGhhdmUgaXNzdWVzIGlmIGEgc3lz
+dGVtIGRpZCBpbXBsZW1lbnQgYW4gX0hQWCB0aGF0IHNldHMgYW55DQo+PiBvZiB0aGUgQVNQTSBi
+aXRzLg0KPg0KPkkgbG9va2VkIGF0IHRoZSBzcGVjIHNvbWUgbW9yZS4gVGhlc2UgYXJlIHRoZXJl
+IHRvIHJlc3RvcmUgdGhlIHJlZ2lzdGVyDQo+c2V0dGluZ3MgZm9sbG93aW5nIGhvdHBsdWcgaW5z
+ZXJ0aW9uLiBJIGFncmVlIGl0IHdvbid0IHBsYXkgbmljZSB3aXRoIEFTUE0NCj5hcyB0aGUgY29u
+dHJvbCBiaXRzIG5lZWQgdG8gYmUgZW5hYmxlZCBpbiBjb29yZGluYXRpb24gd2l0aCB0aGUgdXBz
+dHJlYW0NCj5kZXZpY2UuDQo+DQo+SSB0aGluayB0aGUgcmlnaHQgYXBwcm9hY2ggaXMgdG8gbGV0
+IHRoZSB1c2Vyc3BhY2UgZmVlZCB0aGUgcmVxdWlyZWQNCj5wb2xpY3kgdG8gdGhlIGtlcm5lbCBs
+aWtlIHlvdSBzdWdnZXN0ZWQuIFRoZW4sIGl0IG5lZWRzIHRvIGJlIHBlciBwb3J0DQo+dmlhIGxp
+bmtfc3RhdGUgdG8gaGF2ZSB0aGUgbW9zdCBmbGV4aWJpbGl0eS4NCj4NCj4NCj4tLQ0KPlNpbmFu
+IEtheWENCj5RdWFsY29tbSBEYXRhY2VudGVyIFRlY2hub2xvZ2llcywgSW5jLiBhcyBhbiBhZmZp
+bGlhdGUgb2YgUXVhbGNvbW0gVGVjaG5vbG9naWVzLCBJbmMuDQo+UXVhbGNvbW0gVGVjaG5vbG9n
+aWVzLCBJbmMuIGlzIGEgbWVtYmVyIG9mIHRoZSBDb2RlIEF1cm9yYSBGb3J1bSwgYSBMaW51eCBG
+b3VuZGF0aW9uIENvbGxhYm9yYXRpdmUgUHJvamVjdC4NCkludGVsIERldXRzY2hsYW5kIEdtYkgK
+UmVnaXN0ZXJlZCBBZGRyZXNzOiBBbSBDYW1wZW9uIDEwLTEyLCA4NTU3OSBOZXViaWJlcmcsIEdl
+cm1hbnkKVGVsOiArNDkgODkgOTkgODg1My0wLCB3d3cuaW50ZWwuZGUKTWFuYWdpbmcgRGlyZWN0
+b3JzOiBDaHJpc3RpbiBFaXNlbnNjaG1pZCwgQ2hyaXN0aWFuIExhbXByZWNodGVyCkNoYWlycGVy
+c29uIG9mIHRoZSBTdXBlcnZpc29yeSBCb2FyZDogTmljb2xlIExhdQpSZWdpc3RlcmVkIE9mZmlj
+ZTogTXVuaWNoCkNvbW1lcmNpYWwgUmVnaXN0ZXI6IEFtdHNnZXJpY2h0IE11ZW5jaGVuIEhSQiAx
+ODY5MjgK
\ No newline at end of file
diff --git a/a/content_digest b/N2/content_digest
index e61762d..6a5e503 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -36,19 +36,19 @@
   " Bjorn Helgaas <bhelgaas\@google.com>\0"
 ]
 [
-  "Cc\0Rajat Jain <rajatxjain\@gmail.com>",
-  " Myron Stowe <myron.stowe\@redhat.com>",
+  "Cc\0Bjorn Helgaas <helgaas\@kernel.org>",
+  " Rajat Jain <rajatja\@google.com>",
+  " Rajat Jain <rajatxjain\@gmail.com>",
   " David Daney <david.daney\@cavium.com>",
   " linux-pci\@vger.kernel.org <linux-pci\@vger.kernel.org>",
   " Timur Tabi <timur\@codeaurora.org>",
   " linux-kernel\@vger.kernel.org <linux-kernel\@vger.kernel.org>",
   " Julia Lawall <Julia.Lawall\@lip6.fr>",
-  " Bjorn Helgaas <helgaas\@kernel.org>",
   " linux-arm-msm <linux-arm-msm\@vger.kernel.org>",
-  " Rajat Jain <rajatja\@google.com>",
   " Yinghai Lu <yinghai\@kernel.org>",
   " Shawn Lin <shawn.lin\@rock-chips.com>",
-  " linux-arm <linux-arm-kernel\@lists.infradead.org>\0"
+  " linux-arm <linux-arm-kernel\@lists.infradead.org>",
+  " Myron Stowe <myron.stowe\@redhat.com>\0"
 ]
 [
   "\0000:1\0"
@@ -57,109 +57,94 @@
   "b\0"
 ]
 [
-  "Hi Bjorn/Kaya,\n",
-  "\n",
-  "\n",
-  ">\n",
-  ">On 4/17/2017 12:38 PM, Bjorn Helgaas wrote:\n",
-  ">>> Like you said, what do we do by default is the question. Should we opt\n",
-  ">>> for safe like we are doing, or try to save some power.\n",
-  ">> I think safety is paramount.  Every user should be able to boot safely\n",
-  ">> without any kernel parameters.  We don't want users to have a problem\n",
-  ">> booting and then have to search for a workaround like booting with\n",
-  ">> \"pcie_aspm=off\".  Most users will never do that.\n",
-  ">>\n",
-  ">\n",
-  ">OK, no problem with leaving the behavior as it is.\n",
-  ">\n",
-  ">My initial approach was #2. We knew this way that user had full control\n",
-  ">over the ASPM policy by changing the BIOS option. Then, Mayurkumar\n",
-  ">complained that ASPM is not enabled following a hotplug insertion to an\n",
-  ">empty slot. That's when I switched to #3 as it sounded like a good thing\n",
-  ">to have for us.\n",
-  ">\n",
-  ">> Here's a long-term strawman proposal, see what you think:\n",
-  ">>\n",
-  ">>   - Deprecate CONFIG_PCIEASPM_DEFAULT, CONFIG_PCIEASPM_POWERSAVE, etc.\n",
-  ">>   - Default aspm_policy is POLICY_DEFAULT always.\n",
-  ">>   - POLICY_DEFAULT means Linux doesn't touch anything: if BIOS enabled\n",
-  ">> ASPM, we leave it that way; we leave ASPM disabled on hot-added\n",
-  ">> devices.\n",
-  ">\n",
-  "I am also ok with leaving the same behavior as now.\n",
-  "But still following is something open I feel besides, Which may be there in your comments redundantly.\n",
-  "The current problem is, pcie_aspm_exit_link_state() disables the ASPM configuration even\n",
-  "if POLICY_DEFAULT was set.\n",
-  "I am seeing already following problem(or may be influence) with it. The Endpoint I have does not have\n",
-  "does not have \"Presence detect change\" mechanism. Hot plug is working with Link status events.\n",
-  "When link is in L1 or L1SS and if EP is powered off, no Link status change event are triggered (It might be\n",
-  "the expected behavior in L1 or L1SS).  When next time EP is powered on there are link down and\n",
-  "link up events coming one after other. BIOS enables ASPM on Root port and Endpoint, but while\n",
-  "processing link status down, pcie_aspm_exit_link_state() clears the ASPM already which were enabled by BIOS. \n",
-  "If we want to follow above approach then shall we consider having something similar as following?\n",
-  "\n",
-  "diff --git a/drivers/pci/pcie/aspm.c b/drivers/pci/pcie/aspm.c\n",
-  "index 1dfa10c..bf5be6d 100644\n",
-  "--- a/drivers/pci/pcie/aspm.c\n",
-  "+++ b/drivers/pci/pcie/aspm.c\n",
-  "\@\@ -940,7 +940,8 \@\@ void pcie_aspm_exit_link_state(struct pci_dev *pdev)\n",
-  "        parent_link = link->parent;\n",
-  "\n",
-  "        /* All functions are removed, so just disable ASPM for the link */\n",
-  "-       pcie_config_aspm_link(link, 0);\n",
-  "+       if (aspm_policy != POLICY_DEFAULT)\n",
-  "+               pcie_config_aspm_link(link, 0);\n",
-  "        list_del(&link->sibling);\n",
-  "        list_del(&link->link);\n",
-  "        /* Clock PM is for endpoint device */\n",
-  " \n",
-  "\n",
-  ">I can easily see people complaining the other way around. There\n",
-  ">could be some boot FW that doesn't know what ASPM is and this particular\n",
-  ">system could rely on the compile time option for enabling power options.\n",
-  ">Maybe, a command line option will be required for them to keep the existing\n",
-  ">behavior.\n",
-  ">\n",
-  ">>   - Deprecate kernel boot parameters (possibly keep pcie_aspm=off for\n",
-  ">> debugging use).\n",
-  ">>   - Use /sys/module/pcie_aspm/parameters/policy for run-time\n",
-  ">> system-wide  control, including for future hot-added devices.\n",
-  ">>   - Remove CONFIG_PCIEASPM_DEBUG and enable that code always, so we\n",
-  ">> have fine-grained run-time control.\n",
-  ">>\n",
-  ">\n",
-  ">Runtime control sounds like a better plan. We need hooks into the system\n",
-  ">power management policy.\n",
-  ">\n",
-  ">>> Maybe, we are missing a HPP option from the PCI spec.\n",
-  ">> That's an interesting idea.  _HPX does have provision for manipulating\n",
-  ">> Link Control bits (see ACPI r5.0, sec 6.2.8.3), but I don't think very\n",
-  ">> many systems implement it.  And there's currently no connection\n",
-  ">> between program_hpp_type2() and aspm.c, so I'm a little worried that\n",
-  ">> we might have issues if a system did implement an _HPX that sets any\n",
-  ">> of the ASPM bits.\n",
-  ">\n",
-  ">I looked at the spec some more. These are there to restore the register\n",
-  ">settings following hotplug insertion. I agree it won't play nice with ASPM\n",
-  ">as the control bits need to be enabled in coordination with the upstream\n",
-  ">device.\n",
-  ">\n",
-  ">I think the right approach is to let the userspace feed the required\n",
-  ">policy to the kernel like you suggested. Then, it needs to be per port\n",
-  ">via link_state to have the most flexibility.\n",
-  ">\n",
-  ">\n",
-  ">--\n",
-  ">Sinan Kaya\n",
-  ">Qualcomm Datacenter Technologies, Inc. as an affiliate of Qualcomm Technologies, Inc.\n",
-  ">Qualcomm Technologies, Inc. is a member of the Code Aurora Forum, a Linux Foundation Collaborative Project.\n",
-  "Intel Deutschland GmbH\n",
-  "Registered Address: Am Campeon 10-12, 85579 Neubiberg, Germany\n",
-  "Tel: +49 89 99 8853-0, www.intel.de\n",
-  "Managing Directors: Christin Eisenschmid, Christian Lamprechter\n",
-  "Chairperson of the Supervisory Board: Nicole Lau\n",
-  "Registered Office: Munich\n",
-  "Commercial Register: Amtsgericht Muenchen HRB 186928"
+  "SGkgQmpvcm4vS2F5YSwNCg0KDQo+DQo+T24gNC8xNy8yMDE3IDEyOjM4IFBNLCBCam9ybiBIZWxn\n",
+  "YWFzIHdyb3RlOg0KPj4+IExpa2UgeW91IHNhaWQsIHdoYXQgZG8gd2UgZG8gYnkgZGVmYXVsdCBp\n",
+  "cyB0aGUgcXVlc3Rpb24uIFNob3VsZCB3ZSBvcHQNCj4+PiBmb3Igc2FmZSBsaWtlIHdlIGFyZSBk\n",
+  "b2luZywgb3IgdHJ5IHRvIHNhdmUgc29tZSBwb3dlci4NCj4+IEkgdGhpbmsgc2FmZXR5IGlzIHBh\n",
+  "cmFtb3VudC4gIEV2ZXJ5IHVzZXIgc2hvdWxkIGJlIGFibGUgdG8gYm9vdCBzYWZlbHkNCj4+IHdp\n",
+  "dGhvdXQgYW55IGtlcm5lbCBwYXJhbWV0ZXJzLiAgV2UgZG9uJ3Qgd2FudCB1c2VycyB0byBoYXZl\n",
+  "IGEgcHJvYmxlbQ0KPj4gYm9vdGluZyBhbmQgdGhlbiBoYXZlIHRvIHNlYXJjaCBmb3IgYSB3b3Jr\n",
+  "YXJvdW5kIGxpa2UgYm9vdGluZyB3aXRoDQo+PiAicGNpZV9hc3BtPW9mZiIuICBNb3N0IHVzZXJz\n",
+  "IHdpbGwgbmV2ZXIgZG8gdGhhdC4NCj4+DQo+DQo+T0ssIG5vIHByb2JsZW0gd2l0aCBsZWF2aW5n\n",
+  "IHRoZSBiZWhhdmlvciBhcyBpdCBpcy4NCj4NCj5NeSBpbml0aWFsIGFwcHJvYWNoIHdhcyAjMi4g\n",
+  "V2Uga25ldyB0aGlzIHdheSB0aGF0IHVzZXIgaGFkIGZ1bGwgY29udHJvbA0KPm92ZXIgdGhlIEFT\n",
+  "UE0gcG9saWN5IGJ5IGNoYW5naW5nIHRoZSBCSU9TIG9wdGlvbi4gVGhlbiwgTWF5dXJrdW1hcg0K\n",
+  "PmNvbXBsYWluZWQgdGhhdCBBU1BNIGlzIG5vdCBlbmFibGVkIGZvbGxvd2luZyBhIGhvdHBsdWcg\n",
+  "aW5zZXJ0aW9uIHRvIGFuDQo+ZW1wdHkgc2xvdC4gVGhhdCdzIHdoZW4gSSBzd2l0Y2hlZCB0byAj\n",
+  "MyBhcyBpdCBzb3VuZGVkIGxpa2UgYSBnb29kIHRoaW5nDQo+dG8gaGF2ZSBmb3IgdXMuDQo+DQo+\n",
+  "PiBIZXJlJ3MgYSBsb25nLXRlcm0gc3RyYXdtYW4gcHJvcG9zYWwsIHNlZSB3aGF0IHlvdSB0aGlu\n",
+  "azoNCj4+DQo+PiAgIC0gRGVwcmVjYXRlIENPTkZJR19QQ0lFQVNQTV9ERUZBVUxULCBDT05GSUdf\n",
+  "UENJRUFTUE1fUE9XRVJTQVZFLCBldGMuDQo+PiAgIC0gRGVmYXVsdCBhc3BtX3BvbGljeSBpcyBQ\n",
+  "T0xJQ1lfREVGQVVMVCBhbHdheXMuDQo+PiAgIC0gUE9MSUNZX0RFRkFVTFQgbWVhbnMgTGludXgg\n",
+  "ZG9lc24ndCB0b3VjaCBhbnl0aGluZzogaWYgQklPUyBlbmFibGVkDQo+PiBBU1BNLCB3ZSBsZWF2\n",
+  "ZSBpdCB0aGF0IHdheTsgd2UgbGVhdmUgQVNQTSBkaXNhYmxlZCBvbiBob3QtYWRkZWQNCj4+IGRl\n",
+  "dmljZXMuDQo+DQpJIGFtIGFsc28gb2sgd2l0aCBsZWF2aW5nIHRoZSBzYW1lIGJlaGF2aW9yIGFz\n",
+  "IG5vdy4NCkJ1dCBzdGlsbCBmb2xsb3dpbmcgaXMgc29tZXRoaW5nIG9wZW4gSSBmZWVsIGJlc2lk\n",
+  "ZXMsIFdoaWNoIG1heSBiZSB0aGVyZSBpbiB5b3VyIGNvbW1lbnRzIHJlZHVuZGFudGx5Lg0KVGhl\n",
+  "IGN1cnJlbnQgcHJvYmxlbSBpcywgcGNpZV9hc3BtX2V4aXRfbGlua19zdGF0ZSgpIGRpc2FibGVz\n",
+  "IHRoZSBBU1BNIGNvbmZpZ3VyYXRpb24gZXZlbg0KaWYgUE9MSUNZX0RFRkFVTFQgd2FzIHNldC4N\n",
+  "CkkgYW0gc2VlaW5nIGFscmVhZHkgZm9sbG93aW5nIHByb2JsZW0ob3IgbWF5IGJlIGluZmx1ZW5j\n",
+  "ZSkgd2l0aCBpdC4gVGhlIEVuZHBvaW50IEkgaGF2ZSBkb2VzIG5vdCBoYXZlDQpkb2VzIG5vdCBo\n",
+  "YXZlICJQcmVzZW5jZSBkZXRlY3QgY2hhbmdlIiBtZWNoYW5pc20uIEhvdCBwbHVnIGlzIHdvcmtp\n",
+  "bmcgd2l0aCBMaW5rIHN0YXR1cyBldmVudHMuDQpXaGVuIGxpbmsgaXMgaW4gTDEgb3IgTDFTUyBh\n",
+  "bmQgaWYgRVAgaXMgcG93ZXJlZCBvZmYsIG5vIExpbmsgc3RhdHVzIGNoYW5nZSBldmVudCBhcmUg\n",
+  "dHJpZ2dlcmVkIChJdCBtaWdodCBiZQ0KdGhlIGV4cGVjdGVkIGJlaGF2aW9yIGluIEwxIG9yIEwx\n",
+  "U1MpLiAgV2hlbiBuZXh0IHRpbWUgRVAgaXMgcG93ZXJlZCBvbiB0aGVyZSBhcmUgbGluayBkb3du\n",
+  "IGFuZA0KbGluayB1cCBldmVudHMgY29taW5nIG9uZSBhZnRlciBvdGhlci4gQklPUyBlbmFibGVz\n",
+  "IEFTUE0gb24gUm9vdCBwb3J0IGFuZCBFbmRwb2ludCwgYnV0IHdoaWxlDQpwcm9jZXNzaW5nIGxp\n",
+  "bmsgc3RhdHVzIGRvd24sIHBjaWVfYXNwbV9leGl0X2xpbmtfc3RhdGUoKSBjbGVhcnMgdGhlIEFT\n",
+  "UE0gYWxyZWFkeSB3aGljaCB3ZXJlIGVuYWJsZWQgYnkgQklPUy4gDQpJZiB3ZSB3YW50IHRvIGZv\n",
+  "bGxvdyBhYm92ZSBhcHByb2FjaCB0aGVuIHNoYWxsIHdlIGNvbnNpZGVyIGhhdmluZyBzb21ldGhp\n",
+  "bmcgc2ltaWxhciBhcyBmb2xsb3dpbmc/DQoNCmRpZmYgLS1naXQgYS9kcml2ZXJzL3BjaS9wY2ll\n",
+  "L2FzcG0uYyBiL2RyaXZlcnMvcGNpL3BjaWUvYXNwbS5jDQppbmRleCAxZGZhMTBjLi5iZjViZTZk\n",
+  "IDEwMDY0NA0KLS0tIGEvZHJpdmVycy9wY2kvcGNpZS9hc3BtLmMNCisrKyBiL2RyaXZlcnMvcGNp\n",
+  "L3BjaWUvYXNwbS5jDQpAQCAtOTQwLDcgKzk0MCw4IEBAIHZvaWQgcGNpZV9hc3BtX2V4aXRfbGlu\n",
+  "a19zdGF0ZShzdHJ1Y3QgcGNpX2RldiAqcGRldikNCiAgICAgICAgcGFyZW50X2xpbmsgPSBsaW5r\n",
+  "LT5wYXJlbnQ7DQoNCiAgICAgICAgLyogQWxsIGZ1bmN0aW9ucyBhcmUgcmVtb3ZlZCwgc28ganVz\n",
+  "dCBkaXNhYmxlIEFTUE0gZm9yIHRoZSBsaW5rICovDQotICAgICAgIHBjaWVfY29uZmlnX2FzcG1f\n",
+  "bGluayhsaW5rLCAwKTsNCisgICAgICAgaWYgKGFzcG1fcG9saWN5ICE9IFBPTElDWV9ERUZBVUxU\n",
+  "KQ0KKyAgICAgICAgICAgICAgIHBjaWVfY29uZmlnX2FzcG1fbGluayhsaW5rLCAwKTsNCiAgICAg\n",
+  "ICAgbGlzdF9kZWwoJmxpbmstPnNpYmxpbmcpOw0KICAgICAgICBsaXN0X2RlbCgmbGluay0+bGlu\n",
+  "ayk7DQogICAgICAgIC8qIENsb2NrIFBNIGlzIGZvciBlbmRwb2ludCBkZXZpY2UgKi8NCiANCg0K\n",
+  "PkkgY2FuIGVhc2lseSBzZWUgcGVvcGxlIGNvbXBsYWluaW5nIHRoZSBvdGhlciB3YXkgYXJvdW5k\n",
+  "LiBUaGVyZQ0KPmNvdWxkIGJlIHNvbWUgYm9vdCBGVyB0aGF0IGRvZXNuJ3Qga25vdyB3aGF0IEFT\n",
+  "UE0gaXMgYW5kIHRoaXMgcGFydGljdWxhcg0KPnN5c3RlbSBjb3VsZCByZWx5IG9uIHRoZSBjb21w\n",
+  "aWxlIHRpbWUgb3B0aW9uIGZvciBlbmFibGluZyBwb3dlciBvcHRpb25zLg0KPk1heWJlLCBhIGNv\n",
+  "bW1hbmQgbGluZSBvcHRpb24gd2lsbCBiZSByZXF1aXJlZCBmb3IgdGhlbSB0byBrZWVwIHRoZSBl\n",
+  "eGlzdGluZw0KPmJlaGF2aW9yLg0KPg0KPj4gICAtIERlcHJlY2F0ZSBrZXJuZWwgYm9vdCBwYXJh\n",
+  "bWV0ZXJzIChwb3NzaWJseSBrZWVwIHBjaWVfYXNwbT1vZmYgZm9yDQo+PiBkZWJ1Z2dpbmcgdXNl\n",
+  "KS4NCj4+ICAgLSBVc2UgL3N5cy9tb2R1bGUvcGNpZV9hc3BtL3BhcmFtZXRlcnMvcG9saWN5IGZv\n",
+  "ciBydW4tdGltZQ0KPj4gc3lzdGVtLXdpZGUgIGNvbnRyb2wsIGluY2x1ZGluZyBmb3IgZnV0dXJl\n",
+  "IGhvdC1hZGRlZCBkZXZpY2VzLg0KPj4gICAtIFJlbW92ZSBDT05GSUdfUENJRUFTUE1fREVCVUcg\n",
+  "YW5kIGVuYWJsZSB0aGF0IGNvZGUgYWx3YXlzLCBzbyB3ZQ0KPj4gaGF2ZSBmaW5lLWdyYWluZWQg\n",
+  "cnVuLXRpbWUgY29udHJvbC4NCj4+DQo+DQo+UnVudGltZSBjb250cm9sIHNvdW5kcyBsaWtlIGEg\n",
+  "YmV0dGVyIHBsYW4uIFdlIG5lZWQgaG9va3MgaW50byB0aGUgc3lzdGVtDQo+cG93ZXIgbWFuYWdl\n",
+  "bWVudCBwb2xpY3kuDQo+DQo+Pj4gTWF5YmUsIHdlIGFyZSBtaXNzaW5nIGEgSFBQIG9wdGlvbiBm\n",
+  "cm9tIHRoZSBQQ0kgc3BlYy4NCj4+IFRoYXQncyBhbiBpbnRlcmVzdGluZyBpZGVhLiAgX0hQWCBk\n",
+  "b2VzIGhhdmUgcHJvdmlzaW9uIGZvciBtYW5pcHVsYXRpbmcNCj4+IExpbmsgQ29udHJvbCBiaXRz\n",
+  "IChzZWUgQUNQSSByNS4wLCBzZWMgNi4yLjguMyksIGJ1dCBJIGRvbid0IHRoaW5rIHZlcnkNCj4+\n",
+  "IG1hbnkgc3lzdGVtcyBpbXBsZW1lbnQgaXQuICBBbmQgdGhlcmUncyBjdXJyZW50bHkgbm8gY29u\n",
+  "bmVjdGlvbg0KPj4gYmV0d2VlbiBwcm9ncmFtX2hwcF90eXBlMigpIGFuZCBhc3BtLmMsIHNvIEkn\n",
+  "bSBhIGxpdHRsZSB3b3JyaWVkIHRoYXQNCj4+IHdlIG1pZ2h0IGhhdmUgaXNzdWVzIGlmIGEgc3lz\n",
+  "dGVtIGRpZCBpbXBsZW1lbnQgYW4gX0hQWCB0aGF0IHNldHMgYW55DQo+PiBvZiB0aGUgQVNQTSBi\n",
+  "aXRzLg0KPg0KPkkgbG9va2VkIGF0IHRoZSBzcGVjIHNvbWUgbW9yZS4gVGhlc2UgYXJlIHRoZXJl\n",
+  "IHRvIHJlc3RvcmUgdGhlIHJlZ2lzdGVyDQo+c2V0dGluZ3MgZm9sbG93aW5nIGhvdHBsdWcgaW5z\n",
+  "ZXJ0aW9uLiBJIGFncmVlIGl0IHdvbid0IHBsYXkgbmljZSB3aXRoIEFTUE0NCj5hcyB0aGUgY29u\n",
+  "dHJvbCBiaXRzIG5lZWQgdG8gYmUgZW5hYmxlZCBpbiBjb29yZGluYXRpb24gd2l0aCB0aGUgdXBz\n",
+  "dHJlYW0NCj5kZXZpY2UuDQo+DQo+SSB0aGluayB0aGUgcmlnaHQgYXBwcm9hY2ggaXMgdG8gbGV0\n",
+  "IHRoZSB1c2Vyc3BhY2UgZmVlZCB0aGUgcmVxdWlyZWQNCj5wb2xpY3kgdG8gdGhlIGtlcm5lbCBs\n",
+  "aWtlIHlvdSBzdWdnZXN0ZWQuIFRoZW4sIGl0IG5lZWRzIHRvIGJlIHBlciBwb3J0DQo+dmlhIGxp\n",
+  "bmtfc3RhdGUgdG8gaGF2ZSB0aGUgbW9zdCBmbGV4aWJpbGl0eS4NCj4NCj4NCj4tLQ0KPlNpbmFu\n",
+  "IEtheWENCj5RdWFsY29tbSBEYXRhY2VudGVyIFRlY2hub2xvZ2llcywgSW5jLiBhcyBhbiBhZmZp\n",
+  "bGlhdGUgb2YgUXVhbGNvbW0gVGVjaG5vbG9naWVzLCBJbmMuDQo+UXVhbGNvbW0gVGVjaG5vbG9n\n",
+  "aWVzLCBJbmMuIGlzIGEgbWVtYmVyIG9mIHRoZSBDb2RlIEF1cm9yYSBGb3J1bSwgYSBMaW51eCBG\n",
+  "b3VuZGF0aW9uIENvbGxhYm9yYXRpdmUgUHJvamVjdC4NCkludGVsIERldXRzY2hsYW5kIEdtYkgK\n",
+  "UmVnaXN0ZXJlZCBBZGRyZXNzOiBBbSBDYW1wZW9uIDEwLTEyLCA4NTU3OSBOZXViaWJlcmcsIEdl\n",
+  "cm1hbnkKVGVsOiArNDkgODkgOTkgODg1My0wLCB3d3cuaW50ZWwuZGUKTWFuYWdpbmcgRGlyZWN0\n",
+  "b3JzOiBDaHJpc3RpbiBFaXNlbnNjaG1pZCwgQ2hyaXN0aWFuIExhbXByZWNodGVyCkNoYWlycGVy\n",
+  "c29uIG9mIHRoZSBTdXBlcnZpc29yeSBCb2FyZDogTmljb2xlIExhdQpSZWdpc3RlcmVkIE9mZmlj\n",
+  "ZTogTXVuaWNoCkNvbW1lcmNpYWwgUmVnaXN0ZXI6IEFtdHNnZXJpY2h0IE11ZW5jaGVuIEhSQiAx\n",
+  "ODY5MjgK"
 ]
 
-ce370d1ea0913310e89c75ace444484333ab50a5e6a11f38cbc0b7bf97e4dca6
+ce019117dc98a0f8ead40a8bba90883d2e320616c842d03d8051b9ce5e111aaa

diff --git a/a/content_digest b/N3/content_digest
index e61762d..eaee2b0 100644
--- a/a/content_digest
+++ b/N3/content_digest
@@ -23,32 +23,16 @@
   "ref\0c0c2f48f-d725-058e-a1ad-92ab4b6e7fb3\@codeaurora.org\0"
 ]
 [
-  "From\0Patel, Mayurkumar <mayurkumar.patel\@intel.com>\0"
+  "From\0mayurkumar.patel\@intel.com (Patel, Mayurkumar)\0"
 ]
 [
-  "Subject\0RE: [PATCH V8 4/5] PCI/ASPM: save power on values during bridge init\0"
+  "Subject\0[PATCH V8 4/5] PCI/ASPM: save power on values during bridge init\0"
 ]
 [
   "Date\0Fri, 21 Apr 2017 07:46:27 +0000\0"
 ]
 [
-  "To\0Sinan Kaya <okaya\@codeaurora.org>",
-  " Bjorn Helgaas <bhelgaas\@google.com>\0"
-]
-[
-  "Cc\0Rajat Jain <rajatxjain\@gmail.com>",
-  " Myron Stowe <myron.stowe\@redhat.com>",
-  " David Daney <david.daney\@cavium.com>",
-  " linux-pci\@vger.kernel.org <linux-pci\@vger.kernel.org>",
-  " Timur Tabi <timur\@codeaurora.org>",
-  " linux-kernel\@vger.kernel.org <linux-kernel\@vger.kernel.org>",
-  " Julia Lawall <Julia.Lawall\@lip6.fr>",
-  " Bjorn Helgaas <helgaas\@kernel.org>",
-  " linux-arm-msm <linux-arm-msm\@vger.kernel.org>",
-  " Rajat Jain <rajatja\@google.com>",
-  " Yinghai Lu <yinghai\@kernel.org>",
-  " Shawn Lin <shawn.lin\@rock-chips.com>",
-  " linux-arm <linux-arm-kernel\@lists.infradead.org>\0"
+  "To\0linux-arm-kernel\@lists.infradead.org\0"
 ]
 [
   "\0000:1\0"
@@ -162,4 +146,4 @@
   "Commercial Register: Amtsgericht Muenchen HRB 186928"
 ]
 
-ce370d1ea0913310e89c75ace444484333ab50a5e6a11f38cbc0b7bf97e4dca6
+95cc5bb7051b65e998499326645b66c5df52c756f1a362e1c43390749209c22e

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.