All of lore.kernel.org
 help / color / mirror / Atom feed
From: Marc Zyngier <marc.zyngier@arm.com>
To: Miquel Raynal <miquel.raynal@bootlin.com>
Cc: Mark Rutland <mark.rutland@arm.com>, Andrew Lunn <andrew@lunn.ch>,
	Jason Cooper <jason@lakedaemon.net>,
	devicetree@vger.kernel.org,
	Antoine Tenart <antoine.tenart@bootlin.com>,
	Catalin Marinas <catalin.marinas@arm.com>,
	Gregory Clement <gregory.clement@bootlin.com>,
	Haim Boot <hayim@marvell.com>, Will Deacon <will.deacon@arm.com>,
	Maxime Chevallier <maxime.chevallier@bootlin.com>,
	Nadav Haklai <nadavh@marvell.com>,
	Rob Herring <robh+dt@kernel.org>,
	Thomas Petazzoni <thomas.petazzoni@bootlin.com>,
	Thomas Gleixner <tglx@linutronix.de>,
	Hanna Hawa <hannah@marvell.com>,
	linux-arm-kernel@lists.infradead.org,
	Sebastian Hesselbarth <sebastian.hesselbarth@gmail.com>
Subject: Re: [PATCH v6 09/14] irqchip/irq-mvebu-icu: add support for System Error Interrupts (SEI)
Date: Mon, 01 Oct 2018 18:07:56 +0100	[thread overview]
Message-ID: <86in2lvbmb.wl-marc.zyngier@arm.com> (raw)
In-Reply-To: <20181001141358.31508-10-miquel.raynal@bootlin.com>

On Mon, 01 Oct 2018 15:13:53 +0100,
Miquel Raynal <miquel.raynal@bootlin.com> wrote:
> 
> So far the ICU only handled NSR interrupts through GICP. An SEI driver
> provides an MSI domain through which it is possible to raise SEI, so
> let's add SEI support to the ICU driver.
> 
> Handle the NSR probe function in a more generic way to support other
> type of interrupts.
> 
> Each interrupt domain is a tree domain to avoid allocation the 207
> entries each time. Instead an ICU-wide bitmap is used to follow ICU
> slot allocations.
> 
> Signed-off-by: Miquel Raynal <miquel.raynal@bootlin.com>
> ---
>  drivers/irqchip/irq-mvebu-icu.c | 173 +++++++++++++++++++++++++-------
>  1 file changed, 139 insertions(+), 34 deletions(-)
> 
> diff --git a/drivers/irqchip/irq-mvebu-icu.c b/drivers/irqchip/irq-mvebu-icu.c
> index c79d2cb787a0..21e7c5830fcc 100644
> --- a/drivers/irqchip/irq-mvebu-icu.c
> +++ b/drivers/irqchip/irq-mvebu-icu.c
> @@ -27,6 +27,10 @@
>  #define ICU_SETSPI_NSR_AH	0x14
>  #define ICU_CLRSPI_NSR_AL	0x18
>  #define ICU_CLRSPI_NSR_AH	0x1c
> +#define ICU_SET_SEI_AL		0x50
> +#define ICU_SET_SEI_AH		0x54
> +#define ICU_CLR_SEI_AL		0x58
> +#define ICU_CLR_SEI_AH		0x5C
>  #define ICU_INT_CFG(x)          (0x100 + 4 * (x))
>  #define   ICU_INT_ENABLE	BIT(24)
>  #define   ICU_IS_EDGE		BIT(28)
> @@ -37,11 +41,27 @@
>  #define ICU_SATA0_ICU_ID	109
>  #define ICU_SATA1_ICU_ID	107
>  
> +struct mvebu_icu_subset_data {
> +	unsigned int icu_group;
> +	unsigned int offset_set_ah;
> +	unsigned int offset_set_al;
> +	unsigned int offset_clr_ah;
> +	unsigned int offset_clr_al;
> +};
> +
>  struct mvebu_icu {
> -	struct irq_chip irq_chip;
>  	void __iomem *base;
>  	struct device *dev;
> +
> +	/* Lock on interrupt allocations/releases */
> +	struct mutex msi_lock;
> +	DECLARE_BITMAP(msi_bitmap, ICU_MAX_IRQS);
> +};
> +
> +struct mvebu_icu_msi_data {
> +	struct mvebu_icu *icu;
>  	atomic_t initialized;
> +	const struct mvebu_icu_subset_data *subset_data;
>  };
>  
>  struct mvebu_icu_irq_data {
> @@ -52,28 +72,38 @@ struct mvebu_icu_irq_data {
>  
>  DEFINE_STATIC_KEY_FALSE(legacy_bindings);
>  
> -static void mvebu_icu_init(struct mvebu_icu *icu, struct msi_msg *msg)
> +static void mvebu_icu_init(struct mvebu_icu *icu,
> +			   struct mvebu_icu_msi_data *msi_data,
> +			   struct msi_msg *msg)
>  {
> -	if (atomic_cmpxchg(&icu->initialized, false, true))
> +	const struct mvebu_icu_subset_data *subset = msi_data->subset_data;
> +
> +	if (atomic_cmpxchg(&msi_data->initialized, false, true))
> +		return;
> +
> +	/* Set 'SET' ICU SPI message address in AP */
> +	writel_relaxed(msg[0].address_hi, icu->base + subset->offset_set_ah);
> +	writel_relaxed(msg[0].address_lo, icu->base + subset->offset_set_al);
> +
> +	if (subset->icu_group != ICU_GRP_NSR)
>  		return;
>  
> -	/* Set Clear/Set ICU SPI message address in AP */
> -	writel_relaxed(msg[0].address_hi, icu->base + ICU_SETSPI_NSR_AH);
> -	writel_relaxed(msg[0].address_lo, icu->base + ICU_SETSPI_NSR_AL);
> -	writel_relaxed(msg[1].address_hi, icu->base + ICU_CLRSPI_NSR_AH);
> -	writel_relaxed(msg[1].address_lo, icu->base + ICU_CLRSPI_NSR_AL);
> +	/* Set 'CLEAR' ICU SPI message address in AP (level-MSI only) */
> +	writel_relaxed(msg[1].address_hi, icu->base + subset->offset_clr_ah);
> +	writel_relaxed(msg[1].address_lo, icu->base + subset->offset_clr_al);
>  }
>  
>  static void mvebu_icu_write_msg(struct msi_desc *desc, struct msi_msg *msg)
>  {
>  	struct irq_data *d = irq_get_irq_data(desc->irq);
> +	struct mvebu_icu_msi_data *msi_data = platform_msi_get_host_data(d->domain);
>  	struct mvebu_icu_irq_data *icu_irqd = d->chip_data;
>  	struct mvebu_icu *icu = icu_irqd->icu;
>  	unsigned int icu_int;
>  
>  	if (msg->address_lo || msg->address_hi) {
> -		/* One off initialization */
> -		mvebu_icu_init(icu, msg);
> +		/* One off initialization per domain */
> +		mvebu_icu_init(icu, msi_data, msg);
>  		/* Configure the ICU with irq number & type */
>  		icu_int = msg->data | ICU_INT_ENABLE;
>  		if (icu_irqd->type & IRQ_TYPE_EDGE_RISING)
> @@ -103,10 +133,29 @@ static void mvebu_icu_write_msg(struct msi_desc *desc, struct msi_msg *msg)
>  	}
>  }
>  
> +static struct irq_chip mvebu_icu_nsr_chip = {
> +	.name			= "ICU-NSR",
> +	.irq_mask		= irq_chip_mask_parent,
> +	.irq_unmask		= irq_chip_unmask_parent,
> +	.irq_eoi		= irq_chip_eoi_parent,
> +	.irq_set_type		= irq_chip_set_type_parent,
> +	.irq_set_affinity	= irq_chip_set_affinity_parent,
> +};
> +
> +static struct irq_chip mvebu_icu_sei_chip = {
> +	.name			= "ICU-SEI",
> +	.irq_ack		= irq_chip_ack_parent,
> +	.irq_mask		= irq_chip_mask_parent,
> +	.irq_unmask		= irq_chip_unmask_parent,
> +	.irq_set_type		= irq_chip_set_type_parent,
> +	.irq_set_affinity	= irq_chip_set_affinity_parent,
> +};
> +
>  static int
>  mvebu_icu_irq_domain_translate(struct irq_domain *d, struct irq_fwspec *fwspec,
>  			       unsigned long *hwirq, unsigned int *type)
>  {
> +	struct mvebu_icu_msi_data *msi_data = platform_msi_get_host_data(d);
>  	struct mvebu_icu *icu = platform_msi_get_host_data(d);
>  	unsigned int param_count = static_branch_unlikely(&legacy_bindings) ? 3 : 2;
>  
> @@ -128,6 +177,14 @@ mvebu_icu_irq_domain_translate(struct irq_domain *d, struct irq_fwspec *fwspec,
>  	} else {
>  		*hwirq = fwspec->param[0];
>  		*type = fwspec->param[1] & IRQ_TYPE_SENSE_MASK;
> +
> +		/*
> +		 * The ICU receives level interrupts. While the NSR are also
> +		 * level interrupts, SEI are edge interrupts. Force the type
> +		 * here in this case.
> +		 */
> +		if (msi_data->subset_data->icu_group == ICU_GRP_SEI)
> +			*type = IRQ_TYPE_EDGE_RISING;

Please add a comment indicating that this makes the interrupt handling
unreliable. I really don't want anyone to think that this kind of hack
is to be relied upon (interrupt fires, driver ignores the interrupt
and legitimately expects it to fire again, interrupts doesn't fire,
device is dead).

>  	}
>  
>  	if (*hwirq >= ICU_MAX_IRQS) {
> @@ -138,6 +195,25 @@ mvebu_icu_irq_domain_translate(struct irq_domain *d, struct irq_fwspec *fwspec,
>  	return 0;
>  }
>  
> +static int mvebu_icu_msi_bitmap_region_alloc(struct mvebu_icu *icu, int hwirq)
> +{
> +	int ret;
> +
> +	mutex_lock(&icu->msi_lock);
> +	ret = test_and_set_bit(hwirq, icu->msi_bitmap);
> +	mutex_unlock(&icu->msi_lock);

test_and_set_bit is atomic. Why do we have a mutex to guard it? More
importantly, what is it used for? You only seem to use it as some
paranoid check to validate the DT, which makes no sense to me.

> +
> +	return ret;
> +}
> +
> +static void mvebu_icu_msi_bitmap_region_release(struct mvebu_icu *icu,
> +						int hwirq)
> +{
> +	mutex_lock(&icu->msi_lock);
> +	clear_bit(hwirq, icu->msi_bitmap);
> +	mutex_unlock(&icu->msi_lock);
> +}

Same here. I see no purpose for this code.

Thanks,

	M.

-- 
Jazz is not dead, it just smell funny.

WARNING: multiple messages have this Message-ID (diff)
From: marc.zyngier@arm.com (Marc Zyngier)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v6 09/14] irqchip/irq-mvebu-icu: add support for System Error Interrupts (SEI)
Date: Mon, 01 Oct 2018 18:07:56 +0100	[thread overview]
Message-ID: <86in2lvbmb.wl-marc.zyngier@arm.com> (raw)
In-Reply-To: <20181001141358.31508-10-miquel.raynal@bootlin.com>

On Mon, 01 Oct 2018 15:13:53 +0100,
Miquel Raynal <miquel.raynal@bootlin.com> wrote:
> 
> So far the ICU only handled NSR interrupts through GICP. An SEI driver
> provides an MSI domain through which it is possible to raise SEI, so
> let's add SEI support to the ICU driver.
> 
> Handle the NSR probe function in a more generic way to support other
> type of interrupts.
> 
> Each interrupt domain is a tree domain to avoid allocation the 207
> entries each time. Instead an ICU-wide bitmap is used to follow ICU
> slot allocations.
> 
> Signed-off-by: Miquel Raynal <miquel.raynal@bootlin.com>
> ---
>  drivers/irqchip/irq-mvebu-icu.c | 173 +++++++++++++++++++++++++-------
>  1 file changed, 139 insertions(+), 34 deletions(-)
> 
> diff --git a/drivers/irqchip/irq-mvebu-icu.c b/drivers/irqchip/irq-mvebu-icu.c
> index c79d2cb787a0..21e7c5830fcc 100644
> --- a/drivers/irqchip/irq-mvebu-icu.c
> +++ b/drivers/irqchip/irq-mvebu-icu.c
> @@ -27,6 +27,10 @@
>  #define ICU_SETSPI_NSR_AH	0x14
>  #define ICU_CLRSPI_NSR_AL	0x18
>  #define ICU_CLRSPI_NSR_AH	0x1c
> +#define ICU_SET_SEI_AL		0x50
> +#define ICU_SET_SEI_AH		0x54
> +#define ICU_CLR_SEI_AL		0x58
> +#define ICU_CLR_SEI_AH		0x5C
>  #define ICU_INT_CFG(x)          (0x100 + 4 * (x))
>  #define   ICU_INT_ENABLE	BIT(24)
>  #define   ICU_IS_EDGE		BIT(28)
> @@ -37,11 +41,27 @@
>  #define ICU_SATA0_ICU_ID	109
>  #define ICU_SATA1_ICU_ID	107
>  
> +struct mvebu_icu_subset_data {
> +	unsigned int icu_group;
> +	unsigned int offset_set_ah;
> +	unsigned int offset_set_al;
> +	unsigned int offset_clr_ah;
> +	unsigned int offset_clr_al;
> +};
> +
>  struct mvebu_icu {
> -	struct irq_chip irq_chip;
>  	void __iomem *base;
>  	struct device *dev;
> +
> +	/* Lock on interrupt allocations/releases */
> +	struct mutex msi_lock;
> +	DECLARE_BITMAP(msi_bitmap, ICU_MAX_IRQS);
> +};
> +
> +struct mvebu_icu_msi_data {
> +	struct mvebu_icu *icu;
>  	atomic_t initialized;
> +	const struct mvebu_icu_subset_data *subset_data;
>  };
>  
>  struct mvebu_icu_irq_data {
> @@ -52,28 +72,38 @@ struct mvebu_icu_irq_data {
>  
>  DEFINE_STATIC_KEY_FALSE(legacy_bindings);
>  
> -static void mvebu_icu_init(struct mvebu_icu *icu, struct msi_msg *msg)
> +static void mvebu_icu_init(struct mvebu_icu *icu,
> +			   struct mvebu_icu_msi_data *msi_data,
> +			   struct msi_msg *msg)
>  {
> -	if (atomic_cmpxchg(&icu->initialized, false, true))
> +	const struct mvebu_icu_subset_data *subset = msi_data->subset_data;
> +
> +	if (atomic_cmpxchg(&msi_data->initialized, false, true))
> +		return;
> +
> +	/* Set 'SET' ICU SPI message address in AP */
> +	writel_relaxed(msg[0].address_hi, icu->base + subset->offset_set_ah);
> +	writel_relaxed(msg[0].address_lo, icu->base + subset->offset_set_al);
> +
> +	if (subset->icu_group != ICU_GRP_NSR)
>  		return;
>  
> -	/* Set Clear/Set ICU SPI message address in AP */
> -	writel_relaxed(msg[0].address_hi, icu->base + ICU_SETSPI_NSR_AH);
> -	writel_relaxed(msg[0].address_lo, icu->base + ICU_SETSPI_NSR_AL);
> -	writel_relaxed(msg[1].address_hi, icu->base + ICU_CLRSPI_NSR_AH);
> -	writel_relaxed(msg[1].address_lo, icu->base + ICU_CLRSPI_NSR_AL);
> +	/* Set 'CLEAR' ICU SPI message address in AP (level-MSI only) */
> +	writel_relaxed(msg[1].address_hi, icu->base + subset->offset_clr_ah);
> +	writel_relaxed(msg[1].address_lo, icu->base + subset->offset_clr_al);
>  }
>  
>  static void mvebu_icu_write_msg(struct msi_desc *desc, struct msi_msg *msg)
>  {
>  	struct irq_data *d = irq_get_irq_data(desc->irq);
> +	struct mvebu_icu_msi_data *msi_data = platform_msi_get_host_data(d->domain);
>  	struct mvebu_icu_irq_data *icu_irqd = d->chip_data;
>  	struct mvebu_icu *icu = icu_irqd->icu;
>  	unsigned int icu_int;
>  
>  	if (msg->address_lo || msg->address_hi) {
> -		/* One off initialization */
> -		mvebu_icu_init(icu, msg);
> +		/* One off initialization per domain */
> +		mvebu_icu_init(icu, msi_data, msg);
>  		/* Configure the ICU with irq number & type */
>  		icu_int = msg->data | ICU_INT_ENABLE;
>  		if (icu_irqd->type & IRQ_TYPE_EDGE_RISING)
> @@ -103,10 +133,29 @@ static void mvebu_icu_write_msg(struct msi_desc *desc, struct msi_msg *msg)
>  	}
>  }
>  
> +static struct irq_chip mvebu_icu_nsr_chip = {
> +	.name			= "ICU-NSR",
> +	.irq_mask		= irq_chip_mask_parent,
> +	.irq_unmask		= irq_chip_unmask_parent,
> +	.irq_eoi		= irq_chip_eoi_parent,
> +	.irq_set_type		= irq_chip_set_type_parent,
> +	.irq_set_affinity	= irq_chip_set_affinity_parent,
> +};
> +
> +static struct irq_chip mvebu_icu_sei_chip = {
> +	.name			= "ICU-SEI",
> +	.irq_ack		= irq_chip_ack_parent,
> +	.irq_mask		= irq_chip_mask_parent,
> +	.irq_unmask		= irq_chip_unmask_parent,
> +	.irq_set_type		= irq_chip_set_type_parent,
> +	.irq_set_affinity	= irq_chip_set_affinity_parent,
> +};
> +
>  static int
>  mvebu_icu_irq_domain_translate(struct irq_domain *d, struct irq_fwspec *fwspec,
>  			       unsigned long *hwirq, unsigned int *type)
>  {
> +	struct mvebu_icu_msi_data *msi_data = platform_msi_get_host_data(d);
>  	struct mvebu_icu *icu = platform_msi_get_host_data(d);
>  	unsigned int param_count = static_branch_unlikely(&legacy_bindings) ? 3 : 2;
>  
> @@ -128,6 +177,14 @@ mvebu_icu_irq_domain_translate(struct irq_domain *d, struct irq_fwspec *fwspec,
>  	} else {
>  		*hwirq = fwspec->param[0];
>  		*type = fwspec->param[1] & IRQ_TYPE_SENSE_MASK;
> +
> +		/*
> +		 * The ICU receives level interrupts. While the NSR are also
> +		 * level interrupts, SEI are edge interrupts. Force the type
> +		 * here in this case.
> +		 */
> +		if (msi_data->subset_data->icu_group == ICU_GRP_SEI)
> +			*type = IRQ_TYPE_EDGE_RISING;

Please add a comment indicating that this makes the interrupt handling
unreliable. I really don't want anyone to think that this kind of hack
is to be relied upon (interrupt fires, driver ignores the interrupt
and legitimately expects it to fire again, interrupts doesn't fire,
device is dead).

>  	}
>  
>  	if (*hwirq >= ICU_MAX_IRQS) {
> @@ -138,6 +195,25 @@ mvebu_icu_irq_domain_translate(struct irq_domain *d, struct irq_fwspec *fwspec,
>  	return 0;
>  }
>  
> +static int mvebu_icu_msi_bitmap_region_alloc(struct mvebu_icu *icu, int hwirq)
> +{
> +	int ret;
> +
> +	mutex_lock(&icu->msi_lock);
> +	ret = test_and_set_bit(hwirq, icu->msi_bitmap);
> +	mutex_unlock(&icu->msi_lock);

test_and_set_bit is atomic. Why do we have a mutex to guard it? More
importantly, what is it used for? You only seem to use it as some
paranoid check to validate the DT, which makes no sense to me.

> +
> +	return ret;
> +}
> +
> +static void mvebu_icu_msi_bitmap_region_release(struct mvebu_icu *icu,
> +						int hwirq)
> +{
> +	mutex_lock(&icu->msi_lock);
> +	clear_bit(hwirq, icu->msi_bitmap);
> +	mutex_unlock(&icu->msi_lock);
> +}

Same here. I see no purpose for this code.

Thanks,

	M.

-- 
Jazz is not dead, it just smell funny.

  reply	other threads:[~2018-10-01 17:07 UTC|newest]

Thread overview: 50+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-10-01 14:13 [PATCH v6 00/14] Add System Error Interrupt support to Armada SoCs Miquel Raynal
2018-10-01 14:13 ` Miquel Raynal
2018-10-01 14:13 ` [PATCH v6 01/14] genirq/msi: Allow creation of a tree-based irqdomain for platform-msi Miquel Raynal
2018-10-01 14:13   ` Miquel Raynal
2018-10-01 14:13 ` [PATCH v6 02/14] dt-bindings/interrupt-controller: fix Marvell ICU length in the example Miquel Raynal
2018-10-01 14:13   ` Miquel Raynal
2018-10-01 14:13 ` [PATCH v6 03/14] irqchip/irq-mvebu-icu: fix wrong private data retrieval Miquel Raynal
2018-10-01 14:13   ` Miquel Raynal
2018-10-01 14:13 ` [PATCH v6 04/14] irqchip/irq-mvebu-icu: clarify the reset operation of configured interrupts Miquel Raynal
2018-10-01 14:13   ` Miquel Raynal
2018-10-01 14:13 ` [PATCH v6 05/14] irqchip/irq-mvebu-icu: disociate ICU and NSR Miquel Raynal
2018-10-01 14:13   ` Miquel Raynal
2018-10-01 14:13 ` [PATCH v6 06/14] irqchip/irq-mvebu-icu: support ICU subnodes Miquel Raynal
2018-10-01 14:13   ` Miquel Raynal
2018-10-01 16:49   ` Marc Zyngier
2018-10-01 16:49     ` Marc Zyngier
2018-10-02  8:13     ` Miquel Raynal
2018-10-02  8:13       ` Miquel Raynal
2018-10-02  8:54     ` [PATCH v7 " Miquel Raynal
2018-10-02  8:54       ` Miquel Raynal
2018-10-01 14:13 ` [PATCH v6 07/14] irqchip/irq-mvebu-sei: add new driver for Marvell SEI Miquel Raynal
2018-10-01 14:13   ` Miquel Raynal
2018-10-01 14:13 ` [PATCH v6 08/14] arm64: marvell: enable SEI driver Miquel Raynal
2018-10-01 14:13   ` Miquel Raynal
2018-10-01 14:13 ` [PATCH v6 09/14] irqchip/irq-mvebu-icu: add support for System Error Interrupts (SEI) Miquel Raynal
2018-10-01 14:13   ` Miquel Raynal
2018-10-01 17:07   ` Marc Zyngier [this message]
2018-10-01 17:07     ` Marc Zyngier
2018-10-02  8:18     ` Miquel Raynal
2018-10-02  8:18       ` Miquel Raynal
2018-10-02  8:59   ` [PATCH v7 " Miquel Raynal
2018-10-02  8:59     ` Miquel Raynal
2018-10-01 14:13 ` [PATCH v6 10/14] dt-bindings/interrupt-controller: update Marvell ICU bindings Miquel Raynal
2018-10-01 14:13   ` Miquel Raynal
2018-10-01 14:13 ` [PATCH v6 11/14] dt-bindings/interrupt-controller: add documentation for Marvell SEI controller Miquel Raynal
2018-10-01 14:13   ` Miquel Raynal
2018-10-01 14:13 ` [PATCH v6 12/14] arm64: dts: marvell: add AP806 SEI subnode Miquel Raynal
2018-10-01 14:13   ` Miquel Raynal
2018-10-02 14:39   ` Gregory CLEMENT
2018-10-02 14:39     ` Gregory CLEMENT
2018-10-01 14:13 ` [PATCH v6 13/14] arm64: dts: marvell: use new bindings for CP110 interrupts Miquel Raynal
2018-10-01 14:13   ` Miquel Raynal
2018-10-02 14:41   ` Gregory CLEMENT
2018-10-02 14:41     ` Gregory CLEMENT
2018-10-01 14:13 ` [PATCH v6 14/14] arm64: dts: marvell: add CP110 ICU SEI subnode Miquel Raynal
2018-10-01 14:13   ` Miquel Raynal
2018-10-02 10:57 ` [PATCH v6 00/14] Add System Error Interrupt support to Armada SoCs Marc Zyngier
2018-10-02 10:57   ` Marc Zyngier
2018-10-02 14:30   ` Gregory CLEMENT
2018-10-02 14:30     ` Gregory CLEMENT

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=86in2lvbmb.wl-marc.zyngier@arm.com \
    --to=marc.zyngier@arm.com \
    --cc=andrew@lunn.ch \
    --cc=antoine.tenart@bootlin.com \
    --cc=catalin.marinas@arm.com \
    --cc=devicetree@vger.kernel.org \
    --cc=gregory.clement@bootlin.com \
    --cc=hannah@marvell.com \
    --cc=hayim@marvell.com \
    --cc=jason@lakedaemon.net \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=mark.rutland@arm.com \
    --cc=maxime.chevallier@bootlin.com \
    --cc=miquel.raynal@bootlin.com \
    --cc=nadavh@marvell.com \
    --cc=robh+dt@kernel.org \
    --cc=sebastian.hesselbarth@gmail.com \
    --cc=tglx@linutronix.de \
    --cc=thomas.petazzoni@bootlin.com \
    --cc=will.deacon@arm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.