From: Eric Auger <eric.auger@redhat.com>
To: eric.auger@redhat.com, eric.auger.pro@gmail.com,
christoffer.dall@linaro.org, marc.zyngier@arm.com,
robin.murphy@arm.com, alex.williamson@redhat.com,
will.deacon@arm.com, joro@8bytes.org, tglx@linutronix.de,
jason@lakedaemon.net, linux-arm-kernel@lists.infradead.org
Cc: kvm@vger.kernel.org, drjones@redhat.com,
linux-kernel@vger.kernel.org, pranav.sawargaonkar@gmail.com,
iommu@lists.linux-foundation.org, punit.agrawal@arm.com,
diana.craciun@nxp.com, gpkulkarni@gmail.com,
shankerd@codeaurora.org, bharat.bhushan@nxp.com,
geethasowjanya.akula@gmail.com
Subject: [PATCH v5 00/17] KVM PCIe/MSI passthrough on ARM/ARM64 and IOVA reserved regions
Date: Wed, 4 Jan 2017 13:32:09 +0000 [thread overview]
Message-ID: <1483536746-2725-1-git-send-email-eric.auger@redhat.com> (raw)
Following LPC discussions, we now report reserved regions through
iommu-group sysfs reserved_regions attribute file.
Reserved regions are populated through the IOMMU get_resv_region
callback (former get_dm_regions), now implemented by amd-iommu,
intel-iommu and arm-smmu:
- the intel-iommu reports the [0xfee00000 - 0xfeefffff] MSI window
as an IOMMU_RESV_NOMAP reserved region.
- the amd-iommu reports device direct mapped regions, the MSI region
and HT regions.
- the arm-smmu reports the MSI window (arbitrarily located at
0x8000000 and 1MB large).
Unsafe interrupt assignment is tested by enumerating all MSI irq
domains and checking MSI remapping is supported in the above hierarchy.
This check is done in case we detect the iommu translates MSI
(an IOMMU_RESV_MSI window exists). Otherwise the IRQ remapping
capability is checked at IOMMU level. Obviously this is a defensive
IRQ safety assessment: Assuming there are several MSI controllers
in the system and at least one does not implement IRQ remapping,
the assignment will be considered as unsafe (even if this controller
is not acessible from the assigned devices).
The series integrates a not officially posted patch from Robin:
"iommu/dma: Allow MSI-only cookies".
Best Regards
Eric
Git: complete series available at
https://github.com/eauger/linux/tree/v4.10-rc2-reserved-v5
History:
RFCv4 -> PATCHv5
- fix IRQ security assessment by looking at irq domain parents
- check DOMAIN_BUS_FSL_MC_MSI irq domains
- AMD MSI and HT regions are exposed in iommu group sysfs
RFCv3 -> RFCv4:
- arm-smmu driver does not register PCI host bridge windows as
reserved regions anymore
- Implement reserved region get/put callbacks also in arm-smmuv3
- take the iommu_group lock on iommu_get_group_resv_regions
- add a type field in iommu_resv_region instead of using prot
- init the region list_head in iommu_alloc_resv_region, also
add type parameter
- iommu_insert_resv_region manage overlaps and sort reserved
windows
- address IRQ safety assessment by enumerating all the MSI irq
domains and checking the MSI_REMAP flag
- update Documentation/ABI/testing/sysfs-kernel-iommu_groups
RFC v2 -> v3:
- switch to an iommu-group sysfs API
- use new dummy allocator provided by Robin
- dummy allocator initialized by vfio-iommu-type1 after enumerating
the reserved regions
- at the moment ARM MSI base address/size is left unchanged compared
to v2
- we currently report reserved regions and not usable IOVA regions as
requested by Alex
RFC v1 -> v2:
- fix intel_add_reserved_regions
- add mutex lock/unlock in vfio_iommu_type1
Eric Auger (17):
iommu/dma: Allow MSI-only cookies
iommu: Rename iommu_dm_regions into iommu_resv_regions
iommu: Add a new type field in iommu_resv_region
iommu: iommu_alloc_resv_region
iommu: Only map direct mapped regions
iommu: iommu_get_group_resv_regions
iommu: Implement reserved_regions iommu-group sysfs file
iommu/vt-d: Implement reserved region get/put callbacks
iommu/amd: Declare MSI and HT regions as reserved IOVA regions
iommu/arm-smmu: Implement reserved region get/put callbacks
iommu/arm-smmu-v3: Implement reserved region get/put callbacks
irqdomain: Add IRQ_DOMAIN_FLAG_MSI_REMAP value
irqdomain: irq_domain_check_msi_remap
irqchip/gicv3-its: Sets IRQ_DOMAIN_FLAG_MSI_REMAP
vfio/type1: Allow transparent MSI IOVA allocation
vfio/type1: Check MSI remapping at irq domain level
iommu/arm-smmu: Do not advertise IOMMU_CAP_INTR_REMAP anymore
drivers/iommu/amd_iommu.c | 54 +++++++++-----
drivers/iommu/arm-smmu-v3.c | 30 +++++++-
drivers/iommu/arm-smmu.c | 30 +++++++-
drivers/iommu/dma-iommu.c | 116 ++++++++++++++++++++++++------
drivers/iommu/intel-iommu.c | 50 +++++++++----
drivers/iommu/iommu.c | 152 ++++++++++++++++++++++++++++++++++++---
drivers/irqchip/irq-gic-v3-its.c | 1 +
drivers/vfio/vfio_iommu_type1.c | 34 ++++++++-
include/linux/dma-iommu.h | 7 ++
include/linux/iommu.h | 46 ++++++++----
include/linux/irqdomain.h | 4 ++
kernel/irq/irqdomain.c | 41 +++++++++++
12 files changed, 481 insertions(+), 84 deletions(-)
--
1.9.1
WARNING: multiple messages have this Message-ID (diff)
From: Eric Auger <eric.auger-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
To: eric.auger-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org,
eric.auger.pro-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org,
christoffer.dall-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org,
marc.zyngier-5wv7dgnIgG8@public.gmane.org,
robin.murphy-5wv7dgnIgG8@public.gmane.org,
alex.williamson-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org,
will.deacon-5wv7dgnIgG8@public.gmane.org,
joro-zLv9SwRftAIdnm+yROfE0A@public.gmane.org,
tglx-hfZtesqFncYOwBW4kG4KsQ@public.gmane.org,
jason-NLaQJdtUoK4Be96aLqz0jA@public.gmane.org,
linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org
Cc: drjones-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org,
kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org,
punit.agrawal-5wv7dgnIgG8@public.gmane.org,
linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org,
geethasowjanya.akula-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org,
iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org,
pranav.sawargaonkar-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org,
shankerd-sgV2jX0FEOL9JmXXK+q4OQ@public.gmane.org,
gpkulkarni-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org
Subject: [PATCH v5 00/17] KVM PCIe/MSI passthrough on ARM/ARM64 and IOVA reserved regions
Date: Wed, 4 Jan 2017 13:32:09 +0000 [thread overview]
Message-ID: <1483536746-2725-1-git-send-email-eric.auger@redhat.com> (raw)
Following LPC discussions, we now report reserved regions through
iommu-group sysfs reserved_regions attribute file.
Reserved regions are populated through the IOMMU get_resv_region
callback (former get_dm_regions), now implemented by amd-iommu,
intel-iommu and arm-smmu:
- the intel-iommu reports the [0xfee00000 - 0xfeefffff] MSI window
as an IOMMU_RESV_NOMAP reserved region.
- the amd-iommu reports device direct mapped regions, the MSI region
and HT regions.
- the arm-smmu reports the MSI window (arbitrarily located at
0x8000000 and 1MB large).
Unsafe interrupt assignment is tested by enumerating all MSI irq
domains and checking MSI remapping is supported in the above hierarchy.
This check is done in case we detect the iommu translates MSI
(an IOMMU_RESV_MSI window exists). Otherwise the IRQ remapping
capability is checked at IOMMU level. Obviously this is a defensive
IRQ safety assessment: Assuming there are several MSI controllers
in the system and at least one does not implement IRQ remapping,
the assignment will be considered as unsafe (even if this controller
is not acessible from the assigned devices).
The series integrates a not officially posted patch from Robin:
"iommu/dma: Allow MSI-only cookies".
Best Regards
Eric
Git: complete series available at
https://github.com/eauger/linux/tree/v4.10-rc2-reserved-v5
History:
RFCv4 -> PATCHv5
- fix IRQ security assessment by looking at irq domain parents
- check DOMAIN_BUS_FSL_MC_MSI irq domains
- AMD MSI and HT regions are exposed in iommu group sysfs
RFCv3 -> RFCv4:
- arm-smmu driver does not register PCI host bridge windows as
reserved regions anymore
- Implement reserved region get/put callbacks also in arm-smmuv3
- take the iommu_group lock on iommu_get_group_resv_regions
- add a type field in iommu_resv_region instead of using prot
- init the region list_head in iommu_alloc_resv_region, also
add type parameter
- iommu_insert_resv_region manage overlaps and sort reserved
windows
- address IRQ safety assessment by enumerating all the MSI irq
domains and checking the MSI_REMAP flag
- update Documentation/ABI/testing/sysfs-kernel-iommu_groups
RFC v2 -> v3:
- switch to an iommu-group sysfs API
- use new dummy allocator provided by Robin
- dummy allocator initialized by vfio-iommu-type1 after enumerating
the reserved regions
- at the moment ARM MSI base address/size is left unchanged compared
to v2
- we currently report reserved regions and not usable IOVA regions as
requested by Alex
RFC v1 -> v2:
- fix intel_add_reserved_regions
- add mutex lock/unlock in vfio_iommu_type1
Eric Auger (17):
iommu/dma: Allow MSI-only cookies
iommu: Rename iommu_dm_regions into iommu_resv_regions
iommu: Add a new type field in iommu_resv_region
iommu: iommu_alloc_resv_region
iommu: Only map direct mapped regions
iommu: iommu_get_group_resv_regions
iommu: Implement reserved_regions iommu-group sysfs file
iommu/vt-d: Implement reserved region get/put callbacks
iommu/amd: Declare MSI and HT regions as reserved IOVA regions
iommu/arm-smmu: Implement reserved region get/put callbacks
iommu/arm-smmu-v3: Implement reserved region get/put callbacks
irqdomain: Add IRQ_DOMAIN_FLAG_MSI_REMAP value
irqdomain: irq_domain_check_msi_remap
irqchip/gicv3-its: Sets IRQ_DOMAIN_FLAG_MSI_REMAP
vfio/type1: Allow transparent MSI IOVA allocation
vfio/type1: Check MSI remapping at irq domain level
iommu/arm-smmu: Do not advertise IOMMU_CAP_INTR_REMAP anymore
drivers/iommu/amd_iommu.c | 54 +++++++++-----
drivers/iommu/arm-smmu-v3.c | 30 +++++++-
drivers/iommu/arm-smmu.c | 30 +++++++-
drivers/iommu/dma-iommu.c | 116 ++++++++++++++++++++++++------
drivers/iommu/intel-iommu.c | 50 +++++++++----
drivers/iommu/iommu.c | 152 ++++++++++++++++++++++++++++++++++++---
drivers/irqchip/irq-gic-v3-its.c | 1 +
drivers/vfio/vfio_iommu_type1.c | 34 ++++++++-
include/linux/dma-iommu.h | 7 ++
include/linux/iommu.h | 46 ++++++++----
include/linux/irqdomain.h | 4 ++
kernel/irq/irqdomain.c | 41 +++++++++++
12 files changed, 481 insertions(+), 84 deletions(-)
--
1.9.1
WARNING: multiple messages have this Message-ID (diff)
From: eric.auger@redhat.com (Eric Auger)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v5 00/17] KVM PCIe/MSI passthrough on ARM/ARM64 and IOVA reserved regions
Date: Wed, 4 Jan 2017 13:32:09 +0000 [thread overview]
Message-ID: <1483536746-2725-1-git-send-email-eric.auger@redhat.com> (raw)
Following LPC discussions, we now report reserved regions through
iommu-group sysfs reserved_regions attribute file.
Reserved regions are populated through the IOMMU get_resv_region
callback (former get_dm_regions), now implemented by amd-iommu,
intel-iommu and arm-smmu:
- the intel-iommu reports the [0xfee00000 - 0xfeefffff] MSI window
as an IOMMU_RESV_NOMAP reserved region.
- the amd-iommu reports device direct mapped regions, the MSI region
and HT regions.
- the arm-smmu reports the MSI window (arbitrarily located at
0x8000000 and 1MB large).
Unsafe interrupt assignment is tested by enumerating all MSI irq
domains and checking MSI remapping is supported in the above hierarchy.
This check is done in case we detect the iommu translates MSI
(an IOMMU_RESV_MSI window exists). Otherwise the IRQ remapping
capability is checked at IOMMU level. Obviously this is a defensive
IRQ safety assessment: Assuming there are several MSI controllers
in the system and at least one does not implement IRQ remapping,
the assignment will be considered as unsafe (even if this controller
is not acessible from the assigned devices).
The series integrates a not officially posted patch from Robin:
"iommu/dma: Allow MSI-only cookies".
Best Regards
Eric
Git: complete series available at
https://github.com/eauger/linux/tree/v4.10-rc2-reserved-v5
History:
RFCv4 -> PATCHv5
- fix IRQ security assessment by looking at irq domain parents
- check DOMAIN_BUS_FSL_MC_MSI irq domains
- AMD MSI and HT regions are exposed in iommu group sysfs
RFCv3 -> RFCv4:
- arm-smmu driver does not register PCI host bridge windows as
reserved regions anymore
- Implement reserved region get/put callbacks also in arm-smmuv3
- take the iommu_group lock on iommu_get_group_resv_regions
- add a type field in iommu_resv_region instead of using prot
- init the region list_head in iommu_alloc_resv_region, also
add type parameter
- iommu_insert_resv_region manage overlaps and sort reserved
windows
- address IRQ safety assessment by enumerating all the MSI irq
domains and checking the MSI_REMAP flag
- update Documentation/ABI/testing/sysfs-kernel-iommu_groups
RFC v2 -> v3:
- switch to an iommu-group sysfs API
- use new dummy allocator provided by Robin
- dummy allocator initialized by vfio-iommu-type1 after enumerating
the reserved regions
- at the moment ARM MSI base address/size is left unchanged compared
to v2
- we currently report reserved regions and not usable IOVA regions as
requested by Alex
RFC v1 -> v2:
- fix intel_add_reserved_regions
- add mutex lock/unlock in vfio_iommu_type1
Eric Auger (17):
iommu/dma: Allow MSI-only cookies
iommu: Rename iommu_dm_regions into iommu_resv_regions
iommu: Add a new type field in iommu_resv_region
iommu: iommu_alloc_resv_region
iommu: Only map direct mapped regions
iommu: iommu_get_group_resv_regions
iommu: Implement reserved_regions iommu-group sysfs file
iommu/vt-d: Implement reserved region get/put callbacks
iommu/amd: Declare MSI and HT regions as reserved IOVA regions
iommu/arm-smmu: Implement reserved region get/put callbacks
iommu/arm-smmu-v3: Implement reserved region get/put callbacks
irqdomain: Add IRQ_DOMAIN_FLAG_MSI_REMAP value
irqdomain: irq_domain_check_msi_remap
irqchip/gicv3-its: Sets IRQ_DOMAIN_FLAG_MSI_REMAP
vfio/type1: Allow transparent MSI IOVA allocation
vfio/type1: Check MSI remapping at irq domain level
iommu/arm-smmu: Do not advertise IOMMU_CAP_INTR_REMAP anymore
drivers/iommu/amd_iommu.c | 54 +++++++++-----
drivers/iommu/arm-smmu-v3.c | 30 +++++++-
drivers/iommu/arm-smmu.c | 30 +++++++-
drivers/iommu/dma-iommu.c | 116 ++++++++++++++++++++++++------
drivers/iommu/intel-iommu.c | 50 +++++++++----
drivers/iommu/iommu.c | 152 ++++++++++++++++++++++++++++++++++++---
drivers/irqchip/irq-gic-v3-its.c | 1 +
drivers/vfio/vfio_iommu_type1.c | 34 ++++++++-
include/linux/dma-iommu.h | 7 ++
include/linux/iommu.h | 46 ++++++++----
include/linux/irqdomain.h | 4 ++
kernel/irq/irqdomain.c | 41 +++++++++++
12 files changed, 481 insertions(+), 84 deletions(-)
--
1.9.1
next reply other threads:[~2017-01-04 13:33 UTC|newest]
Thread overview: 92+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-01-04 13:32 Eric Auger [this message]
2017-01-04 13:32 ` [PATCH v5 00/17] KVM PCIe/MSI passthrough on ARM/ARM64 and IOVA reserved regions Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` [PATCH v5 01/17] iommu/dma: Allow MSI-only cookies Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` [PATCH v5 02/17] iommu: Rename iommu_dm_regions into iommu_resv_regions Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` [PATCH v5 03/17] iommu: Add a new type field in iommu_resv_region Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` [PATCH v5 04/17] iommu: iommu_alloc_resv_region Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` [PATCH v5 05/17] iommu: Only map direct mapped regions Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` [PATCH v5 06/17] iommu: iommu_get_group_resv_regions Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` [PATCH v5 07/17] iommu: Implement reserved_regions iommu-group sysfs file Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` [PATCH v5 08/17] iommu/vt-d: Implement reserved region get/put callbacks Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` [PATCH v5 09/17] iommu/amd: Declare MSI and HT regions as reserved IOVA regions Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` [PATCH v5 10/17] iommu/arm-smmu: Implement reserved region get/put callbacks Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` [PATCH v5 11/17] iommu/arm-smmu-v3: " Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` [PATCH v5 12/17] irqdomain: Add IRQ_DOMAIN_FLAG_MSI_REMAP value Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` [PATCH v5 13/17] irqdomain: irq_domain_check_msi_remap Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:46 ` Marc Zyngier
2017-01-04 13:46 ` Marc Zyngier
2017-01-04 13:46 ` Marc Zyngier
2017-01-04 14:11 ` Auger Eric
2017-01-04 14:11 ` Auger Eric
2017-01-04 14:11 ` Auger Eric
2017-01-04 15:27 ` Marc Zyngier
2017-01-04 15:27 ` Marc Zyngier
2017-01-04 15:27 ` Marc Zyngier
2017-01-04 15:58 ` Auger Eric
2017-01-04 15:58 ` Auger Eric
2017-01-04 15:58 ` Auger Eric
2017-01-05 10:45 ` Auger Eric
2017-01-05 10:45 ` Auger Eric
2017-01-05 10:45 ` Auger Eric
2017-01-05 11:25 ` Marc Zyngier
2017-01-05 11:25 ` Marc Zyngier
2017-01-05 11:25 ` Marc Zyngier
2017-01-05 11:29 ` Auger Eric
2017-01-05 11:29 ` Auger Eric
2017-01-05 11:29 ` Auger Eric
2017-01-05 11:57 ` Marc Zyngier
2017-01-05 11:57 ` Marc Zyngier
2017-01-05 12:08 ` Auger Eric
2017-01-05 12:08 ` Auger Eric
2017-01-05 12:08 ` Auger Eric
2017-01-06 4:27 ` Bharat Bhushan
2017-01-06 4:27 ` Bharat Bhushan
2017-01-06 4:27 ` Bharat Bhushan
2017-01-06 8:35 ` Auger Eric
2017-01-06 8:35 ` Auger Eric
2017-01-06 8:35 ` Auger Eric
2017-01-06 9:42 ` Marc Zyngier
2017-01-06 9:42 ` Marc Zyngier
2017-01-06 9:42 ` Marc Zyngier
2017-01-05 6:28 ` kbuild test robot
2017-01-05 6:28 ` kbuild test robot
2017-01-05 6:28 ` kbuild test robot
2017-01-04 13:32 ` [PATCH v5 14/17] irqchip/gicv3-its: Sets IRQ_DOMAIN_FLAG_MSI_REMAP Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` [PATCH v5 15/17] vfio/type1: Allow transparent MSI IOVA allocation Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` [PATCH v5 16/17] vfio/type1: Check MSI remapping at irq domain level Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` [PATCH v5 17/17] iommu/arm-smmu: Do not advertise IOMMU_CAP_INTR_REMAP anymore Eric Auger
2017-01-04 13:32 ` Eric Auger
2017-01-04 13:32 ` Eric Auger
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1483536746-2725-1-git-send-email-eric.auger@redhat.com \
--to=eric.auger@redhat.com \
--cc=alex.williamson@redhat.com \
--cc=bharat.bhushan@nxp.com \
--cc=christoffer.dall@linaro.org \
--cc=diana.craciun@nxp.com \
--cc=drjones@redhat.com \
--cc=eric.auger.pro@gmail.com \
--cc=geethasowjanya.akula@gmail.com \
--cc=gpkulkarni@gmail.com \
--cc=iommu@lists.linux-foundation.org \
--cc=jason@lakedaemon.net \
--cc=joro@8bytes.org \
--cc=kvm@vger.kernel.org \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-kernel@vger.kernel.org \
--cc=marc.zyngier@arm.com \
--cc=pranav.sawargaonkar@gmail.com \
--cc=punit.agrawal@arm.com \
--cc=robin.murphy@arm.com \
--cc=shankerd@codeaurora.org \
--cc=tglx@linutronix.de \
--cc=will.deacon@arm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.