From: Subbaraya Sundeep <sbhatta@marvell.com>
To: <andrew+netdev@lunn.ch>, <davem@davemloft.net>,
<edumazet@google.com>, <kuba@kernel.org>, <pabeni@redhat.com>,
<sgoutham@marvell.com>, <gakula@marvell.com>,
<bbhushan2@marvell.com>
Cc: <netdev@vger.kernel.org>, <linux-kernel@vger.kernel.org>,
Linu Cherian <lcherian@marvell.com>
Subject: Re: [net-next PATCH v5 1/4] octeontx2-af: npa: cn20k: Add NPA Halo support
Date: Sun, 17 May 2026 19:12:45 +0530 [thread overview]
Message-ID: <20260517134245.GA1632721@kernel-ep2> (raw)
In-Reply-To: <1777879921-15542-2-git-send-email-sbhatta@marvell.com>
On 2026-05-04 at 13:01:58, Subbaraya Sundeep (sbhatta@marvell.com) wrote:
> From: Linu Cherian <lcherian@marvell.com>
>
> CN20K silicon implements unified aura and pool context
> type called Halo for better resource usage. Add support to
> handle Halo context type operations.
>
> Signed-off-by: Linu Cherian <lcherian@marvell.com>
> Signed-off-by: Subbaraya Sundeep <sbhatta@marvell.com>
> ---
> .../ethernet/marvell/octeontx2/af/cn20k/npa.c | 27 +++++++
> .../marvell/octeontx2/af/cn20k/struct.h | 81 +++++++++++++++++++
> .../net/ethernet/marvell/octeontx2/af/mbox.h | 6 ++
> .../net/ethernet/marvell/octeontx2/af/rvu.h | 2 +
> .../ethernet/marvell/octeontx2/af/rvu_npa.c | 63 +++++++++++++--
> .../marvell/octeontx2/af/rvu_struct.h | 1 +
> 6 files changed, 173 insertions(+), 7 deletions(-)
>
> diff --git a/drivers/net/ethernet/marvell/octeontx2/af/cn20k/npa.c b/drivers/net/ethernet/marvell/octeontx2/af/cn20k/npa.c
> index fe8f926c8b75..c963f43dc7b0 100644
> --- a/drivers/net/ethernet/marvell/octeontx2/af/cn20k/npa.c
> +++ b/drivers/net/ethernet/marvell/octeontx2/af/cn20k/npa.c
> @@ -19,3 +19,30 @@ int rvu_mbox_handler_npa_cn20k_aq_enq(struct rvu *rvu,
> (struct npa_aq_enq_rsp *)rsp);
> }
> EXPORT_SYMBOL(rvu_mbox_handler_npa_cn20k_aq_enq);
> +
> +int rvu_npa_halo_hwctx_disable(struct npa_aq_enq_req *req)
> +{
> + struct npa_cn20k_aq_enq_req *hreq;
> +
> + hreq = (struct npa_cn20k_aq_enq_req *)req;
> +
> + hreq->halo.bp_ena_0 = 0;
> + hreq->halo.bp_ena_1 = 0;
> + hreq->halo.bp_ena_2 = 0;
> + hreq->halo.bp_ena_3 = 0;
> + hreq->halo.bp_ena_4 = 0;
> + hreq->halo.bp_ena_5 = 0;
> + hreq->halo.bp_ena_6 = 0;
> + hreq->halo.bp_ena_7 = 0;
> +
> + hreq->halo_mask.bp_ena_0 = 1;
> + hreq->halo_mask.bp_ena_1 = 1;
> + hreq->halo_mask.bp_ena_2 = 1;
> + hreq->halo_mask.bp_ena_3 = 1;
> + hreq->halo_mask.bp_ena_4 = 1;
> + hreq->halo_mask.bp_ena_5 = 1;
> + hreq->halo_mask.bp_ena_6 = 1;
> + hreq->halo_mask.bp_ena_7 = 1;
> +
> + return 0;
> +}
Can this cast lead to context truncation and type confusion?
When a CN20K client sends a struct npa_cn20k_aq_enq_req (280 bytes),
rvu_mbox_handler_npa_cn20k_aq_enq() casts it to the smaller struct
npa_aq_enq_req (152 bytes). Inside rvu_npa_aq_enq_inst(), the code uses the
layout of npa_aq_enq_req, where the mask is at offset 88. However, in the
provided npa_cn20k_aq_enq_req, the context payload spans 128 bytes and the
mask starts at offset 152. Reading from offset 88 would fetch garbage from
the middle of the context instead of the correct mask.
Also, the memcpy operations use sizeof(struct npa_pool_s) (64 bytes), which
truncates the 128-byte CN20K context:
drivers/net/ethernet/marvell/octeontx2/af/rvu_npa.c:rvu_npa_aq_enq_inst() {
...
} else { /* Applies to pool and halo since size is same */
memcpy(mask, &req->pool_mask,
sizeof(struct npa_pool_s));
memcpy(ctx, &req->pool, sizeof(struct npa_pool_s));
}
...
}
Will this break hardware initialization by losing the upper 64 bytes of
hardware configuration?
[Sundeep] rvu_npa_halo_hwctx_disable is not needed since HW just sees the
first enable bit in context is set or not if disabled then rest of the fields
are not accessed. Also will pad cn10k NPA contexts to max context size i.e,
128 bytes
> diff --git a/drivers/net/ethernet/marvell/octeontx2/af/cn20k/struct.h b/drivers/net/ethernet/marvell/octeontx2/af/cn20k/struct.h
> index 763f6cabd7c2..2364bafd329d 100644
> --- a/drivers/net/ethernet/marvell/octeontx2/af/cn20k/struct.h
> +++ b/drivers/net/ethernet/marvell/octeontx2/af/cn20k/struct.h
> @@ -377,4 +377,85 @@ struct npa_cn20k_pool_s {
>
> static_assert(sizeof(struct npa_cn20k_pool_s) == NIX_MAX_CTX_SIZE);
>
> +struct npa_cn20k_halo_s {
> + u64 stack_base : 64;
> + u64 ena : 1;
> + u64 nat_align : 1;
> + u64 reserved_66_67 : 2;
> + u64 stack_caching : 1;
> + u64 reserved_69_71 : 3;
> + u64 aura_drop_ena : 1;
> + u64 reserved_73_79 : 7;
> + u64 aura_drop : 8;
> + u64 buf_offset : 12;
> + u64 reserved_100_103 : 4;
> + u64 buf_size : 12;
> + u64 reserved_116_119 : 4;
> + u64 ref_cnt_prof : 3;
> + u64 reserved_123_127 : 5;
> + u64 stack_max_pages : 32;
> + u64 stack_pages : 32;
> + u64 bp_0 : 7;
> + u64 bp_1 : 7;
> + u64 bp_2 : 7;
> + u64 bp_3 : 7;
> + u64 bp_4 : 7;
> + u64 bp_5 : 7;
> + u64 bp_6 : 7;
> + u64 bp_7 : 7;
> + u64 bp_ena_0 : 1;
> + u64 bp_ena_1 : 1;
> + u64 bp_ena_2 : 1;
> + u64 bp_ena_3 : 1;
> + u64 bp_ena_4 : 1;
> + u64 bp_ena_5 : 1;
> + u64 bp_ena_6 : 1;
> + u64 bp_ena_7 : 1;
> + u64 stack_offset : 4;
> + u64 reserved_260_263 : 4;
> + u64 shift : 6;
> + u64 reserved_270_271 : 2;
> + u64 avg_level : 8;
> + u64 avg_con : 9;
> + u64 fc_ena : 1;
> + u64 fc_stype : 2;
> + u64 fc_hyst_bits : 4;
> + u64 fc_up_crossing : 1;
> + u64 reserved_297_299 : 3;
> + u64 update_time : 16;
> + u64 reserved_316_319 : 4;
> + u64 fc_addr : 64;
> + u64 ptr_start : 64;
> + u64 ptr_end : 64;
> + u64 bpid_0 : 12;
> + u64 reserved_524_535 : 12;
> + u64 err_int : 8;
> + u64 err_int_ena : 8;
> + u64 thresh_int : 1;
> + u64 thresh_int_ena : 1;
> + u64 thresh_up : 1;
> + u64 reserved_555 : 1;
> + u64 thresh_qint_idx : 7;
> + u64 reserved_563 : 1;
> + u64 err_qint_idx : 7;
> + u64 reserved_571_575 : 5;
> + u64 thresh : 36;
> + u64 reserved_612_615 : 4;
> + u64 fc_msh_dst : 11;
> + u64 reserved_627_630 : 4;
> + u64 op_dpc_ena : 1;
> + u64 op_dpc_set : 5;
> + u64 reserved_637_637 : 1;
> + u64 stream_ctx : 1;
> + u64 unified_ctx : 1;
> + u64 reserved_640_703 : 64;
> + u64 reserved_704_767 : 64;
> + u64 reserved_768_831 : 64;
> + u64 reserved_832_895 : 64;
> + u64 reserved_896_959 : 64;
> + u64 reserved_960_1023 : 64;
> +};
> +
> +static_assert(sizeof(struct npa_cn20k_halo_s) == NIX_MAX_CTX_SIZE);
> +
> #endif
> diff --git a/drivers/net/ethernet/marvell/octeontx2/af/mbox.h b/drivers/net/ethernet/marvell/octeontx2/af/mbox.h
> index dc42c81c0942..4a97bd93d882 100644
> --- a/drivers/net/ethernet/marvell/octeontx2/af/mbox.h
> +++ b/drivers/net/ethernet/marvell/octeontx2/af/mbox.h
> @@ -884,6 +884,8 @@ struct npa_cn20k_aq_enq_req {
> struct npa_cn20k_aura_s aura;
> /* Valid when op == WRITE/INIT and ctype == POOL */
> struct npa_cn20k_pool_s pool;
> + /* Valid when op == WRITE/INIT and ctype == HALO */
> + struct npa_cn20k_halo_s halo;
> };
> /* Mask data when op == WRITE (1=write, 0=don't write) */
> union {
> @@ -891,6 +893,8 @@ struct npa_cn20k_aq_enq_req {
> struct npa_cn20k_aura_s aura_mask;
> /* Valid when op == WRITE and ctype == POOL */
> struct npa_cn20k_pool_s pool_mask;
> + /* Valid when op == WRITE/INIT and ctype == HALO */
> + struct npa_cn20k_halo_s halo_mask;
> };
> };
>
> @@ -901,6 +905,8 @@ struct npa_cn20k_aq_enq_rsp {
> struct npa_cn20k_aura_s aura;
> /* Valid when op == READ and ctype == POOL */
> struct npa_cn20k_pool_s pool;
> + /* Valid when op == READ and ctype == HALO */
> + struct npa_cn20k_halo_s halo;
> };
> };
>
> diff --git a/drivers/net/ethernet/marvell/octeontx2/af/rvu.h b/drivers/net/ethernet/marvell/octeontx2/af/rvu.h
> index a466181cf908..36a71d32b894 100644
> --- a/drivers/net/ethernet/marvell/octeontx2/af/rvu.h
> +++ b/drivers/net/ethernet/marvell/octeontx2/af/rvu.h
> @@ -261,6 +261,7 @@ struct rvu_pfvf {
> struct qmem *pool_ctx;
> struct qmem *npa_qints_ctx;
> unsigned long *aura_bmap;
> + unsigned long *halo_bmap; /* Aura and Halo are mutually exclusive */
> unsigned long *pool_bmap;
>
> /* NIX contexts */
> @@ -1008,6 +1009,7 @@ void rvu_npa_freemem(struct rvu *rvu);
> void rvu_npa_lf_teardown(struct rvu *rvu, u16 pcifunc, int npalf);
> int rvu_npa_aq_enq_inst(struct rvu *rvu, struct npa_aq_enq_req *req,
> struct npa_aq_enq_rsp *rsp);
> +int rvu_npa_halo_hwctx_disable(struct npa_aq_enq_req *req);
>
> /* NIX APIs */
> bool is_nixlf_attached(struct rvu *rvu, u16 pcifunc);
> diff --git a/drivers/net/ethernet/marvell/octeontx2/af/rvu_npa.c b/drivers/net/ethernet/marvell/octeontx2/af/rvu_npa.c
> index e2a33e46b48a..809386c6bcba 100644
> --- a/drivers/net/ethernet/marvell/octeontx2/af/rvu_npa.c
> +++ b/drivers/net/ethernet/marvell/octeontx2/af/rvu_npa.c
> @@ -12,6 +12,11 @@
> #include "rvu_reg.h"
> #include "rvu.h"
>
> +static bool npa_ctype_invalid(struct rvu *rvu, int ctype)
> +{
> + return !is_cn20k(rvu->pdev) && ctype == NPA_AQ_CTYPE_HALO;
> +}
> +
> static int npa_aq_enqueue_wait(struct rvu *rvu, struct rvu_block *block,
> struct npa_aq_inst_s *inst)
> {
> @@ -72,13 +77,19 @@ int rvu_npa_aq_enq_inst(struct rvu *rvu, struct npa_aq_enq_req *req,
> bool ena;
>
> pfvf = rvu_get_pfvf(rvu, pcifunc);
> - if (!pfvf->aura_ctx || req->aura_id >= pfvf->aura_ctx->qsize)
> + if (!pfvf->aura_ctx || req->aura_id >= pfvf->aura_ctx->qsize ||
> + npa_ctype_invalid(rvu, req->ctype))
> return NPA_AF_ERR_AQ_ENQUEUE;
>
> blkaddr = rvu_get_blkaddr(rvu, BLKTYPE_NPA, pcifunc);
> if (!pfvf->npalf || blkaddr < 0)
> return NPA_AF_ERR_AF_LF_INVALID;
>
> + /* Ensure halo bitmap is exclusive to halo ctype */
> + if (is_cn20k(rvu->pdev) && req->ctype != NPA_AQ_CTYPE_HALO &&
> + test_bit(req->aura_id, pfvf->halo_bmap))
> + return NPA_AF_ERR_AQ_ENQUEUE;
> +
Does the exclusivity check need to also prevent HALO from overwriting
AURA/POOL contexts?
This prevents an AURA or POOL context from overwriting a HALO context. But
if a HALO INIT command is sent for an aura_id already in use by an AURA or
POOL context, it bypasses this check. It will then overwrite the hardware
context and set the bit in pfvf->halo_bmap while the bit in pfvf->aura_bmap
remains set.
During rvu_npa_lf_teardown(), the driver attempts to disable AURA contexts
first. For the corrupted ID, the protection check will falsely trigger and
cause the AURA disable command to fail, leaving the hardware in an
inconsistent state.
Also, is there a race condition in the mutual exclusivity check?
The exclusivity check above is performed outside of the spin_lock(&aq->lock)
critical section.
Later, the state tracking bitmaps are updated inside the critical section:
drivers/net/ethernet/marvell/octeontx2/af/rvu_npa.c:rvu_npa_aq_enq_inst() {
...
spin_lock(&aq->lock);
...
if (req->ctype == NPA_AQ_CTYPE_HALO) {
if (req->op == NPA_AQ_INSTOP_INIT && req->aura.ena)
__set_bit(req->aura_id, pfvf->halo_bmap);
...
}
If two concurrent execution paths attempt to initialize contexts on the same
aura_id, both could evaluate the unlocked check as false before either
acquires the lock. They would then serialize on the lock and both proceed to
overwrite the shared hardware context and state bitmaps.
[Sundeep] Being over defensive here, exclusivity check is not needed a PF/VF
drivers use either AURA and POOL or HALO but not mixed. Will remove the
check.
Thanks,
Sundeep
> block = &hw->block[blkaddr];
> aq = block->aq;
> if (!aq) {
> @@ -119,7 +130,7 @@ int rvu_npa_aq_enq_inst(struct rvu *rvu, struct npa_aq_enq_req *req,
> memcpy(mask, &req->aura_mask,
> sizeof(struct npa_aura_s));
> memcpy(ctx, &req->aura, sizeof(struct npa_aura_s));
> - } else {
> + } else { /* Applies to pool and halo since size is same */
> memcpy(mask, &req->pool_mask,
> sizeof(struct npa_pool_s));
> memcpy(ctx, &req->pool, sizeof(struct npa_pool_s));
> @@ -135,7 +146,7 @@ int rvu_npa_aq_enq_inst(struct rvu *rvu, struct npa_aq_enq_req *req,
> req->aura.pool_addr = pfvf->pool_ctx->iova +
> (req->aura.pool_addr * pfvf->pool_ctx->entry_sz);
> memcpy(ctx, &req->aura, sizeof(struct npa_aura_s));
> - } else { /* POOL's context */
> + } else { /* Applies to pool and halo since size is same */
> memcpy(ctx, &req->pool, sizeof(struct npa_pool_s));
> }
> break;
> @@ -176,6 +187,20 @@ int rvu_npa_aq_enq_inst(struct rvu *rvu, struct npa_aq_enq_req *req,
> }
> }
>
> + if (req->ctype == NPA_AQ_CTYPE_HALO) {
> + if (req->op == NPA_AQ_INSTOP_INIT && req->aura.ena)
> + __set_bit(req->aura_id, pfvf->halo_bmap);
> + if (req->op == NPA_AQ_INSTOP_WRITE) {
> + ena = (req->aura.ena & req->aura_mask.ena) |
> + (test_bit(req->aura_id, pfvf->halo_bmap) &
> + ~req->aura_mask.ena);
> + if (ena)
> + __set_bit(req->aura_id, pfvf->halo_bmap);
> + else
> + __clear_bit(req->aura_id, pfvf->halo_bmap);
> + }
> + }
> +
> /* Set pool bitmap if pool hw context is enabled */
> if (req->ctype == NPA_AQ_CTYPE_POOL) {
> if (req->op == NPA_AQ_INSTOP_INIT && req->pool.ena)
> @@ -198,7 +223,7 @@ int rvu_npa_aq_enq_inst(struct rvu *rvu, struct npa_aq_enq_req *req,
> if (req->ctype == NPA_AQ_CTYPE_AURA)
> memcpy(&rsp->aura, ctx,
> sizeof(struct npa_aura_s));
> - else
> + else /* Applies to pool and halo since size is same */
> memcpy(&rsp->pool, ctx,
> sizeof(struct npa_pool_s));
> }
> @@ -210,12 +235,14 @@ int rvu_npa_aq_enq_inst(struct rvu *rvu, struct npa_aq_enq_req *req,
> static int npa_lf_hwctx_disable(struct rvu *rvu, struct hwctx_disable_req *req)
> {
> struct rvu_pfvf *pfvf = rvu_get_pfvf(rvu, req->hdr.pcifunc);
> + const char *context = "Unknown";
> struct npa_aq_enq_req aq_req;
> unsigned long *bmap;
> int id, cnt = 0;
> int err = 0, rc;
>
> - if (!pfvf->pool_ctx || !pfvf->aura_ctx)
> + if (!pfvf->pool_ctx || !pfvf->aura_ctx ||
> + npa_ctype_invalid(rvu, req->ctype))
> return NPA_AF_ERR_AQ_ENQUEUE;
>
> memset(&aq_req, 0, sizeof(struct npa_aq_enq_req));
> @@ -226,6 +253,7 @@ static int npa_lf_hwctx_disable(struct rvu *rvu, struct hwctx_disable_req *req)
> aq_req.pool_mask.ena = 1;
> cnt = pfvf->pool_ctx->qsize;
> bmap = pfvf->pool_bmap;
> + context = "Pool";
> } else if (req->ctype == NPA_AQ_CTYPE_AURA) {
> aq_req.aura.ena = 0;
> aq_req.aura_mask.ena = 1;
> @@ -233,6 +261,14 @@ static int npa_lf_hwctx_disable(struct rvu *rvu, struct hwctx_disable_req *req)
> aq_req.aura_mask.bp_ena = 1;
> cnt = pfvf->aura_ctx->qsize;
> bmap = pfvf->aura_bmap;
> + context = "Aura";
> + } else if (req->ctype == NPA_AQ_CTYPE_HALO) {
> + aq_req.aura.ena = 0;
> + aq_req.aura_mask.ena = 1;
> + rvu_npa_halo_hwctx_disable(&aq_req);
> + cnt = pfvf->aura_ctx->qsize;
> + bmap = pfvf->halo_bmap;
> + context = "Halo";
> }
>
> aq_req.ctype = req->ctype;
> @@ -246,8 +282,7 @@ static int npa_lf_hwctx_disable(struct rvu *rvu, struct hwctx_disable_req *req)
> if (rc) {
> err = rc;
> dev_err(rvu->dev, "Failed to disable %s:%d context\n",
> - (req->ctype == NPA_AQ_CTYPE_AURA) ?
> - "Aura" : "Pool", id);
> + context, id);
> }
> }
>
> @@ -311,6 +346,9 @@ static void npa_ctx_free(struct rvu *rvu, struct rvu_pfvf *pfvf)
> kfree(pfvf->aura_bmap);
> pfvf->aura_bmap = NULL;
>
> + kfree(pfvf->halo_bmap);
> + pfvf->halo_bmap = NULL;
> +
> qmem_free(rvu->dev, pfvf->aura_ctx);
> pfvf->aura_ctx = NULL;
>
> @@ -374,6 +412,13 @@ int rvu_mbox_handler_npa_lf_alloc(struct rvu *rvu,
> if (!pfvf->aura_bmap)
> goto free_mem;
>
> + if (is_cn20k(rvu->pdev)) {
> + pfvf->halo_bmap = kcalloc(NPA_AURA_COUNT(req->aura_sz),
> + sizeof(long), GFP_KERNEL);
> + if (!pfvf->halo_bmap)
> + goto free_mem;
> + }
> +
> /* Alloc memory for pool HW contexts */
> hwctx_size = 1UL << ((ctx_cfg >> 4) & 0xF);
> err = qmem_alloc(rvu->dev, &pfvf->pool_ctx, req->nr_pools, hwctx_size);
> @@ -562,6 +607,10 @@ void rvu_npa_lf_teardown(struct rvu *rvu, u16 pcifunc, int npalf)
> ctx_req.ctype = NPA_AQ_CTYPE_AURA;
> npa_lf_hwctx_disable(rvu, &ctx_req);
>
> + /* Disable all Halos */
> + ctx_req.ctype = NPA_AQ_CTYPE_HALO;
> + npa_lf_hwctx_disable(rvu, &ctx_req);
> +
> npa_ctx_free(rvu, pfvf);
> }
>
> diff --git a/drivers/net/ethernet/marvell/octeontx2/af/rvu_struct.h b/drivers/net/ethernet/marvell/octeontx2/af/rvu_struct.h
> index 8e868f815de1..d37cf2cf0fee 100644
> --- a/drivers/net/ethernet/marvell/octeontx2/af/rvu_struct.h
> +++ b/drivers/net/ethernet/marvell/octeontx2/af/rvu_struct.h
> @@ -130,6 +130,7 @@ enum npa_aq_comp {
> enum npa_aq_ctype {
> NPA_AQ_CTYPE_AURA = 0x0,
> NPA_AQ_CTYPE_POOL = 0x1,
> + NPA_AQ_CTYPE_HALO = 0x2,
> };
>
> /* NPA admin queue instruction opcodes */
> --
> 2.48.1
>
next prev parent reply other threads:[~2026-05-17 13:43 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-05-04 7:31 [net-next PATCH v5 0/4] octeontx2: CN20K NPA Halo context support Subbaraya Sundeep
2026-05-04 7:31 ` [net-next PATCH v5 1/4] octeontx2-af: npa: cn20k: Add NPA Halo support Subbaraya Sundeep
2026-05-17 13:42 ` Subbaraya Sundeep [this message]
2026-05-04 7:31 ` [net-next PATCH v5 2/4] octeontx2-af: npa: cn20k: Add DPC support Subbaraya Sundeep
2026-05-17 14:47 ` Subbaraya Sundeep
2026-05-04 7:32 ` [net-next PATCH v5 3/4] octeontx2-af: npa: cn20k: Add debugfs for Halo Subbaraya Sundeep
2026-05-04 7:32 ` [net-next PATCH v5 4/4] octeontx2-pf: cn20k: Use unified Halo context Subbaraya Sundeep
2026-05-07 10:26 ` [net-next PATCH v5 0/4] octeontx2: CN20K NPA Halo context support Simon Horman
-- strict thread matches above, loose matches on Subject: below --
2026-04-09 9:53 Subbaraya Sundeep
2026-04-09 9:53 ` [net-next PATCH v5 1/4] octeontx2-af: npa: cn20k: Add NPA Halo support Subbaraya Sundeep
2026-04-09 15:09 ` Alexander Lobakin
2026-04-10 9:35 ` Subbaraya Sundeep
2026-04-10 9:36 ` Alexander Lobakin
2026-04-10 10:11 ` Subbaraya Sundeep
2026-04-13 15:32 ` Alexander Lobakin
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260517134245.GA1632721@kernel-ep2 \
--to=sbhatta@marvell.com \
--cc=andrew+netdev@lunn.ch \
--cc=bbhushan2@marvell.com \
--cc=davem@davemloft.net \
--cc=edumazet@google.com \
--cc=gakula@marvell.com \
--cc=kuba@kernel.org \
--cc=lcherian@marvell.com \
--cc=linux-kernel@vger.kernel.org \
--cc=netdev@vger.kernel.org \
--cc=pabeni@redhat.com \
--cc=sgoutham@marvell.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox