From: "Ananyev, Konstantin" <konstantin.ananyev@intel.com>
To: Anoob Joseph <anoobj@marvell.com>,
Akhil Goyal <akhil.goyal@nxp.com>,
"Nicolau, Radu" <radu.nicolau@intel.com>
Cc: Narayana Prasad Raju Athreya <pathreya@marvell.com>,
"dev@dpdk.org" <dev@dpdk.org>
Subject: Re: [dpdk-dev] [PATCH v3] examples/ipsec-secgw: add per core packet stats
Date: Wed, 13 May 2020 12:12:59 +0000 [thread overview]
Message-ID: <BYAPR11MB3301E60DA79FA2873F1CBBD99ABF0@BYAPR11MB3301.namprd11.prod.outlook.com> (raw)
In-Reply-To: <MN2PR18MB2877A10C5838C1A2D99439DDDFBE0@MN2PR18MB2877.namprd18.prod.outlook.com>
> > >
> > > +#if (STATS_INTERVAL > 0)
> > > +
> > > +/* Print out statistics on packet distribution */ static void
> > > +print_stats(void)
> > > +{
> > > + uint64_t total_packets_dropped, total_packets_tx, total_packets_rx;
> > > + unsigned int coreid;
> > > + float burst_percent;
> > > +
> > > + total_packets_dropped = 0;
> > > + total_packets_tx = 0;
> > > + total_packets_rx = 0;
> > > +
> > > + const char clr[] = { 27, '[', '2', 'J', '\0' };
> > > +
> > > + /* Clear screen and move to top left */
> > > + printf("%s", clr);
> > > +
> > > + printf("\nCore statistics ====================================");
> > > +
> > > + for (coreid = 0; coreid < RTE_MAX_LCORE; coreid++) {
> > > + /* skip disabled cores */
> > > + if (rte_lcore_is_enabled(coreid) == 0)
> > > + continue;
> > > + burst_percent = (float)(core_statistics[coreid].burst_rx * 100)/
> > > + core_statistics[coreid].rx;
> > > + printf("\nStatistics for core %u ------------------------------"
> > > + "\nPackets received: %20"PRIu64
> > > + "\nPackets sent: %24"PRIu64
> > > + "\nPackets dropped: %21"PRIu64
> > > + "\nBurst percent: %23.2f",
> > > + coreid,
> > > + core_statistics[coreid].rx,
> > > + core_statistics[coreid].tx,
> > > + core_statistics[coreid].dropped,
> > > + burst_percent);
> >
> >
> > As one more comment:
> > Can we also collect number of calls and display average pkt/call (for both rx and
> > tx)?
> >
>
> [Anoob] Can you describe which "call" you meant? We can capture more logs if required.
I meant something like that:
+static inline void
+core_stats_update_rx(int n)
+{
+#if (STATS_INTERVAL > 0)
+ int lcore_id = rte_lcore_id();
+ core_statistics[lcore_id].rx += n;
+ core_statistics[lcore_id].rx_call++;
+ if (n == MAX_PKT_BURST)
+ core_statistics[lcore_id].burst_rx += n;
+#else
+ RTE_SET_USED(n);
+#endif /* STATS_INTERVAL */
+}
And then in print_stats():
"\nPackets received: %20"PRIu64
",RX calls: %" PRIu64
"RX packets/call: %.2f"
core_statistics[coreid].rx,
core_statistics[coreid].rx_call,
(double)core_statistics[coreid].rx / core_statistics[coreid].rx_call
>
> > > +
> > > + total_packets_dropped += core_statistics[coreid].dropped;
> > > + total_packets_tx += core_statistics[coreid].tx;
> > > + total_packets_rx += core_statistics[coreid].rx;
> > > + }
> > > + printf("\nAggregate statistics ==============================="
> > > + "\nTotal packets received: %14"PRIu64
> > > + "\nTotal packets sent: %18"PRIu64
> > > + "\nTotal packets dropped: %15"PRIu64,
> > > + total_packets_rx,
> > > + total_packets_tx,
> > > + total_packets_dropped);
> > > +
> > printf("\n===================================================
> > =\n");
> > > +}
> > > +#endif /* STATS_INTERVAL */
> > > +
> > > static inline void
> > > prepare_one_packet(struct rte_mbuf *pkt, struct ipsec_traffic *t) {
> > > @@ -333,7 +386,7 @@ prepare_one_packet(struct rte_mbuf *pkt, struct
> > > ipsec_traffic *t)
> > >
> > > /* drop packet when IPv6 header exceeds first segment length
> > */
> > > if (unlikely(l3len > pkt->data_len)) {
> > > - rte_pktmbuf_free(pkt);
> > > + free_pkt(pkt);
> > > return;
> > > }
> > >
> > > @@ -350,7 +403,7 @@ prepare_one_packet(struct rte_mbuf *pkt, struct
> > ipsec_traffic *t)
> > > /* Unknown/Unsupported type, drop the packet */
> > > RTE_LOG(ERR, IPSEC, "Unsupported packet type 0x%x\n",
> > > rte_be_to_cpu_16(eth->ether_type));
> > > - rte_pktmbuf_free(pkt);
> > > + free_pkt(pkt);
> > > return;
> > > }
> > >
> > > @@ -477,9 +530,12 @@ send_burst(struct lcore_conf *qconf, uint16_t n,
> > uint16_t port)
> > > prepare_tx_burst(m_table, n, port, qconf);
> > >
> > > ret = rte_eth_tx_burst(port, queueid, m_table, n);
> > > +
> > > + core_stats_update_tx(ret);
> > > +
> > > if (unlikely(ret < n)) {
> > > do {
> > > - rte_pktmbuf_free(m_table[ret]);
> > > + free_pkt(m_table[ret]);
> > > } while (++ret < n);
> > > }
> > >
> > > @@ -525,7 +581,7 @@ send_fragment_packet(struct lcore_conf *qconf,
> > struct rte_mbuf *m,
> > > "error code: %d\n",
> > > __func__, m->pkt_len, rte_errno);
> > >
> > > - rte_pktmbuf_free(m);
> > > + free_pkt(m);
> > > return len;
> > > }
> > >
> > > @@ -550,7 +606,7 @@ send_single_packet(struct rte_mbuf *m, uint16_t
> > port, uint8_t proto)
> > > } else if (frag_tbl_sz > 0)
> > > len = send_fragment_packet(qconf, m, port, proto);
> > > else
> > > - rte_pktmbuf_free(m);
> > > + free_pkt(m);
> > >
> > > /* enough pkts to be sent */
> > > if (unlikely(len == MAX_PKT_BURST)) { @@ -584,19 +640,19 @@
> > > inbound_sp_sa(struct sp_ctx *sp, struct sa_ctx *sa, struct traffic_type *ip,
> > > continue;
> > > }
> > > if (res == DISCARD) {
> > > - rte_pktmbuf_free(m);
> > > + free_pkt(m);
> > > continue;
> > > }
> > >
> > > /* Only check SPI match for processed IPSec packets */
> > > if (i < lim && ((m->ol_flags & PKT_RX_SEC_OFFLOAD) == 0)) {
> > > - rte_pktmbuf_free(m);
> > > + free_pkt(m);
> > > continue;
> > > }
> > >
> > > sa_idx = res - 1;
> > > if (!inbound_sa_check(sa, m, sa_idx)) {
> > > - rte_pktmbuf_free(m);
> > > + free_pkt(m);
> > > continue;
> > > }
> > > ip->pkts[j++] = m;
> > > @@ -631,7 +687,7 @@ split46_traffic(struct ipsec_traffic *trf, struct rte_mbuf
> > *mb[], uint32_t num)
> > > offsetof(struct ip6_hdr, ip6_nxt));
> > > n6++;
> > > } else
> > > - rte_pktmbuf_free(m);
> > > + free_pkt(m);
> > > }
> > >
> > > trf->ip4.num = n4;
> > > @@ -683,7 +739,7 @@ outbound_sp(struct sp_ctx *sp, struct traffic_type *ip,
> > > m = ip->pkts[i];
> > > sa_idx = ip->res[i] - 1;
> > > if (ip->res[i] == DISCARD)
> > > - rte_pktmbuf_free(m);
> > > + free_pkt(m);
> > > else if (ip->res[i] == BYPASS)
> > > ip->pkts[j++] = m;
> > > else {
> > > @@ -702,8 +758,7 @@ process_pkts_outbound(struct ipsec_ctx *ipsec_ctx,
> > > uint16_t idx, nb_pkts_out, i;
> > >
> > > /* Drop any IPsec traffic from protected ports */
> > > - for (i = 0; i < traffic->ipsec.num; i++)
> > > - rte_pktmbuf_free(traffic->ipsec.pkts[i]);
> > > + free_pkts(traffic->ipsec.pkts, traffic->ipsec.num);
> > >
> > > traffic->ipsec.num = 0;
> > >
> > > @@ -743,14 +798,12 @@ process_pkts_inbound_nosp(struct ipsec_ctx
> > *ipsec_ctx,
> > > uint32_t nb_pkts_in, i, idx;
> > >
> > > /* Drop any IPv4 traffic from unprotected ports */
> > > - for (i = 0; i < traffic->ip4.num; i++)
> > > - rte_pktmbuf_free(traffic->ip4.pkts[i]);
> > > + free_pkts(traffic->ip4.pkts, traffic->ip4.num);
> > >
> > > traffic->ip4.num = 0;
> > >
> > > /* Drop any IPv6 traffic from unprotected ports */
> > > - for (i = 0; i < traffic->ip6.num; i++)
> > > - rte_pktmbuf_free(traffic->ip6.pkts[i]);
> > > + free_pkts(traffic->ip6.pkts, traffic->ip6.num);
> > >
> > > traffic->ip6.num = 0;
> > >
> > > @@ -786,8 +839,7 @@ process_pkts_outbound_nosp(struct ipsec_ctx
> > *ipsec_ctx,
> > > struct ip *ip;
> > >
> > > /* Drop any IPsec traffic from protected ports */
> > > - for (i = 0; i < traffic->ipsec.num; i++)
> > > - rte_pktmbuf_free(traffic->ipsec.pkts[i]);
> > > + free_pkts(traffic->ipsec.pkts, traffic->ipsec.num);
> > >
> > > n = 0;
> > >
> > > @@ -901,7 +953,7 @@ route4_pkts(struct rt_ctx *rt_ctx, struct rte_mbuf
> > *pkts[], uint8_t nb_pkts)
> > > }
> > >
> > > if ((pkt_hop & RTE_LPM_LOOKUP_SUCCESS) == 0) {
> > > - rte_pktmbuf_free(pkts[i]);
> > > + free_pkt(pkts[i]);
> > > continue;
> > > }
> > > send_single_packet(pkts[i], pkt_hop & 0xff, IPPROTO_IP); @@ -
> > 953,7
> > > +1005,7 @@ route6_pkts(struct rt_ctx *rt_ctx, struct rte_mbuf *pkts[],
> > uint8_t nb_pkts)
> > > }
> > >
> > > if (pkt_hop == -1) {
> > > - rte_pktmbuf_free(pkts[i]);
> > > + free_pkt(pkts[i]);
> > > continue;
> > > }
> > > send_single_packet(pkts[i], pkt_hop & 0xff, IPPROTO_IPV6);
> > @@
> > > -1099,6 +1151,10 @@ ipsec_poll_mode_worker(void)
> > > const uint64_t drain_tsc = (rte_get_tsc_hz() + US_PER_S - 1)
> > > / US_PER_S * BURST_TX_DRAIN_US;
> > > struct lcore_rx_queue *rxql;
> > > +#if (STATS_INTERVAL > 0)
> > > + const uint64_t timer_period = STATS_INTERVAL * rte_get_timer_hz();
> > > + uint64_t timer_tsc = 0;
> > > +#endif /* STATS_INTERVAL */
> > >
> > > prev_tsc = 0;
> > > lcore_id = rte_lcore_id();
> > > @@ -1159,6 +1215,19 @@ ipsec_poll_mode_worker(void)
> > > drain_tx_buffers(qconf);
> > > drain_crypto_buffers(qconf);
> > > prev_tsc = cur_tsc;
> > > +#if (STATS_INTERVAL > 0)
> > > + if (lcore_id == rte_get_master_lcore()) {
> > > + /* advance the timer */
> > > + timer_tsc += diff_tsc;
> > > +
> > > + /* if timer has reached its timeout */
> > > + if (unlikely(timer_tsc >= timer_period)) {
> > > + print_stats();
> > > + /* reset the timer */
> > > + timer_tsc = 0;
> > > + }
> > > + }
> > > +#endif /* STATS_INTERVAL */
> > > }
> > >
> > > for (i = 0; i < qconf->nb_rx_queue; ++i) { @@ -1169,8 +1238,10
> > @@
> > > ipsec_poll_mode_worker(void)
> > > nb_rx = rte_eth_rx_burst(portid, queueid,
> > > pkts, MAX_PKT_BURST);
> > >
> > > - if (nb_rx > 0)
> > > + if (nb_rx > 0) {
> > > + core_stats_update_rx(nb_rx);
> > > process_pkts(qconf, pkts, nb_rx, portid);
> > > + }
> > >
> > > /* dequeue and process completed crypto-ops */
> > > if (is_unprotected_port(portid))
> > > diff --git a/examples/ipsec-secgw/ipsec-secgw.h
> > > b/examples/ipsec-secgw/ipsec-secgw.h
> > > index 4b53cb5..5b3561f 100644
> > > --- a/examples/ipsec-secgw/ipsec-secgw.h
> > > +++ b/examples/ipsec-secgw/ipsec-secgw.h
> > > @@ -6,6 +6,8 @@
> > >
> > > #include <stdbool.h>
> > >
> > > +#define STATS_INTERVAL 0
> > > +
> > > #define NB_SOCKETS 4
> > >
> > > #define MAX_PKT_BURST 32
> > > @@ -69,6 +71,17 @@ struct ethaddr_info {
> > > uint64_t src, dst;
> > > };
> > >
> > > +#if (STATS_INTERVAL > 0)
> > > +struct ipsec_core_statistics {
> > > + uint64_t tx;
> > > + uint64_t rx;
> > > + uint64_t dropped;
> > > + uint64_t burst_rx;
> > > +} __rte_cache_aligned;
> > > +
> > > +struct ipsec_core_statistics core_statistics[RTE_MAX_LCORE]; #endif
> > > +/* STATS_INTERVAL */
> > > +
> > > extern struct ethaddr_info ethaddr_tbl[RTE_MAX_ETHPORTS];
> > >
> > > /* Port mask to identify the unprotected ports */ @@ -85,4 +98,59 @@
> > > is_unprotected_port(uint16_t port_id)
> > > return unprotected_port_mask & (1 << port_id); }
> > >
> > > +static inline void
> > > +core_stats_update_rx(int n)
> > > +{
> > > +#if (STATS_INTERVAL > 0)
> > > + int lcore_id = rte_lcore_id();
> > > + core_statistics[lcore_id].rx += n;
> > > + if (n == MAX_PKT_BURST)
> > > + core_statistics[lcore_id].burst_rx += n; #else
> > > + RTE_SET_USED(n);
> > > +#endif /* STATS_INTERVAL */
> > > +}
> > > +
> > > +static inline void
> > > +core_stats_update_tx(int n)
> > > +{
> > > +#if (STATS_INTERVAL > 0)
> > > + int lcore_id = rte_lcore_id();
> > > + core_statistics[lcore_id].tx += n;
> > > +#else
> > > + RTE_SET_USED(n);
> > > +#endif /* STATS_INTERVAL */
> > > +}
> > > +
> > > +static inline void
> > > +core_stats_update_drop(int n)
> > > +{
> > > +#if (STATS_INTERVAL > 0)
> > > + int lcore_id = rte_lcore_id();
> > > + core_statistics[lcore_id].dropped += n; #else
> > > + RTE_SET_USED(n);
> > > +#endif /* STATS_INTERVAL */
> > > +}
> > > +
> > > +/* helper routine to free bulk of packets */ static inline void
> > > +free_pkts(struct rte_mbuf *mb[], uint32_t n) {
> > > + uint32_t i;
> > > +
> > > + for (i = 0; i != n; i++)
> > > + rte_pktmbuf_free(mb[i]);
> > > +
> > > + core_stats_update_drop(n);
> > > +}
> > > +
> > > +/* helper routine to free single packet */ static inline void
> > > +free_pkt(struct rte_mbuf *mb) {
> > > + rte_pktmbuf_free(mb);
> > > + core_stats_update_drop(1);
> > > +}
> > > +
> > > #endif /* _IPSEC_SECGW_H_ */
> > > diff --git a/examples/ipsec-secgw/ipsec.c
> > > b/examples/ipsec-secgw/ipsec.c index bf88d80..351f1f1 100644
> > > --- a/examples/ipsec-secgw/ipsec.c
> > > +++ b/examples/ipsec-secgw/ipsec.c
> > > @@ -500,7 +500,7 @@ enqueue_cop_burst(struct cdev_qp *cqp)
> > > cqp->id, cqp->qp, ret, len);
> > > /* drop packets that we fail to enqueue */
> > > for (i = ret; i < len; i++)
> > > - rte_pktmbuf_free(cqp->buf[i]->sym->m_src);
> > > + free_pkt(cqp->buf[i]->sym->m_src);
> > > }
> > > cqp->in_flight += ret;
> > > cqp->len = 0;
> > > @@ -528,7 +528,7 @@ ipsec_enqueue(ipsec_xform_fn xform_func, struct
> > > ipsec_ctx *ipsec_ctx,
> > >
> > > for (i = 0; i < nb_pkts; i++) {
> > > if (unlikely(sas[i] == NULL)) {
> > > - rte_pktmbuf_free(pkts[i]);
> > > + free_pkt(pkts[i]);
> > > continue;
> > > }
> > >
> > > @@ -549,7 +549,7 @@ ipsec_enqueue(ipsec_xform_fn xform_func, struct
> > > ipsec_ctx *ipsec_ctx,
> > >
> > > if ((unlikely(ips->security.ses == NULL)) &&
> > > create_lookaside_session(ipsec_ctx, sa, ips)) {
> > > - rte_pktmbuf_free(pkts[i]);
> > > + free_pkt(pkts[i]);
> > > continue;
> > > }
> > >
> > > @@ -563,7 +563,7 @@ ipsec_enqueue(ipsec_xform_fn xform_func, struct
> > ipsec_ctx *ipsec_ctx,
> > > case RTE_SECURITY_ACTION_TYPE_CPU_CRYPTO:
> > > RTE_LOG(ERR, IPSEC, "CPU crypto is not supported by
> > the"
> > > " legacy mode.");
> > > - rte_pktmbuf_free(pkts[i]);
> > > + free_pkt(pkts[i]);
> > > continue;
> > >
> > > case RTE_SECURITY_ACTION_TYPE_NONE:
> > > @@ -575,7 +575,7 @@ ipsec_enqueue(ipsec_xform_fn xform_func, struct
> > > ipsec_ctx *ipsec_ctx,
> > >
> > > if ((unlikely(ips->crypto.ses == NULL)) &&
> > > create_lookaside_session(ipsec_ctx, sa, ips)) {
> > > - rte_pktmbuf_free(pkts[i]);
> > > + free_pkt(pkts[i]);
> > > continue;
> > > }
> > >
> > > @@ -584,7 +584,7 @@ ipsec_enqueue(ipsec_xform_fn xform_func, struct
> > > ipsec_ctx *ipsec_ctx,
> > >
> > > ret = xform_func(pkts[i], sa, &priv->cop);
> > > if (unlikely(ret)) {
> > > - rte_pktmbuf_free(pkts[i]);
> > > + free_pkt(pkts[i]);
> > > continue;
> > > }
> > > break;
> > > @@ -608,7 +608,7 @@ ipsec_enqueue(ipsec_xform_fn xform_func, struct
> > > ipsec_ctx *ipsec_ctx,
> > >
> > > ret = xform_func(pkts[i], sa, &priv->cop);
> > > if (unlikely(ret)) {
> > > - rte_pktmbuf_free(pkts[i]);
> > > + free_pkt(pkts[i]);
> > > continue;
> > > }
> > >
> > > @@ -643,7 +643,7 @@ ipsec_inline_dequeue(ipsec_xform_fn xform_func,
> > struct ipsec_ctx *ipsec_ctx,
> > > sa = priv->sa;
> > > ret = xform_func(pkt, sa, &priv->cop);
> > > if (unlikely(ret)) {
> > > - rte_pktmbuf_free(pkt);
> > > + free_pkt(pkt);
> > > continue;
> > > }
> > > pkts[nb_pkts++] = pkt;
> > > @@ -690,13 +690,13 @@ ipsec_dequeue(ipsec_xform_fn xform_func, struct
> > ipsec_ctx *ipsec_ctx,
> > > RTE_SECURITY_ACTION_TYPE_NONE) {
> > > ret = xform_func(pkt, sa, cops[j]);
> > > if (unlikely(ret)) {
> > > - rte_pktmbuf_free(pkt);
> > > + free_pkt(pkt);
> > > continue;
> > > }
> > > } else if (ipsec_get_action_type(sa) ==
> > >
> > RTE_SECURITY_ACTION_TYPE_LOOKASIDE_PROTOCOL) {
> > > if (cops[j]->status) {
> > > - rte_pktmbuf_free(pkt);
> > > + free_pkt(pkt);
> > > continue;
> > > }
> > > }
> > > diff --git a/examples/ipsec-secgw/ipsec_process.c
> > > b/examples/ipsec-secgw/ipsec_process.c
> > > index bb2f2b8..4748299 100644
> > > --- a/examples/ipsec-secgw/ipsec_process.c
> > > +++ b/examples/ipsec-secgw/ipsec_process.c
> > > @@ -12,22 +12,13 @@
> > > #include <rte_mbuf.h>
> > >
> > > #include "ipsec.h"
> > > +#include "ipsec-secgw.h"
> > >
> > > #define SATP_OUT_IPV4(t) \
> > > ((((t) & RTE_IPSEC_SATP_MODE_MASK) ==
> > RTE_IPSEC_SATP_MODE_TRANS && \
> > > (((t) & RTE_IPSEC_SATP_IPV_MASK) == RTE_IPSEC_SATP_IPV4)) || \
> > > ((t) & RTE_IPSEC_SATP_MODE_MASK) ==
> > RTE_IPSEC_SATP_MODE_TUNLV4)
> > >
> > > -/* helper routine to free bulk of packets */ -static inline void
> > > -free_pkts(struct rte_mbuf *mb[], uint32_t n) -{
> > > - uint32_t i;
> > > -
> > > - for (i = 0; i != n; i++)
> > > - rte_pktmbuf_free(mb[i]);
> > > -}
> > > -
> > > /* helper routine to free bulk of crypto-ops and related packets */
> > > static inline void free_cops(struct rte_crypto_op *cop[], uint32_t n)
> > > --
> > > 2.7.4
next prev parent reply other threads:[~2020-05-13 12:13 UTC|newest]
Thread overview: 19+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-04-21 4:50 [dpdk-dev] [PATCH] " Anoob Joseph
2020-04-23 13:07 ` [dpdk-dev] [PATCH v2] " Anoob Joseph
2020-04-24 11:14 ` Ananyev, Konstantin
2020-05-02 18:43 ` Anoob Joseph
2020-05-05 10:45 ` Ananyev, Konstantin
2020-05-06 12:47 ` [dpdk-dev] [PATCH v3] " Anoob Joseph
2020-05-07 16:12 ` Ananyev, Konstantin
2020-05-12 12:14 ` Anoob Joseph
2020-05-13 12:42 ` Ananyev, Konstantin
2020-05-14 4:11 ` Anoob Joseph
2020-05-08 8:08 ` Ananyev, Konstantin
2020-05-12 12:16 ` Anoob Joseph
2020-05-13 12:12 ` Ananyev, Konstantin [this message]
2020-05-13 17:45 ` [dpdk-dev] [PATCH v4] " Anoob Joseph
2020-05-14 13:47 ` Ananyev, Konstantin
2020-05-17 14:39 ` Akhil Goyal
2020-05-18 3:42 ` Anoob Joseph
2020-05-18 7:06 ` Akhil Goyal
2020-07-01 19:21 ` Akhil Goyal
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=BYAPR11MB3301E60DA79FA2873F1CBBD99ABF0@BYAPR11MB3301.namprd11.prod.outlook.com \
--to=konstantin.ananyev@intel.com \
--cc=akhil.goyal@nxp.com \
--cc=anoobj@marvell.com \
--cc=dev@dpdk.org \
--cc=pathreya@marvell.com \
--cc=radu.nicolau@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).