iommu.lists.linux-foundation.org archive mirror
 help / color / mirror / Atom feed
From: Alex Williamson <alex.williamson-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
To: Jean-Philippe Brucker
	<jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>
Cc: Shanker Donthineni
	<shankerd-Rm6X0d1/PG5y9aJCnZT0Uw@public.gmane.org>,
	kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org,
	Catalin Marinas <catalin.marinas-5wv7dgnIgG8@public.gmane.org>,
	Sinan Kaya <okaya-Rm6X0d1/PG5y9aJCnZT0Uw@public.gmane.org>,
	Will Deacon <will.deacon-5wv7dgnIgG8@public.gmane.org>,
	Harv Abdulhamid <harba-Rm6X0d1/PG5y9aJCnZT0Uw@public.gmane.org>,
	iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org,
	linux-pci-u79uwXL29TY76Z2rM5mHXA@public.gmane.org,
	Bjorn Helgaas <bhelgaas-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org>,
	David Woodhouse <dwmw2-wEGCiKHe2LqWVfeAwA7xHQ@public.gmane.org>,
	linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org,
	Nate Watterson <nwatters-Rm6X0d1/PG5y9aJCnZT0Uw@public.gmane.org>
Subject: Re: [RFC PATCH 30/30] vfio: Allow to bind foreign task
Date: Mon, 27 Feb 2017 20:54:11 -0700	[thread overview]
Message-ID: <20170227205411.1abca59a@t450s.home> (raw)
In-Reply-To: <20170227195441.5170-31-jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>

On Mon, 27 Feb 2017 19:54:41 +0000
Jean-Philippe Brucker <jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org> wrote:

> Let the process that owns the device create an address space bond on
> behalf of another process. We add a pid argument to the BIND_TASK ioctl,
> allowing the caller to bind a foreign task. The expected program flow in
> this case is:
> 
> * Process A creates the VFIO context and initializes the device.
> * Process B asks A to bind its address space.
> * Process A issues an ioctl to the VFIO device fd with BIND_TASK(pid).
>   It may communicate the given PASID back to process B or keep track of it
>   internally.
> * Process B asks A to perform transactions on its virtual address.
> * Process A launches transaction tagged with the given PASID.
> 
> Signed-off-by: Jean-Philippe Brucker <jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>
> ---
>  drivers/vfio/vfio.c       | 35 +++++++++++++++++++++++++++++++++--
>  include/uapi/linux/vfio.h | 15 +++++++++++++++
>  2 files changed, 48 insertions(+), 2 deletions(-)
> 
> diff --git a/drivers/vfio/vfio.c b/drivers/vfio/vfio.c
> index c4505d8f4c61..ecc5d07e3dbb 100644
> --- a/drivers/vfio/vfio.c
> +++ b/drivers/vfio/vfio.c
> @@ -26,6 +26,7 @@
>  #include <linux/module.h>
>  #include <linux/mutex.h>
>  #include <linux/pci.h>
> +#include <linux/ptrace.h>
>  #include <linux/rwsem.h>
>  #include <linux/sched.h>
>  #include <linux/slab.h>
> @@ -1660,7 +1661,7 @@ static long vfio_svm_ioctl(struct vfio_device *device, unsigned int cmd,
>  	struct vfio_device_svm svm;
>  	struct vfio_task *vfio_task;
>  
> -	minsz = offsetofend(struct vfio_device_svm, pasid);
> +	minsz = offsetofend(struct vfio_device_svm, pid);


This is only the minsz if flags includes VFIO_SVM_PID, right?
Otherwise this isn't a backward compatible change (granted you're
proposing both in the same series), userspace built against 29/30
won't work against 30/30.

>  
>  	if (copy_from_user(&svm, (void __user *)arg, minsz))
>  		return -EFAULT;
> @@ -1669,9 +1670,39 @@ static long vfio_svm_ioctl(struct vfio_device *device, unsigned int cmd,
>  		return -EINVAL;
>  
>  	if (cmd == VFIO_DEVICE_BIND_TASK) {
> -		struct task_struct *task = current;
> +		struct mm_struct *mm;
> +		struct task_struct *task;
> +
> +		if (svm.flags & ~VFIO_SVM_PID)
> +			return -EINVAL;

29/30 never validated flags, so theoretically userspace compiled
against 29/30 could have put anything in flags and it would have
worked, no longer the case here.

> +
> +		if (svm.flags & VFIO_SVM_PID) {
> +			rcu_read_lock();
> +			task = find_task_by_vpid(svm.pid);
> +			if (task)
> +				get_task_struct(task);
> +			rcu_read_unlock();
> +			if (!task)
> +				return -ESRCH;
> +
> +			/*
> +			 * Ensure process has RW access on the task's mm
> +			 * FIXME:
> +			 * - I think this ought to be in the IOMMU API
> +			 * - I'm assuming permission is never revoked during the
> +			 *   task's lifetime. Might be mistaken.
> +			 */
> +			mm = mm_access(task, PTRACE_MODE_ATTACH_REALCREDS);
> +			if (!mm || IS_ERR(mm))
> +				return IS_ERR(mm) ? PTR_ERR(mm) : -ESRCH;
> +			mmput(mm);
> +		} else {
> +			get_task_struct(current);
> +			task = current;
> +		}
>  
>  		ret = iommu_bind_task(device->dev, task, &svm.pasid, 0, NULL);
> +		put_task_struct(task);
>  		if (ret)
>  			return ret;
>  
> diff --git a/include/uapi/linux/vfio.h b/include/uapi/linux/vfio.h
> index 3fe4197a5ea0..41ae8a231d42 100644
> --- a/include/uapi/linux/vfio.h
> +++ b/include/uapi/linux/vfio.h
> @@ -415,7 +415,9 @@ struct vfio_device_svm {
>  	__u32	flags;
>  #define VFIO_SVM_PASID_RELEASE_FLUSHED	(1 << 0)
>  #define VFIO_SVM_PASID_RELEASE_CLEAN	(1 << 1)
> +#define VFIO_SVM_PID			(1 << 2)
>  	__u32	pasid;
> +	__u32	pid;
>  };
>  /*
>   * VFIO_DEVICE_BIND_TASK - _IOWR(VFIO_TYPE, VFIO_BASE + 22,
> @@ -432,6 +434,19 @@ struct vfio_device_svm {
>   * On success, VFIO writes a Process Address Space ID (PASID) into @pasid. This
>   * ID is unique to a device.
>   *
> + * VFIO_SVM_PID: bind task @pid instead of current task. The shared address
> + *        space identified by @pasid is that of task identified by @pid.
> + *
> + *        Given that the caller owns the device, setting this flag grants the
> + *        caller read and write permissions on the entire address space of
> + *        foreign task described by @pid. Therefore, permission to perform the
> + *        bind operation on a foreign process is governed by the ptrace access
> + *        mode PTRACE_MODE_ATTACH_REALCREDS check. See man ptrace(2) for more
> + *        information.
> + *
> + *        If the VFIO_SVM_PID flag is not set, @pid is unused and it is the
> + *        current task that is bound to the device.
> + *
>   * The bond between device and process must be removed with
>   * VFIO_DEVICE_UNBIND_TASK before exiting.
>   *

BTW, nice commit logs throughout this series, I probably need to read
through them a few more times to really digest it all.  AIUI, the VFIO
support here is really only useful for basic userspace drivers, I don't
see how we could take advantage of it for a VM use case where the guest
manages the PASID space for a domain.  Perhaps it hasn't spent enough
cycles bouncing around in my head yet.  Thanks,

Alex

  parent reply	other threads:[~2017-02-28  3:54 UTC|newest]

Thread overview: 103+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-02-27 19:54 [RFC PATCH 00/30] Add PCIe SVM support to ARM SMMUv3 Jean-Philippe Brucker
     [not found] ` <20170227195441.5170-1-jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>
2017-02-27 19:54   ` [RFC PATCH 01/30] iommu/arm-smmu-v3: Link groups and devices Jean-Philippe Brucker
     [not found]     ` <20170227195441.5170-2-jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>
2017-03-27 12:18       ` Robin Murphy
     [not found]         ` <9ce9e3c5-3f94-8b06-2bd7-a665f0f33304-5wv7dgnIgG8@public.gmane.org>
2017-04-10 11:02           ` Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 02/30] iommu/arm-smmu-v3: Link groups and domains Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 03/30] PCI: Move ATS declarations outside of CONFIG_PCI Jean-Philippe Brucker
     [not found]     ` <20170227195441.5170-4-jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>
2017-03-03 21:09       ` Bjorn Helgaas
     [not found]         ` <20170303210926.GB31767-1RhO1Y9PlrlHTL0Zs8A6p5iNqAH0jzoTYJqu5kTmcBRl57MIdRCFDg@public.gmane.org>
2017-03-06 11:29           ` Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 04/30] iommu/arm-smmu-v3: Add support for PCI ATS Jean-Philippe Brucker
2017-03-08 15:26     ` Sinan Kaya
     [not found]       ` <c0f74140-f1f6-7c52-295a-5d4722017664-sgV2jX0FEOL9JmXXK+q4OQ@public.gmane.org>
2017-03-21 19:38         ` Jean-Philippe Brucker
2017-04-03  8:34     ` Sunil Kovvuri
2017-04-03 10:14       ` Jean-Philippe Brucker
2017-04-03 11:42         ` Sunil Kovvuri
2017-04-03 11:56           ` Jean-Philippe Brucker
     [not found]     ` <20170227195441.5170-5-jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>
2017-03-01 19:24       ` Sinan Kaya
     [not found]         ` <5a7822f2-3991-aa51-169f-78ef49567feb-sgV2jX0FEOL9JmXXK+q4OQ@public.gmane.org>
2017-03-02 10:51           ` Jean-Philippe Brucker
     [not found]             ` <20170302105153.GB15742-lfHAr0XZR/FyySVAYrpuPyZi+YwRKgec@public.gmane.org>
2017-03-02 13:11               ` okaya-sgV2jX0FEOL9JmXXK+q4OQ
2017-05-10 12:54       ` Tomasz Nowicki
2017-05-10 13:35         ` Jean-Philippe Brucker
2017-05-23  8:41     ` Leizhen (ThunderTown)
2017-05-23 11:21       ` Jean-Philippe Brucker
2017-05-25 18:27         ` Roy Franz (Cavium)
2017-02-27 19:54   ` [RFC PATCH 05/30] iommu/arm-smmu-v3: Disable tagged pointers when ATS is in use Jean-Philippe Brucker
2017-05-22  6:27     ` Leizhen (ThunderTown)
2017-05-22 14:02       ` Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 06/30] iommu/arm-smmu-v3: Add support for Substream IDs Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 07/30] iommu/arm-smmu-v3: Add second level of context descriptor table Jean-Philippe Brucker
     [not found]     ` <20170227195441.5170-8-jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>
2017-05-15 12:47       ` Tomasz Nowicki
2017-05-15 13:57         ` Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 08/30] iommu/arm-smmu-v3: Add support for VHE Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 09/30] iommu/arm-smmu-v3: Support broadcast TLB maintenance Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 10/30] iommu/arm-smmu-v3: Add task contexts Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 11/30] arm64: mm: Pin down ASIDs for sharing contexts with devices Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 12/30] iommu/arm-smmu-v3: Keep track of process address spaces Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 13/30] iommu/io-pgtable-arm: Factor out ARM LPAE register defines Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 14/30] iommu/arm-smmu-v3: Share process page tables Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 15/30] iommu/arm-smmu-v3: Steal private ASID from a domain Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 16/30] iommu/arm-smmu-v3: Use shared ASID set Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 17/30] iommu/arm-smmu-v3: Add SVM feature checking Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 18/30] PCI: Make "PRG Response PASID Required" handling common Jean-Philippe Brucker
     [not found]     ` <20170227195441.5170-19-jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>
2017-03-03 21:11       ` Bjorn Helgaas
     [not found]         ` <20170303211140.GC31767-1RhO1Y9PlrlHTL0Zs8A6p5iNqAH0jzoTYJqu5kTmcBRl57MIdRCFDg@public.gmane.org>
2017-03-06 11:31           ` Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 19/30] PCI: Cache PRI and PASID bits in pci_dev Jean-Philippe Brucker
     [not found]     ` <20170227195441.5170-20-jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>
2017-03-03 21:12       ` Bjorn Helgaas
2017-02-27 19:54   ` [RFC PATCH 20/30] iommu/arm-smmu-v3: Enable PCI PASID in masters Jean-Philippe Brucker
     [not found]     ` <20170227195441.5170-21-jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>
2017-05-31 14:10       ` [RFC,20/30] " Sinan Kaya
     [not found]         ` <f18163da-30a6-a7d4-0a2c-bca4fc1b0fff-sgV2jX0FEOL9JmXXK+q4OQ@public.gmane.org>
2017-06-01 12:30           ` Jean-Philippe Brucker
     [not found]             ` <a5428875-6ff9-820a-498d-ae2602e8cc53-5wv7dgnIgG8@public.gmane.org>
2017-06-01 12:30               ` David Woodhouse
2017-06-23 14:39         ` Sinan Kaya
2017-06-23 15:15           ` Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 21/30] iommu/arm-smmu-v3: Handle device faults from PRI Jean-Philippe Brucker
     [not found]     ` <8520D5D51A55D047800579B0941471982640F43C@XAP-PVEXMBX02.xlnx.xilinx.com>
2017-03-25  5:16       ` valmiki
     [not found]         ` <0b3e3ddd-acc3-5ba7-639f-5c9192da57c3-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
2017-03-27 11:05           ` Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 22/30] iommu: Bind/unbind tasks to/from devices Jean-Philippe Brucker
     [not found]     ` <20170227195441.5170-23-jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>
2017-03-02  7:29       ` Tian, Kevin
2017-03-22 15:38       ` Joerg Roedel
2017-03-03  9:40     ` David Woodhouse
     [not found]       ` <1488534044.6234.14.camel-wEGCiKHe2LqWVfeAwA7xHQ@public.gmane.org>
2017-03-03 17:05         ` Raj, Ashok
2017-03-03 18:39         ` Jean-Philippe Brucker
2017-03-22 15:36           ` Joerg Roedel
2017-03-22 18:30             ` Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 23/30] iommu/arm-smmu-v3: Bind/unbind device and task Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 24/30] iommu: Specify PASID state when unbinding a task Jean-Philippe Brucker
     [not found]     ` <20170227195441.5170-25-jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>
2017-03-22 15:44       ` Joerg Roedel
2017-03-22 18:31         ` Jean-Philippe Brucker
2017-03-22 22:53           ` Joerg Roedel
2017-03-23 13:37             ` Jean-Philippe Brucker
2017-03-23 14:30               ` Joerg Roedel
2017-03-23 15:52                 ` Jean-Philippe Brucker
2017-03-23 16:52                   ` Joerg Roedel
     [not found]                     ` <20170323165218.GL7266-zLv9SwRftAIdnm+yROfE0A@public.gmane.org>
2017-03-23 17:03                       ` Jean-Philippe Brucker
     [not found]                         ` <9d318e88-11af-6dab-b30e-d6b5c02443fe-5wv7dgnIgG8@public.gmane.org>
2017-03-24 11:00                           ` Joerg Roedel
2017-03-24 19:08                             ` Jean-Philippe Brucker
     [not found]                               ` <7386120a-2848-059f-4de0-7888a2698923-5wv7dgnIgG8@public.gmane.org>
2017-03-27 15:33                                 ` Joerg Roedel
2017-02-27 19:54   ` [RFC PATCH 25/30] iommu/arm-smmu-v3: Safe invalidation and recycling of PASIDs Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 26/30] iommu/arm-smmu-v3: Fix PRI queue overflow acknowledgement Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 27/30] iommu/arm-smmu-v3: Handle PRI queue overflow Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 28/30] iommu/arm-smmu-v3: Add support for Hardware Translation Table Update at stage 1 Jean-Philippe Brucker
2017-02-27 19:54   ` [RFC PATCH 29/30] vfio: Add support for Shared Virtual Memory Jean-Philippe Brucker
     [not found]     ` <20170227195441.5170-30-jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>
2017-02-28  3:54       ` Alex Williamson
     [not found]         ` <20170227205409.14f0e2c7-1yVPhWWZRC1BDLzU/O5InQ@public.gmane.org>
2017-02-28 15:17           ` Jean-Philippe Brucker
2017-04-26  6:53       ` Tomasz Nowicki
     [not found]         ` <f5745241-83b0-0945-7616-4b59d7ebcd48-nYOzD4b6Jr9Wk0Htik3J/w@public.gmane.org>
2017-04-26 10:08           ` Jean-Philippe Brucker
2017-04-26 11:01             ` Tomasz Nowicki
2017-03-21  7:04     ` Liu, Yi L
     [not found]       ` <A2975661238FB949B60364EF0F2C2574390206F0-E2R4CRU6q/6iAffOGbnezLfspsVTdybXVpNB7YpNyf8@public.gmane.org>
2017-03-21 19:37         ` Jean-Philippe Brucker
2017-03-21 20:56           ` jacob pan
2017-03-23  8:39           ` Liu, Yi L
2017-03-23 13:38             ` Jean-Philippe Brucker
2017-03-24  7:46               ` Liu, Yi L
     [not found]                 ` <A2975661238FB949B60364EF0F2C257439030135-E2R4CRU6q/6iAffOGbnezLfspsVTdybXVpNB7YpNyf8@public.gmane.org>
2017-03-27 10:13                   ` Jean-Philippe Brucker
     [not found]                     ` <1a63cf88-840c-0b82-3951-a83364fa72fc-5wv7dgnIgG8@public.gmane.org>
2017-03-29  6:17                       ` Liu, Yi L
2017-02-27 19:54   ` [RFC PATCH 30/30] vfio: Allow to bind foreign task Jean-Philippe Brucker
     [not found]     ` <20170227195441.5170-31-jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>
2017-02-28  3:54       ` Alex Williamson [this message]
     [not found]         ` <20170227205411.1abca59a-1yVPhWWZRC1BDLzU/O5InQ@public.gmane.org>
2017-02-28  6:43           ` Tian, Kevin
     [not found]             ` <AADFC41AFE54684AB9EE6CBC0274A5D190C4CB9C-0J0gbvR4kThpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
2017-02-28 15:22               ` Jean-Philippe Brucker
     [not found]                 ` <20170228152230.GB15153-lfHAr0XZR/FyySVAYrpuPyZi+YwRKgec@public.gmane.org>
2017-03-01  8:02                   ` Tian, Kevin
     [not found]                     ` <AADFC41AFE54684AB9EE6CBC0274A5D190C5018D-0J0gbvR4kThpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
2017-03-02 10:50                       ` Jean-Philippe Brucker
2017-04-26  7:25     ` Tomasz Nowicki
     [not found]       ` <b937914a-d215-8223-0846-65271a568170-nYOzD4b6Jr9Wk0Htik3J/w@public.gmane.org>
2017-04-26 10:08         ` Jean-Philippe Brucker
2017-03-06  8:20   ` [RFC PATCH 00/30] Add PCIe SVM support to ARM SMMUv3 Liu, Yi L
     [not found]     ` <A2975661238FB949B60364EF0F2C2574390186B8-E2R4CRU6q/6iAffOGbnezLfspsVTdybXVpNB7YpNyf8@public.gmane.org>
2017-03-06 11:14       ` Jean-Philippe Brucker

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20170227205411.1abca59a@t450s.home \
    --to=alex.williamson-h+wxahxf7alqt0dzr+alfa@public.gmane.org \
    --cc=bhelgaas-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org \
    --cc=catalin.marinas-5wv7dgnIgG8@public.gmane.org \
    --cc=dwmw2-wEGCiKHe2LqWVfeAwA7xHQ@public.gmane.org \
    --cc=harba-Rm6X0d1/PG5y9aJCnZT0Uw@public.gmane.org \
    --cc=iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org \
    --cc=jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org \
    --cc=kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \
    --cc=linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org \
    --cc=linux-pci-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \
    --cc=nwatters-Rm6X0d1/PG5y9aJCnZT0Uw@public.gmane.org \
    --cc=okaya-Rm6X0d1/PG5y9aJCnZT0Uw@public.gmane.org \
    --cc=shankerd-Rm6X0d1/PG5y9aJCnZT0Uw@public.gmane.org \
    --cc=will.deacon-5wv7dgnIgG8@public.gmane.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).