public inbox for rust-for-linux@vger.kernel.org
 help / color / mirror / Atom feed
From: Zhi Wang <zhiw@nvidia.com>
To: Danilo Krummrich <dakr@kernel.org>
Cc: <rust-for-linux@vger.kernel.org>, <linux-pci@vger.kernel.org>,
	<linux-kernel@vger.kernel.org>, <jgg@nvidia.com>,
	<gary@garyguo.net>, <joelagnelf@nvidia.com>,
	<aliceryhl@google.com>, <bhelgaas@google.com>,
	<kwilczynski@kernel.org>, <ojeda@kernel.org>,
	<alex.gaynor@gmail.com>, <boqun.feng@gmail.com>,
	<bjorn3_gh@protonmail.com>, <lossin@kernel.org>,
	<a.hindborg@kernel.org>, <tmgross@umich.edu>,
	<markus.probst@posteo.de>, <helgaas@kernel.org>,
	<cjia@nvidia.com>, <smitra@nvidia.com>, <ankita@nvidia.com>,
	<aniketa@nvidia.com>, <kwankhede@nvidia.com>,
	<targupta@nvidia.com>, <acourbot@nvidia.com>,
	<jhubbard@nvidia.com>, <zhiwang@kernel.org>,
	<daniel.almeida@collabora.com>
Subject: Re: [PATCH v3 1/1] rust: introduce abstractions for fwctl
Date: Thu, 5 Mar 2026 23:14:32 +0200	[thread overview]
Message-ID: <20260305231432.5a054b6d@inno-dell> (raw)
In-Reply-To: <DGUZ4A6W87JU.36R2KDR7YGSEX@kernel.org>

On Thu, 05 Mar 2026 17:02:38 +0100
"Danilo Krummrich" <dakr@kernel.org> wrote:

> On Tue Feb 17, 2026 at 9:49 PM CET, Zhi Wang wrote:
> > diff --git a/drivers/fwctl/Kconfig b/drivers/fwctl/Kconfig
> > index b5583b12a011..ce42c0f52d6d 100644
> > --- a/drivers/fwctl/Kconfig
> > +++ b/drivers/fwctl/Kconfig
> > @@ -9,6 +9,18 @@ menuconfig FWCTL
> >  	  fit neatly into an existing subsystem.
> >  
> >  if FWCTL
> > +
> > +config RUST_FWCTL_ABSTRACTIONS
> > +	bool "Rust fwctl abstractions"
> > +	depends on RUST
> > +	help
> > +	  This enables the Rust abstractions for the fwctl device
> > firmware
> > +	  access framework. It provides safe wrappers around
> > struct fwctl_device
> > +	  and struct fwctl_uctx, allowing Rust drivers to register
> > fwctl devices
> > +	  and implement their control and RPC logic in safe Rust.
> > +
> > +	  If unsure, say N.  
> 
> We currently have to ensure that CONFIG_FWCTL=y.
> 

Hi:

Thanks so much for the review efforts.

I just post the nova-core fwctl driver series. You are right. I
encounter a problem when CONFIG_FWCTL=y. Should I move that one within
this series? [1]

[1] https://lore.kernel.org/all/20260305190936.398590-2-zhiw@nvidia.com/

> I also gave this a quick shot and I see the following warnings:
> 
> 	warning: `as` casting between raw pointers without changing

Will double check with the CLIPPY and rustdoc fmt.

> > +/// Trait implemented by each Rust driver that integrates with the
> > fwctl subsystem. +///
> > +/// The implementing type **is** the per-FD user context: one
> > instance is +/// created for each `open()` call and dropped when
> > the FD is closed. +///
> > +/// Each implementation corresponds to a specific device type and
> > provides the +/// vtable used by the core `fwctl` layer to manage
> > per-FD user contexts and +/// handle RPC requests.
> > +pub trait Operations: Sized {  
> 
> I think this needs Send.
> 

Nice catch, I think we also need Sync.

> Besides that, are all those callbacks strictly serialized, i.e. can
> we really give out a mutable reference?
> 

I think open()/close() are serialized by the VFS. But info() and
fw_rpc() are not so I don't give a mutable reference for them. If the
driver wanna modify the members, it should use Mutex<>.

> > +    /// Driver data embedded alongside the `fwctl_device`
> > allocation.
> > +    type DeviceData;
> > +
> > +    /// fwctl device type identifier.
> > +    const DEVICE_TYPE: DeviceType;
> > +
> > +    /// Called when a new user context is opened.
> > +    ///
> > +    /// Returns a [`PinInit`] initializer for `Self`. The instance
> > is dropped
> > +    /// automatically when the FD is closed (after
> > [`close`](Self::close)).
> > +    fn open(device: &Device<Self>) -> Result<impl PinInit<Self,
> > Error>, Error>;  
> 

Will fix all the followings in the next re-spin.

> This should just return impl PinInit<Self, Error>, the outer result is
> redundant.
> 
> > +    /// Called when the user context is closed.
> > +    ///
> > +    /// The driver may perform additional cleanup here that
> > requires access
> > +    /// to the owning [`Device`]. `Self` is dropped automatically
> > after this
> > +    /// returns.
> > +    fn close(_this: Pin<&mut Self>, _device: &Device<Self>) {}  
> 
> This can just be self: Pin<&mut Self>.
> 
> > +
> > +    /// Return device information to userspace.
> > +    ///
> > +    /// The default implementation returns no device-specific data.
> > +    fn info(_this: &Self, _device: &Device<Self>) ->
> > Result<KVec<u8>, Error> {  
> 
> self: Pin<&Self>, Result<KVec<u8>>
> 
> > +        Ok(KVec::new())
> > +    }
> > +
> > +    /// Handle a userspace RPC request.
> > +    fn fw_rpc(
> > +        this: &Self,  
> 
> Same here.
> 
> > +        device: &Device<Self>,
> > +        scope: RpcScope,
> > +        rpc_in: &mut [u8],
> > +    ) -> Result<FwRpcResponse, Error>;
> > +}
> > +
> > +/// A fwctl device with embedded driver data.
> > +///
> > +/// `#[repr(C)]` with the `fwctl_device` at offset 0, matching the
> > C +/// `fwctl_alloc_device()` layout convention.
> > +///
> > +/// # Invariants
> > +///
> > +/// The `fwctl_device` portion is initialised by the C subsystem
> > during +/// [`Device::new()`]. The `data` field is initialised
> > in-place via +/// [`PinInit`] before the struct is exposed.  
> 
> Where is this invariant used, do we actually need it?
> 
> > +#[repr(C)]
> > +pub struct Device<T: Operations> {
> > +    dev: Opaque<bindings::fwctl_device>,
> > +    data: T::DeviceData,
> > +}
> > +
> > +impl<T: Operations> Device<T> {
> > +    /// Allocate a new fwctl device with embedded driver data.
> > +    ///
> > +    /// Returns an [`ARef`] that can be passed to
> > [`Registration::new()`]
> > +    /// to make the device visible to userspace. The caller may
> > inspect or
> > +    /// configure the device between allocation and registration.
> > +    pub fn new(
> > +        parent: &device::Device<device::Bound>,
> > +        data: impl PinInit<T::DeviceData, Error>,
> > +    ) -> Result<ARef<Self>> {
> > +        let ops =
> > core::ptr::from_ref::<bindings::fwctl_ops>(&VTable::<T>::VTABLE).cast_mut();
> >  
> 
> The turbofish shouldn't be needed.
> 
> > +
> > +        // SAFETY: `_fwctl_alloc_device` allocates `size` bytes
> > via kzalloc and
> > +        // initialises the embedded fwctl_device. `ops` points to
> > a static vtable
> > +        // that outlives the device. `parent` is bound.
> > +        let raw = unsafe {
> > +            bindings::_fwctl_alloc_device(parent.as_raw(), ops,
> > core::mem::size_of::<Self>())
> > +        };  
> 
> I suggest to use Kmalloc::aligned_layout() in such a case, please
> also see [1].
> 
> [1] https://lore.kernel.org/r/20250731154919.4132-3-dakr@kernel.org
> 
> > +        if raw.is_null() {
> > +            return Err(ENOMEM);
> > +        }  
> 
> If you replace this with NonNull::new().ok_or(ENOMEM)? you already
> have the NonNull instance for the subsequent call to ARef::from_raw()
> below.
> 
> > +        // CAST: Device<T> is repr(C) with fwctl_device at offset
> > 0.
> > +        let this = raw as *mut Self;
> > +
> > +        // SAFETY: `data` field is within the kzalloc'd
> > allocation, uninitialised.
> > +        let data_ptr = unsafe {
> > core::ptr::addr_of_mut!((*this).data) };  
> 
> Prefer &raw mut.
> 
> > +        unsafe { data.__pinned_init(data_ptr) }.inspect_err(|_| {
> > +            // SAFETY: Init failed; release the allocation.
> > +            unsafe { bindings::fwctl_put(raw) };
> > +        })?;
> > +
> > +        // SAFETY: `_fwctl_alloc_device` returned a valid pointer
> > with refcount 1
> > +        // and DeviceData is fully initialised.
> > +        Ok(unsafe { ARef::from_raw(NonNull::new_unchecked(raw as
> > *mut Self)) })
> > +    }
> > +
> > +    /// Returns a reference to the embedded driver data.
> > +    pub fn data(&self) -> &T::DeviceData {
> > +        &self.data
> > +    }
> > +
> > +    fn as_raw(&self) -> *mut bindings::fwctl_device {
> > +        self.dev.get()
> > +    }
> > +
> > +    /// # Safety
> > +    ///
> > +    /// `ptr` must point to a valid `fwctl_device` embedded in a
> > `Device<T>`.
> > +    unsafe fn from_raw<'a>(ptr: *mut bindings::fwctl_device) ->
> > &'a Self {
> > +        unsafe { &*ptr.cast() }
> > +    }
> > +
> > +    /// Returns the parent device.
> > +    ///
> > +    /// The parent is guaranteed to be bound while any fwctl
> > callback is
> > +    /// running (ensured by the `registration_lock` read lock on
> > the ioctl
> > +    /// path and by `Devres` on the teardown path).
> > +    pub fn parent(&self) -> &device::Device<device::Bound> {
> > +        // SAFETY: fwctl_device always has a valid parent.
> > +        let parent_dev = unsafe { (*self.as_raw()).dev.parent };
> > +        let dev: &device::Device = unsafe {
> > device::Device::from_raw(parent_dev) };
> > +        // SAFETY: The parent is guaranteed to be bound while
> > fwctl ops are active.
> > +        unsafe { dev.as_bound() }
> > +    }
> > +}
> > +
> > +impl<T: Operations> AsRef<device::Device> for Device<T> {
> > +    fn as_ref(&self) -> &device::Device {
> > +        // SAFETY: self.as_raw() is a valid fwctl_device.
> > +        let dev = unsafe {
> > core::ptr::addr_of_mut!((*self.as_raw()).dev) };  
> 
> NIT: &raw mut
> 
> > +        // SAFETY: dev points to a valid struct device.
> > +        unsafe { device::Device::from_raw(dev) }
> > +    }
> > +}
> > +
> > +// SAFETY: `fwctl_get` increments the refcount of a valid
> > fwctl_device. +// `fwctl_put` decrements it and frees the device
> > when it reaches zero. +unsafe impl<T: Operations> AlwaysRefCounted
> > for Device<T> {
> > +    fn inc_ref(&self) {
> > +        // SAFETY: The existence of a shared reference guarantees
> > that the refcount is non-zero.
> > +        unsafe { bindings::fwctl_get(self.as_raw()) };
> > +    }
> > +
> > +    unsafe fn dec_ref(obj: NonNull<Self>) {
> > +        // SAFETY: The safety requirements guarantee that the
> > refcount is non-zero.
> > +        unsafe { bindings::fwctl_put(obj.cast().as_ptr()) };
> > +    }
> > +}
> > +
> > +/// A registered fwctl device.
> > +///
> > +/// Must live inside a [`Devres`] to guarantee that
> > [`fwctl_unregister`] runs +/// before the parent driver unbinds.
> > `Devres` prevents the `Registration` +/// from being moved to a
> > context that could outlive the parent device. +///
> > +/// On drop the device is unregistered (all user contexts are
> > closed and +/// `ops` is set to `NULL`) and the [`ARef`] is
> > released. +///
> > +/// [`fwctl_unregister`]: srctree/drivers/fwctl/main.c
> > +pub struct Registration<T: Operations> {
> > +    dev: ARef<Device<T>>,
> > +}
> > +
> > +impl<T: Operations> Registration<T> {
> > +    /// Register a previously allocated fwctl device.
> > +    pub fn new<'a>(
> > +        parent: &'a device::Device<device::Bound>,
> > +        dev: &'a Device<T>,
> > +    ) -> impl PinInit<Devres<Self>, Error> + 'a {  
> 
> This doesn't need PinInit anymore.
> 
> > +        pin_init::pin_init_scope(move || {
> > +            // SAFETY: `dev` is a valid fwctl_device backed by an
> > ARef.
> > +            let ret = unsafe {
> > bindings::fwctl_register(dev.as_raw()) };
> > +            if ret != 0 {
> > +                return Err(Error::from_errno(ret));
> > +            }
> > +
> > +            Ok(Devres::new(parent, Self { dev: dev.into() }))
> > +        })
> > +    }
> > +}
> > +
> > +impl<T: Operations> Drop for Registration<T> {
> > +    fn drop(&mut self) {
> > +        // SAFETY: `Registration` lives inside a `Devres`, which
> > guarantees
> > +        // that drop runs while the parent device is still bound.
> > +        unsafe { bindings::fwctl_unregister(self.dev.as_raw()) };
> > +        // ARef<Device<T>> is dropped after this, calling
> > fwctl_put.  
> 
> It doesn't really hurt, but I don't think this comment is needed.
> 
> > +    }
> > +}
> > +
> > +// SAFETY: `Registration` can be sent between threads; the
> > underlying +// fwctl_device uses internal locking.
> > +unsafe impl<T: Operations> Send for Registration<T> {}
> > +
> > +// SAFETY: `Registration` provides no mutable access; the
> > underlying +// fwctl_device is protected by internal locking.
> > +unsafe impl<T: Operations> Sync for Registration<T> {}
> > +
> > +/// Internal per-FD user context wrapping `struct fwctl_uctx` and
> > `T`. +///
> > +/// Not exposed to drivers — they work with `&T` / `Pin<&mut T>`
> > directly. +#[repr(C)]
> > +#[pin_data]
> > +struct UserCtx<T: Operations> {
> > +    #[pin]
> > +    fwctl_uctx: Opaque<bindings::fwctl_uctx>,
> > +    #[pin]
> > +    uctx: T,  
> 
> I'd probably just name this data.
> 
> > +}
> > +
> > +impl<T: Operations> UserCtx<T> {
> > +    /// # Safety
> > +    ///
> > +    /// `ptr` must point to a `fwctl_uctx` embedded in a live
> > `UserCtx<T>`.
> > +    unsafe fn from_raw<'a>(ptr: *mut bindings::fwctl_uctx) -> &'a
> > Self {
> > +        unsafe { &*container_of!(Opaque::cast_from(ptr), Self,
> > fwctl_uctx) }
> > +    }
> > +
> > +    /// # Safety
> > +    ///
> > +    /// `ptr` must point to a `fwctl_uctx` embedded in a live
> > `UserCtx<T>`.
> > +    /// The caller must ensure exclusive access to the
> > `UserCtx<T>`.
> > +    unsafe fn from_raw_mut<'a>(ptr: *mut bindings::fwctl_uctx) ->
> > &'a mut Self {
> > +        unsafe { &mut *container_of!(Opaque::cast_from(ptr), Self,
> > fwctl_uctx).cast_mut() }
> > +    }
> > +
> > +    /// Returns a reference to the fwctl [`Device`] that owns this
> > context.
> > +    fn device(&self) -> &Device<T> {
> > +        // SAFETY: fwctl_uctx.fwctl is set by the subsystem and
> > always valid.
> > +        let raw_fwctl = unsafe { (*self.fwctl_uctx.get()).fwctl };
> > +        // SAFETY: The fwctl_device is embedded in a Device<T>.
> > +        unsafe { Device::from_raw(raw_fwctl) }
> > +    }
> > +}
> > +
> > +/// Static vtable mapping Rust trait methods to C callbacks.
> > +pub struct VTable<T: Operations>(PhantomData<T>);
> > +
> > +impl<T: Operations> VTable<T> {
> > +    /// The fwctl operations vtable for this driver type.
> > +    pub const VTABLE: bindings::fwctl_ops = bindings::fwctl_ops {
> > +        device_type: T::DEVICE_TYPE as u32,
> > +        uctx_size: core::mem::size_of::<UserCtx<T>>(),  
> 
> We may want to use Kmalloc::aligned_layout() here as well. It should
> be possible to make this a const function.
> 
> > +        open_uctx: Some(Self::open_uctx_callback),
> > +        close_uctx: Some(Self::close_uctx_callback),
> > +        info: Some(Self::info_callback),
> > +        fw_rpc: Some(Self::fw_rpc_callback),
> > +    };
> > +
> > +    /// # Safety
> > +    ///
> > +    /// `uctx` must be a valid `fwctl_uctx` embedded in a
> > `UserCtx<T>` with
> > +    /// sufficient allocated space for the uctx field.
> > +    unsafe extern "C" fn open_uctx_callback(uctx: *mut
> > bindings::fwctl_uctx) -> ffi::c_int {
> > +        // SAFETY: `fwctl_uctx.fwctl` is set by the subsystem
> > before calling open.
> > +        let raw_fwctl = unsafe { (*uctx).fwctl };
> > +        // SAFETY: `raw_fwctl` points to a valid fwctl_device
> > embedded in a Device<T>.
> > +        let device = unsafe { Device::<T>::from_raw(raw_fwctl) };
> > +
> > +        let initializer = match T::open(device) {
> > +            Ok(init) => init,
> > +            Err(e) => return e.to_errno(),
> > +        };
> > +
> > +        let uctx_offset = core::mem::offset_of!(UserCtx<T>, uctx);
> > +        // SAFETY: The C side allocated space for the entire
> > UserCtx<T>.
> > +        let uctx_ptr: *mut T = unsafe {
> > uctx.cast::<u8>().add(uctx_offset).cast() };  
> 
> I think the following is a bit cleaner:
> 
> 	let user_ctx = container_of!(fw, UserCtx<T>, fwctl_uctx);
> 	let data = unsafe { &raw mut (*user_ctx).uctx };
> 
> > +
> > +        // SAFETY: uctx_ptr points to uninitialised, properly
> > aligned memory.
> > +        match unsafe { initializer.__pinned_init(uctx_ptr.cast())
> > } {
> > +            Ok(()) => 0,
> > +            Err(e) => e.to_errno(),
> > +        }
> > +    }
> > +
> > +    /// # Safety
> > +    ///
> > +    /// `uctx` must point to a fully initialised `UserCtx<T>`.
> > +    unsafe extern "C" fn close_uctx_callback(uctx: *mut
> > bindings::fwctl_uctx) {
> > +        // SAFETY: `fwctl_uctx.fwctl` is set by the subsystem and
> > always valid.
> > +        let device = unsafe { Device::<T>::from_raw((*uctx).fwctl)
> > }; +
> > +        // SAFETY: uctx is a valid pointer promised by C side.  
> 
> You have to justify exclusive access as well.
> 
> > +        let ctx = unsafe { UserCtx::<T>::from_raw_mut(uctx) };
> > +
> > +        {
> > +            // SAFETY: driver uctx is pinned in place by the C
> > allocation.
> > +            let pinned = unsafe { Pin::new_unchecked(&mut
> > ctx.uctx) };
> > +            T::close(pinned, device);
> > +        }
> > +
> > +        // SAFETY: After close returns, no further callbacks will
> > access UserCtx.
> > +        // Drop T before the C side kfree's the allocation.
> > +        unsafe { core::ptr::drop_in_place(&mut ctx.uctx) };
> > +    }
> > +
> > +    /// # Safety
> > +    ///
> > +    /// `uctx` must point to a fully initialised `UserCtx<T>`.
> > +    /// `length` must be a valid pointer.
> > +    unsafe extern "C" fn info_callback(
> > +        uctx: *mut bindings::fwctl_uctx,
> > +        length: *mut usize,
> > +    ) -> *mut ffi::c_void {
> > +        // SAFETY: uctx is a valid pointer promised by C side.
> > +        let ctx = unsafe { UserCtx::<T>::from_raw(uctx) };
> > +        let device = ctx.device();
> > +
> > +        match T::info(&ctx.uctx, device) {
> > +            Ok(kvec) if kvec.is_empty() => {
> > +                // SAFETY: `length` is a valid out-parameter.
> > +                unsafe { *length = 0 };
> > +                // Return NULL for empty data; kfree(NULL) is safe.
> > +                core::ptr::null_mut()
> > +            }
> > +            Ok(kvec) => {
> > +                let (ptr, len, _cap) = kvec.into_raw_parts();
> > +                // SAFETY: `length` is a valid out-parameter.
> > +                unsafe { *length = len };
> > +                ptr.cast::<ffi::c_void>()
> > +            }
> > +            Err(e) => Error::to_ptr(e),
> > +        }
> > +    }
> > +
> > +    /// # Safety
> > +    ///
> > +    /// `uctx` must point to a fully initialised `UserCtx<T>`.
> > +    /// `rpc_in` must be valid for `in_len` bytes. `out_len` must
> > be valid.
> > +    unsafe extern "C" fn fw_rpc_callback(
> > +        uctx: *mut bindings::fwctl_uctx,
> > +        scope: u32,
> > +        rpc_in: *mut ffi::c_void,
> > +        in_len: usize,
> > +        out_len: *mut usize,
> > +    ) -> *mut ffi::c_void {
> > +        let scope = match RpcScope::try_from(scope) {
> > +            Ok(s) => s,
> > +            Err(e) => return Error::to_ptr(e),
> > +        };
> > +
> > +        // SAFETY: `uctx` is fully initialised; shared access is
> > sufficient.
> > +        let ctx = unsafe { UserCtx::<T>::from_raw(uctx) };
> > +        let device = ctx.device();
> > +
> > +        // SAFETY: `rpc_in` / `in_len` are guaranteed valid by the
> > fwctl subsystem.  
> 
> There are more safety requirements for a mutable slice, please
> justify them as well.
> 
> > +        let rpc_in_slice: &mut [u8] =
> > +            unsafe {
> > slice::from_raw_parts_mut(rpc_in.cast::<u8>(), in_len) }; +
> > +        match T::fw_rpc(&ctx.uctx, device, scope, rpc_in_slice) {
> > +            Ok(FwRpcResponse::InPlace(len)) => {
> > +                // SAFETY: `out_len` is valid.
> > +                unsafe { *out_len = len };
> > +                rpc_in
> > +            }
> > +            Ok(FwRpcResponse::NewBuffer(kvec)) => {
> > +                let (ptr, len, _cap) = kvec.into_raw_parts();
> > +                // SAFETY: `out_len` is valid.
> > +                unsafe { *out_len = len };
> > +                ptr.cast::<ffi::c_void>()
> > +            }
> > +            Err(e) => Error::to_ptr(e),
> > +        }
> > +    }
> > +}  


      reply	other threads:[~2026-03-05 21:15 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-02-17 20:49 [PATCH v3 0/1] rust: introduce abstractions for fwctl Zhi Wang
2026-02-17 20:49 ` [PATCH v3 1/1] " Zhi Wang
2026-03-03 20:15   ` Jason Gunthorpe
2026-03-03 20:50     ` Danilo Krummrich
2026-03-03 21:00     ` Danilo Krummrich
2026-03-05 16:02   ` Danilo Krummrich
2026-03-05 21:14     ` Zhi Wang [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20260305231432.5a054b6d@inno-dell \
    --to=zhiw@nvidia.com \
    --cc=a.hindborg@kernel.org \
    --cc=acourbot@nvidia.com \
    --cc=alex.gaynor@gmail.com \
    --cc=aliceryhl@google.com \
    --cc=aniketa@nvidia.com \
    --cc=ankita@nvidia.com \
    --cc=bhelgaas@google.com \
    --cc=bjorn3_gh@protonmail.com \
    --cc=boqun.feng@gmail.com \
    --cc=cjia@nvidia.com \
    --cc=dakr@kernel.org \
    --cc=daniel.almeida@collabora.com \
    --cc=gary@garyguo.net \
    --cc=helgaas@kernel.org \
    --cc=jgg@nvidia.com \
    --cc=jhubbard@nvidia.com \
    --cc=joelagnelf@nvidia.com \
    --cc=kwankhede@nvidia.com \
    --cc=kwilczynski@kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-pci@vger.kernel.org \
    --cc=lossin@kernel.org \
    --cc=markus.probst@posteo.de \
    --cc=ojeda@kernel.org \
    --cc=rust-for-linux@vger.kernel.org \
    --cc=smitra@nvidia.com \
    --cc=targupta@nvidia.com \
    --cc=tmgross@umich.edu \
    --cc=zhiwang@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox