From: "Ard Biesheuvel" <ard.biesheuvel@linaro.org>
To: Laszlo Ersek <lersek@redhat.com>
Cc: edk2-devel-groups-io <devel@edk2.groups.io>,
"Igor Mammedov" <imammedo@redhat.com>,
"Jiewen Yao" <jiewen.yao@intel.com>,
"Jordan Justen" <jordan.l.justen@intel.com>,
"Michael Kinney" <michael.d.kinney@intel.com>,
"Philippe Mathieu-Daudé" <philmd@redhat.com>
Subject: Re: [PATCH v2 10/16] OvmfPkg/CpuHotplugSmm: collect CPUs with events
Date: Mon, 2 Mar 2020 14:58:06 +0100 [thread overview]
Message-ID: <CAKv+Gu-pgvAgM-x3Kw1cLWYhrF6Zp+DKk__ACVrJE0aVwaWdsw@mail.gmail.com> (raw)
In-Reply-To: <20200226221156.29589-11-lersek@redhat.com>
On Wed, 26 Feb 2020 at 23:12, Laszlo Ersek <lersek@redhat.com> wrote:
>
> Call QemuCpuhpCollectApicIds() in the root MMI handler. The APIC IDs of
> the hotplugged CPUs will be used for several purposes in subsequent
> patches.
>
> For calling QemuCpuhpCollectApicIds(), pre-allocate both of its output
> arrays "PluggedApicIds" and "ToUnplugApicIds" in the driver's entry point
> function. The allocation size is dictated by the possible CPU count, which
> we fetch from "CPU_HOT_PLUG_DATA.ArrayLength".
>
> The CPU_HOT_PLUG_DATA structure in SMRAM is an out-of-band information
> channel between this driver and PiSmmCpuDxeSmm, underlying
> EFI_SMM_CPU_SERVICE_PROTOCOL.
>
> In order to consume "CPU_HOT_PLUG_DATA.ArrayLength", extend the driver's
> DEPEX to EFI_SMM_CPU_SERVICE_PROTOCOL. PiSmmCpuDxeSmm stores the address
> of CPU_HOT_PLUG_DATA to "PcdCpuHotPlugDataAddress", before it produces
> EFI_SMM_CPU_SERVICE_PROTOCOL.
>
> Stash the protocol at once, as it will be needed later.
>
> Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
> Cc: Igor Mammedov <imammedo@redhat.com>
> Cc: Jiewen Yao <jiewen.yao@intel.com>
> Cc: Jordan Justen <jordan.l.justen@intel.com>
> Cc: Michael Kinney <michael.d.kinney@intel.com>
> Cc: Philippe Mathieu-Daudé <philmd@redhat.com>
> Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=1512
> Signed-off-by: Laszlo Ersek <lersek@redhat.com>
> Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
> ---
>
> Notes:
> v2:
>
> - Pick up Ard's Acked-by, which is conditional on approval from Intel
> reviewers on Cc. (I'd like to save Ard the churn of re-acking
> unmodified patches.)
>
> OvmfPkg/CpuHotplugSmm/CpuHotplugSmm.inf | 7 +-
> OvmfPkg/CpuHotplugSmm/CpuHotplug.c | 111 +++++++++++++++++++-
> 2 files changed, 115 insertions(+), 3 deletions(-)
>
> diff --git a/OvmfPkg/CpuHotplugSmm/CpuHotplugSmm.inf b/OvmfPkg/CpuHotplugSmm/CpuHotplugSmm.inf
> index ab690a9e5e20..31c1ee1c9f6d 100644
> --- a/OvmfPkg/CpuHotplugSmm/CpuHotplugSmm.inf
> +++ b/OvmfPkg/CpuHotplugSmm/CpuHotplugSmm.inf
> @@ -11,41 +11,46 @@ [Defines]
> PI_SPECIFICATION_VERSION = 0x00010046 # PI-1.7.0
> BASE_NAME = CpuHotplugSmm
> FILE_GUID = 84EEA114-C6BE-4445-8F90-51D97863E363
> MODULE_TYPE = DXE_SMM_DRIVER
> ENTRY_POINT = CpuHotplugEntry
>
> #
> # The following information is for reference only and not required by the build
> # tools.
> #
> # VALID_ARCHITECTURES = IA32 X64
> #
>
> [Sources]
> ApicId.h
> CpuHotplug.c
> QemuCpuhp.c
> QemuCpuhp.h
>
> [Packages]
> MdePkg/MdePkg.dec
> OvmfPkg/OvmfPkg.dec
> + UefiCpuPkg/UefiCpuPkg.dec
>
> [LibraryClasses]
> BaseLib
> DebugLib
> MmServicesTableLib
> PcdLib
> + SafeIntLib
> UefiDriverEntryPoint
>
> [Protocols]
> gEfiMmCpuIoProtocolGuid ## CONSUMES
> + gEfiSmmCpuServiceProtocolGuid ## CONSUMES
>
> [Pcd]
> + gUefiCpuPkgTokenSpaceGuid.PcdCpuHotPlugDataAddress ## CONSUMES
> gUefiOvmfPkgTokenSpaceGuid.PcdQ35SmramAtDefaultSmbase ## CONSUMES
>
> [FeaturePcd]
> gUefiOvmfPkgTokenSpaceGuid.PcdSmmSmramRequire ## CONSUMES
>
> [Depex]
> - gEfiMmCpuIoProtocolGuid
> + gEfiMmCpuIoProtocolGuid AND
> + gEfiSmmCpuServiceProtocolGuid
> diff --git a/OvmfPkg/CpuHotplugSmm/CpuHotplug.c b/OvmfPkg/CpuHotplugSmm/CpuHotplug.c
> index 5df8c689c63a..42e023cb85c0 100644
> --- a/OvmfPkg/CpuHotplugSmm/CpuHotplug.c
> +++ b/OvmfPkg/CpuHotplugSmm/CpuHotplug.c
> @@ -1,46 +1,76 @@
> /** @file
> Root SMI handler for VCPU hotplug SMIs.
>
> Copyright (c) 2020, Red Hat, Inc.
>
> SPDX-License-Identifier: BSD-2-Clause-Patent
> **/
>
> +#include <CpuHotPlugData.h> // CPU_HOT_PLUG_DATA
> #include <IndustryStandard/Q35MchIch9.h> // ICH9_APM_CNT
> #include <IndustryStandard/QemuCpuHotplug.h> // QEMU_CPUHP_CMD_GET_PENDING
> #include <Library/BaseLib.h> // CpuDeadLoop()
> #include <Library/DebugLib.h> // ASSERT()
> #include <Library/MmServicesTableLib.h> // gMmst
> #include <Library/PcdLib.h> // PcdGetBool()
> +#include <Library/SafeIntLib.h> // SafeUintnSub()
> #include <Protocol/MmCpuIo.h> // EFI_MM_CPU_IO_PROTOCOL
> +#include <Protocol/SmmCpuService.h> // EFI_SMM_CPU_SERVICE_PROTOCOL
> #include <Uefi/UefiBaseType.h> // EFI_STATUS
>
> +#include "ApicId.h" // APIC_ID
> #include "QemuCpuhp.h" // QemuCpuhpWriteCpuSelector()
>
> //
> // We use this protocol for accessing IO Ports.
> //
> STATIC EFI_MM_CPU_IO_PROTOCOL *mMmCpuIo;
> //
> +// The following protocol is used to report the addition or removal of a CPU to
> +// the SMM CPU driver (PiSmmCpuDxeSmm).
> +//
> +STATIC EFI_SMM_CPU_SERVICE_PROTOCOL *mMmCpuService;
> +//
> +// This structure is a communication side-channel between the
> +// EFI_SMM_CPU_SERVICE_PROTOCOL consumer (i.e., this driver) and provider
> +// (i.e., PiSmmCpuDxeSmm).
> +//
> +STATIC CPU_HOT_PLUG_DATA *mCpuHotPlugData;
> +//
> +// SMRAM arrays for fetching the APIC IDs of processors with pending events (of
> +// known event types), for the time of just one MMI.
> +//
> +// The lifetimes of these arrays match that of this driver only because we
> +// don't want to allocate SMRAM at OS runtime, and potentially fail (or
> +// fragment the SMRAM map).
> +//
> +// These arrays provide room for ("possible CPU count" minus one) APIC IDs
> +// each, as we don't expect every possible CPU to appear, or disappear, in a
> +// single MMI. The numbers of used (populated) elements in the arrays are
> +// determined on every MMI separately.
> +//
> +STATIC APIC_ID *mPluggedApicIds;
> +STATIC APIC_ID *mToUnplugApicIds;
> +//
> // Represents the registration of the CPU Hotplug MMI handler.
> //
> STATIC EFI_HANDLE mDispatchHandle;
>
>
> /**
> CPU Hotplug MMI handler function.
>
> This is a root MMI handler.
>
> @param[in] DispatchHandle The unique handle assigned to this handler by
> EFI_MM_SYSTEM_TABLE.MmiHandlerRegister().
>
> @param[in] Context Context passed in by
> EFI_MM_SYSTEM_TABLE.MmiManage(). Due to
> CpuHotplugMmi() being a root MMI handler,
> Context is ASSERT()ed to be NULL.
>
> @param[in,out] CommBuffer Ignored, due to CpuHotplugMmi() being a root
> MMI handler.
>
> @param[in,out] CommBufferSize Ignored, due to CpuHotplugMmi() being a root
> @@ -65,162 +95,239 @@ STATIC EFI_HANDLE mDispatchHandle;
> but other handlers should still
> be called.
>
> @retval EFI_WARN_INTERRUPT_SOURCE_PENDING The MMI source is still pending,
> and other handlers should still
> be called.
>
> @retval EFI_INTERRUPT_PENDING The MMI source could not be
> quiesced.
> **/
> STATIC
> EFI_STATUS
> EFIAPI
> CpuHotplugMmi (
> IN EFI_HANDLE DispatchHandle,
> IN CONST VOID *Context OPTIONAL,
> IN OUT VOID *CommBuffer OPTIONAL,
> IN OUT UINTN *CommBufferSize OPTIONAL
> )
> {
> EFI_STATUS Status;
> UINT8 ApmControl;
> + UINT32 PluggedCount;
> + UINT32 ToUnplugCount;
>
> //
> // Assert that we are entering this function due to our root MMI handler
> // registration.
> //
> ASSERT (DispatchHandle == mDispatchHandle);
> //
> // When MmiManage() is invoked to process root MMI handlers, the caller (the
> // MM Core) is expected to pass in a NULL Context. MmiManage() then passes
> // the same NULL Context to individual handlers.
> //
> ASSERT (Context == NULL);
> //
> // Read the MMI command value from the APM Control Port, to see if this is an
> // MMI we should care about.
> //
> Status = mMmCpuIo->Io.Read (mMmCpuIo, MM_IO_UINT8, ICH9_APM_CNT, 1,
> &ApmControl);
> if (EFI_ERROR (Status)) {
> DEBUG ((DEBUG_ERROR, "%a: failed to read ICH9_APM_CNT: %r\n", __FUNCTION__,
> Status));
> //
> // We couldn't even determine if the MMI was for us or not.
> //
> goto Fatal;
> }
>
> if (ApmControl != ICH9_APM_CNT_CPU_HOTPLUG) {
> //
> // The MMI is not for us.
> //
> return EFI_WARN_INTERRUPT_SOURCE_QUIESCED;
> }
>
> + //
> + // Collect the CPUs with pending events.
> + //
> + Status = QemuCpuhpCollectApicIds (
> + mMmCpuIo,
> + mCpuHotPlugData->ArrayLength, // PossibleCpuCount
> + mCpuHotPlugData->ArrayLength - 1, // ApicIdCount
> + mPluggedApicIds,
> + &PluggedCount,
> + mToUnplugApicIds,
> + &ToUnplugCount
> + );
> + if (EFI_ERROR (Status)) {
> + goto Fatal;
> + }
> + if (ToUnplugCount > 0) {
> + DEBUG ((DEBUG_ERROR, "%a: hot-unplug is not supported yet\n",
> + __FUNCTION__));
> + goto Fatal;
> + }
> +
> //
> // We've handled this MMI.
> //
> return EFI_SUCCESS;
>
> Fatal:
> ASSERT (FALSE);
> CpuDeadLoop ();
> //
> // We couldn't handle this MMI.
> //
> return EFI_INTERRUPT_PENDING;
> }
>
>
> //
> // Entry point function of this driver.
> //
> EFI_STATUS
> EFIAPI
> CpuHotplugEntry (
> IN EFI_HANDLE ImageHandle,
> IN EFI_SYSTEM_TABLE *SystemTable
> )
> {
> EFI_STATUS Status;
> + UINTN Size;
>
> //
> // This module should only be included when SMM support is required.
> //
> ASSERT (FeaturePcdGet (PcdSmmSmramRequire));
> //
> // This driver depends on the dynamically detected "SMRAM at default SMBASE"
> // feature.
> //
> if (!PcdGetBool (PcdQ35SmramAtDefaultSmbase)) {
> return EFI_UNSUPPORTED;
> }
>
> //
> // Errors from here on are fatal; we cannot allow the boot to proceed if we
> // can't set up this driver to handle CPU hotplug.
> //
> // First, collect the protocols needed later. All of these protocols are
> // listed in our module DEPEX.
> //
> Status = gMmst->MmLocateProtocol (&gEfiMmCpuIoProtocolGuid,
> NULL /* Registration */, (VOID **)&mMmCpuIo);
> if (EFI_ERROR (Status)) {
> DEBUG ((DEBUG_ERROR, "%a: locate MmCpuIo: %r\n", __FUNCTION__, Status));
> goto Fatal;
> }
> + Status = gMmst->MmLocateProtocol (&gEfiSmmCpuServiceProtocolGuid,
> + NULL /* Registration */, (VOID **)&mMmCpuService);
> + if (EFI_ERROR (Status)) {
> + DEBUG ((DEBUG_ERROR, "%a: locate MmCpuService: %r\n", __FUNCTION__,
> + Status));
> + goto Fatal;
> + }
> +
> + //
> + // Our DEPEX on EFI_SMM_CPU_SERVICE_PROTOCOL guarantees that PiSmmCpuDxeSmm
> + // has pointed PcdCpuHotPlugDataAddress to CPU_HOT_PLUG_DATA in SMRAM.
> + //
> + mCpuHotPlugData = (VOID *)(UINTN)PcdGet64 (PcdCpuHotPlugDataAddress);
> + if (mCpuHotPlugData == NULL) {
> + Status = EFI_NOT_FOUND;
> + DEBUG ((DEBUG_ERROR, "%a: CPU_HOT_PLUG_DATA: %r\n", __FUNCTION__, Status));
> + goto Fatal;
> + }
> + //
> + // If the possible CPU count is 1, there's nothing for this driver to do.
> + //
> + if (mCpuHotPlugData->ArrayLength == 1) {
> + return EFI_UNSUPPORTED;
> + }
> + //
> + // Allocate the data structures that depend on the possible CPU count.
> + //
> + if (RETURN_ERROR (SafeUintnSub (mCpuHotPlugData->ArrayLength, 1, &Size)) ||
> + RETURN_ERROR (SafeUintnMult (sizeof (APIC_ID), Size, &Size))) {
> + Status = EFI_ABORTED;
> + DEBUG ((DEBUG_ERROR, "%a: invalid CPU_HOT_PLUG_DATA\n", __FUNCTION__));
> + goto Fatal;
> + }
> + Status = gMmst->MmAllocatePool (EfiRuntimeServicesData, Size,
> + (VOID **)&mPluggedApicIds);
> + if (EFI_ERROR (Status)) {
> + DEBUG ((DEBUG_ERROR, "%a: MmAllocatePool(): %r\n", __FUNCTION__, Status));
> + goto Fatal;
> + }
> + Status = gMmst->MmAllocatePool (EfiRuntimeServicesData, Size,
> + (VOID **)&mToUnplugApicIds);
> + if (EFI_ERROR (Status)) {
> + DEBUG ((DEBUG_ERROR, "%a: MmAllocatePool(): %r\n", __FUNCTION__, Status));
> + goto ReleasePluggedApicIds;
> + }
>
> //
> // Sanity-check the CPU hotplug interface.
> //
> // Both of the following features are part of QEMU 5.0, introduced primarily
> // in commit range 3e08b2b9cb64..3a61c8db9d25:
> //
> // (a) the QEMU_CPUHP_CMD_GET_ARCH_ID command of the modern CPU hotplug
> // interface,
> //
> // (b) the "SMRAM at default SMBASE" feature.
> //
> // From these, (b) is restricted to 5.0+ machine type versions, while (a)
> // does not depend on machine type version. Because we ensured the stricter
> // condition (b) through PcdQ35SmramAtDefaultSmbase above, the (a)
> // QEMU_CPUHP_CMD_GET_ARCH_ID command must now be available too. While we
> // can't verify the presence of precisely that command, we can still verify
> // (sanity-check) that the modern interface is active, at least.
> //
> // Consult the "Typical usecases | Detecting and enabling modern CPU hotplug
> // interface" section in QEMU's "docs/specs/acpi_cpu_hotplug.txt", on the
> // following.
> //
> QemuCpuhpWriteCpuSelector (mMmCpuIo, 0);
> QemuCpuhpWriteCpuSelector (mMmCpuIo, 0);
> QemuCpuhpWriteCommand (mMmCpuIo, QEMU_CPUHP_CMD_GET_PENDING);
> if (QemuCpuhpReadCommandData2 (mMmCpuIo) != 0) {
> Status = EFI_NOT_FOUND;
> DEBUG ((DEBUG_ERROR, "%a: modern CPU hotplug interface: %r\n",
> __FUNCTION__, Status));
> - goto Fatal;
> + goto ReleaseToUnplugApicIds;
> }
>
> //
> // Register the handler for the CPU Hotplug MMI.
> //
> Status = gMmst->MmiHandlerRegister (
> CpuHotplugMmi,
> NULL, // HandlerType: root MMI handler
> &mDispatchHandle
> );
> if (EFI_ERROR (Status)) {
> DEBUG ((DEBUG_ERROR, "%a: MmiHandlerRegister(): %r\n", __FUNCTION__,
> Status));
> - goto Fatal;
> + goto ReleaseToUnplugApicIds;
> }
>
> return EFI_SUCCESS;
>
> +ReleaseToUnplugApicIds:
> + gMmst->MmFreePool (mToUnplugApicIds);
> + mToUnplugApicIds = NULL;
> +
> +ReleasePluggedApicIds:
> + gMmst->MmFreePool (mPluggedApicIds);
> + mPluggedApicIds = NULL;
> +
> Fatal:
> ASSERT (FALSE);
> CpuDeadLoop ();
> return Status;
> }
> --
> 2.19.1.3.g30247aa5d201
>
>
next prev parent reply other threads:[~2020-03-02 13:58 UTC|newest]
Thread overview: 53+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-02-26 22:11 [PATCH v2 00/16] OvmfPkg: support VCPU hotplug with -D SMM_REQUIRE Laszlo Ersek
2020-02-26 22:11 ` [PATCH v2 01/16] MdeModulePkg/PiSmmCore: log SMM image start failure Laszlo Ersek
2020-03-02 12:47 ` [edk2-devel] " Laszlo Ersek
2020-03-02 12:55 ` Liming Gao
2020-03-02 13:46 ` Philippe Mathieu-Daudé
2020-03-03 0:46 ` Dong, Eric
2020-02-26 22:11 ` [PATCH v2 02/16] UefiCpuPkg/PiSmmCpuDxeSmm: fix S3 Resume for CPU hotplug Laszlo Ersek
2020-02-28 3:05 ` [edk2-devel] " Dong, Eric
2020-02-28 10:50 ` Laszlo Ersek
2020-03-04 12:23 ` Laszlo Ersek
2020-03-04 14:36 ` Dong, Eric
2020-02-26 22:11 ` [PATCH v2 03/16] OvmfPkg: clone SmmCpuPlatformHookLib from UefiCpuPkg Laszlo Ersek
2020-03-02 13:27 ` Ard Biesheuvel
2020-03-02 13:49 ` Philippe Mathieu-Daudé
2020-02-26 22:11 ` [PATCH v2 04/16] OvmfPkg: enable SMM Monarch Election in PiSmmCpuDxeSmm Laszlo Ersek
2020-03-02 13:32 ` Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 05/16] OvmfPkg: enable CPU hotplug support " Laszlo Ersek
2020-03-02 13:33 ` Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 06/16] OvmfPkg/CpuHotplugSmm: introduce skeleton for CPU Hotplug SMM driver Laszlo Ersek
2020-03-02 13:44 ` Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 07/16] OvmfPkg/CpuHotplugSmm: add hotplug register block helper functions Laszlo Ersek
2020-03-02 13:24 ` Philippe Mathieu-Daudé
2020-03-02 13:45 ` [edk2-devel] " Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 08/16] OvmfPkg/CpuHotplugSmm: define the QEMU_CPUHP_CMD_GET_ARCH_ID macro Laszlo Ersek
2020-03-02 13:22 ` Philippe Mathieu-Daudé
2020-03-02 13:45 ` Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 09/16] OvmfPkg/CpuHotplugSmm: add function for collecting CPUs with events Laszlo Ersek
2020-03-02 13:49 ` Ard Biesheuvel
2020-03-02 20:34 ` Philippe Mathieu-Daudé
2020-03-03 10:31 ` Laszlo Ersek
2020-02-26 22:11 ` [PATCH v2 10/16] OvmfPkg/CpuHotplugSmm: collect " Laszlo Ersek
2020-03-02 13:58 ` Ard Biesheuvel [this message]
2020-02-26 22:11 ` [PATCH v2 11/16] OvmfPkg/CpuHotplugSmm: introduce Post-SMM Pen for hot-added CPUs Laszlo Ersek
2020-03-02 14:02 ` [edk2-devel] " Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 12/16] OvmfPkg/CpuHotplugSmm: introduce First SMI Handler " Laszlo Ersek
2020-03-02 14:03 ` Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 13/16] OvmfPkg/CpuHotplugSmm: complete root MMI handler for CPU hotplug Laszlo Ersek
2020-03-02 14:05 ` Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 14/16] OvmfPkg: clone CpuS3DataDxe from UefiCpuPkg Laszlo Ersek
2020-03-02 13:44 ` Philippe Mathieu-Daudé
2020-03-02 14:06 ` Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 15/16] OvmfPkg/CpuS3DataDxe: superficial cleanups Laszlo Ersek
2020-03-02 13:25 ` Philippe Mathieu-Daudé
2020-03-02 14:06 ` Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 16/16] OvmfPkg/CpuS3DataDxe: enable S3 resume after CPU hotplug Laszlo Ersek
2020-03-02 14:16 ` Ard Biesheuvel
2020-03-02 15:46 ` [edk2-devel] [PATCH v2 00/16] OvmfPkg: support VCPU hotplug with -D SMM_REQUIRE Boris Ostrovsky
2020-03-02 19:22 ` Laszlo Ersek
2020-03-02 19:59 ` Laszlo Ersek
2020-03-04 13:29 ` Philippe Mathieu-Daudé
2020-03-04 18:09 ` Laszlo Ersek
2020-03-04 12:29 ` Laszlo Ersek
2020-03-05 8:32 ` Laszlo Ersek
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=CAKv+Gu-pgvAgM-x3Kw1cLWYhrF6Zp+DKk__ACVrJE0aVwaWdsw@mail.gmail.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox