All of lore.kernel.org
 help / color / mirror / Atom feed
From: Mark Brown <broonie@kernel.org>
To: Brian Starkey <brian.starkey@arm.com>
Cc: "Benjamin Gaignard" <benjamin.gaignard@linaro.org>,
	"Laura Abbott" <labbott@redhat.com>,
	"Michal Hocko" <mhocko@kernel.org>,
	"Sumit Semwal" <sumit.semwal@linaro.org>,
	"Riley Andrews" <riandrews@android.com>,
	"Arve Hjønnevåg" <arve@android.com>,
	"Rom Lemarchand" <romlem@google.com>,
	devel@driverdev.osuosl.org,
	"Linux Kernel Mailing List" <linux-kernel@vger.kernel.org>,
	"linaro-mm-sig@lists.linaro.org" <linaro-mm-sig@lists.linaro.org>,
	"Greg Kroah-Hartman" <gregkh@linuxfoundation.org>,
	linux-arm-kernel@lists.infradead.org,
	"linux-media@vger.kernel.org" <linux-media@vger.kernel.org>,
	"dri-devel@lists.freedesktop.org"
	<dri-devel@lists.freedesktop.org>,
	"Daniel Vetter" <daniel.vetter@intel.com>,
	linux-mm@kvack.org
Subject: Re: [RFC PATCH 00/12] Ion cleanup in preparation for moving out of staging
Date: Mon, 13 Mar 2017 13:21:50 +0000	[thread overview]
Message-ID: <20170313132150.324h7em7c3iowmwj@sirena.org.uk> (raw)
In-Reply-To: <20170313105433.GA12980@e106950-lin.cambridge.arm.com>

[-- Attachment #1: Type: text/plain, Size: 1741 bytes --]

On Mon, Mar 13, 2017 at 10:54:33AM +0000, Brian Starkey wrote:
> On Sun, Mar 12, 2017 at 02:34:14PM +0100, Benjamin Gaignard wrote:

> > Another point is how can we put secure rules (like selinux policy) on
> > heaps since all the allocations
> > go to the same device (/dev/ion) ? For example, until now, in Android
> > we have to give the same
> > access rights to all the process that use ION.
> > It will become problem when we will add secure heaps because we won't
> > be able to distinguish secure
> > processes to standard ones or set specific policy per heaps.
> > Maybe I'm wrong here but I have never see selinux policy checking an
> > ioctl field but if that
> > exist it could be a solution.

> I might be thinking of a different type of "secure", but...

> Should the security of secure heaps be enforced by OS-level
> permissions? I don't know about other architectures, but at least on
> arm/arm64 this is enforced in hardware; it doesn't matter who has
> access to the ion heap, because only secure devices (or the CPU
> running a secure process) is physically able to access the memory
> backing the buffer.

> In fact, in the use-cases I know of, the process asking for the ion
> allocation is not a secure process, and so we wouldn't *want* to
> restrict the secure heap to be allocated from only by secure
> processes.

I think there's an orthogonal level of OS level security that can be
applied here - it's reasonable for it to want to say things like "only
processes that are supposed to be implementing functionality X should be
able to try to allocate memory set aside for that functionality".  This
mitigates against escallation attacks and so on, it's not really
directly related to secure memory as such though.

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 488 bytes --]

WARNING: multiple messages have this Message-ID (diff)
From: broonie@kernel.org (Mark Brown)
To: linux-arm-kernel@lists.infradead.org
Subject: [RFC PATCH 00/12] Ion cleanup in preparation for moving out of staging
Date: Mon, 13 Mar 2017 13:21:50 +0000	[thread overview]
Message-ID: <20170313132150.324h7em7c3iowmwj@sirena.org.uk> (raw)
In-Reply-To: <20170313105433.GA12980@e106950-lin.cambridge.arm.com>

On Mon, Mar 13, 2017 at 10:54:33AM +0000, Brian Starkey wrote:
> On Sun, Mar 12, 2017 at 02:34:14PM +0100, Benjamin Gaignard wrote:

> > Another point is how can we put secure rules (like selinux policy) on
> > heaps since all the allocations
> > go to the same device (/dev/ion) ? For example, until now, in Android
> > we have to give the same
> > access rights to all the process that use ION.
> > It will become problem when we will add secure heaps because we won't
> > be able to distinguish secure
> > processes to standard ones or set specific policy per heaps.
> > Maybe I'm wrong here but I have never see selinux policy checking an
> > ioctl field but if that
> > exist it could be a solution.

> I might be thinking of a different type of "secure", but...

> Should the security of secure heaps be enforced by OS-level
> permissions? I don't know about other architectures, but at least on
> arm/arm64 this is enforced in hardware; it doesn't matter who has
> access to the ion heap, because only secure devices (or the CPU
> running a secure process) is physically able to access the memory
> backing the buffer.

> In fact, in the use-cases I know of, the process asking for the ion
> allocation is not a secure process, and so we wouldn't *want* to
> restrict the secure heap to be allocated from only by secure
> processes.

I think there's an orthogonal level of OS level security that can be
applied here - it's reasonable for it to want to say things like "only
processes that are supposed to be implementing functionality X should be
able to try to allocate memory set aside for that functionality".  This
mitigates against escallation attacks and so on, it's not really
directly related to secure memory as such though.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: not available
URL: <http://lists.infradead.org/pipermail/linux-arm-kernel/attachments/20170313/841d0bd3/attachment.sig>

WARNING: multiple messages have this Message-ID (diff)
From: Mark Brown <broonie@kernel.org>
To: Brian Starkey <brian.starkey@arm.com>
Cc: devel@driverdev.osuosl.org, "Rom Lemarchand" <romlem@google.com>,
	"Linux Kernel Mailing List" <linux-kernel@vger.kernel.org>,
	"Riley Andrews" <riandrews@android.com>,
	"dri-devel@lists.freedesktop.org"
	<dri-devel@lists.freedesktop.org>,
	"Michal Hocko" <mhocko@kernel.org>,
	"linaro-mm-sig@lists.linaro.org" <linaro-mm-sig@lists.linaro.org>,
	linux-mm@kvack.org, "Arve Hjønnevåg" <arve@android.com>,
	"Benjamin Gaignard" <benjamin.gaignard@linaro.org>,
	"Greg Kroah-Hartman" <gregkh@linuxfoundation.org>,
	"Daniel Vetter" <daniel.vetter@intel.com>,
	"Sumit Semwal" <sumit.semwal@linaro.org>,
	linux-arm-kernel@lists.infradead.org,
	"linux-media@vger.kernel.org" <linux-media@vger.kernel.org>
Subject: Re: [RFC PATCH 00/12] Ion cleanup in preparation for moving out of staging
Date: Mon, 13 Mar 2017 13:21:50 +0000	[thread overview]
Message-ID: <20170313132150.324h7em7c3iowmwj@sirena.org.uk> (raw)
In-Reply-To: <20170313105433.GA12980@e106950-lin.cambridge.arm.com>


[-- Attachment #1.1: Type: text/plain, Size: 1741 bytes --]

On Mon, Mar 13, 2017 at 10:54:33AM +0000, Brian Starkey wrote:
> On Sun, Mar 12, 2017 at 02:34:14PM +0100, Benjamin Gaignard wrote:

> > Another point is how can we put secure rules (like selinux policy) on
> > heaps since all the allocations
> > go to the same device (/dev/ion) ? For example, until now, in Android
> > we have to give the same
> > access rights to all the process that use ION.
> > It will become problem when we will add secure heaps because we won't
> > be able to distinguish secure
> > processes to standard ones or set specific policy per heaps.
> > Maybe I'm wrong here but I have never see selinux policy checking an
> > ioctl field but if that
> > exist it could be a solution.

> I might be thinking of a different type of "secure", but...

> Should the security of secure heaps be enforced by OS-level
> permissions? I don't know about other architectures, but at least on
> arm/arm64 this is enforced in hardware; it doesn't matter who has
> access to the ion heap, because only secure devices (or the CPU
> running a secure process) is physically able to access the memory
> backing the buffer.

> In fact, in the use-cases I know of, the process asking for the ion
> allocation is not a secure process, and so we wouldn't *want* to
> restrict the secure heap to be allocated from only by secure
> processes.

I think there's an orthogonal level of OS level security that can be
applied here - it's reasonable for it to want to say things like "only
processes that are supposed to be implementing functionality X should be
able to try to allocate memory set aside for that functionality".  This
mitigates against escallation attacks and so on, it's not really
directly related to secure memory as such though.

[-- Attachment #1.2: signature.asc --]
[-- Type: application/pgp-signature, Size: 488 bytes --]

[-- Attachment #2: Type: text/plain, Size: 169 bytes --]

_______________________________________________
devel mailing list
devel@linuxdriverproject.org
http://driverdev.linuxdriverproject.org/mailman/listinfo/driverdev-devel

  reply	other threads:[~2017-03-13 13:22 UTC|newest]

Thread overview: 256+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-03-02 21:44 [RFC PATCH 00/12] Ion cleanup in preparation for moving out of staging Laura Abbott
2017-03-02 21:44 ` Laura Abbott
2017-03-02 21:44 ` Laura Abbott
2017-03-02 21:44 ` Laura Abbott
2017-03-02 21:44 ` [RFC PATCH 01/12] staging: android: ion: Remove dmap_cnt Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44 ` [RFC PATCH 02/12] staging: android: ion: Remove alignment from allocation field Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44 ` [RFC PATCH 03/12] staging: android: ion: Duplicate sg_table Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-03  8:18   ` Hillf Danton
2017-03-03  8:18     ` Hillf Danton
2017-03-03  8:18     ` Hillf Danton
2017-03-03 18:41     ` Laura Abbott
2017-03-03 18:41       ` Laura Abbott
2017-03-03 18:41       ` Laura Abbott
2017-03-02 21:44 ` [RFC PATCH 04/12] staging: android: ion: Call dma_map_sg for syncing and mapping Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-03 11:04   ` Dan Carpenter
2017-03-03 11:04     ` Dan Carpenter
2017-03-03 11:04     ` Dan Carpenter
2017-03-03 11:04     ` Dan Carpenter
2017-03-03 11:58     ` Eric Engestrom
2017-03-03 11:58       ` Eric Engestrom
2017-03-03 11:58       ` Eric Engestrom
2017-03-03 16:37   ` Laurent Pinchart
2017-03-03 16:37     ` Laurent Pinchart
2017-03-03 16:37     ` Laurent Pinchart
2017-03-03 16:37     ` Laurent Pinchart
2017-03-03 18:40     ` Laura Abbott
2017-03-03 18:40       ` Laura Abbott
2017-03-03 18:40       ` Laura Abbott
2017-03-02 21:44 ` [RFC PATCH 05/12] staging: android: ion: Remove page faulting support Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44 ` [RFC PATCH 06/12] staging: android: ion: Remove crufty cache support Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-03  9:56   ` Daniel Vetter
2017-03-03  9:56     ` Daniel Vetter
2017-03-03  9:56     ` Daniel Vetter
2017-03-03  9:56     ` Daniel Vetter
2017-03-03 16:39     ` Laurent Pinchart
2017-03-03 16:39       ` Laurent Pinchart
2017-03-03 16:39       ` Laurent Pinchart
2017-03-03 16:39       ` Laurent Pinchart
2017-03-03 18:46       ` Laura Abbott
2017-03-03 18:46         ` Laura Abbott
2017-03-03 18:46         ` Laura Abbott
2017-03-03 18:46         ` Laura Abbott
2017-03-06 10:29         ` Daniel Vetter
2017-03-06 10:29           ` Daniel Vetter
2017-03-06 10:29           ` Daniel Vetter
2017-03-06 10:29           ` Daniel Vetter
2017-03-06 17:00           ` Emil Velikov
2017-03-06 17:00             ` Emil Velikov
2017-03-06 17:00             ` Emil Velikov
2017-03-06 19:20             ` Laura Abbott
2017-03-06 19:20               ` Laura Abbott
2017-03-06 19:20               ` Laura Abbott
2017-03-02 21:44 ` [RFC PATCH 07/12] staging: android: ion: Remove old platform support Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-03 10:31   ` Daniel Vetter
2017-03-03 10:31     ` Daniel Vetter
2017-03-03 10:31     ` Daniel Vetter
2017-03-03 10:31     ` Daniel Vetter
2017-03-02 21:44 ` [RFC PATCH 08/12] cma: Store a name in the cma structure Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-10  8:53   ` Sumit Semwal
2017-03-10  8:53     ` Sumit Semwal
2017-03-10  8:53     ` Sumit Semwal
2017-03-17 18:02     ` Laura Abbott
2017-03-17 18:02       ` Laura Abbott
2017-03-17 18:02       ` Laura Abbott
2017-03-17 18:02       ` Laura Abbott
2017-03-02 21:44 ` [RFC PATCH 09/12] cma: Introduce cma_for_each_area Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44 ` [RFC PATCH 10/12] staging: android: ion: Use CMA APIs directly Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-03 16:41   ` Laurent Pinchart
2017-03-03 16:41     ` Laurent Pinchart
2017-03-03 16:41     ` Laurent Pinchart
2017-03-03 16:41     ` Laurent Pinchart
2017-03-03 18:50     ` Laura Abbott
2017-03-03 18:50       ` Laura Abbott
2017-03-03 18:50       ` Laura Abbott
2017-03-06 10:32       ` Daniel Vetter
2017-03-06 10:32         ` Daniel Vetter
2017-03-06 10:32         ` Daniel Vetter
2017-03-06 13:43         ` Laurent Pinchart
2017-03-06 13:43           ` Laurent Pinchart
2017-03-06 13:43           ` Laurent Pinchart
2017-03-06 13:43           ` Laurent Pinchart
2017-03-06 15:52           ` Daniel Vetter
2017-03-06 15:52             ` Daniel Vetter
2017-03-06 15:52             ` Daniel Vetter
2017-03-06 19:14             ` Laura Abbott
2017-03-06 19:14               ` Laura Abbott
2017-03-06 19:14               ` Laura Abbott
2017-03-02 21:44 ` [RFC PATCH 11/12] staging: android: ion: Make Ion heaps selectable Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-03 10:33   ` Daniel Vetter
2017-03-03 10:33     ` Daniel Vetter
2017-03-03 10:33     ` Daniel Vetter
2017-03-03 10:33     ` Daniel Vetter
2017-03-03 19:10     ` Laura Abbott
2017-03-03 19:10       ` Laura Abbott
2017-03-03 19:10       ` Laura Abbott
2017-03-02 21:44 ` [RFC PATCH 12/12] staging; android: ion: Enumerate all available heaps Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-02 21:44   ` Laura Abbott
2017-03-03 10:39   ` Daniel Vetter
2017-03-03 10:39     ` Daniel Vetter
2017-03-03 10:39     ` Daniel Vetter
2017-03-03 10:39     ` Daniel Vetter
2017-03-03 10:04 ` [RFC PATCH 00/12] Ion cleanup in preparation for moving out of staging Daniel Vetter
2017-03-03 10:04   ` Daniel Vetter
2017-03-03 10:04   ` Daniel Vetter
2017-03-03 10:27   ` Daniel Vetter
2017-03-03 10:27     ` Daniel Vetter
2017-03-03 10:27     ` Daniel Vetter
2017-03-03 10:27     ` Daniel Vetter
2017-03-03 12:54     ` Benjamin Gaignard
2017-03-03 12:54       ` Benjamin Gaignard
2017-03-03 12:54       ` Benjamin Gaignard
2017-03-03 16:45   ` Laurent Pinchart
2017-03-03 16:45     ` Laurent Pinchart
2017-03-03 16:45     ` Laurent Pinchart
2017-03-03 16:45     ` Laurent Pinchart
2017-03-03 19:16     ` Laura Abbott
2017-03-03 19:16       ` Laura Abbott
2017-03-03 19:16       ` Laura Abbott
2017-03-06 10:38     ` Daniel Vetter
2017-03-06 10:38       ` Daniel Vetter
2017-03-06 10:38       ` Daniel Vetter
2017-03-06 15:02       ` Laurent Pinchart
2017-03-06 15:02         ` Laurent Pinchart
2017-03-06 15:02         ` Laurent Pinchart
2017-03-06 16:01         ` Daniel Vetter
2017-03-06 16:01           ` Daniel Vetter
2017-03-06 16:01           ` Daniel Vetter
2017-03-03 13:29 ` Michal Hocko
2017-03-03 13:29   ` Michal Hocko
2017-03-03 13:29   ` Michal Hocko
2017-03-03 17:37   ` Laura Abbott
2017-03-03 17:37     ` Laura Abbott
2017-03-03 17:37     ` Laura Abbott
2017-03-03 17:37     ` Laura Abbott
2017-03-06  7:42     ` Michal Hocko
2017-03-06  7:42       ` Michal Hocko
2017-03-06  7:42       ` Michal Hocko
2017-03-06 10:40       ` Daniel Vetter
2017-03-06 10:40         ` Daniel Vetter
2017-03-06 10:40         ` Daniel Vetter
2017-03-06 10:58         ` Mark Brown
2017-03-06 10:58           ` Mark Brown
2017-03-06 10:58           ` Mark Brown
2017-03-06 16:04           ` Daniel Vetter
2017-03-06 16:04             ` Daniel Vetter
2017-03-06 16:04             ` Daniel Vetter
2017-03-06 16:04             ` Daniel Vetter
2017-03-09 10:00             ` Benjamin Gaignard
2017-03-09 10:00               ` Benjamin Gaignard
2017-03-09 10:00               ` Benjamin Gaignard
2017-03-09 10:00               ` Benjamin Gaignard
2017-03-09 17:38               ` Laura Abbott
2017-03-09 17:38                 ` Laura Abbott
2017-03-09 17:38                 ` Laura Abbott
2017-03-09 17:38                 ` Laura Abbott
2017-03-10 10:31                 ` Brian Starkey
2017-03-10 10:31                   ` Brian Starkey
2017-03-10 10:31                   ` Brian Starkey
2017-03-10 11:46                   ` Robin Murphy
2017-03-10 11:46                     ` Robin Murphy
2017-03-10 11:46                     ` Robin Murphy
2017-03-10 14:27                     ` Brian Starkey
2017-03-10 14:27                       ` Brian Starkey
2017-03-10 14:27                       ` Brian Starkey
2017-03-10 14:27                       ` Brian Starkey
2017-03-10 16:46                       ` Laura Abbott
2017-03-10 16:46                         ` Laura Abbott
2017-03-10 16:46                         ` Laura Abbott
2017-03-10 16:46                         ` Laura Abbott
2017-03-10 12:40                   ` Daniel Vetter
2017-03-10 12:40                     ` Daniel Vetter
2017-03-10 12:40                     ` Daniel Vetter
2017-03-10 13:56                     ` Rob Clark
2017-03-10 13:56                       ` Rob Clark
2017-03-10 13:56                       ` Rob Clark
2017-03-12 13:34                 ` Benjamin Gaignard
2017-03-12 13:34                   ` Benjamin Gaignard
2017-03-12 13:34                   ` Benjamin Gaignard
2017-03-12 13:34                   ` Benjamin Gaignard
2017-03-12 19:05                   ` Daniel Vetter
2017-03-12 19:05                     ` Daniel Vetter
2017-03-12 19:05                     ` Daniel Vetter
2017-03-12 19:05                     ` Daniel Vetter
2017-03-13 21:09                     ` Laura Abbott
2017-03-13 21:09                       ` Laura Abbott
2017-03-13 21:09                       ` Laura Abbott
2017-03-13 21:09                       ` Laura Abbott
2017-03-13 21:29                       ` Rob Clark
2017-03-13 21:29                         ` Rob Clark
2017-03-13 21:29                         ` Rob Clark
2017-03-13 21:29                         ` Rob Clark
2017-03-13 21:59                         ` Laura Abbott
2017-03-13 21:59                           ` Laura Abbott
2017-03-13 21:59                           ` Laura Abbott
2017-03-14 14:47                       ` Benjamin Gaignard
2017-03-14 14:47                         ` Benjamin Gaignard
2017-03-14 14:47                         ` Benjamin Gaignard
2017-03-14 14:47                         ` Benjamin Gaignard
2017-03-14 19:45                         ` Laura Abbott
2017-03-14 19:45                           ` Laura Abbott
2017-03-14 19:45                           ` Laura Abbott
2017-03-14 20:28                         ` Nicolas Dufresne
2017-03-14 20:28                           ` Nicolas Dufresne
2017-03-14 20:28                           ` Nicolas Dufresne
2017-03-13 10:54                   ` Brian Starkey
2017-03-13 10:54                     ` Brian Starkey
2017-03-13 10:54                     ` Brian Starkey
2017-03-13 10:54                     ` Brian Starkey
2017-03-13 13:21                     ` Mark Brown [this message]
2017-03-13 13:21                       ` Mark Brown
2017-03-13 13:21                       ` Mark Brown
2017-03-13 21:45                       ` Laura Abbott
2017-03-13 21:45                         ` Laura Abbott
2017-03-13 21:45                         ` Laura Abbott
2017-03-13 21:45                         ` Laura Abbott
2017-03-13 21:29                     ` Laura Abbott
2017-03-13 21:29                       ` Laura Abbott
2017-03-13 21:29                       ` Laura Abbott
2017-03-06 13:34         ` Michal Hocko
2017-03-06 13:34           ` Michal Hocko
2017-03-06 13:34           ` Michal Hocko
2017-03-03 16:25 ` Laurent Pinchart
2017-03-03 16:25   ` Laurent Pinchart
2017-03-03 16:25   ` Laurent Pinchart
2017-03-03 19:14   ` Laura Abbott
2017-03-03 19:14     ` Laura Abbott
2017-03-03 19:14     ` Laura Abbott
2017-03-03 19:14     ` Laura Abbott

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20170313132150.324h7em7c3iowmwj@sirena.org.uk \
    --to=broonie@kernel.org \
    --cc=arve@android.com \
    --cc=benjamin.gaignard@linaro.org \
    --cc=brian.starkey@arm.com \
    --cc=daniel.vetter@intel.com \
    --cc=devel@driverdev.osuosl.org \
    --cc=dri-devel@lists.freedesktop.org \
    --cc=gregkh@linuxfoundation.org \
    --cc=labbott@redhat.com \
    --cc=linaro-mm-sig@lists.linaro.org \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-media@vger.kernel.org \
    --cc=linux-mm@kvack.org \
    --cc=mhocko@kernel.org \
    --cc=riandrews@android.com \
    --cc=romlem@google.com \
    --cc=sumit.semwal@linaro.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.