stable.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: linux-kernel@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
	stable@vger.kernel.org,
	Jukka Rissanen <jukka.rissanen@linux.intel.com>,
	Marcel Holtmann <marcel@holtmann.org>
Subject: [PATCH 3.14 070/110] Bluetooth: 6LoWPAN: Fix MAC address universal/local bit handling
Date: Sat, 28 Jun 2014 10:47:07 -0700	[thread overview]
Message-ID: <20140628174549.727473866@linuxfoundation.org> (raw)
In-Reply-To: <20140628174545.354748696@linuxfoundation.org>

3.14-stable review patch.  If anyone has any objections, please let me know.

------------------

From: Jukka Rissanen <jukka.rissanen@linux.intel.com>

commit 62bbd5b35994eaf30519f126765d7f6af9cd3526 upstream.

The universal/local bit handling was incorrectly done in the code.

So when setting EUI address from BD address we do this:
- If BD address type is PUBLIC, then we clear the universal bit
  in EUI address. If the address type is RANDOM, then the universal
  bit is set (BT 6lowpan draft chapter 3.2.2)
- After this we invert the universal/local bit according to RFC 2464

When figuring out BD address we do the reverse:
- Take EUI address from stateless IPv6 address, invert the
  universal/local bit according to RFC 2464
- If universal bit is 1 in this modified EUI address, then address
  type is set to RANDOM, otherwise it is PUBLIC

Note that 6lowpan_iphc.[ch] does the final toggling of U/L bit
before sending or receiving the network packet.

Signed-off-by: Jukka Rissanen <jukka.rissanen@linux.intel.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

---
 net/bluetooth/6lowpan.c |   65 +++++++++++++++++++++++++-----------------------
 1 file changed, 35 insertions(+), 30 deletions(-)

--- a/net/bluetooth/6lowpan.c
+++ b/net/bluetooth/6lowpan.c
@@ -420,12 +420,18 @@ static int conn_send(struct l2cap_conn *
 	return 0;
 }
 
-static void get_dest_bdaddr(struct in6_addr *ip6_daddr,
-			    bdaddr_t *addr, u8 *addr_type)
+static u8 get_addr_type_from_eui64(u8 byte)
 {
-	u8 *eui64;
+	/* Is universal(0) or local(1) bit,  */
+	if (byte & 0x02)
+		return ADDR_LE_DEV_RANDOM;
 
-	eui64 = ip6_daddr->s6_addr + 8;
+	return ADDR_LE_DEV_PUBLIC;
+}
+
+static void copy_to_bdaddr(struct in6_addr *ip6_daddr, bdaddr_t *addr)
+{
+	u8 *eui64 = ip6_daddr->s6_addr + 8;
 
 	addr->b[0] = eui64[7];
 	addr->b[1] = eui64[6];
@@ -433,16 +439,19 @@ static void get_dest_bdaddr(struct in6_a
 	addr->b[3] = eui64[2];
 	addr->b[4] = eui64[1];
 	addr->b[5] = eui64[0];
+}
+
+static void convert_dest_bdaddr(struct in6_addr *ip6_daddr,
+				bdaddr_t *addr, u8 *addr_type)
+{
+	copy_to_bdaddr(ip6_daddr, addr);
 
-	addr->b[5] ^= 2;
+	/* We need to toggle the U/L bit that we got from IPv6 address
+	 * so that we get the proper address and type of the BD address.
+	 */
+	addr->b[5] ^= 0x02;
 
-	/* Set universal/local bit to 0 */
-	if (addr->b[5] & 1) {
-		addr->b[5] &= ~1;
-		*addr_type = ADDR_LE_DEV_PUBLIC;
-	} else {
-		*addr_type = ADDR_LE_DEV_RANDOM;
-	}
+	*addr_type = get_addr_type_from_eui64(addr->b[5]);
 }
 
 static int header_create(struct sk_buff *skb, struct net_device *netdev,
@@ -473,9 +482,11 @@ static int header_create(struct sk_buff
 		/* Get destination BT device from skb.
 		 * If there is no such peer then discard the packet.
 		 */
-		get_dest_bdaddr(&hdr->daddr, &addr, &addr_type);
+		convert_dest_bdaddr(&hdr->daddr, &addr, &addr_type);
 
-		BT_DBG("dest addr %pMR type %d", &addr, addr_type);
+		BT_DBG("dest addr %pMR type %s IP %pI6c", &addr,
+		       addr_type == ADDR_LE_DEV_PUBLIC ? "PUBLIC" : "RANDOM",
+		       &hdr->daddr);
 
 		read_lock_irqsave(&devices_lock, flags);
 		peer = peer_lookup_ba(dev, &addr, addr_type);
@@ -556,7 +567,7 @@ static netdev_tx_t bt_xmit(struct sk_buf
 	} else {
 		unsigned long flags;
 
-		get_dest_bdaddr(&lowpan_cb(skb)->addr, &addr, &addr_type);
+		convert_dest_bdaddr(&lowpan_cb(skb)->addr, &addr, &addr_type);
 		eui64_addr = lowpan_cb(skb)->addr.s6_addr + 8;
 		dev = lowpan_dev(netdev);
 
@@ -564,8 +575,10 @@ static netdev_tx_t bt_xmit(struct sk_buf
 		peer = peer_lookup_ba(dev, &addr, addr_type);
 		read_unlock_irqrestore(&devices_lock, flags);
 
-		BT_DBG("xmit from %s to %pMR (%pI6c) peer %p", netdev->name,
-		       &addr, &lowpan_cb(skb)->addr, peer);
+		BT_DBG("xmit %s to %pMR type %s IP %pI6c peer %p",
+		       netdev->name, &addr,
+		       addr_type == ADDR_LE_DEV_PUBLIC ? "PUBLIC" : "RANDOM",
+		       &lowpan_cb(skb)->addr, peer);
 
 		if (peer && peer->conn)
 			err = send_pkt(peer->conn, netdev->dev_addr,
@@ -620,13 +633,13 @@ static void set_addr(u8 *eui, u8 *addr,
 	eui[6] = addr[1];
 	eui[7] = addr[0];
 
-	eui[0] ^= 2;
-
-	/* Universal/local bit set, RFC 4291 */
+	/* Universal/local bit set, BT 6lowpan draft ch. 3.2.1 */
 	if (addr_type == ADDR_LE_DEV_PUBLIC)
-		eui[0] |= 1;
+		eui[0] &= ~0x02;
 	else
-		eui[0] &= ~1;
+		eui[0] |= 0x02;
+
+	BT_DBG("type %d addr %*phC", addr_type, 8, eui);
 }
 
 static void set_dev_addr(struct net_device *netdev, bdaddr_t *addr,
@@ -634,7 +647,6 @@ static void set_dev_addr(struct net_devi
 {
 	netdev->addr_assign_type = NET_ADDR_PERM;
 	set_addr(netdev->dev_addr, addr->b, addr_type);
-	netdev->dev_addr[0] ^= 2;
 }
 
 static void ifup(struct net_device *netdev)
@@ -684,13 +696,6 @@ static int add_peer_conn(struct l2cap_co
 
 	memcpy(&peer->eui64_addr, (u8 *)&peer->peer_addr.s6_addr + 8,
 	       EUI64_ADDR_LEN);
-	peer->eui64_addr[0] ^= 2; /* second bit-flip (Universe/Local)
-				   * is done according RFC2464
-				   */
-
-	raw_dump_inline(__func__, "peer IPv6 address",
-			(unsigned char *)&peer->peer_addr, 16);
-	raw_dump_inline(__func__, "peer EUI64 address", peer->eui64_addr, 8);
 
 	write_lock_irqsave(&devices_lock, flags);
 	INIT_LIST_HEAD(&peer->list);



  parent reply	other threads:[~2014-06-28 17:47 UTC|newest]

Thread overview: 108+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-06-28 17:45 [PATCH 3.14 000/110] 3.14.10-stable review Greg Kroah-Hartman
2014-06-28 17:45 ` [PATCH 3.14 001/110] Revert "net: eth: cpsw: Correctly attach to GPIO bitbang MDIO driver" Greg Kroah-Hartman
2014-06-28 17:45 ` [PATCH 3.14 002/110] can: peak_pci: prevent use after free at netdev removal Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 003/110] af_iucv: wrong mapping of sent and confirmed skbs Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 004/110] net: cpsw: fix null dereference at probe Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 005/110] extcon: max8997: Fix NULL pointer exception on missing pdata Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 006/110] extcon: max77693: Fix two NULL pointer exceptions " Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 007/110] extcon: max14577: Fix probe failure on successful work queue Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 008/110] extcon: max14577: Properly handle regmap_irq_get_virq error Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 010/110] staging: tidspbridge: check for CONFIG_SND_OMAP_SOC_MCBSP Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 011/110] Staging: rtl8188eu: overflow in update_sta_support_rate() Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 012/110] staging/mt29f_spinand: Terminate of match table Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 013/110] applicom: dereferencing NULL on error path Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 014/110] usb: usbtest: fix unlink write error with pattern 1 Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 015/110] USB: usbtest: add a timeout for scatter-gather tests Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 016/110] usb: gadget: rename CONFIG_USB_GADGET_PXA25X Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 017/110] usb: dwc3: gadget: clear stall when disabling endpoint Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 018/110] ARM: OMAP: replace checks for CONFIG_USB_GADGET_OMAP Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 019/110] USB: EHCI: avoid BIOS handover on the HASEE E200 Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 020/110] USB: option: fix runtime PM handling Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 021/110] hugetlb: restrict hugepage_migration_support() to x86_64 Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 022/110] kthread: fix return value of kthread_create() upon SIGKILL Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 023/110] mm: vmscan: do not throttle based on pfmemalloc reserves if node has no ZONE_NORMAL Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 024/110] mm: page_alloc: use word-based accesses for get/set pageblock bitmaps Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 025/110] mm/memory-failure.c-failure: send right signal code to correct thread Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 026/110] mm/memory-failure.c: dont let collect_procs() skip over processes for MF_ACTION_REQUIRED Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 027/110] mm/memory-failure.c: support use of a dedicated thread to handle SIGBUS(BUS_MCEERR_AO) Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 028/110] mm: fix sleeping function warning from __put_anon_vma Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 029/110] HID: core: fix validation of report id 0 Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 030/110] mm: vmscan: clear kswapds special reclaim powers before exiting Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 031/110] ptrace: fix fork event messages across pid namespaces Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 032/110] arm64: ptrace: change fs when passing kernel pointer to regset code Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 033/110] arm64: ptrace: fix empty registers set in prstatus of aarch32 process core Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 034/110] idr: fix overflow bug during maximum ID calculation at maximum height Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 035/110] s390/time: cast tv_nsec to u64 prior to shift in update_vsyscall Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 036/110] s390/lowcore: reserve 96 bytes for IRB in lowcore Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 037/110] ext4: fix data integrity sync in ordered mode Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 038/110] ext4: fix zeroing of page during writeback Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 039/110] ext4: fix wrong assert in ext4_mb_normalize_request() Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 040/110] matroxfb: perform a dummy read of M_STATUS Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 041/110] USB: usb_wwan: fix urb leak in write error path Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 042/110] USB: usb_wwan: fix race between write and resume Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 043/110] USB: usb_wwan: fix write and suspend race Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 044/110] USB: usb_wwan: fix urb leak at shutdown Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 045/110] USB: usb_wwan: fix potential NULL-deref at resume Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 046/110] USB: usb_wwan: fix potential blocked I/O after resume Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 047/110] USB: sierra: fix AA deadlock in open error path Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 048/110] USB: sierra: fix use after free at suspend/resume Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 049/110] USB: sierra: fix urb and memory leak in resume error path Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 050/110] USB: sierra: fix urb and memory leak on disconnect Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 051/110] USB: sierra: fix remote wakeup Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 052/110] usb: qcserial: add Netgear AirCard 341U Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 053/110] usb: qcserial: add additional Sierra Wireless QMI devices Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 054/110] USB: serial: fix potential runtime pm imbalance at device remove Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 055/110] media: ivtv: Fix Oops when no firmware is loaded Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 056/110] media: stk1160: Avoid stack-allocated buffer for control URBs Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 058/110] ACPICA: utstring: Check array index bound before use Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 059/110] ACPI: Fix conflict between customized DSDT and DSDT local copy Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 060/110] rtmutex: Detect changes in the pi lock chain Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 061/110] rtmutex: Handle deadlock detection smarter Greg Kroah-Hartman
2014-06-28 17:46 ` [PATCH 3.14 062/110] rtmutex: Plug slow unlock race Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 063/110] media: uvcvideo: Fix clock param realtime setting Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 065/110] media: saa7134: fix regression with tvtime Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 066/110] ARM: stacktrace: avoid listing stacktrace functions in stacktrace Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 067/110] ARM: 8037/1: mm: support big-endian page tables Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 068/110] PM / OPP: fix incorrect OPP count handling in of_init_opp_table Greg Kroah-Hartman
2014-06-28 17:47 ` Greg Kroah-Hartman [this message]
2014-06-28 17:47 ` [PATCH 3.14 072/110] Target/iser: Bail from accept_np if np_thread is trying to close Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 073/110] Target/iser: Fix hangs in connection teardown Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 074/110] Target/iser: Improve cm events handling Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 075/110] Target/iser: Wait for proper cleanup before unloading Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 076/110] target: Set CMD_T_ACTIVE bit for Task Management Requests Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 077/110] target: Use complete_all for se_cmd->t_transport_stop_comp Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 078/110] iscsi-target: Fix ABORT_TASK + connection reset iscsi_queue_req memory leak Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 079/110] Target/iscsi: Fix sendtargets response pdu for iser transport Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 080/110] target: Report correct response length for some commands Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 081/110] [PATCH] target: Explicitly clear ramdisk_mcp backend pages Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 082/110] SCSI: Fix spurious request sense in error handling Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 083/110] ARM: mvebu: DT: fix OpenBlocks AX3-4 RAM size Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 084/110] arm64/dma: Removing ARCH_HAS_DMA_GET_REQUIRED_MASK macro Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 085/110] x86-32, espfix: Remove filter for espfix32 due to race Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 086/110] x86, x32: Use compat shims for io_{setup,submit} Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 087/110] genirq: Sanitize spurious interrupt detection of threaded irqs Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 088/110] aio: fix aio request leak when events are reaped by userspace Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 089/110] aio: fix kernel memory disclosure in io_getevents() introduced in v3.10 Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 090/110] CIFS: Fix memory leaks in SMB2_open Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 091/110] Btrfs: fix double free in find_lock_delalloc_range Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 092/110] btrfs: Add ctime/mtime update for btrfs device add/remove Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 093/110] Btrfs: output warning instead of error when loading free space cache failed Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 094/110] Btrfs: make sure there are not any read requests before stopping workers Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 095/110] Btrfs: fix NULL pointer crash of deleting a seed device Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 096/110] Btrfs: mark mapping with error flag to report errors to userspace Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 097/110] Btrfs: set right total device count for seeding support Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 098/110] Btrfs: send, dont error in the presence of subvols/snapshots Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 099/110] fs: btrfs: volumes.c: Fix for possible null pointer dereference Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 100/110] Btrfs: dont check nodes for extent items Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 101/110] Btrfs: use right type to get real comparison Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 102/110] Btrfs: fix scrub_print_warning to handle skinny metadata extents Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 103/110] btrfs: fix use of uninit "ret" in end_extent_writepage() Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 104/110] btrfs: fix lockdep warning with reclaim lock inversion Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 105/110] btrfs: allocate raid type kobjects dynamically Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 106/110] lz4: fix another possible overrun Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 108/110] epoll: fix use-after-free in eventpoll_release_file Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 109/110] builddeb: use $OBJCOPY variable instead of objcopy Greg Kroah-Hartman
2014-06-28 17:47 ` [PATCH 3.14 110/110] efi-pstore: Fix an overflow on 32-bit builds Greg Kroah-Hartman
2014-06-28 22:31 ` [PATCH 3.14 000/110] 3.14.10-stable review Guenter Roeck
2014-06-29  9:34 ` Holger Hoffstätte
2014-06-30 16:18 ` Shuah Khan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20140628174549.727473866@linuxfoundation.org \
    --to=gregkh@linuxfoundation.org \
    --cc=jukka.rissanen@linux.intel.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=marcel@holtmann.org \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).