[Xen-devel] [PATCH 5.1 279/405] block: avoid to break XEN by multi-page bvec

2019-05-29 Thread Greg Kroah-Hartman
[ Upstream commit db5ebd6edd2627d7e81a031643cf43587f63e66c ] XEN has special page merge requirement, see xen_biovec_phys_mergeable(). We can't merge pages into one bvec simply for XEN. So move XEN's specific check on page merge into __bio_try_merge_page(), then abvoid to break XEN by multi-page b

[Xen-devel] [PATCH 5.1 280/405] block: pass page to xen_biovec_phys_mergeable

2019-05-29 Thread Greg Kroah-Hartman
[ Upstream commit 0383ad4374f7ad7edd925a2ee4753035c3f5508a ] xen_biovec_phys_mergeable() only needs .bv_page of the 2nd bio bvec for checking if the two bvecs can be merged, so pass page to xen_biovec_phys_mergeable() directly. No function change. Cc: ris Ostrovsky Cc: Juergen Gross Cc: xen-de

[Xen-devel] [PATCH 5.0 252/346] block: pass page to xen_biovec_phys_mergeable

2019-05-29 Thread Greg Kroah-Hartman
[ Upstream commit 0383ad4374f7ad7edd925a2ee4753035c3f5508a ] xen_biovec_phys_mergeable() only needs .bv_page of the 2nd bio bvec for checking if the two bvecs can be merged, so pass page to xen_biovec_phys_mergeable() directly. No function change. Cc: ris Ostrovsky Cc: Juergen Gross Cc: xen-de

[Xen-devel] [PATCH 4.14 019/105] x86/dump_pagetables: Fix LDT remap address marker

2019-01-11 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 254eb5505ca0ca749d3a491fc6668b6c16647a99 ] The LDT remap placement has been changed. It's now placed before the direct mapping in the kernel virtual address space for both paging mod

[Xen-devel] [PATCH 4.14 018/105] x86/mm: Fix guard hole handling

2019-01-11 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 16877a5570e0c5f4270d5b17f9bab427bcae9514 ] There is a guard hole at the beginning of the kernel address space, also used by hypervisors. It occupies 16 PGD entries. This reserved ra

[Xen-devel] [PATCH 4.19 030/148] x86/dump_pagetables: Fix LDT remap address marker

2019-01-11 Thread Greg Kroah-Hartman
4.19-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 254eb5505ca0ca749d3a491fc6668b6c16647a99 ] The LDT remap placement has been changed. It's now placed before the direct mapping in the kernel virtual address space for both paging mod

[Xen-devel] [PATCH 4.19 029/148] x86/mm: Fix guard hole handling

2019-01-11 Thread Greg Kroah-Hartman
4.19-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 16877a5570e0c5f4270d5b17f9bab427bcae9514 ] There is a guard hole at the beginning of the kernel address space, also used by hypervisors. It occupies 16 PGD entries. This reserved ra

Re: [Xen-devel] [PATCH 21/21] memblock: drop memblock_alloc_*_nopanic() variants

2019-01-18 Thread Greg Kroah-Hartman
/page_ext.c | 2 +- > mm/percpu.c| 11 --- > mm/sparse.c| 6 ++ > 14 files changed, 37 insertions(+), 114 deletions(-) Acked-by: Greg Kroah-Hartman ___ Xen-devel mailing list Xen-devel@lists.

[Xen-devel] [PATCH 6/6] x86: xen: no need to check return value of debugfs_create functions

2019-01-22 Thread Greg Kroah-Hartman
Petkov Cc: "H. Peter Anvin" Cc: Cc: Signed-off-by: Greg Kroah-Hartman --- arch/x86/xen/debugfs.c | 7 +-- arch/x86/xen/p2m.c | 3 --- 2 files changed, 1 insertion(+), 9 deletions(-) diff --git a/arch/x86/xen/debugfs.c b/arch/x86/xen/debugfs.c index 13da87918b4f..532410998

[Xen-devel] [PATCH 4.20 083/117] x86/entry/64/compat: Fix stack switching for XEN PV

2019-01-29 Thread Greg Kroah-Hartman
e112802780020d...@prv1-mh.provo.novell.com Signed-off-by: Greg Kroah-Hartman --- arch/x86/entry/entry_64_compat.S |6 -- 1 file changed, 4 insertions(+), 2 deletions(-) --- a/arch/x86/entry/entry_64_compat.S +++ b/arch/x86/entry/entry_64_compat.S @@ -361,7 +361,8 @@ ENTRY(

[Xen-devel] [PATCH 4.19 075/103] x86/entry/64/compat: Fix stack switching for XEN PV

2019-01-29 Thread Greg Kroah-Hartman
e112802780020d...@prv1-mh.provo.novell.com Signed-off-by: Greg Kroah-Hartman --- arch/x86/entry/entry_64_compat.S |6 -- 1 file changed, 4 insertions(+), 2 deletions(-) --- a/arch/x86/entry/entry_64_compat.S +++ b/arch/x86/entry/entry_64_compat.S @@ -356,7 +356,8 @@ ENTRY(

Re: [Xen-devel] [PATCH 15/34] staging/vc04_services: convert put_page() to put_user_page*()

2019-08-03 Thread Greg Kroah-Hartman
s is part a tree-wide conversion, as described in commit fc1d8e7cca2d > ("mm: introduce put_user_page*(), placeholder versions"). > > Cc: Eric Anholt > Cc: Stefan Wahren > Cc: Greg Kroah-Hartman > Cc: Mihaela Muraru > Cc: Suniel Mahesh > Cc: Al Viro &

Re: [Xen-devel] [PATCH 10/34] genwqe: convert put_page() to put_user_page*()

2019-08-03 Thread Greg Kroah-Hartman
; was wrong anyway, because the get_user_pages() pattern of usage here > never allowed for NULL entries within a range of pinned pages. > > Cc: Frank Haverkamp > Cc: "Guilherme G. Piccoli" > Cc: Arnd Bergmann > Cc: Greg Kroah-Hartman > Signed-off-by: John Hubbard >

[Xen-devel] [PATCH] xen-netback: no need to check return value of debugfs_create functions

2019-08-10 Thread Greg Kroah-Hartman
Kroah-Hartman --- drivers/net/xen-netback/netback.c | 3 -- drivers/net/xen-netback/xenbus.c | 46 --- 2 files changed, 11 insertions(+), 38 deletions(-) diff --git a/drivers/net/xen-netback/netback.c b/drivers/net/xen-netback/netback.c index 1d9940d4e8c7

[Xen-devel] [PATCH 4.19 054/152] pvcalls-front: Avoid get_free_pages(GFP_KERNEL) under spinlock

2019-02-25 Thread Greg Kroah-Hartman
4.19-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 9f51c05dc41a6d69423e3d03d18eb7ab22f9ec19 ] The problem is that we call this with a spin lock held. The call tree is: pvcalls_front_accept() holds bedata->socket_lock. -> create_a

[Xen-devel] [PATCH 4.19 078/152] pvcalls-front: fix potential null dereference

2019-02-25 Thread Greg Kroah-Hartman
4.19-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit b4711098066f1cf808d4dc11a1a842860a3292fe ] static checker warning: drivers/xen/pvcalls-front.c:373 alloc_active_ring() error: we previously assumed 'map->active.ring' could

[Xen-devel] [PATCH 4.20 096/183] pvcalls-front: fix potential null dereference

2019-02-25 Thread Greg Kroah-Hartman
4.20-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit b4711098066f1cf808d4dc11a1a842860a3292fe ] static checker warning: drivers/xen/pvcalls-front.c:373 alloc_active_ring() error: we previously assumed 'map->active.ring' could

[Xen-devel] [PATCH 4.20 063/183] pvcalls-front: Avoid get_free_pages(GFP_KERNEL) under spinlock

2019-02-25 Thread Greg Kroah-Hartman
4.20-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 9f51c05dc41a6d69423e3d03d18eb7ab22f9ec19 ] The problem is that we call this with a spin lock held. The call tree is: pvcalls_front_accept() holds bedata->socket_lock. -> create_a

[Xen-devel] [PATCH 4.19 135/219] xen/gntdev: Use select for DMA_SHARED_BUFFER

2019-12-29 Thread Greg Kroah-Hartman
From: Jason Gunthorpe [ Upstream commit fa6614d8ef13c63aac52ad7c07c5e69ce4aba3dd ] DMA_SHARED_BUFFER can not be enabled by the user (it represents a library set in the kernel). The kconfig convention is to use select for such symbols so they are turned on implicitly when the user enables a kconf

[Xen-devel] [PATCH 5.4 259/434] xen/gntdev: Use select for DMA_SHARED_BUFFER

2019-12-29 Thread Greg Kroah-Hartman
From: Jason Gunthorpe [ Upstream commit fa6614d8ef13c63aac52ad7c07c5e69ce4aba3dd ] DMA_SHARED_BUFFER can not be enabled by the user (it represents a library set in the kernel). The kconfig convention is to use select for such symbols so they are turned on implicitly when the user enables a kconf

[Xen-devel] [PATCH 4.4 29/86] x86/entry/64: Remove %ebx handling from error_entry/exit

2018-11-29 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit b3681dd548d06deb2e1573890829dff4b15abf46 ] error_entry and error_exit communicate the user vs. kernel status of the frame using %ebx. This is unnecessary -- the information is in reg

[Xen-devel] [PATCH 4.15 036/122] x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend

2018-03-07 Thread Greg Kroah-Hartman
/20180226140818.4849-1-jgr...@suse.com Signed-off-by: Greg Kroah-Hartman --- arch/x86/xen/suspend.c | 16 1 file changed, 16 insertions(+) --- a/arch/x86/xen/suspend.c +++ b/arch/x86/xen/suspend.c @@ -1,12 +1,15 @@ // SPDX-License-Identifier: GPL-2.0 #include #include +#include

[Xen-devel] [PATCH 4.14 031/110] x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend

2018-03-07 Thread Greg Kroah-Hartman
/20180226140818.4849-1-jgr...@suse.com Signed-off-by: Greg Kroah-Hartman --- arch/x86/xen/suspend.c | 16 1 file changed, 16 insertions(+) --- a/arch/x86/xen/suspend.c +++ b/arch/x86/xen/suspend.c @@ -1,12 +1,15 @@ // SPDX-License-Identifier: GPL-2.0 #include #include +#include

[Xen-devel] [PATCH 4.9 15/65] x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend

2018-03-09 Thread Greg Kroah-Hartman
/20180226140818.4849-1-jgr...@suse.com Signed-off-by: Greg Kroah-Hartman --- arch/x86/xen/suspend.c | 16 1 file changed, 16 insertions(+) --- a/arch/x86/xen/suspend.c +++ b/arch/x86/xen/suspend.c @@ -1,11 +1,14 @@ #include #include +#include #include #include #include

[Xen-devel] [PATCH 4.15 123/146] x86/xen: Calculate __max_logical_packages on PV domains

2018-03-13 Thread Greg Kroah-Hartman
ergen Gross Cc: Dou Liyang Cc: Prarit Bhargava Cc: Kate Stewart Cc: Greg Kroah-Hartman Cc: Andy Lutomirski Cc: Andi Kleen Cc: Vitaly Kuznetsov Cc: xen-devel@lists.xenproject.org Reviewed-by: Boris Ostrovsky Signed-off-by: Juergen Gross Signed-off-by: Greg Kroah-Hartman --- arch/x86/incl

[Xen-devel] [PATCH 4.14 002/157] x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths

2018-07-01 Thread Greg Kroah-Hartman
ris.ostrov...@oracle.com Cc: xen-devel@lists.xenproject.org Fixes: 1f50ddb4f4189243c05926b842dc1a0332195f31 ("x86/speculation: Handle HT correctly on AMD") Link: https://lore.kernel.org/lkml/20180621084331.21228-1-jgr...@suse.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman

[Xen-devel] [PATCH 4.17 002/220] x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths

2018-07-01 Thread Greg Kroah-Hartman
ris.ostrov...@oracle.com Cc: xen-devel@lists.xenproject.org Fixes: 1f50ddb4f4189243c05926b842dc1a0332195f31 ("x86/speculation: Handle HT correctly on AMD") Link: https://lore.kernel.org/lkml/20180621084331.21228-1-jgr...@suse.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman

[Xen-devel] [PATCH 4.9 17/52] x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths

2018-07-10 Thread Greg Kroah-Hartman
ris.ostrov...@oracle.com Cc: xen-devel@lists.xenproject.org Fixes: 1f50ddb4f4189243c05926b842dc1a0332195f31 ("x86/speculation: Handle HT correctly on AMD") Link: https://lore.kernel.org/lkml/20180621084331.21228-1-jgr...@suse.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman ---

[Xen-devel] [PATCH 4.4 036/107] x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend

2018-07-23 Thread Greg Kroah-Hartman
/20180226140818.4849-1-jgr...@suse.com Signed-off-by: Greg Kroah-Hartman Signed-off-by: Srivatsa S. Bhat Reviewed-by: Matt Helsley (VMware) Reviewed-by: Alexey Makhalov Reviewed-by: Bo Gan Signed-off-by: Greg Kroah-Hartman --- arch/x86/xen/suspend.c | 16 1 file changed, 16

[Xen-devel] [PATCH 4.4 098/107] x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths

2018-07-23 Thread Greg Kroah-Hartman
ris.ostrov...@oracle.com Cc: xen-devel@lists.xenproject.org Fixes: 1f50ddb4f4189243c05926b842dc1a0332195f31 ("x86/speculation: Handle HT correctly on AMD") Link: https://lore.kernel.org/lkml/20180621084331.21228-1-jgr...@suse.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman Signe

[Xen-devel] [PATCH 4.17 19/31] x86/entry/64: Remove %ebx handling from error_entry/exit

2018-08-04 Thread Greg Kroah-Hartman
.1532282627.git.l...@kernel.org Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/entry/entry_64.S | 18 -- 1 file changed, 4 insertions(+), 14 deletions(-) --- a/arch/x86/entry/entry_64.S +++ b/arch/x86/entry/entry_64.S @@ -981,7 +981,7 @@ ENTRY(

[Xen-devel] [PATCH 4.14 15/23] x86/entry/64: Remove %ebx handling from error_entry/exit

2018-08-04 Thread Greg Kroah-Hartman
.1532282627.git.l...@kernel.org Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/entry/entry_64.S | 18 -- 1 file changed, 4 insertions(+), 14 deletions(-) --- a/arch/x86/entry/entry_64.S +++ b/arch/x86/entry/entry_64.S @@ -933,7 +933,7 @@ ENTRY(

[Xen-devel] [PATCH 4.16 201/279] x86/xen: Reset VCPU0 info pointer after shared_info remap

2018-06-18 Thread Greg Kroah-Hartman
y: Eduardo Valentin Reviewed-by: Alakesh Haloi Reviewed-by: Vallish Vaidyeshwara Reviewed-by: Boris Ostrovsky Cc: Juergen Gross Cc: Boris Ostrovsky Cc: xen-devel@lists.xenproject.org Signed-off-by: Boris Ostrovsky Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- ar

[Xen-devel] [PATCH 4.14 131/189] x86/xen: Reset VCPU0 info pointer after shared_info remap

2018-06-18 Thread Greg Kroah-Hartman
y: Eduardo Valentin Reviewed-by: Alakesh Haloi Reviewed-by: Vallish Vaidyeshwara Reviewed-by: Boris Ostrovsky Cc: Juergen Gross Cc: Boris Ostrovsky Cc: xen-devel@lists.xenproject.org Signed-off-by: Boris Ostrovsky Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- ar

[Xen-devel] [PATCH 4.17 05/21] xen/pv: Call get_cpu_address_sizes to set x86_virt/phys_bits

2018-08-16 Thread Greg Kroah-Hartman
roject.org Cc: x...@kernel.org Cc: sta...@vger.kernel.org # for v4.17 and up Fixes: d94a155c59c9 ("x86/cpu: Prevent cpuinfo_x86::x86_phys_bits adjustment corruption") Signed-off-by: Boris Ostrovsky Signed-off-by: Greg Kroah-Hartman --- arch/x86/kernel/cpu/common.c |2 +- arch/x8

[Xen-devel] [PATCH 4.18 06/22] xen/pv: Call get_cpu_address_sizes to set x86_virt/phys_bits

2018-08-16 Thread Greg Kroah-Hartman
roject.org Cc: x...@kernel.org Cc: sta...@vger.kernel.org # for v4.17 and up Fixes: d94a155c59c9 ("x86/cpu: Prevent cpuinfo_x86::x86_phys_bits adjustment corruption") Signed-off-by: Boris Ostrovsky Signed-off-by: Greg Kroah-Hartman --- arch/x86/kernel/cpu/common.c |2 +- arch/x8

Re: [Xen-devel] [PATCH RFC 1/2] drivers/base: export lock_device_hotplug/unlock_device_hotplug

2018-08-17 Thread Greg Kroah-Hartman
On Fri, Aug 17, 2018 at 09:59:00AM +0200, David Hildenbrand wrote: > From: Vitaly Kuznetsov > > Well require to call add_memory()/add_memory_resource() with > device_hotplug_lock held, to avoid a lock inversion. Allow external modules > (e.g. hv_balloon) that make use of add_memory()/add_memory_r

Re: [Xen-devel] [PATCH RFC 1/2] drivers/base: export lock_device_hotplug/unlock_device_hotplug

2018-08-17 Thread Greg Kroah-Hartman
On Fri, Aug 17, 2018 at 11:41:24AM +0200, David Hildenbrand wrote: > On 17.08.2018 11:03, Rafael J. Wysocki wrote: > > On Fri, Aug 17, 2018 at 10:56 AM David Hildenbrand wrote: > >> > >> On 17.08.2018 10:41, Greg Kroah-Hartman wrote: > >>> On Fri,

Re: [Xen-devel] [PATCH RFC 1/2] drivers/base: export lock_device_hotplug/unlock_device_hotplug

2018-08-17 Thread Greg Kroah-Hartman
On Fri, Aug 17, 2018 at 01:56:35PM +0200, David Hildenbrand wrote: > E.g. When adding the memory block devices, we know that there won't be a > driver to attach to (as there are no drivers for the "memory" subsystem) > - the bus_probe_device() function that takes the device_lock() could > pretty mu

[Xen-devel] [PATCH 4.9 001/130] x86/entry/64: Remove %ebx handling from error_entry/exit

2018-08-23 Thread Greg Kroah-Hartman
.1532282627.git.l...@kernel.org Signed-off-by: Ingo Molnar Signed-off-by: Sarah Newman Signed-off-by: Greg Kroah-Hartman --- arch/x86/entry/entry_64.S | 20 1 file changed, 4 insertions(+), 16 deletions(-) --- a/arch/x86/entry/entry_64.S +++ b/arch/x86/entry/entry_64.S

[Xen-devel] [PATCH 4.14 105/173] x86/EISA: Dont probe EISA bus for Xen PV guests

2018-09-24 Thread Greg Kroah-Hartman
org/r/20180911195538.23289-1-boris.ostrov...@oracle.com Signed-off-by: Greg Kroah-Hartman --- arch/x86/kernel/eisa.c | 10 -- 1 file changed, 8 insertions(+), 2 deletions(-) --- a/arch/x86/kernel/eisa.c +++ b/arch/x86/kernel/eisa.c @@ -7,11 +7,17 @@ #include #include +#include + static _

[Xen-devel] [PATCH 4.18 141/235] x86/EISA: Dont probe EISA bus for Xen PV guests

2018-09-24 Thread Greg Kroah-Hartman
org/r/20180911195538.23289-1-boris.ostrov...@oracle.com Signed-off-by: Greg Kroah-Hartman --- arch/x86/kernel/eisa.c | 10 -- 1 file changed, 8 insertions(+), 2 deletions(-) --- a/arch/x86/kernel/eisa.c +++ b/arch/x86/kernel/eisa.c @@ -7,11 +7,17 @@ #include #include +#include + static _

[Xen-devel] [PATCH 4.4 01/74] x86/asm/32: Make sync_core() handle missing CPUID on all 32-bit kernels

2018-01-29 Thread Greg Kroah-Hartman
ovsky Cc: xen-devel Link: http://lkml.kernel.org/r/685bd083a7c036f7769510b6846315b17d6ba71f.1481307769.git.l...@kernel.org Signed-off-by: Thomas Gleixner Cc: "Zhang, Ning A" Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/processor.h |2 +- 1 file changed, 1 insertion

[Xen-devel] [PATCH 3.18 20/52] x86/asm/32: Make sync_core() handle missing CPUID on all 32-bit kernels

2018-01-29 Thread Greg Kroah-Hartman
ovsky Cc: xen-devel Link: http://lkml.kernel.org/r/685bd083a7c036f7769510b6846315b17d6ba71f.1481307769.git.l...@kernel.org Signed-off-by: Thomas Gleixner Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/processor.h |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/arc

[Xen-devel] [PATCH 4.9 01/66] x86/asm/32: Make sync_core() handle missing CPUID on all 32-bit kernels

2018-01-29 Thread Greg Kroah-Hartman
ovsky Cc: xen-devel Link: http://lkml.kernel.org/r/685bd083a7c036f7769510b6846315b17d6ba71f.1481307769.git.l...@kernel.org Signed-off-by: Thomas Gleixner Cc: "Zhang, Ning A" Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/processor.h |2 +- 1 file changed, 1 insertion

[Xen-devel] [PATCH 4.14 124/156] x86/xen: Support early interrupts in xen pv guests

2018-02-02 Thread Greg Kroah-Hartman
-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/segment.h | 12 arch/x86/mm/extable.c |4 +++- arch/x86/xen/enlighten_pv.c| 37 - arch/x86/xen/xen-asm_64.S | 14 ++ 4 files

[Xen-devel] [PATCH 4.19 042/361] x86/xen: Fix boot loader version reported for PVH guests

2018-11-11 Thread Greg Kroah-Hartman
com Cc: b...@alien8.de Cc: cor...@lwn.net Cc: linux-...@vger.kernel.org Cc: xen-devel@lists.xenproject.org Link: http://lkml.kernel.org/r/20181010061456.22238-2-jgr...@suse.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/xen/enlighten_pvh.c |2 +- 1 file chan

[Xen-devel] [PATCH 4.18 037/350] x86/xen: Fix boot loader version reported for PVH guests

2018-11-11 Thread Greg Kroah-Hartman
com Cc: b...@alien8.de Cc: cor...@lwn.net Cc: linux-...@vger.kernel.org Cc: xen-devel@lists.xenproject.org Link: http://lkml.kernel.org/r/20181010061456.22238-2-jgr...@suse.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/xen/enlighten_pvh.c |2 +- 1 file chan

[Xen-devel] [PATCH 4.14 020/222] x86/xen: Fix boot loader version reported for PVH guests

2018-11-11 Thread Greg Kroah-Hartman
com Cc: b...@alien8.de Cc: cor...@lwn.net Cc: linux-...@vger.kernel.org Cc: xen-devel@lists.xenproject.org Link: http://lkml.kernel.org/r/20181010061456.22238-2-jgr...@suse.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/xen/enlighten_pvh.c |2 +- 1 file chan

[Xen-devel] [PATCH 4.14 065/159] x86/virt: Add enum for hypervisors to replace x86_hyper

2017-12-22 Thread Greg Kroah-Hartman
: rkrc...@redhat.com Cc: sthem...@microsoft.com Cc: virtualizat...@lists.linux-foundation.org Cc: xen-devel@lists.xenproject.org Link: http://lkml.kernel.org/r/20171109132739.23465-3-jgr...@suse.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/hyperv/hv_init.c

[Xen-devel] [PATCH 4.14 064/159] x86/virt, x86/platform: Merge struct x86_hyper into struct x86_platform and struct x86_init

2017-12-22 Thread Greg Kroah-Hartman
...@rustcorp.com.au Cc: sthem...@microsoft.com Cc: virtualizat...@lists.linux-foundation.org Cc: xen-devel@lists.xenproject.org Link: http://lkml.kernel.org/r/20171109132739.23465-2-jgr...@suse.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/hypervisor.h

[Xen-devel] [PATCH 4.14 074/159] x86/entry/64/paravirt: Use paravirt-safe macro to access eflags

2017-12-22 Thread Greg Kroah-Hartman
ff-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/entry/entry_64.S|7 --- arch/x86/include/asm/irqflags.h |3 +++ arch/x86/include/asm/paravirt.h |9 + arch/x86/kernel/asm-offsets_64.c |3 +++ 4 files changed, 19 insertions(+), 3 deletions(-)

Re: [PATCH v2 2/7] kernel/resource: move and rename IORESOURCE_MEM_DRIVER_MANAGED

2020-09-09 Thread Greg Kroah-Hartman
liams > Cc: Jason Gunthorpe > Cc: Kees Cook > Cc: Ard Biesheuvel > Cc: Pankaj Gupta > Cc: Baoquan He > Cc: Wei Yang > Cc: Eric Biederman > Cc: Thomas Gleixner > Cc: Greg Kroah-Hartman > Cc: ke...@lists.infradead.org > Signed-off-by: David Hildenbrand > --

Re: [PATCH v2 3/7] mm/memory_hotplug: prepare passing flags to add_memory() and friends

2020-09-09 Thread Greg Kroah-Hartman
On Tue, Sep 08, 2020 at 10:10:08PM +0200, David Hildenbrand wrote: > We soon want to pass flags, e.g., to mark added System RAM resources. > mergeable. Prepare for that. What are these random "flags", and how do we know what should be passed to them? Why not make this an enumerated type so that w

[PATCH 4.4 67/86] x86/paravirt: Remove the unused irq_enable_sysexit pv op

2020-05-18 Thread Greg Kroah-Hartman
rix.com Cc: konrad.w...@oracle.com Cc: virtualizat...@lists.linux-foundation.org Cc: xen-devel@lists.xenproject.org Link: http://lkml.kernel.org/r/1447970147-1733-3-git-send-email-boris.ostrov...@oracle.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/entry/

Re: [PATCH v2 20/39] docs: ABI: testing: make the files compatible with ReST output

2020-11-02 Thread Greg Kroah-Hartman
On Mon, Nov 02, 2020 at 12:04:36PM +0100, Fabrice Gasnier wrote: > On 10/30/20 11:09 AM, Mauro Carvalho Chehab wrote: > > Em Fri, 30 Oct 2020 10:19:12 +0100 > > Fabrice Gasnier escreveu: > > > >> Hi Mauro, > >> > >> [...] > >> > >>> > >>> +What: > >>> /sys/bus/iio/devices/iio:device

[PATCH 5.4 05/85] linkage: Introduce new macros for assembler symbols

2020-11-09 Thread Greg Kroah-Hartman
Cc: Pavel Machek Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: Will Deacon Cc: x86-ml Cc: xen-devel@lists.xenproject.org Link: https://lkml.kernel.org/r/2019105108.12392-2-jsl...@suse.cz Cc: Jian Cai Signed-off-by: Greg Kroah-Hartman --- Documentation/asm-an

[PATCH 5.4 01/62] x86/asm/32: Add ENDs to some functions and relabel with SYM_CODE_*

2021-01-15 Thread Greg Kroah-Hartman
From: Jiri Slaby commit 78762b0e79bc1dd01347be061abdf505202152c9 upstream. All these are functions which are invoked from elsewhere but they are not typical C functions. So annotate them using the new SYM_CODE_START. All these were not balanced with any END, so mark their ends by SYM_CODE_END, a

Re: [PATCH for-4.19.y] xen/privcmd: allow fetching resource sizes

2021-01-30 Thread Greg Kroah-Hartman
On Fri, Jan 29, 2021 at 01:22:15PM +0100, Roger Pau Monne wrote: > commit ef3a575baf53571dc405ee4028e26f50856898e7 upstream. > Now queued up, thanks. greg k-h

Re: [PATCH] xen: don't reschedule in preemption off sections

2020-08-19 Thread Greg Kroah-Hartman
On Thu, Aug 20, 2020 at 07:13:00AM +0200, Jürgen Groß wrote: > On 19.08.20 18:57, Sarah Newman wrote: > > On 7/10/20 5:01 AM, Jürgen Groß wrote: > > > On 10.07.20 13:55, Jan Beulich wrote: > > > > On 10.07.2020 12:50, Jürgen Groß wrote: > > > > > On 10.07.20 11:49, Jan Beulich wrote: > > > > > > On

Re: [PATCH] xen: don't reschedule in preemption off sections

2020-08-19 Thread Greg Kroah-Hartman
On Thu, Aug 20, 2020 at 07:58:55AM +0200, Jürgen Groß wrote: > On 20.08.20 07:44, Greg Kroah-Hartman wrote: > > On Thu, Aug 20, 2020 at 07:13:00AM +0200, Jürgen Groß wrote: > > > On 19.08.20 18:57, Sarah Newman wrote: > > > > On 7/10/20 5:01 AM, Jürgen Groß wrote: &g

[PATCH 5.8 121/148] Fix build error when CONFIG_ACPI is not set/enabled:

2020-08-24 Thread Greg Kroah-Hartman
From: Randy Dunlap [ Upstream commit ee87e1557c42dc9c2da11c38e11b87c311569853 ] ../arch/x86/pci/xen.c: In function ‘pci_xen_init’: ../arch/x86/pci/xen.c:410:2: error: implicit declaration of function ‘acpi_noirq_set’; did you mean ‘acpi_irq_get’? [-Werror=implicit-function-declaration] acpi_

[PATCH 5.7 104/124] Fix build error when CONFIG_ACPI is not set/enabled:

2020-08-24 Thread Greg Kroah-Hartman
From: Randy Dunlap [ Upstream commit ee87e1557c42dc9c2da11c38e11b87c311569853 ] ../arch/x86/pci/xen.c: In function ‘pci_xen_init’: ../arch/x86/pci/xen.c:410:2: error: implicit declaration of function ‘acpi_noirq_set’; did you mean ‘acpi_irq_get’? [-Werror=implicit-function-declaration] acpi_

[PATCH 5.4 093/107] Fix build error when CONFIG_ACPI is not set/enabled:

2020-08-24 Thread Greg Kroah-Hartman
From: Randy Dunlap [ Upstream commit ee87e1557c42dc9c2da11c38e11b87c311569853 ] ../arch/x86/pci/xen.c: In function ‘pci_xen_init’: ../arch/x86/pci/xen.c:410:2: error: implicit declaration of function ‘acpi_noirq_set’; did you mean ‘acpi_irq_get’? [-Werror=implicit-function-declaration] acpi_

[PATCH 4.19 57/71] Fix build error when CONFIG_ACPI is not set/enabled:

2020-08-24 Thread Greg Kroah-Hartman
From: Randy Dunlap [ Upstream commit ee87e1557c42dc9c2da11c38e11b87c311569853 ] ../arch/x86/pci/xen.c: In function ‘pci_xen_init’: ../arch/x86/pci/xen.c:410:2: error: implicit declaration of function ‘acpi_noirq_set’; did you mean ‘acpi_irq_get’? [-Werror=implicit-function-declaration] acpi_

Re: [RFC PATCH 10/13] staging: rts5280: Use always-managed version of pci_intx()

2024-10-09 Thread Greg Kroah-Hartman
; > rts5208 enables its PCI-Device with pcim_enable_device(). Thus, it needs the > always-managed version. > > Replace pci_intx() with pcim_intx(). > > Signed-off-by: Philipp Stanner > --- > drivers/staging/rts5208/rtsx.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) Acked-by: Greg Kroah-Hartman

Re: [PATCH 13/13] PCI: Deprecate pci_intx(), pcim_intx()

2024-10-15 Thread Greg Kroah-Hartman
On Tue, Oct 15, 2024 at 08:51:23PM +0200, Philipp Stanner wrote: > pci_intx() and its managed counterpart pcim_intx() only exist for older > drivers which have not been ported yet for various reasons. Future > drivers should preferably use pci_alloc_irq_vectors(). > > Mark pci_intx() and pcim_intx

Re: [RFC PATCH 10/13] staging: rts5280: Use always-managed version of pci_intx()

2024-10-10 Thread Greg Kroah-Hartman
On Thu, Oct 10, 2024 at 10:03:30AM +0200, Philipp Stanner wrote: > On Wed, 2024-10-09 at 21:41 +0200, Philipp Hortmann wrote: > > On 10/9/24 11:38, Greg Kroah-Hartman wrote: > > > On Wed, Oct 09, 2024 at 10:35:16AM +0200, Philipp Stanner wrote: > > > > pci_intx()

Re: [PATCH] xen/usb: harden xen_hcd against malicious backends

2022-03-15 Thread Greg Kroah-Hartman
On Fri, Mar 11, 2022 at 11:35:09AM +0100, Juergen Gross wrote: > Make sure a malicious backend can't cause any harm other than wrong > I/O data. > > Missing are verification of the request id in a response, sanitizing > the reported actual I/O length, and protection against interrupt storms > from

Re: [PATCH] xen/usb: harden xen_hcd against malicious backends

2022-03-16 Thread Greg Kroah-Hartman
On Wed, Mar 16, 2022 at 06:29:00AM +0100, Juergen Gross wrote: > On 15.03.22 18:41, Greg Kroah-Hartman wrote: > > On Fri, Mar 11, 2022 at 11:35:09AM +0100, Juergen Gross wrote: > > > Make sure a malicious backend can't cause any harm other than wrong > > > I/

Re: [PATCH 04/18] xen/usb: switch xen-hcd to use INVALID_GRANT_REF

2022-04-20 Thread Greg Kroah-Hartman
tions(+), 8 deletions(-) Acked-by: Greg Kroah-Hartman

Re: [PATCH 16/18] xen/usbfront: use xenbus_setup_ring() and xenbus_teardown_ring()

2022-04-20 Thread Greg Kroah-Hartman
- > 1 file changed, 13 insertions(+), 42 deletions(-) Acked-by: Greg Kroah-Hartman

Re: [PATCH] drivers/xen: use helper macro __ATTR_RW

2022-03-05 Thread Greg Kroah-Hartman
On Sat, Mar 05, 2022 at 09:38:23PM +0800, zhanglianjie wrote: > Use helper macro __ATTR_RW to define HYPERVISOR_ATTR_RW to make code more > clear. > Minor readability improvement. > > Signed-off-by: zhanglianjie Is this the name you sign legal documents with? (I have to ask...) > > diff --gi

Re: [PATCH] drivers/xen: use helper macro __ATTR_RW

2022-03-05 Thread Greg Kroah-Hartman
On Sat, Mar 05, 2022 at 11:33:58PM +0800, zhanglianjie wrote: > Hi, > > 在 2022/3/5 21:55, Greg Kroah-Hartman 写道: > > On Sat, Mar 05, 2022 at 09:38:23PM +0800, zhanglianjie wrote: > > > Use helper macro __ATTR_RW to define HYPERVISOR_ATTR_RW to make code more > > &g

Re: Backport request

2022-08-24 Thread Greg Kroah-Hartman
On Wed, Aug 24, 2022 at 01:20:22PM +0200, Juergen Gross wrote: > Hi Greg, > > stable kernels 5.18 and 5.15 seem to be missing upstream patch > c64cc2802a78 ("x86/entry: Move CLD to the start of the idtentry macro"). > This is a prerequisite patch for 64cbd0acb582 ("x86/entry: Don't call > error_en

Re: Backport request

2022-08-25 Thread Greg Kroah-Hartman
On Wed, Aug 24, 2022 at 03:52:27PM +0200, Juergen Gross wrote: > On 24.08.22 14:10, Greg Kroah-Hartman wrote: > > On Wed, Aug 24, 2022 at 01:20:22PM +0200, Juergen Gross wrote: > > > Hi Greg, > > > > > > stable kernels 5.18 and 5.15 seem to be missing upstream

Re: Backport of 166d38632316 ("xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE")

2022-07-23 Thread Greg Kroah-Hartman
On Fri, Jul 22, 2022 at 11:44:10PM -0400, Demi Marie Obenour wrote: > This series backports upstream commit 166d3863231667c4f64dee72b77d1102cdfad11f > to all supported stable kernel trees. All now queued up, thanks. greg k-h

Re: Backport of commit 3de218ff39b9e3f0d4

2021-07-08 Thread Greg Kroah-Hartman
On Mon, Jul 05, 2021 at 01:58:09PM +0200, Juergen Gross wrote: > Hi Greg, > > the attached patch is a backport of upstream commit 3de218ff39b9e3f0d4 > for Linux 5.10 and older (I've checked it to apply down to 4.4). Now applied, thanks. greg k-h

Re: [PATCH v4 0/5] bus: Make remove callback return void

2021-07-21 Thread Greg Kroah-Hartman
On Tue, Jul 13, 2021 at 09:35:17PM +0200, Uwe Kleine-König wrote: > Hello, > > this is v4 of the final patch set for my effort to make struct > bus_type::remove return void. > > The first four patches contain cleanups that make some of these > callbacks (more obviously) always return 0. They are

Re: [PATCH v4 0/5] bus: Make remove callback return void

2021-07-22 Thread Greg Kroah-Hartman
On Wed, Jul 21, 2021 at 12:09:41PM +0200, Greg Kroah-Hartman wrote: > On Tue, Jul 13, 2021 at 09:35:17PM +0200, Uwe Kleine-König wrote: > > Hello, > > > > this is v4 of the final patch set for my effort to make struct > > bus_type::remove return void. > > &

Re: [PATCH v1 0/5] PCI: Drop duplicated tracking of a pci_dev's bound driver

2021-07-29 Thread Greg Kroah-Hartman
ated tracking of a pci_dev's bound driver Other than my objection to patch 5/5 lack of changelog, looks sane to me: Acked-by: Greg Kroah-Hartman

Re: Request for adding patch to stable-5.13

2021-08-16 Thread Greg Kroah-Hartman
On Mon, Aug 16, 2021 at 01:09:52PM +0200, Juergen Gross wrote: > Greg, > > could you please add upstream commit 05d69d950d9d8 ("xen-blkfront: > sanitize the removal state machine") to the stable 5.13 kernel? > > The patch seems not to have a "Cc: stable" tag while it fixes an > issue introduced i

Re: [PATCH 5.4] xen-netback: move removal of "hotplug-status" to the right place

2022-12-19 Thread Greg Kroah-Hartman
On Mon, Dec 19, 2022 at 04:37:10PM +0100, Pratyush Yadav wrote: > The removal of "hotplug-status" has moved around a bit. First it was > moved from netback_remove() to hotplug_status_changed() in upstream > commit 1f2565780e9b ("xen-netback: remove 'hotplug-status' once it has > served its purpose"

[PATCH v2 14/16] xen/xenbus: move to_xenbus_device() to use container_of_const()

2023-01-11 Thread Greg Kroah-Hartman
Stabellini Cc: Oleksandr Tyshchenko Cc: xen-devel@lists.xenproject.org Signed-off-by: Greg Kroah-Hartman --- include/xen/xenbus.h | 5 + 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/include/xen/xenbus.h b/include/xen/xenbus.h index eaa932b99d8a..b31f77f9c50c 100644 --- a/include/xen

Re: [PATCH 3/3] usb: xhci: Notify xen when DbC is unsafe to use

2021-05-12 Thread Greg Kroah-Hartman
On Tue, May 11, 2021 at 06:18:21PM -0600, Connor Davis wrote: > When running as a dom0 guest on Xen, check if the USB3 debug > capability is enabled before xHCI reset, suspend, and resume. If it > is, call xen_dbgp_reset_prep() to notify Xen that it is unsafe to touch > MMIO registers until the nex

Re: [PATCH 8/8] xen/hvc: replace BUG_ON() with negative return value

2021-05-13 Thread Greg Kroah-Hartman
On Thu, May 13, 2021 at 12:03:02PM +0200, Juergen Gross wrote: > Xen frontends shouldn't BUG() in case of illegal data received from > their backends. So replace the BUG_ON()s when reading illegal data from > the ring page with negative return values. > > Signed-off-by: Juergen Gross > --- > dri

Re: [PATCH v2 0/4] Support xen-driven USB3 debug capability

2021-05-13 Thread Greg Kroah-Hartman
On Thu, May 13, 2021 at 06:56:47PM -0600, Connor Davis wrote: > Hi all, > > This goal of this series is to allow the USB3 debug capability (DbC) to be > safely used by xen while linux runs as dom0. Patch 2/4 does not seem to be showing up anywhere, did it get lost? thanks, greg k-h

Re: [PATCH 5.10] x86/xen: Drop USERGS_SYSRET64 paravirt call

2024-05-22 Thread Greg Kroah-Hartman
On Wed, May 22, 2024 at 06:20:15PM -0700, Pawan Gupta wrote: > From: Juergen Gross > > commit afd30525a659ac0ae0904f0cb4a2ca75522c3123 upstream. Now queued up, thanks. greg k-h

Re: [PATCH v7 0/9] Allow dynamic allocation of software IO TLB bounce buffers

2023-07-31 Thread Greg Kroah-Hartman
larger pool > from CMA (not implemented in this series yet). > > I have no good explanation for the increase in performance of the > 24-thread I/O test with the default (non-growing) memory pool. Although the > difference is within variance, it seems to be real. The average bandwidth > is consistently above that of the unpatched kernel. > > To sum it up: > > - All workloads benefit from reduced memory footprint. > - No performance regressions have been observed with the default size of > the software IO TLB. > - Most workloads retain their former performance even if the software IO > TLB grows at run time. > For the driver-core touched portions: Reviewed-by: Greg Kroah-Hartman

Re: [PATCH 08/11] sysctl: Add size to register_sysctl_init

2023-06-21 Thread Greg Kroah-Hartman
On Wed, Jun 21, 2023 at 11:09:57AM +0200, Joel Granados wrote: > static int __init random_sysctls_init(void) > { > - register_sysctl_init("kernel/random", random_table); > + register_sysctl_init("kernel/random", random_table, > + ARRAY_SIZE(random_table)); As men

Re: [PATCH v3 1/7] swiotlb: make io_tlb_default_mem local to swiotlb.c

2023-06-27 Thread Greg Kroah-Hartman
On Tue, Jun 27, 2023 at 11:54:23AM +0200, Petr Tesarik wrote: > +/** > + * is_swiotlb_active() - check if the software IO TLB is initialized > + * @dev: Device to check, or %NULL for the default IO TLB. > + */ > bool is_swiotlb_active(struct device *dev) > { > - struct io_tlb_mem *mem = d

Re: [PATCH v3 4/7] swiotlb: if swiotlb is full, fall back to a transient memory pool

2023-07-06 Thread Greg Kroah-Hartman
On Thu, Jul 06, 2023 at 03:50:55AM +, Michael Kelley (LINUX) wrote: > From: Petr Tesarik Sent: Tuesday, June 27, 2023 > 2:54 AM > > > > Try to allocate a transient memory pool if no suitable slots can be found, > > except when allocating from a restricted pool. The transient pool is just > >

Re: [PATCH v3 4/7] swiotlb: if swiotlb is full, fall back to a transient memory pool

2023-07-07 Thread Greg Kroah-Hartman
On Thu, Jul 06, 2023 at 02:22:50PM +, Michael Kelley (LINUX) wrote: > From: Greg Kroah-Hartman Sent: Thursday, July 6, > 2023 1:07 AM > > > > On Thu, Jul 06, 2023 at 03:50:55AM +, Michael Kelley (LINUX) wrote: > > > From: Petr Tesarik Sent: Tuesday, June

Re: [PATCH v2 1/3] hvc/xen: fix event channel handling for secondary consoles

2023-10-21 Thread Greg Kroah-Hartman
On Fri, Oct 20, 2023 at 05:15:27PM +0100, David Woodhouse wrote: > From: David Woodhouse > > The xencons_connect_backend() function allocates a local interdomain > event channel with xenbus_alloc_evtchn(), then calls > bind_interdomain_evtchn_to_irq_lateeoi() to bind to that port# on the > *remot

[PATCH 5.4 10/18] x86/asm: Allow to pass macros to __ASM_FORM()

2022-05-13 Thread Greg Kroah-Hartman
-by: Greg Kroah-Hartman --- arch/x86/include/asm/asm.h |8 +--- 1 file changed, 5 insertions(+), 3 deletions(-) --- a/arch/x86/include/asm/asm.h +++ b/arch/x86/include/asm/asm.h @@ -7,9 +7,11 @@ # define __ASM_FORM_RAW(x) x # define __ASM_FORM_COMMA(x) x, #else -# define __ASM_FORM(x

[PATCH 5.4 11/18] x86: xen: kvm: Gather the definition of emulate prefixes

2022-05-13 Thread Greg Kroah-Hartman
@devnote2 Signed-off-by: Maximilian Heyne Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/emulate_prefix.h | 14 ++ arch/x86/include/asm/xen/interface.h | 11 --- arch/x86/kvm/x86.c|4 +++- 3 files changed, 21 insertions(+), 8 deletions

[PATCH 5.4 12/18] x86: xen: insn: Decode Xen and KVM emulate-prefix signature

2022-05-13 Thread Greg Kroah-Hartman
.org Cc: Randy Dunlap Link: https://lkml.kernel.org/r/156777564986.25081.4964537658500952557.stgit@devnote2 [mheyne: resolved contextual conflict in tools/objtools/sync-check.sh] Signed-off-by: Maximilian Heyne Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/insn.h

[PATCH 5.4 13/18] x86: kprobes: Prohibit probing on instruction which has emulate prefix

2022-05-13 Thread Greg Kroah-Hartman
f Link: https://lkml.kernel.org/r/156777566048.25081.6296162369492175325.stgit@devnote2 Signed-off-by: Maximilian Heyne Signed-off-by: Greg Kroah-Hartman --- arch/x86/kernel/kprobes/core.c |4 1 file changed, 4 insertions(+) --- a/arch/x86/kernel/kprobes/core.c +++ b/arch/x86/kernel/kprobes/c

Re: Patches for stable 5.10 kernel

2021-11-29 Thread Greg Kroah-Hartman
On Mon, Nov 29, 2021 at 08:19:18AM +0100, Juergen Gross wrote: > Hi Greg, > > could you please add the following upstream patches to the stable 5.10 > kernel (I'll send separate mails for the older stable kernels as some > of the patches don't apply for those)? They are hardening Xen PV > frontend

Re: Stable backports of Xen related patches

2021-11-29 Thread Greg Kroah-Hartman
On Mon, Nov 29, 2021 at 04:15:31PM +0100, Juergen Gross wrote: > Hi Greg, > > attached are git bundles for some patches you merged into the 5.10 > stable kernel already this morning. > > Naming should be obvious, the patches are on the branch "back" in > each bundle. All now queued up, thanks!

  1   2   >