Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp3219879ybg; Mon, 28 Oct 2019 09:17:45 -0700 (PDT) X-Google-Smtp-Source: APXvYqy0qPtRAU2KFmUgN2Oo/MB/Gpjzczotd2drIA96IzJD78Jc6B5KRCUA1kUfccV3f/5onRYJ X-Received: by 2002:a17:906:1b0c:: with SMTP id o12mr17385784ejg.312.1572279464985; Mon, 28 Oct 2019 09:17:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572279464; cv=none; d=google.com; s=arc-20160816; b=n3xG321dOdi9fmeILgY43gfFC02q1ub8xAfKCGE/2vnciSxnNUGI6Djf+OTgu/Q007 7nzvQYttcp1ZNzDTUOOC9KSCSW0Z4mKJ3002TAxyXFXcFALZ8dCLUlrefv8HbWwKqnqC mTaC0xL86KrkUXD3ytXS0bLCsG0b0+At2W/SrqL9GpbQFfzWVWd/qVeuq92p07cazVOL maiQMxoK/f8J3jGfu8kWX8jbTqpp0rxh2DVpxonR2FAhAEsSd5bzkLp8WAR1aSWdknMf fL5Le44N22VPr00K9o6plAeGQv7sZpaBYxrrdWbKmtA9jpqj5ULqNFBFsddnKZvi9wy1 9VSg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=LjZUY7vw4SfmIa7j8G8Sw2zFCVpCO0qlmdgG4UDnr30=; b=NWcY6oDQA+inOyjf3ZakNmgVJzaLmk/G6H3r3VCQrFjdUBI+IEr51fSvEFhK36OwWh SY0MkughbTWwL2A7aKAof4zZrBsKhKIVZlBpqQgDsrhOeu4uZQE2RIygx8oPSUTbpv2K mUqEYuydrKj8iPt3YIXPAlLjr9JgkCVu4AaNg1kcAhuuHQcBRDr+0IFFPrINAF0eKPXz myQB5tso3sWXuaGmCPnucigRiRxlBAgpYQMYTESh5WqAczru4yJwvEj8FnpFXefX8UDO qcBwSlZgMNFjhbbgCC1Hsb+9nEkjn7rbb/nzlGF+ecIjFDMoG3hwu0VniJOC3IOAPixu VHyQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k39si8413710edb.99.2019.10.28.09.17.21; Mon, 28 Oct 2019 09:17:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732177AbfJ1HHR (ORCPT + 99 others); Mon, 28 Oct 2019 03:07:17 -0400 Received: from mga18.intel.com ([134.134.136.126]:19783 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730619AbfJ1HHQ (ORCPT ); Mon, 28 Oct 2019 03:07:16 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by orsmga106.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 28 Oct 2019 00:07:16 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.68,239,1569308400"; d="scan'208";a="205111206" Received: from black.fi.intel.com (HELO black.fi.intel.com.) ([10.237.72.28]) by FMSMGA003.fm.intel.com with ESMTP; 28 Oct 2019 00:07:14 -0700 From: Alexander Shishkin To: Greg Kroah-Hartman Cc: linux-kernel@vger.kernel.org, Alexander Shishkin Subject: [GIT PULL 0/7] intel_th: Fixes for v5.4 Date: Mon, 28 Oct 2019 09:06:44 +0200 Message-Id: <20191028070651.9770-1-alexander.shishkin@linux.intel.com> X-Mailer: git-send-email 2.23.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Greg, These are the fixes I have for the v5.4 cycle. They are 4 fixes for the buffer management code that went in in the v5.4-rc1 and 2 new PCI IDs. The IDs are CC'd to stable. All checked with static checkers and Andy Shevchenko, who was kind enough to look them over. Signed tag at the URL below. Individual patches follow. Please consider pulling or applying. Thanks! The following changes since commit 54ecb8f7028c5eb3d740bb82b0f1d90f2df63c5c: Linux 5.4-rc1 (2019-09-30 10:35:40 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/ash/stm.git intel_th-fixes-for-greg-20191028 for you to fetch changes up to 379815d9f34ef62f7f268a25c96b321396a7cbe5: intel_th: pci: Add Jasper Lake PCH support (2019-10-28 08:54:27 +0200) ---------------------------------------------------------------- intel_th: Fixes for v5.4 These are: * several fixes for buffer management added in v5.4 * two new PCI IDs ---------------------------------------------------------------- Alexander Shishkin (4): intel_th: gth: Fix the window switching sequence intel_th: msu: Fix an uninitialized mutex intel_th: pci: Add Comet Lake PCH support intel_th: pci: Add Jasper Lake PCH support Colin Ian King (2): intel_th: msu: Fix missing allocation failure check on a kstrndup intel_th: msu: Fix overflow in shift of an unsigned int Wei Yongjun (1): intel_th: msu: Fix possible memory leak in mode_store() drivers/hwtracing/intel_th/gth.c | 3 +++ drivers/hwtracing/intel_th/msu.c | 11 ++++++++--- drivers/hwtracing/intel_th/pci.c | 10 ++++++++++ 3 files changed, 21 insertions(+), 3 deletions(-) The following changes since commit 54ecb8f7028c5eb3d740bb82b0f1d90f2df63c5c: Linux 5.4-rc1 (2019-09-30 10:35:40 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/ash/stm.git tags/intel_th-fixes-for-greg-20191028 for you to fetch changes up to 379815d9f34ef62f7f268a25c96b321396a7cbe5: intel_th: pci: Add Jasper Lake PCH support (2019-10-28 08:54:27 +0200) ---------------------------------------------------------------- intel_th: Fixes for v5.4 These are: * several fixes for buffer management added in v5.4 * two new PCI IDs ---------------------------------------------------------------- Alexander Shishkin (4): intel_th: gth: Fix the window switching sequence intel_th: msu: Fix an uninitialized mutex intel_th: pci: Add Comet Lake PCH support intel_th: pci: Add Jasper Lake PCH support Colin Ian King (2): intel_th: msu: Fix missing allocation failure check on a kstrndup intel_th: msu: Fix overflow in shift of an unsigned int Wei Yongjun (1): intel_th: msu: Fix possible memory leak in mode_store() drivers/hwtracing/intel_th/gth.c | 3 +++ drivers/hwtracing/intel_th/msu.c | 11 ++++++++--- drivers/hwtracing/intel_th/pci.c | 10 ++++++++++ 3 files changed, 21 insertions(+), 3 deletions(-) -- 2.23.0