Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp2151199pxv; Sun, 11 Jul 2021 04:22:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz16H/fY8pSUfZvItLMTjTX8OjbWDdIto5f7rqLsanNhMvDS30j19Zxeiy2+0QV+g1FZKf7 X-Received: by 2002:a17:906:2b54:: with SMTP id b20mr24274696ejg.17.1626002578209; Sun, 11 Jul 2021 04:22:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626002578; cv=none; d=google.com; s=arc-20160816; b=WGAQ0jGQkwXeNelrGeEfX1id38h0pG3M/tYGYroWBzRLwf8uw9hvrnDarDrkightEi mRk8Yqoxnn5gFMgK6WOHrVV74SSh0napv/zakg2yIQxp3iDqnOFux5315pMHkL0D/FvO 5zlNXi0OJaTBhos+ewK8NMc2PXEKN0gx86oullIzX/fNkzhdus8+i/xdXR1dHZAyWjBx /e8G9dGwM5UfEbKDI+h7BvEt0lEUPlzmcIhD5FnE7zhLM6bOOArsAK1t8y+eXqCO0uCn gmyp6IwWJp8rPMCm9Jmrc6bEoQLRoeNG/wdhKgwVHyBiXcYr7Gg/SKLt37ZSuo/AM8ES sQlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=GFo+YbxHlkKPYP3WK3hVI86dViCOWK0PGCNFmuHGUvk=; b=LkHwevzUDyoKx6pPXPvNLPN8f8KqhVnMXAWw0U35xZU/Mq/kdpJgKElAEbgz4DibNf +oZZWxtDr6wuT4HMP7zzH3Wvl2e0xIkGhQRFvCPYz/AOJycyekDeV6hDlwBZs/+zB9iJ ExBks8vUuries7NbRfSUx08H9JeN1da+NeErdipck/j/UukmB2SADm6mf9R8NXGNKaRl HaklmapB2Dp+FARJOoUcFYxLaF2LQQ6IsylImQYNk6RSpF+v6EBoRBaATycaO7AFz6L7 iJpy6K1iGq94kes4wzinGtS3+irio5Z8s77N4YCSxIu2a2APRC5qbHpJEsBurW0pFyWz YPVw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=cFh6wjtm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s7si16815257ejd.294.2021.07.11.04.22.36; Sun, 11 Jul 2021 04:22:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=cFh6wjtm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232544AbhGKLYQ (ORCPT + 99 others); Sun, 11 Jul 2021 07:24:16 -0400 Received: from mail.kernel.org ([198.145.29.99]:44814 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232481AbhGKLYM (ORCPT ); Sun, 11 Jul 2021 07:24:12 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 470F161220; Sun, 11 Jul 2021 11:21:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626002485; bh=f+biP7pVln/wvqfCEZcClck16jxtb8qYVOIEDUGH5lc=; h=From:To:Cc:Subject:Date:From; b=cFh6wjtmhE4ANir1o3BNsLyb2Y8LPegK09U92uh2RQ0lzMgqWeMLr6dpJq25ZrLK0 Y0oOcxEtnULP3nM1d9fJ1MTW0bCm5TwrTyBkfVQ0nNPOZ1LnT2QzoKvPESPLE+NfLc W/0nRWIhzABY/Otn/4vv9wcbeDYN/6Ieapv9uAis= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org, akpm@linux-foundation.org, torvalds@linux-foundation.org, stable@vger.kernel.org Cc: lwn@lwn.net, jslaby@suse.cz, Greg Kroah-Hartman Subject: Linux 5.4.131 Date: Sun, 11 Jul 2021 13:21:19 +0200 Message-Id: <16260024781516@kroah.com> X-Mailer: git-send-email 2.32.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org I'm announcing the release of the 5.4.131 kernel. All users of the 5.4 kernel series must upgrade. The updated 5.4.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.4.y and can be browsed at the normal kernel.org git web browser: https://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary thanks, greg k-h ------------ Makefile | 2 +- arch/s390/include/asm/stacktrace.h | 18 +++++++++++------- arch/x86/kvm/svm.c | 33 ++++++++++++++++++++++----------- drivers/xen/events/events_base.c | 23 +++++++++++++++++++---- 4 files changed, 53 insertions(+), 23 deletions(-) Alper Gun (1): KVM: SVM: Call SEV Guest Decommission if ASID binding fails David Rientjes (1): KVM: SVM: Periodically schedule when unregistering regions on destroy Greg Kroah-Hartman (1): Linux 5.4.131 Heiko Carstens (1): s390/stack: fix possible register corruption with stack switch helper Juergen Gross (1): xen/events: reset active flag for lateeoi events later