Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp1800022pxb; Thu, 16 Sep 2021 16:14:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyNs6yXfpcBawKHjTf9OyP/AtpEJzUMiTCv/+y5dBrLoCUmSpDQvfQ1z5d30bvqgx0jjoq6 X-Received: by 2002:a50:be87:: with SMTP id b7mr7325767edk.333.1631834086620; Thu, 16 Sep 2021 16:14:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631834086; cv=none; d=google.com; s=arc-20160816; b=Qsj+++zkrHnSyC9VSnmP7xpteNDv3Dyc2by7TYQ11ngU4Ml2ayQ2NqWJm/XpenwC6I UGPIDj9D4nCfyZzLTHN8tY9uoyHlotSXdB6uqxQKRgj1FRwwDqAMZgrm+YChjZVCsUKM 2UGqPf19Hlrs2t7i6af0wXdY2uOu5J3lOh0YaN3s+Obdu1xG7PFJANWwBynS0yI8Fxiw 1AYjoIdJJ2mqpCJN2IEon00KuncA5qODH4rCX1seaEprHUXOQ/AFS/mZzQR9McFlo3yC suy+WjtdXEL3lsgnLlwpNYwbCKRgYpFo44mq1e6/fOUeM2/bshGC2+6MFWb+twR6hg/9 hpjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=iJIvu7K7WFwrkELtHCS0mQ6JiK4xE4ofYKdJo/yb4/Q=; b=wLnxkZwV0yYEjwWEB2Wd1PVyf9RtSIXzk4JXcFZMZon3saXAoPdlc4Vhqn2jwF1d/H qiHrEVICTy+BcYjPesr7BNcFnyndDshL4T5IPXFcQSUuIhbVEfwAwkMl5W+HG5k7h7rJ dfgtoC4JspVBdIj1mLgdldKAIfRwzAQT9wT5uwRcmetp6QlFSmTTKoGF6K3zWiiAlOxt TYva8zMQujWXEKqDrPuGhQR8wOMrTxndaszhe+pbWgKPVKSvEGxrsec2OGJTCUt2HWBn IFeXSoPkPpImEZ/vmMn+BdYqLWZX7/9EO2tNtQnSNTPZvy/Houau9xv/WTU7jERFOu0N 9JAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=u3DzDkpl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l4si6776524edj.282.2021.09.16.16.14.22; Thu, 16 Sep 2021 16:14:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=u3DzDkpl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240868AbhIPQvn (ORCPT + 99 others); Thu, 16 Sep 2021 12:51:43 -0400 Received: from mail.kernel.org ([198.145.29.99]:57408 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344669AbhIPQqb (ORCPT ); Thu, 16 Sep 2021 12:46:31 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 09C156112E; Thu, 16 Sep 2021 16:26:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1631809596; bh=hXTmkclbLkPq43POKeL3I734PIXlNy0QX0S35lmmUX0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=u3DzDkplFog+Vimu6LUZbZ+CvbkhA1iPbhk6CyVOe6ODrVFl2HQ/AoYENFghpu/1S xgv9ReRDMS3peD9P9wGXIVP1yQq1fIr5s2dQJSMNAaKxUQWRHUglwhTPT9SDQoSl6z vPhnXVV8h4TAYiWh8JJbs5oyYJtw1WAOVppHqvao= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Eric Auger , Sasha Levin Subject: [PATCH 5.13 180/380] misc/pvpanic-pci: Allow automatic loading Date: Thu, 16 Sep 2021 17:58:57 +0200 Message-Id: <20210916155810.194741203@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210916155803.966362085@linuxfoundation.org> References: <20210916155803.966362085@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Eric Auger [ Upstream commit 28b6a003bcdfa1fc4603b9185b247ecca7af9bef ] The virtual machine monitor (QEMU) exposes the pvpanic-pci device to the guest. On guest side the module exists but currently isn't loaded automatically. So the driver fails to be probed and does not its job of handling guest panic events. Instead of requiring manual modprobe, let's include a device database using the MODULE_DEVICE_TABLE macro and let the module auto-load when the guest gets exposed with such a pvpanic-pci device. Signed-off-by: Eric Auger Link: https://lore.kernel.org/r/20210629072214.901004-1-eric.auger@redhat.com Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/misc/pvpanic/pvpanic-pci.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/misc/pvpanic/pvpanic-pci.c b/drivers/misc/pvpanic/pvpanic-pci.c index 046ce4ecc195..4a3250564442 100644 --- a/drivers/misc/pvpanic/pvpanic-pci.c +++ b/drivers/misc/pvpanic/pvpanic-pci.c @@ -119,4 +119,6 @@ static struct pci_driver pvpanic_pci_driver = { }, }; +MODULE_DEVICE_TABLE(pci, pvpanic_pci_id_tbl); + module_pci_driver(pvpanic_pci_driver); -- 2.30.2