On Wed, 26 Aug 2020 at 17:03, Marek Szyprowski <m.szyprowski@xxxxxxxxxxx> wrote: > > Hi Greg, > > On 26.08.2020 15:43, Greg KH wrote: > > The following changes since commit 9123e3a74ec7b934a4a099e98af6a61c2f80bbf5: > > > > Linux 5.9-rc1 (2020-08-16 13:04:57 -0700) > > > > are available in the Git repository at: > > > > git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb.git tags/usb-5.9-rc3 > > > > for you to fetch changes up to 23e26d0577535f5ffe4ff8ed6d06e009553c0bca: > > > > usb: typec: tcpm: Fix Fix source hard reset response for TDA 2.3.1.1 and TDA 2.3.1.2 failures (2020-08-25 16:02:35 +0200) > > > > ---------------------------------------------------------------- > > USB fixes for 5.9-rc3 > > > > Here are a small set of USB fixes for 5.9-rc3. > > > > Like most set of USB bugfixes, they include the usual: > > - usb gadget driver fixes > > - xhci driver fixes > > - typec fixes > > - new qurks and ids > > - fixes for USB patches merged in 5.9-rc1 > > > > Nothing huge, all of these have been in linux-next with no reported > > issues: > > > > Signed-off-by: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx> > > > > ---------------------------------------------------------------- > > Alan Stern (1): > > USB: yurex: Fix bad gfp argument > > > > Andy Shevchenko (1): > > usb: hcd: Fix use after free in usb_hcd_pci_remove() > > > > Badhri Jagan Sridharan (1): > > usb: typec: tcpm: Fix Fix source hard reset response for TDA 2.3.1.1 and TDA 2.3.1.2 failures > > > > Bastien Nocera (2): > > USB: Also match device drivers using the ->match vfunc > > USB: Fix device driver race > > > > Brooke Basile (2): > > USB: gadget: u_f: add overflow checks to VLA macros > > Sorry, but the above patch breaks USB Ethernet Gadget operation. It also > didn't get the proper testing in linux-next (next-20200826 is the first > one with this patch). > Hi Greg, I have a different question - why is this patch not findable on any LKML lists? lore.kernel.org does not have it. Neither has mine inbox tracking most of the lists (also main linux-kernel). Maybe subject changed? Do we have another process of sending patches for fast inclusion in the Linux kernel? Is addressing a HW vulnerability? Best regards, Krzysztof