From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
patches@lists.linux.dev, linux-kernel@vger.kernel.org,
torvalds@linux-foundation.org, akpm@linux-foundation.org,
linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org,
lkft-triage@lists.linaro.org, pavel@denx.de,
jonathanh@nvidia.com, f.fainelli@gmail.com,
sudipm.mukherjee@gmail.com, srw@sladewatkins.net, rwarsow@gmx.de
Subject: [PATCH 5.10 00/63] 5.10.162-rc1 review
Date: Tue, 3 Jan 2023 09:13:30 +0100 [thread overview]
Message-ID: <20230103081308.548338576@linuxfoundation.org> (raw)
This is the start of the stable review cycle for the 5.10.162 release.
There are 63 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Thu, 05 Jan 2023 08:12:47 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.162-rc1.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Linux 5.10.162-rc1
Jens Axboe <axboe@kernel.dk>
io_uring: pass in EPOLL_URING_WAKE for eventfd signaling and wakeups
Jens Axboe <axboe@kernel.dk>
eventfd: provide a eventfd_signal_mask() helper
Jens Axboe <axboe@kernel.dk>
eventpoll: add EPOLL_URING_WAKE poll wakeup flag
Jens Axboe <axboe@kernel.dk>
Revert "proc: don't allow async path resolution of /proc/self components"
Jens Axboe <axboe@kernel.dk>
Revert "proc: don't allow async path resolution of /proc/thread-self components"
Jens Axboe <axboe@kernel.dk>
net: remove cmsg restriction from io_uring based send/recvmsg calls
Jens Axboe <axboe@kernel.dk>
task_work: unconditionally run task_work from get_signal()
Jens Axboe <axboe@kernel.dk>
signal: kill JOBCTL_TASK_WORK
Jens Axboe <axboe@kernel.dk>
io_uring: import 5.15-stable io_uring
Jens Axboe <axboe@kernel.dk>
task_work: add helper for more targeted task_work canceling
Jens Axboe <axboe@kernel.dk>
kernel: don't call do_exit() for PF_IO_WORKER threads
Jens Axboe <axboe@kernel.dk>
kernel: stop masking signals in create_io_thread()
Stefan Metzmacher <metze@samba.org>
x86/process: setup io_threads more like normal user space threads
Jens Axboe <axboe@kernel.dk>
arch: ensure parisc/powerpc handle PF_IO_WORKER in copy_thread()
Jens Axboe <axboe@kernel.dk>
arch: setup PF_IO_WORKER threads like PF_KTHREAD
Seth Forshee <sforshee@digitalocean.com>
entry/kvm: Exit to user mode when TIF_NOTIFY_SIGNAL is set
Jens Axboe <axboe@kernel.dk>
kernel: allow fork with TIF_NOTIFY_SIGNAL pending
Eric W. Biederman <ebiederm@xmission.com>
coredump: Limit what can interrupt coredumps
Jens Axboe <axboe@kernel.dk>
kernel: remove checking for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
task_work: remove legacy TWA_SIGNAL path
Al Viro <viro@zeniv.linux.org.uk>
alpha: fix TIF_NOTIFY_SIGNAL handling
Vineet Gupta <vgupta@synopsys.com>
ARC: unbork 5.11 bootup: fix snafu in _TIF_NOTIFY_SIGNAL handling
Jens Axboe <axboe@kernel.dk>
ia64: don't call handle_signal() unless there's actually a signal queued
Jens Axboe <axboe@kernel.dk>
sparc: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
riscv: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
nds32: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
ia64: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
h8300: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
c6x: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
alpha: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
xtensa: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
arm: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
microblaze: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
hexagon: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
csky: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
openrisc: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
sh: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
um: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
s390: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
mips: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
powerpc: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
parisc: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
nios32: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
m68k: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
arm64: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
arc: add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
x86: Wire up TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
task_work: Use TIF_NOTIFY_SIGNAL if available
Jens Axboe <axboe@kernel.dk>
entry: Add support for TIF_NOTIFY_SIGNAL
Jens Axboe <axboe@kernel.dk>
fs: provide locked helper variant of close_fd_get_file()
Eric W. Biederman <ebiederm@xmission.com>
file: Rename __close_fd_get_file close_fd_get_file
Jens Axboe <axboe@kernel.dk>
fs: make do_renameat2() take struct filename
Jens Axboe <axboe@kernel.dk>
signal: Add task_sigpending() helper
Pavel Begunkov <asml.silence@gmail.com>
net: add accept helper not installing fd
Jens Axboe <axboe@kernel.dk>
net: provide __sys_shutdown_sock() that takes a socket
Arnaldo Carvalho de Melo <acme@redhat.com>
tools headers UAPI: Sync openat2.h with the kernel sources
Jens Axboe <axboe@kernel.dk>
fs: expose LOOKUP_CACHED through openat2() RESOLVE_CACHED
Al Viro <viro@zeniv.linux.org.uk>
Make sure nd->path.mnt and nd->path.dentry are always valid pointers
Al Viro <viro@zeniv.linux.org.uk>
fix handling of nd->depth on LOOKUP_CACHED failures in try_to_unlazy*
Jens Axboe <axboe@kernel.dk>
fs: add support for LOOKUP_CACHED
Al Viro <viro@zeniv.linux.org.uk>
saner calling conventions for unlazy_child()
Jens Axboe <axboe@kernel.dk>
iov_iter: add helper to save iov_iter state
Jens Axboe <axboe@kernel.dk>
kernel: provide create_io_thread() helper
-------------
Diffstat:
Makefile | 6 +-
arch/alpha/include/asm/thread_info.h | 4 +-
arch/alpha/kernel/entry.S | 2 +-
arch/alpha/kernel/process.c | 2 +-
arch/alpha/kernel/signal.c | 2 +-
arch/arc/include/asm/thread_info.h | 4 +-
arch/arc/kernel/entry.S | 3 +-
arch/arc/kernel/process.c | 2 +-
arch/arc/kernel/signal.c | 2 +-
arch/arm/include/asm/thread_info.h | 7 +-
arch/arm/kernel/entry-common.S | 6 +-
arch/arm/kernel/entry-v7m.S | 2 +-
arch/arm/kernel/process.c | 2 +-
arch/arm/kernel/signal.c | 2 +-
arch/arm64/include/asm/thread_info.h | 5 +-
arch/arm64/kernel/process.c | 2 +-
arch/arm64/kernel/signal.c | 2 +-
arch/c6x/include/asm/thread_info.h | 1 +
arch/c6x/kernel/asm-offsets.c | 1 +
arch/c6x/kernel/signal.c | 3 +-
arch/csky/include/asm/thread_info.h | 5 +-
arch/csky/kernel/process.c | 2 +-
arch/csky/kernel/signal.c | 2 +-
arch/h8300/include/asm/thread_info.h | 4 +-
arch/h8300/kernel/process.c | 2 +-
arch/h8300/kernel/signal.c | 2 +-
arch/hexagon/include/asm/thread_info.h | 2 +
arch/hexagon/kernel/process.c | 4 +-
arch/ia64/include/asm/thread_info.h | 4 +-
arch/ia64/kernel/process.c | 5 +-
arch/ia64/kernel/signal.c | 3 +-
arch/m68k/include/asm/thread_info.h | 1 +
arch/m68k/kernel/process.c | 2 +-
arch/m68k/kernel/signal.c | 3 +-
arch/microblaze/include/asm/thread_info.h | 2 +
arch/microblaze/kernel/process.c | 2 +-
arch/microblaze/kernel/signal.c | 3 +-
arch/mips/include/asm/thread_info.h | 4 +-
arch/mips/kernel/process.c | 2 +-
arch/mips/kernel/signal.c | 2 +-
arch/nds32/include/asm/thread_info.h | 2 +
arch/nds32/kernel/ex-exit.S | 2 +-
arch/nds32/kernel/process.c | 2 +-
arch/nds32/kernel/signal.c | 2 +-
arch/nios2/include/asm/thread_info.h | 2 +
arch/nios2/kernel/process.c | 2 +-
arch/nios2/kernel/signal.c | 3 +-
arch/openrisc/include/asm/thread_info.h | 2 +
arch/openrisc/kernel/process.c | 2 +-
arch/openrisc/kernel/signal.c | 2 +-
arch/parisc/include/asm/thread_info.h | 4 +-
arch/parisc/kernel/process.c | 2 +-
arch/parisc/kernel/signal.c | 3 +-
arch/powerpc/include/asm/thread_info.h | 5 +-
arch/powerpc/kernel/process.c | 2 +-
arch/powerpc/kernel/signal.c | 2 +-
arch/riscv/include/asm/thread_info.h | 5 +-
arch/riscv/kernel/process.c | 2 +-
arch/riscv/kernel/signal.c | 2 +-
arch/s390/include/asm/thread_info.h | 2 +
arch/s390/kernel/entry.S | 11 +-
arch/s390/kernel/process.c | 2 +-
arch/s390/kernel/signal.c | 2 +-
arch/sh/include/asm/thread_info.h | 4 +-
arch/sh/kernel/process_32.c | 2 +-
arch/sh/kernel/signal_32.c | 2 +-
arch/sparc/include/asm/thread_info_32.h | 4 +-
arch/sparc/include/asm/thread_info_64.h | 6 +-
arch/sparc/kernel/process_32.c | 2 +-
arch/sparc/kernel/process_64.c | 2 +-
arch/sparc/kernel/signal_32.c | 2 +-
arch/sparc/kernel/signal_64.c | 2 +-
arch/um/include/asm/thread_info.h | 2 +
arch/um/kernel/process.c | 5 +-
arch/x86/include/asm/thread_info.h | 2 +
arch/x86/kernel/process.c | 17 +
arch/x86/kernel/signal.c | 4 +-
arch/xtensa/include/asm/thread_info.h | 5 +-
arch/xtensa/kernel/entry.S | 4 +-
arch/xtensa/kernel/process.c | 2 +-
arch/xtensa/kernel/signal.c | 3 +-
drivers/android/binder.c | 2 +-
fs/Makefile | 2 -
fs/coredump.c | 2 +-
fs/eventfd.c | 37 +-
fs/eventpoll.c | 18 +-
fs/file.c | 34 +-
fs/internal.h | 3 +
fs/io-wq.c | 1242 ----
fs/namei.c | 84 +-
fs/open.c | 6 +
fs/proc/self.c | 7 -
fs/proc/thread_self.c | 7 -
include/linux/entry-common.h | 7 +-
include/linux/entry-kvm.h | 4 +-
include/linux/eventfd.h | 7 +
include/linux/fcntl.h | 2 +-
include/linux/fdtable.h | 2 +-
include/linux/io_uring.h | 46 +-
include/linux/namei.h | 1 +
include/linux/net.h | 3 -
include/linux/sched.h | 3 +
include/linux/sched/jobctl.h | 4 +-
include/linux/sched/signal.h | 18 +-
include/linux/sched/task.h | 2 +
include/linux/socket.h | 4 +
include/linux/syscalls.h | 2 +-
include/linux/task_work.h | 2 +
include/linux/tracehook.h | 23 +
include/linux/uio.h | 15 +
include/trace/events/io_uring.h | 121 +-
include/uapi/linux/eventpoll.h | 6 +
include/uapi/linux/io_uring.h | 115 +-
include/uapi/linux/openat2.h | 4 +
io_uring/Makefile | 6 +
io_uring/io-wq.c | 1398 +++++
{fs => io_uring}/io-wq.h | 47 +-
{fs => io_uring}/io_uring.c | 9209 ++++++++++++++++-------------
kernel/entry/common.c | 14 +-
kernel/entry/kvm.c | 2 +-
kernel/events/uprobes.c | 2 +-
kernel/exit.c | 2 +-
kernel/fork.c | 33 +-
kernel/sched/core.c | 2 +-
kernel/signal.c | 53 +-
kernel/task_work.c | 48 +-
lib/iov_iter.c | 52 +-
net/ipv4/af_inet.c | 1 -
net/ipv6/af_inet6.c | 1 -
net/socket.c | 92 +-
tools/include/uapi/linux/openat2.h | 4 +
131 files changed, 7279 insertions(+), 5773 deletions(-)
next reply other threads:[~2023-01-03 8:15 UTC|newest]
Thread overview: 74+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-01-03 8:13 Greg Kroah-Hartman [this message]
2023-01-03 8:13 ` [PATCH 5.10 01/63] kernel: provide create_io_thread() helper Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 02/63] iov_iter: add helper to save iov_iter state Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 03/63] saner calling conventions for unlazy_child() Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 04/63] fs: add support for LOOKUP_CACHED Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 05/63] fix handling of nd->depth on LOOKUP_CACHED failures in try_to_unlazy* Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 06/63] Make sure nd->path.mnt and nd->path.dentry are always valid pointers Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 07/63] fs: expose LOOKUP_CACHED through openat2() RESOLVE_CACHED Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 08/63] tools headers UAPI: Sync openat2.h with the kernel sources Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 09/63] net: provide __sys_shutdown_sock() that takes a socket Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 10/63] net: add accept helper not installing fd Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 11/63] signal: Add task_sigpending() helper Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 12/63] fs: make do_renameat2() take struct filename Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 13/63] file: Rename __close_fd_get_file close_fd_get_file Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 14/63] fs: provide locked helper variant of close_fd_get_file() Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 15/63] entry: Add support for TIF_NOTIFY_SIGNAL Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 16/63] task_work: Use TIF_NOTIFY_SIGNAL if available Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 17/63] x86: Wire up TIF_NOTIFY_SIGNAL Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 18/63] arc: add support for TIF_NOTIFY_SIGNAL Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 19/63] arm64: " Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 20/63] m68k: " Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 21/63] nios32: " Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 22/63] parisc: " Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 23/63] powerpc: " Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 24/63] mips: " Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 25/63] s390: " Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 26/63] um: " Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 27/63] sh: " Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 28/63] openrisc: " Greg Kroah-Hartman
2023-01-03 8:13 ` [PATCH 5.10 29/63] csky: " Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 30/63] hexagon: " Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 31/63] microblaze: " Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 32/63] arm: " Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 33/63] xtensa: " Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 34/63] alpha: " Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 35/63] c6x: " Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 36/63] h8300: " Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 37/63] ia64: " Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 38/63] nds32: " Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 39/63] riscv: " Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 40/63] sparc: " Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 41/63] ia64: dont call handle_signal() unless theres actually a signal queued Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 42/63] ARC: unbork 5.11 bootup: fix snafu in _TIF_NOTIFY_SIGNAL handling Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 43/63] alpha: fix TIF_NOTIFY_SIGNAL handling Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 44/63] task_work: remove legacy TWA_SIGNAL path Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 45/63] kernel: remove checking for TIF_NOTIFY_SIGNAL Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 46/63] coredump: Limit what can interrupt coredumps Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 47/63] kernel: allow fork with TIF_NOTIFY_SIGNAL pending Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 48/63] entry/kvm: Exit to user mode when TIF_NOTIFY_SIGNAL is set Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 49/63] arch: setup PF_IO_WORKER threads like PF_KTHREAD Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 50/63] arch: ensure parisc/powerpc handle PF_IO_WORKER in copy_thread() Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 51/63] x86/process: setup io_threads more like normal user space threads Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 52/63] kernel: stop masking signals in create_io_thread() Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 53/63] kernel: dont call do_exit() for PF_IO_WORKER threads Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 54/63] task_work: add helper for more targeted task_work canceling Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 55/63] io_uring: import 5.15-stable io_uring Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 56/63] signal: kill JOBCTL_TASK_WORK Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 57/63] task_work: unconditionally run task_work from get_signal() Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 58/63] net: remove cmsg restriction from io_uring based send/recvmsg calls Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 59/63] Revert "proc: dont allow async path resolution of /proc/thread-self components" Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 60/63] Revert "proc: dont allow async path resolution of /proc/self components" Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 61/63] eventpoll: add EPOLL_URING_WAKE poll wakeup flag Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 62/63] eventfd: provide a eventfd_signal_mask() helper Greg Kroah-Hartman
2023-01-03 8:14 ` [PATCH 5.10 63/63] io_uring: pass in EPOLL_URING_WAKE for eventfd signaling and wakeups Greg Kroah-Hartman
2023-01-03 13:44 ` [PATCH 5.10 00/63] 5.10.162-rc1 review Pavel Machek
2023-01-03 14:51 ` Guenter Roeck
2023-01-03 16:16 ` Joel Fernandes
2023-01-04 5:29 ` Greg Kroah-Hartman
2023-01-04 21:56 ` Joel Fernandes
2023-01-05 11:43 ` Greg Kroah-Hartman
2023-01-03 18:16 ` Naresh Kamboju
2023-01-03 18:27 ` Florian Fainelli
2023-01-03 18:59 ` Allen Pais
-- strict thread matches above, loose matches on Subject: below --
2023-01-05 15:28 Joel Fernandes
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20230103081308.548338576@linuxfoundation.org \
--to=gregkh@linuxfoundation.org \
--cc=akpm@linux-foundation.org \
--cc=f.fainelli@gmail.com \
--cc=jonathanh@nvidia.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux@roeck-us.net \
--cc=lkft-triage@lists.linaro.org \
--cc=patches@kernelci.org \
--cc=patches@lists.linux.dev \
--cc=pavel@denx.de \
--cc=rwarsow@gmx.de \
--cc=shuah@kernel.org \
--cc=srw@sladewatkins.net \
--cc=stable@vger.kernel.org \
--cc=sudipm.mukherjee@gmail.com \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).