Skip to content

Commit 411472a

Browse files
author
Ingo Molnar
committed
Merge tag 'v5.17-rc8' into irq/core, to fix conflicts
Conflicts: drivers/pinctrl/pinctrl-starfive.c Signed-off-by: Ingo Molnar <mingo@kernel.org>
2 parents f0fae8a + 09688c0 commit 411472a

File tree

689 files changed

+7397
-2988
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

689 files changed

+7397
-2988
lines changed

.mailmap

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -187,6 +187,8 @@ Jiri Slaby <jirislaby@kernel.org> <jslaby@novell.com>
187187
Jiri Slaby <jirislaby@kernel.org> <jslaby@suse.com>
188188
Jiri Slaby <jirislaby@kernel.org> <jslaby@suse.cz>
189189
Jiri Slaby <jirislaby@kernel.org> <xslaby@fi.muni.cz>
190+
Jisheng Zhang <jszhang@kernel.org> <jszhang@marvell.com>
191+
Jisheng Zhang <jszhang@kernel.org> <Jisheng.Zhang@synaptics.com>
190192
Johan Hovold <johan@kernel.org> <jhovold@gmail.com>
191193
Johan Hovold <johan@kernel.org> <johan@hovoldconsulting.com>
192194
John Paul Adrian Glaubitz <glaubitz@physik.fu-berlin.de>
@@ -216,6 +218,7 @@ Koushik <raghavendra.koushik@neterion.com>
216218
Krishna Manikandan <quic_mkrishn@quicinc.com> <mkrishn@codeaurora.org>
217219
Krzysztof Kozlowski <krzk@kernel.org> <k.kozlowski.k@gmail.com>
218220
Krzysztof Kozlowski <krzk@kernel.org> <k.kozlowski@samsung.com>
221+
Krzysztof Kozlowski <krzk@kernel.org> <krzysztof.kozlowski@canonical.com>
219222
Kuninori Morimoto <kuninori.morimoto.gx@renesas.com>
220223
Kuogee Hsieh <quic_khsieh@quicinc.com> <khsieh@codeaurora.org>
221224
Leonardo Bras <leobras.c@gmail.com> <leonardo@linux.ibm.com>
@@ -333,6 +336,9 @@ Rémi Denis-Courmont <rdenis@simphalempin.com>
333336
Ricardo Ribalda <ribalda@kernel.org> <ricardo@ribalda.com>
334337
Ricardo Ribalda <ribalda@kernel.org> Ricardo Ribalda Delgado <ribalda@kernel.org>
335338
Ricardo Ribalda <ribalda@kernel.org> <ricardo.ribalda@gmail.com>
339+
Roman Gushchin <roman.gushchin@linux.dev> <guro@fb.com>
340+
Roman Gushchin <roman.gushchin@linux.dev> <guroan@gmail.com>
341+
Roman Gushchin <roman.gushchin@linux.dev> <klamm@yandex-team.ru>
336342
Ross Zwisler <zwisler@kernel.org> <ross.zwisler@linux.intel.com>
337343
Rudolf Marek <R.Marek@sh.cvut.cz>
338344
Rui Saraiva <rmps@joel.ist.utl.pt>

CREDITS

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -895,6 +895,12 @@ S: 3000 FORE Drive
895895
S: Warrendale, Pennsylvania 15086
896896
S: USA
897897

898+
N: Ludovic Desroches
899+
E: ludovic.desroches@microchip.com
900+
D: Maintainer for ARM/Microchip (AT91) SoC support
901+
D: Author of ADC, pinctrl, XDMA and SDHCI drivers for this platform
902+
S: France
903+
898904
N: Martin Devera
899905
E: devik@cdi.cz
900906
W: http://luxik.cdi.cz/~devik/qos/

Documentation/admin-guide/hw-vuln/spectre.rst

Lines changed: 33 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,8 @@ privileged data touched during the speculative execution.
6060
Spectre variant 1 attacks take advantage of speculative execution of
6161
conditional branches, while Spectre variant 2 attacks use speculative
6262
execution of indirect branches to leak privileged memory.
63-
See :ref:`[1] <spec_ref1>` :ref:`[5] <spec_ref5>` :ref:`[7] <spec_ref7>`
64-
:ref:`[10] <spec_ref10>` :ref:`[11] <spec_ref11>`.
63+
See :ref:`[1] <spec_ref1>` :ref:`[5] <spec_ref5>` :ref:`[6] <spec_ref6>`
64+
:ref:`[7] <spec_ref7>` :ref:`[10] <spec_ref10>` :ref:`[11] <spec_ref11>`.
6565

6666
Spectre variant 1 (Bounds Check Bypass)
6767
---------------------------------------
@@ -131,6 +131,19 @@ steer its indirect branch speculations to gadget code, and measure the
131131
speculative execution's side effects left in level 1 cache to infer the
132132
victim's data.
133133

134+
Yet another variant 2 attack vector is for the attacker to poison the
135+
Branch History Buffer (BHB) to speculatively steer an indirect branch
136+
to a specific Branch Target Buffer (BTB) entry, even if the entry isn't
137+
associated with the source address of the indirect branch. Specifically,
138+
the BHB might be shared across privilege levels even in the presence of
139+
Enhanced IBRS.
140+
141+
Currently the only known real-world BHB attack vector is via
142+
unprivileged eBPF. Therefore, it's highly recommended to not enable
143+
unprivileged eBPF, especially when eIBRS is used (without retpolines).
144+
For a full mitigation against BHB attacks, it's recommended to use
145+
retpolines (or eIBRS combined with retpolines).
146+
134147
Attack scenarios
135148
----------------
136149

@@ -364,13 +377,15 @@ The possible values in this file are:
364377

365378
- Kernel status:
366379

367-
==================================== =================================
368-
'Not affected' The processor is not vulnerable
369-
'Vulnerable' Vulnerable, no mitigation
370-
'Mitigation: Full generic retpoline' Software-focused mitigation
371-
'Mitigation: Full AMD retpoline' AMD-specific software mitigation
372-
'Mitigation: Enhanced IBRS' Hardware-focused mitigation
373-
==================================== =================================
380+
======================================== =================================
381+
'Not affected' The processor is not vulnerable
382+
'Mitigation: None' Vulnerable, no mitigation
383+
'Mitigation: Retpolines' Use Retpoline thunks
384+
'Mitigation: LFENCE' Use LFENCE instructions
385+
'Mitigation: Enhanced IBRS' Hardware-focused mitigation
386+
'Mitigation: Enhanced IBRS + Retpolines' Hardware-focused + Retpolines
387+
'Mitigation: Enhanced IBRS + LFENCE' Hardware-focused + LFENCE
388+
======================================== =================================
374389

375390
- Firmware status: Show if Indirect Branch Restricted Speculation (IBRS) is
376391
used to protect against Spectre variant 2 attacks when calling firmware (x86 only).
@@ -583,12 +598,13 @@ kernel command line.
583598

584599
Specific mitigations can also be selected manually:
585600

586-
retpoline
587-
replace indirect branches
588-
retpoline,generic
589-
google's original retpoline
590-
retpoline,amd
591-
AMD-specific minimal thunk
601+
retpoline auto pick between generic,lfence
602+
retpoline,generic Retpolines
603+
retpoline,lfence LFENCE; indirect branch
604+
retpoline,amd alias for retpoline,lfence
605+
eibrs enhanced IBRS
606+
eibrs,retpoline enhanced IBRS + Retpolines
607+
eibrs,lfence enhanced IBRS + LFENCE
592608

593609
Not specifying this option is equivalent to
594610
spectre_v2=auto.
@@ -599,7 +615,7 @@ kernel command line.
599615
spectre_v2=off. Spectre variant 1 mitigations
600616
cannot be disabled.
601617

602-
For spectre_v2_user see :doc:`/admin-guide/kernel-parameters`.
618+
For spectre_v2_user see Documentation/admin-guide/kernel-parameters.txt
603619

604620
Mitigation selection guide
605621
--------------------------
@@ -681,7 +697,7 @@ AMD white papers:
681697

682698
.. _spec_ref6:
683699

684-
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/90343-B_SoftwareTechniquesforManagingSpeculation_WP_7-18Update_FNL.pdf>`_.
700+
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/Managing-Speculation-on-AMD-Processors.pdf>`_.
685701

686702
ARM white papers:
687703

Documentation/admin-guide/kernel-parameters.txt

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5361,8 +5361,12 @@
53615361
Specific mitigations can also be selected manually:
53625362

53635363
retpoline - replace indirect branches
5364-
retpoline,generic - google's original retpoline
5365-
retpoline,amd - AMD-specific minimal thunk
5364+
retpoline,generic - Retpolines
5365+
retpoline,lfence - LFENCE; indirect branch
5366+
retpoline,amd - alias for retpoline,lfence
5367+
eibrs - enhanced IBRS
5368+
eibrs,retpoline - enhanced IBRS + Retpolines
5369+
eibrs,lfence - enhanced IBRS + LFENCE
53665370

53675371
Not specifying this option is equivalent to
53685372
spectre_v2=auto.

Documentation/admin-guide/mm/pagemap.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ There are four components to pagemap:
2323
* Bit 56 page exclusively mapped (since 4.2)
2424
* Bit 57 pte is uffd-wp write-protected (since 5.13) (see
2525
:ref:`Documentation/admin-guide/mm/userfaultfd.rst <userfaultfd>`)
26-
* Bits 57-60 zero
26+
* Bits 58-60 zero
2727
* Bit 61 page is file-page or shared-anon (since 3.5)
2828
* Bit 62 page swapped
2929
* Bit 63 page present

Documentation/cpu-freq/cpu-drivers.rst

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,9 @@ And optionally
7575
.resume - A pointer to a per-policy resume function which is called
7676
with interrupts disabled and _before_ the governor is started again.
7777

78+
.ready - A pointer to a per-policy ready function which is called after
79+
the policy is fully initialized.
80+
7881
.attr - A pointer to a NULL-terminated list of "struct freq_attr" which
7982
allow to export values to sysfs.
8083

Documentation/devicetree/bindings/arm/atmel-at91.yaml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,8 @@ title: Atmel AT91 device tree bindings.
88

99
maintainers:
1010
- Alexandre Belloni <alexandre.belloni@bootlin.com>
11-
- Ludovic Desroches <ludovic.desroches@microchip.com>
11+
- Claudiu Beznea <claudiu.beznea@microchip.com>
12+
- Nicolas Ferre <nicolas.ferre@microchip.com>
1213

1314
description: |
1415
Boards with a SoC of the Atmel AT91 or SMART family shall have the following

Documentation/devicetree/bindings/arm/freescale/fsl,layerscape-dcfg.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ Required properties:
88
- compatible: Should contain a chip-specific compatible string,
99
Chip-specific strings are of the form "fsl,<chip>-dcfg",
1010
The following <chip>s are known to be supported:
11-
ls1012a, ls1021a, ls1043a, ls1046a, ls2080a.
11+
ls1012a, ls1021a, ls1043a, ls1046a, ls2080a, lx2160a
1212

1313
- reg : should contain base address and length of DCFG memory-mapped registers
1414

Documentation/devicetree/bindings/arm/qcom.yaml

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,6 @@ description: |
4848
sdx65
4949
sm7225
5050
sm8150
51-
sdx65
5251
sm8250
5352
sm8350
5453
sm8450
@@ -228,11 +227,6 @@ properties:
228227
- qcom,sdx65-mtp
229228
- const: qcom,sdx65
230229

231-
- items:
232-
- enum:
233-
- qcom,sdx65-mtp
234-
- const: qcom,sdx65
235-
236230
- items:
237231
- enum:
238232
- qcom,ipq6018-cp01

Documentation/devicetree/bindings/clock/qoriq-clock.txt

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,7 @@ Required properties:
4444
* "fsl,ls1046a-clockgen"
4545
* "fsl,ls1088a-clockgen"
4646
* "fsl,ls2080a-clockgen"
47+
* "fsl,lx2160a-clockgen"
4748
Chassis-version clock strings include:
4849
* "fsl,qoriq-clockgen-1.0": for chassis 1.0 clocks
4950
* "fsl,qoriq-clockgen-2.0": for chassis 2.0 clocks

0 commit comments

Comments
 (0)