Skip to content

Commit ca9b8f0

Browse files
committed
MediaTek Helio X10 MT6795 - MT6331/6332 Regulators
Merge series from AngeloGioacchino Del Regno <angelogioacchino.delregno@collabora.com>: In an effort to give some love to the apparently forgotten MT6795 SoC, I am upstreaming more components that are necessary to support platforms powered by this one apart from a simple boot to serial console. This series adds support for the regulators found in MT6331 and MT6332 main/companion PMICs. Adding support to each driver in each subsystem is done in different patch series as to avoid spamming uninteresting patches to maintainers. Tested on a MT6795 Sony Xperia M5 (codename "Holly") smartphone.
2 parents 69a673c + 1cc5a52 commit ca9b8f0

File tree

1,043 files changed

+14845
-6964
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,043 files changed

+14845
-6964
lines changed

.get_maintainer.ignore

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,4 @@
1+
Alan Cox <alan@lxorguk.ukuu.org.uk>
2+
Alan Cox <root@hraefn.swansea.linux.org.uk>
13
Christoph Hellwig <hch@lst.de>
24
Marc Gonzalez <marc.w.gonzalez@free.fr>

.mailmap

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -98,8 +98,7 @@ Christian Brauner <brauner@kernel.org> <christian.brauner@ubuntu.com>
9898
Christian Marangi <ansuelsmth@gmail.com>
9999
Christophe Ricard <christophe.ricard@gmail.com>
100100
Christoph Hellwig <hch@lst.de>
101-
Colin Ian King <colin.king@intel.com> <colin.king@canonical.com>
102-
Colin Ian King <colin.king@intel.com> <colin.i.king@gmail.com>
101+
Colin Ian King <colin.i.king@gmail.com> <colin.king@canonical.com>
103102
Corey Minyard <minyard@acm.org>
104103
Damian Hobson-Garcia <dhobsong@igel.co.jp>
105104
Daniel Borkmann <daniel@iogearbox.net> <danborkmann@googlemail.com>
@@ -150,6 +149,8 @@ Greg Kroah-Hartman <gregkh@suse.de>
150149
Greg Kroah-Hartman <greg@kroah.com>
151150
Greg Kurz <groug@kaod.org> <gkurz@linux.vnet.ibm.com>
152151
Gregory CLEMENT <gregory.clement@bootlin.com> <gregory.clement@free-electrons.com>
152+
Guilherme G. Piccoli <kernel@gpiccoli.net> <gpiccoli@linux.vnet.ibm.com>
153+
Guilherme G. Piccoli <kernel@gpiccoli.net> <gpiccoli@canonical.com>
153154
Guo Ren <guoren@kernel.org> <guoren@linux.alibaba.com>
154155
Guo Ren <guoren@kernel.org> <ren_guo@c-sky.com>
155156
Gustavo Padovan <gustavo@las.ic.unicamp.br>
@@ -253,6 +254,7 @@ Linus Lüssing <linus.luessing@c0d3.blue> <linus.luessing@web.de>
253254
Li Yang <leoyang.li@nxp.com> <leoli@freescale.com>
254255
Li Yang <leoyang.li@nxp.com> <leo@zh-kernel.org>
255256
Lorenzo Pieralisi <lpieralisi@kernel.org> <lorenzo.pieralisi@arm.com>
257+
Luca Ceresoli <luca.ceresoli@bootlin.com> <luca@lucaceresoli.net>
256258
Lukasz Luba <lukasz.luba@arm.com> <l.luba@partner.samsung.com>
257259
Maciej W. Rozycki <macro@mips.com> <macro@imgtec.com>
258260
Maciej W. Rozycki <macro@orcam.me.uk> <macro@linux-mips.org>

Documentation/ABI/testing/sysfs-devices-system-cpu

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -523,6 +523,7 @@ What: /sys/devices/system/cpu/vulnerabilities
523523
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort
524524
/sys/devices/system/cpu/vulnerabilities/itlb_multihit
525525
/sys/devices/system/cpu/vulnerabilities/mmio_stale_data
526+
/sys/devices/system/cpu/vulnerabilities/retbleed
526527
Date: January 2018
527528
Contact: Linux kernel mailing list <linux-kernel@vger.kernel.org>
528529
Description: Information about CPU vulnerabilities

Documentation/admin-guide/README.rst

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
.. _readme:
22

3-
Linux kernel release 5.x <http://kernel.org/>
3+
Linux kernel release 6.x <http://kernel.org/>
44
=============================================
55

6-
These are the release notes for Linux version 5. Read them carefully,
6+
These are the release notes for Linux version 6. Read them carefully,
77
as they tell you what this is all about, explain how to install the
88
kernel, and what to do if something goes wrong.
99

@@ -63,7 +63,7 @@ Installing the kernel source
6363
directory where you have permissions (e.g. your home directory) and
6464
unpack it::
6565

66-
xz -cd linux-5.x.tar.xz | tar xvf -
66+
xz -cd linux-6.x.tar.xz | tar xvf -
6767

6868
Replace "X" with the version number of the latest kernel.
6969

@@ -72,26 +72,26 @@ Installing the kernel source
7272
files. They should match the library, and not get messed up by
7373
whatever the kernel-du-jour happens to be.
7474

75-
- You can also upgrade between 5.x releases by patching. Patches are
75+
- You can also upgrade between 6.x releases by patching. Patches are
7676
distributed in the xz format. To install by patching, get all the
7777
newer patch files, enter the top level directory of the kernel source
78-
(linux-5.x) and execute::
78+
(linux-6.x) and execute::
7979

80-
xz -cd ../patch-5.x.xz | patch -p1
80+
xz -cd ../patch-6.x.xz | patch -p1
8181

8282
Replace "x" for all versions bigger than the version "x" of your current
8383
source tree, **in_order**, and you should be ok. You may want to remove
8484
the backup files (some-file-name~ or some-file-name.orig), and make sure
8585
that there are no failed patches (some-file-name# or some-file-name.rej).
8686
If there are, either you or I have made a mistake.
8787

88-
Unlike patches for the 5.x kernels, patches for the 5.x.y kernels
88+
Unlike patches for the 6.x kernels, patches for the 6.x.y kernels
8989
(also known as the -stable kernels) are not incremental but instead apply
90-
directly to the base 5.x kernel. For example, if your base kernel is 5.0
91-
and you want to apply the 5.0.3 patch, you must not first apply the 5.0.1
92-
and 5.0.2 patches. Similarly, if you are running kernel version 5.0.2 and
93-
want to jump to 5.0.3, you must first reverse the 5.0.2 patch (that is,
94-
patch -R) **before** applying the 5.0.3 patch. You can read more on this in
90+
directly to the base 6.x kernel. For example, if your base kernel is 6.0
91+
and you want to apply the 6.0.3 patch, you must not first apply the 6.0.1
92+
and 6.0.2 patches. Similarly, if you are running kernel version 6.0.2 and
93+
want to jump to 6.0.3, you must first reverse the 6.0.2 patch (that is,
94+
patch -R) **before** applying the 6.0.3 patch. You can read more on this in
9595
:ref:`Documentation/process/applying-patches.rst <applying_patches>`.
9696

9797
Alternatively, the script patch-kernel can be used to automate this
@@ -114,7 +114,7 @@ Installing the kernel source
114114
Software requirements
115115
---------------------
116116

117-
Compiling and running the 5.x kernels requires up-to-date
117+
Compiling and running the 6.x kernels requires up-to-date
118118
versions of various software packages. Consult
119119
:ref:`Documentation/process/changes.rst <changes>` for the minimum version numbers
120120
required and how to get updates for these packages. Beware that using
@@ -132,12 +132,12 @@ Build directory for the kernel
132132
place for the output files (including .config).
133133
Example::
134134

135-
kernel source code: /usr/src/linux-5.x
135+
kernel source code: /usr/src/linux-6.x
136136
build directory: /home/name/build/kernel
137137

138138
To configure and build the kernel, use::
139139

140-
cd /usr/src/linux-5.x
140+
cd /usr/src/linux-6.x
141141
make O=/home/name/build/kernel menuconfig
142142
make O=/home/name/build/kernel
143143
sudo make O=/home/name/build/kernel modules_install install

Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -230,6 +230,20 @@ The possible values in this file are:
230230
* - 'Mitigation: Clear CPU buffers'
231231
- The processor is vulnerable and the CPU buffer clearing mitigation is
232232
enabled.
233+
* - 'Unknown: No mitigations'
234+
- The processor vulnerability status is unknown because it is
235+
out of Servicing period. Mitigation is not attempted.
236+
237+
Definitions:
238+
------------
239+
240+
Servicing period: The process of providing functional and security updates to
241+
Intel processors or platforms, utilizing the Intel Platform Update (IPU)
242+
process or other similar mechanisms.
243+
244+
End of Servicing Updates (ESU): ESU is the date at which Intel will no
245+
longer provide Servicing, such as through IPU or other similar update
246+
processes. ESU dates will typically be aligned to end of quarter.
233247

234248
If the processor is vulnerable then the following information is appended to
235249
the above information:

Documentation/admin-guide/kernel-parameters.txt

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5331,6 +5331,8 @@
53315331
rodata= [KNL]
53325332
on Mark read-only kernel memory as read-only (default).
53335333
off Leave read-only kernel memory writable for debugging.
5334+
full Mark read-only kernel memory and aliases as read-only
5335+
[arm64]
53345336

53355337
rockchip.usb_uart
53365338
Enable the uart passthrough on the designated usb port

Documentation/admin-guide/mm/damon/usage.rst

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -50,10 +50,10 @@ For a short example, users can monitor the virtual address space of a given
5050
workload as below. ::
5151

5252
# cd /sys/kernel/mm/damon/admin/
53-
# echo 1 > kdamonds/nr && echo 1 > kdamonds/0/contexts/nr
53+
# echo 1 > kdamonds/nr_kdamonds && echo 1 > kdamonds/0/contexts/nr_contexts
5454
# echo vaddr > kdamonds/0/contexts/0/operations
55-
# echo 1 > kdamonds/0/contexts/0/targets/nr
56-
# echo $(pidof <workload>) > kdamonds/0/contexts/0/targets/0/pid
55+
# echo 1 > kdamonds/0/contexts/0/targets/nr_targets
56+
# echo $(pidof <workload>) > kdamonds/0/contexts/0/targets/0/pid_target
5757
# echo on > kdamonds/0/state
5858

5959
Files Hierarchy
@@ -366,12 +366,12 @@ memory rate becomes larger than 60%, or lower than 30%". ::
366366
# echo 1 > kdamonds/0/contexts/0/schemes/nr_schemes
367367
# cd kdamonds/0/contexts/0/schemes/0
368368
# # set the basic access pattern and the action
369-
# echo 4096 > access_patterns/sz/min
370-
# echo 8192 > access_patterns/sz/max
371-
# echo 0 > access_patterns/nr_accesses/min
372-
# echo 5 > access_patterns/nr_accesses/max
373-
# echo 10 > access_patterns/age/min
374-
# echo 20 > access_patterns/age/max
369+
# echo 4096 > access_pattern/sz/min
370+
# echo 8192 > access_pattern/sz/max
371+
# echo 0 > access_pattern/nr_accesses/min
372+
# echo 5 > access_pattern/nr_accesses/max
373+
# echo 10 > access_pattern/age/min
374+
# echo 20 > access_pattern/age/max
375375
# echo pageout > action
376376
# # set quotas
377377
# echo 10 > quotas/ms

Documentation/admin-guide/sysctl/net.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,7 @@ poll cycle or the number of packets processed reaches netdev_budget.
271271
netdev_max_backlog
272272
------------------
273273

274-
Maximum number of packets, queued on the INPUT side, when the interface
274+
Maximum number of packets, queued on the INPUT side, when the interface
275275
receives packets faster than kernel can process them.
276276

277277
netdev_rss_key

Documentation/arm64/elf_hwcaps.rst

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -242,44 +242,34 @@ HWCAP2_MTE3
242242
by Documentation/arm64/memory-tagging-extension.rst.
243243

244244
HWCAP2_SME
245-
246245
Functionality implied by ID_AA64PFR1_EL1.SME == 0b0001, as described
247246
by Documentation/arm64/sme.rst.
248247

249248
HWCAP2_SME_I16I64
250-
251249
Functionality implied by ID_AA64SMFR0_EL1.I16I64 == 0b1111.
252250

253251
HWCAP2_SME_F64F64
254-
255252
Functionality implied by ID_AA64SMFR0_EL1.F64F64 == 0b1.
256253

257254
HWCAP2_SME_I8I32
258-
259255
Functionality implied by ID_AA64SMFR0_EL1.I8I32 == 0b1111.
260256

261257
HWCAP2_SME_F16F32
262-
263258
Functionality implied by ID_AA64SMFR0_EL1.F16F32 == 0b1.
264259

265260
HWCAP2_SME_B16F32
266-
267261
Functionality implied by ID_AA64SMFR0_EL1.B16F32 == 0b1.
268262

269263
HWCAP2_SME_F32F32
270-
271264
Functionality implied by ID_AA64SMFR0_EL1.F32F32 == 0b1.
272265

273266
HWCAP2_SME_FA64
274-
275267
Functionality implied by ID_AA64SMFR0_EL1.FA64 == 0b1.
276268

277269
HWCAP2_WFXT
278-
279270
Functionality implied by ID_AA64ISAR2_EL1.WFXT == 0b0010.
280271

281272
HWCAP2_EBF16
282-
283273
Functionality implied by ID_AA64ISAR1_EL1.BF16 == 0b0010.
284274

285275
4. Unused AT_HWCAP bits

Documentation/arm64/silicon-errata.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,8 @@ stable kernels.
5252
| Allwinner | A64/R18 | UNKNOWN1 | SUN50I_ERRATUM_UNKNOWN1 |
5353
+----------------+-----------------+-----------------+-----------------------------+
5454
+----------------+-----------------+-----------------+-----------------------------+
55+
| ARM | Cortex-A510 | #2457168 | ARM64_ERRATUM_2457168 |
56+
+----------------+-----------------+-----------------+-----------------------------+
5557
| ARM | Cortex-A510 | #2064142 | ARM64_ERRATUM_2064142 |
5658
+----------------+-----------------+-----------------+-----------------------------+
5759
| ARM | Cortex-A510 | #2038923 | ARM64_ERRATUM_2038923 |

0 commit comments

Comments
 (0)