Skip to content

Commit a825368

Browse files
committed
Merge drm/drm-fixes into drm-misc-fixes
Backmerging drm/drm-fixes for commit 3755d35 ("drm/panel: Select DRM_DP_HELPER for DRM_PANEL_EDP"). Signed-off-by: Thomas Zimmermann <tzimmermann@suse.de>
2 parents fc1b6ef + 09688c0 commit a825368

1,741 files changed

Lines changed: 19844 additions & 9755 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.mailmap

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,7 @@ Boris Brezillon <bbrezillon@kernel.org> <boris.brezillon@bootlin.com>
7070
Boris Brezillon <bbrezillon@kernel.org> <boris.brezillon@free-electrons.com>
7171
Brian Avery <b.avery@hp.com>
7272
Brian King <brking@us.ibm.com>
73+
Brian Silverman <bsilver16384@gmail.com> <brian.silverman@bluerivertech.com>
7374
Changbin Du <changbin.du@intel.com> <changbin.du@gmail.com>
7475
Changbin Du <changbin.du@intel.com> <changbin.du@intel.com>
7576
Chao Yu <chao@kernel.org> <chao2.yu@samsung.com>
@@ -79,6 +80,9 @@ Chris Chiu <chris.chiu@canonical.com> <chiu@endlessos.org>
7980
Christian Borntraeger <borntraeger@linux.ibm.com> <borntraeger@de.ibm.com>
8081
Christian Borntraeger <borntraeger@linux.ibm.com> <cborntra@de.ibm.com>
8182
Christian Borntraeger <borntraeger@linux.ibm.com> <borntrae@de.ibm.com>
83+
Christian Brauner <brauner@kernel.org> <christian@brauner.io>
84+
Christian Brauner <brauner@kernel.org> <christian.brauner@canonical.com>
85+
Christian Brauner <brauner@kernel.org> <christian.brauner@ubuntu.com>
8286
Christophe Ricard <christophe.ricard@gmail.com>
8387
Christoph Hellwig <hch@lst.de>
8488
Colin Ian King <colin.king@intel.com> <colin.king@canonical.com>
@@ -183,6 +187,8 @@ Jiri Slaby <jirislaby@kernel.org> <jslaby@novell.com>
183187
Jiri Slaby <jirislaby@kernel.org> <jslaby@suse.com>
184188
Jiri Slaby <jirislaby@kernel.org> <jslaby@suse.cz>
185189
Jiri Slaby <jirislaby@kernel.org> <xslaby@fi.muni.cz>
190+
Jisheng Zhang <jszhang@kernel.org> <jszhang@marvell.com>
191+
Jisheng Zhang <jszhang@kernel.org> <Jisheng.Zhang@synaptics.com>
186192
Johan Hovold <johan@kernel.org> <jhovold@gmail.com>
187193
Johan Hovold <johan@kernel.org> <johan@hovoldconsulting.com>
188194
John Paul Adrian Glaubitz <glaubitz@physik.fu-berlin.de>
@@ -212,6 +218,7 @@ Koushik <raghavendra.koushik@neterion.com>
212218
Krishna Manikandan <quic_mkrishn@quicinc.com> <mkrishn@codeaurora.org>
213219
Krzysztof Kozlowski <krzk@kernel.org> <k.kozlowski.k@gmail.com>
214220
Krzysztof Kozlowski <krzk@kernel.org> <k.kozlowski@samsung.com>
221+
Krzysztof Kozlowski <krzk@kernel.org> <krzysztof.kozlowski@canonical.com>
215222
Kuninori Morimoto <kuninori.morimoto.gx@renesas.com>
216223
Kuogee Hsieh <quic_khsieh@quicinc.com> <khsieh@codeaurora.org>
217224
Leonardo Bras <leobras.c@gmail.com> <leonardo@linux.ibm.com>
@@ -329,6 +336,9 @@ Rémi Denis-Courmont <rdenis@simphalempin.com>
329336
Ricardo Ribalda <ribalda@kernel.org> <ricardo@ribalda.com>
330337
Ricardo Ribalda <ribalda@kernel.org> Ricardo Ribalda Delgado <ribalda@kernel.org>
331338
Ricardo Ribalda <ribalda@kernel.org> <ricardo.ribalda@gmail.com>
339+
Roman Gushchin <roman.gushchin@linux.dev> <guro@fb.com>
340+
Roman Gushchin <roman.gushchin@linux.dev> <guroan@gmail.com>
341+
Roman Gushchin <roman.gushchin@linux.dev> <klamm@yandex-team.ru>
332342
Ross Zwisler <zwisler@kernel.org> <ross.zwisler@linux.intel.com>
333343
Rudolf Marek <R.Marek@sh.cvut.cz>
334344
Rui Saraiva <rmps@joel.ist.utl.pt>

CREDITS

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -895,6 +895,12 @@ S: 3000 FORE Drive
895895
S: Warrendale, Pennsylvania 15086
896896
S: USA
897897

898+
N: Ludovic Desroches
899+
E: ludovic.desroches@microchip.com
900+
D: Maintainer for ARM/Microchip (AT91) SoC support
901+
D: Author of ADC, pinctrl, XDMA and SDHCI drivers for this platform
902+
S: France
903+
898904
N: Martin Devera
899905
E: devik@cdi.cz
900906
W: http://luxik.cdi.cz/~devik/qos/

Documentation/ABI/testing/sysfs-class-power

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -468,6 +468,7 @@ Description:
468468
auto: Charge normally, respect thresholds
469469
inhibit-charge: Do not charge while AC is attached
470470
force-discharge: Force discharge while AC is attached
471+
================ ====================================
471472

472473
What: /sys/class/power_supply/<supply_name>/technology
473474
Date: May 2007

Documentation/ABI/testing/sysfs-driver-aspeed-uart-routing

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
What: /sys/bus/platform/drivers/aspeed-uart-routing/*/uart*
1+
What: /sys/bus/platform/drivers/aspeed-uart-routing/\*/uart\*
22
Date: September 2021
33
Contact: Oskar Senft <osk@google.com>
44
Chia-Wei Wang <chiawei_wang@aspeedtech.com>
@@ -9,15 +9,15 @@ Description: Selects the RX source of the UARTx device.
99
depends on the selected file.
1010

1111
e.g.
12-
cat /sys/bus/platform/drivers/aspeed-uart-routing/*.uart_routing/uart1
12+
cat /sys/bus/platform/drivers/aspeed-uart-routing/\*.uart_routing/uart1
1313
[io1] io2 io3 io4 uart2 uart3 uart4 io6
1414

1515
In this case, UART1 gets its input from IO1 (physical serial port 1).
1616

1717
Users: OpenBMC. Proposed changes should be mailed to
1818
openbmc@lists.ozlabs.org
1919

20-
What: /sys/bus/platform/drivers/aspeed-uart-routing/*/io*
20+
What: /sys/bus/platform/drivers/aspeed-uart-routing/\*/io\*
2121
Date: September 2021
2222
Contact: Oskar Senft <osk@google.com>
2323
Chia-Wei Wang <chiawei_wang@aspeedtech.com>

Documentation/accounting/psi.rst

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,8 @@ Triggers can be set on more than one psi metric and more than one trigger
9292
for the same psi metric can be specified. However for each trigger a separate
9393
file descriptor is required to be able to poll it separately from others,
9494
therefore for each trigger a separate open() syscall should be made even
95-
when opening the same psi interface file.
95+
when opening the same psi interface file. Write operations to a file descriptor
96+
with an already existing psi trigger will fail with EBUSY.
9697

9798
Monitors activate only when system enters stall state for the monitored
9899
psi metric and deactivates upon exit from the stall state. While system is

Documentation/admin-guide/gpio/index.rst

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ gpio
1010
gpio-aggregator
1111
sysfs
1212
gpio-mockup
13+
gpio-sim
1314

1415
.. only:: subproject and html
1516

Documentation/admin-guide/hw-vuln/spectre.rst

Lines changed: 33 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,8 @@ privileged data touched during the speculative execution.
6060
Spectre variant 1 attacks take advantage of speculative execution of
6161
conditional branches, while Spectre variant 2 attacks use speculative
6262
execution of indirect branches to leak privileged memory.
63-
See :ref:`[1] <spec_ref1>` :ref:`[5] <spec_ref5>` :ref:`[7] <spec_ref7>`
64-
:ref:`[10] <spec_ref10>` :ref:`[11] <spec_ref11>`.
63+
See :ref:`[1] <spec_ref1>` :ref:`[5] <spec_ref5>` :ref:`[6] <spec_ref6>`
64+
:ref:`[7] <spec_ref7>` :ref:`[10] <spec_ref10>` :ref:`[11] <spec_ref11>`.
6565

6666
Spectre variant 1 (Bounds Check Bypass)
6767
---------------------------------------
@@ -131,6 +131,19 @@ steer its indirect branch speculations to gadget code, and measure the
131131
speculative execution's side effects left in level 1 cache to infer the
132132
victim's data.
133133

134+
Yet another variant 2 attack vector is for the attacker to poison the
135+
Branch History Buffer (BHB) to speculatively steer an indirect branch
136+
to a specific Branch Target Buffer (BTB) entry, even if the entry isn't
137+
associated with the source address of the indirect branch. Specifically,
138+
the BHB might be shared across privilege levels even in the presence of
139+
Enhanced IBRS.
140+
141+
Currently the only known real-world BHB attack vector is via
142+
unprivileged eBPF. Therefore, it's highly recommended to not enable
143+
unprivileged eBPF, especially when eIBRS is used (without retpolines).
144+
For a full mitigation against BHB attacks, it's recommended to use
145+
retpolines (or eIBRS combined with retpolines).
146+
134147
Attack scenarios
135148
----------------
136149

@@ -364,13 +377,15 @@ The possible values in this file are:
364377

365378
- Kernel status:
366379

367-
==================================== =================================
368-
'Not affected' The processor is not vulnerable
369-
'Vulnerable' Vulnerable, no mitigation
370-
'Mitigation: Full generic retpoline' Software-focused mitigation
371-
'Mitigation: Full AMD retpoline' AMD-specific software mitigation
372-
'Mitigation: Enhanced IBRS' Hardware-focused mitigation
373-
==================================== =================================
380+
======================================== =================================
381+
'Not affected' The processor is not vulnerable
382+
'Mitigation: None' Vulnerable, no mitigation
383+
'Mitigation: Retpolines' Use Retpoline thunks
384+
'Mitigation: LFENCE' Use LFENCE instructions
385+
'Mitigation: Enhanced IBRS' Hardware-focused mitigation
386+
'Mitigation: Enhanced IBRS + Retpolines' Hardware-focused + Retpolines
387+
'Mitigation: Enhanced IBRS + LFENCE' Hardware-focused + LFENCE
388+
======================================== =================================
374389

375390
- Firmware status: Show if Indirect Branch Restricted Speculation (IBRS) is
376391
used to protect against Spectre variant 2 attacks when calling firmware (x86 only).
@@ -583,12 +598,13 @@ kernel command line.
583598

584599
Specific mitigations can also be selected manually:
585600

586-
retpoline
587-
replace indirect branches
588-
retpoline,generic
589-
google's original retpoline
590-
retpoline,amd
591-
AMD-specific minimal thunk
601+
retpoline auto pick between generic,lfence
602+
retpoline,generic Retpolines
603+
retpoline,lfence LFENCE; indirect branch
604+
retpoline,amd alias for retpoline,lfence
605+
eibrs enhanced IBRS
606+
eibrs,retpoline enhanced IBRS + Retpolines
607+
eibrs,lfence enhanced IBRS + LFENCE
592608

593609
Not specifying this option is equivalent to
594610
spectre_v2=auto.
@@ -599,7 +615,7 @@ kernel command line.
599615
spectre_v2=off. Spectre variant 1 mitigations
600616
cannot be disabled.
601617

602-
For spectre_v2_user see :doc:`/admin-guide/kernel-parameters`.
618+
For spectre_v2_user see Documentation/admin-guide/kernel-parameters.txt
603619

604620
Mitigation selection guide
605621
--------------------------
@@ -681,7 +697,7 @@ AMD white papers:
681697

682698
.. _spec_ref6:
683699

684-
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/90343-B_SoftwareTechniquesforManagingSpeculation_WP_7-18Update_FNL.pdf>`_.
700+
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/Managing-Speculation-on-AMD-Processors.pdf>`_.
685701

686702
ARM white papers:
687703

Documentation/admin-guide/kernel-parameters.txt

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5361,8 +5361,12 @@
53615361
Specific mitigations can also be selected manually:
53625362

53635363
retpoline - replace indirect branches
5364-
retpoline,generic - google's original retpoline
5365-
retpoline,amd - AMD-specific minimal thunk
5364+
retpoline,generic - Retpolines
5365+
retpoline,lfence - LFENCE; indirect branch
5366+
retpoline,amd - alias for retpoline,lfence
5367+
eibrs - enhanced IBRS
5368+
eibrs,retpoline - enhanced IBRS + Retpolines
5369+
eibrs,lfence - enhanced IBRS + LFENCE
53665370

53675371
Not specifying this option is equivalent to
53685372
spectre_v2=auto.

Documentation/admin-guide/mm/pagemap.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ There are four components to pagemap:
2323
* Bit 56 page exclusively mapped (since 4.2)
2424
* Bit 57 pte is uffd-wp write-protected (since 5.13) (see
2525
:ref:`Documentation/admin-guide/mm/userfaultfd.rst <userfaultfd>`)
26-
* Bits 57-60 zero
26+
* Bits 58-60 zero
2727
* Bit 61 page is file-page or shared-anon (since 3.5)
2828
* Bit 62 page swapped
2929
* Bit 63 page present

Documentation/arm/marvell.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -266,10 +266,12 @@ Avanta family
266266
-------------
267267

268268
Flavors:
269+
- 88F6500
269270
- 88F6510
270271
- 88F6530P
271272
- 88F6550
272273
- 88F6560
274+
- 88F6601
273275

274276
Homepage:
275277
https://web.archive.org/web/20181005145041/http://www.marvell.com/broadband/

0 commit comments

Comments
 (0)