Skip to content

Commit e5019b1

Browse files
committed
Merge 6.9-rc5 into driver-core-next
We want the kernfs fixes in here as well. Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2 parents 66bc1a1 + ed30a4a commit e5019b1

1,346 files changed

Lines changed: 20038 additions & 9260 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.mailmap

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ Adam Oldham <oldhamca@gmail.com>
2020
Adam Radford <aradford@gmail.com>
2121
Adriana Reus <adi.reus@gmail.com> <adriana.reus@intel.com>
2222
Adrian Bunk <bunk@stusta.de>
23+
Ajay Kaher <ajay.kaher@broadcom.com> <akaher@vmware.com>
2324
Akhil P Oommen <quic_akhilpo@quicinc.com> <akhilpo@codeaurora.org>
2425
Alan Cox <alan@lxorguk.ukuu.org.uk>
2526
Alan Cox <root@hraefn.swansea.linux.org.uk>
@@ -36,6 +37,7 @@ Alexei Avshalom Lazar <quic_ailizaro@quicinc.com> <ailizaro@codeaurora.org>
3637
Alexei Starovoitov <ast@kernel.org> <alexei.starovoitov@gmail.com>
3738
Alexei Starovoitov <ast@kernel.org> <ast@fb.com>
3839
Alexei Starovoitov <ast@kernel.org> <ast@plumgrid.com>
40+
Alexey Makhalov <alexey.amakhalov@broadcom.com> <amakhalov@vmware.com>
3941
Alex Hung <alexhung@gmail.com> <alex.hung@canonical.com>
4042
Alex Shi <alexs@kernel.org> <alex.shi@intel.com>
4143
Alex Shi <alexs@kernel.org> <alex.shi@linaro.org>
@@ -110,6 +112,7 @@ Brendan Higgins <brendan.higgins@linux.dev> <brendanhiggins@google.com>
110112
Brian Avery <b.avery@hp.com>
111113
Brian King <brking@us.ibm.com>
112114
Brian Silverman <bsilver16384@gmail.com> <brian.silverman@bluerivertech.com>
115+
Bryan Tan <bryan-bt.tan@broadcom.com> <bryantan@vmware.com>
113116
Cai Huoqing <cai.huoqing@linux.dev> <caihuoqing@baidu.com>
114117
Can Guo <quic_cang@quicinc.com> <cang@codeaurora.org>
115118
Carl Huang <quic_cjhuang@quicinc.com> <cjhuang@codeaurora.org>
@@ -340,7 +343,8 @@ Lee Jones <lee@kernel.org> <joneslee@google.com>
340343
Lee Jones <lee@kernel.org> <lee.jones@canonical.com>
341344
Lee Jones <lee@kernel.org> <lee.jones@linaro.org>
342345
Lee Jones <lee@kernel.org> <lee@ubuntu.com>
343-
Leonard Crestez <leonard.crestez@nxp.com> Leonard Crestez <cdleonard@gmail.com>
346+
Leonard Crestez <cdleonard@gmail.com> <leonard.crestez@nxp.com>
347+
Leonard Crestez <cdleonard@gmail.com> <leonard.crestez@intel.com>
344348
Leonardo Bras <leobras.c@gmail.com> <leonardo@linux.ibm.com>
345349
Leonard Göhrs <l.goehrs@pengutronix.de>
346350
Leonid I Ananiev <leonid.i.ananiev@intel.com>
@@ -442,7 +446,8 @@ Mythri P K <mythripk@ti.com>
442446
Nadav Amit <nadav.amit@gmail.com> <namit@vmware.com>
443447
Nadav Amit <nadav.amit@gmail.com> <namit@cs.technion.ac.il>
444448
Nadia Yvette Chambers <nyc@holomorphy.com> William Lee Irwin III <wli@holomorphy.com>
445-
Naoya Horiguchi <naoya.horiguchi@nec.com> <n-horiguchi@ah.jp.nec.com>
449+
Naoya Horiguchi <nao.horiguchi@gmail.com> <n-horiguchi@ah.jp.nec.com>
450+
Naoya Horiguchi <nao.horiguchi@gmail.com> <naoya.horiguchi@nec.com>
446451
Nathan Chancellor <nathan@kernel.org> <natechancellor@gmail.com>
447452
Neeraj Upadhyay <quic_neeraju@quicinc.com> <neeraju@codeaurora.org>
448453
Neil Armstrong <neil.armstrong@linaro.org> <narmstrong@baylibre.com>
@@ -497,7 +502,8 @@ Prasad Sodagudi <quic_psodagud@quicinc.com> <psodagud@codeaurora.org>
497502
Punit Agrawal <punitagrawal@gmail.com> <punit.agrawal@arm.com>
498503
Qais Yousef <qyousef@layalina.io> <qais.yousef@imgtec.com>
499504
Qais Yousef <qyousef@layalina.io> <qais.yousef@arm.com>
500-
Quentin Monnet <quentin@isovalent.com> <quentin.monnet@netronome.com>
505+
Quentin Monnet <qmo@kernel.org> <quentin.monnet@netronome.com>
506+
Quentin Monnet <qmo@kernel.org> <quentin@isovalent.com>
501507
Quentin Perret <qperret@qperret.net> <quentin.perret@arm.com>
502508
Rafael J. Wysocki <rjw@rjwysocki.net> <rjw@sisk.pl>
503509
Rajeev Nandan <quic_rajeevny@quicinc.com> <rajeevny@codeaurora.org>
@@ -519,6 +525,7 @@ Rémi Denis-Courmont <rdenis@simphalempin.com>
519525
Ricardo Ribalda <ribalda@kernel.org> <ricardo@ribalda.com>
520526
Ricardo Ribalda <ribalda@kernel.org> Ricardo Ribalda Delgado <ribalda@kernel.org>
521527
Ricardo Ribalda <ribalda@kernel.org> <ricardo.ribalda@gmail.com>
528+
Richard Genoud <richard.genoud@bootlin.com> <richard.genoud@gmail.com>
522529
Richard Leitner <richard.leitner@linux.dev> <dev@g0hl1n.net>
523530
Richard Leitner <richard.leitner@linux.dev> <me@g0hl1n.net>
524531
Richard Leitner <richard.leitner@linux.dev> <richard.leitner@skidata.com>
@@ -527,6 +534,7 @@ Rocky Liao <quic_rjliao@quicinc.com> <rjliao@codeaurora.org>
527534
Roman Gushchin <roman.gushchin@linux.dev> <guro@fb.com>
528535
Roman Gushchin <roman.gushchin@linux.dev> <guroan@gmail.com>
529536
Roman Gushchin <roman.gushchin@linux.dev> <klamm@yandex-team.ru>
537+
Ronak Doshi <ronak.doshi@broadcom.com> <doshir@vmware.com>
530538
Muchun Song <muchun.song@linux.dev> <songmuchun@bytedance.com>
531539
Muchun Song <muchun.song@linux.dev> <smuchun@gmail.com>
532540
Ross Zwisler <zwisler@kernel.org> <ross.zwisler@linux.intel.com>
@@ -649,6 +657,7 @@ Viresh Kumar <vireshk@kernel.org> <viresh.kumar@st.com>
649657
Viresh Kumar <vireshk@kernel.org> <viresh.linux@gmail.com>
650658
Viresh Kumar <viresh.kumar@linaro.org> <viresh.kumar@linaro.org>
651659
Viresh Kumar <viresh.kumar@linaro.org> <viresh.kumar@linaro.com>
660+
Vishnu Dasa <vishnu.dasa@broadcom.com> <vdasa@vmware.com>
652661
Vivek Aknurwar <quic_viveka@quicinc.com> <viveka@codeaurora.org>
653662
Vivien Didelot <vivien.didelot@gmail.com> <vivien.didelot@savoirfairelinux.com>
654663
Vlad Dogaru <ddvlad@gmail.com> <vlad.dogaru@intel.com>

CREDITS

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3146,6 +3146,10 @@ S: Triftstra=DFe 55
31463146
S: 13353 Berlin
31473147
S: Germany
31483148

3149+
N: Gustavo Pimental
3150+
E: gustavo.pimentel@synopsys.com
3151+
D: PCI driver for Synopsys DesignWare
3152+
31493153
N: Emanuel Pirker
31503154
E: epirker@edu.uni-klu.ac.at
31513155
D: AIC5800 IEEE 1394, RAW I/O on 1394

Documentation/admin-guide/hw-vuln/spectre.rst

Lines changed: 38 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -138,11 +138,10 @@ associated with the source address of the indirect branch. Specifically,
138138
the BHB might be shared across privilege levels even in the presence of
139139
Enhanced IBRS.
140140

141-
Currently the only known real-world BHB attack vector is via
142-
unprivileged eBPF. Therefore, it's highly recommended to not enable
143-
unprivileged eBPF, especially when eIBRS is used (without retpolines).
144-
For a full mitigation against BHB attacks, it's recommended to use
145-
retpolines (or eIBRS combined with retpolines).
141+
Previously the only known real-world BHB attack vector was via unprivileged
142+
eBPF. Further research has found attacks that don't require unprivileged eBPF.
143+
For a full mitigation against BHB attacks it is recommended to set BHI_DIS_S or
144+
use the BHB clearing sequence.
146145

147146
Attack scenarios
148147
----------------
@@ -430,6 +429,23 @@ The possible values in this file are:
430429
'PBRSB-eIBRS: Not affected' CPU is not affected by PBRSB
431430
=========================== =======================================================
432431

432+
- Branch History Injection (BHI) protection status:
433+
434+
.. list-table::
435+
436+
* - BHI: Not affected
437+
- System is not affected
438+
* - BHI: Retpoline
439+
- System is protected by retpoline
440+
* - BHI: BHI_DIS_S
441+
- System is protected by BHI_DIS_S
442+
* - BHI: SW loop, KVM SW loop
443+
- System is protected by software clearing sequence
444+
* - BHI: Vulnerable
445+
- System is vulnerable to BHI
446+
* - BHI: Vulnerable, KVM: SW loop
447+
- System is vulnerable; KVM is protected by software clearing sequence
448+
433449
Full mitigation might require a microcode update from the CPU
434450
vendor. When the necessary microcode is not available, the kernel will
435451
report vulnerability.
@@ -484,7 +500,11 @@ Spectre variant 2
484500

485501
Systems which support enhanced IBRS (eIBRS) enable IBRS protection once at
486502
boot, by setting the IBRS bit, and they're automatically protected against
487-
Spectre v2 variant attacks.
503+
some Spectre v2 variant attacks. The BHB can still influence the choice of
504+
indirect branch predictor entry, and although branch predictor entries are
505+
isolated between modes when eIBRS is enabled, the BHB itself is not isolated
506+
between modes. Systems which support BHI_DIS_S will set it to protect against
507+
BHI attacks.
488508

489509
On Intel's enhanced IBRS systems, this includes cross-thread branch target
490510
injections on SMT systems (STIBP). In other words, Intel eIBRS enables
@@ -638,6 +658,18 @@ kernel command line.
638658
spectre_v2=off. Spectre variant 1 mitigations
639659
cannot be disabled.
640660

661+
spectre_bhi=
662+
663+
[X86] Control mitigation of Branch History Injection
664+
(BHI) vulnerability. This setting affects the deployment
665+
of the HW BHI control and the SW BHB clearing sequence.
666+
667+
on
668+
(default) Enable the HW or SW mitigation as
669+
needed.
670+
off
671+
Disable the mitigation.
672+
641673
For spectre_v2_user see Documentation/admin-guide/kernel-parameters.txt
642674

643675
Mitigation selection guide

Documentation/admin-guide/kernel-parameters.txt

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3444,6 +3444,7 @@
34443444
retbleed=off [X86]
34453445
spec_rstack_overflow=off [X86]
34463446
spec_store_bypass_disable=off [X86,PPC]
3447+
spectre_bhi=off [X86]
34473448
spectre_v2_user=off [X86]
34483449
srbds=off [X86,INTEL]
34493450
ssbd=force-off [ARM64]
@@ -6063,6 +6064,15 @@
60636064
sonypi.*= [HW] Sony Programmable I/O Control Device driver
60646065
See Documentation/admin-guide/laptops/sonypi.rst
60656066

6067+
spectre_bhi= [X86] Control mitigation of Branch History Injection
6068+
(BHI) vulnerability. This setting affects the
6069+
deployment of the HW BHI control and the SW BHB
6070+
clearing sequence.
6071+
6072+
on - (default) Enable the HW or SW mitigation
6073+
as needed.
6074+
off - Disable the mitigation.
6075+
60666076
spectre_v2= [X86,EARLY] Control mitigation of Spectre variant 2
60676077
(indirect branch speculation) vulnerability.
60686078
The default operation protects the kernel from
@@ -6599,7 +6609,7 @@
65996609
To turn off having tracepoints sent to printk,
66006610
echo 0 > /proc/sys/kernel/tracepoint_printk
66016611
Note, echoing 1 into this file without the
6602-
tracepoint_printk kernel cmdline option has no effect.
6612+
tp_printk kernel cmdline option has no effect.
66036613

66046614
The tp_printk_stop_on_boot (see below) can also be used
66056615
to stop the printing of events to console at

Documentation/admin-guide/mm/zswap.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ Setting this parameter to 100 will disable the hysteresis.
155155

156156
Some users cannot tolerate the swapping that comes with zswap store failures
157157
and zswap writebacks. Swapping can be disabled entirely (without disabling
158-
zswap itself) on a cgroup-basis as follows:
158+
zswap itself) on a cgroup-basis as follows::
159159

160160
echo 0 > /sys/fs/cgroup/<cgroup-name>/memory.zswap.writeback
161161

@@ -166,7 +166,7 @@ writeback (because the same pages might be rejected again and again).
166166
When there is a sizable amount of cold memory residing in the zswap pool, it
167167
can be advantageous to proactively write these cold pages to swap and reclaim
168168
the memory for other use cases. By default, the zswap shrinker is disabled.
169-
User can enable it as follows:
169+
User can enable it as follows::
170170

171171
echo Y > /sys/module/zswap/parameters/shrinker_enabled
172172

Documentation/arch/x86/resctrl.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -574,7 +574,7 @@ Memory b/w domain is L3 cache.
574574
MB:<cache_id0>=bandwidth0;<cache_id1>=bandwidth1;...
575575

576576
Memory bandwidth Allocation specified in MiBps
577-
---------------------------------------------
577+
----------------------------------------------
578578

579579
Memory bandwidth domain is L3 cache.
580580
::

Documentation/dev-tools/testing-overview.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,8 @@ Some of these tools are listed below:
104104
KASAN and can be used in production. See Documentation/dev-tools/kfence.rst
105105
* lockdep is a locking correctness validator. See
106106
Documentation/locking/lockdep-design.rst
107+
* Runtime Verification (RV) supports checking specific behaviours for a given
108+
subsystem. See Documentation/trace/rv/runtime-verification.rst
107109
* There are several other pieces of debug instrumentation in the kernel, many
108110
of which can be found in lib/Kconfig.debug
109111

Documentation/devicetree/bindings/clock/keystone-gate.txt

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,3 @@
1-
Status: Unstable - ABI compatibility may be broken in the future
2-
31
Binding for Keystone gate control driver which uses PSC controller IP.
42

53
This binding uses the common clock binding[1].

Documentation/devicetree/bindings/clock/keystone-pll.txt

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,3 @@
1-
Status: Unstable - ABI compatibility may be broken in the future
2-
31
Binding for keystone PLLs. The main PLL IP typically has a multiplier,
42
a divider and a post divider. The additional PLL IPs like ARMPLL, DDRPLL
53
and PAPLL are controlled by the memory mapped register where as the Main

Documentation/devicetree/bindings/clock/ti/adpll.txt

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,5 @@
11
Binding for Texas Instruments ADPLL clock.
22

3-
Binding status: Unstable - ABI compatibility may be broken in the future
4-
53
This binding uses the common clock binding[1]. It assumes a
64
register-mapped ADPLL with two to three selectable input clocks
75
and three to four children.

0 commit comments

Comments
 (0)