Skip to content

Commit 05292f1

Browse files
committed
Merge remote-tracking branch 'upstream/lf-5.15.y' into cp-release/lf-5.15.y
2 parents ddae3c6 + fa6c316 commit 05292f1

File tree

3,278 files changed

+63628
-25692
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,278 files changed

+63628
-25692
lines changed

Documentation/accounting/psi.rst

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,8 @@ Triggers can be set on more than one psi metric and more than one trigger
9292
for the same psi metric can be specified. However for each trigger a separate
9393
file descriptor is required to be able to poll it separately from others,
9494
therefore for each trigger a separate open() syscall should be made even
95-
when opening the same psi interface file.
95+
when opening the same psi interface file. Write operations to a file descriptor
96+
with an already existing psi trigger will fail with EBUSY.
9697

9798
Monitors activate only when system enters stall state for the monitored
9899
psi metric and deactivates upon exit from the stall state. While system is

Documentation/admin-guide/cifs/usage.rst

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -734,10 +734,9 @@ SecurityFlags Flags which control security negotiation and
734734
using weaker password hashes is 0x37037 (lanman,
735735
plaintext, ntlm, ntlmv2, signing allowed). Some
736736
SecurityFlags require the corresponding menuconfig
737-
options to be enabled (lanman and plaintext require
738-
CONFIG_CIFS_WEAK_PW_HASH for example). Enabling
739-
plaintext authentication currently requires also
740-
enabling lanman authentication in the security flags
737+
options to be enabled. Enabling plaintext
738+
authentication currently requires also enabling
739+
lanman authentication in the security flags
741740
because the cifs module only supports sending
742741
laintext passwords using the older lanman dialect
743742
form of the session setup SMB. (e.g. for authentication

Documentation/admin-guide/devices.txt

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2339,13 +2339,7 @@
23392339
disks (see major number 3) except that the limit on
23402340
partitions is 31.
23412341

2342-
162 char Raw block device interface
2343-
0 = /dev/rawctl Raw I/O control device
2344-
1 = /dev/raw/raw1 First raw I/O device
2345-
2 = /dev/raw/raw2 Second raw I/O device
2346-
...
2347-
max minor number of raw device is set by kernel config
2348-
MAX_RAW_DEVS or raw module parameter 'max_raw_devs'
2342+
162 char Used for (now removed) raw block device interface
23492343

23502344
163 char
23512345

Documentation/admin-guide/hw-vuln/spectre.rst

Lines changed: 33 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,8 @@ privileged data touched during the speculative execution.
6060
Spectre variant 1 attacks take advantage of speculative execution of
6161
conditional branches, while Spectre variant 2 attacks use speculative
6262
execution of indirect branches to leak privileged memory.
63-
See :ref:`[1] <spec_ref1>` :ref:`[5] <spec_ref5>` :ref:`[7] <spec_ref7>`
64-
:ref:`[10] <spec_ref10>` :ref:`[11] <spec_ref11>`.
63+
See :ref:`[1] <spec_ref1>` :ref:`[5] <spec_ref5>` :ref:`[6] <spec_ref6>`
64+
:ref:`[7] <spec_ref7>` :ref:`[10] <spec_ref10>` :ref:`[11] <spec_ref11>`.
6565

6666
Spectre variant 1 (Bounds Check Bypass)
6767
---------------------------------------
@@ -131,6 +131,19 @@ steer its indirect branch speculations to gadget code, and measure the
131131
speculative execution's side effects left in level 1 cache to infer the
132132
victim's data.
133133

134+
Yet another variant 2 attack vector is for the attacker to poison the
135+
Branch History Buffer (BHB) to speculatively steer an indirect branch
136+
to a specific Branch Target Buffer (BTB) entry, even if the entry isn't
137+
associated with the source address of the indirect branch. Specifically,
138+
the BHB might be shared across privilege levels even in the presence of
139+
Enhanced IBRS.
140+
141+
Currently the only known real-world BHB attack vector is via
142+
unprivileged eBPF. Therefore, it's highly recommended to not enable
143+
unprivileged eBPF, especially when eIBRS is used (without retpolines).
144+
For a full mitigation against BHB attacks, it's recommended to use
145+
retpolines (or eIBRS combined with retpolines).
146+
134147
Attack scenarios
135148
----------------
136149

@@ -364,13 +377,15 @@ The possible values in this file are:
364377

365378
- Kernel status:
366379

367-
==================================== =================================
368-
'Not affected' The processor is not vulnerable
369-
'Vulnerable' Vulnerable, no mitigation
370-
'Mitigation: Full generic retpoline' Software-focused mitigation
371-
'Mitigation: Full AMD retpoline' AMD-specific software mitigation
372-
'Mitigation: Enhanced IBRS' Hardware-focused mitigation
373-
==================================== =================================
380+
======================================== =================================
381+
'Not affected' The processor is not vulnerable
382+
'Mitigation: None' Vulnerable, no mitigation
383+
'Mitigation: Retpolines' Use Retpoline thunks
384+
'Mitigation: LFENCE' Use LFENCE instructions
385+
'Mitigation: Enhanced IBRS' Hardware-focused mitigation
386+
'Mitigation: Enhanced IBRS + Retpolines' Hardware-focused + Retpolines
387+
'Mitigation: Enhanced IBRS + LFENCE' Hardware-focused + LFENCE
388+
======================================== =================================
374389

375390
- Firmware status: Show if Indirect Branch Restricted Speculation (IBRS) is
376391
used to protect against Spectre variant 2 attacks when calling firmware (x86 only).
@@ -468,7 +483,7 @@ Spectre variant 2
468483
before invoking any firmware code to prevent Spectre variant 2 exploits
469484
using the firmware.
470485

471-
Using kernel address space randomization (CONFIG_RANDOMIZE_SLAB=y
486+
Using kernel address space randomization (CONFIG_RANDOMIZE_BASE=y
472487
and CONFIG_SLAB_FREELIST_RANDOM=y in the kernel configuration) makes
473488
attacks on the kernel generally more difficult.
474489

@@ -584,12 +599,13 @@ kernel command line.
584599

585600
Specific mitigations can also be selected manually:
586601

587-
retpoline
588-
replace indirect branches
589-
retpoline,generic
590-
google's original retpoline
591-
retpoline,amd
592-
AMD-specific minimal thunk
602+
retpoline auto pick between generic,lfence
603+
retpoline,generic Retpolines
604+
retpoline,lfence LFENCE; indirect branch
605+
retpoline,amd alias for retpoline,lfence
606+
eibrs enhanced IBRS
607+
eibrs,retpoline enhanced IBRS + Retpolines
608+
eibrs,lfence enhanced IBRS + LFENCE
593609

594610
Not specifying this option is equivalent to
595611
spectre_v2=auto.
@@ -730,7 +746,7 @@ AMD white papers:
730746

731747
.. _spec_ref6:
732748

733-
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/90343-B_SoftwareTechniquesforManagingSpeculation_WP_7-18Update_FNL.pdf>`_.
749+
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/Managing-Speculation-on-AMD-Processors.pdf>`_.
734750

735751
ARM white papers:
736752

Documentation/admin-guide/kernel-parameters.txt

Lines changed: 25 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1690,6 +1690,8 @@
16901690
architectures force reset to be always executed
16911691
i8042.unlock [HW] Unlock (ignore) the keylock
16921692
i8042.kbdreset [HW] Reset device connected to KBD port
1693+
i8042.probe_defer
1694+
[HW] Allow deferred probing upon i8042 probe errors
16931695

16941696
i810= [HW,DRM]
16951697

@@ -2403,8 +2405,12 @@
24032405
Default is 1 (enabled)
24042406

24052407
kvm-intel.emulate_invalid_guest_state=
2406-
[KVM,Intel] Enable emulation of invalid guest states
2407-
Default is 0 (disabled)
2408+
[KVM,Intel] Disable emulation of invalid guest state.
2409+
Ignored if kvm-intel.enable_unrestricted_guest=1, as
2410+
guest state is never invalid for unrestricted guests.
2411+
This param doesn't apply to nested guests (L2), as KVM
2412+
never emulates invalid L2 guest state.
2413+
Default is 1 (enabled)
24082414

24092415
kvm-intel.flexpriority=
24102416
[KVM,Intel] Disable FlexPriority feature (TPR shadow).
@@ -5261,8 +5267,12 @@
52615267
Specific mitigations can also be selected manually:
52625268

52635269
retpoline - replace indirect branches
5264-
retpoline,generic - google's original retpoline
5265-
retpoline,amd - AMD-specific minimal thunk
5270+
retpoline,generic - Retpolines
5271+
retpoline,lfence - LFENCE; indirect branch
5272+
retpoline,amd - alias for retpoline,lfence
5273+
eibrs - enhanced IBRS
5274+
eibrs,retpoline - enhanced IBRS + Retpolines
5275+
eibrs,lfence - enhanced IBRS + LFENCE
52665276

52675277
Not specifying this option is equivalent to
52685278
spectre_v2=auto.
@@ -5767,11 +5777,22 @@
57675777
sources:
57685778
- "tpm"
57695779
- "tee"
5780+
- "caam"
57705781
If not specified then it defaults to iterating through
57715782
the trust source list starting with TPM and assigns the
57725783
first trust source as a backend which is initialized
57735784
successfully during iteration.
57745785

5786+
trusted.rng= [KEYS]
5787+
Format: <string>
5788+
The RNG used to generate key material for trusted keys.
5789+
Can be one of:
5790+
- "kernel"
5791+
- the same value as trusted.source: "tpm" or "tee"
5792+
- "default"
5793+
If not specified, "default" is used. In this case,
5794+
the RNG's choice is left to each individual trust source.
5795+
57755796
tsc= Disable clocksource stability checks for TSC.
57765797
Format: <string>
57775798
[x86] reliable: mark tsc clocksource as reliable, this

Documentation/admin-guide/mm/pagemap.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ There are four components to pagemap:
2323
* Bit 56 page exclusively mapped (since 4.2)
2424
* Bit 57 pte is uffd-wp write-protected (since 5.13) (see
2525
:ref:`Documentation/admin-guide/mm/userfaultfd.rst <userfaultfd>`)
26-
* Bits 57-60 zero
26+
* Bits 58-60 zero
2727
* Bit 61 page is file-page or shared-anon (since 3.5)
2828
* Bit 62 page swapped
2929
* Bit 63 page present

Documentation/admin-guide/sysctl/kernel.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1099,7 +1099,7 @@ task_delayacct
10991099
===============
11001100

11011101
Enables/disables task delay accounting (see
1102-
:doc:`accounting/delay-accounting.rst`). Enabling this feature incurs
1102+
Documentation/accounting/delay-accounting.rst. Enabling this feature incurs
11031103
a small amount of overhead in the scheduler but is useful for debugging
11041104
and performance tuning. It is required by some tools such as iotop.
11051105

Documentation/arm64/cpu-feature-registers.rst

Lines changed: 27 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -235,15 +235,23 @@ infrastructure:
235235
| DPB | [3-0] | y |
236236
+------------------------------+---------+---------+
237237

238-
6) ID_AA64MMFR2_EL1 - Memory model feature register 2
238+
6) ID_AA64MMFR0_EL1 - Memory model feature register 0
239+
240+
+------------------------------+---------+---------+
241+
| Name | bits | visible |
242+
+------------------------------+---------+---------+
243+
| ECV | [63-60] | y |
244+
+------------------------------+---------+---------+
245+
246+
7) ID_AA64MMFR2_EL1 - Memory model feature register 2
239247

240248
+------------------------------+---------+---------+
241249
| Name | bits | visible |
242250
+------------------------------+---------+---------+
243251
| AT | [35-32] | y |
244252
+------------------------------+---------+---------+
245253

246-
7) ID_AA64ZFR0_EL1 - SVE feature ID register 0
254+
8) ID_AA64ZFR0_EL1 - SVE feature ID register 0
247255

248256
+------------------------------+---------+---------+
249257
| Name | bits | visible |
@@ -267,6 +275,23 @@ infrastructure:
267275
| SVEVer | [3-0] | y |
268276
+------------------------------+---------+---------+
269277

278+
8) ID_AA64MMFR1_EL1 - Memory model feature register 1
279+
280+
+------------------------------+---------+---------+
281+
| Name | bits | visible |
282+
+------------------------------+---------+---------+
283+
| AFP | [47-44] | y |
284+
+------------------------------+---------+---------+
285+
286+
9) ID_AA64ISAR2_EL1 - Instruction set attribute register 2
287+
288+
+------------------------------+---------+---------+
289+
| Name | bits | visible |
290+
+------------------------------+---------+---------+
291+
| RPRES | [7-4] | y |
292+
+------------------------------+---------+---------+
293+
294+
270295
Appendix I: Example
271296
-------------------
272297

Documentation/arm64/elf_hwcaps.rst

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -247,6 +247,18 @@ HWCAP2_MTE
247247
Functionality implied by ID_AA64PFR1_EL1.MTE == 0b0010, as described
248248
by Documentation/arm64/memory-tagging-extension.rst.
249249

250+
HWCAP2_ECV
251+
252+
Functionality implied by ID_AA64MMFR0_EL1.ECV == 0b0001.
253+
254+
HWCAP2_AFP
255+
256+
Functionality implied by ID_AA64MFR1_EL1.AFP == 0b0001.
257+
258+
HWCAP2_RPRES
259+
260+
Functionality implied by ID_AA64ISAR2_EL1.RPRES == 0b0001.
261+
250262
4. Unused AT_HWCAP bits
251263
-----------------------
252264

Documentation/devicetree/bindings/arm/omap/omap.txt

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -119,6 +119,9 @@ Boards (incomplete list of examples):
119119
- OMAP3 BeagleBoard : Low cost community board
120120
compatible = "ti,omap3-beagle", "ti,omap3430", "ti,omap3"
121121

122+
- OMAP3 BeagleBoard A to B4 : Early BeagleBoard revisions A to B4 with a timer quirk
123+
compatible = "ti,omap3-beagle-ab4", "ti,omap3-beagle", "ti,omap3430", "ti,omap3"
124+
122125
- OMAP3 Tobi with Overo : Commercial expansion board with daughter board
123126
compatible = "gumstix,omap3-overo-tobi", "gumstix,omap3-overo", "ti,omap3430", "ti,omap3"
124127

0 commit comments

Comments
 (0)