Skip to content

Commit 026e14a

Browse files
committed
Merge branch 'for-6.0-fixes' into for-6.1
for-6.0 has the following fix for cgroup_get_from_id(). 836ac87d ("cgroup: fix cgroup_get_from_id") which conflicts with the following two commits in for-6.1. 4534dee ("cgroup: cgroup: Honor caller's cgroup NS when resolving cgroup id") fa7e439 ("cgroup: Homogenize cgroup_get_from_id() return value") While the resolution is straightforward, the code ends up pretty ugly afterwards. Let's pull for-6.0-fixes into for-6.1 so that the code can be fixed up there. Signed-off-by: Tejun Heo <[email protected]>
2 parents c478bd8 + df02452 commit 026e14a

File tree

1,032 files changed

+13381
-6937
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,032 files changed

+13381
-6937
lines changed

.get_maintainer.ignore

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,4 @@
1+
2+
13
Christoph Hellwig <[email protected]>
24
Marc Gonzalez <[email protected]>

.mailmap

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -98,8 +98,7 @@ Christian Brauner <[email protected]> <[email protected]>
9898
Christian Marangi <[email protected]>
9999
Christophe Ricard <[email protected]>
100100
Christoph Hellwig <[email protected]>
101-
102-
101+
103102
Corey Minyard <[email protected]>
104103
Damian Hobson-Garcia <[email protected]>
105104
@@ -150,6 +149,8 @@ Greg Kroah-Hartman <[email protected]>
150149
Greg Kroah-Hartman <[email protected]>
151150
152151
152+
Guilherme G. Piccoli <[email protected]> <[email protected]>
153+
Guilherme G. Piccoli <[email protected]> <[email protected]>
153154
154155
155156
Gustavo Padovan <[email protected]>
@@ -253,6 +254,7 @@ Linus Lüssing <[email protected]> <[email protected]>
253254
254255
255256
257+
256258
257259
258260

Documentation/ABI/testing/sysfs-devices-system-cpu

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -523,6 +523,7 @@ What: /sys/devices/system/cpu/vulnerabilities
523523
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort
524524
/sys/devices/system/cpu/vulnerabilities/itlb_multihit
525525
/sys/devices/system/cpu/vulnerabilities/mmio_stale_data
526+
/sys/devices/system/cpu/vulnerabilities/retbleed
526527
Date: January 2018
527528
Contact: Linux kernel mailing list <[email protected]>
528529
Description: Information about CPU vulnerabilities

Documentation/admin-guide/README.rst

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
.. _readme:
22

3-
Linux kernel release 5.x <http://kernel.org/>
3+
Linux kernel release 6.x <http://kernel.org/>
44
=============================================
55

6-
These are the release notes for Linux version 5. Read them carefully,
6+
These are the release notes for Linux version 6. Read them carefully,
77
as they tell you what this is all about, explain how to install the
88
kernel, and what to do if something goes wrong.
99

@@ -63,7 +63,7 @@ Installing the kernel source
6363
directory where you have permissions (e.g. your home directory) and
6464
unpack it::
6565

66-
xz -cd linux-5.x.tar.xz | tar xvf -
66+
xz -cd linux-6.x.tar.xz | tar xvf -
6767

6868
Replace "X" with the version number of the latest kernel.
6969

@@ -72,26 +72,26 @@ Installing the kernel source
7272
files. They should match the library, and not get messed up by
7373
whatever the kernel-du-jour happens to be.
7474

75-
- You can also upgrade between 5.x releases by patching. Patches are
75+
- You can also upgrade between 6.x releases by patching. Patches are
7676
distributed in the xz format. To install by patching, get all the
7777
newer patch files, enter the top level directory of the kernel source
78-
(linux-5.x) and execute::
78+
(linux-6.x) and execute::
7979

80-
xz -cd ../patch-5.x.xz | patch -p1
80+
xz -cd ../patch-6.x.xz | patch -p1
8181

8282
Replace "x" for all versions bigger than the version "x" of your current
8383
source tree, **in_order**, and you should be ok. You may want to remove
8484
the backup files (some-file-name~ or some-file-name.orig), and make sure
8585
that there are no failed patches (some-file-name# or some-file-name.rej).
8686
If there are, either you or I have made a mistake.
8787

88-
Unlike patches for the 5.x kernels, patches for the 5.x.y kernels
88+
Unlike patches for the 6.x kernels, patches for the 6.x.y kernels
8989
(also known as the -stable kernels) are not incremental but instead apply
90-
directly to the base 5.x kernel. For example, if your base kernel is 5.0
91-
and you want to apply the 5.0.3 patch, you must not first apply the 5.0.1
92-
and 5.0.2 patches. Similarly, if you are running kernel version 5.0.2 and
93-
want to jump to 5.0.3, you must first reverse the 5.0.2 patch (that is,
94-
patch -R) **before** applying the 5.0.3 patch. You can read more on this in
90+
directly to the base 6.x kernel. For example, if your base kernel is 6.0
91+
and you want to apply the 6.0.3 patch, you must not first apply the 6.0.1
92+
and 6.0.2 patches. Similarly, if you are running kernel version 6.0.2 and
93+
want to jump to 6.0.3, you must first reverse the 6.0.2 patch (that is,
94+
patch -R) **before** applying the 6.0.3 patch. You can read more on this in
9595
:ref:`Documentation/process/applying-patches.rst <applying_patches>`.
9696

9797
Alternatively, the script patch-kernel can be used to automate this
@@ -114,7 +114,7 @@ Installing the kernel source
114114
Software requirements
115115
---------------------
116116

117-
Compiling and running the 5.x kernels requires up-to-date
117+
Compiling and running the 6.x kernels requires up-to-date
118118
versions of various software packages. Consult
119119
:ref:`Documentation/process/changes.rst <changes>` for the minimum version numbers
120120
required and how to get updates for these packages. Beware that using
@@ -132,12 +132,12 @@ Build directory for the kernel
132132
place for the output files (including .config).
133133
Example::
134134

135-
kernel source code: /usr/src/linux-5.x
135+
kernel source code: /usr/src/linux-6.x
136136
build directory: /home/name/build/kernel
137137

138138
To configure and build the kernel, use::
139139

140-
cd /usr/src/linux-5.x
140+
cd /usr/src/linux-6.x
141141
make O=/home/name/build/kernel menuconfig
142142
make O=/home/name/build/kernel
143143
sudo make O=/home/name/build/kernel modules_install install

Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -230,6 +230,20 @@ The possible values in this file are:
230230
* - 'Mitigation: Clear CPU buffers'
231231
- The processor is vulnerable and the CPU buffer clearing mitigation is
232232
enabled.
233+
* - 'Unknown: No mitigations'
234+
- The processor vulnerability status is unknown because it is
235+
out of Servicing period. Mitigation is not attempted.
236+
237+
Definitions:
238+
------------
239+
240+
Servicing period: The process of providing functional and security updates to
241+
Intel processors or platforms, utilizing the Intel Platform Update (IPU)
242+
process or other similar mechanisms.
243+
244+
End of Servicing Updates (ESU): ESU is the date at which Intel will no
245+
longer provide Servicing, such as through IPU or other similar update
246+
processes. ESU dates will typically be aligned to end of quarter.
233247

234248
If the processor is vulnerable then the following information is appended to
235249
the above information:

Documentation/admin-guide/kernel-parameters.txt

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5331,6 +5331,8 @@
53315331
rodata= [KNL]
53325332
on Mark read-only kernel memory as read-only (default).
53335333
off Leave read-only kernel memory writable for debugging.
5334+
full Mark read-only kernel memory and aliases as read-only
5335+
[arm64]
53345336

53355337
rockchip.usb_uart
53365338
Enable the uart passthrough on the designated usb port

Documentation/admin-guide/mm/damon/usage.rst

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -50,10 +50,10 @@ For a short example, users can monitor the virtual address space of a given
5050
workload as below. ::
5151

5252
# cd /sys/kernel/mm/damon/admin/
53-
# echo 1 > kdamonds/nr && echo 1 > kdamonds/0/contexts/nr
53+
# echo 1 > kdamonds/nr_kdamonds && echo 1 > kdamonds/0/contexts/nr_contexts
5454
# echo vaddr > kdamonds/0/contexts/0/operations
55-
# echo 1 > kdamonds/0/contexts/0/targets/nr
56-
# echo $(pidof <workload>) > kdamonds/0/contexts/0/targets/0/pid
55+
# echo 1 > kdamonds/0/contexts/0/targets/nr_targets
56+
# echo $(pidof <workload>) > kdamonds/0/contexts/0/targets/0/pid_target
5757
# echo on > kdamonds/0/state
5858

5959
Files Hierarchy
@@ -366,12 +366,12 @@ memory rate becomes larger than 60%, or lower than 30%". ::
366366
# echo 1 > kdamonds/0/contexts/0/schemes/nr_schemes
367367
# cd kdamonds/0/contexts/0/schemes/0
368368
# # set the basic access pattern and the action
369-
# echo 4096 > access_patterns/sz/min
370-
# echo 8192 > access_patterns/sz/max
371-
# echo 0 > access_patterns/nr_accesses/min
372-
# echo 5 > access_patterns/nr_accesses/max
373-
# echo 10 > access_patterns/age/min
374-
# echo 20 > access_patterns/age/max
369+
# echo 4096 > access_pattern/sz/min
370+
# echo 8192 > access_pattern/sz/max
371+
# echo 0 > access_pattern/nr_accesses/min
372+
# echo 5 > access_pattern/nr_accesses/max
373+
# echo 10 > access_pattern/age/min
374+
# echo 20 > access_pattern/age/max
375375
# echo pageout > action
376376
# # set quotas
377377
# echo 10 > quotas/ms

Documentation/admin-guide/sysctl/net.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,7 @@ poll cycle or the number of packets processed reaches netdev_budget.
271271
netdev_max_backlog
272272
------------------
273273

274-
Maximum number of packets, queued on the INPUT side, when the interface
274+
Maximum number of packets, queued on the INPUT side, when the interface
275275
receives packets faster than kernel can process them.
276276

277277
netdev_rss_key

Documentation/arm64/elf_hwcaps.rst

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -242,44 +242,34 @@ HWCAP2_MTE3
242242
by Documentation/arm64/memory-tagging-extension.rst.
243243

244244
HWCAP2_SME
245-
246245
Functionality implied by ID_AA64PFR1_EL1.SME == 0b0001, as described
247246
by Documentation/arm64/sme.rst.
248247

249248
HWCAP2_SME_I16I64
250-
251249
Functionality implied by ID_AA64SMFR0_EL1.I16I64 == 0b1111.
252250

253251
HWCAP2_SME_F64F64
254-
255252
Functionality implied by ID_AA64SMFR0_EL1.F64F64 == 0b1.
256253

257254
HWCAP2_SME_I8I32
258-
259255
Functionality implied by ID_AA64SMFR0_EL1.I8I32 == 0b1111.
260256

261257
HWCAP2_SME_F16F32
262-
263258
Functionality implied by ID_AA64SMFR0_EL1.F16F32 == 0b1.
264259

265260
HWCAP2_SME_B16F32
266-
267261
Functionality implied by ID_AA64SMFR0_EL1.B16F32 == 0b1.
268262

269263
HWCAP2_SME_F32F32
270-
271264
Functionality implied by ID_AA64SMFR0_EL1.F32F32 == 0b1.
272265

273266
HWCAP2_SME_FA64
274-
275267
Functionality implied by ID_AA64SMFR0_EL1.FA64 == 0b1.
276268

277269
HWCAP2_WFXT
278-
279270
Functionality implied by ID_AA64ISAR2_EL1.WFXT == 0b0010.
280271

281272
HWCAP2_EBF16
282-
283273
Functionality implied by ID_AA64ISAR1_EL1.BF16 == 0b0010.
284274

285275
4. Unused AT_HWCAP bits

Documentation/arm64/silicon-errata.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,8 @@ stable kernels.
5252
| Allwinner | A64/R18 | UNKNOWN1 | SUN50I_ERRATUM_UNKNOWN1 |
5353
+----------------+-----------------+-----------------+-----------------------------+
5454
+----------------+-----------------+-----------------+-----------------------------+
55+
| ARM | Cortex-A510 | #2457168 | ARM64_ERRATUM_2457168 |
56+
+----------------+-----------------+-----------------+-----------------------------+
5557
| ARM | Cortex-A510 | #2064142 | ARM64_ERRATUM_2064142 |
5658
+----------------+-----------------+-----------------+-----------------------------+
5759
| ARM | Cortex-A510 | #2038923 | ARM64_ERRATUM_2038923 |

0 commit comments

Comments
 (0)