Skip to content

Commit 7f220d4

Browse files
committed
Merge tag 'v5.17-rc8' into usb-next
We need the Xen USB fixes as other patches depend on those changes. Signed-off-by: Greg Kroah-Hartman <[email protected]>
2 parents e4cf658 + 09688c0 commit 7f220d4

File tree

444 files changed

+4982
-1861
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

444 files changed

+4982
-1861
lines changed

.mailmap

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -187,6 +187,8 @@ Jiri Slaby <[email protected]> <[email protected]>
187187
188188
189189
190+
191+
190192
191193
192194
John Paul Adrian Glaubitz <[email protected]>
@@ -216,6 +218,7 @@ Koushik <[email protected]>
216218
Krishna Manikandan <[email protected]> <[email protected]>
217219
Krzysztof Kozlowski <[email protected]> <[email protected]>
218220
Krzysztof Kozlowski <[email protected]> <[email protected]>
221+
Krzysztof Kozlowski <[email protected]> <[email protected]>
219222
Kuninori Morimoto <[email protected]>
220223
221224

CREDITS

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -895,6 +895,12 @@ S: 3000 FORE Drive
895895
S: Warrendale, Pennsylvania 15086
896896
S: USA
897897

898+
N: Ludovic Desroches
899+
900+
D: Maintainer for ARM/Microchip (AT91) SoC support
901+
D: Author of ADC, pinctrl, XDMA and SDHCI drivers for this platform
902+
S: France
903+
898904
N: Martin Devera
899905
900906
W: http://luxik.cdi.cz/~devik/qos/

Documentation/admin-guide/hw-vuln/spectre.rst

Lines changed: 33 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,8 @@ privileged data touched during the speculative execution.
6060
Spectre variant 1 attacks take advantage of speculative execution of
6161
conditional branches, while Spectre variant 2 attacks use speculative
6262
execution of indirect branches to leak privileged memory.
63-
See :ref:`[1] <spec_ref1>` :ref:`[5] <spec_ref5>` :ref:`[7] <spec_ref7>`
64-
:ref:`[10] <spec_ref10>` :ref:`[11] <spec_ref11>`.
63+
See :ref:`[1] <spec_ref1>` :ref:`[5] <spec_ref5>` :ref:`[6] <spec_ref6>`
64+
:ref:`[7] <spec_ref7>` :ref:`[10] <spec_ref10>` :ref:`[11] <spec_ref11>`.
6565

6666
Spectre variant 1 (Bounds Check Bypass)
6767
---------------------------------------
@@ -131,6 +131,19 @@ steer its indirect branch speculations to gadget code, and measure the
131131
speculative execution's side effects left in level 1 cache to infer the
132132
victim's data.
133133

134+
Yet another variant 2 attack vector is for the attacker to poison the
135+
Branch History Buffer (BHB) to speculatively steer an indirect branch
136+
to a specific Branch Target Buffer (BTB) entry, even if the entry isn't
137+
associated with the source address of the indirect branch. Specifically,
138+
the BHB might be shared across privilege levels even in the presence of
139+
Enhanced IBRS.
140+
141+
Currently the only known real-world BHB attack vector is via
142+
unprivileged eBPF. Therefore, it's highly recommended to not enable
143+
unprivileged eBPF, especially when eIBRS is used (without retpolines).
144+
For a full mitigation against BHB attacks, it's recommended to use
145+
retpolines (or eIBRS combined with retpolines).
146+
134147
Attack scenarios
135148
----------------
136149

@@ -364,13 +377,15 @@ The possible values in this file are:
364377

365378
- Kernel status:
366379

367-
==================================== =================================
368-
'Not affected' The processor is not vulnerable
369-
'Vulnerable' Vulnerable, no mitigation
370-
'Mitigation: Full generic retpoline' Software-focused mitigation
371-
'Mitigation: Full AMD retpoline' AMD-specific software mitigation
372-
'Mitigation: Enhanced IBRS' Hardware-focused mitigation
373-
==================================== =================================
380+
======================================== =================================
381+
'Not affected' The processor is not vulnerable
382+
'Mitigation: None' Vulnerable, no mitigation
383+
'Mitigation: Retpolines' Use Retpoline thunks
384+
'Mitigation: LFENCE' Use LFENCE instructions
385+
'Mitigation: Enhanced IBRS' Hardware-focused mitigation
386+
'Mitigation: Enhanced IBRS + Retpolines' Hardware-focused + Retpolines
387+
'Mitigation: Enhanced IBRS + LFENCE' Hardware-focused + LFENCE
388+
======================================== =================================
374389

375390
- Firmware status: Show if Indirect Branch Restricted Speculation (IBRS) is
376391
used to protect against Spectre variant 2 attacks when calling firmware (x86 only).
@@ -583,12 +598,13 @@ kernel command line.
583598

584599
Specific mitigations can also be selected manually:
585600

586-
retpoline
587-
replace indirect branches
588-
retpoline,generic
589-
google's original retpoline
590-
retpoline,amd
591-
AMD-specific minimal thunk
601+
retpoline auto pick between generic,lfence
602+
retpoline,generic Retpolines
603+
retpoline,lfence LFENCE; indirect branch
604+
retpoline,amd alias for retpoline,lfence
605+
eibrs enhanced IBRS
606+
eibrs,retpoline enhanced IBRS + Retpolines
607+
eibrs,lfence enhanced IBRS + LFENCE
592608

593609
Not specifying this option is equivalent to
594610
spectre_v2=auto.
@@ -599,7 +615,7 @@ kernel command line.
599615
spectre_v2=off. Spectre variant 1 mitigations
600616
cannot be disabled.
601617

602-
For spectre_v2_user see :doc:`/admin-guide/kernel-parameters`.
618+
For spectre_v2_user see Documentation/admin-guide/kernel-parameters.txt
603619

604620
Mitigation selection guide
605621
--------------------------
@@ -681,7 +697,7 @@ AMD white papers:
681697

682698
.. _spec_ref6:
683699

684-
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/90343-B_SoftwareTechniquesforManagingSpeculation_WP_7-18Update_FNL.pdf>`_.
700+
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/Managing-Speculation-on-AMD-Processors.pdf>`_.
685701

686702
ARM white papers:
687703

Documentation/admin-guide/kernel-parameters.txt

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5361,8 +5361,12 @@
53615361
Specific mitigations can also be selected manually:
53625362

53635363
retpoline - replace indirect branches
5364-
retpoline,generic - google's original retpoline
5365-
retpoline,amd - AMD-specific minimal thunk
5364+
retpoline,generic - Retpolines
5365+
retpoline,lfence - LFENCE; indirect branch
5366+
retpoline,amd - alias for retpoline,lfence
5367+
eibrs - enhanced IBRS
5368+
eibrs,retpoline - enhanced IBRS + Retpolines
5369+
eibrs,lfence - enhanced IBRS + LFENCE
53665370

53675371
Not specifying this option is equivalent to
53685372
spectre_v2=auto.

Documentation/admin-guide/mm/pagemap.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ There are four components to pagemap:
2323
* Bit 56 page exclusively mapped (since 4.2)
2424
* Bit 57 pte is uffd-wp write-protected (since 5.13) (see
2525
:ref:`Documentation/admin-guide/mm/userfaultfd.rst <userfaultfd>`)
26-
* Bits 57-60 zero
26+
* Bits 58-60 zero
2727
* Bit 61 page is file-page or shared-anon (since 3.5)
2828
* Bit 62 page swapped
2929
* Bit 63 page present

Documentation/core-api/dma-attributes.rst

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -130,11 +130,3 @@ accesses to DMA buffers in both privileged "supervisor" and unprivileged
130130
subsystem that the buffer is fully accessible at the elevated privilege
131131
level (and ideally inaccessible or at least read-only at the
132132
lesser-privileged levels).
133-
134-
DMA_ATTR_OVERWRITE
135-
------------------
136-
137-
This is a hint to the DMA-mapping subsystem that the device is expected to
138-
overwrite the entire mapped size, thus the caller does not require any of the
139-
previous buffer contents to be preserved. This allows bounce-buffering
140-
implementations to optimise DMA_FROM_DEVICE transfers.

Documentation/devicetree/bindings/arm/atmel-at91.yaml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,8 @@ title: Atmel AT91 device tree bindings.
88

99
maintainers:
1010
- Alexandre Belloni <[email protected]>
11-
- Ludovic Desroches <[email protected]>
11+
- Claudiu Beznea <[email protected]>
12+
- Nicolas Ferre <[email protected]>
1213

1314
description: |
1415
Boards with a SoC of the Atmel AT91 or SMART family shall have the following

Documentation/devicetree/bindings/arm/freescale/fsl,layerscape-dcfg.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ Required properties:
88
- compatible: Should contain a chip-specific compatible string,
99
Chip-specific strings are of the form "fsl,<chip>-dcfg",
1010
The following <chip>s are known to be supported:
11-
ls1012a, ls1021a, ls1043a, ls1046a, ls2080a.
11+
ls1012a, ls1021a, ls1043a, ls1046a, ls2080a, lx2160a
1212

1313
- reg : should contain base address and length of DCFG memory-mapped registers
1414

Documentation/devicetree/bindings/arm/qcom.yaml

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,6 @@ description: |
4848
sdx65
4949
sm7225
5050
sm8150
51-
sdx65
5251
sm8250
5352
sm8350
5453
sm8450
@@ -228,11 +227,6 @@ properties:
228227
- qcom,sdx65-mtp
229228
- const: qcom,sdx65
230229

231-
- items:
232-
- enum:
233-
- qcom,sdx65-mtp
234-
- const: qcom,sdx65
235-
236230
- items:
237231
- enum:
238232
- qcom,ipq6018-cp01

Documentation/devicetree/bindings/clock/qoriq-clock.txt

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,7 @@ Required properties:
4444
* "fsl,ls1046a-clockgen"
4545
* "fsl,ls1088a-clockgen"
4646
* "fsl,ls2080a-clockgen"
47+
* "fsl,lx2160a-clockgen"
4748
Chassis-version clock strings include:
4849
* "fsl,qoriq-clockgen-1.0": for chassis 1.0 clocks
4950
* "fsl,qoriq-clockgen-2.0": for chassis 2.0 clocks

0 commit comments

Comments
 (0)