Skip to content

Commit 19bc745

Browse files
committed
Merge tag 'v6.1.158' into 6.1-main
This is the 6.1.158 stable release # -----BEGIN PGP SIGNATURE----- # # iQIzBAABCgAdFiEEZH8oZUiU471FcZm+ONu9yGCSaT4FAmkCEPAACgkQONu9yGCS # aT6KSg//ecU6aMIHN9BwQkkOLoqbluMrhq5q6loU3yO6UnrCNejwf2w/WOOX18sx # SV/UKT1b4lr5Ofdda6VN9qO4o9lsJEPIctmQIKQGkri9bgrn8lPYvN45oV07heqh # Wshu4W61vzElhX7Ov6oQYpaRm3uXHp+/U4HlImoCVMahNCqIRVp+cOUCAW1ljobO # LOsK1kVcDQzJ42WylLsjKvTZ48XqpdVmgzOvTWtkNIwA+HhmAIDjKQcDOwrzTes6 # 8rYDkXE3xeZykOY0MXcASjp616MSV+VyEzRghz1rmvDdwELujoZq2VGxT2wl9lFU # YyODtFWFB6zay4Zhn/aSEMqmmLsR8rK5DlaI8HNuKPTdH8Vu5m+onhueIfbb1DZq # JnsyN9ksDrDZIHmaGCc4vrPxeuA/onoR20IjjBUNPAZIS1wdHeOMp8Pn/zhS9Wcq # IUIGDH6x9hWh+O1+HthV7TlPHuC7onsspUg4q0B8yXROOQ46CAq05wpkVRAie+hF # KszD87QsLfHPKrlHYOZr/aweKXJrx49qd2ZS7JopH3dtXxKiaDH+UVHEnvA5bxDI # x6iZpnKFN/5c91B/mtUIs5FEHBa1ECzyq5s5Ork8ZLfSq2dsYJY0lyqsscMp2V1c # O5CEumPgHmEgtQB9gFY1loZHN9DykBIZ6TQaQ9OW+N7O5mtFwQg= # =WWai # -----END PGP SIGNATURE----- # gpg: Signature made Wed Oct 29 14:04:48 2025 CET # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2 parents 742c85d + f6e38ae commit 19bc745

File tree

175 files changed

+2091
-1070
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

175 files changed

+2091
-1070
lines changed

Documentation/RCU/Design/Requirements/Requirements.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1858,7 +1858,7 @@ unloaded. After a given module has been unloaded, any attempt to call
18581858
one of its functions results in a segmentation fault. The module-unload
18591859
functions must therefore cancel any delayed calls to loadable-module
18601860
functions, for example, any outstanding mod_timer() must be dealt
1861-
with via del_timer_sync() or similar.
1861+
with via timer_shutdown_sync() or similar.
18621862

18631863
Unfortunately, there is no way to cancel an RCU callback; once you
18641864
invoke call_rcu(), the callback function is eventually going to be

Documentation/arm64/silicon-errata.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -181,6 +181,8 @@ stable kernels.
181181
+----------------+-----------------+-----------------+-----------------------------+
182182
| ARM | Neoverse-V3 | #3312417 | ARM64_ERRATUM_3194386 |
183183
+----------------+-----------------+-----------------+-----------------------------+
184+
| ARM | Neoverse-V3AE | #3312417 | ARM64_ERRATUM_3194386 |
185+
+----------------+-----------------+-----------------+-----------------------------+
184186
| ARM | MMU-500 | #841119,826419 | N/A |
185187
+----------------+-----------------+-----------------+-----------------------------+
186188
| ARM | MMU-600 | #1076982,1209401| N/A |

Documentation/core-api/local_ops.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -191,7 +191,7 @@ Here is a sample module which implements a basic per cpu counter using
191191

192192
static void __exit test_exit(void)
193193
{
194-
del_timer_sync(&test_timer);
194+
timer_shutdown_sync(&test_timer);
195195
}
196196

197197
module_init(test_init);

Documentation/kernel-hacking/locking.rst

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -967,7 +967,7 @@ you might do the following::
967967

968968
while (list) {
969969
struct foo *next = list->next;
970-
del_timer(&list->timer);
970+
timer_delete(&list->timer);
971971
kfree(list);
972972
list = next;
973973
}
@@ -981,7 +981,7 @@ the lock after we spin_unlock_bh(), and then try to free
981981
the element (which has already been freed!).
982982

983983
This can be avoided by checking the result of
984-
del_timer(): if it returns 1, the timer has been deleted.
984+
timer_delete(): if it returns 1, the timer has been deleted.
985985
If 0, it means (in this case) that it is currently running, so we can
986986
do::
987987

@@ -990,7 +990,7 @@ do::
990990

991991
while (list) {
992992
struct foo *next = list->next;
993-
if (!del_timer(&list->timer)) {
993+
if (!timer_delete(&list->timer)) {
994994
/* Give timer a chance to delete this */
995995
spin_unlock_bh(&list_lock);
996996
goto retry;
@@ -1005,9 +1005,12 @@ do::
10051005
Another common problem is deleting timers which restart themselves (by
10061006
calling add_timer() at the end of their timer function).
10071007
Because this is a fairly common case which is prone to races, you should
1008-
use del_timer_sync() (``include/linux/timer.h``) to
1009-
handle this case. It returns the number of times the timer had to be
1010-
deleted before we finally stopped it from adding itself back in.
1008+
use timer_delete_sync() (``include/linux/timer.h``) to
1009+
1010+
Before freeing a timer, timer_shutdown() or timer_shutdown_sync() should be
1011+
called which will keep it from being rearmed. Any subsequent attempt to
1012+
rearm the timer will be silently ignored by the core code.
1013+
10111014

10121015
Locking Speed
10131016
=============
@@ -1335,7 +1338,7 @@ lock.
13351338

13361339
- kfree()
13371340

1338-
- add_timer() and del_timer()
1341+
- add_timer() and timer_delete()
13391342

13401343
Mutex API reference
13411344
===================

Documentation/networking/seg6-sysctl.rst

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,9 @@ seg6_require_hmac - INTEGER
2525

2626
Default is 0.
2727

28+
/proc/sys/net/ipv6/seg6_* variables:
29+
====================================
30+
2831
seg6_flowlabel - INTEGER
2932
Controls the behaviour of computing the flowlabel of outer
3033
IPv6 header in case of SR T.encaps

Documentation/timers/hrtimers.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ existing timer wheel code, as it is mature and well suited. Sharing code
118118
was not really a win, due to the different data structures. Also, the
119119
hrtimer functions now have clearer behavior and clearer names - such as
120120
hrtimer_try_to_cancel() and hrtimer_cancel() [which are roughly
121-
equivalent to del_timer() and del_timer_sync()] - so there's no direct
121+
equivalent to timer_delete() and timer_delete_sync()] - so there's no direct
122122
1:1 mapping between them on the algorithmic level, and thus no real
123123
potential for code sharing either.
124124

Documentation/translations/it_IT/kernel-hacking/locking.rst

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -990,7 +990,7 @@ potreste fare come segue::
990990

991991
while (list) {
992992
struct foo *next = list->next;
993-
del_timer(&list->timer);
993+
timer_delete(&list->timer);
994994
kfree(list);
995995
list = next;
996996
}
@@ -1003,7 +1003,7 @@ e prenderà il *lock* solo dopo spin_unlock_bh(), e cercherà
10031003
di eliminare il suo oggetto (che però è già stato eliminato).
10041004

10051005
Questo può essere evitato controllando il valore di ritorno di
1006-
del_timer(): se ritorna 1, il temporizzatore è stato già
1006+
timer_delete(): se ritorna 1, il temporizzatore è stato già
10071007
rimosso. Se 0, significa (in questo caso) che il temporizzatore è in
10081008
esecuzione, quindi possiamo fare come segue::
10091009

@@ -1012,7 +1012,7 @@ esecuzione, quindi possiamo fare come segue::
10121012

10131013
while (list) {
10141014
struct foo *next = list->next;
1015-
if (!del_timer(&list->timer)) {
1015+
if (!timer_delete(&list->timer)) {
10161016
/* Give timer a chance to delete this */
10171017
spin_unlock_bh(&list_lock);
10181018
goto retry;
@@ -1026,10 +1026,8 @@ esecuzione, quindi possiamo fare come segue::
10261026
Un altro problema è l'eliminazione dei temporizzatori che si riavviano
10271027
da soli (chiamando add_timer() alla fine della loro esecuzione).
10281028
Dato che questo è un problema abbastanza comune con una propensione
1029-
alle corse critiche, dovreste usare del_timer_sync()
1030-
(``include/linux/timer.h``) per gestire questo caso. Questa ritorna il
1031-
numero di volte che il temporizzatore è stato interrotto prima che
1032-
fosse in grado di fermarlo senza che si riavviasse.
1029+
alle corse critiche, dovreste usare timer_delete_sync()
1030+
(``include/linux/timer.h``) per gestire questo caso.
10331031

10341032
Velocità della sincronizzazione
10351033
===============================
@@ -1374,7 +1372,7 @@ contesto, o trattenendo un qualsiasi *lock*.
13741372

13751373
- kfree()
13761374

1377-
- add_timer() e del_timer()
1375+
- add_timer() e timer_delete()
13781376

13791377
Riferimento per l'API dei Mutex
13801378
===============================

Documentation/translations/zh_CN/core-api/local_ops.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -185,7 +185,7 @@ UP之间没有不同的行为,在你的架构的 ``local.h`` 中包括 ``asm-g
185185

186186
static void __exit test_exit(void)
187187
{
188-
del_timer_sync(&test_timer);
188+
timer_shutdown_sync(&test_timer);
189189
}
190190

191191
module_init(test_init);

Makefile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# SPDX-License-Identifier: GPL-2.0
22
VERSION = 6
33
PATCHLEVEL = 1
4-
SUBLEVEL = 157
4+
SUBLEVEL = 158
55
EXTRAVERSION =
66
NAME = Curry Ramen
77

arch/arm/mach-spear/time.c

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ static void __init spear_clocksource_init(void)
9090
200, 16, clocksource_mmio_readw_up);
9191
}
9292

93-
static inline void timer_shutdown(struct clock_event_device *evt)
93+
static inline void spear_timer_shutdown(struct clock_event_device *evt)
9494
{
9595
u16 val = readw(gpt_base + CR(CLKEVT));
9696

@@ -101,7 +101,7 @@ static inline void timer_shutdown(struct clock_event_device *evt)
101101

102102
static int spear_shutdown(struct clock_event_device *evt)
103103
{
104-
timer_shutdown(evt);
104+
spear_timer_shutdown(evt);
105105

106106
return 0;
107107
}
@@ -111,7 +111,7 @@ static int spear_set_oneshot(struct clock_event_device *evt)
111111
u16 val;
112112

113113
/* stop the timer */
114-
timer_shutdown(evt);
114+
spear_timer_shutdown(evt);
115115

116116
val = readw(gpt_base + CR(CLKEVT));
117117
val |= CTRL_ONE_SHOT;
@@ -126,7 +126,7 @@ static int spear_set_periodic(struct clock_event_device *evt)
126126
u16 val;
127127

128128
/* stop the timer */
129-
timer_shutdown(evt);
129+
spear_timer_shutdown(evt);
130130

131131
period = clk_get_rate(gpt_clk) / HZ;
132132
period >>= CTRL_PRESCALER16;

0 commit comments

Comments
 (0)