Skip to content

Commit e1d2238

Browse files
committed
Merge branch 'mainline-5.10' into sbc-5.10.y
2 parents bc69290 + 014862e commit e1d2238

File tree

1,202 files changed

+11696
-6528
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,202 files changed

+11696
-6528
lines changed

Documentation/ABI/testing/sysfs-devices-system-cpu

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -511,6 +511,7 @@ What: /sys/devices/system/cpu/vulnerabilities
511511
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort
512512
/sys/devices/system/cpu/vulnerabilities/itlb_multihit
513513
/sys/devices/system/cpu/vulnerabilities/mmio_stale_data
514+
/sys/devices/system/cpu/vulnerabilities/retbleed
514515
Date: January 2018
515516
Contact: Linux kernel mailing list <[email protected]>
516517
Description: Information about CPU vulnerabilities

Documentation/ABI/testing/sysfs-driver-xen-blkback

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,5 +42,5 @@ KernelVersion: 5.10
4242
Contact: SeongJae Park <[email protected]>
4343
Description:
4444
Whether to enable the persistent grants feature or not. Note
45-
that this option only takes effect on newly created backends.
45+
that this option only takes effect on newly connected backends.
4646
The default is Y (enable).

Documentation/ABI/testing/sysfs-driver-xen-blkfront

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,5 +15,5 @@ KernelVersion: 5.10
1515
Contact: SeongJae Park <[email protected]>
1616
Description:
1717
Whether to enable the persistent grants feature or not. Note
18-
that this option only takes effect on newly created frontends.
18+
that this option only takes effect on newly connected frontends.
1919
The default is Y (enable).

Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -230,6 +230,20 @@ The possible values in this file are:
230230
* - 'Mitigation: Clear CPU buffers'
231231
- The processor is vulnerable and the CPU buffer clearing mitigation is
232232
enabled.
233+
* - 'Unknown: No mitigations'
234+
- The processor vulnerability status is unknown because it is
235+
out of Servicing period. Mitigation is not attempted.
236+
237+
Definitions:
238+
------------
239+
240+
Servicing period: The process of providing functional and security updates to
241+
Intel processors or platforms, utilizing the Intel Platform Update (IPU)
242+
process or other similar mechanisms.
243+
244+
End of Servicing Updates (ESU): ESU is the date at which Intel will no
245+
longer provide Servicing, such as through IPU or other similar update
246+
processes. ESU dates will typically be aligned to end of quarter.
233247

234248
If the processor is vulnerable then the following information is appended to
235249
the above information:

Documentation/admin-guide/hw-vuln/spectre.rst

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -422,6 +422,14 @@ The possible values in this file are:
422422
'RSB filling' Protection of RSB on context switch enabled
423423
============= ===========================================
424424

425+
- EIBRS Post-barrier Return Stack Buffer (PBRSB) protection status:
426+
427+
=========================== =======================================================
428+
'PBRSB-eIBRS: SW sequence' CPU is affected and protection of RSB on VMEXIT enabled
429+
'PBRSB-eIBRS: Vulnerable' CPU is vulnerable
430+
'PBRSB-eIBRS: Not affected' CPU is not affected by PBRSB
431+
=========================== =======================================================
432+
425433
Full mitigation might require a microcode update from the CPU
426434
vendor. When the necessary microcode is not available, the kernel will
427435
report vulnerability.

Documentation/admin-guide/kernel-parameters.txt

Lines changed: 23 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2873,6 +2873,7 @@
28732873
no_entry_flush [PPC]
28742874
no_uaccess_flush [PPC]
28752875
mmio_stale_data=off [X86]
2876+
retbleed=off [X86]
28762877

28772878
Exceptions:
28782879
This does not have any effect on
@@ -2895,6 +2896,7 @@
28952896
mds=full,nosmt [X86]
28962897
tsx_async_abort=full,nosmt [X86]
28972898
mmio_stale_data=full,nosmt [X86]
2899+
retbleed=auto,nosmt [X86]
28982900

28992901
mminit_loglevel=
29002902
[KNL] When CONFIG_DEBUG_MEMORY_INIT is set, this
@@ -4660,20 +4662,33 @@
46604662
Speculative Code Execution with Return Instructions)
46614663
vulnerability.
46624664

4665+
AMD-based UNRET and IBPB mitigations alone do not stop
4666+
sibling threads from influencing the predictions of other
4667+
sibling threads. For that reason, STIBP is used on pro-
4668+
cessors that support it, and mitigate SMT on processors
4669+
that don't.
4670+
46634671
off - no mitigation
46644672
auto - automatically select a migitation
46654673
auto,nosmt - automatically select a mitigation,
46664674
disabling SMT if necessary for
46674675
the full mitigation (only on Zen1
46684676
and older without STIBP).
4669-
ibpb - mitigate short speculation windows on
4670-
basic block boundaries too. Safe, highest
4671-
perf impact.
4672-
unret - force enable untrained return thunks,
4673-
only effective on AMD f15h-f17h
4674-
based systems.
4675-
unret,nosmt - like unret, will disable SMT when STIBP
4676-
is not available.
4677+
ibpb - On AMD, mitigate short speculation
4678+
windows on basic block boundaries too.
4679+
Safe, highest perf impact. It also
4680+
enables STIBP if present. Not suitable
4681+
on Intel.
4682+
ibpb,nosmt - Like "ibpb" above but will disable SMT
4683+
when STIBP is not available. This is
4684+
the alternative for systems which do not
4685+
have STIBP.
4686+
unret - Force enable untrained return thunks,
4687+
only effective on AMD f15h-f17h based
4688+
systems.
4689+
unret,nosmt - Like unret, but will disable SMT when STIBP
4690+
is not available. This is the alternative for
4691+
systems which do not have STIBP.
46774692

46784693
Selecting 'auto' will choose a mitigation method at run
46794694
time according to the CPU.

Documentation/admin-guide/pm/cpuidle.rst

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -685,8 +685,8 @@ the ``menu`` governor to be used on the systems that use the ``ladder`` governor
685685
by default this way, for example.
686686

687687
The other kernel command line parameters controlling CPU idle time management
688-
described below are only relevant for the *x86* architecture and some of
689-
them affect Intel processors only.
688+
described below are only relevant for the *x86* architecture and references
689+
to ``intel_idle`` affect Intel processors only.
690690

691691
The *x86* architecture support code recognizes three kernel command line
692692
options related to CPU idle time management: ``idle=poll``, ``idle=halt``,
@@ -708,10 +708,13 @@ idle, so it very well may hurt single-thread computations performance as well as
708708
energy-efficiency. Thus using it for performance reasons may not be a good idea
709709
at all.]
710710

711-
The ``idle=nomwait`` option disables the ``intel_idle`` driver and causes
712-
``acpi_idle`` to be used (as long as all of the information needed by it is
713-
there in the system's ACPI tables), but it is not allowed to use the
714-
``MWAIT`` instruction of the CPUs to ask the hardware to enter idle states.
711+
The ``idle=nomwait`` option prevents the use of ``MWAIT`` instruction of
712+
the CPU to enter idle states. When this option is used, the ``acpi_idle``
713+
driver will use the ``HLT`` instruction instead of ``MWAIT``. On systems
714+
running Intel processors, this option disables the ``intel_idle`` driver
715+
and forces the use of the ``acpi_idle`` driver instead. Note that in either
716+
case, ``acpi_idle`` driver will function only if all the information needed
717+
by it is in the system's ACPI tables.
715718

716719
In addition to the architecture-level kernel command line options affecting CPU
717720
idle time management, there are parameters affecting individual ``CPUIdle``

Documentation/admin-guide/sysctl/net.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,7 @@ poll cycle or the number of packets processed reaches netdev_budget.
271271
netdev_max_backlog
272272
------------------
273273

274-
Maximum number of packets, queued on the INPUT side, when the interface
274+
Maximum number of packets, queued on the INPUT side, when the interface
275275
receives packets faster than kernel can process them.
276276

277277
netdev_rss_key

Documentation/arm64/silicon-errata.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -92,6 +92,8 @@ stable kernels.
9292
+----------------+-----------------+-----------------+-----------------------------+
9393
| ARM | Cortex-A77 | #1508412 | ARM64_ERRATUM_1508412 |
9494
+----------------+-----------------+-----------------+-----------------------------+
95+
| ARM | Cortex-A510 | #2457168 | ARM64_ERRATUM_2457168 |
96+
+----------------+-----------------+-----------------+-----------------------------+
9597
| ARM | Neoverse-N1 | #1188873,1418040| ARM64_ERRATUM_1418040 |
9698
+----------------+-----------------+-----------------+-----------------------------+
9799
| ARM | Neoverse-N1 | #1349291 | N/A |

Documentation/atomic_bitops.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Like with atomic_t, the rule of thumb is:
5959
- RMW operations that have a return value are fully ordered.
6060

6161
- RMW operations that are conditional are unordered on FAILURE,
62-
otherwise the above rules apply. In the case of test_and_{}_bit() operations,
62+
otherwise the above rules apply. In the case of test_and_set_bit_lock(),
6363
if the bit in memory is unchanged by the operation then it is deemed to have
6464
failed.
6565

0 commit comments

Comments
 (0)