Skip to content

Commit 29250ba

Browse files
committed
Merge tag 'kvm-s390-master-6.0-1' of git://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD
PCI interpretation compile fixes
2 parents 35906d2 + ca922fe commit 29250ba

File tree

729 files changed

+10252
-5093
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

729 files changed

+10252
-5093
lines changed

.get_maintainer.ignore

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,4 @@
1+
Alan Cox <alan@lxorguk.ukuu.org.uk>
2+
Alan Cox <root@hraefn.swansea.linux.org.uk>
13
Christoph Hellwig <hch@lst.de>
24
Marc Gonzalez <marc.w.gonzalez@free.fr>

.mailmap

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -98,8 +98,7 @@ Christian Brauner <brauner@kernel.org> <christian.brauner@ubuntu.com>
9898
Christian Marangi <ansuelsmth@gmail.com>
9999
Christophe Ricard <christophe.ricard@gmail.com>
100100
Christoph Hellwig <hch@lst.de>
101-
Colin Ian King <colin.king@intel.com> <colin.king@canonical.com>
102-
Colin Ian King <colin.king@intel.com> <colin.i.king@gmail.com>
101+
Colin Ian King <colin.i.king@gmail.com> <colin.king@canonical.com>
103102
Corey Minyard <minyard@acm.org>
104103
Damian Hobson-Garcia <dhobsong@igel.co.jp>
105104
Daniel Borkmann <daniel@iogearbox.net> <danborkmann@googlemail.com>
@@ -150,6 +149,8 @@ Greg Kroah-Hartman <gregkh@suse.de>
150149
Greg Kroah-Hartman <greg@kroah.com>
151150
Greg Kurz <groug@kaod.org> <gkurz@linux.vnet.ibm.com>
152151
Gregory CLEMENT <gregory.clement@bootlin.com> <gregory.clement@free-electrons.com>
152+
Guilherme G. Piccoli <kernel@gpiccoli.net> <gpiccoli@linux.vnet.ibm.com>
153+
Guilherme G. Piccoli <kernel@gpiccoli.net> <gpiccoli@canonical.com>
153154
Guo Ren <guoren@kernel.org> <guoren@linux.alibaba.com>
154155
Guo Ren <guoren@kernel.org> <ren_guo@c-sky.com>
155156
Gustavo Padovan <gustavo@las.ic.unicamp.br>
@@ -253,6 +254,7 @@ Linus Lüssing <linus.luessing@c0d3.blue> <linus.luessing@web.de>
253254
Li Yang <leoyang.li@nxp.com> <leoli@freescale.com>
254255
Li Yang <leoyang.li@nxp.com> <leo@zh-kernel.org>
255256
Lorenzo Pieralisi <lpieralisi@kernel.org> <lorenzo.pieralisi@arm.com>
257+
Luca Ceresoli <luca.ceresoli@bootlin.com> <luca@lucaceresoli.net>
256258
Lukasz Luba <lukasz.luba@arm.com> <l.luba@partner.samsung.com>
257259
Maciej W. Rozycki <macro@mips.com> <macro@imgtec.com>
258260
Maciej W. Rozycki <macro@orcam.me.uk> <macro@linux-mips.org>

Documentation/ABI/testing/sysfs-devices-system-cpu

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -523,6 +523,7 @@ What: /sys/devices/system/cpu/vulnerabilities
523523
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort
524524
/sys/devices/system/cpu/vulnerabilities/itlb_multihit
525525
/sys/devices/system/cpu/vulnerabilities/mmio_stale_data
526+
/sys/devices/system/cpu/vulnerabilities/retbleed
526527
Date: January 2018
527528
Contact: Linux kernel mailing list <linux-kernel@vger.kernel.org>
528529
Description: Information about CPU vulnerabilities

Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -230,6 +230,20 @@ The possible values in this file are:
230230
* - 'Mitigation: Clear CPU buffers'
231231
- The processor is vulnerable and the CPU buffer clearing mitigation is
232232
enabled.
233+
* - 'Unknown: No mitigations'
234+
- The processor vulnerability status is unknown because it is
235+
out of Servicing period. Mitigation is not attempted.
236+
237+
Definitions:
238+
------------
239+
240+
Servicing period: The process of providing functional and security updates to
241+
Intel processors or platforms, utilizing the Intel Platform Update (IPU)
242+
process or other similar mechanisms.
243+
244+
End of Servicing Updates (ESU): ESU is the date at which Intel will no
245+
longer provide Servicing, such as through IPU or other similar update
246+
processes. ESU dates will typically be aligned to end of quarter.
233247

234248
If the processor is vulnerable then the following information is appended to
235249
the above information:

Documentation/admin-guide/kernel-parameters.txt

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5331,6 +5331,8 @@
53315331
rodata= [KNL]
53325332
on Mark read-only kernel memory as read-only (default).
53335333
off Leave read-only kernel memory writable for debugging.
5334+
full Mark read-only kernel memory and aliases as read-only
5335+
[arm64]
53345336

53355337
rockchip.usb_uart
53365338
Enable the uart passthrough on the designated usb port

Documentation/admin-guide/sysctl/net.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,7 @@ poll cycle or the number of packets processed reaches netdev_budget.
271271
netdev_max_backlog
272272
------------------
273273

274-
Maximum number of packets, queued on the INPUT side, when the interface
274+
Maximum number of packets, queued on the INPUT side, when the interface
275275
receives packets faster than kernel can process them.
276276

277277
netdev_rss_key

Documentation/arm64/elf_hwcaps.rst

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -242,44 +242,34 @@ HWCAP2_MTE3
242242
by Documentation/arm64/memory-tagging-extension.rst.
243243

244244
HWCAP2_SME
245-
246245
Functionality implied by ID_AA64PFR1_EL1.SME == 0b0001, as described
247246
by Documentation/arm64/sme.rst.
248247

249248
HWCAP2_SME_I16I64
250-
251249
Functionality implied by ID_AA64SMFR0_EL1.I16I64 == 0b1111.
252250

253251
HWCAP2_SME_F64F64
254-
255252
Functionality implied by ID_AA64SMFR0_EL1.F64F64 == 0b1.
256253

257254
HWCAP2_SME_I8I32
258-
259255
Functionality implied by ID_AA64SMFR0_EL1.I8I32 == 0b1111.
260256

261257
HWCAP2_SME_F16F32
262-
263258
Functionality implied by ID_AA64SMFR0_EL1.F16F32 == 0b1.
264259

265260
HWCAP2_SME_B16F32
266-
267261
Functionality implied by ID_AA64SMFR0_EL1.B16F32 == 0b1.
268262

269263
HWCAP2_SME_F32F32
270-
271264
Functionality implied by ID_AA64SMFR0_EL1.F32F32 == 0b1.
272265

273266
HWCAP2_SME_FA64
274-
275267
Functionality implied by ID_AA64SMFR0_EL1.FA64 == 0b1.
276268

277269
HWCAP2_WFXT
278-
279270
Functionality implied by ID_AA64ISAR2_EL1.WFXT == 0b0010.
280271

281272
HWCAP2_EBF16
282-
283273
Functionality implied by ID_AA64ISAR1_EL1.BF16 == 0b0010.
284274

285275
4. Unused AT_HWCAP bits

Documentation/arm64/silicon-errata.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,8 @@ stable kernels.
5252
| Allwinner | A64/R18 | UNKNOWN1 | SUN50I_ERRATUM_UNKNOWN1 |
5353
+----------------+-----------------+-----------------+-----------------------------+
5454
+----------------+-----------------+-----------------+-----------------------------+
55+
| ARM | Cortex-A510 | #2457168 | ARM64_ERRATUM_2457168 |
56+
+----------------+-----------------+-----------------+-----------------------------+
5557
| ARM | Cortex-A510 | #2064142 | ARM64_ERRATUM_2064142 |
5658
+----------------+-----------------+-----------------+-----------------------------+
5759
| ARM | Cortex-A510 | #2038923 | ARM64_ERRATUM_2038923 |

Documentation/atomic_bitops.txt

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -58,13 +58,11 @@ Like with atomic_t, the rule of thumb is:
5858

5959
- RMW operations that have a return value are fully ordered.
6060

61-
- RMW operations that are conditional are unordered on FAILURE,
62-
otherwise the above rules apply. In the case of test_and_{}_bit() operations,
63-
if the bit in memory is unchanged by the operation then it is deemed to have
64-
failed.
61+
- RMW operations that are conditional are fully ordered.
6562

66-
Except for a successful test_and_set_bit_lock() which has ACQUIRE semantics and
67-
clear_bit_unlock() which has RELEASE semantics.
63+
Except for a successful test_and_set_bit_lock() which has ACQUIRE semantics,
64+
clear_bit_unlock() which has RELEASE semantics and test_bit_acquire which has
65+
ACQUIRE semantics.
6866

6967
Since a platform only has a single means of achieving atomic operations
7068
the same barriers as for atomic_t are used, see atomic_t.txt.

Documentation/devicetree/bindings/display/allwinner,sun4i-a10-tcon.yaml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -233,6 +233,7 @@ allOf:
233233
- allwinner,sun8i-a83t-tcon-lcd
234234
- allwinner,sun8i-v3s-tcon
235235
- allwinner,sun9i-a80-tcon-lcd
236+
- allwinner,sun20i-d1-tcon-lcd
236237

237238
then:
238239
properties:
@@ -252,6 +253,7 @@ allOf:
252253
- allwinner,sun8i-a83t-tcon-tv
253254
- allwinner,sun8i-r40-tcon-tv
254255
- allwinner,sun9i-a80-tcon-tv
256+
- allwinner,sun20i-d1-tcon-tv
255257

256258
then:
257259
properties:
@@ -278,6 +280,7 @@ allOf:
278280
- allwinner,sun9i-a80-tcon-lcd
279281
- allwinner,sun4i-a10-tcon
280282
- allwinner,sun8i-a83t-tcon-lcd
283+
- allwinner,sun20i-d1-tcon-lcd
281284

282285
then:
283286
required:
@@ -294,6 +297,7 @@ allOf:
294297
- allwinner,sun8i-a23-tcon
295298
- allwinner,sun8i-a33-tcon
296299
- allwinner,sun8i-a83t-tcon-lcd
300+
- allwinner,sun20i-d1-tcon-lcd
297301

298302
then:
299303
properties:

0 commit comments

Comments
 (0)