Skip to content

Commit 44fd1b8

Browse files
committed
Merge tag 'v4.9.127' into linux-4.9-at91
This is the 4.9.127 stable release
2 parents b7206f3 + 927556e commit 44fd1b8

File tree

964 files changed

+10404
-3922
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

964 files changed

+10404
-3922
lines changed

Documentation/ABI/testing/sysfs-devices-system-cpu

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -356,6 +356,7 @@ What: /sys/devices/system/cpu/vulnerabilities
356356
/sys/devices/system/cpu/vulnerabilities/spectre_v1
357357
/sys/devices/system/cpu/vulnerabilities/spectre_v2
358358
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass
359+
/sys/devices/system/cpu/vulnerabilities/l1tf
359360
Date: January 2018
360361
Contact: Linux kernel mailing list <[email protected]>
361362
Description: Information about CPU vulnerabilities
@@ -367,3 +368,26 @@ Description: Information about CPU vulnerabilities
367368
"Not affected" CPU is not affected by the vulnerability
368369
"Vulnerable" CPU is affected and no mitigation in effect
369370
"Mitigation: $M" CPU is affected and mitigation $M is in effect
371+
372+
Details about the l1tf file can be found in
373+
Documentation/admin-guide/l1tf.rst
374+
375+
What: /sys/devices/system/cpu/smt
376+
/sys/devices/system/cpu/smt/active
377+
/sys/devices/system/cpu/smt/control
378+
Date: June 2018
379+
Contact: Linux kernel mailing list <[email protected]>
380+
Description: Control Symetric Multi Threading (SMT)
381+
382+
active: Tells whether SMT is active (enabled and siblings online)
383+
384+
control: Read/write interface to control SMT. Possible
385+
values:
386+
387+
"on" SMT is enabled
388+
"off" SMT is disabled
389+
"forceoff" SMT is force disabled. Cannot be changed.
390+
"notsupported" SMT is not supported by the CPU
391+
392+
If control status is "forceoff" or "notsupported" writes
393+
are rejected.

Documentation/Changes

Lines changed: 7 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ GNU C 3.2 gcc --version
3333
GNU make 3.80 make --version
3434
binutils 2.12 ld -v
3535
util-linux 2.10o fdformat --version
36-
module-init-tools 0.9.10 depmod -V
36+
kmod 13 depmod -V
3737
e2fsprogs 1.41.4 e2fsck -V
3838
jfsutils 1.1.3 fsck.jfs -V
3939
reiserfsprogs 3.6.3 reiserfsck -V
@@ -143,12 +143,6 @@ is not build with ``CONFIG_KALLSYMS`` and you have no way to rebuild and
143143
reproduce the Oops with that option, then you can still decode that Oops
144144
with ksymoops.
145145

146-
Module-Init-Tools
147-
-----------------
148-
149-
A new module loader is now in the kernel that requires ``module-init-tools``
150-
to use. It is backward compatible with the 2.4.x series kernels.
151-
152146
Mkinitrd
153147
--------
154148

@@ -363,16 +357,17 @@ Util-linux
363357

364358
- <ftp://ftp.kernel.org/pub/linux/utils/util-linux/>
365359

360+
Kmod
361+
----
362+
363+
- <https://www.kernel.org/pub/linux/utils/kernel/kmod/>
364+
- <https://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git>
365+
366366
Ksymoops
367367
--------
368368

369369
- <ftp://ftp.kernel.org/pub/linux/utils/kernel/ksymoops/v2.4/>
370370

371-
Module-Init-Tools
372-
-----------------
373-
374-
- <ftp://ftp.kernel.org/pub/linux/kernel/people/rusty/modules/>
375-
376371
Mkinitrd
377372
--------
378373

Documentation/devicetree/bindings/net/dsa/b53.txt

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ Required properties:
1010
"brcm,bcm53128"
1111
"brcm,bcm5365"
1212
"brcm,bcm5395"
13+
"brcm,bcm5389"
1314
"brcm,bcm5397"
1415
"brcm,bcm5398"
1516

Documentation/devicetree/bindings/net/dsa/qca8k.txt

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,10 @@
22

33
Required properties:
44

5-
- compatible: should be "qca,qca8337"
5+
- compatible: should be one of:
6+
"qca,qca8334"
7+
"qca,qca8337"
8+
69
- #size-cells: must be 0
710
- #address-cells: must be 1
811

@@ -14,6 +17,20 @@ port and PHY id, each subnode describing a port needs to have a valid phandle
1417
referencing the internal PHY connected to it. The CPU port of this switch is
1518
always port 0.
1619

20+
A CPU port node has the following optional node:
21+
22+
- fixed-link : Fixed-link subnode describing a link to a non-MDIO
23+
managed entity. See
24+
Documentation/devicetree/bindings/net/fixed-link.txt
25+
for details.
26+
27+
For QCA8K the 'fixed-link' sub-node supports only the following properties:
28+
29+
- 'speed' (integer, mandatory), to indicate the link speed. Accepted
30+
values are 10, 100 and 1000
31+
- 'full-duplex' (boolean, optional), to indicate that full duplex is
32+
used. When absent, half duplex is assumed.
33+
1734
Example:
1835

1936

@@ -53,6 +70,10 @@ Example:
5370
label = "cpu";
5471
ethernet = <&gmac1>;
5572
phy-mode = "rgmii";
73+
fixed-link {
74+
speed = 1000;
75+
full-duplex;
76+
};
5677
};
5778

5879
port@1 {

Documentation/devicetree/bindings/net/meson-dwmac.txt

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ Required properties on all platforms:
1010
- "amlogic,meson6-dwmac"
1111
- "amlogic,meson8b-dwmac"
1212
- "amlogic,meson-gxbb-dwmac"
13+
- "amlogic,meson-axg-dwmac"
1314
Additionally "snps,dwmac" and any applicable more
1415
detailed version number described in net/stmmac.txt
1516
should be used.

Documentation/devicetree/bindings/pinctrl/meson,pinctrl.txt

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,10 @@
33
Required properties for the root node:
44
- compatible: one of "amlogic,meson8-cbus-pinctrl"
55
"amlogic,meson8b-cbus-pinctrl"
6+
"amlogic,meson8m2-cbus-pinctrl"
67
"amlogic,meson8-aobus-pinctrl"
78
"amlogic,meson8b-aobus-pinctrl"
9+
"amlogic,meson8m2-aobus-pinctrl"
810
"amlogic,meson-gxbb-periphs-pinctrl"
911
"amlogic,meson-gxbb-aobus-pinctrl"
1012
- reg: address and size of registers controlling irq functionality

Documentation/index.rst

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ Contents:
1212
:maxdepth: 2
1313

1414
kernel-documentation
15+
l1tf
1516
development-process/index
1617
dev-tools/tools
1718
driver-api/index

Documentation/kernel-parameters.txt

Lines changed: 95 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2010,10 +2010,84 @@ bytes respectively. Such letter suffixes can also be entirely omitted.
20102010
(virtualized real and unpaged mode) on capable
20112011
Intel chips. Default is 1 (enabled)
20122012

2013+
kvm-intel.vmentry_l1d_flush=[KVM,Intel] Mitigation for L1 Terminal Fault
2014+
CVE-2018-3620.
2015+
2016+
Valid arguments: never, cond, always
2017+
2018+
always: L1D cache flush on every VMENTER.
2019+
cond: Flush L1D on VMENTER only when the code between
2020+
VMEXIT and VMENTER can leak host memory.
2021+
never: Disables the mitigation
2022+
2023+
Default is cond (do L1 cache flush in specific instances)
2024+
20132025
kvm-intel.vpid= [KVM,Intel] Disable Virtual Processor Identification
20142026
feature (tagged TLBs) on capable Intel chips.
20152027
Default is 1 (enabled)
20162028

2029+
l1tf= [X86] Control mitigation of the L1TF vulnerability on
2030+
affected CPUs
2031+
2032+
The kernel PTE inversion protection is unconditionally
2033+
enabled and cannot be disabled.
2034+
2035+
full
2036+
Provides all available mitigations for the
2037+
L1TF vulnerability. Disables SMT and
2038+
enables all mitigations in the
2039+
hypervisors, i.e. unconditional L1D flush.
2040+
2041+
SMT control and L1D flush control via the
2042+
sysfs interface is still possible after
2043+
boot. Hypervisors will issue a warning
2044+
when the first VM is started in a
2045+
potentially insecure configuration,
2046+
i.e. SMT enabled or L1D flush disabled.
2047+
2048+
full,force
2049+
Same as 'full', but disables SMT and L1D
2050+
flush runtime control. Implies the
2051+
'nosmt=force' command line option.
2052+
(i.e. sysfs control of SMT is disabled.)
2053+
2054+
flush
2055+
Leaves SMT enabled and enables the default
2056+
hypervisor mitigation, i.e. conditional
2057+
L1D flush.
2058+
2059+
SMT control and L1D flush control via the
2060+
sysfs interface is still possible after
2061+
boot. Hypervisors will issue a warning
2062+
when the first VM is started in a
2063+
potentially insecure configuration,
2064+
i.e. SMT enabled or L1D flush disabled.
2065+
2066+
flush,nosmt
2067+
2068+
Disables SMT and enables the default
2069+
hypervisor mitigation.
2070+
2071+
SMT control and L1D flush control via the
2072+
sysfs interface is still possible after
2073+
boot. Hypervisors will issue a warning
2074+
when the first VM is started in a
2075+
potentially insecure configuration,
2076+
i.e. SMT enabled or L1D flush disabled.
2077+
2078+
flush,nowarn
2079+
Same as 'flush', but hypervisors will not
2080+
warn when a VM is started in a potentially
2081+
insecure configuration.
2082+
2083+
off
2084+
Disables hypervisor mitigations and doesn't
2085+
emit any warnings.
2086+
2087+
Default is 'flush'.
2088+
2089+
For details see: Documentation/admin-guide/l1tf.rst
2090+
20172091
l2cr= [PPC]
20182092

20192093
l3cr= [PPC]
@@ -2694,6 +2768,10 @@ bytes respectively. Such letter suffixes can also be entirely omitted.
26942768
nosmt [KNL,S390] Disable symmetric multithreading (SMT).
26952769
Equivalent to smt=1.
26962770

2771+
[KNL,x86] Disable symmetric multithreading (SMT).
2772+
nosmt=force: Force disable SMT, cannot be undone
2773+
via the sysfs control file.
2774+
26972775
nospectre_v2 [X86] Disable all mitigations for the Spectre variant 2
26982776
(indirect branch prediction) vulnerability. System may
26992777
allow data leaks with this option, which is equivalent
@@ -4023,6 +4101,23 @@ bytes respectively. Such letter suffixes can also be entirely omitted.
40234101
spia_pedr=
40244102
spia_peddr=
40254103

4104+
ssbd= [ARM64,HW]
4105+
Speculative Store Bypass Disable control
4106+
4107+
On CPUs that are vulnerable to the Speculative
4108+
Store Bypass vulnerability and offer a
4109+
firmware based mitigation, this parameter
4110+
indicates how the mitigation should be used:
4111+
4112+
force-on: Unconditionally enable mitigation for
4113+
for both kernel and userspace
4114+
force-off: Unconditionally disable mitigation for
4115+
for both kernel and userspace
4116+
kernel: Always enable mitigation in the
4117+
kernel, and offer a prctl interface
4118+
to allow userspace to register its
4119+
interest in being mitigated too.
4120+
40264121
stack_guard_gap= [MM]
40274122
override the default stack gap protection. The value
40284123
is in page units and it defines how many pages prior

0 commit comments

Comments
 (0)