Skip to content
This repository was archived by the owner on Nov 8, 2023. It is now read-only.

Commit 52cb0d5

Browse files
committed
Merge 36289a0 ("Merge tag 'v6.3-p1' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6") into android-mainline
Steps on the way to 6.3-rc1 Change-Id: I1e1e909c5aad9f9e43fe7ae5b81afd73b4219ea0 Signed-off-by: Greg Kroah-Hartman <gregkh@google.com>
2 parents f84a57d + 36289a0 commit 52cb0d5

File tree

566 files changed

+19889
-10598
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

566 files changed

+19889
-10598
lines changed

Documentation/ABI/stable/sysfs-driver-mlxreg-io

Lines changed: 121 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -522,7 +522,6 @@ Description: These files allow to each of ASICs by writing 1.
522522

523523
The files are write only.
524524

525-
526525
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/comm_chnl_ready
527526
Date: July 2022
528527
KernelVersion: 5.20
@@ -542,3 +541,124 @@ Description: The file indicates COME module hardware configuration.
542541
The purpose is to expose some minor BOM changes for the same system SKU.
543542

544543
The file is read only.
544+
545+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/reset_pwr_converter_fail
546+
Date: February 2023
547+
KernelVersion: 6.3
548+
Contact: Vadim Pasternak <vadimp@nvidia.com>
549+
Description: This file shows the system reset cause due to power converter
550+
devices failure.
551+
Value 1 in file means this is reset cause, 0 - otherwise.
552+
553+
The file is read only.
554+
555+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/erot1_ap_reset
556+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/erot2_ap_reset
557+
Date: February 2023
558+
KernelVersion: 6.3
559+
Contact: Vadim Pasternak <vadimp@nvidia.com>
560+
Description: These files aim to monitor the status of the External Root of Trust (EROT)
561+
processor's RESET output to the Application Processor (AP).
562+
By reading this file, could be determined if the EROT has invalidated or
563+
revoked AP Firmware, at which point it will hold the AP in RESET until a
564+
valid firmware is loaded. This protects the AP from running an
565+
unauthorized firmware. In the normal flow, the AP reset should be released
566+
after the EROT validates the integrity of the FW, and it should be done so
567+
as quickly as possible so that the AP boots before the CPU starts to
568+
communicate to each ASIC.
569+
570+
The files are read only.
571+
572+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/erot1_recovery
573+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/erot2_recovery
574+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/erot1_reset
575+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/erot2_reset
576+
Date: February 2023
577+
KernelVersion: 6.3
578+
Contact: Vadim Pasternak <vadimp@nvidia.com>
579+
Description: These files aim to perform External Root of Trust (EROT) recovery
580+
sequence after EROT device failure.
581+
These EROT devices protect ASICs from unauthorized access and in normal
582+
flow their reset should be released with system power – earliest power
583+
up stage, so that EROTs can begin boot and authentication process before
584+
CPU starts to communicate to ASICs.
585+
Issuing a reset to the EROT while asserting the recovery signal will cause
586+
the EROT Application Processor to enter recovery mode so that the EROT FW
587+
can be updated/recovered.
588+
For reset/recovery the related file should be toggled by 1/0.
589+
590+
The files are read/write.
591+
592+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/erot1_wp
593+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/erot2_wp
594+
Date: February 2023
595+
KernelVersion: 6.3
596+
Contact: Vadim Pasternak <vadimp@nvidia.com>
597+
Description: These files allow access to External Root of Trust (EROT) for reset
598+
and recovery sequence after EROT device failure.
599+
Default is 0 (programming disabled).
600+
If the system is in locked-down mode writing this file will not be allowed.
601+
602+
The files are read/write.
603+
604+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/spi_chnl_select
605+
Date: February 2023
606+
KernelVersion: 6.3
607+
Contact: Vadim Pasternak <vadimp@nvidia.com>
608+
Description: This file allows SPI chip selection for External Root of Trust (EROT)
609+
device Out-of-Band recovery.
610+
File can be written with 0 or with 1. It selects which EROT can be accessed
611+
through SPI device.
612+
613+
The file is read/write.
614+
615+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/asic_pg_fail
616+
Date: February 2023
617+
KernelVersion: 6.3
618+
Contact: Vadim Pasternak vadimp@nvidia.com
619+
Description: This file shows ASIC Power Good status.
620+
Value 1 in file means ASIC Power Good failed, 0 - otherwise.
621+
622+
The file is read only.
623+
624+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/clk_brd1_boot_fail
625+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/clk_brd2_boot_fail
626+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/clk_brd_fail
627+
Date: February 2023
628+
KernelVersion: 6.3
629+
Contact: Vadim Pasternak vadimp@nvidia.com
630+
Description: These files are related to clock boards status in system.
631+
- clk_brd1_boot_fail: warning about 1-st clock board failed to boot from CI.
632+
- clk_brd2_boot_fail: warning about 2-nd clock board failed to boot from CI.
633+
- clk_brd_fail: error about common clock board boot failure.
634+
635+
The files are read only.
636+
637+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/clk_brd_prog_en
638+
Date: February 2023
639+
KernelVersion: 6.3
640+
Contact: Vadim Pasternak <vadimp@nvidia.com>
641+
Description: This file enables programming of clock boards.
642+
Default is 0 (programming disabled).
643+
If the system is in locked-down mode writing this file will not be allowed.
644+
645+
The file is read/write.
646+
647+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/pwr_converter_prog_en
648+
Date: February 2023
649+
KernelVersion: 6.3
650+
Contact: Vadim Pasternak <vadimp@nvidia.com>
651+
Description: This file enables programming of power converters.
652+
Default is 0 (programming disabled).
653+
If the system is in locked-down mode writing this file will not be allowed.
654+
655+
The file is read/write.
656+
657+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/reset_ac_ok_fail
658+
Date: February 2023
659+
KernelVersion: 6.3
660+
Contact: Vadim Pasternak <vadimp@nvidia.com>
661+
Description: This file shows the system reset cause due to AC power failure.
662+
Value 1 in file means this is reset cause, 0 - otherwise.
663+
664+
The file is read only.

Documentation/ABI/stable/sysfs-hypervisor-xen

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -120,3 +120,16 @@ Contact: xen-devel@lists.xenproject.org
120120
Description: If running under Xen:
121121
The Xen version is in the format <major>.<minor><extra>
122122
This is the <minor> part of it.
123+
124+
What: /sys/hypervisor/start_flags/*
125+
Date: March 2023
126+
KernelVersion: 6.3.0
127+
Contact: xen-devel@lists.xenproject.org
128+
Description: If running under Xen:
129+
All bits in Xen's start-flags are represented as
130+
boolean files, returning '1' if set, '0' otherwise.
131+
This takes the place of the defunct /proc/xen/capabilities,
132+
which would contain "control_d" on dom0, and be empty
133+
otherwise. This flag is now exposed as "initdomain" in
134+
addition to the "privileged" flag; all other possible flags
135+
are accessible as "unknownXX".

Documentation/ABI/testing/sysfs-bus-css

Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,19 @@
11
What: /sys/bus/css/devices/.../type
22
Date: March 2008
3-
Contact: Cornelia Huck <cornelia.huck@de.ibm.com>
4-
linux-s390@vger.kernel.org
3+
Contact: linux-s390@vger.kernel.org
54
Description: Contains the subchannel type, as reported by the hardware.
65
This attribute is present for all subchannel types.
76

87
What: /sys/bus/css/devices/.../modalias
98
Date: March 2008
10-
Contact: Cornelia Huck <cornelia.huck@de.ibm.com>
11-
linux-s390@vger.kernel.org
9+
Contact: linux-s390@vger.kernel.org
1210
Description: Contains the module alias as reported with uevents.
1311
It is of the format css:t<type> and present for all
1412
subchannel types.
1513

1614
What: /sys/bus/css/drivers/io_subchannel/.../chpids
1715
Date: December 2002
18-
Contact: Cornelia Huck <cornelia.huck@de.ibm.com>
19-
linux-s390@vger.kernel.org
16+
Contact: linux-s390@vger.kernel.org
2017
Description: Contains the ids of the channel paths used by this
2118
subchannel, as reported by the channel subsystem
2219
during subchannel recognition.
@@ -26,8 +23,7 @@ Users: s390-tools, HAL
2623

2724
What: /sys/bus/css/drivers/io_subchannel/.../pimpampom
2825
Date: December 2002
29-
Contact: Cornelia Huck <cornelia.huck@de.ibm.com>
30-
linux-s390@vger.kernel.org
26+
Contact: linux-s390@vger.kernel.org
3127
Description: Contains the PIM/PAM/POM values, as reported by the
3228
channel subsystem when last queried by the common I/O
3329
layer (this implies that this attribute is not necessarily
@@ -38,8 +34,7 @@ Users: s390-tools, HAL
3834

3935
What: /sys/bus/css/devices/.../driver_override
4036
Date: June 2019
41-
Contact: Cornelia Huck <cohuck@redhat.com>
42-
linux-s390@vger.kernel.org
37+
Contact: linux-s390@vger.kernel.org
4338
Description: This file allows the driver for a device to be specified. When
4439
specified, only a driver with a name matching the value written
4540
to driver_override will have an opportunity to bind to the

Documentation/ABI/testing/sysfs-driver-qat

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
What: /sys/bus/pci/devices/<BDF>/qat/state
22
Date: June 2022
3-
KernelVersion: 5.20
3+
KernelVersion: 6.0
44
Contact: qat-linux@intel.com
55
Description: (RW) Reports the current state of the QAT device. Write to
66
the file to start or stop the device.
@@ -18,7 +18,7 @@ Description: (RW) Reports the current state of the QAT device. Write to
1818

1919
What: /sys/bus/pci/devices/<BDF>/qat/cfg_services
2020
Date: June 2022
21-
KernelVersion: 5.20
21+
KernelVersion: 6.0
2222
Contact: qat-linux@intel.com
2323
Description: (RW) Reports the current configuration of the QAT device.
2424
Write to the file to change the configured services.

Documentation/arm64/booting.rst

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -223,7 +223,7 @@ Before jumping into the kernel, the following conditions must be met:
223223
For systems with a GICv3 interrupt controller to be used in v3 mode:
224224
- If EL3 is present:
225225

226-
- ICC_SRE_EL3.Enable (bit 3) must be initialiased to 0b1.
226+
- ICC_SRE_EL3.Enable (bit 3) must be initialised to 0b1.
227227
- ICC_SRE_EL3.SRE (bit 0) must be initialised to 0b1.
228228
- ICC_CTLR_EL3.PMHE (bit 6) must be set to the same value across
229229
all CPUs the kernel is executing on, and must stay constant
@@ -369,6 +369,16 @@ Before jumping into the kernel, the following conditions must be met:
369369

370370
- HCR_EL2.ATA (bit 56) must be initialised to 0b1.
371371

372+
For CPUs with the Scalable Matrix Extension version 2 (FEAT_SME2):
373+
374+
- If EL3 is present:
375+
376+
- SMCR_EL3.EZT0 (bit 30) must be initialised to 0b1.
377+
378+
- If the kernel is entered at EL1 and EL2 is present:
379+
380+
- SMCR_EL2.EZT0 (bit 30) must be initialised to 0b1.
381+
372382
The requirements described above for CPU mode, caches, MMUs, architected
373383
timers, coherency and system registers apply to all CPUs. All CPUs must
374384
enter the kernel in the same exception level. Where the values documented

Documentation/arm64/elf_hwcaps.rst

Lines changed: 19 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Some hardware or software features are only available on some CPU
1414
implementations, and/or with certain kernel configurations, but have no
1515
architected discovery mechanism available to userspace code at EL0. The
1616
kernel exposes the presence of these features to userspace through a set
17-
of flags called hwcaps, exposed in the auxilliary vector.
17+
of flags called hwcaps, exposed in the auxiliary vector.
1818

1919
Userspace software can test for features by acquiring the AT_HWCAP or
2020
AT_HWCAP2 entry of the auxiliary vector, and testing whether the relevant
@@ -284,6 +284,24 @@ HWCAP2_RPRFM
284284
HWCAP2_SVE2P1
285285
Functionality implied by ID_AA64ZFR0_EL1.SVEver == 0b0010.
286286

287+
HWCAP2_SME2
288+
Functionality implied by ID_AA64SMFR0_EL1.SMEver == 0b0001.
289+
290+
HWCAP2_SME2P1
291+
Functionality implied by ID_AA64SMFR0_EL1.SMEver == 0b0010.
292+
293+
HWCAP2_SMEI16I32
294+
Functionality implied by ID_AA64SMFR0_EL1.I16I32 == 0b0101
295+
296+
HWCAP2_SMEBI32I32
297+
Functionality implied by ID_AA64SMFR0_EL1.BI32I32 == 0b1
298+
299+
HWCAP2_SMEB16B16
300+
Functionality implied by ID_AA64SMFR0_EL1.B16B16 == 0b1
301+
302+
HWCAP2_SMEF16F16
303+
Functionality implied by ID_AA64SMFR0_EL1.F16F16 == 0b1
304+
287305
4. Unused AT_HWCAP bits
288306
-----------------------
289307

0 commit comments

Comments
 (0)