Skip to content
This repository was archived by the owner on Nov 8, 2023. It is now read-only.

Commit e02528a

Browse files
merge android-mainline into android-mainline-rust
Change-Id: I9ce984df038293d6db35bf0d9494bb501d182a01 Signed-off-by: Jeff Vander Stoep <jeffv@google.com>
2 parents 22a5c32 + 98d1a25 commit e02528a

File tree

5,924 files changed

+337186
-270942
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

5,924 files changed

+337186
-270942
lines changed

Documentation/ABI/stable/sysfs-block

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -432,7 +432,8 @@ Contact: linux-block@vger.kernel.org
432432
Description:
433433
[RW] This is the maximum number of kilobytes that the block
434434
layer will allow for a filesystem request. Must be smaller than
435-
or equal to the maximum size allowed by the hardware.
435+
or equal to the maximum size allowed by the hardware. Write 0
436+
to use default kernel settings.
436437

437438

438439
What: /sys/block/<disk>/queue/max_segment_size

Documentation/ABI/stable/sysfs-driver-mlxreg-io

Lines changed: 121 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -522,7 +522,6 @@ Description: These files allow to each of ASICs by writing 1.
522522

523523
The files are write only.
524524

525-
526525
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/comm_chnl_ready
527526
Date: July 2022
528527
KernelVersion: 5.20
@@ -542,3 +541,124 @@ Description: The file indicates COME module hardware configuration.
542541
The purpose is to expose some minor BOM changes for the same system SKU.
543542

544543
The file is read only.
544+
545+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/reset_pwr_converter_fail
546+
Date: February 2023
547+
KernelVersion: 6.3
548+
Contact: Vadim Pasternak <vadimp@nvidia.com>
549+
Description: This file shows the system reset cause due to power converter
550+
devices failure.
551+
Value 1 in file means this is reset cause, 0 - otherwise.
552+
553+
The file is read only.
554+
555+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/erot1_ap_reset
556+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/erot2_ap_reset
557+
Date: February 2023
558+
KernelVersion: 6.3
559+
Contact: Vadim Pasternak <vadimp@nvidia.com>
560+
Description: These files aim to monitor the status of the External Root of Trust (EROT)
561+
processor's RESET output to the Application Processor (AP).
562+
By reading this file, could be determined if the EROT has invalidated or
563+
revoked AP Firmware, at which point it will hold the AP in RESET until a
564+
valid firmware is loaded. This protects the AP from running an
565+
unauthorized firmware. In the normal flow, the AP reset should be released
566+
after the EROT validates the integrity of the FW, and it should be done so
567+
as quickly as possible so that the AP boots before the CPU starts to
568+
communicate to each ASIC.
569+
570+
The files are read only.
571+
572+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/erot1_recovery
573+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/erot2_recovery
574+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/erot1_reset
575+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/erot2_reset
576+
Date: February 2023
577+
KernelVersion: 6.3
578+
Contact: Vadim Pasternak <vadimp@nvidia.com>
579+
Description: These files aim to perform External Root of Trust (EROT) recovery
580+
sequence after EROT device failure.
581+
These EROT devices protect ASICs from unauthorized access and in normal
582+
flow their reset should be released with system power – earliest power
583+
up stage, so that EROTs can begin boot and authentication process before
584+
CPU starts to communicate to ASICs.
585+
Issuing a reset to the EROT while asserting the recovery signal will cause
586+
the EROT Application Processor to enter recovery mode so that the EROT FW
587+
can be updated/recovered.
588+
For reset/recovery the related file should be toggled by 1/0.
589+
590+
The files are read/write.
591+
592+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/erot1_wp
593+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/erot2_wp
594+
Date: February 2023
595+
KernelVersion: 6.3
596+
Contact: Vadim Pasternak <vadimp@nvidia.com>
597+
Description: These files allow access to External Root of Trust (EROT) for reset
598+
and recovery sequence after EROT device failure.
599+
Default is 0 (programming disabled).
600+
If the system is in locked-down mode writing this file will not be allowed.
601+
602+
The files are read/write.
603+
604+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/spi_chnl_select
605+
Date: February 2023
606+
KernelVersion: 6.3
607+
Contact: Vadim Pasternak <vadimp@nvidia.com>
608+
Description: This file allows SPI chip selection for External Root of Trust (EROT)
609+
device Out-of-Band recovery.
610+
File can be written with 0 or with 1. It selects which EROT can be accessed
611+
through SPI device.
612+
613+
The file is read/write.
614+
615+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/asic_pg_fail
616+
Date: February 2023
617+
KernelVersion: 6.3
618+
Contact: Vadim Pasternak vadimp@nvidia.com
619+
Description: This file shows ASIC Power Good status.
620+
Value 1 in file means ASIC Power Good failed, 0 - otherwise.
621+
622+
The file is read only.
623+
624+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/clk_brd1_boot_fail
625+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/clk_brd2_boot_fail
626+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/clk_brd_fail
627+
Date: February 2023
628+
KernelVersion: 6.3
629+
Contact: Vadim Pasternak vadimp@nvidia.com
630+
Description: These files are related to clock boards status in system.
631+
- clk_brd1_boot_fail: warning about 1-st clock board failed to boot from CI.
632+
- clk_brd2_boot_fail: warning about 2-nd clock board failed to boot from CI.
633+
- clk_brd_fail: error about common clock board boot failure.
634+
635+
The files are read only.
636+
637+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/clk_brd_prog_en
638+
Date: February 2023
639+
KernelVersion: 6.3
640+
Contact: Vadim Pasternak <vadimp@nvidia.com>
641+
Description: This file enables programming of clock boards.
642+
Default is 0 (programming disabled).
643+
If the system is in locked-down mode writing this file will not be allowed.
644+
645+
The file is read/write.
646+
647+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/pwr_converter_prog_en
648+
Date: February 2023
649+
KernelVersion: 6.3
650+
Contact: Vadim Pasternak <vadimp@nvidia.com>
651+
Description: This file enables programming of power converters.
652+
Default is 0 (programming disabled).
653+
If the system is in locked-down mode writing this file will not be allowed.
654+
655+
The file is read/write.
656+
657+
What: /sys/devices/platform/mlxplat/mlxreg-io/hwmon/hwmon*/reset_ac_ok_fail
658+
Date: February 2023
659+
KernelVersion: 6.3
660+
Contact: Vadim Pasternak <vadimp@nvidia.com>
661+
Description: This file shows the system reset cause due to AC power failure.
662+
Value 1 in file means this is reset cause, 0 - otherwise.
663+
664+
The file is read only.

Documentation/ABI/stable/sysfs-hypervisor-xen

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -120,3 +120,16 @@ Contact: xen-devel@lists.xenproject.org
120120
Description: If running under Xen:
121121
The Xen version is in the format <major>.<minor><extra>
122122
This is the <minor> part of it.
123+
124+
What: /sys/hypervisor/start_flags/*
125+
Date: March 2023
126+
KernelVersion: 6.3.0
127+
Contact: xen-devel@lists.xenproject.org
128+
Description: If running under Xen:
129+
All bits in Xen's start-flags are represented as
130+
boolean files, returning '1' if set, '0' otherwise.
131+
This takes the place of the defunct /proc/xen/capabilities,
132+
which would contain "control_d" on dom0, and be empty
133+
otherwise. This flag is now exposed as "initdomain" in
134+
addition to the "privileged" flag; all other possible flags
135+
are accessible as "unknownXX".

Documentation/ABI/testing/sysfs-bus-css

Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,19 @@
11
What: /sys/bus/css/devices/.../type
22
Date: March 2008
3-
Contact: Cornelia Huck <cornelia.huck@de.ibm.com>
4-
linux-s390@vger.kernel.org
3+
Contact: linux-s390@vger.kernel.org
54
Description: Contains the subchannel type, as reported by the hardware.
65
This attribute is present for all subchannel types.
76

87
What: /sys/bus/css/devices/.../modalias
98
Date: March 2008
10-
Contact: Cornelia Huck <cornelia.huck@de.ibm.com>
11-
linux-s390@vger.kernel.org
9+
Contact: linux-s390@vger.kernel.org
1210
Description: Contains the module alias as reported with uevents.
1311
It is of the format css:t<type> and present for all
1412
subchannel types.
1513

1614
What: /sys/bus/css/drivers/io_subchannel/.../chpids
1715
Date: December 2002
18-
Contact: Cornelia Huck <cornelia.huck@de.ibm.com>
19-
linux-s390@vger.kernel.org
16+
Contact: linux-s390@vger.kernel.org
2017
Description: Contains the ids of the channel paths used by this
2118
subchannel, as reported by the channel subsystem
2219
during subchannel recognition.
@@ -26,8 +23,7 @@ Users: s390-tools, HAL
2623

2724
What: /sys/bus/css/drivers/io_subchannel/.../pimpampom
2825
Date: December 2002
29-
Contact: Cornelia Huck <cornelia.huck@de.ibm.com>
30-
linux-s390@vger.kernel.org
26+
Contact: linux-s390@vger.kernel.org
3127
Description: Contains the PIM/PAM/POM values, as reported by the
3228
channel subsystem when last queried by the common I/O
3329
layer (this implies that this attribute is not necessarily
@@ -38,8 +34,7 @@ Users: s390-tools, HAL
3834

3935
What: /sys/bus/css/devices/.../driver_override
4036
Date: June 2019
41-
Contact: Cornelia Huck <cohuck@redhat.com>
42-
linux-s390@vger.kernel.org
37+
Contact: linux-s390@vger.kernel.org
4338
Description: This file allows the driver for a device to be specified. When
4439
specified, only a driver with a name matching the value written
4540
to driver_override will have an opportunity to bind to the
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
2+
What: /sys/class/net/<iface>/peak_usb/can_channel_id
3+
Date: November 2022
4+
KernelVersion: 6.2
5+
Contact: Stephane Grosjean <s.grosjean@peak-system.com>
6+
Description:
7+
PEAK PCAN-USB devices support user-configurable CAN channel
8+
identifiers. Contrary to a USB serial number, these identifiers
9+
are writable and can be set per CAN interface. This means that
10+
if a USB device exports multiple CAN interfaces, each of them
11+
can be assigned a unique channel ID.
12+
This attribute provides read-only access to the currently
13+
configured value of the channel identifier. Depending on the
14+
device type, the identifier has a length of 8 or 32 bit. The
15+
value read from this attribute is always an 8 digit 32 bit
16+
hexadecimal value in big endian format. If the device only
17+
supports an 8 bit identifier, the upper 24 bit of the value are
18+
set to zero.
19+

Documentation/ABI/testing/sysfs-driver-qat

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
What: /sys/bus/pci/devices/<BDF>/qat/state
22
Date: June 2022
3-
KernelVersion: 5.20
3+
KernelVersion: 6.0
44
Contact: qat-linux@intel.com
55
Description: (RW) Reports the current state of the QAT device. Write to
66
the file to start or stop the device.
@@ -18,7 +18,7 @@ Description: (RW) Reports the current state of the QAT device. Write to
1818

1919
What: /sys/bus/pci/devices/<BDF>/qat/cfg_services
2020
Date: June 2022
21-
KernelVersion: 5.20
21+
KernelVersion: 6.0
2222
Contact: qat-linux@intel.com
2323
Description: (RW) Reports the current configuration of the QAT device.
2424
Write to the file to change the configured services.

Documentation/ABI/testing/sysfs-fs-erofs

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ Contact: "Huang Jianan" <huangjianan@oppo.com>
44
Description: Shows all enabled kernel features.
55
Supported features:
66
zero_padding, compr_cfgs, big_pcluster, chunked_file,
7-
device_table, compr_head2, sb_chksum.
7+
device_table, compr_head2, sb_chksum, ztailpacking,
8+
dedupe, fragments.
89

910
What: /sys/fs/erofs/<disk>/sync_decompress
1011
Date: November 2021

Documentation/RCU/NMI-RCU.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ Although RCU is usually used to protect read-mostly data structures,
88
it is possible to use RCU to provide dynamic non-maskable interrupt
99
handlers, as well as dynamic irq handlers. This document describes
1010
how to do this, drawing loosely from Zwane Mwaikambo's NMI-timer
11-
work in "arch/x86/kernel/traps.c".
11+
work in an old version of "arch/x86/kernel/traps.c".
1212

1313
The relevant pieces of code are listed below, each followed by a
1414
brief explanation::
@@ -116,7 +116,7 @@ Answer to Quick Quiz:
116116

117117
This same sad story can happen on other CPUs when using
118118
a compiler with aggressive pointer-value speculation
119-
optimizations.
119+
optimizations. (But please don't!)
120120

121121
More important, the rcu_dereference_sched() makes it
122122
clear to someone reading the code that the pointer is

Documentation/RCU/UP.rst

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ by having call_rcu() directly invoke its arguments only if it was called
3838
from process context. However, this can fail in a similar manner.
3939

4040
Suppose that an RCU-based algorithm again scans a linked list containing
41-
elements A, B, and C in process contexts, but that it invokes a function
41+
elements A, B, and C in process context, but that it invokes a function
4242
on each element as it is scanned. Suppose further that this function
4343
deletes element B from the list, then passes it to call_rcu() for deferred
4444
freeing. This may be a bit unconventional, but it is perfectly legal
@@ -59,7 +59,8 @@ Example 3: Death by Deadlock
5959
Suppose that call_rcu() is invoked while holding a lock, and that the
6060
callback function must acquire this same lock. In this case, if
6161
call_rcu() were to directly invoke the callback, the result would
62-
be self-deadlock.
62+
be self-deadlock *even if* this invocation occurred from a later
63+
call_rcu() invocation a full grace period later.
6364

6465
In some cases, it would possible to restructure to code so that
6566
the call_rcu() is delayed until after the lock is released. However,
@@ -85,6 +86,14 @@ Quick Quiz #2:
8586

8687
:ref:`Answers to Quick Quiz <answer_quick_quiz_up>`
8788

89+
It is important to note that userspace RCU implementations *do*
90+
permit call_rcu() to directly invoke callbacks, but only if a full
91+
grace period has elapsed since those callbacks were queued. This is
92+
the case because some userspace environments are extremely constrained.
93+
Nevertheless, people writing userspace RCU implementations are strongly
94+
encouraged to avoid invoking callbacks from call_rcu(), thus obtaining
95+
the deadlock-avoidance benefits called out above.
96+
8897
Summary
8998
-------
9099

Documentation/RCU/lockdep.rst

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -69,9 +69,8 @@ checking of rcu_dereference() primitives:
6969
value of the pointer itself, for example, against NULL.
7070

7171
The rcu_dereference_check() check expression can be any boolean
72-
expression, but would normally include a lockdep expression. However,
73-
any boolean expression can be used. For a moderately ornate example,
74-
consider the following::
72+
expression, but would normally include a lockdep expression. For a
73+
moderately ornate example, consider the following::
7574

7675
file = rcu_dereference_check(fdt->fd[fd],
7776
lockdep_is_held(&files->file_lock) ||
@@ -97,10 +96,10 @@ code, it could instead be written as follows::
9796
atomic_read(&files->count) == 1);
9897

9998
This would verify cases #2 and #3 above, and furthermore lockdep would
100-
complain if this was used in an RCU read-side critical section unless one
101-
of these two cases held. Because rcu_dereference_protected() omits all
102-
barriers and compiler constraints, it generates better code than do the
103-
other flavors of rcu_dereference(). On the other hand, it is illegal
99+
complain even if this was used in an RCU read-side critical section unless
100+
one of these two cases held. Because rcu_dereference_protected() omits
101+
all barriers and compiler constraints, it generates better code than do
102+
the other flavors of rcu_dereference(). On the other hand, it is illegal
104103
to use rcu_dereference_protected() if either the RCU-protected pointer
105104
or the RCU-protected data that it points to can change concurrently.
106105

0 commit comments

Comments
 (0)