Skip to content

Commit cbfab53

Browse files
committed
Merge tag 'v6.1.144' into 6.1-main
This is the 6.1.144 stable release # -----BEGIN PGP SIGNATURE----- # # iQIzBAABCgAdFiEEZH8oZUiU471FcZm+ONu9yGCSaT4FAmhvx2UACgkQONu9yGCS # aT5hlBAAvC7s51HMJIleGSVUyEkRspvEMKiRfiZv0FWVr+4YPruQoQZUaAczUqhE # rvp56l/GZpAGiX/7vPdt0EDbuzgD9K/XKASWK+lT9ZV1vLwhn1T2pM6HHSPcBH0Q # Mg59pkIB4qM/3HHfVW/syovU8I2nnghAXDPBsw4kYdG1gtT4+kEDv6lTWGf76rEa # ZkRUIX87EvPbWSxP+bYiIXDQ6FfV+p3giK5rJV6gAK/oYPNHZUPVoBzLR37V8NkB # ns1cATpnzdq3uZ6LvHkDhMZa8E9mQ6XZhQxw1I4rUEweEooM6vBWyVtHlLzdBtwm # RDMD+4knCNvP00Qn4k9SviTISI2TWjVZ+QBreHoM4xOnlNhpzlUXFs59BPvD/lFD # D1bV7mtBuYXTq5jNEt7Tqn4g4CCOKRQZw8/1FmfBuTsrKrENcDiftWtiYBQkHNpa # MSgHDd+YEiRgma0HJVv8689xSRMbOg3mZKafiD2XUI1rhCKHe/oU9QzjOTUHIIDP # YgP6dUvSekmdlAd/bIGAurCFVnf43KnjVo2oHxTBSAGVt5vcUyiFt94PRoF7EVWM # 7khGwBjWNlaQEMjoINx/k4W08qoGUm1xQouMskOILRN1mGWg/D49qVfEc86b4jhX # 8rC+wGdXGQBoX6+ehEjaMWGL55zItSsy543QFlTHIWfwjo+X7eo= # =tQjF # -----END PGP SIGNATURE----- # gpg: Signature made Thu Jul 10 16:00:05 2025 CEST # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2 parents 25aa440 + dfc486e commit cbfab53

105 files changed

Lines changed: 970 additions & 303 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

Documentation/ABI/testing/sysfs-devices-system-cpu

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -526,6 +526,7 @@ What: /sys/devices/system/cpu/vulnerabilities
526526
/sys/devices/system/cpu/vulnerabilities/spectre_v1
527527
/sys/devices/system/cpu/vulnerabilities/spectre_v2
528528
/sys/devices/system/cpu/vulnerabilities/srbds
529+
/sys/devices/system/cpu/vulnerabilities/tsa
529530
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort
530531
Date: January 2018
531532
Contact: Linux kernel mailing list <linux-kernel@vger.kernel.org>

Documentation/ABI/testing/sysfs-driver-ufs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -711,7 +711,7 @@ Description: This file shows the thin provisioning type. This is one of
711711

712712
The file is read only.
713713

714-
What: /sys/class/scsi_device/*/device/unit_descriptor/physical_memory_resourse_count
714+
What: /sys/class/scsi_device/*/device/unit_descriptor/physical_memory_resource_count
715715
Date: February 2018
716716
Contact: Stanislav Nijnikov <stanislav.nijnikov@wdc.com>
717717
Description: This file shows the total physical memory resources. This is

Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -157,9 +157,7 @@ This is achieved by using the otherwise unused and obsolete VERW instruction in
157157
combination with a microcode update. The microcode clears the affected CPU
158158
buffers when the VERW instruction is executed.
159159

160-
Kernel reuses the MDS function to invoke the buffer clearing:
161-
162-
mds_clear_cpu_buffers()
160+
Kernel does the buffer clearing with x86_clear_cpu_buffers().
163161

164162
On MDS affected CPUs, the kernel already invokes CPU buffer clear on
165163
kernel/userspace, hypervisor/guest and C-state (idle) transitions. No

Documentation/admin-guide/kernel-parameters.txt

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6400,6 +6400,19 @@
64006400
If not specified, "default" is used. In this case,
64016401
the RNG's choice is left to each individual trust source.
64026402

6403+
tsa= [X86] Control mitigation for Transient Scheduler
6404+
Attacks on AMD CPUs. Search the following in your
6405+
favourite search engine for more details:
6406+
6407+
"Technical guidance for mitigating transient scheduler
6408+
attacks".
6409+
6410+
off - disable the mitigation
6411+
on - enable the mitigation (default)
6412+
user - mitigate only user/kernel transitions
6413+
vm - mitigate only guest/host transitions
6414+
6415+
64036416
tsc= Disable clocksource stability checks for TSC.
64046417
Format: <string>
64056418
[x86] reliable: mark tsc clocksource as reliable, this

Makefile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# SPDX-License-Identifier: GPL-2.0
22
VERSION = 6
33
PATCHLEVEL = 1
4-
SUBLEVEL = 143
4+
SUBLEVEL = 144
55
EXTRAVERSION =
66
NAME = Curry Ramen
77

arch/arm64/boot/dts/apple/t8103-jxxx.dtsi

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@
7070
*/
7171
&port00 {
7272
bus-range = <1 1>;
73-
wifi0: network@0,0 {
73+
wifi0: wifi@0,0 {
7474
compatible = "pci14e4,4425";
7575
reg = <0x10000 0x0 0x0 0x0 0x0>;
7676
/* To be filled by the loader */

arch/powerpc/include/uapi/asm/ioctls.h

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,10 @@
2323
#define TCSETSW _IOW('t', 21, struct termios)
2424
#define TCSETSF _IOW('t', 22, struct termios)
2525

26-
#define TCGETA _IOR('t', 23, struct termio)
27-
#define TCSETA _IOW('t', 24, struct termio)
28-
#define TCSETAW _IOW('t', 25, struct termio)
29-
#define TCSETAF _IOW('t', 28, struct termio)
26+
#define TCGETA 0x40147417 /* _IOR('t', 23, struct termio) */
27+
#define TCSETA 0x80147418 /* _IOW('t', 24, struct termio) */
28+
#define TCSETAW 0x80147419 /* _IOW('t', 25, struct termio) */
29+
#define TCSETAF 0x8014741c /* _IOW('t', 28, struct termio) */
3030

3131
#define TCSBRK _IO('t', 29)
3232
#define TCXONC _IO('t', 30)

arch/s390/pci/pci_event.c

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,10 @@ static pci_ers_result_t zpci_event_do_error_state_clear(struct pci_dev *pdev,
9898
struct zpci_dev *zdev = to_zpci(pdev);
9999
int rc;
100100

101+
/* The underlying device may have been disabled by the event */
102+
if (!zdev_enabled(zdev))
103+
return PCI_ERS_RESULT_NEED_RESET;
104+
101105
pr_info("%s: Unblocking device access for examination\n", pci_name(pdev));
102106
rc = zpci_reset_load_store_blocked(zdev);
103107
if (rc) {

arch/x86/Kconfig

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2586,6 +2586,15 @@ config MITIGATION_ITS
25862586
disabled, mitigation cannot be enabled via cmdline.
25872587
See <file:Documentation/admin-guide/hw-vuln/indirect-target-selection.rst>
25882588

2589+
config MITIGATION_TSA
2590+
bool "Mitigate Transient Scheduler Attacks"
2591+
depends on CPU_SUP_AMD
2592+
default y
2593+
help
2594+
Enable mitigation for Transient Scheduler Attacks. TSA is a hardware
2595+
security vulnerability on AMD CPUs which can lead to forwarding of
2596+
invalid info to subsequent instructions and thus can affect their
2597+
timing and thereby cause a leakage.
25892598
endif
25902599

25912600
config ARCH_HAS_ADD_PAGES

arch/x86/entry/entry.S

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,20 +31,20 @@ EXPORT_SYMBOL_GPL(entry_ibpb);
3131

3232
/*
3333
* Define the VERW operand that is disguised as entry code so that
34-
* it can be referenced with KPTI enabled. This ensure VERW can be
34+
* it can be referenced with KPTI enabled. This ensures VERW can be
3535
* used late in exit-to-user path after page tables are switched.
3636
*/
3737
.pushsection .entry.text, "ax"
3838

3939
.align L1_CACHE_BYTES, 0xcc
40-
SYM_CODE_START_NOALIGN(mds_verw_sel)
40+
SYM_CODE_START_NOALIGN(x86_verw_sel)
4141
UNWIND_HINT_EMPTY
4242
ANNOTATE_NOENDBR
4343
.word __KERNEL_DS
4444
.align L1_CACHE_BYTES, 0xcc
45-
SYM_CODE_END(mds_verw_sel);
45+
SYM_CODE_END(x86_verw_sel);
4646
/* For KVM */
47-
EXPORT_SYMBOL_GPL(mds_verw_sel);
47+
EXPORT_SYMBOL_GPL(x86_verw_sel);
4848

4949
.popsection
5050

0 commit comments

Comments
 (0)