forked from torvalds/linux
-
Notifications
You must be signed in to change notification settings - Fork 21
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Changes representative of linux-5.14.0-503.11.1.el9_5.tar.xz
- Loading branch information
Showing
20,243 changed files
with
1,504,831 additions
and
583,366 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -20,6 +20,7 @@ | |
*.dtb | ||
*.dtbo | ||
*.dtb.S | ||
*.dtbo.S | ||
*.dwo | ||
*.elf | ||
*.gcno | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -1804,6 +1804,10 @@ D: Fedora kernel maintenance (2003-2014). | |
D: 'Trinity' and similar fuzz testing work. | ||
D: Misc/Other. | ||
|
||
N: Tom Joseph | ||
E: [email protected] | ||
D: Cadence PCIe driver | ||
|
||
N: Martin Josfsson | ||
E: [email protected] | ||
P: 1024D/F6B6D3B1 7610 7CED 5C34 4AA6 DBA2 8BE1 5A6D AF95 F6B6 D3B1 | ||
|
@@ -3006,6 +3010,10 @@ S: Triftstra=DFe 55 | |
S: 13353 Berlin | ||
S: Germany | ||
|
||
N: Gustavo Pimental | ||
E: [email protected] | ||
D: PCI driver for Synopsys DesignWare | ||
|
||
N: Emanuel Pirker | ||
E: [email protected] | ||
D: AIC5800 IEEE 1394, RAW I/O on 1394 | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -182,3 +182,42 @@ Date: November 2021 | |
Contact: Jarkko Sakkinen <[email protected]> | ||
Description: | ||
The total amount of SGX physical memory in bytes. | ||
|
||
What: /sys/devices/system/node/nodeX/memory_failure/total | ||
Date: January 2023 | ||
Contact: Jiaqi Yan <[email protected]> | ||
Description: | ||
The total number of raw poisoned pages (pages containing | ||
corrupted data due to memory errors) on a NUMA node. | ||
|
||
What: /sys/devices/system/node/nodeX/memory_failure/ignored | ||
Date: January 2023 | ||
Contact: Jiaqi Yan <[email protected]> | ||
Description: | ||
Of the raw poisoned pages on a NUMA node, how many pages are | ||
ignored by memory error recovery attempt, usually because | ||
support for this type of pages is unavailable, and kernel | ||
gives up the recovery. | ||
|
||
What: /sys/devices/system/node/nodeX/memory_failure/failed | ||
Date: January 2023 | ||
Contact: Jiaqi Yan <[email protected]> | ||
Description: | ||
Of the raw poisoned pages on a NUMA node, how many pages are | ||
failed by memory error recovery attempt. This usually means | ||
a key recovery operation failed. | ||
|
||
What: /sys/devices/system/node/nodeX/memory_failure/delayed | ||
Date: January 2023 | ||
Contact: Jiaqi Yan <[email protected]> | ||
Description: | ||
Of the raw poisoned pages on a NUMA node, how many pages are | ||
delayed by memory error recovery attempt. Delayed poisoned | ||
pages usually will be retried by kernel. | ||
|
||
What: /sys/devices/system/node/nodeX/memory_failure/recovered | ||
Date: January 2023 | ||
Contact: Jiaqi Yan <[email protected]> | ||
Description: | ||
Of the raw poisoned pages on a NUMA node, how many pages are | ||
recovered by memory error recovery attempt. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
What: /sys/kernel/debug/cxl/memX/inject_poison | ||
Date: April, 2023 | ||
KernelVersion: v6.4 | ||
Contact: [email protected] | ||
Description: | ||
(WO) When a Device Physical Address (DPA) is written to this | ||
attribute, the memdev driver sends an inject poison command to | ||
the device for the specified address. The DPA must be 64-byte | ||
aligned and the length of the injected poison is 64-bytes. If | ||
successful, the device returns poison when the address is | ||
accessed through the CXL.mem bus. Injecting poison adds the | ||
address to the device's Poison List and the error source is set | ||
to Injected. In addition, the device adds a poison creation | ||
event to its internal Informational Event log, updates the | ||
Event Status register, and if configured, interrupts the host. | ||
It is not an error to inject poison into an address that | ||
already has poison present and no error is returned. The | ||
inject_poison attribute is only visible for devices supporting | ||
the capability. | ||
|
||
|
||
What: /sys/kernel/debug/memX/clear_poison | ||
Date: April, 2023 | ||
KernelVersion: v6.4 | ||
Contact: [email protected] | ||
Description: | ||
(WO) When a Device Physical Address (DPA) is written to this | ||
attribute, the memdev driver sends a clear poison command to | ||
the device for the specified address. Clearing poison removes | ||
the address from the device's Poison List and writes 0 (zero) | ||
for 64 bytes starting at address. It is not an error to clear | ||
poison from an address that does not have poison set. If the | ||
device cannot clear poison from the address, -ENXIO is returned. | ||
The clear_poison attribute is only visible for devices | ||
supporting the capability. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
What: /sys/kernel/debug/vfio | ||
Date: December 2023 | ||
KernelVersion: 6.8 | ||
Contact: Longfang Liu <[email protected]> | ||
Description: This debugfs file directory is used for debugging | ||
of vfio devices, it's a common directory for all vfio devices. | ||
Vfio core will create a device subdirectory under this | ||
directory. | ||
|
||
What: /sys/kernel/debug/vfio/<device>/migration | ||
Date: December 2023 | ||
KernelVersion: 6.8 | ||
Contact: Longfang Liu <[email protected]> | ||
Description: This debugfs file directory is used for debugging | ||
of vfio devices that support live migration. | ||
The debugfs of each vfio device that supports live migration | ||
could be created under this directory. | ||
|
||
What: /sys/kernel/debug/vfio/<device>/migration/state | ||
Date: December 2023 | ||
KernelVersion: 6.8 | ||
Contact: Longfang Liu <[email protected]> | ||
Description: Read the live migration status of the vfio device. | ||
The contents of the state file reflects the migration state | ||
relative to those defined in the vfio_device_mig_state enum |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -58,3 +58,25 @@ Description: | |
(RW) Write to the file to turn on or off the SATA ncq (native | ||
command queueing) support. By default this feature is turned | ||
off. | ||
|
||
|
||
What: /sys/block/*/device/cdl_supported | ||
Date: May, 2023 | ||
KernelVersion: v6.5 | ||
Contact: [email protected] | ||
Description: | ||
(RO) Indicates if the device supports the command duration | ||
limits feature found in some ATA and SCSI devices. | ||
|
||
|
||
What: /sys/block/*/device/cdl_enable | ||
Date: May, 2023 | ||
KernelVersion: v6.5 | ||
Contact: [email protected] | ||
Description: | ||
(RW) For a device supporting the command duration limits | ||
feature, write to the file to turn on or off the feature. | ||
By default this feature is turned off. | ||
Writing "1" to this file enables the use of command duration | ||
limits for read and write commands in the kernel and turns on | ||
the feature on the device. Writing "0" disables the feature. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -52,6 +52,66 @@ Description: | |
host PCI device for this memory device, emit the CPU node | ||
affinity for this device. | ||
|
||
|
||
What: /sys/bus/cxl/devices/memX/security/state | ||
Date: June, 2023 | ||
KernelVersion: v6.5 | ||
Contact: [email protected] | ||
Description: | ||
(RO) Reading this file will display the CXL security state for | ||
that device. Such states can be: 'disabled', 'sanitize', when | ||
a sanitization is currently underway; or those available only | ||
for persistent memory: 'locked', 'unlocked' or 'frozen'. This | ||
sysfs entry is select/poll capable from userspace to notify | ||
upon completion of a sanitize operation. | ||
|
||
|
||
What: /sys/bus/cxl/devices/memX/security/sanitize | ||
Date: June, 2023 | ||
KernelVersion: v6.5 | ||
Contact: [email protected] | ||
Description: | ||
(WO) Write a boolean 'true' string value to this attribute to | ||
sanitize the device to securely re-purpose or decommission it. | ||
This is done by ensuring that all user data and meta-data, | ||
whether it resides in persistent capacity, volatile capacity, | ||
or the LSA, is made permanently unavailable by whatever means | ||
is appropriate for the media type. This functionality requires | ||
the device to be disabled, that is, not actively decoding any | ||
HPA ranges. This permits avoiding explicit global CPU cache | ||
management, relying instead for it to be done when a region | ||
transitions between software programmed and hardware committed | ||
states. If this file is not present, then there is no hardware | ||
support for the operation. | ||
|
||
|
||
What /sys/bus/cxl/devices/memX/security/erase | ||
Date: June, 2023 | ||
KernelVersion: v6.5 | ||
Contact: [email protected] | ||
Description: | ||
(WO) Write a boolean 'true' string value to this attribute to | ||
secure erase user data by changing the media encryption keys for | ||
all user data areas of the device. This functionality requires | ||
the device to be disabled, that is, not actively decoding any | ||
HPA ranges. This permits avoiding explicit global CPU cache | ||
management, relying instead for it to be done when a region | ||
transitions between software programmed and hardware committed | ||
states. If this file is not present, then there is no hardware | ||
support for the operation. | ||
|
||
|
||
What: /sys/bus/cxl/devices/memX/firmware/ | ||
Date: April, 2023 | ||
KernelVersion: v6.5 | ||
Contact: [email protected] | ||
Description: | ||
(RW) Firmware uploader mechanism. The different files under | ||
this directory can be used to upload and activate new | ||
firmware for CXL devices. The interfaces under this are | ||
documented in sysfs-class-firmware. | ||
|
||
|
||
What: /sys/bus/cxl/devices/*/devtype | ||
Date: June, 2021 | ||
KernelVersion: v5.14 | ||
|
@@ -399,3 +459,17 @@ Description: | |
1), and checks that the hardware accepts the commit request. | ||
Reading this value indicates whether the region is committed or | ||
not. | ||
|
||
|
||
What: /sys/bus/cxl/devices/memX/trigger_poison_list | ||
Date: April, 2023 | ||
KernelVersion: v6.4 | ||
Contact: [email protected] | ||
Description: | ||
(WO) When a boolean 'true' is written to this attribute the | ||
memdev driver retrieves the poison list from the device. The | ||
list consists of addresses that are poisoned, or would result | ||
in poison if accessed, and the source of the poison. This | ||
attribute is only visible for devices supporting the | ||
capability. The retrieved errors are logged as kernel | ||
events when cxl_poison event tracing is enabled. |
Oops, something went wrong.