9a559b886861bacfaeb0f31f300003d56fdc85f6

android12-5.10-lts
Sync up with android12-5.10 for the following commits:1419b69403
Merge tag 'android12-5.10.101_r00' into android12-5.103eec441822
UPSTREAM: usb: gadget: Fix use-after-free bug by not setting udc->dev.driver821f3e53d9
UPSTREAM: usb: gadget: rndis: prevent integer overflow in rndis_set_response()39aca15979
FROMGIT: mm/migrate: fix race between lock page and clear PG_Isolatedde0334216b
UPSTREAM: arm64: proton-pack: Include unprivileged eBPF status in Spectre v2 mitigation reportingd236f7b4cb
UPSTREAM: arm64: Use the clearbhb instruction in mitigations98b16e808f
UPSTREAM: KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered and migrated0f76dfc55d
UPSTREAM: arm64: Mitigate spectre style branch history side channels5411474f65
UPSTREAM: arm64: Do not include __READ_ONCE() block in assembly filese9a39a642c
UPSTREAM: KVM: arm64: Allow indirect vectors to be used without SPECTRE_V3Afee1ae7c7c
UPSTREAM: arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2d95b0b4e5d
UPSTREAM: arm64: Add percpu vectors for EL130180ef431
Revert "BACKPORT: FROMLIST: scsi: core: Reserve one tag for the UFS driver"28837e415d
UPSTREAM: arm64: entry: Add macro for reading symbol addresses from the trampolinee322fe26a1
UPSTREAM: arm64: entry: Add vectors that have the bhb mitigation sequences2a90cf9af2
UPSTREAM: arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigations0db372ec4b
UPSTREAM: arm64: entry: Allow the trampoline text to occupy multiple pages158c87e50a
UPSTREAM: arm64: entry: Make the kpti trampoline's kpti sequence optionale6408b96a0
UPSTREAM: arm64: entry: Move trampoline macros out of ifdef'd section00d8bb6b90
UPSTREAM: arm64: entry: Don't assume tramp_vectors is the start of the vectors0defb52ce6
UPSTREAM: arm64: entry: Allow tramp_alias to access symbols after the 4K boundary6e48449c91
UPSTREAM: arm64: entry: Move the trampoline data page before the text pagebb8baaf3af
UPSTREAM: arm64: entry: Free up another register on kpti's tramp_exit path32ba6d5d61
UPSTREAM: arm64: entry: Make the trampoline cleanup optionalc8b567d888
UPSTREAM: arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit17867c11a2
UPSTREAM: arm64: entry.S: Add ventry overflow sanity checks81ec26aafe
UPSTREAM: arm64: cpufeature: add HWCAP for FEAT_RPRES18c4e4fa56
UPSTREAM: arm64: cpufeature: add HWCAP for FEAT_AFP68bc555a23
UPSTREAM: arm64: add ID_AA64ISAR2_EL1 sys register2e2eef400b
UPSTREAM: arm64: Add HWCAP for self-synchronising virtual counter6d1f2678e2
UPSTREAM: arm64: Add Cortex-X2 CPU part definition51eded5d1b
UPSTREAM: arm64: cputype: Add CPU implementor & types for the Apple M1 cores803ff1161c
UPSTREAM: binder: Add invalid handle info in user error loga40cd23755
UPSTREAM: ARM: fix Thumb2 regression with Spectre BHB56186c7e4a
UPSTREAM: ARM: Spectre-BHB: provide empty stub for non-config1ea0d91588
UPSTREAM: ARM: fix build warning in proc-v7-bugs.cfdf3cb8a00
UPSTREAM: ARM: Do not use NOCROSSREFS directive with ld.lld57bc1e13f0
UPSTREAM: ARM: fix co-processor register typoa4e68d43f5
UPSTREAM: ARM: fix build error when BPF_SYSCALL is disabledbd2376838d
UPSTREAM: ARM: include unprivileged BPF status in Spectre V2 reportingafbbe4048f
UPSTREAM: ARM: Spectre-BHB workaround5a41f364e7
UPSTREAM: ARM: use LOADADDR() to get load address of sections3bfcb356df
UPSTREAM: ARM: early traps initialisation5a64a66802
UPSTREAM: ARM: report Spectre v2 status through sysfs9362cd2b47
UPSTREAM: x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT54a2bd029f
UPSTREAM: x86/speculation: Warn about Spectre v2 LFENCE mitigationf1b1f893b4
UPSTREAM: x86/speculation: Update link to AMD speculation whitepaperc4188388a3
UPSTREAM: x86/speculation: Use generic retpoline by default on AMDbd02dc4329
UPSTREAM: x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting3883503747
UPSTREAM: Documentation/hw-vuln: Update spectre doc1c3e98581b
UPSTREAM: x86/speculation: Add eIBRS + Retpoline optionscc9e9aa4e0
UPSTREAM: x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE414a6076ac
UPSTREAM: x86,bugs: Unconditionally allow spectre_v2=retpoline,amdf27f62fecd
UPSTREAM: bpf: Add kconfig knob for disabling unpriv bpf by defaultf3ca80cced
ANDROID: dm-bow: Protect Ranges fetched and erased from the RB tree4ebb639f0d
ANDROID: mm: page_pinner: fix build warningfe75d58387
ANDROID: fault: Add vendor hook for TLB conflict8248a3e758
BACKPORT: sched: Fix yet more sched_fork() racescd6e5d5d7d
ANDROID: mm/slub: Fix Kasan issue with for_each_object_track8dbcaf63b2
ANDROID: dm kcopyd: Use reserved memory for the copy buffer7b5fea2f46
ANDROID: GKI: add allowed list file for xiaomiae38f9954b
ANDROID: GKI: Update symbols to symbol list786bcb1109
FROMGIT: f2fs: quota: fix loop condition at f2fs_quota_sync()91fef75d48
FROMGIT: f2fs: Restore rwsem lockdep support4cc8ec84be
ANDROID: ABI: update allowed list for galaxyfcaaaaae6d
UPSTREAM: mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work91be4236fb
ANDROID: GKI: remove vfs-only namespace from 2 symbolsa817d6ed87
ANDROID: mm: Fix page table lookup in speculative fault pathe53b1b9ad4
UPSTREAM: xhci: re-initialize the HC during resume if HCE was set767f384155
FROMGIT: xhci: make xhci_handshake timeout for xhci_reset() adjustableebbf267fc0
ANDROID: vendor_hooks: Add hooks for __alloc_pages_direct_reclaim135406cecb
ANDROID: dma-direct: Document disable_dma32bf96382fb9
ANDROID: dma-direct: Make DMA32 disablement work for CONFIG_NUMA8f66dc1a78
UPSTREAM: mmc: block: fix read single on recovery logiccf221db753
UPSTREAM: fget: check that the fd still exists after getting a ref to it43754d8b7f
ANDROID: GKI: Update symbols to symbol listf2d0c30576
ANDROID: vendor_hooks: Add hooks for shrink_active_list62412e5b8c
FROMGIT: mm: count time in drain_all_pages during direct reclaim as memory pressure3b9fe10e46
ANDROID: incremental-fs: remove spurious kfree()acefa91e51
ANDROID: vendor_hooks: Add hooks for binderc3ac7418e6
ANDROID: qcom: Add sysfs related symbol Change-Id: Icbe5fb26e3cef602e3bbc01745a755a95d72a1a0
How do I submit patches to Android Common Kernels
-
BEST: Make all of your changes to upstream Linux. If appropriate, backport to the stable releases. These patches will be merged automatically in the corresponding common kernels. If the patch is already in upstream Linux, post a backport of the patch that conforms to the patch requirements below.
- Do not send patches upstream that contain only symbol exports. To be considered for upstream Linux,
additions of
EXPORT_SYMBOL_GPL()
require an in-tree modular driver that uses the symbol -- so include the new driver or changes to an existing driver in the same patchset as the export. - When sending patches upstream, the commit message must contain a clear case for why the patch is needed and beneficial to the community. Enabling out-of-tree drivers or functionality is not not a persuasive case.
- Do not send patches upstream that contain only symbol exports. To be considered for upstream Linux,
additions of
-
LESS GOOD: Develop your patches out-of-tree (from an upstream Linux point-of-view). Unless these are fixing an Android-specific bug, these are very unlikely to be accepted unless they have been coordinated with kernel-team@android.com. If you want to proceed, post a patch that conforms to the patch requirements below.
Common Kernel patch requirements
- All patches must conform to the Linux kernel coding standards and pass
script/checkpatch.pl
- Patches shall not break gki_defconfig or allmodconfig builds for arm, arm64, x86, x86_64 architectures (see https://source.android.com/setup/build/building-kernels)
- If the patch is not merged from an upstream branch, the subject must be tagged with the type of patch:
UPSTREAM:
,BACKPORT:
,FROMGIT:
,FROMLIST:
, orANDROID:
. - All patches must have a
Change-Id:
tag (see https://gerrit-review.googlesource.com/Documentation/user-changeid.html) - If an Android bug has been assigned, there must be a
Bug:
tag. - All patches must have a
Signed-off-by:
tag by the author and the submitter
Additional requirements are listed below based on patch type
Requirements for backports from mainline Linux: UPSTREAM:
, BACKPORT:
- If the patch is a cherry-pick from Linux mainline with no changes at all
- tag the patch subject with
UPSTREAM:
. - add upstream commit information with a
(cherry picked from commit ...)
line - Example:
- if the upstream commit message is
- tag the patch subject with
important patch from upstream
This is the detailed description of the important patch
Signed-off-by: Fred Jones <fred.jones@foo.org>
- then Joe Smith would upload the patch for the common kernel as
UPSTREAM: important patch from upstream
This is the detailed description of the important patch
Signed-off-by: Fred Jones <fred.jones@foo.org>
Bug: 135791357
Change-Id: I4caaaa566ea080fa148c5e768bb1a0b6f7201c01
(cherry picked from commit c31e73121f4c1ec41143423ac6ce3ce6dafdcec1)
Signed-off-by: Joe Smith <joe.smith@foo.org>
- If the patch requires any changes from the upstream version, tag the patch with
BACKPORT:
instead ofUPSTREAM:
.- use the same tags as
UPSTREAM:
- add comments about the changes under the
(cherry picked from commit ...)
line - Example:
- use the same tags as
BACKPORT: important patch from upstream
This is the detailed description of the important patch
Signed-off-by: Fred Jones <fred.jones@foo.org>
Bug: 135791357
Change-Id: I4caaaa566ea080fa148c5e768bb1a0b6f7201c01
(cherry picked from commit c31e73121f4c1ec41143423ac6ce3ce6dafdcec1)
[joe: Resolved minor conflict in drivers/foo/bar.c ]
Signed-off-by: Joe Smith <joe.smith@foo.org>
Requirements for other backports: FROMGIT:
, FROMLIST:
,
- If the patch has been merged into an upstream maintainer tree, but has not yet
been merged into Linux mainline
- tag the patch subject with
FROMGIT:
- add info on where the patch came from as
(cherry picked from commit <sha1> <repo> <branch>)
. This must be a stable maintainer branch (not rebased, so don't uselinux-next
for example). - if changes were required, use
BACKPORT: FROMGIT:
- Example:
- if the commit message in the maintainer tree is
- tag the patch subject with
important patch from upstream
This is the detailed description of the important patch
Signed-off-by: Fred Jones <fred.jones@foo.org>
- then Joe Smith would upload the patch for the common kernel as
FROMGIT: important patch from upstream
This is the detailed description of the important patch
Signed-off-by: Fred Jones <fred.jones@foo.org>
Bug: 135791357
(cherry picked from commit 878a2fd9de10b03d11d2f622250285c7e63deace
https://git.kernel.org/pub/scm/linux/kernel/git/foo/bar.git test-branch)
Change-Id: I4caaaa566ea080fa148c5e768bb1a0b6f7201c01
Signed-off-by: Joe Smith <joe.smith@foo.org>
- If the patch has been submitted to LKML, but not accepted into any maintainer tree
- tag the patch subject with
FROMLIST:
- add a
Link:
tag with a link to the submittal on lore.kernel.org - add a
Bug:
tag with the Android bug (required for patches not accepted into a maintainer tree) - if changes were required, use
BACKPORT: FROMLIST:
- Example:
- tag the patch subject with
FROMLIST: important patch from upstream
This is the detailed description of the important patch
Signed-off-by: Fred Jones <fred.jones@foo.org>
Bug: 135791357
Link: https://lore.kernel.org/lkml/20190619171517.GA17557@someone.com/
Change-Id: I4caaaa566ea080fa148c5e768bb1a0b6f7201c01
Signed-off-by: Joe Smith <joe.smith@foo.org>
Requirements for Android-specific patches: ANDROID:
- If the patch is fixing a bug to Android-specific code
- tag the patch subject with
ANDROID:
- add a
Fixes:
tag that cites the patch with the bug - Example:
- tag the patch subject with
ANDROID: fix android-specific bug in foobar.c
This is the detailed description of the important fix
Fixes: 1234abcd2468 ("foobar: add cool feature")
Change-Id: I4caaaa566ea080fa148c5e768bb1a0b6f7201c01
Signed-off-by: Joe Smith <joe.smith@foo.org>
- If the patch is a new feature
- tag the patch subject with
ANDROID:
- add a
Bug:
tag with the Android bug (required for android-specific features)
- tag the patch subject with
Description
Languages
C
97.8%
Assembly
1.2%
Shell
0.3%
Makefile
0.3%
Python
0.2%
Other
0.1%