Skip to content
Permalink
Mark-Rutland/t…
Switch branches/tags

Commits on Jun 16, 2021

  1. x86: snapshot thread flags

    Some thread flags can be set remotely, and so even when IRQs are
    disabled, the flags can change under our feet. Generally this is
    unlikely to cause a problem in practice, but it is somewhat unsound, and
    KCSAN will legitimately warn that there is a data race.
    
    To avoid such issues, we should snapshot the flags prior to using them.
    Let's use the new helpers to do so on x86.
    
    Signed-off-by: Mark Rutland <mark.rutland@arm.com>
    Cc: Borislav Petkov <bp@alien8.de>
    Cc: Ingo Molnar <mingo@redhat.com>
    Cc: Thomas Gleixner <tglx@linutronix.de>
    Mark Rutland authored and intel-lab-lkp committed Jun 16, 2021
  2. powerpc: snapshot thread flags

    Some thread flags can be set remotely, and so even when IRQs are
    disabled, the flags can change under our feet. Generally this is
    unlikely to cause a problem in practice, but it is somewhat unsound, and
    KCSAN will legitimately warn that there is a data race.
    
    To avoid such issues, we should snapshot the flags prior to using them.
    Let's use the new helpers to do so on powerpc.
    
    Signed-off-by: Mark Rutland <mark.rutland@arm.com>
    Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
    Cc: Michael Ellerman <mpe@ellerman.id.au>
    Cc: Paul Mackerras <paulus@samba.org>
    Mark Rutland authored and intel-lab-lkp committed Jun 16, 2021
  3. openrisc: snapshot thread flags

    Some thread flags can be set remotely, and so even when IRQs are
    disabled, the flags can change under our feet. Generally this is
    unlikely to cause a problem in practice, but it is somewhat unsound, and
    KCSAN will legitimately warn that there is a data race.
    
    To avoid such issues, we should snapshot the flags prior to using them.
    Let's use the new helpers to do so on openrisc.
    
    Signed-off-by: Mark Rutland <mark.rutland@arm.com>
    Cc: Jonas Bonn <jonas@southpole.se>
    Cc: Stafford Horne <shorne@gmail.com>
    Cc: Stefan Kristiansson <stefan.kristiansson@saunalahti.fi>
    Mark Rutland authored and intel-lab-lkp committed Jun 16, 2021
  4. microblaze: snapshot thread flags

    Some thread flags can be set remotely, and so even when IRQs are
    disabled, the flags can change under our feet. Generally this is
    unlikely to cause a problem in practice, but it is somewhat unsound, and
    KCSAN will legitimately warn that there is a data race.
    
    To avoid such issues, we should snapshot the flags prior to using them.
    Let's use the new helpers to do so on microblaze.
    
    Signed-off-by: Mark Rutland <mark.rutland@arm.com>
    Cc: Michal Simek <monstr@monstr.eu>
    Mark Rutland authored and intel-lab-lkp committed Jun 16, 2021
  5. arm64: read thread flags

    Some thread flags can be set remotely, and so even when IRQs are
    disabled, the flags can change under our feet. Generally this is
    unlikely to cause a problem in practice, but it is somewhat unsound, and
    KCSAN will legitimately warn that there is a data race.
    
    To avoid such issues, we should snapshot the flags prior to using them.
    Let's use the new helpers to do so on arm64.
    
    Signed-off-by: Mark Rutland <mark.rutland@arm.com>
    Cc: Catalin Marinas <catalin.marinas@arm.com>
    Cc: Will Deacon <will@kernel.org>
    Mark Rutland authored and intel-lab-lkp committed Jun 16, 2021
  6. arm: snapshot thread flags

    Some thread flags can be set remotely, and so even when IRQs are
    disabled, the flags can change under our feet. Generally this is
    unlikely to cause a problem in practice, but it is somewhat unsound, and
    KCSAN will legitimately warn that there is a data race.
    
    To avoid such issues, we should snapshot the flags prior to using them.
    Let's use the new helpers to do so on arm.
    
    Signed-off-by: Mark Rutland <mark.rutland@arm.com>
    Cc: Russell King <linux@armlinux.org.uk>
    Mark Rutland authored and intel-lab-lkp committed Jun 16, 2021
  7. alpha: snapshot thread flags

    Some thread flags can be set remotely, and so even when IRQs are
    disabled, the flags can change under our feet. Generally this is
    unlikely to cause a problem in practice, but it is somewhat unsound, and
    KCSAN will legitimately warn that there is a data race.
    
    To avoid such issues, we should snapshot the flags prior to using them.
    Let's use the new helpers to do so on alpha.
    
    Signed-off-by: Mark Rutland <mark.rutland@arm.com>
    Cc: Ivan Kokshaysky <ink@jurassic.park.msu.ru>
    Cc: Matt Turner <mattst88@gmail.com>
    Cc: Richard Henderson <rth@twiddle.net>
    Mark Rutland authored and intel-lab-lkp committed Jun 16, 2021
  8. sched: snapshot thread flags

    Some thread flags can be set remotely, and so even when IRQs are
    disabled, the flags can change under our feet. Generally this is
    unlikely to cause a problem in practice, but it is somewhat unsound, and
    KCSAN will legitimately warn that there is a data race.
    
    To avoid such issues, we should snapshot the flags prior to using them.
    Let's use the new helpers to do so in the common sched code.
    
    Signed-off-by: Mark Rutland <mark.rutland@arm.com>
    Cc: Ingo Molnar <mingo@redhat.com>
    Cc: Juri Lelli <juri.lelli@redhat.com>
    Cc: Peter Zijlstra <peterz@infradead.org>
    Cc: Vincent Guittot <vincent.guittot@linaro.org>
    Mark Rutland authored and intel-lab-lkp committed Jun 16, 2021
  9. entry: snapshot thread flags

    Some thread flags can be set remotely, and so even when IRQs are
    disabled, the flags can change under our feet. Generally this is
    unlikely to cause a problem in practice, but it is somewhat unsound, and
    KCSAN will legitimately warn that there is a data race.
    
    To avoid such issues, we should snapshot the flags prior to using them.
    Let's use the new helpers to do so in the common entry code.
    
    Signed-off-by: Mark Rutland <mark.rutland@arm.com>
    Cc: Andy Lutomirski <luto@kernel.org>
    Cc: Peter Zijlstra <peterz@infradead.org>
    Cc: Thomas Gleixner <tglx@linutronix.de>
    Mark Rutland authored and intel-lab-lkp committed Jun 16, 2021
  10. thread_info: add helpers to snapshot thread flags

    We have common helpers to manipulate individual thread flags, but where
    code wants to check several flags at once, it must open code reading
    current_thread_info()->flags and operating on a snapshot.
    
    As some flags can be set remotely it's necessary to use READ_ONCE() to
    get a consistent snapshot even when IRQs are disabled, but some code
    forgets to do this. Generally this is unlike to cause a problem in
    practice, but it is somewhat unsound, and KCSAN will legitimately warn
    that there is a data race.
    
    To make it easier to do the right thing, and to highlight that
    concurrent modification is possible, let's add a new helpers to snapshot
    the flags, which should be used in preference to plain reads.
    Subsequent patches will move existing code to use the new helpers.
    
    Signed-off-by: Mark Rutland <mark.rutland@arm.com>
    Cc: Boqun Feng <boqun.feng@gmail.com>
    Cc: Dmitry Vyukov <dvyukov@google.com>
    Cc: Marco Elver <elver@google.com>
    Cc: Paul E. McKenney <paulmck@kernel.org>
    Cc: Peter Zijlstra <peterz@infradead.org>
    Cc: Will Deacon <will@kernel.org>
    Mark Rutland authored and intel-lab-lkp committed Jun 16, 2021

Commits on Jun 15, 2021

  1. Merge branch 'for-next/sve' into for-next/core

    * for-next/sve:
      arm64/sve: Skip flushing Z registers with 128 bit vectors
      arm64/sve: Use the sve_flush macros in sve_load_from_fpsimd_state()
      arm64/sve: Split _sve_flush macro into separate Z and predicate flushes
    willdeacon committed Jun 15, 2021
  2. Merge branch 'for-next/smccc' into for-next/core

    * for-next/smccc:
      arm64: smccc: Support SMCCC v1.3 SVE register saving hint
    willdeacon committed Jun 15, 2021
  3. Merge branch 'for-next/selftests' into for-next/core

    * for-next/selftests:
      kselftest/arm64: Add missing newline to SVE test skipping output
    willdeacon committed Jun 15, 2021
  4. Merge branch 'for-next/ptrauth' into for-next/core

    * for-next/ptrauth:
      arm64: Conditionally configure PTR_AUTH key of the kernel.
      arm64: Add ARM64_PTR_AUTH_KERNEL config option
    willdeacon committed Jun 15, 2021
  5. Merge branch 'for-next/perf' into for-next/core

    * for-next/perf: (34 commits)
      arm64: perf: Simplify EVENT ATTR macro in perf_event.c
      drivers/perf: Simplify EVENT ATTR macro in fsl_imx8_ddr_perf.c
      drivers/perf: Simplify EVENT ATTR macro in xgene_pmu.c
      drivers/perf: Simplify EVENT ATTR macro in qcom_l3_pmu.c
      drivers/perf: Simplify EVENT ATTR macro in qcom_l2_pmu.c
      drivers/perf: Simplify EVENT ATTR macro in SMMU PMU driver
      perf: Add EVENT_ATTR_ID to simplify event attributes
      perf/smmuv3: Don't trample existing events with global filter
      perf/hisi: Constify static attribute_group structs
      perf: qcom: Remove redundant dev_err call in qcom_l3_cache_pmu_probe()
      drivers/perf: hisi: Fix data source control
      arm64: perf: Add more support on caps under sysfs
      perf: qcom_l2_pmu: move to use request_irq by IRQF_NO_AUTOEN flag
      arm_pmu: move to use request_irq by IRQF_NO_AUTOEN flag
      perf: arm_spe: use DEVICE_ATTR_RO macro
      perf: xgene_pmu: use DEVICE_ATTR_RO macro
      perf: qcom: use DEVICE_ATTR_RO macro
      perf: arm_pmu: use DEVICE_ATTR_RO macro
      drivers/perf: hisi: use the correct HiSilicon copyright
      arm64: perf: Convert snprintf to sysfs_emit
      ...
    willdeacon committed Jun 15, 2021
  6. Merge branch 'for-next/mte' into for-next/core

    * for-next/mte:
      kasan: disable freed user page poisoning with HW tags
      arm64: mte: handle tags zeroing at page allocation time
      kasan: use separate (un)poison implementation for integrated init
      mm: arch: remove indirection level in alloc_zeroed_user_highpage_movable()
      kasan: speed up mte_set_mem_tag_range
    willdeacon committed Jun 15, 2021
  7. Merge branch 'for-next/mm' into for-next/core

    * for-next/mm:
      arm64: head: fix code comments in set_cpu_boot_mode_flag
      arm64: mm: drop unused __pa(__idmap_text_start)
      arm64: mm: fix the count comments in compute_indices
      arm64/mm: Fix ttbr0 values stored in struct thread_info for software-pan
      arm64: mm: Pass original fault address to handle_mm_fault()
      arm64/mm: Drop SECTION_[SHIFT|SIZE|MASK]
      arm64/mm: Use CONT_PMD_SHIFT for ARM64_MEMSTART_SHIFT
      arm64/mm: Drop SWAPPER_INIT_MAP_SIZE
      arm64: mm: decode xFSC in mem_abort_decode()
      arm64: mm: Add is_el1_data_abort() helper
      arm64: cache: Lower ARCH_DMA_MINALIGN to 64 (L1_CACHE_BYTES)
      arm64: mm: Remove unused support for Normal-WT memory type
      arm64: acpi: Map EFI_MEMORY_WT memory as Normal-NC
      arm64: mm: Remove unused support for Device-GRE memory type
      arm64: mm: Use better bitmap_zalloc()
      arm64/mm: Make vmemmap_free() available only with CONFIG_MEMORY_HOTPLUG
      arm64/mm: Remove [PUD|PMD]_TABLE_BIT from [pud|pmd]_bad()
      arm64/mm: Validate CONFIG_PGTABLE_LEVELS
    willdeacon committed Jun 15, 2021
  8. Merge branch 'for-next/kasan' into for-next/core

    * for-next/kasan:
      kasan: arm64: support specialized outlined tag mismatch checks
    willdeacon committed Jun 15, 2021
  9. Merge branch 'for-next/insn' into for-next/core

    * for-next/insn:
      arm64: insn: move AARCH64_INSN_SIZE into <asm/insn.h>
      arm64: insn: decouple patching from insn code
      arm64: insn: Add load/store decoding helpers
      arm64: insn: Add some opcodes to instruction decoder
      arm64: insn: Add barrier encodings
      arm64: insn: Add SVE instruction class
      arm64: Move instruction encoder/decoder under lib/
      arm64: Move aarch32 condition check functions
      arm64: Move patching utilities out of instruction encoding/decoding
    willdeacon committed Jun 15, 2021
  10. Merge branch 'for-next/ffa' into for-next/core

    * for-next/ffa:
      arm64: smccc: Add support for SMCCCv1.2 extended input/output registers
    willdeacon committed Jun 15, 2021
  11. Merge branch 'for-next/entry' into for-next/core

    * for-next/entry:
      arm64: idle: don't instrument idle code with KCOV
      arm64: entry: don't instrument entry code with KCOV
      arm64: entry: make NMI entry/exit functions static
      arm64: entry: split SDEI entry
      arm64: entry: split bad stack entry
      arm64: entry: fold el1_inv() into el1h_64_sync_handler()
      arm64: entry: handle all vectors with C
      arm64: entry: template the entry asm functions
      arm64: entry: improve bad_mode()
      arm64: entry: move bad_mode() to entry-common.c
      arm64: entry: consolidate EL1 exception returns
      arm64: entry: organise entry vectors consistently
      arm64: entry: organise entry handlers consistently
      arm64: entry: convert IRQ+FIQ handlers to C
      arm64: entry: add a call_on_irq_stack helper
      arm64: entry: move NMI preempt logic to C
      arm64: entry: move arm64_preempt_schedule_irq to entry-common.c
      arm64: entry: convert SError handlers to C
      arm64: entry: unmask IRQ+FIQ after EL0 handling
      arm64: remove redundant local_daif_mask() in bad_mode()
    willdeacon committed Jun 15, 2021
  12. Merge branch 'for-next/docs' into for-next/core

    * for-next/docs:
      arm64: Document requirement for access to FEAT_HCX
    willdeacon committed Jun 15, 2021
  13. Merge branch 'for-next/cpufeature' into for-next/core

    * for-next/cpufeature:
      arm64: Kill 32-bit applications scheduled on 64-bit-only CPUs
      KVM: arm64: Kill 32-bit vCPUs on systems with mismatched EL0 support
      arm64: Allow mismatched 32-bit EL0 support
      arm64: cpuinfo: Split AArch32 registers out into a separate struct
      arm64: Check if GMID_EL1.BS is the same on all CPUs
      arm64: Change the cpuinfo_arm64 member type for some sysregs to u64
    willdeacon committed Jun 15, 2021
  14. Merge branch 'for-next/cortex-strings' into for-next/core

    * for-next/cortex-strings:
      arm64: update string routine copyrights and URLs
      arm64: Rewrite __arch_clear_user()
      arm64: Better optimised memchr()
      arm64: Import latest memcpy()/memmove() implementation
      arm64: Add assembly annotations for weak-PI-alias madness
      arm64: Import latest version of Cortex Strings' strncmp
      arm64: Import updated version of Cortex Strings' strlen
      arm64: Import latest version of Cortex Strings' strcmp
      arm64: Import latest version of Cortex Strings' memcmp
    willdeacon committed Jun 15, 2021
  15. Merge branch 'for-next/caches' into for-next/core

    * for-next/caches:
      arm64: Rename arm64-internal cache maintenance functions
      arm64: Fix cache maintenance function comments
      arm64: sync_icache_aliases to take end parameter instead of size
      arm64: __clean_dcache_area_pou to take end parameter instead of size
      arm64: __clean_dcache_area_pop to take end parameter instead of size
      arm64: __clean_dcache_area_poc to take end parameter instead of size
      arm64: __flush_dcache_area to take end parameter instead of size
      arm64: dcache_by_line_op to take end parameter instead of size
      arm64: __inval_dcache_area to take end parameter instead of size
      arm64: Fix comments to refer to correct function __flush_icache_range
      arm64: Move documentation of dcache_by_line_op
      arm64: assembler: remove user_alt
      arm64: Downgrade flush_icache_range to invalidate
      arm64: Do not enable uaccess for invalidate_icache_range
      arm64: Do not enable uaccess for flush_icache_range
      arm64: Apply errata to swsusp_arch_suspend_exit
      arm64: assembler: add conditional cache fixups
      arm64: assembler: replace `kaddr` with `addr`
    willdeacon committed Jun 15, 2021
  16. Merge branch 'for-next/build' into for-next/core

    * for-next/build:
      Makefile: fix GDB warning with CONFIG_RELR
    willdeacon committed Jun 15, 2021
  17. Merge branch 'for-next/boot' into for-next/core

    * for-next/boot:
      arm64: scs: Drop unused 'tmp' argument to scs_{load, save} asm macros
      arm64: smp: initialize cpu offset earlier
      arm64: smp: unify task and sp setup
      arm64: smp: remove stack from secondary_data
      arm64: smp: remove pointless secondary_data maintenance
      arm64: assembler: add set_this_cpu_offset
      arm64: stacktrace: Relax frame record alignment requirement to 8 bytes
      arm64: Change the on_*stack functions to take a size argument
      arm64: Implement stack trace termination record
    willdeacon committed Jun 15, 2021
  18. arm64: head: fix code comments in set_cpu_boot_mode_flag

    Up to here, the CPU boot mode can either be EL1 or EL2.
    Correct the code comments a bit.
    
    Signed-off-by: Dong Aisheng <aisheng.dong@nxp.com>
    Acked-by: Catalin Marinas <catalin.marinas@arm.com>
    Acked-by: Mark Rutland <mark.rutland@arm.com>
    Link: https://lore.kernel.org/r/20210518101405.1048860-5-aisheng.dong@nxp.com
    Signed-off-by: Will Deacon <will@kernel.org>
    Dong Aisheng authored and willdeacon committed Jun 15, 2021
  19. arm64: mm: drop unused __pa(__idmap_text_start)

    x5 is not used in the following map_memory. Instead,
    __pa(__idmap_text_start) is stored in x3 which is used later.
    
    Signed-off-by: Dong Aisheng <aisheng.dong@nxp.com>
    Acked-by: Catalin Marinas <catalin.marinas@arm.com>
    Acked-by: Mark Rutland <mark.rutland@arm.com>
    Link: https://lore.kernel.org/r/20210518101405.1048860-4-aisheng.dong@nxp.com
    Signed-off-by: Will Deacon <will@kernel.org>
    Dong Aisheng authored and willdeacon committed Jun 15, 2021
  20. arm64: mm: fix the count comments in compute_indices

    'count - 1' is confusing and not comply with the real code running.
    'count' actually represents the extra entries required, no need minus 1.
    
    Signed-off-by: Dong Aisheng <aisheng.dong@nxp.com>
    Acked-by: Catalin Marinas <catalin.marinas@arm.com>
    Link: https://lore.kernel.org/r/20210518101405.1048860-3-aisheng.dong@nxp.com
    Signed-off-by: Will Deacon <will@kernel.org>
    Dong Aisheng authored and willdeacon committed Jun 15, 2021
  21. arm64/mm: Fix ttbr0 values stored in struct thread_info for software-pan

    When using CONFIG_ARM64_SW_TTBR0_PAN, a task's thread_info::ttbr0 must be
    the TTBR0_EL1 value used to run userspace. With 52-bit PAs, the PA must be
    packed into the TTBR using phys_to_ttbr(), but we forget to do this in some
    of the SW PAN code. Thus, if the value is installed into TTBR0_EL1 (as may
    happen in the uaccess routines), this could result in UNPREDICTABLE
    behaviour.
    
    Since hardware with 52-bit PA support almost certainly has HW PAN, which
    will be used in preference, this shouldn't be a practical issue, but let's
    fix this for consistency.
    
    Cc: Catalin Marinas <catalin.marinas@arm.com>
    Cc: Will Deacon <will@kernel.org>
    Cc: Mark Rutland <mark.rutland@arm.com>
    Cc: James Morse <james.morse@arm.com>
    Cc: linux-arm-kernel@lists.infradead.org
    Cc: linux-kernel@vger.kernel.org
    Fixes: 529c4b0 ("arm64: handle 52-bit addresses in TTBR")
    Signed-off-by: Anshuman Khandual <anshuman.khandual@arm.com>
    Reviewed-by: Catalin Marinas <catalin.marinas@arm.com>
    Link: https://lore.kernel.org/r/1623749578-11231-1-git-send-email-anshuman.khandual@arm.com
    Signed-off-by: Will Deacon <will@kernel.org>
    Anshuman Khandual authored and willdeacon committed Jun 15, 2021
  22. arm64: mm: Pass original fault address to handle_mm_fault()

    Currently, the lower bits of fault address is cleared before it's
    passed to handle_mm_fault(). It's unnecessary since generic code
    does same thing since the commit 1a29d85 ("mm: use vmf->address
    instead of of vmf->virtual_address").
    
    This passes the original fault address to handle_mm_fault() in case
    the generic code needs to know the exact fault address.
    
    Signed-off-by: Gavin Shan <gshan@redhat.com>
    Acked-by: Catalin Marinas <catalin.marinas@arm.com>
    Reviewed-by: Anshuman Khandual <anshuman.khandual@arm.com>
    Link: https://lore.kernel.org/r/20210614122701.100515-1-gshan@redhat.com
    Signed-off-by: Will Deacon <will@kernel.org>
    Gavin Shan authored and willdeacon committed Jun 15, 2021
  23. arm64/mm: Drop SECTION_[SHIFT|SIZE|MASK]

    SECTION_[SHIFT|SIZE|MASK] are essentially PMD_[SHIFT|SIZE|MASK]. But these
    create confusion being similar to generic sparsemem memory sections, which
    are derived from SECTION_SIZE_BITS. Section references have always implied
    PMD level block mapping. Instead just use all PMD level macros which would
    make it explicit and also remove confusion with sparsmem memory sections.
    
    Cc: Catalin Marinas <catalin.marinas@arm.com>
    Cc: Will Deacon <will@kernel.org>
    Cc: Mark Rutland <mark.rutland@arm.com>
    Cc: linux-arm-kernel@lists.infradead.org
    Cc: linux-kernel@vger.kernel.org
    Signed-off-by: Anshuman Khandual <anshuman.khandual@arm.com>
    Reviewed-by: Gavin Shan <gshan@redhat.com>
    Acked-by: Catalin Marinas <catalin.marinas@arm.com>
    Link: https://lore.kernel.org/r/1623658706-7182-1-git-send-email-anshuman.khandual@arm.com
    Signed-off-by: Will Deacon <will@kernel.org>
    Anshuman Khandual authored and willdeacon committed Jun 15, 2021
  24. arm64/mm: Use CONT_PMD_SHIFT for ARM64_MEMSTART_SHIFT

    ARM64_MEMSTART_SIZE needs to be aligned with CONT_PMD_SIZE on 16K page size
    config. Hence just directly use CONT_PMD_SHIFT.
    
    Cc: Catalin Marinas <catalin.marinas@arm.com>
    Cc: Will Deacon <will@kernel.org>
    Cc: Mark Rutland <mark.rutland@arm.com>
    Cc: linux-arm-kernel@lists.infradead.org
    Cc: linux-kernel@vger.kernel.org
    Signed-off-by: Anshuman Khandual <anshuman.khandual@arm.com>
    Reviewed-by: Gavin Shan <gshan@redhat.com>
    Acked-by: Catalin Marinas <catalin.marinas@arm.com>
    Link: https://lore.kernel.org/r/1623663755-8949-1-git-send-email-anshuman.khandual@arm.com
    Signed-off-by: Will Deacon <will@kernel.org>
    Anshuman Khandual authored and willdeacon committed Jun 15, 2021
  25. arm64/mm: Drop SWAPPER_INIT_MAP_SIZE

    The commit cdef5f6 ("arm64: mm: allocate pagetables anywhere") had
    dropped the last reference to SWAPPER_INIT_MAP_SIZE. Hence just clean up.
    
    Cc: Catalin Marinas <catalin.marinas@arm.com>
    Cc: Will Deacon <will@kernel.org>
    Cc: Mark Rutland <mark.rutland@arm.com>
    Cc: linux-arm-kernel@lists.infradead.org
    Cc: linux-kernel@vger.kernel.org
    Signed-off-by: Anshuman Khandual <anshuman.khandual@arm.com>
    Reviewed-by: Gavin Shan <gshan@redhat.com>
    Link: https://lore.kernel.org/r/1623665411-20055-1-git-send-email-anshuman.khandual@arm.com
    Signed-off-by: Will Deacon <will@kernel.org>
    Anshuman Khandual authored and willdeacon committed Jun 15, 2021
Older