Skip to content
Permalink
Namhyung-Kim/p…
Switch branches/tags

Commits on Dec 11, 2021

  1. perf/core: Fix cgroup event list management

    The active cgroup events are managed in the per-cpu cgrp_cpuctx_list.
    This list is accessed from current cpu and not protected by any locks.
    But from the commit ef54c1a ("perf: Rework
    perf_event_exit_event()"), this assumption does not hold true anymore.
    
    In the perf_remove_from_context(), it can remove an event from the
    context without an IPI when the context is not active.  I think it
    assumes task event context, but it's possible for cpu event context
    only with cgroup events can be inactive at the moment - and it might
    become active soon.
    
    If the event is enabled when it's about to be closed, it might call
    perf_cgroup_event_disable() and list_del() with the cgrp_cpuctx_list
    on a different cpu.
    
    This resulted in a crash due to an invalid list pointer access during
    the cgroup list traversal on the cpu which the event belongs to.
    
    The following program can crash my box easily..
    
      #include <stdio.h>
      #include <fcntl.h>
      #include <unistd.h>
      #include <linux/perf_event.h>
      #include <sys/stat.h>
      #include <sys/syscall.h>
    
      //#define CGROUP_ROOT  "/dev/cgroup/devices"
      #define CGROUP_ROOT  "/sys/fs/cgroup"
    
      int perf_event_open(struct perf_event_attr *attr, int pid, int cpu,
                          int grp, unsigned long flags)
      {
        return syscall(SYS_perf_event_open, attr, pid, cpu, grp, flags);
      }
    
      int get_cgroup_fd(const char *grp)
      {
        char buf[128];
    
        snprintf(buf, sizeof(buf), "%s/%s", CGROUP_ROOT, grp);
    
        /* ignore failures */
        mkdir(buf, 0755);
    
        return open(buf, O_RDONLY);
      }
    
      int main(int argc, char *argv[])
      {
        struct perf_event_attr hw = {
          .type = PERF_TYPE_HARDWARE,
          .config = PERF_COUNT_HW_CPU_CYCLES,
        };
        struct perf_event_attr sw = {
          .type = PERF_TYPE_SOFTWARE,
          .config = PERF_COUNT_SW_CPU_CLOCK,
        };
        int cpus = sysconf(_SC_NPROCESSORS_ONLN);
        int fd[4][cpus];
        int cgrpA, cgrpB;
    
        cgrpA = get_cgroup_fd("A");
        cgrpB = get_cgroup_fd("B");
        if (cgrpA < 0 || cgrpB < 0) {
          printf("failed to get cgroup fd\n");
          return 1;
        }
    
        while (1) {
          int i;
    
          for (i = 0; i < cpus; i++) {
            fd[0][i] = perf_event_open(&hw, cgrpA, i, -1, PERF_FLAG_PID_CGROUP);
            fd[1][i] = perf_event_open(&sw, cgrpA, i, -1, PERF_FLAG_PID_CGROUP);
            fd[2][i] = perf_event_open(&hw, cgrpB, i, -1, PERF_FLAG_PID_CGROUP);
            fd[3][i] = perf_event_open(&sw, cgrpB, i, -1, PERF_FLAG_PID_CGROUP);
          }
    
          for (i = 0; i < cpus; i++) {
            close(fd[3][i]);
            close(fd[2][i]);
            close(fd[1][i]);
            close(fd[0][i]);
          }
        }
        return 0;
      }
    
    Let's use IPI to prevent such crashes.
    
    Similarly, I think perf_install_in_context() should use IPI for the
    first cgroup event at least.
    
    Cc: Marco Elver <elver@google.com>
    Signed-off-by: Namhyung Kim <namhyung@kernel.org>
    namhyung authored and intel-lab-lkp committed Dec 11, 2021

Commits on Nov 17, 2021

  1. perf: Drop guest callback (un)register stubs

    Drop perf's stubs for (un)registering guest callbacks now that KVM
    registration of callbacks is hidden behind GUEST_PERF_EVENTS=y.  The only
    other user is x86 XEN_PV, and x86 unconditionally selects PERF_EVENTS.
    
    No functional change intended.
    
    Signed-off-by: Sean Christopherson <seanjc@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
    Link: https://lore.kernel.org/r/20211111020738.2512932-18-seanjc@google.com
    sean-jc authored and Peter Zijlstra committed Nov 17, 2021
  2. KVM: arm64: Drop perf.c and fold its tiny bits of code into arm.c

    Call KVM's (un)register perf callbacks helpers directly from arm.c and
    delete perf.c
    
    No functional change intended.
    
    Signed-off-by: Sean Christopherson <seanjc@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Link: https://lore.kernel.org/r/20211111020738.2512932-17-seanjc@google.com
    sean-jc authored and Peter Zijlstra committed Nov 17, 2021
  3. KVM: arm64: Hide kvm_arm_pmu_available behind CONFIG_HW_PERF_EVENTS=y

    Move the definition of kvm_arm_pmu_available to pmu-emul.c and, out of
    "necessity", hide it behind CONFIG_HW_PERF_EVENTS.  Provide a stub for
    the key's wrapper, kvm_arm_support_pmu_v3().  Moving the key's definition
    out of perf.c will allow a future commit to delete perf.c entirely.
    
    Signed-off-by: Sean Christopherson <seanjc@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Link: https://lore.kernel.org/r/20211111020738.2512932-16-seanjc@google.com
    sean-jc authored and Peter Zijlstra committed Nov 17, 2021
  4. KVM: arm64: Convert to the generic perf callbacks

    Drop arm64's version of the callbacks in favor of the callbacks provided
    by generic KVM, which are semantically identical.
    
    Signed-off-by: Sean Christopherson <seanjc@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Reviewed-by: Marc Zyngier <maz@kernel.org>
    Link: https://lore.kernel.org/r/20211111020738.2512932-15-seanjc@google.com
    sean-jc authored and Peter Zijlstra committed Nov 17, 2021
  5. KVM: x86: Move Intel Processor Trace interrupt handler to vmx.c

    Now that all state needed for VMX's PT interrupt handler is exposed to
    vmx.c (specifically the currently running vCPU), move the handler into
    vmx.c where it belongs.
    
    Signed-off-by: Sean Christopherson <seanjc@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Link: https://lore.kernel.org/r/20211111020738.2512932-14-seanjc@google.com
    sean-jc authored and Peter Zijlstra committed Nov 17, 2021
  6. KVM: Move x86's perf guest info callbacks to generic KVM

    Move x86's perf guest callbacks into common KVM, as they are semantically
    identical to arm64's callbacks (the only other such KVM callbacks).
    arm64 will convert to the common versions in a future patch.
    
    Implement the necessary arm64 arch hooks now to avoid having to provide
    stubs or a temporary #define (from x86) to avoid arm64 compilation errors
    when CONFIG_GUEST_PERF_EVENTS=y.
    
    Signed-off-by: Sean Christopherson <seanjc@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
    Acked-by: Marc Zyngier <maz@kernel.org>
    Link: https://lore.kernel.org/r/20211111020738.2512932-13-seanjc@google.com
    sean-jc authored and Peter Zijlstra committed Nov 17, 2021
  7. KVM: x86: More precisely identify NMI from guest when handling PMI

    Differentiate between IRQ and NMI for KVM's PMC overflow callback, which
    was originally invoked in response to an NMI that arrived while the guest
    was running, but was inadvertantly changed to fire on IRQs as well when
    support for perf without PMU/NMI was added to KVM.  In practice, this
    should be a nop as the PMC overflow callback shouldn't be reached, but
    it's a cheap and easy fix that also better documents the situation.
    
    Note, this also doesn't completely prevent false positives if perf
    somehow ends up calling into KVM, e.g. an NMI can arrive in host after
    KVM sets its flag.
    
    Fixes: dd60d21 ("KVM: x86: Fix perf timer mode IP reporting")
    Signed-off-by: Sean Christopherson <seanjc@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
    Link: https://lore.kernel.org/r/20211111020738.2512932-12-seanjc@google.com
    sean-jc authored and Peter Zijlstra committed Nov 17, 2021
  8. KVM: x86: Drop current_vcpu for kvm_running_vcpu + kvm_arch_vcpu vari…

    …able
    
    Use the generic kvm_running_vcpu plus a new 'handling_intr_from_guest'
    variable in kvm_arch_vcpu instead of the semi-redundant current_vcpu.
    kvm_before/after_interrupt() must be called while the vCPU is loaded,
    (which protects against preemption), thus kvm_running_vcpu is guaranteed
    to be non-NULL when handling_intr_from_guest is non-zero.
    
    Switching to kvm_get_running_vcpu() will allows moving KVM's perf
    callbacks to generic code, and the new flag will be used in a future
    patch to more precisely identify the "NMI from guest" case.
    
    Signed-off-by: Sean Christopherson <seanjc@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
    Link: https://lore.kernel.org/r/20211111020738.2512932-11-seanjc@google.com
    sean-jc authored and Peter Zijlstra committed Nov 17, 2021
  9. perf/core: Use static_call to optimize perf_guest_info_callbacks

    Use static_call to optimize perf's guest callbacks on arm64 and x86,
    which are now the only architectures that define the callbacks.  Use
    DEFINE_STATIC_CALL_RET0 as the default/NULL for all guest callbacks, as
    the callback semantics are that a return value '0' means "not in guest".
    
    static_call obviously avoids the overhead of CONFIG_RETPOLINE=y, but is
    also advantageous versus other solutions, e.g. per-cpu callbacks, in that
    a per-cpu memory load is not needed to detect the !guest case.
    
    Based on code from Peter and Like.
    
    Suggested-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Signed-off-by: Sean Christopherson <seanjc@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
    Link: https://lore.kernel.org/r/20211111020738.2512932-10-seanjc@google.com
    sean-jc authored and Peter Zijlstra committed Nov 17, 2021
  10. perf: Force architectures to opt-in to guest callbacks

    Introduce GUEST_PERF_EVENTS and require architectures to select it to
    allow registering and using guest callbacks in perf.  This will hopefully
    make it more difficult for new architectures to add useless "support" for
    guest callbacks, e.g. via copy+paste.
    
    Stubbing out the helpers has the happy bonus of avoiding a load of
    perf_guest_cbs when GUEST_PERF_EVENTS=n on arm64/x86.
    
    Signed-off-by: Sean Christopherson <seanjc@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
    Link: https://lore.kernel.org/r/20211111020738.2512932-9-seanjc@google.com
    sean-jc authored and Peter Zijlstra committed Nov 17, 2021
  11. perf: Add wrappers for invoking guest callbacks

    Add helpers for the guest callbacks to prepare for burying the callbacks
    behind a Kconfig (it's a lot easier to provide a few stubs than to #ifdef
    piles of code), and also to prepare for converting the callbacks to
    static_call().  perf_instruction_pointer() in particular will have subtle
    semantics with static_call(), as the "no callbacks" case will return 0 if
    the callbacks are unregistered between querying guest state and getting
    the IP.  Implement the change now to avoid a functional change when adding
    static_call() support, and because the new helper needs to return
    _something_ in this case.
    
    Signed-off-by: Sean Christopherson <seanjc@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
    Link: https://lore.kernel.org/r/20211111020738.2512932-8-seanjc@google.com
    sean-jc authored and Peter Zijlstra committed Nov 17, 2021
  12. perf/core: Rework guest callbacks to prepare for static_call support

    To prepare for using static_calls to optimize perf's guest callbacks,
    replace ->is_in_guest and ->is_user_mode with a new multiplexed hook
    ->state, tweak ->handle_intel_pt_intr to play nice with being called when
    there is no active guest, and drop "guest" from ->get_guest_ip.
    
    Return '0' from ->state and ->handle_intel_pt_intr to indicate "not in
    guest" so that DEFINE_STATIC_CALL_RET0 can be used to define the static
    calls, i.e. no callback == !guest.
    
    [sean: extracted from static_call patch, fixed get_ip() bug, wrote changelog]
    Suggested-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Originally-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Signed-off-by: Like Xu <like.xu@linux.intel.com>
    Signed-off-by: Zhu Lingshan <lingshan.zhu@intel.com>
    Signed-off-by: Sean Christopherson <seanjc@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>
    Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
    Link: https://lore.kernel.org/r/20211111020738.2512932-7-seanjc@google.com
    Like Xu authored and Peter Zijlstra committed Nov 17, 2021
  13. perf: Drop dead and useless guest "support" from arm, csky, nds32 and…

    … riscv
    
    Drop "support" for guest callbacks from architectures that don't implement
    the guest callbacks.  Future patches will convert the callbacks to
    static_call; rather than churn a bunch of arch code (that was presumably
    copy+pasted from x86), remove it wholesale as it's useless and at best
    wasting cycles.
    
    A future patch will also add a Kconfig to force architcture to opt into
    the callbacks to make it more difficult for uses "support" to sneak in in
    the future.
    
    No functional change intended.
    
    Signed-off-by: Sean Christopherson <seanjc@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
    Link: https://lore.kernel.org/r/20211111020738.2512932-6-seanjc@google.com
    sean-jc authored and Peter Zijlstra committed Nov 17, 2021
  14. perf: Stop pretending that perf can handle multiple guest callbacks

    Drop the 'int' return value from the perf (un)register callbacks helpers
    and stop pretending perf can support multiple callbacks.  The 'int'
    returns are not future proofing anything as none of the callers take
    action on an error.  It's also not obvious that there will ever be
    co-tenant hypervisors, and if there are, that allowing multiple callbacks
    to be registered is desirable or even correct.
    
    Opportunistically rename callbacks=>cbs in the affected declarations to
    match their definitions.
    
    No functional change intended.
    
    Signed-off-by: Sean Christopherson <seanjc@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
    Link: https://lore.kernel.org/r/20211111020738.2512932-5-seanjc@google.com
    sean-jc authored and Peter Zijlstra committed Nov 17, 2021
  15. KVM: x86: Register Processor Trace interrupt hook iff PT enabled in g…

    …uest
    
    Override the Processor Trace (PT) interrupt handler for guest mode if and
    only if PT is configured for host+guest mode, i.e. is being used
    independently by both host and guest.  If PT is configured for system
    mode, the host fully controls PT and must handle all events.
    
    Fixes: 8479e04 ("KVM: x86: Inject PMI for KVM guest")
    Reported-by: Alexander Shishkin <alexander.shishkin@linux.intel.com>
    Reported-by: Artem Kashkanov <artem.kashkanov@intel.com>
    Signed-off-by: Sean Christopherson <seanjc@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Acked-by: Paolo Bonzini <pbonzini@redhat.com>
    Cc: stable@vger.kernel.org
    Link: https://lore.kernel.org/r/20211111020738.2512932-4-seanjc@google.com
    sean-jc authored and Peter Zijlstra committed Nov 17, 2021
  16. KVM: x86: Register perf callbacks after calling vendor's hardware_set…

    …up()
    
    Wait to register perf callbacks until after doing vendor hardaware setup.
    VMX's hardware_setup() configures Intel Processor Trace (PT) mode, and a
    future fix to register the Intel PT guest interrupt hook if and only if
    Intel PT is exposed to the guest will consume the configured PT mode.
    
    Delaying registration to hardware setup is effectively a nop as KVM's perf
    hooks all pivot on the per-CPU current_vcpu, which is non-NULL only when
    KVM is handling an IRQ/NMI in a VM-Exit path.  I.e. current_vcpu will be
    NULL throughout both kvm_arch_init() and kvm_arch_hardware_setup().
    
    Signed-off-by: Sean Christopherson <seanjc@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Acked-by: Paolo Bonzini <pbonzini@redhat.com>
    Cc: stable@vger.kernel.org
    Link: https://lore.kernel.org/r/20211111020738.2512932-3-seanjc@google.com
    sean-jc authored and Peter Zijlstra committed Nov 17, 2021
  17. perf: Protect perf_guest_cbs with RCU

    Protect perf_guest_cbs with RCU to fix multiple possible errors.  Luckily,
    all paths that read perf_guest_cbs already require RCU protection, e.g. to
    protect the callback chains, so only the direct perf_guest_cbs touchpoints
    need to be modified.
    
    Bug #1 is a simple lack of WRITE_ONCE/READ_ONCE behavior to ensure
    perf_guest_cbs isn't reloaded between a !NULL check and a dereference.
    Fixed via the READ_ONCE() in rcu_dereference().
    
    Bug #2 is that on weakly-ordered architectures, updates to the callbacks
    themselves are not guaranteed to be visible before the pointer is made
    visible to readers.  Fixed by the smp_store_release() in
    rcu_assign_pointer() when the new pointer is non-NULL.
    
    Bug #3 is that, because the callbacks are global, it's possible for
    readers to run in parallel with an unregisters, and thus a module
    implementing the callbacks can be unloaded while readers are in flight,
    resulting in a use-after-free.  Fixed by a synchronize_rcu() call when
    unregistering callbacks.
    
    Bug #1 escaped notice because it's extremely unlikely a compiler will
    reload perf_guest_cbs in this sequence.  perf_guest_cbs does get reloaded
    for future derefs, e.g. for ->is_user_mode(), but the ->is_in_guest()
    guard all but guarantees the consumer will win the race, e.g. to nullify
    perf_guest_cbs, KVM has to completely exit the guest and teardown down
    all VMs before KVM start its module unload / unregister sequence.  This
    also makes it all but impossible to encounter bug #3.
    
    Bug #2 has not been a problem because all architectures that register
    callbacks are strongly ordered and/or have a static set of callbacks.
    
    But with help, unloading kvm_intel can trigger bug #1 e.g. wrapping
    perf_guest_cbs with READ_ONCE in perf_misc_flags() while spamming
    kvm_intel module load/unload leads to:
    
      BUG: kernel NULL pointer dereference, address: 0000000000000000
      #PF: supervisor read access in kernel mode
      #PF: error_code(0x0000) - not-present page
      PGD 0 P4D 0
      Oops: 0000 [#1] PREEMPT SMP
      CPU: 6 PID: 1825 Comm: stress Not tainted 5.14.0-rc2+ torvalds#459
      Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
      RIP: 0010:perf_misc_flags+0x1c/0x70
      Call Trace:
       perf_prepare_sample+0x53/0x6b0
       perf_event_output_forward+0x67/0x160
       __perf_event_overflow+0x52/0xf0
       handle_pmi_common+0x207/0x300
       intel_pmu_handle_irq+0xcf/0x410
       perf_event_nmi_handler+0x28/0x50
       nmi_handle+0xc7/0x260
       default_do_nmi+0x6b/0x170
       exc_nmi+0x103/0x130
       asm_exc_nmi+0x76/0xbf
    
    Fixes: 39447b3 ("perf: Enhance perf to allow for guest statistic collection from host")
    Signed-off-by: Sean Christopherson <seanjc@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
    Cc: stable@vger.kernel.org
    Link: https://lore.kernel.org/r/20211111020738.2512932-2-seanjc@google.com
    sean-jc authored and Peter Zijlstra committed Nov 17, 2021

Commits on Nov 14, 2021

  1. Linux 5.16-rc1

    torvalds committed Nov 14, 2021
  2. kconfig: Add support for -Wimplicit-fallthrough

    Add Kconfig support for -Wimplicit-fallthrough for both GCC and Clang.
    
    The compiler option is under configuration CC_IMPLICIT_FALLTHROUGH,
    which is enabled by default.
    
    Special thanks to Nathan Chancellor who fixed the Clang bug[1][2]. This
    bugfix only appears in Clang 14.0.0, so older versions still contain
    the bug and -Wimplicit-fallthrough won't be enabled for them, for now.
    
    This concludes a long journey and now we are finally getting rid
    of the unintentional fallthrough bug-class in the kernel, entirely. :)
    
    Link: llvm/llvm-project@9ed4a94 [1]
    Link: https://bugs.llvm.org/show_bug.cgi?id=51094 [2]
    Link: KSPP#115
    Link: ClangBuiltLinux#236
    Co-developed-by: Kees Cook <keescook@chromium.org>
    Signed-off-by: Kees Cook <keescook@chromium.org>
    Co-developed-by: Linus Torvalds <torvalds@linux-foundation.org>
    Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
    Signed-off-by: Gustavo A. R. Silva <gustavoars@kernel.org>
    Reviewed-by: Nathan Chancellor <nathan@kernel.org>
    Tested-by: Nathan Chancellor <nathan@kernel.org>
    Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
    GustavoARSilva authored and torvalds committed Nov 14, 2021
  3. Merge tag 'xfs-5.16-merge-5' of git://git.kernel.org/pub/scm/fs/xfs/x…

    …fs-linux
    
    Pull xfs cleanups from Darrick Wong:
     "The most 'exciting' aspect of this branch is that the xfsprogs
      maintainer and I have worked through the last of the code
      discrepancies between kernel and userspace libxfs such that there are
      no code differences between the two except for #includes.
    
      IOWs, diff suffices to demonstrate that the userspace tools behave the
      same as the kernel, and kernel-only bits are clearly marked in the
      /kernel/ source code instead of just the userspace source.
    
      Summary:
    
       - Clean up open-coded swap() calls.
    
       - A little bit of #ifdef golf to complete the reunification of the
         kernel and userspace libxfs source code"
    
    * tag 'xfs-5.16-merge-5' of git://git.kernel.org/pub/scm/fs/xfs/xfs-linux:
      xfs: sync xfs_btree_split macros with userspace libxfs
      xfs: #ifdef out perag code for userspace
      xfs: use swap() to make dabtree code cleaner
    torvalds committed Nov 14, 2021
  4. Merge tag 'for-5.16/parisc-3' of git://git.kernel.org/pub/scm/linux/k…

    …ernel/git/deller/parisc-linux
    
    Pull more parisc fixes from Helge Deller:
     "Fix a build error in stracktrace.c, fix resolving of addresses to
      function names in backtraces, fix single-stepping in assembly code and
      flush userspace pte's when using set_pte_at()"
    
    * tag 'for-5.16/parisc-3' of git://git.kernel.org/pub/scm/linux/kernel/git/deller/parisc-linux:
      parisc/entry: fix trace test in syscall exit path
      parisc: Flush kernel data mapping in set_pte_at() when installing pte for user page
      parisc: Fix implicit declaration of function '__kernel_text_address'
      parisc: Fix backtrace to always include init funtion names
    torvalds committed Nov 14, 2021
  5. Merge tag 'sh-for-5.16' of git://git.libc.org/linux-sh

    Pull arch/sh updates from Rich Felker.
    
    * tag 'sh-for-5.16' of git://git.libc.org/linux-sh:
      sh: pgtable-3level: Fix cast to pointer from integer of different size
      sh: fix READ/WRITE redefinition warnings
      sh: define __BIG_ENDIAN for math-emu
      sh: math-emu: drop unused functions
      sh: fix kconfig unmet dependency warning for FRAME_POINTER
      sh: Cleanup about SPARSE_IRQ
      sh: kdump: add some attribute to function
      maple: fix wrong return value of maple_bus_init().
      sh: boot: avoid unneeded rebuilds under arch/sh/boot/compressed/
      sh: boot: add intermediate vmlinux.bin* to targets instead of extra-y
      sh: boards: Fix the cacography in irq.c
      sh: check return code of request_irq
      sh: fix trivial misannotations
    torvalds committed Nov 14, 2021
  6. Merge tag 'for-linus' of git://git.armlinux.org.uk/~rmk/linux-arm

    Pull ARM fixes from Russell King:
    
     - Fix early_iounmap
    
     - Drop cc-option fallbacks for architecture selection
    
    * tag 'for-linus' of git://git.armlinux.org.uk/~rmk/linux-arm:
      ARM: 9156/1: drop cc-option fallbacks for architecture selection
      ARM: 9155/1: fix early early_iounmap()
    torvalds committed Nov 14, 2021
  7. Merge tag 'devicetree-fixes-for-5.16-1' of git://git.kernel.org/pub/s…

    …cm/linux/kernel/git/robh/linux
    
    Pull devicetree fixes from Rob Herring:
    
     - Two fixes due to DT node name changes on Arm, Ltd. boards
    
     - Treewide rename of Ingenic CGU headers
    
     - Update ST email addresses
    
     - Remove Netlogic DT bindings
    
     - Dropping few more cases of redundant 'maxItems' in schemas
    
     - Convert toshiba,tc358767 bridge binding to schema
    
    * tag 'devicetree-fixes-for-5.16-1' of git://git.kernel.org/pub/scm/linux/kernel/git/robh/linux:
      dt-bindings: watchdog: sunxi: fix error in schema
      bindings: media: venus: Drop redundant maxItems for power-domain-names
      dt-bindings: Remove Netlogic bindings
      clk: versatile: clk-icst: Ensure clock names are unique
      of: Support using 'mask' in making device bus id
      dt-bindings: treewide: Update @st.com email address to @FOSS.st.com
      dt-bindings: media: Update maintainers for st,stm32-hwspinlock.yaml
      dt-bindings: media: Update maintainers for st,stm32-cec.yaml
      dt-bindings: mfd: timers: Update maintainers for st,stm32-timers
      dt-bindings: timer: Update maintainers for st,stm32-timer
      dt-bindings: i2c: imx: hardware do not restrict clock-frequency to only 100 and 400 kHz
      dt-bindings: display: bridge: Convert toshiba,tc358767.txt to yaml
      dt-bindings: Rename Ingenic CGU headers to ingenic,*.h
    torvalds committed Nov 14, 2021
  8. Merge tag 'timers-urgent-2021-11-14' of git://git.kernel.org/pub/scm/…

    …linux/kernel/git/tip/tip
    
    Pull timer fix from Thomas Gleixner:
     "A single fix for POSIX CPU timers to address a problem where POSIX CPU
      timer delivery stops working for a new child task because
      copy_process() copies state information which is only valid for the
      parent task"
    
    * tag 'timers-urgent-2021-11-14' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
      posix-cpu-timers: Clear task::posix_cputimers_work in copy_process()
    torvalds committed Nov 14, 2021
  9. Merge tag 'irq-urgent-2021-11-14' of git://git.kernel.org/pub/scm/lin…

    …ux/kernel/git/tip/tip
    
    Pull irq fixes from Thomas Gleixner:
     "A set of fixes for the interrupt subsystem
    
      Core code:
    
       - A regression fix for the Open Firmware interrupt mapping code where
         a interrupt controller property in a node caused a map property in
         the same node to be ignored.
    
      Interrupt chip drivers:
    
       - Workaround a limitation in SiFive PLIC interrupt chip which
         silently ignores an EOI when the interrupt line is masked.
    
       - Provide the missing mask/unmask implementation for the CSKY MP
         interrupt controller.
    
      PCI/MSI:
    
       - Prevent a use after free when PCI/MSI interrupts are released by
         destroying the sysfs entries before freeing the memory which is
         accessed in the sysfs show() function.
    
       - Implement a mask quirk for the Nvidia ION AHCI chip which does not
         advertise masking capability despite implementing it. Even worse
         the chip comes out of reset with all MSI entries masked, which due
         to the missing masking capability never get unmasked.
    
       - Move the check which prevents accessing the MSI[X] masking for XEN
         back into the low level accessors. The recent consolidation missed
         that these accessors can be invoked from places which do not have
         that check which broke XEN. Move them back to he original place
         instead of sprinkling tons of these checks all over the code"
    
    * tag 'irq-urgent-2021-11-14' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
      of/irq: Don't ignore interrupt-controller when interrupt-map failed
      irqchip/sifive-plic: Fixup EOI failed when masked
      irqchip/csky-mpintc: Fixup mask/unmask implementation
      PCI/MSI: Destroy sysfs before freeing entries
      PCI: Add MSI masking quirk for Nvidia ION AHCI
      PCI/MSI: Deal with devices lying about their MSI mask capability
      PCI/MSI: Move non-mask check back into low level accessors
    torvalds committed Nov 14, 2021
  10. Merge tag 'locking-urgent-2021-11-14' of git://git.kernel.org/pub/scm…

    …/linux/kernel/git/tip/tip
    
    Pull x86 static call update from Thomas Gleixner:
     "A single fix for static calls to make the trampoline patching more
      robust by placing explicit signature bytes after the call trampoline
      to prevent patching random other jumps like the CFI jump table
      entries"
    
    * tag 'locking-urgent-2021-11-14' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
      static_call,x86: Robustify trampoline patching
    torvalds committed Nov 14, 2021
  11. Merge tag 'sched_urgent_for_v5.16_rc1' of git://git.kernel.org/pub/sc…

    …m/linux/kernel/git/tip/tip
    
    Pull scheduler fixes from Borislav Petkov:
    
     - Avoid touching ~100 config files in order to be able to select the
       preemption model
    
     - clear cluster CPU masks too, on the CPU unplug path
    
     - prevent use-after-free in cfs
    
     - Prevent a race condition when updating CPU cache domains
    
     - Factor out common shared part of smp_prepare_cpus() into a common
       helper which can be called by both baremetal and Xen, in order to fix
       a booting of Xen PV guests
    
    * tag 'sched_urgent_for_v5.16_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
      preempt: Restore preemption model selection configs
      arch_topology: Fix missing clear cluster_cpumask in remove_cpu_topology()
      sched/fair: Prevent dead task groups from regaining cfs_rq's
      sched/core: Mitigate race cpus_share_cache()/update_top_cache_domain()
      x86/smp: Factor out parts of native_smp_prepare_cpus()
    torvalds committed Nov 14, 2021
  12. Merge tag 'perf_urgent_for_v5.16_rc1' of git://git.kernel.org/pub/scm…

    …/linux/kernel/git/tip/tip
    
    Pull perf fixes from Borislav Petkov:
    
     - Prevent unintentional page sharing by checking whether a page
       reference to a PMU samples page has been acquired properly before
       that
    
     - Make sure the LBR_SELECT MSR is saved/restored too
    
     - Reset the LBR_SELECT MSR when resetting the LBR PMU to clear any
       residual data left
    
    * tag 'perf_urgent_for_v5.16_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
      perf/core: Avoid put_page() when GUP fails
      perf/x86/vlbr: Add c->flags to vlbr event constraints
      perf/x86/lbr: Reset LBR_SELECT during vlbr reset
    torvalds committed Nov 14, 2021
  13. Merge tag 'x86_urgent_for_v5.16_rc1' of git://git.kernel.org/pub/scm/…

    …linux/kernel/git/tip/tip
    
    Pull x86 fixes from Borislav Petkov:
    
     - Add the model number of a new, Raptor Lake CPU, to intel-family.h
    
     - Do not log spurious corrected MCEs on SKL too, due to an erratum
    
     - Clarify the path of paravirt ops patches upstream
    
     - Add an optimization to avoid writing out AMX components to sigframes
       when former are in init state
    
    * tag 'x86_urgent_for_v5.16_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
      x86/cpu: Add Raptor Lake to Intel family
      x86/mce: Add errata workaround for Skylake SKX37
      MAINTAINERS: Add some information to PARAVIRT_OPS entry
      x86/fpu: Optimize out sigframe xfeatures when in init state
    torvalds committed Nov 14, 2021
  14. Merge tag 'perf-tools-for-v5.16-2021-11-13' of git://git.kernel.org/p…

    …ub/scm/linux/kernel/git/acme/linux
    
    Pull more perf tools updates from Arnaldo Carvalho de Melo:
     "Hardware tracing:
    
       - ARM:
          * Print the size of the buffer size consistently in hexadecimal in
            ARM Coresight.
          * Add Coresight snapshot mode support.
          * Update --switch-events docs in 'perf record'.
          * Support hardware-based PID tracing.
          * Track task context switch for cpu-mode events.
    
       - Vendor events:
          * Add metric events JSON file for power10 platform
    
      perf test:
    
       - Get 'perf test' unit tests closer to kunit.
    
       - Topology tests improvements.
    
       - Remove bashisms from some tests.
    
      perf bench:
    
       - Fix memory leak of perf_cpu_map__new() in the futex benchmarks.
    
      libbpf:
    
       - Add some more weak libbpf functions o allow building with the
         libbpf versions, old ones, present in distros.
    
      libbeauty:
    
       - Translate [gs]setsockopt 'level' argument integer values to
         strings.
    
      tools headers UAPI:
    
       - Sync futex_waitv, arch prctl, sound, i195_drm and msr-index files
         with the kernel sources.
    
      Documentation:
    
       - Add documentation to 'struct symbol'.
    
       - Synchronize the definition of enum perf_hw_id with code in
         tools/perf/design.txt"
    
    * tag 'perf-tools-for-v5.16-2021-11-13' of git://git.kernel.org/pub/scm/linux/kernel/git/acme/linux: (67 commits)
      perf tests: Remove bash constructs from stat_all_pmu.sh
      perf tests: Remove bash construct from record+zstd_comp_decomp.sh
      perf test: Remove bash construct from stat_bpf_counters.sh test
      perf bench futex: Fix memory leak of perf_cpu_map__new()
      tools arch x86: Sync the msr-index.h copy with the kernel sources
      tools headers UAPI: Sync drm/i915_drm.h with the kernel sources
      tools headers UAPI: Sync sound/asound.h with the kernel sources
      tools headers UAPI: Sync linux/prctl.h with the kernel sources
      tools headers UAPI: Sync arch prctl headers with the kernel sources
      perf tools: Add more weak libbpf functions
      perf bpf: Avoid memory leak from perf_env__insert_btf()
      perf symbols: Factor out annotation init/exit
      perf symbols: Bit pack to save a byte
      perf symbols: Add documentation to 'struct symbol'
      tools headers UAPI: Sync files changed by new futex_waitv syscall
      perf test bpf: Use ARRAY_CHECK() instead of ad-hoc equivalent, addressing array_size.cocci warning
      perf arm-spe: Support hardware-based PID tracing
      perf arm-spe: Save context ID in record
      perf arm-spe: Update --switch-events docs in 'perf record'
      perf arm-spe: Track task context switch for cpu-mode events
      ...
    torvalds committed Nov 14, 2021
  15. Merge tag 'irqchip-fixes-5.16-1' of git://git.kernel.org/pub/scm/linu…

    …x/kernel/git/maz/arm-platforms into irq/urgent
    
    Pull irqchip fixes from Marc Zyngier:
    
      - Address an issue with the SiFive PLIC being unable to EOI
        a masked interrupt
    
      - Move the disable/enable methods in the CSky mpintc to
        mask/unmask
    
      - Fix a regression in the OF irq code where an interrupt-controller
        property in the same node as an interrupt-map property would get
        ignored
    
    Link: https://lore.kernel.org/all/20211112173459.4015233-1-maz@kernel.org
    Thomas Gleixner committed Nov 14, 2021

Commits on Nov 13, 2021

  1. Merge tag 'zstd-for-linus-v5.16' of git://github.com/terrelln/linux

    Pull zstd update from Nick Terrell:
     "Update to zstd-1.4.10.
    
      Add myself as the maintainer of zstd and update the zstd version in
      the kernel, which is now 4 years out of date, to a much more recent
      zstd release. This includes bug fixes, much more extensive fuzzing,
      and performance improvements. And generates the kernel zstd
      automatically from upstream zstd, so it is easier to keep the zstd
      verison up to date, and we don't fall so far out of date again.
    
      This includes 5 commits that update the zstd library version:
    
       - Adds a new kernel-style wrapper around zstd.
    
         This wrapper API is functionally equivalent to the subset of the
         current zstd API that is currently used. The wrapper API changes to
         be kernel style so that the symbols don't collide with zstd's
         symbols. The update to zstd-1.4.10 maintains the same API and
         preserves the semantics, so that none of the callers need to be
         updated. All callers are updated in the commit, because there are
         zero functional changes.
    
       - Adds an indirection for `lib/decompress_unzstd.c` so it doesn't
         depend on the layout of `lib/zstd/` to include every source file.
         This allows the next patch to be automatically generated.
    
       - Imports the zstd-1.4.10 source code. This commit is automatically
         generated from upstream zstd (https://github.com/facebook/zstd).
    
       - Adds me (terrelln@fb.com) as the maintainer of `lib/zstd`.
    
       - Fixes a newly added build warning for clang.
    
      The discussion around this patchset has been pretty long, so I've
      included a FAQ-style summary of the history of the patchset, and why
      we are taking this approach.
    
      Why do we need to update?
      -------------------------
    
      The zstd version in the kernel is based off of zstd-1.3.1, which is
      was released August 20, 2017. Since then zstd has seen many bug fixes
      and performance improvements. And, importantly, upstream zstd is
      continuously fuzzed by OSS-Fuzz, and bug fixes aren't backported to
      older versions. So the only way to sanely get these fixes is to keep
      up to date with upstream zstd.
    
      There are no known security issues that affect the kernel, but we need
      to be able to update in case there are. And while there are no known
      security issues, there are relevant bug fixes. For example the problem
      with large kernel decompression has been fixed upstream for over 2
      years [1]
    
      Additionally the performance improvements for kernel use cases are
      significant. Measured for x86_64 on my Intel i9-9900k @ 3.6 GHz:
    
       - BtrFS zstd compression at levels 1 and 3 is 5% faster
    
       - BtrFS zstd decompression+read is 15% faster
    
       - SquashFS zstd decompression+read is 15% faster
    
       - F2FS zstd compression+write at level 3 is 8% faster
    
       - F2FS zstd decompression+read is 20% faster
    
       - ZRAM decompression+read is 30% faster
    
       - Kernel zstd decompression is 35% faster
    
       - Initramfs zstd decompression+build is 5% faster
    
      On top of this, there are significant performance improvements coming
      down the line in the next zstd release, and the new automated update
      patch generation will allow us to pull them easily.
    
      How is the update patch generated?
      ----------------------------------
    
      The first two patches are preparation for updating the zstd version.
      Then the 3rd patch in the series imports upstream zstd into the
      kernel. This patch is automatically generated from upstream. A script
      makes the necessary changes and imports it into the kernel. The
      changes are:
    
       - Replace all libc dependencies with kernel replacements and rewrite
         includes.
    
       - Remove unncessary portability macros like: #if defined(_MSC_VER).
    
       - Use the kernel xxhash instead of bundling it.
    
      This automation gets tested every commit by upstream's continuous
      integration. When we cut a new zstd release, we will submit a patch to
      the kernel to update the zstd version in the kernel.
    
      The automated process makes it easy to keep the kernel version of zstd
      up to date. The current zstd in the kernel shares the guts of the
      code, but has a lot of API and minor changes to work in the kernel.
      This is because at the time upstream zstd was not ready to be used in
      the kernel envrionment as-is. But, since then upstream zstd has
      evolved to support being used in the kernel as-is.
    
      Why are we updating in one big patch?
      -------------------------------------
    
      The 3rd patch in the series is very large. This is because it is
      restructuring the code, so it both deletes the existing zstd, and
      re-adds the new structure. Future updates will be directly
      proportional to the changes in upstream zstd since the last import.
      They will admittidly be large, as zstd is an actively developed
      project, and has hundreds of commits between every release. However,
      there is no other great alternative.
    
      One option ruled out is to replay every upstream zstd commit. This is
      not feasible for several reasons:
    
       - There are over 3500 upstream commits since the zstd version in the
         kernel.
    
       - The automation to automatically generate the kernel update was only
         added recently, so older commits cannot easily be imported.
    
       - Not every upstream zstd commit builds.
    
       - Only zstd releases are "supported", and individual commits may have
         bugs that were fixed before a release.
    
      Another option to reduce the patch size would be to first reorganize
      to the new file structure, and then apply the patch. However, the
      current kernel zstd is formatted with clang-format to be more
      "kernel-like". But, the new method imports zstd as-is, without
      additional formatting, to allow for closer correlation with upstream,
      and easier debugging. So the patch wouldn't be any smaller.
    
      It also doesn't make sense to import upstream zstd commit by commit
      going forward. Upstream zstd doesn't support production use cases
      running of the development branch. We have a lot of post-commit
      fuzzing that catches many bugs, so indiviudal commits may be buggy,
      but fixed before a release. So going forward, I intend to import every
      (important) zstd release into the Kernel.
    
      So, while it isn't ideal, updating in one big patch is the only patch
      I see forward.
    
      Who is responsible for this code?
      ---------------------------------
    
      I am. This patchset adds me as the maintainer for zstd. Previously,
      there was no tree for zstd patches. Because of that, there were
      several patches that either got ignored, or took a long time to merge,
      since it wasn't clear which tree should pick them up. I'm officially
      stepping up as maintainer, and setting up my tree as the path through
      which zstd patches get merged. I'll make sure that patches to the
      kernel zstd get ported upstream, so they aren't erased when the next
      version update happens.
    
      How is this code tested?
      ------------------------
    
      I tested every caller of zstd on x86_64 (BtrFS, ZRAM, SquashFS, F2FS,
      Kernel, InitRAMFS). I also tested Kernel & InitRAMFS on i386 and
      aarch64. I checked both performance and correctness.
    
      Also, thanks to many people in the community who have tested these
      patches locally.
    
      Lastly, this code will bake in linux-next before being merged into
      v5.16.
    
      Why update to zstd-1.4.10 when zstd-1.5.0 has been released?
      ------------------------------------------------------------
    
      This patchset has been outstanding since 2020, and zstd-1.4.10 was the
      latest release when it was created. Since the update patch is
      automatically generated from upstream, I could generate it from
      zstd-1.5.0.
    
      However, there were some large stack usage regressions in zstd-1.5.0,
      and are only fixed in the latest development branch. And the latest
      development branch contains some new code that needs to bake in the
      fuzzer before I would feel comfortable releasing to the kernel.
    
      Once this patchset has been merged, and we've released zstd-1.5.1, we
      can update the kernel to zstd-1.5.1, and exercise the update process.
    
      You may notice that zstd-1.4.10 doesn't exist upstream. This release
      is an artifical release based off of zstd-1.4.9, with some fixes for
      the kernel backported from the development branch. I will tag the
      zstd-1.4.10 release after this patchset is merged, so the Linux Kernel
      is running a known version of zstd that can be debugged upstream.
    
      Why was a wrapper API added?
      ----------------------------
    
      The first versions of this patchset migrated the kernel to the
      upstream zstd API. It first added a shim API that supported the new
      upstream API with the old code, then updated callers to use the new
      shim API, then transitioned to the new code and deleted the shim API.
      However, Cristoph Hellwig suggested that we transition to a kernel
      style API, and hide zstd's upstream API behind that. This is because
      zstd's upstream API is supports many other use cases, and does not
      follow the kernel style guide, while the kernel API is focused on the
      kernel's use cases, and follows the kernel style guide.
    
      Where is the previous discussion?
      ---------------------------------
    
      Links for the discussions of the previous versions of the patch set
      below. The largest changes in the design of the patchset are driven by
      the discussions in v11, v5, and v1. Sorry for the mix of links, I
      couldn't find most of the the threads on lkml.org"
    
    Link: https://lkml.org/lkml/2020/9/29/27 [1]
    Link: https://www.spinics.net/lists/linux-crypto/msg58189.html [v12]
    Link: https://lore.kernel.org/linux-btrfs/20210430013157.747152-1-nickrterrell@gmail.com/ [v11]
    Link: https://lore.kernel.org/lkml/20210426234621.870684-2-nickrterrell@gmail.com/ [v10]
    Link: https://lore.kernel.org/linux-btrfs/20210330225112.496213-1-nickrterrell@gmail.com/ [v9]
    Link: https://lore.kernel.org/linux-f2fs-devel/20210326191859.1542272-1-nickrterrell@gmail.com/ [v8]
    Link: https://lkml.org/lkml/2020/12/3/1195 [v7]
    Link: https://lkml.org/lkml/2020/12/2/1245 [v6]
    Link: https://lore.kernel.org/linux-btrfs/20200916034307.2092020-1-nickrterrell@gmail.com/ [v5]
    Link: https://www.spinics.net/lists/linux-btrfs/msg105783.html [v4]
    Link: https://lkml.org/lkml/2020/9/23/1074 [v3]
    Link: https://www.spinics.net/lists/linux-btrfs/msg105505.html [v2]
    Link: https://lore.kernel.org/linux-btrfs/20200916034307.2092020-1-nickrterrell@gmail.com/ [v1]
    Signed-off-by: Nick Terrell <terrelln@fb.com>
    Tested By: Paul Jones <paul@pauljones.id.au>
    Tested-by: Oleksandr Natalenko <oleksandr@natalenko.name>
    Tested-by: Sedat Dilek <sedat.dilek@gmail.com> # LLVM/Clang v13.0.0 on x86-64
    Tested-by: Jean-Denis Girard <jd.girard@sysnux.pf>
    
    * tag 'zstd-for-linus-v5.16' of git://github.com/terrelln/linux:
      lib: zstd: Add cast to silence clang's -Wbitwise-instead-of-logical
      MAINTAINERS: Add maintainer entry for zstd
      lib: zstd: Upgrade to latest upstream zstd version 1.4.10
      lib: zstd: Add decompress_sources.h for decompress_unzstd
      lib: zstd: Add kernel-specific API
    torvalds committed Nov 13, 2021
  2. Merge tag 'virtio-mem-for-5.16' of git://github.com/davidhildenbrand/…

    …linux
    
    Pull virtio-mem update from David Hildenbrand:
     "Support the VIRTIO_MEM_F_UNPLUGGED_INACCESSIBLE feature in virtio-mem,
      now that "accidential" access to logically unplugged memory inside
      added Linux memory blocks is no longer possible, because we:
    
       - Removed /dev/kmem in commit bbcd53c ("drivers/char: remove
         /dev/kmem for good")
    
       - Disallowed access to virtio-mem device memory via /dev/mem in
         commit 2128f4e ("virtio-mem: disallow mapping virtio-mem memory
         via /dev/mem")
    
       - Sanitized access to virtio-mem device memory via /proc/kcore in
         commit 0daa322 ("fs/proc/kcore: don't read offline sections,
         logically offline pages and hwpoisoned pages")
    
       - Sanitized access to virtio-mem device memory via /proc/vmcore in
         commit ce28146 ("virtio-mem: kdump mode to sanitize
         /proc/vmcore access")
    
      The new VIRTIO_MEM_F_UNPLUGGED_INACCESSIBLE feature that will be
      required by some hypervisors implementing virtio-mem in the near
      future, so let's support it now that we safely can"
    
    * tag 'virtio-mem-for-5.16' of git://github.com/davidhildenbrand/linux:
      virtio-mem: support VIRTIO_MEM_F_UNPLUGGED_INACCESSIBLE
    torvalds committed Nov 13, 2021
Older