From nobody Wed Dec 24 18:01:34 2025 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CF69012A175; Wed, 24 Jan 2024 18:12:47 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706119967; cv=none; b=KPNPhLapeH/JdvslfcFUzpKuG1H4qBZSZl2JX6qr17mHh+/YpprKuEutbQxwJ4i6RF52rx9UnH65Hwt4NQcsh4XxwAGhbEJhS0ElVrpIhVhlG8olQwgloHVcy0NkIlIlmB6zVFmBTGeYPMazQEaErbJfCzUW0T91XRx2/8JEoCs= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706119967; c=relaxed/simple; bh=KDY509WkoApN5+z/RyjZkULoN7R+WASGjlTC5t9MtKk=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=SldFxK3aaF7tpaoltJNMx80JJNypGBEJsifBZiTLZKUzn+dbUxHD8p5ft4kjFSibd1WJoK0tBFYd4/qF31rUnioaWm5ADU6gtMo60nnVyl1saDm5xYESWgCZZ2yVZ7CMwyZQfvX+SKclhm7WZ3ixjoYH3qu0ug3wHBJWg/blPgk= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=P0VTmBJY; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="P0VTmBJY" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8F572C43394; Wed, 24 Jan 2024 18:12:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1706119967; bh=KDY509WkoApN5+z/RyjZkULoN7R+WASGjlTC5t9MtKk=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=P0VTmBJYxVMvv6CB8TA/HaVVpnLazvfoQIO697Q4uJSOo7Dg3hTcn91J+OixF1ASR hbVPRNMPuLpA4gC/Y+/RXlehw3eqEd8HrdBb3/03IIZVLo8F3jdsTCNVwG4bAciVFd F/06JVle+J1ju+JdvdYo54cGQ9PFaosU+CUuKZUQE8AkeeH72AVeFwlBolm8zoAetl bv9Aj3DUP5L1RetvfILfpS68v/W5matoazWFV3e4NWgQMlf7wRsX1f+UkNtqLqAB8U apgI/kBvrf9P5ErXGQysG14TCOPk39SmHvvjuVKwvy5oeDX1txMj3bQIzH6pSm3sAP Zt1JYHyTe1PnQ== From: Mark Brown Date: Wed, 24 Jan 2024 18:12:35 +0000 Subject: [PATCH v2 1/4] arm64/sve: Remove bitrotted comment about syscall behaviour Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20240124-arm64-sve-sme-doc-v2-1-fe3964fb3c19@kernel.org> References: <20240124-arm64-sve-sme-doc-v2-0-fe3964fb3c19@kernel.org> In-Reply-To: <20240124-arm64-sve-sme-doc-v2-0-fe3964fb3c19@kernel.org> To: Catalin Marinas , Will Deacon , Jonathan Corbet Cc: Dave Martin , linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, Mark Brown , Edmund Grimley-Evans X-Mailer: b4 0.13-dev-a684c X-Developer-Signature: v=1; a=openpgp-sha256; l=1290; i=broonie@kernel.org; h=from:subject:message-id; bh=KDY509WkoApN5+z/RyjZkULoN7R+WASGjlTC5t9MtKk=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBlsVMYpqkQjc6VNKfuZEYrSrZAMU6J3CcxlySvGDnw LM1Y+neJATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCZbFTGAAKCRAk1otyXVSH0O0xB/ sHaiosBRNM9PRQ6qCgCrhkGx4jai+8aN/V9HnQhDoimnQECFzrDb1N9gNzouahQUi6CFvWI5yzCFwb 6Jz7jEYghYHrxTNvuGjWDRZ7TQxArBujtdwLWsMlkNWdvgdtTDo4ZqtHKXt9mImEHFpJxvJkz9B386 Ovh90rpYE4oWw4N5h0UJYK4aTJrR3E+kOT+YDyMIPwSL8YKIjqyqgmLvpLaRyzRCFRWzBAYUWWK71x OCitOlwB1hXnxZuPi0ebUVsrC+Fysq1upE522w83j76AyUwAYeWKWPZ1DOLWxoQHlkSMEzgmB9wHpJ U/pwfP57f3UrMCjv6cYMdM1uYqHnIT X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB When we documented that we always clear state not shared with FPSIMD we didn't catch all of the places that mentioned that state might not be cleared, remove a lingering reference. Reported-by: Edmund Grimley-Evans Reviewed-by: Dave Martin Signed-off-by: Mark Brown --- Documentation/arch/arm64/sve.rst | 5 ----- 1 file changed, 5 deletions(-) diff --git a/Documentation/arch/arm64/sve.rst b/Documentation/arch/arm64/sv= e.rst index 0d9a426e9f85..b45a2da19bf1 100644 --- a/Documentation/arch/arm64/sve.rst +++ b/Documentation/arch/arm64/sve.rst @@ -117,11 +117,6 @@ the SVE instruction set architecture. * The SVE registers are not used to pass arguments to or receive results f= rom any syscall. =20 -* In practice the affected registers/bits will be preserved or will be rep= laced - with zeros on return from a syscall, but userspace should not make - assumptions about this. The kernel behaviour may vary on a case-by-case - basis. - * All other SVE state of a thread, including the currently configured vect= or length, the state of the PR_SVE_VL_INHERIT flag, and the deferred vector length (if any), is preserved across all syscalls, subject to the specif= ic --=20 2.30.2 From nobody Wed Dec 24 18:01:34 2025 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0C5EA12AAE3; Wed, 24 Jan 2024 18:12:49 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706119970; cv=none; b=FzPTkIvpLnqurRfYKq91yKs2ZfPVeuVFe7yvm21wiGmprVUnxOEHzxvNOzjXSXOEK/T3gCYr1PfmUrqD7Q2orRK7RRvTeq4HyabIQc8jryMnq0qBnaVS8n838kXReBX5VOUiZKvTEnbvrzf+7zw0H5C6SncqthwI4vWIhbHyyfc= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706119970; c=relaxed/simple; bh=2LI5A66NtYYs0c3+CFqA3f6NBGFtQt1rRRkpBo53+tY=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=FX2+Oy8VRaRryFxuFWpqXbc7HQeohbFIHN6INa/p42LogOX8zaN0tyfOEGG2GgEPbyGNNS7u7iXzGkMg6mpugynaeyW7mxHdVrDSybQ4Yop7J2hQ5ST6zclzMCIVb3Jg89Y02crYIrwWHJHLPp+zv0Td1NJPlXHPAT6TVvMj734= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=FgHeIsLd; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="FgHeIsLd" Received: by smtp.kernel.org (Postfix) with ESMTPSA id C6DABC433C7; Wed, 24 Jan 2024 18:12:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1706119969; bh=2LI5A66NtYYs0c3+CFqA3f6NBGFtQt1rRRkpBo53+tY=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=FgHeIsLdtoDa7SSwCq2mpMN6G3JoUpfhaqvMUcGO1+wvPmt1WhcHDyE2WMFk01aF8 MJRF8n/oBlGNG7YuqAkuuEaXrrSD0xkGwSh4GNgw7u+vn2mYiDcKbdVAxsP8iKrAZj /bVa3aCtz2msMxffaGD006592+g5mAn/JJM0fM7yuqQ2bv7O/80n1aQZLBe8hYVaoS V8/twOMVKnmgr76C76whyLAeK0f7PiCprkRyOcX5p9iunRL+cW6qTXUJ2zLcZwr1Gq VVtQilq7jCmTmCuwsQJQPcC+YCkM0gUkmaikbhk7z1flnibTxz8zlIUeHRSatLQzIs NBf4jDNo/rubA== From: Mark Brown Date: Wed, 24 Jan 2024 18:12:36 +0000 Subject: [PATCH v2 2/4] arm64/sme: Fix cut'n'paste in ABI document Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20240124-arm64-sve-sme-doc-v2-2-fe3964fb3c19@kernel.org> References: <20240124-arm64-sve-sme-doc-v2-0-fe3964fb3c19@kernel.org> In-Reply-To: <20240124-arm64-sve-sme-doc-v2-0-fe3964fb3c19@kernel.org> To: Catalin Marinas , Will Deacon , Jonathan Corbet Cc: Dave Martin , linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, Mark Brown , Edmund Grimley-Evans X-Mailer: b4 0.13-dev-a684c X-Developer-Signature: v=1; a=openpgp-sha256; l=1479; i=broonie@kernel.org; h=from:subject:message-id; bh=2LI5A66NtYYs0c3+CFqA3f6NBGFtQt1rRRkpBo53+tY=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBlsVMYklGisR2HSaKlrxEpAGCLKSYUF3aDgX2/vxZB gOIHR4KJATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCZbFTGAAKCRAk1otyXVSH0PaMB/ 4ubQz4xobPi4XlnA531QckFklF11ys4y3qltDpU8ElUI8IURI3RwAC6LRduWVvowvYNlPFJ9fwHsZU T9DLL13MKrb4vxQUcpjrjrSbrDUUf7Q5+tLHMO+lh14iF3y+GqFGqiBXPUFpj1mgGEkPmdvY+Q3wJR 9Gfcx1YIrO39SRrJ7LHxFhaoAge3ysDjKE9kt3rIfXZm73heuir/+fot8uIITq0KKIduxjmG5NbZ7k bbdb8O/mmOpJJ/pmLzh+gJ75Sm+Yz1VL+CP9rlq1oYYTWGTgdFketihTPXMpdzltvnwrpSdoNgvJj0 /7akL5qvBriciMAlIQrw9MuPr/+3PT X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB The ABI for SME is very like that for SVE so bits of the ABI were copied but not adequately search and replaced, fix that. Reported-by: Edmund Grimley-Evans Signed-off-by: Mark Brown Reviewed-by: Dave Martin --- Documentation/arch/arm64/sme.rst | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/Documentation/arch/arm64/sme.rst b/Documentation/arch/arm64/sm= e.rst index 3d0e53ecac4f..3133d0e91b48 100644 --- a/Documentation/arch/arm64/sme.rst +++ b/Documentation/arch/arm64/sme.rst @@ -238,12 +238,12 @@ prctl(PR_SME_SET_VL, unsigned long arg) bits of Z0..Z31 except for Z0 bits [127:0] .. Z31 bits [127:0] to be= come unspecified, including both streaming and non-streaming SVE state. Calling PR_SME_SET_VL with vl equal to the thread's current vector - length, or calling PR_SME_SET_VL with the PR_SVE_SET_VL_ONEXEC flag, + length, or calling PR_SME_SET_VL with the PR_SME_SET_VL_ONEXEC flag, does not constitute a change to the vector length for this purpose. =20 * Changing the vector length causes PSTATE.ZA and PSTATE.SM to be clea= red. Calling PR_SME_SET_VL with vl equal to the thread's current vector - length, or calling PR_SME_SET_VL with the PR_SVE_SET_VL_ONEXEC flag, + length, or calling PR_SME_SET_VL with the PR_SME_SET_VL_ONEXEC flag, does not constitute a change to the vector length for this purpose. =20 =20 --=20 2.30.2 From nobody Wed Dec 24 18:01:34 2025 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3886E12BEA2; Wed, 24 Jan 2024 18:12:51 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706119972; cv=none; b=W6/2XUUuYk2U0gs8FAd7IqzjQcbHMc44tAoxK036+269CQ06HLdn1/u/+Y4PTreDPiayNjlmpB//xGq/tyXRFvd7OXpztXPGNsbWEnNa0W0pspJZpfMIB31H69vsg7aB0YwsdUmFfMdJVZ7SYYYZZHLtbJ7VSo0YejSD1jv0gQ4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706119972; c=relaxed/simple; bh=SZE/NEKa8x7WLFeaaJG3HC5W7JWmr0VNMdNibq7Cpz8=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=B0Nw8Nw6x/+KyYS5kAoS0uAJMumc92aWLoiXrWMM1uLJP7PvKWGW7t/MzJyoD4LM0CEO7F10bLjbinIqUF9bY3PqbHfoPI4MfsXTIorBFxyoUJq9EwwfGuOO4GxGJJmmHL0n+P64aztsD2iwx1/e6L/rgW34/DYwQVI/muVijQk= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=DhzBkrtP; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="DhzBkrtP" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 02A04C43390; Wed, 24 Jan 2024 18:12:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1706119971; bh=SZE/NEKa8x7WLFeaaJG3HC5W7JWmr0VNMdNibq7Cpz8=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=DhzBkrtPs6ZKDJAaSiEMKQASXyB3DKkTRbivSAWpMlE8hGwlWMonvwe+sLGYqZxZU rTt8F2caoXVnvtMiz8G2SQywSfF+WWN95zBQPcAWxgGxjBoUdAEARBG/2kkii1Ho1X cEhU/gmzwuG3nSPC75OHgZImBN4LPC941Gr69TjyA39vNH+RKwEEIgQztrMGfKKWA9 G9wfX85Zlgm69KeBPBeDtv+FcqsMWmfkzWfXzH3ag6wRseFZbeAnO82+Rs+PcJNdS+ tpUtToxWNiN04PfUlfRqDZJeEoBL1RZ38I5Zn4/U0It6JUnhItM9GAy56TzFgk/jPZ /M4X8O3dLtbiQ== From: Mark Brown Date: Wed, 24 Jan 2024 18:12:37 +0000 Subject: [PATCH v2 3/4] arm64/fp: Clarify effect of setting an unsupported system VL Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20240124-arm64-sve-sme-doc-v2-3-fe3964fb3c19@kernel.org> References: <20240124-arm64-sve-sme-doc-v2-0-fe3964fb3c19@kernel.org> In-Reply-To: <20240124-arm64-sve-sme-doc-v2-0-fe3964fb3c19@kernel.org> To: Catalin Marinas , Will Deacon , Jonathan Corbet Cc: Dave Martin , linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, Mark Brown , Edmund Grimley-Evans X-Mailer: b4 0.13-dev-a684c X-Developer-Signature: v=1; a=openpgp-sha256; l=2159; i=broonie@kernel.org; h=from:subject:message-id; bh=SZE/NEKa8x7WLFeaaJG3HC5W7JWmr0VNMdNibq7Cpz8=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBlsVMZuoJ837tq8yyiOk6QDDv0LqvP8sPwfC9POuaW cRNacMuJATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCZbFTGQAKCRAk1otyXVSH0IbeB/ 9uVCyeNQpECVM396Hnf/CcRMD/pftd849z37RwVfAGu2PVR32XoC7Xc5HL6+pAPSC1WzROF48vajD4 +SkqG6ViZPiC0StIEtsCiYUOcX1sgsld2OgweiWJkUERIm2n/8GlU5azPGxHEzO0TGsJZ46kyXSGU8 PMdNrMC4c9GE8py4j0yPwhckaFDnS1Ne5jq40+eLOuGuHxj201TcPX5FCyZwI9Y/rk8qOvE6hqAObq av1K7DAUNHaeRuOY8UL3iwuyBD/a/eTP9nhBs0yk1meLjenQ3gXh2jfBXCbe1Znz3PiOBLnjbXE8X6 QXbdSV9M392527bpXFNRh0v3E9o5BL X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB The documentation for system vector length configuration does not cover all cases where unsupported values are written, tighten it up. Reported-by: Edmund Grimley-Evans Signed-off-by: Mark Brown Reviewed-by: Dave Martin --- Documentation/arch/arm64/sme.rst | 5 ++--- Documentation/arch/arm64/sve.rst | 5 ++--- 2 files changed, 4 insertions(+), 6 deletions(-) diff --git a/Documentation/arch/arm64/sme.rst b/Documentation/arch/arm64/sm= e.rst index 3133d0e91b48..f4376c06f447 100644 --- a/Documentation/arch/arm64/sme.rst +++ b/Documentation/arch/arm64/sme.rst @@ -379,9 +379,8 @@ The regset data starts with struct user_za_header, cont= aining: /proc/sys/abi/sme_default_vector_length =20 Writing the text representation of an integer to this file sets the sy= stem - default vector length to the specified value, unless the value is grea= ter - than the maximum vector length supported by the system in which case t= he - default vector length is set to that maximum. + default vector length to the specified value rounded to a supported va= lue + using the same rules as for setting vector length via PR_SME_SET_VL. =20 The result can be determined by reopening the file and reading its contents. diff --git a/Documentation/arch/arm64/sve.rst b/Documentation/arch/arm64/sv= e.rst index b45a2da19bf1..8d8837fc39ec 100644 --- a/Documentation/arch/arm64/sve.rst +++ b/Documentation/arch/arm64/sve.rst @@ -423,9 +423,8 @@ The regset data starts with struct user_sve_header, con= taining: /proc/sys/abi/sve_default_vector_length =20 Writing the text representation of an integer to this file sets the sy= stem - default vector length to the specified value, unless the value is grea= ter - than the maximum vector length supported by the system in which case t= he - default vector length is set to that maximum. + default vector length to the specified value rounded to a supported va= lue + using the same rules as for setting vector length via PR_SVE_SET_VL. =20 The result can be determined by reopening the file and reading its contents. --=20 2.30.2 From nobody Wed Dec 24 18:01:34 2025 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6B60A12A144; Wed, 24 Jan 2024 18:12:54 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706119974; cv=none; b=WVvsNOSB+s+bQbvGTLQEoJ130rydLdhixU3BTbMkhIIDiMZEl4orLgP7C5O0xCaDPXwIvhqmMeGDoiXYYQtSEbEbuXMWZ4F+Dwzg8jU2x37fhSf0FsbM2Q4u0rinxCuOZE38AeWquvfQcQx0Nki9F1ewVssJo2S6Nt8bH/hdFh4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706119974; c=relaxed/simple; bh=LreoHv/YiNY4KXZSn6k3Z9OgPKJ9pxNDRUBhp7vgJ5U=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=VxCYkQhzwwdrJnQvUDAkaNkB7A3KpXm3VVrDa3W4gCUgv2Xtceqy0DXss2LzCRGN+RIGZDsF628OpJf39DCEEbwPdJZHLSUM4hDTtBwfJsrlr/l7WVn9FIPrpm4bcdGd3WuS8otoLW3eM/Lb/bdPFiG3elkspqkml5rNhJd0zbk= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=ZMj4mlky; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="ZMj4mlky" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 335BDC433F1; Wed, 24 Jan 2024 18:12:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1706119973; bh=LreoHv/YiNY4KXZSn6k3Z9OgPKJ9pxNDRUBhp7vgJ5U=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=ZMj4mlkyCgYWGSurSzFvLUXXVk9PUmjShji+B3N3/vTN8TAc3vIr7ZCXT45uq281b lVwkSa48Jl49/rSLFgOZ/dR2WTGGtyjuP8aSghgrRsRz0MHc7DS7D96THB2a3cjCmz XB6uOeoWxdCJV0kPS2WJ+mq2//SUv652iNlsJhvUODGOXf3wwENq2XNRWLGEdwFoxf dz3i9oGAipHuKSr1f3EQgeuOqKDSU4p1ImUSNE0WEzueCveH1qPvguWOiGiHatsPvj otOpTa66T+WnvmpGZtZi3SiqL2ziAqxqQCmNs5kD7Bkv/fgaIxvYoscEVX6Qw3qhev nP2wkLKyWUX4w== From: Mark Brown Date: Wed, 24 Jan 2024 18:12:38 +0000 Subject: [PATCH v2 4/4] arm64/sme: Remove spurious 'is' in SME documentation Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20240124-arm64-sve-sme-doc-v2-4-fe3964fb3c19@kernel.org> References: <20240124-arm64-sve-sme-doc-v2-0-fe3964fb3c19@kernel.org> In-Reply-To: <20240124-arm64-sve-sme-doc-v2-0-fe3964fb3c19@kernel.org> To: Catalin Marinas , Will Deacon , Jonathan Corbet Cc: Dave Martin , linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, Mark Brown , Edmund Grimley-Evans X-Mailer: b4 0.13-dev-a684c X-Developer-Signature: v=1; a=openpgp-sha256; l=952; i=broonie@kernel.org; h=from:subject:message-id; bh=LreoHv/YiNY4KXZSn6k3Z9OgPKJ9pxNDRUBhp7vgJ5U=; b=owGbwMvMwMWocq27KDak/QLjabUkhtSNwVIBwVoGmeKzXyvOq2WRvssQJuAacPW50iTdgOKMj6/9 eII6GY1ZGBi5GGTFFFnWPstYlR4usXX+o/mvYAaxMoFMYeDiFICJRP5n/59XY8vp5hfbmnjTNsV/yr K1yyvF5bub5kcVzHkcYaIkrr7uj4165KyGhr+m2b/MN38t8w6LypyctON12uOGyb48ZRXF6dEbu47f 42lUZF4/Z87mxGrbRZ76fsEqO9mavh/p6GGU5UixSmRcxtvVEXiSofjHDN7ug0wn24qiZ8nud91suG vqHr3i7w+nLlSz+6q/OFEpRnbjwixT+YXr/i5UD9tQHrDa7fheVu1TTZEiBTKiZzOVMr8+Fu2RZfJu W2/88satvAPXTH5fNnXM2tX3Lyv14hlhjhumOVetirlra85+/q+6rsL0zP6mNLnbCSEPo+uMjncq6I Y+MfZs3FaayX40ZPKuUJNk4yUA X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB Just a typographical error. Reported-by: Edmund Grimley-Evans Reviewed-by: Dave Martin Signed-off-by: Mark Brown --- Documentation/arch/arm64/sme.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Documentation/arch/arm64/sme.rst b/Documentation/arch/arm64/sm= e.rst index f4376c06f447..be317d457417 100644 --- a/Documentation/arch/arm64/sme.rst +++ b/Documentation/arch/arm64/sme.rst @@ -75,7 +75,7 @@ model features for SME is included in Appendix A. 2. Vector lengths ------------------ =20 -SME defines a second vector length similar to the SVE vector length which = is +SME defines a second vector length similar to the SVE vector length which controls the size of the streaming mode SVE vectors and the ZA matrix arra= y. The ZA matrix is square with each side having as many bytes as a streaming mode SVE vector. --=20 2.30.2