Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp6085520imu; Wed, 30 Jan 2019 08:33:26 -0800 (PST) X-Google-Smtp-Source: ALg8bN47qPesE9qtM2ojko5Ipzjj6qo74aD2oA3dLhKkDJR2QEFTQVq9wsC2ynKkJQZdcrsLEEKS X-Received: by 2002:a62:cec6:: with SMTP id y189mr32372268pfg.100.1548866006523; Wed, 30 Jan 2019 08:33:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548866006; cv=none; d=google.com; s=arc-20160816; b=UzRHv13LAzQaY+y0ERT0Npl9Z6rDAidc/RPxuVPABT42Kyu4g+9L+KXo3IEG0aTHGW l9D2M22ZITGcZ7gctNKMYItGmpWiTFqCqPU4/wy/oLUhfhMKj2+n8FLdogv4NuvNk0SD qDUr+tObKgwZAt6H5pg9i6MMeeMt0vkBmsIn6IEqlbk29qvRO1SAU/pJkeeXjnR67e+w SpnDNFwqaWaMorE2X8M0YjcZ4UzPin7MG0f8GEyrO3498uFGn+UnxbrlXIZZy7jsIpnf 26SLWgrmLzDKrLOoZd/yUFy/djkAmrYRwbFwTOAhqYKgizgAnz1pLD4J5wSGaNVDA6+a xdIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature; bh=WkCd1dz6kvP39FyR3BDp1gR/Hdb1zn2Z7GsYUFxbMaE=; b=xBUaXjKzMWAxIOp3ruetDTP35Ge9WlR5i7dviZr9Z5B7WraF6T9SDZp+Z1saIo5iDf 5sAi9veyIRFu4RM1wHQ/YHEMEKLNPTFLqP20Mwrcnzl0eLQMOswu9YNmPF+78YEAo7MC galnrk0oE9upc397YC6mFMs+VP2drxr9hLyKpM+3Bmz/MAqxVlX8AtQTU4BMtjvW+pyH FpekQUqCcnXruU4x6BGxzYjA3w5IA+gDRJp5WEPjZcC62USBuAeVUK+fZovyOJfZSUcz NGbsCoXJz74ph7aoHuOJir3yWb0/We+GGuaY72tF/+4oSv6u9UnCFk7opUHUZ9KoMfWk rXUQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@synopsys.com header.s=mail header.b=D1abGlM5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=synopsys.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k11si1768853pgg.430.2019.01.30.08.33.11; Wed, 30 Jan 2019 08:33:26 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@synopsys.com header.s=mail header.b=D1abGlM5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=synopsys.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732073AbfA3Qct (ORCPT + 99 others); Wed, 30 Jan 2019 11:32:49 -0500 Received: from smtprelay2.synopsys.com ([198.182.60.111]:55864 "EHLO smtprelay.synopsys.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731857AbfA3Qcs (ORCPT ); Wed, 30 Jan 2019 11:32:48 -0500 Received: from mailhost.synopsys.com (dc2-mailhost1.synopsys.com [10.12.135.161]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtprelay.synopsys.com (Postfix) with ESMTPS id 3661C10C1BA5; Wed, 30 Jan 2019 08:32:48 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=synopsys.com; s=mail; t=1548865968; bh=V2gRfCZnxmm+k81VFJn/B8RzUM52Kcq6e8esGa6OhfM=; h=From:To:Cc:Subject:Date:From; b=D1abGlM5LEiYHF5ETcYJ0KTzSCOflkLNuXWyd/w9Ik6hpgEwsFiFpoHNwIpwN96TT 9kjE6PBt0Wo5e8c6QmLyHBFHCQYqds/mGCBSIRDaOhBY7W38qUTabOG/BIktaDUzbI KS7Wa6POf6g+gvlWjXReLHG30mhrevPXszUCR5ZT7BlUpZHnvgPpPpNKUXPOJc6NiW 3wBPnCt1VUNXrGQXUPiWhEEboKQjiuEzE5FI5ISBTbim6gEHKmZ6WCCCP7qK/EG1np 6nSxK4kQo5uT6QJX3BaJqfTtvipXrq51WTVPROL9zOj2I1NT6gLUDKOpNJKhIFMDeB XJPm/DIsJbKyQ== Received: from paltsev-e7480.internal.synopsys.com (unknown [10.121.8.46]) by mailhost.synopsys.com (Postfix) with ESMTP id C8422A008B; Wed, 30 Jan 2019 16:32:46 +0000 (UTC) From: Eugeniy Paltsev To: linux-snps-arc@lists.infradead.org, Vineet Gupta Cc: linux-kernel@vger.kernel.org, Alexey Brodkin , Eugeniy Paltsev Subject: [PATCH v2 0/5] introduce unaligned access under a Kconfig option Date: Wed, 30 Jan 2019 19:32:39 +0300 Message-Id: <20190130163244.10870-1-Eugeniy.Paltsev@synopsys.com> X-Mailer: git-send-email 2.14.5 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org As of today we enable unaligned access unconditionally on ARCv2. Lets move it under Kconfig option and use it actively in SW if it is enabled. While I'm at it fix and optimise ARCv2 memcpy implementaion. Changes v1->v2: * Rebase onto last ARC changes. * Don't add dummy symbol to ARC Kconfig * Print info about unaligned access status in kernel log Eugeniy Paltsev (5): ARCv2: lib: memcpy: fix doing prefetchw outside of buffer ARCv2: introduce unaligned access under a Kconfig option ARCv2: use unaligned access in SW ARCv2: LIB: MEMCPY: fixed and optimised routine ARC: boot log: print unaligned memory access details arch/arc/Kconfig | 9 +++++++ arch/arc/Makefile | 6 +++++ arch/arc/include/asm/irqflags-arcv2.h | 4 +++ arch/arc/kernel/head.S | 14 +++++++---- arch/arc/kernel/intc-arcv2.c | 2 +- arch/arc/kernel/setup.c | 13 +++++++--- arch/arc/lib/Makefile | 8 +++++- arch/arc/lib/memcpy-archs-unaligned.S | 46 +++++++++++++++++++++++++++++++++++ arch/arc/lib/memcpy-archs.S | 14 ----------- 9 files changed, 92 insertions(+), 24 deletions(-) create mode 100644 arch/arc/lib/memcpy-archs-unaligned.S -- 2.14.5