Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp7148384ybi; Mon, 8 Jul 2019 15:36:54 -0700 (PDT) X-Google-Smtp-Source: APXvYqwI4w8bUwWSAdJQuowIQbzl9JovUPkecxzsvoBReXJL/T7BVPgMgEImSjJu4la8YvUVTHR3 X-Received: by 2002:a65:56c1:: with SMTP id w1mr22032032pgs.395.1562625414543; Mon, 08 Jul 2019 15:36:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562625414; cv=none; d=google.com; s=arc-20160816; b=JOeFzOmyQ6QxG/R55kXhoSUaTFM50do9XI1zKMd9mikh/pgH1Ozd08lACOOtzQtnVd LHUtApC1/mQsj3TihvVthDGEZuhCEzSfjvCyRl2stdV7vBUkyKsMYKuo9WHNbZmO71HB GwmPTz+mxLVMCo3SFUYl8glx52Ju/62zNpgiDMtyvEhAIfTkiMGEAcYbsTYbM4gPXpST 19xqJUwmwtHFX5qdH764q/YxmMSfdaxvlLEwENgaOhJn6hvboWvnpWdia3yxwCOq7LVQ S+oLUtOKBKW7nG5jTzYfMnYTOoIG4JblcI0cFxuY9MPw43g0s/DbVNk1eajEGKlOXKph VVWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=5FS1EznOxHWg4fe9KUMJXbJtt2v8xLSCxsY/eELEnfM=; b=cV/TJ5sAtdIYb21UxUoOd+gOD8T1KAOKNA+cSvJD3H05nu2OvVfIgCixOrfvSM6Xax 0zdag4zzvZ11qWOJWN8i2IH0U5CHAKqE88ZOy7IHph3vs83dH9mf4lf3Nyxcsbe74icu xnNsa1Gv3q3ngZG7C2nz820dOoHy8c2H7BCoKafa4AAqbXD0DPgkNncmiCoEFxVfzKj4 TgrBGe86fDqjDs1fod4EJL2gBGCPvPH++jHbyiJaFrZC34rRQBEm+Fdh4SX48G/YQYLC aUKyKIqEs6vs+vMDXXOLOliQp+nRBmoruHqUPzeBMvSdpl81MnhxfNtV2Zn5x/UMPChr pA2w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=f8hFSPR1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v22si21609870pfe.275.2019.07.08.15.36.40; Mon, 08 Jul 2019 15:36:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=f8hFSPR1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725897AbfGHPUb (ORCPT + 99 others); Mon, 8 Jul 2019 11:20:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:45458 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387454AbfGHPUa (ORCPT ); Mon, 8 Jul 2019 11:20:30 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 430C4216C4; Mon, 8 Jul 2019 15:20:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1562599229; bh=mFT7yPOGcmuMb1bVxFh0rKzv98iifujokqnuiIwQvzQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=f8hFSPR1f0YJeY+Kz/BKTKjo5Kr7WitCP/nPO0CGtaZVQHZEngGEEUaA+UgQfXt6z 8uV+nTaXCR73sBtvwKw0LK2qtRHte6Km8w1D5aJTnNQ++XnERkvjLn4iT4zNRcWalq LPpPo///tiV1QD4EBkLXyszTSQ/YfaL6rI86o8hw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vineet Gupta , Sasha Levin Subject: [PATCH 4.9 008/102] ARC: fix build warnings with !CONFIG_KPROBES Date: Mon, 8 Jul 2019 17:12:01 +0200 Message-Id: <20190708150526.451314587@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190708150525.973820964@linuxfoundation.org> References: <20190708150525.973820964@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 4c6fabda1ad1dec6d274c098ef0a91809c74f2e3 ] | CC lib/nmi_backtrace.o | In file included from ../include/linux/kprobes.h:43:0, | from ../lib/nmi_backtrace.c:17: | ../arch/arc/include/asm/kprobes.h:57:13: warning: 'trap_is_kprobe' defined but not used [-Wunused-function] | static void trap_is_kprobe(unsigned long address, struct pt_regs *regs) | ^~~~~~~~~~~~~~ The warning started with 7d134b2ce6 ("kprobes: move kprobe declarations to asm-generic/kprobes.h") which started including unconditionally into exposing a stub function for !CONFIG_KPROBES to rest of world. Fix that by making the stub a macro Signed-off-by: Vineet Gupta Signed-off-by: Sasha Levin --- arch/arc/include/asm/cmpxchg.h | 14 ++++++++++---- arch/arc/mm/tlb.c | 13 ++++++++----- 2 files changed, 18 insertions(+), 9 deletions(-) diff --git a/arch/arc/include/asm/cmpxchg.h b/arch/arc/include/asm/cmpxchg.h index d819de1c5d10..3ea4112c8302 100644 --- a/arch/arc/include/asm/cmpxchg.h +++ b/arch/arc/include/asm/cmpxchg.h @@ -92,8 +92,11 @@ __cmpxchg(volatile void *ptr, unsigned long expected, unsigned long new) #endif /* CONFIG_ARC_HAS_LLSC */ -#define cmpxchg(ptr, o, n) ((typeof(*(ptr)))__cmpxchg((ptr), \ - (unsigned long)(o), (unsigned long)(n))) +#define cmpxchg(ptr, o, n) ({ \ + (typeof(*(ptr)))__cmpxchg((ptr), \ + (unsigned long)(o), \ + (unsigned long)(n)); \ +}) /* * atomic_cmpxchg is same as cmpxchg @@ -198,8 +201,11 @@ static inline unsigned long __xchg(unsigned long val, volatile void *ptr, return __xchg_bad_pointer(); } -#define xchg(ptr, with) ((typeof(*(ptr)))__xchg((unsigned long)(with), (ptr), \ - sizeof(*(ptr)))) +#define xchg(ptr, with) ({ \ + (typeof(*(ptr)))__xchg((unsigned long)(with), \ + (ptr), \ + sizeof(*(ptr))); \ +}) #endif /* CONFIG_ARC_PLAT_EZNPS */ diff --git a/arch/arc/mm/tlb.c b/arch/arc/mm/tlb.c index a4dc881da277..3c88ccbe01af 100644 --- a/arch/arc/mm/tlb.c +++ b/arch/arc/mm/tlb.c @@ -890,9 +890,11 @@ void do_tlb_overlap_fault(unsigned long cause, unsigned long address, struct pt_regs *regs) { struct cpuinfo_arc_mmu *mmu = &cpuinfo_arc700[smp_processor_id()].mmu; - unsigned int pd0[mmu->ways]; unsigned long flags; - int set; + int set, n_ways = mmu->ways; + + n_ways = min(n_ways, 4); + BUG_ON(mmu->ways > 4); local_irq_save(flags); @@ -900,9 +902,10 @@ void do_tlb_overlap_fault(unsigned long cause, unsigned long address, for (set = 0; set < mmu->sets; set++) { int is_valid, way; + unsigned int pd0[4]; /* read out all the ways of current set */ - for (way = 0, is_valid = 0; way < mmu->ways; way++) { + for (way = 0, is_valid = 0; way < n_ways; way++) { write_aux_reg(ARC_REG_TLBINDEX, SET_WAY_TO_IDX(mmu, set, way)); write_aux_reg(ARC_REG_TLBCOMMAND, TLBRead); @@ -916,14 +919,14 @@ void do_tlb_overlap_fault(unsigned long cause, unsigned long address, continue; /* Scan the set for duplicate ways: needs a nested loop */ - for (way = 0; way < mmu->ways - 1; way++) { + for (way = 0; way < n_ways - 1; way++) { int n; if (!pd0[way]) continue; - for (n = way + 1; n < mmu->ways; n++) { + for (n = way + 1; n < n_ways; n++) { if (pd0[way] != pd0[n]) continue; -- 2.20.1