Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp1062610ybf; Thu, 27 Feb 2020 04:24:52 -0800 (PST) X-Google-Smtp-Source: APXvYqz6zHAVpZ8+aPiGa+g0aEeA9UEXwkI/dP6mIc7mycvLNE3mGiNBZYgl4ZyLfOAzhS4w28na X-Received: by 2002:aca:5a04:: with SMTP id o4mr3023466oib.113.1582806292398; Thu, 27 Feb 2020 04:24:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582806292; cv=none; d=google.com; s=arc-20160816; b=uuT1UzkImXS5xut9wQ2EoZghtHo/c0mLXYYHzN66hYY40D4pCSjVcyBnsrTtFt1RPA 5DwOtQZXkdROTdALMcbwOw2IdZXFx6Z/W+FGdIreNlwcIQxgFVphJleVHVGBFOtltNLM Ojj4xSMCu00XGbSBRc1ZjNMJqz9YcIr6bXi2CiFu7c+2RQqczPeo7uSDKJsZtd7ESYB3 ijWRrZsfuUPUySuNo3jDC8hash1Tj59QUFkdrWTxRIntyBJEutLNTaMsr3hPsiZ0hOa8 f+FdQHsi0xQvV8bMRT+3eKF9VJrqHt06c+Ms7xapjGePmg8BJpTV2IK2phUAYZ7Or+8Y J8jA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=tNabqIAn3PM/8bAf9dmqyqXRsdnwxxpqEpSzXzshDqU=; b=Qevc18GJYKp4V6+c//mqZ1U6rQffnh3zX0DEJltxld36xXLbEJA7a4aMr8AfjdabKs gGfdP7zWfuY3EFxh6tB9sSJIquhJslsojpbf7jwLvsxx1rfQUVQ7agNsL5nA3yr0MsAF yL7p/QQaaylxGbSWJycmzojZUGX/MaAvpcCqwyjD5b37m+Ms5JPsWhtlTKGeh9XQpYOs a+YP9pdbLv65CIlZA/Epv9PgQIxGJus3UfU6t8QQvs5UTyg+N0rT+ND3lXv1Y8sbLh5A uAPu3wrx9en4gpXEyk3/XdnOBkCI//2tfOSQsMkOYdil2KyUNOQt7FTzMDtDyV5mu9is 2QDQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m4si1401187otr.268.2020.02.27.04.24.40; Thu, 27 Feb 2020 04:24:52 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728986AbgB0MYa (ORCPT + 99 others); Thu, 27 Feb 2020 07:24:30 -0500 Received: from youngberry.canonical.com ([91.189.89.112]:56541 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728929AbgB0MYa (ORCPT ); Thu, 27 Feb 2020 07:24:30 -0500 Received: from ip5f5bf7ec.dynamic.kabel-deutschland.de ([95.91.247.236] helo=wittgenstein) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1j7IDM-0004b4-Ip; Thu, 27 Feb 2020 12:24:28 +0000 Date: Thu, 27 Feb 2020 13:24:27 +0100 From: Christian Brauner To: Stafford Horne Cc: LKML , Openrisc , Jonas Bonn , Stefan Kristiansson , Christian Brauner , Greg Kroah-Hartman , Thomas Gleixner , Allison Randal Subject: Re: [PATCH 3/3] openrisc: Cleanup copy_thread_tls docs and comments Message-ID: <20200227122427.bt3zvtdibpss46nw@wittgenstein> References: <20200226225625.28935-1-shorne@gmail.com> <20200226225625.28935-4-shorne@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20200226225625.28935-4-shorne@gmail.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Feb 27, 2020 at 07:56:25AM +0900, Stafford Horne wrote: > Previously copy_thread_tls was copy_thread and before that something > else. Remove the documentation about the regs parameter that didn't > exist in either version. > > Next, fix comment wrapping and details about how TLS pointer gets to the > copy_thread_tls function. > > Signed-off-by: Stafford Horne Acked-by: Christian Brauner > --- > arch/openrisc/kernel/process.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/arch/openrisc/kernel/process.c b/arch/openrisc/kernel/process.c > index 6695f167e126..b442e7b59e17 100644 > --- a/arch/openrisc/kernel/process.c > +++ b/arch/openrisc/kernel/process.c > @@ -122,7 +122,6 @@ extern asmlinkage void ret_from_fork(void); > * @usp: user stack pointer or fn for kernel thread > * @arg: arg to fn for kernel thread; always NULL for userspace thread > * @p: the newly created task > - * @regs: CPU context to copy for userspace thread; always NULL for kthread > * @tls: the Thread Local Storate pointer for the new process > * > * At the top of a newly initialized kernel stack are two stacked pt_reg > @@ -180,7 +179,8 @@ copy_thread_tls(unsigned long clone_flags, unsigned long usp, > userregs->sp = usp; > > /* > - * For CLONE_SETTLS set "tp" (r10) to the TLS pointer passed to sys_clone. > + * For CLONE_SETTLS set "tp" (r10) to the TLS pointer passed > + * in clone_args to sys_clone3. As I said in my other reply, I'd not reference any specific caller since we have at least two. Christian