Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp4208574ybb; Tue, 7 Apr 2020 02:59:54 -0700 (PDT) X-Google-Smtp-Source: APiQypL1jD0F+2VX81IdoiOTYWlorwCDArzWo2NVideJJSVmAYEev+zGicGVehfrH3xFmFdVPopL X-Received: by 2002:a9d:3e1b:: with SMTP id a27mr909715otd.230.1586253594688; Tue, 07 Apr 2020 02:59:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586253594; cv=none; d=google.com; s=arc-20160816; b=uZvJoNfbQe2/a1DaObrAVwkbiXPeGFTw8oCYTNyFZsISgJNi08aM/+4MXh4ZmA/HQE vWxMYJONV3yim6Tfxvpo1x6vMHwz9gitqY73bFDtyS8yPvO/qLIJ4QK8zkHlGgWyySaO NqqqEm2caA7PCs5WbsU9awfDF+zVOxmtu5PzsTrmvYFmiYw5+KxUsfBzo2ExmlWNfudU F2wxositiylXWTd9nHjsdpY4FF25x+DBjGd36teuimeK4U/6dggive+uUrL8CbWRgXGT E2iLdCsIwN8mrRH04P3QjH/5EoLjMx1ZIkLDBB9wzGdB1EwBbCzk8wZ5kpLeo6UxQlfm BoUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=uFugb6ZXO+kl9A0MmUR4VklATZQCd0Ty4Vs8urOMbcQ=; b=myK4KV49K6jK/1PS9Qgyn4wvc28VUwS4XyaKoEXn4WufGs+nlTCyH3iiU29QYq5d6h DOPxtu7iBq5DYkvtfM2Omgsy37A7zBAbYyiYsRLldCqJ61jFznGSnw9vWEXGuqZxTiP7 4KKY1cQ24oJC2PsgXQw4xds+jtW2WNYioLiZWRRwreBhEbBuog+i+bBmN2lWq7aFq7/E RtoQXShMTNwvQhNQ/vs8wPFrm1ZANQrX+Uo5rnxnYh+X/FCe5HhsgST6Ogd+6kXowpKx 1zKKRD09dF+YCH+HYpu+m5HSanxUML6sIj/O2o6D1S+bx67GjxYRcoCYpS8vZlKYdE/A x6RQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f9si1172032otc.162.2020.04.07.02.59.42; Tue, 07 Apr 2020 02:59:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728187AbgDGJ6F (ORCPT + 99 others); Tue, 7 Apr 2020 05:58:05 -0400 Received: from mx2.suse.de ([195.135.220.15]:33864 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726716AbgDGJ6F (ORCPT ); Tue, 7 Apr 2020 05:58:05 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 51A19AC44; Tue, 7 Apr 2020 09:58:01 +0000 (UTC) Date: Tue, 7 Apr 2020 11:57:58 +0200 From: Michal =?iso-8859-1?Q?Such=E1nek?= To: Christophe Leroy Cc: linuxppc-dev@lists.ozlabs.org, Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , Mark Rutland , Alexander Shishkin , Jiri Olsa , Namhyung Kim , Alexander Viro , Mauro Carvalho Chehab , "David S. Miller" , Rob Herring , Greg Kroah-Hartman , Jonathan Cameron , Andy Shevchenko , Thomas Gleixner , Arnd Bergmann , Nayna Jain , Eric Richter , Claudio Carvalho , Nicholas Piggin , Hari Bathini , Masahiro Yamada , Thiago Jung Bauermann , Sebastian Andrzej Siewior , Valentin Schneider , Jordan Niethe , Michael Neuling , Gustavo Luiz Duarte , Allison Randal , "Eric W. Biederman" , linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: Re: [PATCH v12 5/8] powerpc/64: make buildable without CONFIG_COMPAT Message-ID: <20200407095758.GF25468@kitsune.suse.cz> References: <20200225173541.1549955-1-npiggin@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 07, 2020 at 07:50:30AM +0200, Christophe Leroy wrote: > > > Le 20/03/2020 ? 11:20, Michal Suchanek a ?crit?: > > There are numerous references to 32bit functions in generic and 64bit > > code so ifdef them out. > > > > Signed-off-by: Michal Suchanek > > --- > > v2: > > - fix 32bit ifdef condition in signal.c > > - simplify the compat ifdef condition in vdso.c - 64bit is redundant > > - simplify the compat ifdef condition in callchain.c - 64bit is redundant > > v3: > > - use IS_ENABLED and maybe_unused where possible > > - do not ifdef declarations > > - clean up Makefile > > v4: > > - further makefile cleanup > > - simplify is_32bit_task conditions > > - avoid ifdef in condition by using return > > v5: > > - avoid unreachable code on 32bit > > - make is_current_64bit constant on !COMPAT > > - add stub perf_callchain_user_32 to avoid some ifdefs > > v6: > > - consolidate current_is_64bit > > v7: > > - remove leftover perf_callchain_user_32 stub from previous series version > > v8: > > - fix build again - too trigger-happy with stub removal > > - remove a vdso.c hunk that causes warning according to kbuild test robot > > v9: > > - removed current_is_64bit in previous patch > > v10: > > - rebase on top of 70ed86f4de5bd > > --- > > arch/powerpc/include/asm/thread_info.h | 4 ++-- > > arch/powerpc/kernel/Makefile | 6 +++--- > > arch/powerpc/kernel/entry_64.S | 2 ++ > > arch/powerpc/kernel/signal.c | 3 +-- > > arch/powerpc/kernel/syscall_64.c | 6 ++---- > > arch/powerpc/kernel/vdso.c | 3 ++- > > arch/powerpc/perf/callchain.c | 8 +++++++- > > 7 files changed, 19 insertions(+), 13 deletions(-) > > > > [...] > > > diff --git a/arch/powerpc/kernel/syscall_64.c b/arch/powerpc/kernel/syscall_64.c > > index 87d95b455b83..2dcbfe38f5ac 100644 > > --- a/arch/powerpc/kernel/syscall_64.c > > +++ b/arch/powerpc/kernel/syscall_64.c > > @@ -24,7 +24,6 @@ notrace long system_call_exception(long r3, long r4, long r5, > > long r6, long r7, long r8, > > unsigned long r0, struct pt_regs *regs) > > { > > - unsigned long ti_flags; > > syscall_fn f; > > if (IS_ENABLED(CONFIG_PPC_IRQ_SOFT_MASK_DEBUG)) > > @@ -68,8 +67,7 @@ notrace long system_call_exception(long r3, long r4, long r5, > > local_irq_enable(); > > - ti_flags = current_thread_info()->flags; > > - if (unlikely(ti_flags & _TIF_SYSCALL_DOTRACE)) { > > + if (unlikely(current_thread_info()->flags & _TIF_SYSCALL_DOTRACE)) { > > /* > > * We use the return value of do_syscall_trace_enter() as the > > * syscall number. If the syscall was rejected for any reason > > @@ -94,7 +92,7 @@ notrace long system_call_exception(long r3, long r4, long r5, > > /* May be faster to do array_index_nospec? */ > > barrier_nospec(); > > - if (unlikely(ti_flags & _TIF_32BIT)) { > > + if (unlikely(is_32bit_task())) { > > is_compat() should be used here instead, because we dont want to use is_compat_task() > compat_sys_call_table() on PPC32. > > > f = (void *)compat_sys_call_table[r0]; > > r3 &= 0x00000000ffffffffULL; > That only applies once you use this for 32bit as well. Right now it's 64bit only so the two are the same. Thanks Michal