Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp1244267pxp; Sat, 12 Mar 2022 05:30:38 -0800 (PST) X-Google-Smtp-Source: ABdhPJxA3gnR+WpXajtl/azc8Hm+nzlXwTOX/y+5tBMd5KPQsIXg64uTRBWkej9QZRBK0wN5YH0U X-Received: by 2002:a05:6402:d4:b0:418:7193:da1 with SMTP id i20-20020a05640200d400b0041871930da1mr569790edu.57.1647091837834; Sat, 12 Mar 2022 05:30:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1647091837; cv=none; d=google.com; s=arc-20160816; b=d6eSxTIWrMEzJxtgBP0SYDoVz7SVKEyK8GiTg2LjHsCo4XTUy0b8YJWJPI1gWLN9LV PePU9jUDF/aPhRh6f6HBVsSKDGeQFHXZQ4/gAvytkRruKlI/4w27z7HCh6Cco3d2jI+9 XHNv0Z20uEsBCBG+PuNYsf4MNin86Eb+0A3WaF7DcPciGcBvJ2AGgsuB3HYJT+b3N3EW CygKqeLHjxnl4j6nRUHX9NHxh2AA1M0BsbghEUC0U1+vZFewc5l8ZbdMktIj4QAoqHyd 8PMWyWvKOcxV1iFvqsEm8/ZzdUIvtXWj3FECij5baIflY5Gop6IRjEpgDmwbTEI+y1Ke A8bQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version:date :message-id:subject:references:in-reply-to:cc:to:from; bh=wR6ORgz0XaMYK1BZrScV/ZHIYpupu+90E1zPhhO6Ne4=; b=Ng7yaTmM4OpdlSMsQ2S5+r3tnFD6+Gi3o7pBHaTLW+dAQ0iNiZ8UZ1q2RX+HWP4FYD UyYjRInoU4qctY0g8aTUICqWE2G5RP2i7Gxd4Ysgemrgk0dqsePUkvkO3nPoUaVifD/7 IpwqOOMP0lt1zC1k3QeSTs9zYq5usanUldNDlC0uCSR02jx880g5a9gPf2Qwj/0rx+7y lT6Umxj7gDQnI0FBSyjm1fT5XP0gWqxFcH+kKCBFEvdfGv11asINOp1vY/2zMQO3dEDR oC7FOlImzAT4WYHBCel+Vl0NDvGeL1sOo0dr8wa5Ybj1AZLFPoT5bN4LbB6OjPZaoQFH mvyw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hr4-20020a1709073f8400b006d62d9d91b7si7844028ejc.608.2022.03.12.05.29.49; Sat, 12 Mar 2022 05:30:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230269AbiCLKcG (ORCPT + 99 others); Sat, 12 Mar 2022 05:32:06 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60228 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230168AbiCLKb7 (ORCPT ); Sat, 12 Mar 2022 05:31:59 -0500 Received: from gandalf.ozlabs.org (mail.ozlabs.org [IPv6:2404:9400:2221:ea00::3]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DBD0E23D03B for ; Sat, 12 Mar 2022 02:30:54 -0800 (PST) Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 4KFzbY49qKz4xMW; Sat, 12 Mar 2022 21:30:49 +1100 (AEDT) From: Michael Ellerman To: Christophe Leroy , Michael Ellerman , Paul Mackerras , Benjamin Herrenschmidt Cc: linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org In-Reply-To: References: Subject: Re: [PATCH] powerpc/64: Force inlining of prevent_user_access() and set_kuap() Message-Id: <164708098863.827774.14061514441187973673.b4-ty@ellerman.id.au> Date: Sat, 12 Mar 2022 21:29:48 +1100 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_PASS, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 11 Feb 2022 15:16:51 +0100, Christophe Leroy wrote: > A ppc64_defconfig build exhibits about 10 copied of > prevent_user_access(). It also have one copy of set_kuap(). > > c000000000017340 <.prevent_user_access.constprop.0>: > c00000000001a038: 4b ff d3 09 bl c000000000017340 <.prevent_user_access.constprop.0> > c00000000001aabc: 4b ff c8 85 bl c000000000017340 <.prevent_user_access.constprop.0> > c00000000001ab38: 4b ff c8 09 bl c000000000017340 <.prevent_user_access.constprop.0> > c00000000001ade0: 4b ff c5 61 bl c000000000017340 <.prevent_user_access.constprop.0> > c000000000039b90 <.prevent_user_access.constprop.0>: > c00000000003ac08: 4b ff ef 89 bl c000000000039b90 <.prevent_user_access.constprop.0> > c00000000003b9d0: 4b ff e1 c1 bl c000000000039b90 <.prevent_user_access.constprop.0> > c00000000003ba54: 4b ff e1 3d bl c000000000039b90 <.prevent_user_access.constprop.0> > c00000000003bbfc: 4b ff df 95 bl c000000000039b90 <.prevent_user_access.constprop.0> > c00000000015dde0 <.prevent_user_access.constprop.0>: > c0000000001612c0: 4b ff cb 21 bl c00000000015dde0 <.prevent_user_access.constprop.0> > c000000000161b54: 4b ff c2 8d bl c00000000015dde0 <.prevent_user_access.constprop.0> > c000000000188cf0 <.prevent_user_access.constprop.0>: > c00000000018d658: 4b ff b6 99 bl c000000000188cf0 <.prevent_user_access.constprop.0> > c00000000030fe20 <.prevent_user_access.constprop.0>: > c0000000003123d4: 4b ff da 4d bl c00000000030fe20 <.prevent_user_access.constprop.0> > c000000000313970: 4b ff c4 b1 bl c00000000030fe20 <.prevent_user_access.constprop.0> > c0000000005e6bd0 <.prevent_user_access.constprop.0>: > c0000000005e7d8c: 4b ff ee 45 bl c0000000005e6bd0 <.prevent_user_access.constprop.0> > c0000000007bcae0 <.prevent_user_access.constprop.0>: > c0000000007bda10: 4b ff f0 d1 bl c0000000007bcae0 <.prevent_user_access.constprop.0> > c0000000007bda54: 4b ff f0 8d bl c0000000007bcae0 <.prevent_user_access.constprop.0> > c0000000007bdd28: 4b ff ed b9 bl c0000000007bcae0 <.prevent_user_access.constprop.0> > c0000000007c0390: 4b ff c7 51 bl c0000000007bcae0 <.prevent_user_access.constprop.0> > c00000000094e4f0 <.prevent_user_access.constprop.0>: > c000000000950e40: 4b ff d6 b1 bl c00000000094e4f0 <.prevent_user_access.constprop.0> > c00000000097d2d0 <.prevent_user_access.constprop.0>: > c0000000009813fc: 4b ff be d5 bl c00000000097d2d0 <.prevent_user_access.constprop.0> > c000000000acd540 <.prevent_user_access.constprop.0>: > c000000000ad1d60: 4b ff b7 e1 bl c000000000acd540 <.prevent_user_access.constprop.0> > c000000000e5d680 <.prevent_user_access.constprop.0>: > c000000000e64b60: 4b ff 8b 21 bl c000000000e5d680 <.prevent_user_access.constprop.0> > c000000000e64b6c: 4b ff 8b 15 bl c000000000e5d680 <.prevent_user_access.constprop.0> > c000000000e64c38: 4b ff 8a 49 bl c000000000e5d680 <.prevent_user_access.constprop.0> > > [...] Applied to powerpc/next. [1/1] powerpc/64: Force inlining of prevent_user_access() and set_kuap() https://git.kernel.org/powerpc/c/792993919349fefba20f58ae4843c80e8b01f518 cheers