Received: by 2002:a05:7412:8598:b0:f9:33c2:5753 with SMTP id n24csp312997rdh; Mon, 18 Dec 2023 22:34:00 -0800 (PST) X-Google-Smtp-Source: AGHT+IFtYk/ZCs5k0JXfaCZ836DLQ8oPyNdQ43Rp+2Fg9CeF+dahEfKw6mcpYZSZn7/cOmjsl659 X-Received: by 2002:a17:90a:ab0d:b0:28b:6004:c29e with SMTP id m13-20020a17090aab0d00b0028b6004c29emr770874pjq.23.1702967639928; Mon, 18 Dec 2023 22:33:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702967639; cv=none; d=google.com; s=arc-20160816; b=OO6FMcCGou8hwiOYTMSel0qysZ/6lAqUoKbDmrM5AjR8BVfKfUVxD/U1INjep9mdss IWPhlpAGUMA1equ+PyWpHJzWcWESrs5RcvaP0QncHgTOiDVNxzG7l8DjOkhisPSgOuf4 eLmQYc2C/Yp1tLZcBfSLzIm6GDAZCsxxkfWqatQFuXPBIRVU/4gyvknWRSCL7mvga2wH /aMHSlFLMSMBKnj6ux7Srgx9LCtwyHi/FwNpV40Lfuw0XhBVpFWUdC4hidrDgeJ4b6RJ cxWxV7+vsiM5ed5ui18nWF30RPQFTRXNbbCw315MOzcWMSVYcrKBrXTZNGs7UgyffxFB xUzg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :message-id:date:references:in-reply-to:subject:cc:to:from :dkim-signature; bh=R/lROIQ+DrOtwuEYqrniGOZ6zIfORHny9dL8QsDnOwg=; fh=uD2zo8pJZvnVAqCDgCtolVWxGzkaX7v58W9JOJsG3/I=; b=tBWHSWmkXJxiUESpIZlHCcrUiICxFJhdTqB50bICiWYYZ2QlnkhMmXYdRSgewE6iJH G3pEYXV2fMTk6Iddaeh0uNStyyu8D9jW8bpMbGyPhE1CZTO1gjnE52MOmpJ+1fX87mF2 unCvB48hMr/q81YsR2UVu6DW24fsq1HG9nXtJB2nIpJsTbVhv9bq03M5HAnVUTO+JyjW +mc0e1UCgnQ2xEQIHOkh83INOEYT5fHBLzvD0gWMO/AiBGMKVc8LuR71hCZq0NJu1gl/ hlZdDGQNWgcXH18u3VKBwPNWuqM40bjdwKCkDew5SO1B3Gcs8A/ObQmTH9LYLnwpLu8V O+tg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ellerman.id.au header.s=201909 header.b=GHUNt1qM; spf=pass (google.com: domain of linux-kernel+bounces-4751-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-4751-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id lb5-20020a17090b4a4500b0028672033a5csi665125pjb.124.2023.12.18.22.33.59 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 18 Dec 2023 22:33:59 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-4751-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@ellerman.id.au header.s=201909 header.b=GHUNt1qM; spf=pass (google.com: domain of linux-kernel+bounces-4751-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-4751-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 98799B2436A for ; Tue, 19 Dec 2023 06:33:54 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 46EA58838; Tue, 19 Dec 2023 06:33:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=ellerman.id.au header.i=@ellerman.id.au header.b="GHUNt1qM" X-Original-To: linux-kernel@vger.kernel.org Received: from gandalf.ozlabs.org (gandalf.ozlabs.org [150.107.74.76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id EF0118826 for ; Tue, 19 Dec 2023 06:33:43 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=ellerman.id.au Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=ellerman.id.au DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ellerman.id.au; s=201909; t=1702967616; bh=R/lROIQ+DrOtwuEYqrniGOZ6zIfORHny9dL8QsDnOwg=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=GHUNt1qM5TJLSUCcp4Z0csWIQa/ffReOZRkyC+IT6YdiUiwx7tKW7hS6iI6gC0h+7 B0Sj6omz+iMahV8P6Wzmc8DVGFBig6aB4mj4POnnpSwBPNg6xousZ2TAKQrkfcfETE 7RPH9xnxiVn46l0u+435mFv1IbDS1Hm95PiuAOdxAWcnMEvSxeFkH2d+dK/9t8wm65 yHFhLdKu4P1e0oE+fmCbZ7MeRwfyuobTIl8rmKHnwuf5Ab6MCTNIFRvQ0fkc+EjcKZ AiRKRUk7TeMIdEXavNdigEluCe5PDHR/ham/6BPql32/rWR9yja1hbUsPsg9RogvDt jmuWxSQWCB0RQ== Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 4SvRjD0f6jz4wxx; Tue, 19 Dec 2023 17:33:36 +1100 (AEDT) From: Michael Ellerman To: "Aneesh Kumar K.V" , Luming Yu , linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org, npiggin@gmail.com, christophe.leroy@csgroup.eu Cc: luming.yu@gmail.com, ke.zhao@shingroup.cn, dawei.li@shingroup.cn, shenghui.qu@shingroup.cn, Luming Yu Subject: Re: [PATCH v1 2/2] powerpc/debug: hook to user return notifier infrastructure In-Reply-To: <8734vzsw0q.fsf@kernel.org> References: <8734vzsw0q.fsf@kernel.org> Date: Tue, 19 Dec 2023 17:33:33 +1100 Message-ID: <8734vyn1ky.fsf@mail.lhotse> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain Aneesh Kumar K.V writes: > Luming Yu writes: > >> Before we have powerpc to use the generic entry infrastructure, >> the call to fire user return notifier is made temporarily in powerpc >> entry code. >> > > It is still not clear what will be registered as user return notifier. > Can you summarize that here? fire_user_return_notifiers() is defined in kernel/user-return-notifier.c That's built when CONFIG_USER_RETURN_NOTIFIER=y. That is not user selectable, it's only enabled by: arch/x86/kvm/Kconfig: select USER_RETURN_NOTIFIER So it looks to me like (currently) it's always a nop and does nothing. Which makes me wonder what the point of wiring this feature up is :) Maybe it's needed for some other feature I don't know about? Arguably we could just enable it because we can, and it currently does nothing so it's unlikely to break anything. But that also makes it impossible to test the implementation is correct, and runs the risk that one day in the future when it does get enabled only then do we discover it doesn't work. cheers