Received: by 2002:a05:6500:1b8f:b0:1fa:5c73:8e2d with SMTP id df15csp57913lqb; Tue, 28 May 2024 08:46:34 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCVDBz1DfMkhgxXvUozhfOTBHvC82NASiKAoQee3SyEh1M/mngwlydkRSoyTc9F+AN0sH7w0LEpU1YyZzRPxcn/4d+n6YPZGczBKkSrQQQ== X-Google-Smtp-Source: AGHT+IHpESRT9FGtj5KelwWltyN8UlM18aNRJO0mSGOuf/iaXwhL9+vw+izHR70mJ7YZgybqDzc4 X-Received: by 2002:a05:6a00:8c11:b0:6ed:4288:68bc with SMTP id d2e1a72fcca58-6f8f3916c82mr11959761b3a.19.1716911194168; Tue, 28 May 2024 08:46:34 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1716911194; cv=pass; d=google.com; s=arc-20160816; b=nyAZ7cfxz2u92oCBSAqDMvLDUf0iHBP1Je3DPb+YjOSezp0ZIrwvK+XKadCkb/c8sX /K9aEzySnrVJSaPbby2J30bBar3/UlveoG15fgX/H5yRSj5LC7yKwFkdnBq0Ougq8skT fMk4VUxcku8m63jjcIbbFVU8rWIz91HGXYEEMMtpOTbHrECaECSy7N9DSE6g36sBQ9/R /DS9blLfSOQa30Vuv5k49wR3EVC80el2j9j+LiSJmtABbcM3z6yiSNKDJtsiTcSz21WF SGY+SwOf3HTieQhnaqBvAvZfebjN8vUsNEWaBekAlb/Gy+yGjp83un7m7ZHEh20p+DEU lbrA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=x8DPCnzqLdFpTDVxWKkeLWS6aGmOguGL9gtuZalSKYk=; fh=ntpdVKkSOCRFZ0IdiJnuGRzhA81IqYWNTy/04PjT/60=; b=qenlopabzPLDPxzznH556CAWxgPL86gWWIhPZVivMbpoKXdw4PyN+l2pA+RW8coC7S Slctw5gf6sCo0njrIGMZqSK1n32nlLrUITvL61zOKKjOmgwxFnGb+EzQRwP0D/IRFecP /frKOVvmbzXsNajoVN2iUReofbzsG0CjpL5lMOeTJcR8XQkqlJ9ivM6htxUaZnweHbFP F4uqW5McKOgTG0QBWSq41pI0a5M25vx1rLEuGfNON78tig6dbYsZyz2kMsLHu0Tspap6 cytU1j7683N4L4FsPSLH8e/thtzWnqE0EZN9SSgOFGKSW5+pJYgWXXZM2TOD66EPKwB0 03Tg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ko0jqU8Q; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-192677-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-192677-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id d2e1a72fcca58-6f8fcee2987si8204686b3a.205.2024.05.28.08.46.33 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 28 May 2024 08:46:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-192677-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ko0jqU8Q; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-192677-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-192677-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id E280C2886D1 for ; Tue, 28 May 2024 15:37:35 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id AF9B217083D; Tue, 28 May 2024 15:37:23 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="ko0jqU8Q" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D0E7B1DFD1 for ; Tue, 28 May 2024 15:37:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716910642; cv=none; b=rSOhLlMeGXOdrCO9dGLpSrymCEVsV3P5lEgXQQf6jbseW0rjk1SSf2nAYk6TtpHLy51ccHN99M1piVaN/K0Aq1gbqiL41lUVvTXizKBys9MzI7V3/Jzf/nyU72mWhYj85lFukUt5C1yWH46FqByefkALP9llIMWSca+FTvVAenw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716910642; c=relaxed/simple; bh=7zmzoPvXFhVUfVCN9/UlOHGCv01xisUHkwCvRfpy594=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=cGXiHYXmNPhLaVXQqH5qvO654Aq9os3OeugN2kMaZ+8wF7kxJIRv9Y8lKQ/B56MAU90UmYW1XNGpO/IEx5mwO6INBWO+bkLFDBoDlH2suRb194sBj7cDbPoZcHf9SJI9Bcecz2/tf4g/3SdKs11DzdRER8zZYo5UfwIyK/acGX8= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=ko0jqU8Q; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0FAABC3277B; Tue, 28 May 2024 15:37:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1716910642; bh=7zmzoPvXFhVUfVCN9/UlOHGCv01xisUHkwCvRfpy594=; h=From:To:Cc:Subject:Date:From; b=ko0jqU8QTZDtHSsT6QIpoHm1NNFx8uIxbu8d2Mik/wtpsGNfimV12494zWAPuruCp olbSVSNWvhjdZLVXeZT+PHWFIbUkxsqVdnJU9dGzc6iFimTsBH7g05qpBBOisX6Sgo SBzi0nhuZjNbjXEUBnVZvzzkoZtEbNNFMm9VrVblpoKMR/BAEVEIjCtBhPI2PKi88j niNjMY1uzbUc3QP+VGbPTadqOfT8KMiGn4+xdYZ3GRt4/iDtnpEg2ImkoyDlJpLXzI yan0DL+KBgMqv33cpptYPrnU+cY44u0mMjlN/LPmkkacv4+dMDvgV/K5n9rZ4qErgd 7PIlg4QJhSaAQ== From: Arnd Bergmann To: Catalin Marinas , Will Deacon , Jason Gunthorpe Cc: Arnd Bergmann , Baoquan He , Kefeng Wang , Peter Zijlstra , Mark Rutland , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [PATCH] [v2] arm64/io: add constant-argument check Date: Tue, 28 May 2024 17:37:11 +0200 Message-Id: <20240528153717.2439910-1-arnd@kernel.org> X-Mailer: git-send-email 2.39.2 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit From: Arnd Bergmann In some configurations __const_iowrite32_copy() does not get inlined and gcc runs into the BUILD_BUG(): In file included from : In function '__const_memcpy_toio_aligned32', inlined from '__const_iowrite32_copy' at arch/arm64/include/asm/io.h:203:3, inlined from '__const_iowrite32_copy' at arch/arm64/include/asm/io.h:199:20: include/linux/compiler_types.h:487:45: error: call to '__compiletime_assert_538' declared with attribute error: BUILD_BUG failed 487 | _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__) | ^ include/linux/compiler_types.h:468:25: note: in definition of macro '__compiletime_assert' 468 | prefix ## suffix(); \ | ^~~~~~ include/linux/compiler_types.h:487:9: note: in expansion of macro '_compiletime_assert' 487 | _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__) | ^~~~~~~~~~~~~~~~~~~ include/linux/build_bug.h:39:37: note: in expansion of macro 'compiletime_assert' 39 | #define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg) | ^~~~~~~~~~~~~~~~~~ include/linux/build_bug.h:59:21: note: in expansion of macro 'BUILD_BUG_ON_MSG' 59 | #define BUILD_BUG() BUILD_BUG_ON_MSG(1, "BUILD_BUG failed") | ^~~~~~~~~~~~~~~~ arch/arm64/include/asm/io.h:193:17: note: in expansion of macro 'BUILD_BUG' 193 | BUILD_BUG(); | ^~~~~~~~~ Move the check for constant arguments into the inline function to ensure it is still constant if the compiler decides against inlining it. Fixes: ead79118dae6 ("arm64/io: Provide a WC friendly __iowriteXX_copy()") Signed-off-by: Arnd Bergmann --- v2: - fix both 32-bit and 64-bit copies - remove now-redundant macros --- arch/arm64/include/asm/io.h | 24 +++++++++--------------- 1 file changed, 9 insertions(+), 15 deletions(-) diff --git a/arch/arm64/include/asm/io.h b/arch/arm64/include/asm/io.h index 4ff0ae3f6d66..902026f81b97 100644 --- a/arch/arm64/include/asm/io.h +++ b/arch/arm64/include/asm/io.h @@ -196,21 +196,18 @@ static inline void __const_memcpy_toio_aligned32(volatile u32 __iomem *to, void __iowrite32_copy_full(void __iomem *to, const void *from, size_t count); -static inline void __const_iowrite32_copy(void __iomem *to, const void *from, - size_t count) +static inline void __iowrite32_copy(void __iomem *to, const void *from, + size_t count) { - if (count == 8 || count == 4 || count == 2 || count == 1) { + if (__builtin_constant_p(count) && + (count == 8 || count == 4 || count == 2 || count == 1)) { __const_memcpy_toio_aligned32(to, from, count); dgh(); } else { __iowrite32_copy_full(to, from, count); } } - -#define __iowrite32_copy(to, from, count) \ - (__builtin_constant_p(count) ? \ - __const_iowrite32_copy(to, from, count) : \ - __iowrite32_copy_full(to, from, count)) +#define __iowrite32_copy(to, from, count) __iowrite32_copy(to, from, count) static inline void __const_memcpy_toio_aligned64(volatile u64 __iomem *to, const u64 *from, size_t count) @@ -255,21 +252,18 @@ static inline void __const_memcpy_toio_aligned64(volatile u64 __iomem *to, void __iowrite64_copy_full(void __iomem *to, const void *from, size_t count); -static inline void __const_iowrite64_copy(void __iomem *to, const void *from, +static inline void __iowrite64_copy(void __iomem *to, const void *from, size_t count) { - if (count == 8 || count == 4 || count == 2 || count == 1) { + if (__builtin_constant_p(count) && + (count == 8 || count == 4 || count == 2 || count == 1)) { __const_memcpy_toio_aligned64(to, from, count); dgh(); } else { __iowrite64_copy_full(to, from, count); } } - -#define __iowrite64_copy(to, from, count) \ - (__builtin_constant_p(count) ? \ - __const_iowrite64_copy(to, from, count) : \ - __iowrite64_copy_full(to, from, count)) +#define __iowrite64_copy(to, from, count) __iowrite64_copy(to, from, count) /* * I/O memory mapping functions. -- 2.39.2