From patchwork Thu Jan 2 21:13:51 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Pasha Tatashin X-Patchwork-Id: 11316051 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id B214517EA for ; Thu, 2 Jan 2020 21:15:21 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 8D091217F4 for ; Thu, 2 Jan 2020 21:15:21 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=soleen.com header.i=@soleen.com header.b="imrt7o+N" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 8D091217F4 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=soleen.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1in7n9-00016Z-Dq; Thu, 02 Jan 2020 21:14:03 +0000 Received: from us1-rack-iad1.inumbo.com ([172.99.69.81]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1in7n7-000161-Q9 for xen-devel@lists.xenproject.org; Thu, 02 Jan 2020 21:14:01 +0000 X-Inumbo-ID: cbfbbfe2-2da4-11ea-88e7-bc764e2007e4 Received: from mail-qk1-x742.google.com (unknown [2607:f8b0:4864:20::742]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS id cbfbbfe2-2da4-11ea-88e7-bc764e2007e4; Thu, 02 Jan 2020 21:14:01 +0000 (UTC) Received: by mail-qk1-x742.google.com with SMTP id 21so32387206qky.4 for ; Thu, 02 Jan 2020 13:14:00 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=soleen.com; s=google; h=from:to:subject:date:message-id; bh=MLMP74Qul+kzC8cejQXgeuw3tNFBJiGyUZucJtJ/QlY=; b=imrt7o+Nqx58g1O6V2mkVBF0X3mpKD7xziHHz/l8CuGj82H8zbk9o0pJKvxc8wOmXV VJelDvV9Sarj7pQNjxsZvXh6YCVIipLEW2vgXE2sUrAenPUIFhV6h1UMd1w2fhJlrYVy 9Zc9EtQAARm5MWqdbkMAd9Yc2rB/6ZIUq7cwRT74dGCjbCQhVNB4m4/XOBLFQ4SzVJVt xdNLPyTOC5jnXobeUSmc/vhUaK5AdcHt1UHQ8I4D0Cu/XGM1TPDf4y8swfAtoywA34oy JsTcvvAPH6Ixw+FmxMvlmP2LLQubnM7MI4xX4QBxOKvu0SnayI4ATkyYnd1nQ/44jWYF XZYg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id; bh=MLMP74Qul+kzC8cejQXgeuw3tNFBJiGyUZucJtJ/QlY=; b=ad7p+5tnnhHeCQ5sOiscNM124cw+c9f9fTPu/drW5WTa5x4w/TBJkMbCzKRm3E5bhs FJ771GHfvTaCw9EiuCS0HuuPXk1ssL+Mlz2BkzqGHRfqcAf0GSa5wFVPQoryxKZVpnHU 2mbOgfMzoVcYAYoxVIqEQVWz9FICNi+AQT5LSek1vbqtFMovVYa9Wa1o4hPr5V2UCM2Z 50ixLMnBht7jluVPsj5/A4Te3g0IVeAoZ4Z4KMihGC4ch962QVZv9htnjLu4wg4OY/oZ RpuyZogHCQeCyjm/qtYrcZ4JjXm/OWxJ5o8gRg1JaSc0LzoMcGTkCQ8jLp4eYe9aXZmg siZg== X-Gm-Message-State: APjAAAX95quTqVFP/zHYWAccIroFWtfQi5A/0TV0Dl2hDddhDwk31MkF Bu45U3YhO6q7Kp4wXsVEfzlTRw== X-Google-Smtp-Source: APXvYqxe1FkmrFoyzjV9jkb3V7sY9OvDubbb64WjyE82gpvQTibRMR/HebgLizW6nByQc9Tc7zrXdA== X-Received: by 2002:a37:e308:: with SMTP id y8mr68320580qki.347.1577999640406; Thu, 02 Jan 2020 13:14:00 -0800 (PST) Received: from localhost.localdomain (c-73-69-118-222.hsd1.nh.comcast.net. [73.69.118.222]) by smtp.gmail.com with ESMTPSA id f97sm17384185qtb.18.2020.01.02.13.13.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 Jan 2020 13:13:59 -0800 (PST) From: Pavel Tatashin To: pasha.tatashin@soleen.com, jmorris@namei.org, sashal@kernel.org, linux-kernel@vger.kernel.org, catalin.marinas@arm.com, will@kernel.org, steve.capper@arm.com, linux-arm-kernel@lists.infradead.org, maz@kernel.org, james.morse@arm.com, vladimir.murzin@arm.com, mark.rutland@arm.com, tglx@linutronix.de, gregkh@linuxfoundation.org, allison@lohutok.net, info@metux.net, alexios.zavras@intel.com, sstabellini@kernel.org, boris.ostrovsky@oracle.com, jgross@suse.com, stefan@agner.ch, yamada.masahiro@socionext.com, xen-devel@lists.xenproject.org, linux@armlinux.org.uk, andrew.cooper3@citrix.com, julien@xen.org Date: Thu, 2 Jan 2020 16:13:51 -0500 Message-Id: <20200102211357.8042-1-pasha.tatashin@soleen.com> X-Mailer: git-send-email 2.17.1 Subject: [Xen-devel] [PATCH v5 0/6] Use C inlines for uaccess X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" Changelog: v5: - Fixed build issue reported by kbuild - Removed a comment fix from the first patch - Added reviewed-by's from Julien Grall - Now, these patches apply against mainline v4: - Split the first patch into two as Julien Grall - Also as Mark Rutland suggested removed alternatives from __asm_flush_cache_user_range. v3: - Added Acked-by from Stefano Stabellini - Addressed comments from Mark Rutland v2: - Addressed Russell King's concern by not adding uaccess_* to ARM. - Removed the accidental change to xtensa Convert the remaining uaccess_* calls from ASM macros to C inlines. These patches apply against maineline. I boot tested ARM64, and compile tested ARM change Previous discussions: v4: https://lore.kernel.org/lkml/20191204232058.2500117-1-pasha.tatashin@soleen.com v3: https://lore.kernel.org/lkml/20191127184453.229321-1-pasha.tatashin@soleen.com v2: https://lore.kernel.org/lkml/20191122022406.590141-1-pasha.tatashin@soleen.com v1: https://lore.kernel.org/lkml/20191121184805.414758-1-pasha.tatashin@soleen.com Pavel Tatashin (6): arm/arm64/xen: hypercall.h add includes guards arm/arm64/xen: use C inlines for privcmd_call arm64: remove uaccess_ttbr0 asm macros from cache functions arm64: remove __asm_flush_icache_range arm64: move ARM64_HAS_CACHE_DIC/_IDC from asm to C arm64: remove the rest of asm-uaccess.h arch/arm/include/asm/xen/hypercall.h | 10 ++++ arch/arm/xen/enlighten.c | 2 +- arch/arm/xen/hypercall.S | 4 +- arch/arm64/include/asm/asm-uaccess.h | 61 ----------------------- arch/arm64/include/asm/cacheflush.h | 55 +++++++++++++++++++-- arch/arm64/include/asm/xen/hypercall.h | 28 +++++++++++ arch/arm64/kernel/entry.S | 27 +++++++++- arch/arm64/lib/clear_user.S | 2 +- arch/arm64/lib/copy_from_user.S | 2 +- arch/arm64/lib/copy_in_user.S | 2 +- arch/arm64/lib/copy_to_user.S | 2 +- arch/arm64/mm/cache.S | 68 +++++--------------------- arch/arm64/mm/flush.c | 3 +- arch/arm64/xen/hypercall.S | 19 +------ include/xen/arm/hypercall.h | 12 ++--- 15 files changed, 146 insertions(+), 151 deletions(-) delete mode 100644 arch/arm64/include/asm/asm-uaccess.h