From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751581AbdINR0b (ORCPT ); Thu, 14 Sep 2017 13:26:31 -0400 Received: from mx1.redhat.com ([209.132.183.28]:25582 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751458AbdINR0a (ORCPT ); Thu, 14 Sep 2017 13:26:30 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com D1F2AC04B310 Authentication-Results: ext-mx07.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx07.extmail.prod.ext.phx2.redhat.com; spf=fail smtp.mailfrom=jpoimboe@redhat.com Date: Thu, 14 Sep 2017 12:26:27 -0500 From: Josh Poimboeuf To: Linus Torvalds Cc: Ingo Molnar , the arch/x86 maintainers , Linux Kernel Mailing List , Thomas Gleixner , "H. Peter Anvin" , Andy Lutomirski , Alexander Potapenko , Dmitriy Vyukov , Matthias Kaehlcke , Arnd Bergmann , Peter Zijlstra Subject: Re: [RFC PATCH 3/4] x86/asm: Make alternative macro interfaces more clear and consistent Message-ID: <20170914172627.sp2yrecpawovvxxy@treble> References: <20fac125eed15c916f684e27dfca753d524c6725.1504186968.git.jpoimboe@redhat.com> <20170831172542.k5qchwmgckdcnc6d@treble> <20170831173132.i5y5p4gdmm4iv3h3@treble> <20170902103221.5gw5vtxxknprzgdr@gmail.com> <20170914144820.4blzmlqeqc7unpod@treble> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.6.0.1 (2016-04-01) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]); Thu, 14 Sep 2017 17:26:30 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 14, 2017 at 10:16:08AM -0700, Linus Torvalds wrote: > On Thu, Sep 14, 2017 at 7:48 AM, Josh Poimboeuf wrote: > > > > As it turns out, the real problem with this option is that it imposes a > > penalty for CONFIG_FRAME_POINTER=n: even with frame pointers disabled, > > it forces the frame pointer to be saved for each function which uses the > > inline asm "call" statements. Our current solution doesn't do that. > > But couldn't we make the whole stack pointer clobber be dependent on > CONFIG_FRAME_POINTER? > > The only reason we do it is to make sure the frame pointer is set up > before the inline asm is emitted, but with frame pointers disabled we > don't need to. We could, but then that would mean either: a) uglifying the 15 or so relevant inline asm locations with ifdefs; or b) using my ASM_CALL macro, which I think you frowned upon? -- Josh