Message ID | 20240216135517.2002749-1-masahiroy@kernel.org |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel+bounces-68671-ouuuleilei=gmail.com@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7300:c619:b0:108:e6aa:91d0 with SMTP id hn25csp525873dyb; Fri, 16 Feb 2024 05:56:21 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCWtEaDyj8K7vt9SVk7FdXN0S/CGNZy/rwchS0Kheo+nLqkvidqWy8HAdpalx6NdBzHU+EjmuDRvPgP50bFAO2bO4f0Wnw== X-Google-Smtp-Source: AGHT+IGl1u4iLCgz6ycZQxcEX2AnAEhJirdtlBUVIrXdrij5aMZWn7vFUO8Wv1zWL0P1q4iGX8fP X-Received: by 2002:a17:902:a509:b0:1d7:3121:ffd1 with SMTP id s9-20020a170902a50900b001d73121ffd1mr4146645plq.13.1708091781140; Fri, 16 Feb 2024 05:56:21 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708091781; cv=pass; d=google.com; s=arc-20160816; b=D9pV2ENF79E8LSfNkB72WX9K/0LbWWSnrROFVsFFz4gneDKoewpbdBJV7B0DvNTi08 IpSAR792mdqiBBoFUhY5j77J7EGRJViEJ+R9HqvDyj4LwCnxFyzYIAskIFoWyNs930/H +dkt9jbZMqpDZnkJdBsNTLuxuolgrcj8/hMkKQO3pNZZ2ZJlxzWEJpoPJKC1+Cvdo0I9 hp3JOjQb8CU4nWAdJ9wi01Q6ykf14dG3bKazx/pR3GEZEUOyoE7gkk00zNLSgkznWAVX EOu8GqUPJfw8xb70CCFRL02pOuPSW9k/bFnO+Oun3xNCB7uZQQB6gQa2LtfVj2XfQey6 hdNA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=VpxFSYOlilk5izIJE+QhCJI/ShtlpUUUgGITng5MmWE=; fh=6jEtIrPYItupd7atSUxyqNHk019bOA/XrUpRkLCj/6g=; b=gmGq72/QjNkMLfF5jDE65uUb7HgzQGc6xC6EhZlOREr6cFXRuoyTAUZIGp++TPoyjs RgMmVnabysKQqQ/ZndXDY2oVhTIYHVrDUS47cJlSQG+WRTMNiXOXh8MZT6ZBbpFSf2Wp A8Eca6608bBtq8H2hII8/tUaTTrFB6HT54ZfLlGCcg38PYLQ1N6Z5or1FznSMxsOJe5u TG2dQggCebPaNdpmtqZsu94f2ey6+yV/LSPc7nNpKlwbKoSowh5yW77uMF/HWfo8Zrqy wU75PeD+xg/cDdBAHpHxoUQ8XMvcWwkfPiwWRrawU5V/GpaQLlXcxoA2LBEVEj8kWVGP Oaxg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=bYstjYEp; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-68671-ouuuleilei=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-68671-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id p10-20020a170902e74a00b001db2ad61b6dsi3163450plf.538.2024.02.16.05.56.21 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 16 Feb 2024 05:56:21 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-68671-ouuuleilei=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=bYstjYEp; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-68671-ouuuleilei=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-68671-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 53EDA287453 for <ouuuleilei@gmail.com>; Fri, 16 Feb 2024 13:55:38 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 12CED12C533; Fri, 16 Feb 2024 13:55:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="bYstjYEp" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 63C1F12BF24 for <linux-kernel@vger.kernel.org>; Fri, 16 Feb 2024 13:55:24 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708091725; cv=none; b=Z2FpDvgGhdDxrizoU8Rjs7f3Y9ATj1q3e7OhW10ae0Vkq8CkQVYtTvbkXRC1WcWB/ne2j1pCEQB6U+41Zm3r8Qvb9aCfb0LL9s41921/CqlbSpLC1nfO4thDlMyG5XQRd/q6Rz9QaowXQxVfo9jPmabKyDETEvNwc3PoBkVoZCQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708091725; c=relaxed/simple; bh=JYRadvk8epVLTennqJxblFfin4HjDeQtbPYeVdFZkTc=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=O+Xn5H4DP1QZOQs6qeJPHmcA6m2/GNdHpXvIcsV9uPrKeHRjxUh1vGu/47s9Ghb5v2AAvuFe477EJKBG0oPnzhz1Q3AMyCjJhxGhKj2q03IOZyKO8YkdFSUlrKNhdxT5SN7XAp5AFUI+NXI6x9v2WNXORtUc90kPwEk3jU3qyvE= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=bYstjYEp; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6C1C3C433F1; Fri, 16 Feb 2024 13:55:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1708091724; bh=JYRadvk8epVLTennqJxblFfin4HjDeQtbPYeVdFZkTc=; h=From:To:Cc:Subject:Date:From; b=bYstjYEpD43jdQrvSD9EDleeWQBd8QQ3QVGDGvKpPEQNlpsXc6iJA55H/CJFOsD9n cPAaiLLKMOQ3+sH6TBYOIWjaUZQYLxDSdYc6qBSMmWU34M+0xFis417Xawxz9wKhMV cC6yqKHucIo2a/LMRM1DPwMnr3BjNm4aB9sitOzfpTw5XBOFTsZCzoVwGckGN9tGVg s4iUPran2WXVNXUTh0Rzoaz7sGHOBq5yZArA87Lpjgza3Sc1cv3k6/tOXzfpnjEQAc nVbehF86OK3ddbZ6SlgoKgp+AfuELIE8bnHzL4qr0/fdqsvXNCMcHI5KjAlG02H5bf k4T6qGglqjteA== From: Masahiro Yamada <masahiroy@kernel.org> To: Michael Ellerman <mpe@ellerman.id.au>, Nicholas Piggin <npiggin@gmail.com>, Christophe Leroy <christophe.leroy@csgroup.eu>, "Aneesh Kumar K . V" <aneesh.kumar@kernel.org>, "Naveen N . Rao" <naveen.n.rao@linux.ibm.com>, linuxppc-dev@lists.ozlabs.org Cc: Masahiro Yamada <masahiroy@kernel.org>, linux-kernel@vger.kernel.org Subject: [PATCH] powerpc: remove unused *_syscall_64.o variables in Makefile Date: Fri, 16 Feb 2024 22:55:17 +0900 Message-Id: <20240216135517.2002749-1-masahiroy@kernel.org> X-Mailer: git-send-email 2.40.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: <linux-kernel.vger.kernel.org> List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org> List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1791064047989446773 X-GMAIL-MSGID: 1791064047989446773 |
Series |
powerpc: remove unused *_syscall_64.o variables in Makefile
|
|
Commit Message
Masahiro Yamada
Feb. 16, 2024, 1:55 p.m. UTC
Commit ab1a517d55b0 ("powerpc/syscall: Rename syscall_64.c into
interrupt.c") missed to update these three lines:
GCOV_PROFILE_syscall_64.o := n
KCOV_INSTRUMENT_syscall_64.o := n
UBSAN_SANITIZE_syscall_64.o := n
To restore the original behavior, we could replace them with:
GCOV_PROFILE_interrupt.o := n
KCOV_INSTRUMENT_interrupt.o := n
UBSAN_SANITIZE_interrupt.o := n
However, nobody has noticed the functional change in the past three
years, so they were unneeded.
Signed-off-by: Masahiro Yamada <masahiroy@kernel.org>
---
arch/powerpc/kernel/Makefile | 3 ---
1 file changed, 3 deletions(-)
Comments
+To: Daniel Axtens Maybe, we should check if the issue fixed by 2f26ed1764b42a8c40d9c48441c73a70d805decf came back. On Fri, Feb 16, 2024 at 10:55 PM Masahiro Yamada <masahiroy@kernel.org> wrote: > > Commit ab1a517d55b0 ("powerpc/syscall: Rename syscall_64.c into > interrupt.c") missed to update these three lines: > > GCOV_PROFILE_syscall_64.o := n > KCOV_INSTRUMENT_syscall_64.o := n > UBSAN_SANITIZE_syscall_64.o := n > > To restore the original behavior, we could replace them with: > > GCOV_PROFILE_interrupt.o := n > KCOV_INSTRUMENT_interrupt.o := n > UBSAN_SANITIZE_interrupt.o := n > > However, nobody has noticed the functional change in the past three > years, so they were unneeded. > > Signed-off-by: Masahiro Yamada <masahiroy@kernel.org> > --- > > arch/powerpc/kernel/Makefile | 3 --- > 1 file changed, 3 deletions(-) > > diff --git a/arch/powerpc/kernel/Makefile b/arch/powerpc/kernel/Makefile > index 2919433be355..72d1cd6443bc 100644 > --- a/arch/powerpc/kernel/Makefile > +++ b/arch/powerpc/kernel/Makefile > @@ -191,9 +191,6 @@ GCOV_PROFILE_kprobes-ftrace.o := n > KCOV_INSTRUMENT_kprobes-ftrace.o := n > KCSAN_SANITIZE_kprobes-ftrace.o := n > UBSAN_SANITIZE_kprobes-ftrace.o := n > -GCOV_PROFILE_syscall_64.o := n > -KCOV_INSTRUMENT_syscall_64.o := n > -UBSAN_SANITIZE_syscall_64.o := n > UBSAN_SANITIZE_vdso.o := n > > # Necessary for booting with kcov enabled on book3e machines > -- > 2.40.1 >
Masahiro Yamada <masahiroy@kernel.org> writes: > +To: Daniel Axtens Unfortunately dja doesn't work on the kernel anymore. > Maybe, we should check if the issue fixed by > 2f26ed1764b42a8c40d9c48441c73a70d805decf > came back. That crash is specific to Power8, which probably no one is running syzkaller on anymore. If I enable KCOV and boot with 1T segments disabled (to make it easier to trigger the bug) it crashes similarly to the report in that commit. > On Fri, Feb 16, 2024 at 10:55 PM Masahiro Yamada <masahiroy@kernel.org> wrote: .. >> To restore the original behavior, we could replace them with: >> >> GCOV_PROFILE_interrupt.o := n >> KCOV_INSTRUMENT_interrupt.o := n >> UBSAN_SANITIZE_interrupt.o := n But just putting those back isn't actually enough to fix it, the code has changed and there are other places that need KCOV disabled on P8. So I'm not sure how to handle this one. I guess I might just take it and then make a todo to fix the KCOV problems later. cheers
diff --git a/arch/powerpc/kernel/Makefile b/arch/powerpc/kernel/Makefile index 2919433be355..72d1cd6443bc 100644 --- a/arch/powerpc/kernel/Makefile +++ b/arch/powerpc/kernel/Makefile @@ -191,9 +191,6 @@ GCOV_PROFILE_kprobes-ftrace.o := n KCOV_INSTRUMENT_kprobes-ftrace.o := n KCSAN_SANITIZE_kprobes-ftrace.o := n UBSAN_SANITIZE_kprobes-ftrace.o := n -GCOV_PROFILE_syscall_64.o := n -KCOV_INSTRUMENT_syscall_64.o := n -UBSAN_SANITIZE_syscall_64.o := n UBSAN_SANITIZE_vdso.o := n # Necessary for booting with kcov enabled on book3e machines