Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp3081822ybi; Mon, 17 Jun 2019 16:11:12 -0700 (PDT) X-Google-Smtp-Source: APXvYqxJkp6vA3y55LQ0c8wyOCz+2Mlsd6YlUXIOKgVQelPNmTqvgPaXZG80J5CBNyQxLPqAcf7R X-Received: by 2002:a17:902:8d92:: with SMTP id v18mr87826291plo.211.1560813072819; Mon, 17 Jun 2019 16:11:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560813072; cv=none; d=google.com; s=arc-20160816; b=mXJDuYouwUsdO3mDWaHTbczL0jCPJScxLZH+1iinCIxznJU/+bSD9EkGK8zKh+ev5I 7qYz+P7Q3wiFjhpx+4FSG/ZH7ArVL4GzMdQdH8Qo8l5q763wgIKnW3648hFI5N/dBtju p0vzxOWYVD0tEuIVoKteb+zmEBeGUIa44izQEyfm66VH2BgQSj7z4e8x4nFblC4P+xDt 0OSCAv4jGPvfUTR9jqBjB/4AqDcwY4KuOoEBI4ZPMe8eEH47UZwdm2xk4SiPJXaCe60Z qbQAt68zejOxAk90UQK9xgwp3Z7tu30OeEor2qwYrFWAFfogV2S/xWIIOHZr5hU49NcO RRxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=PcO2LbxJiT0GgYDAcBSLKyyVi9YEIzgAXSAgHHpckJU=; b=YmxYL18nJ6lMYfebBP0C8bJZaShk4r4iC4v2x217sPtyH0nFWLtaL+friqOCR6PVnY 0D7snQuUXWmz1jihRHZC10f+ZYy7rLEOmtDB7DXus0aJd8XPiOwcjAMu8O9vYi/vVR/0 sjbn1QwaPJE6/mdhEe6r1q7SMdO0MnWU8HOMVPtnYi0uxCaDMHBtI2KzGqUenZCJJZwW toHsa84ZJNcAV8Owk9G38ywdr9vz5oUhw8ZuKTU8rWGOi90qZKJh1LM9WBlu8gsC6xbw 5Ui56nWIohf5+ahzqy6D0mEUnemMT07EU7hfOarUVBXrSfYqCjG9fw5uBw2oUzrv6PnP RTRg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 36si11501753pgl.237.2019.06.17.16.10.57; Mon, 17 Jun 2019 16:11:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728555AbfFQXJY convert rfc822-to-8bit (ORCPT + 99 others); Mon, 17 Jun 2019 19:09:24 -0400 Received: from mail.kernel.org ([198.145.29.99]:52132 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726001AbfFQXJY (ORCPT ); Mon, 17 Jun 2019 19:09:24 -0400 Received: from gandalf.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7CA392089E; Mon, 17 Jun 2019 23:09:22 +0000 (UTC) Date: Mon, 17 Jun 2019 19:09:20 -0400 From: Steven Rostedt To: Alexei Starovoitov Cc: Arnd Bergmann , Ingo Molnar , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Yonghong Song , Martin KaFai Lau , Song Liu , Matt Mullins , Network Development , bpf , LKML Subject: Re: [PATCH] bpf: hide do_bpf_send_signal when unused Message-ID: <20190617190920.71c21a6c@gandalf.local.home> In-Reply-To: References: <20190617125724.1616165-1-arnd@arndb.de> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 17 Jun 2019 08:26:29 -0700 Alexei Starovoitov wrote: > On Mon, Jun 17, 2019 at 5:59 AM Arnd Bergmann wrote: > > > > When CONFIG_MODULES is disabled, this function is never called: > > > > kernel/trace/bpf_trace.c:581:13: error: 'do_bpf_send_signal' defined but not used [-Werror=unused-function] > > hmm. it should work just fine without modules. > the bug is somewhere else. From what I see, the only use of do_bpf_send_signal is within a #ifdef CONFIG_MODULES, which means that you will get a warning about a static unused when CONFIG_MODULES is not defined. In kernel/trace/bpf_trace.c we have: static void do_bpf_send_signal(struct irq_work *entry) [..] #ifdef CONFIG_MODULES [..] for_each_possible_cpu(cpu) { work = per_cpu_ptr(&send_signal_work, cpu); init_irq_work(&work->irq_work, do_bpf_send_signal); <-- on use of do_bpf_send_signal } [..] #endif /* CONFIG_MODULES */ The bug (really just a warning) reported is exactly here. -- Steve