Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp5064589rwb; Wed, 17 Aug 2022 10:22:40 -0700 (PDT) X-Google-Smtp-Source: AA6agR7KKr3CYzcqxMNa7FEvVR2n5iEg7gWwAyjZIVM7HACVUsjN9susTUBXLN8fox2yGLtevvyE X-Received: by 2002:a17:907:2bd6:b0:730:a2f7:f885 with SMTP id gv22-20020a1709072bd600b00730a2f7f885mr17270170ejc.214.1660756960256; Wed, 17 Aug 2022 10:22:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660756960; cv=none; d=google.com; s=arc-20160816; b=RCygWpAhVFCbZVF4pWE1fnKESJVrggbOg+N2sHXEy0Y0V7UD9NcbhfJA4gIxM+u7bX 5vseeo1v7YPDSsQTOSeYF4ospSz/wKRjQVACCuVhjS+7MFc7MwPatIv/I/fWR8WFm0F9 hk2uuBKvlj5A6d6e4IT21V+JFFttslyRe5aXhfeEOPIyBtDZ8EP/KDPSG5qmvLZfeWEp MwMxIbpIIRxhzHOUulA+iuK03Z7OEIRazSI/ouJhap3VcpMGo4lBWZWYstdBohWAD43x /jyt7cpB5K9edULEgSEHNORWroP6B3MbECF1rMrfwrLYxFoCxmgu9etrf6/wxcq8o6ha 2q1A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:dkim-signature; bh=V3NBUo76d+nSkiXzGrnX3CxBe6y+rnd620DH//raoE8=; b=vvH3CoQAkoWOxW5cAp299hNLBuaMbaZe/ajGBQJTaUHNS72F3zJs7aodkwYxU0MW0u Lk/kLJJqM2GI/VzmibdIw38YVlf63I2qXbdaEf4Ir21KwkbWfkSOXTcqsFeZt4Bmcz/h 4E7xTLLgRNG4WmErYqoZv7FVwuvI+5ZJLhPq6yDJc3ScLZuRSPROXBoSYUUJtSYLf4CF wbRD/ZN6P5s05tSDSe9dlMNsko/aNqmANmRPz9+aAEqouWsjh0tE6HvLWWkZywFYz1zr o2Z65aIGYExDVkqV3lJY/Kl+etANQteqD/HuJNmWGFXo+WwNjOrzJ82DptlawvbLj/rk Q0Dg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=hvogyBn0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id lc20-20020a170906f91400b0073124736ee8si10654420ejb.156.2022.08.17.10.22.12; Wed, 17 Aug 2022 10:22:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=hvogyBn0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240818AbiHQQtN (ORCPT + 99 others); Wed, 17 Aug 2022 12:49:13 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39670 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240713AbiHQQtI (ORCPT ); Wed, 17 Aug 2022 12:49:08 -0400 Received: from mail-pf1-x44a.google.com (mail-pf1-x44a.google.com [IPv6:2607:f8b0:4864:20::44a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 467BA326C4 for ; Wed, 17 Aug 2022 09:49:04 -0700 (PDT) Received: by mail-pf1-x44a.google.com with SMTP id k9-20020aa79729000000b0052d4dd3e2aeso5223761pfg.0 for ; Wed, 17 Aug 2022 09:49:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:references:mime-version:message-id:in-reply-to :date:from:to:cc; bh=V3NBUo76d+nSkiXzGrnX3CxBe6y+rnd620DH//raoE8=; b=hvogyBn0sSM54fuD8N0P/mxmPgFGNdUD6dNtW+ddHvFycjAhLdzROp4c1SZIpbo00z Kz6clBm2pqns1I1DKHD+KMSjjsDxKCTd/E7a9Pp9VTs40VWfCBroMPJWfiY5R4nx+ZNR JBFWQeHXTVZDKgX2gTYjMG3D8HevTocU0/AY7hun/hd3JNdXm/RAsTtOJK3PvvGparZ8 mWBhyd+S11HN3qwTyjJNWS8kfhBfifgjx7KOVyZeT7gW1lMgH6lq9p2SLkl6WjVJEu+j SniOzJ60Oj9hXd16HZffDezHHroI1UR7TA8rGTDpQaUmmzK1PoUb4Mr2yky0NwPzIs6f GnTQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:references:mime-version:message-id:in-reply-to :date:x-gm-message-state:from:to:cc; bh=V3NBUo76d+nSkiXzGrnX3CxBe6y+rnd620DH//raoE8=; b=A7Dzs6EM1ol3qL5sXVaeHgHG2tJ/dsGcL6oql4PpgWPkfkLnawoSJuO1D4bBDYXVTJ dILwoSMts5d/eROOhTUGJea03SzImH37vedWQNPRHhnF8wqy3vl3pec4vstAjUIt1Y9J nf9OVf5wBRPZF5aroD2/QYRsX+yoM4a0osJlWJfCHm3OJ69uAla73Yg1VkiCEBj8gPRb eT8HuP5yUfjEISvW4Ie7EJ8wFwye1MniVjeWRx11SKw5WIl3MlfD693efy/0Ki72flc3 BH6S5a2kasd8ugYybPpE+KRwokq+DxRmPl4AtvM7rCWwbR7N18YbxLpTUbOvibW4BY9e wBQg== X-Gm-Message-State: ACgBeo1Ol4ykLbaswaj22cPM+GQUKzZvyogRtO/lsPgOuZYBypcSLvDP pmEkIP4tGIH/Em4BrSr9cX3G/zuEkW/7LXU= X-Received: from joefradley-custom-96.c.googlers.com ([fda3:e722:ac3:cc00:24:72f4:c0a8:831]) (user=joefradley job=sendgmr) by 2002:aa7:9f02:0:b0:52d:6ae1:d631 with SMTP id g2-20020aa79f02000000b0052d6ae1d631mr26893608pfr.41.1660754943688; Wed, 17 Aug 2022 09:49:03 -0700 (PDT) Date: Wed, 17 Aug 2022 09:48:50 -0700 In-Reply-To: <20220817164851.3574140-1-joefradley@google.com> Message-Id: <20220817164851.3574140-3-joefradley@google.com> Mime-Version: 1.0 References: <20220817164851.3574140-1-joefradley@google.com> X-Mailer: git-send-email 2.37.1.595.g718a3a8f04-goog Subject: [PATCH 2/2] kunit: no longer call module_info(test, "Y") for kunit modules From: Joe Fradley To: Jonathan Corbet , Brendan Higgins , David Gow Cc: Joe Fradley , kernel-team@android.com, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, kunit-dev@googlegroups.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Because KUnit test execution is not a guarantee with the kunit.enable parameter we want to be careful to only taint the kernel only if an actual test runs. Calling module_info(test, "Y") for every KUnit module automatically causes the kernel to be tainted upon module load. Therefore, we're removing this call and relying on the KUnit framework to taint the kernel or not. Signed-off-by: Joe Fradley --- include/kunit/test.h | 1 - 1 file changed, 1 deletion(-) diff --git a/include/kunit/test.h b/include/kunit/test.h index c958855681cc..f23d3954aa17 100644 --- a/include/kunit/test.h +++ b/include/kunit/test.h @@ -251,7 +251,6 @@ static inline int kunit_run_all_tests(void) #endif /* IS_BUILTIN(CONFIG_KUNIT) */ #define __kunit_test_suites(unique_array, ...) \ - MODULE_INFO(test, "Y"); \ static struct kunit_suite *unique_array[] \ __aligned(sizeof(struct kunit_suite *)) \ __used __section(".kunit_test_suites") = { __VA_ARGS__ } -- 2.37.1.595.g718a3a8f04-goog