Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp3894752rwr; Sat, 22 Apr 2023 14:49:28 -0700 (PDT) X-Google-Smtp-Source: AKy350Z7MJHyFvDlNw2q22peYufDATTEdsA34vrNpQW8zCAllYGKZCLzW2rQhYFPLpdnB2r076so X-Received: by 2002:a05:6a20:5496:b0:f1:f884:f0dd with SMTP id i22-20020a056a20549600b000f1f884f0ddmr11515768pzk.2.1682200167969; Sat, 22 Apr 2023 14:49:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1682200167; cv=none; d=google.com; s=arc-20160816; b=hM+IauPzpdLI5Y9EXqHFjkqeoyUDPciaF02qzmJ2c4iEoRufFepeonDRqHXk7IRrHR Yc9llOgQ62Po9E31X5dFp+B11lEvqTYm8EmGQvRdJmX9dlS34kRWjmehkGrwIpJDGfSR mekh9Fu5KxS73scy+fLMF5csDNscvvFdUYMWeOljEL0kfZY2Ly8nI3ZPZfCbByZxaQKT 2M29QIfcrVtJCZKz7938NjwLMCEdvKvmr8yCNSqtumsnfz3C7uYIN9PE3Rv6SkYw85Mz o7xxDAy6VialMtiOpRdNbW7x1p5lCONDgsii9zg0iVZILXFuh43xN+WCpO8+te20pwuV vZBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=9Bz+G4TDzURui8wj7gDOYcQx/EHKnHg7iKi4/xlX/ng=; b=jrW74QxcEXKDsNxBuck7mxddO9DrQOH1ATTFDXqDh3EJ6JpKj8ZMcEuHkv7C7R2iz4 b8W+wwBYDDFIPNf3raIzIDfWM9tnk1iDbfs9uSCGfdU22yCTmCj21xmhB/TDQs+jzqgQ K3b5+t8lxZRxOkxYPZUNZifmU2HAcdeAhAx7ULKVcbaHeDyAv0buD4Gu6K4QIg9IpDbO WZu6poMtY8xZsPLZozzbkXHMAd6+qSJ4tE14jKwWxAfEZ6cxuT7EZM+uyWotuHKC5w/B eZ7qOybOSfEUV85IAd1sEM8Tir5ipbaBcZUsTlwRDiq5UMzT+rulKkoPCWz/554cDWhi A2Rg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x24-20020a63db58000000b0050beb800603si4595644pgi.39.2023.04.22.14.49.16; Sat, 22 Apr 2023 14:49:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229783AbjDVVbB (ORCPT + 99 others); Sat, 22 Apr 2023 17:31:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60308 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229580AbjDVVbA (ORCPT ); Sat, 22 Apr 2023 17:31:00 -0400 Received: from elvis.franken.de (elvis.franken.de [193.175.24.41]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id DABC0198B; Sat, 22 Apr 2023 14:30:59 -0700 (PDT) Received: from uucp (helo=alpha) by elvis.franken.de with local-bsmtp (Exim 3.36 #1) id 1pqKoq-0004RI-00; Sat, 22 Apr 2023 23:30:56 +0200 Received: by alpha.franken.de (Postfix, from userid 1000) id 03F14C0135; Sat, 22 Apr 2023 23:30:42 +0200 (CEST) Date: Sat, 22 Apr 2023 23:30:42 +0200 From: Thomas Bogendoerfer To: Nathan Chancellor Cc: ndesaulniers@google.com, linux-mips@vger.kernel.org, linux-kernel@vger.kernel.org, llvm@lists.linux.dev, patches@lists.linux.dev, Naresh Kamboju Subject: Re: [PATCH v2 0/2] MIPS: Fix check_bugs() modpost warning Message-ID: <20230422213042.GA7318@alpha.franken.de> References: <20230419-mips-check_bugs-init-attribute-v2-0-60a7ee65d4bf@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230419-mips-check_bugs-init-attribute-v2-0-60a7ee65d4bf@kernel.org> User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW, SPF_HELO_PASS,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Apr 21, 2023 at 09:11:25AM -0700, Nathan Chancellor wrote: > Hi all, > > This series fixes a modpost warning visible in -next from check_bugs() > and helps avoid a potential, albeit unlikely, warning from > check_bugs_early(). > > --- > Changes in v2: > - Now two separate patches: one to avoid current check_bugs() warning > and one to avoid potential check_bugs_early() warning. > - Sink body of check_bugs_early() into setup_arch() directly, rather > than marking it as __init (Nick). > - Add Naresh's reported-by to patch 1, which came after v1 was sent. > - Reword commit messages to note that there is not a problem at run time > because check_bugs() and check_bugs_early(), while not marked __init, > are only called from __init functions; modpost does not know this > though, hence the warning. > - Link to v1: https://lore.kernel.org/r/20230419-mips-check_bugs-init-attribute-v1-1-91e6eed55b89@kernel.org > > --- > Nathan Chancellor (2): > MIPS: Mark check_bugs() as __init > MIPS: Sink body of check_bugs_early() into its only call site > > arch/mips/include/asm/bugs.h | 8 +------- > arch/mips/kernel/setup.c | 3 ++- > 2 files changed, 3 insertions(+), 8 deletions(-) > --- > base-commit: 6a8f57ae2eb07ab39a6f0ccad60c760743051026 > change-id: 20230419-mips-check_bugs-init-attribute-026103bdb255 > > Best regards, > -- > Nathan Chancellor series applied to mips-next. Thomas. -- Crap can work. Given enough thrust pigs will fly, but it's not necessarily a good idea. [ RFC1925, 2.3 ]