From nobody Thu Apr 9 07:42:50 2026 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id BFF69C43217 for ; Thu, 3 Nov 2022 15:11:14 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232075AbiKCPLN (ORCPT ); Thu, 3 Nov 2022 11:11:13 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50806 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231866AbiKCPKk (ORCPT ); Thu, 3 Nov 2022 11:10:40 -0400 X-Greylist: delayed 378 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Thu, 03 Nov 2022 08:09:48 PDT Received: from mx-rz-1.rrze.uni-erlangen.de (mx-rz-1.rrze.uni-erlangen.de [IPv6:2001:638:a000:1025::14]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 00E6310FC5; Thu, 3 Nov 2022 08:09:48 -0700 (PDT) Received: from mx-rz-smart.rrze.uni-erlangen.de (mx-rz-smart.rrze.uni-erlangen.de [IPv6:2001:638:a000:1025::1e]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by mx-rz-1.rrze.uni-erlangen.de (Postfix) with ESMTPS id 4N36TC5rTFz8svY; Thu, 3 Nov 2022 16:03:27 +0100 (CET) Authentication-Results: mx-rz-1.rrze.uni-erlangen.de; dkim=none; dkim-atps=neutral X-Virus-Scanned: amavisd-new at boeck5.rrze.uni-erlangen.de (RRZE) X-RRZE-Flag: Not-Spam X-RRZE-Submit-IP: 10.188.34.179 Received: from uni-erlangen.de (i4laptop28.informatik.uni-erlangen.de [10.188.34.179]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: U2FsdGVkX18CxjfIGbKY7LqpaFakzBHDNDrAmmghoCk=) by smtp-auth.uni-erlangen.de (Postfix) with ESMTPSA id 4N36T92D2Lz8sgp; Thu, 3 Nov 2022 16:03:25 +0100 (CET) From: Jonas Rabenstein To: Jiri Olsa Cc: Jonas Rabenstein , Song Liu , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Steven Rostedt , Masami Hiramatsu , bpf@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] bpf: mark get_entry_ip as __maybe_unused Date: Thu, 3 Nov 2022 16:03:03 +0100 Message-Id: <20221103150303.974028-1-rabenstein@cs.fau.de> X-Mailer: git-send-email 2.37.4 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" Commit c09eb2e578eb1668bbc ("bpf: Adjust kprobe_multi entry_ip for CONFIG_X86_KERNEL_IBT") introduced the get_entry_ip() function. Depending on CONFIG_X86_KERNEL_IBT it is a static function or only a macro definition. The only user of this symbol so far is in kprobe_multi_link_handler() if CONFIG_FPROBE is enabled. If CONFIG_FROBE is not set, the symbol is not used and - depending on CONFIG_X86_KERNEL_IBT - a warning for get_entry_ip() is emitted. To solve this, the function should be marked as __maybe_unused. Signed-off-by: Jonas Rabenstein --- kernel/trace/bpf_trace.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c index f2d8d070d024..19131aae0bc3 100644 --- a/kernel/trace/bpf_trace.c +++ b/kernel/trace/bpf_trace.c @@ -1032,7 +1032,7 @@ static const struct bpf_func_proto bpf_get_func_ip_pr= oto_tracing =3D { }; =20 #ifdef CONFIG_X86_KERNEL_IBT -static unsigned long get_entry_ip(unsigned long fentry_ip) +static unsigned long __maybe_unused get_entry_ip(unsigned long fentry_ip) { u32 instr; =20 --=20 2.37.4