From nobody Fri Dec 19 17:51:25 2025 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 27B56C43217 for ; Mon, 14 Nov 2022 11:47:57 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236728AbiKNLrz (ORCPT ); Mon, 14 Nov 2022 06:47:55 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41258 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236597AbiKNLqw (ORCPT ); Mon, 14 Nov 2022 06:46:52 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B598E21E23 for ; Mon, 14 Nov 2022 03:45:19 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 17ED76109A for ; Mon, 14 Nov 2022 11:45:19 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2A9FEC433B5; Mon, 14 Nov 2022 11:45:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1668426318; bh=UhlkqTA9nzxaD+YdFYt+90TEESiE0LrCL59k48oC154=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=MbgUD/gSsv3dYvhc9g1nrt6qvj/Wzy72bW4GCQzXLUMoMgzlaR+gj88EtQhtFcJs8 6EQKgZHjYEeRH2lE5e9qGTLqnzTPyzx88WZPVjeNzsiHhsS9xvjh6ougVjwpxnypEx eUASlx0KkFunf5tE6ONzo4UcB7QnlVaYA6H2a9nGYjOTv6jE34rhgV80eC7TZq0GeT xRqkR00qWYh7oDjHrPeByf9jSOr3rK/+5hOvAYKGiFaw6vzj0UfxaHrsNLEf7Lots9 uRf410vzaq3NsJTOCumxjUsoesmVP61D4i4YAM7aKC4A/oAztOwKkJBlnF3s2DLL4t DBLntunTjp/6A== From: "Jiri Slaby (SUSE)" To: linux-kernel@vger.kernel.org Cc: Andi Kleen , Andy Lutomirski , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , "H. Peter Anvin" , x86@kernel.org, Martin Liska , Jiri Slaby Subject: [PATCH 33/46] x86/vdso, lto: Disable gcc LTO for the vdso Date: Mon, 14 Nov 2022 12:43:31 +0100 Message-Id: <20221114114344.18650-34-jirislaby@kernel.org> X-Mailer: git-send-email 2.38.1 In-Reply-To: <20221114114344.18650-1-jirislaby@kernel.org> References: <20221114114344.18650-1-jirislaby@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" From: Andi Kleen Disable gcc LTO for the vdso. It's not really useful here and causes various strange problems. Cc: Andy Lutomirski Cc: Thomas Gleixner Cc: Ingo Molnar Cc: Borislav Petkov Cc: Dave Hansen Cc: "H. Peter Anvin" Cc: x86@kernel.org Signed-off-by: Andi Kleen Signed-off-by: Martin Liska Signed-off-by: Jiri Slaby --- arch/x86/entry/vdso/Makefile | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/x86/entry/vdso/Makefile b/arch/x86/entry/vdso/Makefile index 3e88b9df8c8f..e8099ee163a0 100644 --- a/arch/x86/entry/vdso/Makefile +++ b/arch/x86/entry/vdso/Makefile @@ -3,6 +3,8 @@ # Building vDSO images for x86. # =20 +KBUILD_CFLAGS +=3D $(DISABLE_LTO_GCC) + # Absolute relocation type $(ARCH_REL_TYPE_ABS) needs to be defined before # the inclusion of generic Makefile. ARCH_REL_TYPE_ABS :=3D R_X86_64_JUMP_SLOT|R_X86_64_GLOB_DAT|R_X86_64_RELAT= IVE| --=20 2.38.1