Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp710965pxj; Thu, 27 May 2021 09:55:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw99IMR+iFkAH9KOaxnJz3W2eB5J47OtlFEqsrxUOMv0N5OaAFjRJjUgjJT5jD4t5KIHKd1 X-Received: by 2002:a17:906:3b9b:: with SMTP id u27mr4713054ejf.62.1622134528882; Thu, 27 May 2021 09:55:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622134528; cv=none; d=google.com; s=arc-20160816; b=Zmvia+KjvVMpK9JuKZaTDw0WBkUu6BPeJoPYi6yjEyU+yjiG2WAir6PEJ84ewHt39e 0470bGTJr6D/q4xL4dfVW2ubGkfqScZm40ycSRlnl+SWHchoSMM2ZS2YycrwvLbmskRO iFh4Qmextb1d/FUnGGVWv4qfqk6/pKArW1AFcogifDf4rcAJrDo86NwZn4wWVBTzIm9Q iWg+H4ckK4wEcoeQ+skkLUg4v2rDfHnJwIkjn8016MiZA4v+ZeFrQIFbYiNcqWkcO+KX NEZanXnnQJBYafA5S2RGm+JeOE08hRA/KweWp4DiUiYc3Uy82yS4OnIyjUPLKWtCOMSd CHXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=2cs2h1IGaKF3eQXU5vtF6n2zadYN0HYx0FP76xxBNUw=; b=xWqcJpeL55CTvTPXyu2hJmSBiQa2UpL+Gr0yWvp7kO0CToF4FnYDbhdAumSoBE0hkw HKl3TNj7Pv9g8vKJ3f2a+d9+ewVtINYCS+bwydH8zqDUFObm+Yv2tFRNi7FuHggznYK2 5J6z5U0CckcOKACXgI09Z1JofFcU5DJY1NnkgamUDEyma4jPaGi/xfeaqTyj5Vtd05mn 8oEcoezvvUp6Z3nGhcpTzOfmm7KKmLu+ZVsDyKXVKKS/Io46TJ0miRq0wmWBw6cflqrK IB1l+YICskhtRjuI2qqDMudf3hjNNd5aLPlCbt+n3s9pjip2Dl0I4fd8oBQIrV+97LH9 H4tA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dc21si2600297edb.209.2021.05.27.09.55.04; Thu, 27 May 2021 09:55:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235252AbhE0O4R (ORCPT + 99 others); Thu, 27 May 2021 10:56:17 -0400 Received: from outbound-smtp30.blacknight.com ([81.17.249.61]:32952 "EHLO outbound-smtp30.blacknight.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229793AbhE0O4Q (ORCPT ); Thu, 27 May 2021 10:56:16 -0400 Received: from mail.blacknight.com (pemlinmail03.blacknight.ie [81.17.254.16]) by outbound-smtp30.blacknight.com (Postfix) with ESMTPS id ED38018024 for ; Thu, 27 May 2021 15:54:42 +0100 (IST) Received: (qmail 21500 invoked from network); 27 May 2021 14:54:42 -0000 Received: from unknown (HELO techsingularity.net) (mgorman@techsingularity.net@[84.203.23.168]) by 81.17.254.9 with ESMTPSA (AES256-SHA encrypted, authenticated); 27 May 2021 14:54:42 -0000 Date: Thu, 27 May 2021 15:54:41 +0100 From: Mel Gorman To: Andrii Nakryiko Cc: Andrew Morton , Christoph Hellwig , Arnaldo Carvalho de Melo , Michal Suchanek , Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , LKML , Jiri Olsa , Hritik Vijay , Linux-BPF , Linux-Net , Linux-MM Subject: Re: [PATCH v2] mm/page_alloc: Work around a pahole limitation with zero-sized struct pagesets Message-ID: <20210527145441.GE30378@techsingularity.net> References: <20210527120251.GC30378@techsingularity.net> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-15 Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 27, 2021 at 07:37:05AM -0700, Andrii Nakryiko wrote: > > This patch checks for older versions of pahole and only allows > > DEBUG_INFO_BTF_MODULES if pahole supports zero-sized per-cpu structures. > > DEBUG_INFO_BTF is still allowed as a KVM boot test passed with pahole > > Unfortunately this won't work. The problem is that vmlinux BTF is > corrupted, which results in module BTFs to be rejected as well, as > they depend on it. > > But vmlinux BTF corruption makes BPF subsystem completely unusable. So > even though kernel boots, nothing BPF-related works. So we'd need to > add dependency for DEBUG_INFO_BTF on pahole 1.22+. > While bpf usage would be broken, the kernel will boot and the effect should be transparent to any kernel build based on "make oldconfig". CONFIG_DEBUG_INFO_BTF defaults N so if that is forced out, it will be easily missed by a distribution kernel maintainer. Yes, users of BPF will be affected and it may generate bug reports but the fix will be to build with a working pahole. Breaking boot on the other hand is a lot more visible and hacking around this with a non-zero struct size has been shot down. -- Mel Gorman SUSE Labs