Received: by 2002:a05:6358:bb9e:b0:b9:5105:a5b4 with SMTP id df30csp5171485rwb; Tue, 6 Sep 2022 20:51:04 -0700 (PDT) X-Google-Smtp-Source: AA6agR7XD4zrBTan96YTjsVXBUrgBGiCzANjSRu+CBqEgOygJ8mU00yjgmliwPRI4BldePsb37JK X-Received: by 2002:a17:907:a077:b0:770:8288:39e8 with SMTP id ia23-20020a170907a07700b00770828839e8mr595306ejc.204.1662522663913; Tue, 06 Sep 2022 20:51:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662522663; cv=none; d=google.com; s=arc-20160816; b=yNvbElerxqxRbYuR2WNHULs8A0iB9rM7UnJPvychvLGCK77q72gsCVuFYExlWYCaPZ FrVZ8X8JILt9C1pK2ds1/jnAYAY1SAYiPrQUAoxERwQf5PzDWjkPCXL9nY3r13qKan3W +OuR0PBuIkBYKM4NH+tDlncbqGJponcxX63DvinMNmCkoYHO/naTC44HUIlqMQvPhiN1 Wo+U7LtOSwUNcYRfp45R2tHURrNw2SJLol94nLTT7BKAzEtFVgY511IhI+cza1AuAQx2 aNlIKHAidqWkgUxxYqXO4Mxi3PHSOs1LxavzUaL034lx0sFpdvRwRQz05qozBu8roEvB gJ0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=lZhl4GKNh72f6ovup18O37psKeuslqnMIGiRFdPU76Q=; b=lXFTorKDVOn24fNAZIghmhtGefLkJJnQia/whRlwi45UqJtIW+IPhd6fZ+ayyn5Jqo X7oqz7K7Eq3GP7Z0NNycqHgLgl1S8LfJc8BQKHbQtkWkcDrMQetr1hiyx25xApu89839 IUlk17XEN+4clRszx+kuBZsJxYDD+9vgklR92xgW2unFV/K8kQExpIin+3iCCLVTwjut aWWTML7eArFac3//5uHjpmITEQsOtXdf8ju2LLNCQfwD1syCqXGFtaRWjTNzkc0rogjU knNHoNYF6OZ45+dUZ7NhQcrSqKLWLIlPsx6bPJ0j+8EIvP/97mE5I2KcI2MYclo8HZOT h8aA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=RCD3CfGk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id gs36-20020a1709072d2400b00741ee06f0e6si4201986ejc.416.2022.09.06.20.50.38; Tue, 06 Sep 2022 20:51:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=RCD3CfGk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229777AbiIGDGE (ORCPT + 99 others); Tue, 6 Sep 2022 23:06:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54672 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229523AbiIGDF6 (ORCPT ); Tue, 6 Sep 2022 23:05:58 -0400 Received: from mail-ed1-x532.google.com (mail-ed1-x532.google.com [IPv6:2a00:1450:4864:20::532]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D35F886B75; Tue, 6 Sep 2022 20:05:56 -0700 (PDT) Received: by mail-ed1-x532.google.com with SMTP id w2so17800006edc.0; Tue, 06 Sep 2022 20:05:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date; bh=lZhl4GKNh72f6ovup18O37psKeuslqnMIGiRFdPU76Q=; b=RCD3CfGkzkX2ogxVqAP1o0I0iO4u63lKMab7CUkWxpafhcP/27B/CzHvw89JugQLCE oviELWoh5CqMn+DaAkfeKeCSti6hEuOGl47tgpOZDRlMwHTmSRGnCg/5fPFo/rGAWoE9 AxXKE5FZJ01NTgbgIidsTJaKudhIdVIbNnjrO/aTIDWdHRY/YGg3safFxLdG/HDrNnr1 IAzuyILjxPMoWV27PelaY/9cHlX4Tf2PvZnoeslJmQIvh+KxqrG2XG6JE5DR7F6Btt5b Oo+7Fd1h9WLSlgRA2KvbZm2e8IpZT+DUMiC+XxPMa5zzGKgFK0LvmDrcoxH+z7aGqKkC mm6g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=lZhl4GKNh72f6ovup18O37psKeuslqnMIGiRFdPU76Q=; b=4Wfy97KwE52eaRB+6AduykI03l7D469AVr91IP9TF5yV4Fq65ho8yezpilh8Y2cpP/ My5dg5Ei0rsCFLO8EOLZKWB28ohYfPCX5GpJh4o4A3xlyEEHAbII4LZ8OlApFyP1Me2h CDEFWoMEj33RNVGNZYFNDC+ZsXiYk+etxdxi0tg9J/v1RL/bAU9x3i0tUm6PUswMQpDD WIHqLtImxuQCWQ/QX5Pt73Xx5vg5xPMKX/Fqh1wZNm+G5RZlTppVNblc1wqeO22ttHwX KliLMxMGGuTdRmyqDoe0aUMkYzGhbSUQ4LvRzwu79YkytshioNNAr6rjyPTV8Y7wC5+9 5Mmg== X-Gm-Message-State: ACgBeo063cfJcZVFZPHnFse2pZQJyNepWHlBfXbrS+7dGy9gGprjFdfw nAJ2UVx6jCnEpmZUXT7aGKjvom0hPkQkwxfp1x8= X-Received: by 2002:a05:6402:28cd:b0:448:3856:41a3 with SMTP id ef13-20020a05640228cd00b00448385641a3mr1275640edb.6.1662519955333; Tue, 06 Sep 2022 20:05:55 -0700 (PDT) MIME-Version: 1.0 References: <20220906165131.59f395a9@canb.auug.org.au> In-Reply-To: From: Alexei Starovoitov Date: Tue, 6 Sep 2022 20:05:44 -0700 Message-ID: Subject: Re: linux-next: build failure after merge of the slab tree To: Vlastimil Babka Cc: Stephen Rothwell , Daniel Borkmann , Alexei Starovoitov , Andrii Nakryiko , bpf , Networking , Hyeonggon Yoo <42.hyeyoo@gmail.com>, Linux Kernel Mailing List , Linux Next Mailing List , Marco Elver Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 6, 2022 at 11:37 AM Alexei Starovoitov wrote: > > On Tue, Sep 6, 2022 at 12:53 AM Vlastimil Babka wrote: > > > > On 9/6/22 08:51, Stephen Rothwell wrote: > > > Hi all, > > > > Hi, > > > > > After merging the slab tree, today's linux-next build (powerpc > > > ppc64_defconfig) failed like this: > > > > > > kernel/bpf/memalloc.c: In function 'bpf_mem_free': > > > kernel/bpf/memalloc.c:613:33: error: implicit declaration of function '__ksize'; did you mean 'ksize'? [-Werror=implicit-function-declaration] > > > 613 | idx = bpf_mem_cache_idx(__ksize(ptr - LLIST_NODE_SZ)); > > > | ^~~~~~~ > > > | ksize > > > > Could you use ksize() here? I'm guessing you picked __ksize() because > > kasan_unpoison_element() in mm/mempool.c did, but that's to avoid > > kasan_unpoison_range() in ksize() as this caller does it differently. > > AFAICS your function doesn't handle kasan differently, so ksize() should > > be fine. > > Ok. Will change to use ksize(). Just pushed the following commit to address the issue: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=1e660f7ebe0ff6ac65ee0000280392d878630a67 It will get to net-next soon.