Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp2423148rwl; Mon, 26 Dec 2022 14:52:34 -0800 (PST) X-Google-Smtp-Source: AMrXdXv6TppbbVqcVqDbL3ADleGwy8MA09Rwr0SPL1HpjlCswtEtZXo2WbW/m+w04mW5G6zcnaoa X-Received: by 2002:a17:902:da86:b0:186:865c:ea17 with SMTP id j6-20020a170902da8600b00186865cea17mr29974613plx.38.1672095154146; Mon, 26 Dec 2022 14:52:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672095154; cv=none; d=google.com; s=arc-20160816; b=E25dG/guRKOjNmV5atUk2yYBGKGqJsgyW8wyornHbl/r7Qv36Zp5kjyPh+NqqH1YFh wY7kYJiSJYmLo/cPddsHECjQ5+B8fpIQVTD4c4TriuFK+xSWTp5giP+L2S0B+zrqr5me PsUHx3litoPAcToIeRuCvxXqH94vHI/SHFhumP5CnAqX+nInIO3vRSTno42k4qvM6QJU XiNsfAtXwznAwH3/tD9p5cjfMBUNID8ICp9F06cZLlZ3XzkMn8947yvRPQgoDWlCZH0w 3oo/+eWWu/ElhOQyEUhK+tKR4HvahsvfShsH4GkugCxKmSMtIMB3QUhpAc2s4HkjnhhA 3qvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :content-language:references:cc:to:subject:user-agent:mime-version :date:message-id:dkim-signature:dkim-signature; bh=+3lTW8ppgkCOp0GPcOsAwQlom3Z3C11B2XXX3v40pes=; b=AmyWW6erElvkYF6O5lrSL1+S9nvuVFI/+HLQ+d0soyAE9ejCMYBIFzEd+sq27Q0lSa p8JHkkXt+tUSeEQZtiN0YKz3bF9+HznlRiimJkhIrJlPm+O8XXjhZ5yVhogX0wz+SsV9 qm8l2B90z1lwp1WAVnqgX3JDn5AEnBcuXmHYC0Nu02E8nikQomOX2b0+jbFzOdzWleXG 7oMt/y10pM/lXwSekJjJ/Nxos70mPnaNPhC9LqhHN5mu0xxN/LDKJjH13TmyqBh1yHtS 2LrM6yYysVFzrarLb8+CqA01l7EEIVnT6sqqytIq5vfiqcBAyxSJ6vKzE1RCvZ3Fxsb3 Y1YQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=bBNQjL4n; dkim=neutral (no key) header.i=@suse.cz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s17-20020a170902c65100b001910b23667fsi11584799pls.213.2022.12.26.14.52.25; Mon, 26 Dec 2022 14:52:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=bBNQjL4n; dkim=neutral (no key) header.i=@suse.cz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232489AbiLZWmh (ORCPT + 66 others); Mon, 26 Dec 2022 17:42:37 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45460 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232523AbiLZWmL (ORCPT ); Mon, 26 Dec 2022 17:42:11 -0500 Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 459E4273F for ; Mon, 26 Dec 2022 14:41:57 -0800 (PST) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id 0959720DF9; Mon, 26 Dec 2022 22:41:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1672094513; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=+3lTW8ppgkCOp0GPcOsAwQlom3Z3C11B2XXX3v40pes=; b=bBNQjL4nZkVxtePpM0w/TOnQkaE3jmnN30jHrd4zG/W4M1fUAHxKjLNrnZw8AHBl93ed6B dqbSVnp4UrJL42a3JXkZ1399V4Sd2gR6MBfTwxCTBtluHPp1sJfE+rZWpAtar5DTQ4l+8K ZVSUx4kI1aeM9UonvT7EHDqtEWGdFUA= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1672094513; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=+3lTW8ppgkCOp0GPcOsAwQlom3Z3C11B2XXX3v40pes=; b=aLmjKm3Fl7SqWyexfOjYSsrLVYUC/5kmZPACaJZ4RdcRRZT4gSQMiP6alJBhuSH5wIgfNU j+/cc8EpnGgIkcBg== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id C8FAC13456; Mon, 26 Dec 2022 22:41:52 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id JBHwLzAjqmPJRgAAMHmgww (envelope-from ); Mon, 26 Dec 2022 22:41:52 +0000 Message-ID: Date: Mon, 26 Dec 2022 23:41:52 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.6.1 Subject: Re: Linux 6.2-rc1 To: Linus Torvalds , Guenter Roeck , Jaegeuk Kim , Chao Yu Cc: Linux Kernel Mailing List , Peter Zijlstra , Nick Desaulniers , Kees Cook , Max Filippov , kasan-dev , Marco Elver References: <20221226195206.GA2626419@roeck-us.net> Content-Language: en-US From: Vlastimil Babka In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-5.5 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12/26/22 21:56, Linus Torvalds wrote: > On Mon, Dec 26, 2022 at 11:52 AM Guenter Roeck wrote: >> >> fs/f2fs/inline.c: In function 'f2fs_move_inline_dirents': >> include/linux/fortify-string.h:59:33: error: '__builtin_memset' pointer overflow between offset [28, 898293814] and size [-898293787, -1] [-Werror=array-bounds] >> fs/f2fs/inline.c:430:9: note: in expansion of macro 'memset' >> 430 | memset(dst.bitmap + src.nr_bitmap, 0, dst.nr_bitmap - src.nr_bitmap); >> | ^~~~~~ > > Well, that's unfortunate. > >> kernel/kcsan/kcsan_test.c: In function '__report_matches': >> kernel/kcsan/kcsan_test.c:257:1: error: the frame size of 1680 bytes is larger than 1536 bytes >> >> Bisect for both points to commit e240e53ae0abb08 ("mm, slub: add >> CONFIG_SLUB_TINY"). Reverting it on its own is not possible, but >> reverting the following two patches fixes the problem. >> >> 149b6fa228ed mm, slob: rename CONFIG_SLOB to CONFIG_SLOB_DEPRECATED >> e240e53ae0ab mm, slub: add CONFIG_SLUB_TINY > > No, I think CONFIG_SLUB_TINY should probably have a > > depends on !COMPILE_TEST > > or something like that instead. We can do that, although if things are on track to be fixed, maybe it's unnecessary? > It already has a > > depends on SLUB && EXPERT > > which is basically supposed to disable it for any normal builds, but > obviously allmodconfig will enable EXPERT etc anyway. > > That said, that f2fs case also sounds like this code triggers the > compiler being unhappy, so it might be worth having some clarification > from the f2fs people. > > I'm not sure what triggers that problem just on powerpc, and only with > that CONFIG_SLUB_TINY option. Maybe those make_dentry_ptr_inline() and I think it's because e240e53ae0ab makes KASAN depend on !SLUB_TINY, because KASAN does "select SLUB_DEBUG" which depends on !SLUB_TINY; but kconfig will still honor the select even with dependencies unmet and only warn about it (and the build would fail) so I prevented it this way. (maybe instead SLUB_TINY depend on !KASAN would have worked better in retrospect?) So now allmodconfig will have SLUB_TINY enabled and KASAN thus disabled. On the other hand there are configs like KCSAN and KMSAN that depend on !KASAN, so with KASAN disabled, now those become enabled. KCSAN becoming enabled would be relevant for the xtensa problem. For the powerpc issue I'm not sure as the macro expansion lines for include/linux/fortify-string.h in Guenter's report make no sense in my 6.2-rc1 checkout for some reason. But the header does test for KASAN and KMSAN at several points, to perhaps it's also related to that? > make_dentry_ptr_block() functions don't get inlined in that case, and > that then makes gcc not see the values for those bitmap sizes? > > Does changing the "inline" to "always_inline" perhaps fix the compiler > unpahhiness too? >