Received: by 2002:a05:7412:31a9:b0:e2:908c:2ebd with SMTP id et41csp2714955rdb; Tue, 12 Sep 2023 09:52:57 -0700 (PDT) X-Google-Smtp-Source: AGHT+IF3zBGM5G2lUA4urvsS4Vm5TPTI1OcKDcHu3Dlc3kaCh6YNTRXSt4DGKy920w2ob6OfaK++ X-Received: by 2002:aa7:8881:0:b0:68a:3b25:50cc with SMTP id z1-20020aa78881000000b0068a3b2550ccmr367157pfe.30.1694537577593; Tue, 12 Sep 2023 09:52:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1694537577; cv=none; d=google.com; s=arc-20160816; b=w53WUpRKG44rQSrnFLtyBeLAQ1cioPn9ghTKsOgQFTxI1LVJQUswWmxZLD/fuWE/Jy 98Rq1M+Ap7rdDmpckUjFWmxU6FjxXQwIAkXmXv3J6xo8Rv/D60AWqjDyXOIGxpLV4bgm 0B8KzhRXXdzjLqwKTAYwr/GvKS9qZ0EEXnCGGYBNfAMLQvEN3jjUCJaBGN/ajprwklu3 ZmF6GtSskbt+vLvuLfEk2XpCyxncP4aF1+btxagqNRT8dijmxpgPPllB/cD/vCW5c6Le nGsMRTGVZk2Ql1fQVI31HpzIuU/H5ykASqPRQkYZPiODR7LMXurpdenz9DEQmT6u7IBl vqWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:reply-to:message-id:subject:cc:to:from:date :dkim-signature:dkim-signature; bh=Q9JhXdCy9bma9ysFoTsLUThteBCBnpRHj2yaGJinfGk=; fh=Y6XTGja2plNCSApTQrUTvObBawh2RqNHzs+KMlZoZO4=; b=QPVFpQy3qrKj3FjrdbQS54c3XfBTZ+dr8ydzHGRBDP9UvgUaKUKUzxy2OWZs6BOxEU QLjGxSFRkTbkGXArXIZ/tx5KdYxvJdrMaKEh15FHH/PE0LBZifWhJ3q41UeLZH1lIKQ7 5EmSClTPBsih49GbUieHmDw1n/pfRJUcIiopNIhtcb/HA74xh1CqSAbIaGWq79bEywzc YmNRaZjb8UPyBftjbBvm2Y7KHuSOKbyBuwdLbZZVpaPd/VswNEDU1W0QE9PPKjRYxUjn ymL5yl5pfcqwCcDmZhVeOFGPxNt0Ag0oHqQ1C4g3KZvr4FUGOQ7fV13ABN3Ju/G6UJUB yViA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=VYkHhBcM; dkim=neutral (no key) header.i=@suse.cz header.b=04wWBhxQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [2620:137:e000::3:3]) by mx.google.com with ESMTPS id bt5-20020a056a00438500b0068e30105664si8161920pfb.400.2023.09.12.09.52.56 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Sep 2023 09:52:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) client-ip=2620:137:e000::3:3; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=VYkHhBcM; dkim=neutral (no key) header.i=@suse.cz header.b=04wWBhxQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id 10EEC807EBAB; Tue, 12 Sep 2023 04:27:36 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234620AbjILL1c (ORCPT + 99 others); Tue, 12 Sep 2023 07:27:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40412 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234703AbjILL1J (ORCPT ); Tue, 12 Sep 2023 07:27:09 -0400 Received: from smtp-out1.suse.de (smtp-out1.suse.de [IPv6:2001:67c:2178:6::1c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F06431721; Tue, 12 Sep 2023 04:26:47 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id A6ECE212AE; Tue, 12 Sep 2023 11:26:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1694518006; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to: cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Q9JhXdCy9bma9ysFoTsLUThteBCBnpRHj2yaGJinfGk=; b=VYkHhBcM0IvTv46yVWaKjXaD0//taNU/FDwmuNbPONoAMsS1AqA9lDzgfku18SExnPfnyD 7nIp6THXuwChb6/Y/0lnjdw9BvtkeOIIGzuWwSDvHJRX317ymYSuC2xJcMeTvmZZ50skRy 1hcQ5NbqPEGWsEt4HUsrKynR51YIBws= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1694518006; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to: cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Q9JhXdCy9bma9ysFoTsLUThteBCBnpRHj2yaGJinfGk=; b=04wWBhxQxVCu/twy5dtDl1Hy4zvhyNcCZcdG/T3pkefrQSZ4g8phMBMl3+H0ft4BwBeHBX 4soc1wm1Gwu+hpCw== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 7CF37139DB; Tue, 12 Sep 2023 11:26:46 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id wRCeHfZKAGWIdAAAMHmgww (envelope-from ); Tue, 12 Sep 2023 11:26:46 +0000 Date: Tue, 12 Sep 2023 13:20:11 +0200 From: David Sterba To: Stephen Rothwell Cc: Linux Kernel Mailing List , Linux Next Mailing List Subject: Re: linux-next: build warnings after merge of the btrfs tree Message-ID: <20230912112011.GB20408@suse.cz> Reply-To: dsterba@suse.cz References: <20230912104646.3a9140f7@canb.auug.org.au> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230912104646.3a9140f7@canb.auug.org.au> User-Agent: Mutt/1.5.23.1-rc1 (2014-03-12) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Tue, 12 Sep 2023 04:27:37 -0700 (PDT) X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email On Tue, Sep 12, 2023 at 10:46:46AM +1000, Stephen Rothwell wrote: > Hi all, > > After merging the btrfs tree, today's linux-next build (powerpc > ppc64_defconfig) produced these warnings: > > In file included from include/linux/swab.h:5, > from include/uapi/linux/byteorder/big_endian.h:14, > from include/linux/byteorder/big_endian.h:5, > from arch/powerpc/include/uapi/asm/byteorder.h:14, > from include/asm-generic/bitops/le.h:6, > from arch/powerpc/include/asm/bitops.h:336, > from include/linux/bitops.h:68, > from fs/btrfs/extent_io.c:3: > In function 'btrfs_disk_key_to_cpu', > inlined from 'btrfs_item_key_to_cpu' at fs/btrfs/accessors.h:648:2, > inlined from 'fiemap_find_last_extent_offset' at fs/btrfs/extent_io.c:2804:2, > inlined from 'extent_fiemap' at fs/btrfs/extent_io.c:2879:8: > include/uapi/linux/swab.h:128:28: warning: 'disk_key.objectid' may be used uninitialized [-Wmaybe-uninitialized] > 128 | #define __swab64(x) (__u64)__builtin_bswap64((__u64)(x)) > | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > include/uapi/linux/byteorder/big_endian.h:33:26: note: in expansion of macro '__swab64' > 33 | #define __le64_to_cpu(x) __swab64((__force __u64)(__le64)(x)) > | ^~~~~~~~ > include/linux/byteorder/generic.h:87:21: note: in expansion of macro '__le64_to_cpu' > 87 | #define le64_to_cpu __le64_to_cpu > | ^~~~~~~~~~~~~ > fs/btrfs/accessors.h:622:25: note: in expansion of macro 'le64_to_cpu' > 622 | cpu->objectid = le64_to_cpu(disk->objectid); > | ^~~~~~~~~~~ > In file included from fs/btrfs/extent_io.c:34: > fs/btrfs/accessors.h: In function 'extent_fiemap': > fs/btrfs/accessors.h:645:31: note: 'disk_key.objectid' was declared here > 645 | struct btrfs_disk_key disk_key; > | ^~~~~~~~ > In function 'fiemap_find_last_extent_offset', > inlined from 'extent_fiemap' at fs/btrfs/extent_io.c:2879:8: > fs/btrfs/extent_io.c:2805:33: warning: 'disk_key.type' may be used uninitialized [-Wmaybe-uninitialized] > 2805 | if (key.objectid != ino || key.type != BTRFS_EXTENT_DATA_KEY) { > fs/btrfs/accessors.h: In function 'extent_fiemap': > fs/btrfs/accessors.h:645:31: note: 'disk_key.type' was declared here > 645 | struct btrfs_disk_key disk_key; > | ^~~~~~~~ > > I don't really have any idea what caused this (it *may* have been my > change from gcc v12 to v13?). I tried 12 and 13, no warnings on x86_64, however the report is on powerpc. If this is on a big endian host it could be a valid warning, we have an optmization where the on-disk format endianity matches CPU (little endian) then the structures btrfs_disk_key and btrfs_key are equivalent and no coversion is needed. There were some changes that might be related and newly added to for-next so we don't have any other reference point, I'll take a look.