Received: by 2002:a05:7412:f690:b0:e2:908c:2ebd with SMTP id ej16csp483199rdb; Thu, 19 Oct 2023 09:42:49 -0700 (PDT) X-Google-Smtp-Source: AGHT+IE+MobZ9iVuuLGWpZc0VHzw98vEW6l+Wf3x0/9owHtmaWM/oOKaYuT+PXImFGLOFC0OTXtR X-Received: by 2002:a17:902:d40b:b0:1c7:443d:7412 with SMTP id b11-20020a170902d40b00b001c7443d7412mr2348569ple.26.1697733768963; Thu, 19 Oct 2023 09:42:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697733768; cv=none; d=google.com; s=arc-20160816; b=MyjMi9Wr3eKMHou0ycg1W/AugQnx7QyVFWFF8JY6evN3Hr2yVMAOW8XwDvoZaoBVbQ EdbmcvXepmqUgBLznTfiTn6+qpYS6HytKm5A+J7km4VcvO5JhaYmimupIXEkB+ViCAGx OrkYaM9CpZm1+qKrAnSBjEiCBBJRorJ3X7nzJjFodk1LkednoMFidd4ME9uTszvyJpFH spcTGDID/g3v15csjMQG8Tmb1OIg+NEEGQEv1fnhwwH1Fy/XNZe77o/j7bqknRHlRsNw Q/B8nthvwnO4eAmozhgH6QB2H8IKye9aq8ORgi5ofl4kU8/QeKq5zsBqWm1SFqqLUmNz L9xg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=tUK/BrdQcwQY9gdclqRv95XEOEJWwDR7/qaNUuduvq4=; fh=SuXmAD7oK+w1l9RPeVBXOqMpDhxRx7ajLJCNysmcDQI=; b=ElWRQx7nhS74GYV6l1NxLOqlbaURcA1cmZi/w5XraD3c2ynG7wQZMKD1eMknfZP/yN AHc+7t5GgnHQnTwNGDjYEr0HMtSKnxdn7Ssk/DY/sT1CDWw9U7aP8jyBlvnjTLvHUrd5 qWoBeO3GYwbpCcdg+0zpb1PYVw04wuASS1WnEY82LhSsDL80MDCov5dzh3nH5wBGz3Jg k/HXlbduYnvGD+920dVs/dIH/Tgpd+CxU3pPoXzrn/8uPDzSuW9+wpTpgDeD4ZZb4dTZ 6hWdhDU5DX3xWRShtPPczSI/NcM04TAJT8BXUxObx0wTJEj3aUWeXYPGxUg61u29wXrA NyHw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=DS01mPqG; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [23.128.96.33]) by mx.google.com with ESMTPS id d12-20020a170902c18c00b001ca0cf2582fsi2480545pld.410.2023.10.19.09.42.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 19 Oct 2023 09:42:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) client-ip=23.128.96.33; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=DS01mPqG; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id 9633F803771A; Thu, 19 Oct 2023 09:42:45 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233034AbjJSQmp (ORCPT + 99 others); Thu, 19 Oct 2023 12:42:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49652 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232326AbjJSQmo (ORCPT ); Thu, 19 Oct 2023 12:42:44 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3B6C611B for ; Thu, 19 Oct 2023 09:42:43 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8357EC433C7; Thu, 19 Oct 2023 16:42:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1697733762; bh=rF0BRiX64t8aoWsH1ntm/CUWz4Tnl30Pg+AbeCttr24=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=DS01mPqGmfuhLWNvjote86j5gw4Ko02cL/UyQ1NTYfMWi5O2oTxgWBVVIUljoRKyf ZgWU3BaeocNScdBebIbotL7+mFqVQuoRh5SI4ZIhgZ1qMVgruChmKVzIQKyjrG0GOb /w3E7qydPb9dI49Fm/1SSB8ToskWgfR3qyhW3JirWH3bVKTqoSjLJDetuyRbHZqrT8 jyiNZtfNYfqanOsgSgE2pzklHYKlYETkDaiS8dhRgqK3GOpMB8h46yIEj/VfLsBIlO 3piYfTXhlGAXW9uIl4b4x4bjXeplzrHKa6RhOorHrUYD/KmxdL2pfhgWoTMxdBAulS qdd8eUhGLq5Dw== Date: Thu, 19 Oct 2023 09:42:40 -0700 From: Josh Poimboeuf To: Andy Shevchenko Cc: Jan Kara , Nathan Chancellor , Nick Desaulniers , Kees Cook , Ferry Toth , Linus Torvalds , linux-fsdevel@vger.kernel.org, linux-ext4@vger.kernel.org Subject: Re: [GIT PULL] ext2, quota, and udf fixes for 6.6-rc1 Message-ID: <20231019164240.lhg5jotsh6vfuy67@treble> References: <20231018184613.tphd3grenbxwgy2v@quack3> <20231019101854.yb5gurasxgbdtui5@quack3> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Thu, 19 Oct 2023 09:42:45 -0700 (PDT) On Thu, Oct 19, 2023 at 05:44:30PM +0300, Andy Shevchenko wrote: > So, what I have done so far. > 1) I have cleaned ccaches and stuff as I used it to avoid collisions; > 2) I have confirmed that CONFIG_DEBUG_LIST affects boot, the repo > I'm using is published here [0][1]; > 3) reverted quota patches until before this merge ([2] - last patch), > still boots; > 4) reverted disabling of CONFIG_DEBUG_LIST [2], doesn't boot; > 5) okay, rebased on top of merge, i.e. 1500e7e0726e, with DEBUG_LIST [3], > doesn't boot; > 6) rebased [3] on one merge before, i.e. 63580f669d7f [4], voilĂ  -- it boots!; > > And (tadaam!) I have had an idea for a while to replace GCC with LLVM > (at least for this test), so [0] boots as well! > > So, this merge triggered a bug in GCC, seems like... And it's _the_ merge > commit, which is so-o weird! I'm not really a compiler person, but IMO it's highly unlikely to be a GCC bug unless you can point to the bad code generation. If CONFIG_DEBUG_LIST is triggering it, it's most likely some kind of memory corruption, in which case seemingly random events can trigger the detection of it (or lack thereof). Any chance it boots with the following? diff --git a/include/linux/bug.h b/include/linux/bug.h index 348acf2558f3..29e9e3498902 100644 --- a/include/linux/bug.h +++ b/include/linux/bug.h @@ -84,7 +84,7 @@ static inline __must_check bool check_data_corruption(bool v) { return v; } if (corruption) { \ if (IS_ENABLED(CONFIG_BUG_ON_DATA_CORRUPTION)) { \ pr_err(fmt, ##__VA_ARGS__); \ - BUG(); \ + WARN_ON(1); \ } else \ WARN(1, fmt, ##__VA_ARGS__); \ } \ diff --git a/include/linux/list_bl.h b/include/linux/list_bl.h index ae1b541446c9..395c4f5d8aa6 100644 --- a/include/linux/list_bl.h +++ b/include/linux/list_bl.h @@ -25,7 +25,7 @@ #endif #ifdef CONFIG_DEBUG_LIST -#define LIST_BL_BUG_ON(x) BUG_ON(x) +#define LIST_BL_BUG_ON(x) WARN_ON(x) #else #define LIST_BL_BUG_ON(x) #endif