From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id A2F38C021B1 for ; Wed, 19 Feb 2025 15:53:17 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 3EAD328023B; Wed, 19 Feb 2025 10:53:17 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 39C0E28022F; Wed, 19 Feb 2025 10:53:17 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 2633928023B; Wed, 19 Feb 2025 10:53:17 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 09D9A28022F for ; Wed, 19 Feb 2025 10:53:17 -0500 (EST) Received: from smtpin07.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id 47343141768 for ; Wed, 19 Feb 2025 15:53:05 +0000 (UTC) X-FDA: 83137137930.07.4EAE220 Received: from nyc.source.kernel.org (nyc.source.kernel.org [147.75.193.91]) by imf17.hostedemail.com (Postfix) with ESMTP id 15A224000D for ; Wed, 19 Feb 2025 15:53:02 +0000 (UTC) Authentication-Results: imf17.hostedemail.com; dkim=none; dmarc=fail reason="SPF not aligned (relaxed), No valid DKIM" header.from=arm.com (policy=none); spf=pass (imf17.hostedemail.com: domain of cmarinas@kernel.org designates 147.75.193.91 as permitted sender) smtp.mailfrom=cmarinas@kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1739980383; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=GUTcndNOKC+89GwttCq35IvrZXNnA0trjpzZM3h47wM=; b=a+jlml5qDZJcxdWpeLnHSrpRfD27J1TBkuRTmfCX5IM2zNBqP98JPIdS+iH8r2jBEV2ffN vi+UcJ/SqgdPp/ZBolYSgHgfges/wPLEr0Qxy06Cz7D1K2ZQQysLi8tcEnED55DjEb7nXm I82f1nR0Kzay/2sATyxa+gTgUcD+dvg= ARC-Authentication-Results: i=1; imf17.hostedemail.com; dkim=none; dmarc=fail reason="SPF not aligned (relaxed), No valid DKIM" header.from=arm.com (policy=none); spf=pass (imf17.hostedemail.com: domain of cmarinas@kernel.org designates 147.75.193.91 as permitted sender) smtp.mailfrom=cmarinas@kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1739980383; a=rsa-sha256; cv=none; b=RxkAaJd4aiIGVaES/mwzcWYU5AC0Vt/ki1o374ZhiaBGMs0c7zvnvAoCsfvSrJEs2oAGb3 7FckLiQ/seUQUpw04d0CPp9wSyNsDB+8QRHUbN2tHa1UWXk15YQOZ+LwNkKNQbYF7/5kAN /rYEdOyLyyHXxcZr9GLxZY56OxxcidA= Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by nyc.source.kernel.org (Postfix) with ESMTP id 6EBB9A42AB0; Wed, 19 Feb 2025 15:51:17 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D27E9C4CEDD; Wed, 19 Feb 2025 15:52:56 +0000 (UTC) Date: Wed, 19 Feb 2025 15:52:54 +0000 From: Catalin Marinas To: Dan Carpenter Cc: Yang Shi , Naresh Kamboju , Greg Kroah-Hartman , stable@vger.kernel.org, patches@lists.linux.dev, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, srw@sladewatkins.net, rwarsow@gmx.de, conor@kernel.org, hargar@microsoft.com, broonie@kernel.org, Linux Crypto Mailing List , linux-fsdevel@vger.kernel.org, linux-mm , Anders Roxell , Arnd Bergmann , Herbert Xu , willy@infradead.org, Pankaj Raghav , David Hildenbrand Subject: Re: [PATCH 6.6 000/389] 6.6.76-rc2 review Message-ID: References: <20250206155234.095034647@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Rspam-User: X-Stat-Signature: swbktoug4z3kzambwadhem4cbmibzguw X-Rspamd-Server: rspam05 X-Rspamd-Queue-Id: 15A224000D X-HE-Tag: 1739980382-695211 X-HE-Meta: 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 UPHoVcUy tFkWvLv2qvhW8xThFVvuaRLiPu7p8pLZWw61iy8rkWsjeeuiHQg0jdatXlkVy1RuXQuzArqi8p1h6SInqrNkymqycT5J+Pbq8beZUvArqt/5QUet5aOIs0OWXaeF0O2z0V+WPNgFR1b2f28YNGqpMTk6werTSBhvFcqVLfLh+j4Dv1YpBYYeHFxCR0fbiQG5wsH77vWbp+vxLEZT6lgCT+dQVIFWHvW5M79NuKL+7WUfQuedxc1u1E/8nHqB+6YMlCqS4OLAJhgga5/naUR5hl1RIwuuRjSnsFX+T6YJunmU9N6FwGmZHP2Rsu+M5NcoPePGwH/aM4h7Hkozh/PbABpmWPmSzIjIrpVd/b+7IS+68i8HAQZlR9vxZCxwuNfN7u+DBj8mC65FkEiGCXHsRuKwmcb1Yi77hWeND X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Hi Dan, On Wed, Feb 19, 2025 at 06:43:52PM +0300, Dan Carpenter wrote: > What's happening is that we backport the latest kselftests and run > them on the old kernels. This is a supported thing so kselftests > are supposed to be able to handle that. Yes, I do this occasionally as well (a single rootfs with the kselftests that I use with different kernels). > So we need to modify the testing/selftests/arm64/mte/check_hugetlb_options.c > to check if the feature is present and disable the test for older > kernels. I'm not worried about the test failing yet, we can solve it later, but rather the WARN_ON_ONCE() in the arm64 copy_highpage(). We should not trigger this condition since hugetlb vmas don't have VM_MTE_ALLOWED set, so PROT_MTE mappings should be refused and the test shouldn't get any mapping. I tried vanilla 6.6 and it trips over as well, so something wrong in how we handle MTE hugetlb pages. I'm looking into it. -- Catalin