From patchwork Thu Jun 22 17:13:44 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arnd Bergmann X-Patchwork-Id: 106225 Delivered-To: patch@linaro.org Received: by 10.140.91.2 with SMTP id y2csp232271qgd; Thu, 22 Jun 2017 10:15:28 -0700 (PDT) X-Received: by 10.99.3.15 with SMTP id 15mr3635278pgd.99.1498151728681; Thu, 22 Jun 2017 10:15:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1498151728; cv=none; d=google.com; s=arc-20160816; b=O/kvqK0NvvKqKWte+4TtQOb60aSnv4/CTqvDYLXwDQIdn92QTJkRRhN1h6vo5XLD2j Z7537gHGalrVARo8Opzxw+f+gOGxJYf1t6t0hYf5tae87qO5HfIqcVrYngXl50qX+m7c CA5raLbQqn+kqff+KbxeoNH1S2F04GoFsrDIX1tn4MkcEpIU5lnb+SZVSyl9BLvwDVOl SqiIzIKNy+Svh6EKw28pX6u/QK0d0GbFKgV/MQnOfzwuNAxhtHXpKapUdZGrDM6vtQWU 9cvg+NaZtSawdwlLCCfFmLuU6/bjA2dYyuN05XAhB6gU7GvMCdzOFAgCdMHM6IGGFYBN woEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=BoE1wPxv/GjOs39jxDhIP87enrO7EjfrHdvT2BFeq7k=; b=FInWOatHmKL9UhJbkbuNeK/YoEUZ917ceQdaEa6NZEt5Vv6y0lauAfDEH6otlgc8S5 TK1pbZR4yt8xe2xMsIp0pZn94MAJgrWtERmsPsD0Hj0uGfMSZRQgUg6oAHI3d9BhJsTu du8iMHzXBUQsJSH7I8xXOk1xEt+3f+jVdwiK+HfgIblXNQ9ML7KyA6QQz2o60xpV9D7v bpzJFNnWVq6dxFAnDKVteG3YKYHXQz/Qrky1h/ptN/09oBwbyAHOUNE5eYIAvZvWCBDy mUSXmLONWahGCW6NFRj2d28KinVFKDl9AGL7ATknHp5Fc0K22LZVHNCmLFGh9BiadQgs XrGA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f64si1487061pfj.383.2017.06.22.10.15.28; Thu, 22 Jun 2017 10:15:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753749AbdFVRPO (ORCPT + 25 others); Thu, 22 Jun 2017 13:15:14 -0400 Received: from mout.kundenserver.de ([217.72.192.75]:61751 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753719AbdFVRPK (ORCPT ); Thu, 22 Jun 2017 13:15:10 -0400 Received: from wuerfel.lan ([5.56.224.194]) by mrelayeu.kundenserver.de (mreue103 [212.227.15.145]) with ESMTPA (Nemesis) id 0LorgB-1dyUxE2Psp-00grpI; Thu, 22 Jun 2017 19:14:03 +0200 From: Arnd Bergmann To: Andrew Morton Cc: kasan-dev@googlegroups.com, Dmitry Vyukov , Alexander Potapenko , Andrey Ryabinin , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Arend van Spriel , Arnd Bergmann , Masahiro Yamada , Michal Marek , Kees Cook , Ingo Molnar , "David S . Miller" , linux-kbuild@vger.kernel.org, Samuel Thibault , Greg Kroah-Hartman , Jiri Slaby Subject: [PATCH v3 00/11] bring back stack frame warning with KASAN Date: Thu, 22 Jun 2017 19:13:44 +0200 Message-Id: <20170622171355.267192-1-arnd@arndb.de> X-Mailer: git-send-email 2.9.0 X-Provags-ID: V03:K0:2yIab0PMgddAaTqzMOoK6Xe0F57xx4rcO6rYUt0R/6C+Q3uuDZ5 2n5QV9Sjt6FD8dqWvECODJ2Y6ZHXI99wZqnG9zPxIopg+ypJlDTf6sC4CpYJb9XhXl6Wt5I 0jtIfj/L3L0aWjZJltwhktBGLcAxMVWZs2GfAdgfrtfk6stZQYYTIK2yBK40isAVBpqOD7O rwGHJG6ghYZlkHbrijh3Q== X-UI-Out-Filterresults: notjunk:1; V01:K0:XNOnTTln2jU=:AUrBglRehY76bjIYns7llu 7bcQiTyz22RjFMoguaZMJ01nmkU+BbpjKybpGeD3ThHempyZ7dp/L+1SnO+GTzOTm+9v2Fbnr U8gAJcP0KMBHsMIJ9QnC/zwQYnV7SbiDcbi1Bu2Zj/hCaqJkEODcXaoy3VHNSc8Ek1oyw4FYi 0abgBv5uthuOP64ntZiunl3bFffEw/F02sMuKxeDPinerFgxP+H2yy5WQ/iqdLUZ5hb+URpKB 9xuPy16R0lriA4O3qzMOTftrasOj1mP1c6mUxuuCTF8URrfr/A0zvNutfRcMEAdjGKl+bYQji 7XK9U5earzq7oUOuG0oRZGRl8d6SkINvOYc4Q3l2S4ZF5ulOhvQWWTVRCCMuvCTxycdKi+E4u qgvvq2f+zTGTNl2W3Lzz9J7pVg0Stb0TuJexEJk/vmK6h+QXfRxGto8rTP/Tuw7cZmb5cmeBT MKqwvfoBYIUEnuUt8Bl2UXH7j1/A1v7GW/0iixwgK2UyJ4AYgAaSix1eN+ua7pVG0QLzNGdiJ ez2oc7872Dfa5Dq7Ei9Jlv9mYX8NwDRZKU8QIlVSnpl5bw2IZ5fAZ/xn5qMU4OyXo9AmNZhJ+ JUtzooylfsuaPbyq/VXZG9zkvD234OSl4KYoFGm5JmB8AUpOdkQ+wKs+o+FBIsI8YQyqWyq0s PAfLKu2mw6m4fW6hFwdRTuhIMC9thuvAxSobGCab7RRFWBmZoLf2Q9cT0/UjNR6Ic5Lw= Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is a new version of patches I originally submitted back in March [1], this time reducing the size of the series even further. This minimal set of patches only makes sure that we do get frame size warnings in allmodconfig for x86_64 and arm64 again, even with KASAN enabled. The changes this time are reduced to: - I'm introducing "noinline_if_stackbloat" and use it in a number of places that suffer from inline functions with local variables - netlink, as used in various parts of the kernel - a number of drivers/media drivers - a handful of wireless network drivers - a rework for the brcmsmac driver - -fsanitize-address-use-after-scope is moved to a separate CONFIG_KASAN_EXTRA option that increases the warning limit - CONFIG_KASAN_EXTRA is disabled with CONFIG_COMPILE_TEST, improving compile speed and disabling code that leads to valid warnings on gcc-7.0.1 - kmemcheck conflicts with CONFIG_KASAN_EXTRA Compared to the version 1, I no longer have patches to fix all the CONFIG_KASAN_EXTRA warnings: - READ_ONCE/WRITE_ONCE cause problems in lots of code - typecheck() causes huge problems in a few places - many more uses of noinline_if_stackbloat And compared to version 2, I have rewritten the vt-keyboard patch based on feedback, and made KMEMCHECK mutually exclusive with KASAN (rather than KASAN_EXTRA), everything else remains unchanged. This series lets us add back a stack frame warning for the regular 2048 bytes without CONFIG_KASAN_EXTRA. I set the warning limit with KASAN_EXTRA to 3072, since I have an additional set of patches to address all files that surpass that limit. We can debate whether we want to apply those as a follow-up, or instead remove the option entirely. Another follow-up series I have reduces the warning limit with KASAN to 1536, and without KASAN to 1280 for 64-bit architectures. I hope that Andrew can pick up the entire series for mmotm, and we can eventually backport most of it to stable kernels and address the warnings that kernelci still reports for this problem [2]. Arnd [1] https://lkml.org/lkml/2017/3/2/508 [2] https://kernelci.org/build/id/593f89a659b51463306b958d/logs/ Arnd Bergmann (11): compiler: introduce noinline_if_stackbloat annotation netlink: mark nla_put_{u8,u16,u32} noinline_if_stackbloat rocker: mark rocker_tlv_put_* functions as noinline_if_stackbloat mtd: cfi: reduce stack size with KASAN dvb-frontends: reduce stack size in i2c access r820t: mark register functions as noinline_if_stackbloat tty: improve tty_insert_flip_char() fast path brcmsmac: make some local variables 'static const' to reduce stack size brcmsmac: split up wlc_phy_workarounds_nphy brcmsmac: reindent split functions kasan: rework Kconfig settings drivers/media/dvb-frontends/ascot2e.c | 3 +- drivers/media/dvb-frontends/cxd2841er.c | 4 +- drivers/media/dvb-frontends/drx39xyj/drxj.c | 14 +- drivers/media/dvb-frontends/helene.c | 4 +- drivers/media/dvb-frontends/horus3a.c | 2 +- drivers/media/dvb-frontends/itd1000.c | 2 +- drivers/media/dvb-frontends/mt312.c | 2 +- drivers/media/dvb-frontends/si2165.c | 14 +- drivers/media/dvb-frontends/stb0899_drv.c | 2 +- drivers/media/dvb-frontends/stb6100.c | 2 +- drivers/media/dvb-frontends/stv0367.c | 2 +- drivers/media/dvb-frontends/stv090x.c | 2 +- drivers/media/dvb-frontends/stv6110.c | 2 +- drivers/media/dvb-frontends/stv6110x.c | 2 +- drivers/media/dvb-frontends/tda8083.c | 2 +- drivers/media/dvb-frontends/zl10039.c | 2 +- drivers/media/tuners/r820t.c | 4 +- drivers/mtd/chips/cfi_cmdset_0020.c | 8 +- drivers/net/ethernet/rocker/rocker_tlv.h | 24 +- .../broadcom/brcm80211/brcmsmac/phy/phy_n.c | 1856 ++++++++++---------- drivers/tty/tty_buffer.c | 24 + include/linux/compiler.h | 11 + include/linux/mtd/map.h | 8 +- include/linux/tty_flip.h | 3 +- include/net/netlink.h | 36 +- lib/Kconfig.debug | 4 +- lib/Kconfig.kasan | 11 +- lib/Kconfig.kmemcheck | 1 + scripts/Makefile.kasan | 3 + 29 files changed, 1009 insertions(+), 1045 deletions(-) -- 2.9.0