From patchwork Mon Aug 13 22:12:45 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arnd Bergmann X-Patchwork-Id: 144057 Delivered-To: patch@linaro.org Received: by 2002:a2e:9754:0:0:0:0:0 with SMTP id f20-v6csp3581782ljj; Mon, 13 Aug 2018 15:13:05 -0700 (PDT) X-Google-Smtp-Source: AA+uWPzgvM1l1xwLmoY3tknNuSI6dymheYw05z4cF2AdpaD4rRWqpxDx9FpasZm7lRl6VJpVCC92 X-Received: by 2002:a65:46ca:: with SMTP id n10-v6mr18920826pgr.345.1534198385836; Mon, 13 Aug 2018 15:13:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534198385; cv=none; d=google.com; s=arc-20160816; b=PkN7p9qmUYyqF0MlgjtZxfpPg/IfWndcy5/cIZkLP0xdGl6/OXhMTm/nT5CuYReITy tLLACH9ZxKn/4xniqLz3IZLvnLyb2Eb4INSIMwRVAsoDmS9lz7zAJj5a7RRW3H5puJP4 W51KK0hBr17rgDKTPv94oasBKtX6u8ivBNCbCxkIXA6uX0d922kG2WoElnKEH0Hi0Lf3 A+/RqSxjusDCTv5RFnxen3UQ2pE+kPP1WhVVuV5lt7hg4YRAKNTUDuNIRyepDQX9teGy vIK7bRDqUFlON0TX5AC8jF/A45O/M1aXPky3PtoJnIwsb7JcIVDaNRUsX3RX5duQYzvo h1rA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=MQmMEW1lYh5VxynqNKQFmnBgjE/KHDbIMxDsW3322+g=; b=TRez719eyvPesyvygPuFS+UtxWEdvAWgO5Yy8JhfIiMXTJPWsrtKAcJNnpK3KSzOS6 YWYWZIcMMOyw6Y4gyYk2SczmPUf+qXgUjtyypL34R2EboWlWWY7zwNS+sMpQF94katcv dJ3ROd0oevUr9uS0JxlcA6wQuK4ZYl5ZSdMa91AsVwojK84xQrX696j+r3b4f/o9p2qN yuP+pLZOy4zYBSt0F5JgkInAi6PXu66YI76CKX9+vkW1wPmmHROJG89F/wfFuyr0iQw0 I9y1uWEddmv15Xv5voZEMeA4K9Eg45T+wT7DCUYFnVqE9RH5IT9nWBSrNuiYwJB7u43g MDCw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q12-v6si21032218pfc.349.2018.08.13.15.13.05; Mon, 13 Aug 2018 15:13:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731724AbeHNA5M (ORCPT + 31 others); Mon, 13 Aug 2018 20:57:12 -0400 Received: from mout.kundenserver.de ([212.227.126.134]:56263 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729855AbeHNA5M (ORCPT ); Mon, 13 Aug 2018 20:57:12 -0400 Received: from wuerfel.lan ([109.193.40.16]) by mrelayeu.kundenserver.de (mreue004 [212.227.15.129]) with ESMTPA (Nemesis) id 0Lvg2y-1fxJFF21ro-017Szd; Tue, 14 Aug 2018 00:12:57 +0200 From: Arnd Bergmann To: Michael Chan , "David S. Miller" Cc: Arnd Bergmann , Vasundhara Volam , Andy Gospodarek , Scott Branden , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] bnxt_en: take coredump_record structure off stack Date: Tue, 14 Aug 2018 00:12:45 +0200 Message-Id: <20180813221256.299221-1-arnd@arndb.de> X-Mailer: git-send-email 2.18.0 X-Provags-ID: V03:K1:VvX4oWXNQxK+lgAbJzvFKYyTsBe1vACD+a7UvRrhGs1egl8Ni10 DuQtLhIeRr3+HYMnblTnoqmeV/aA+bWjVNAgpdnIiKAjXHJjtZiZkr3OHizfXp8vG11Zfcf vWBZkrSYpMbpecv9SS4Jp89MH31ZksTXtXISmbTzfMLgAG1SfQZQSBWmUiZvt1GLhHuoNeY qI2pszyhB6j9WS4nWZ+mA== X-UI-Out-Filterresults: notjunk:1; V01:K0:1ontqEbgg4g=:EK7nvBvezqr57PQnGqZ7q7 hp4HJ1vjrGO89m57ZAKLxHnaCxr7sXjVjE66LiCfvfcFBl/XWQw8ev8BPw7L3KWcXMV26jiVn zXsaG7FydULDt4GyUDMA89RgsPo+QXKVuZmsSwCpGqA/f54mhqjLGMZzc0tdsJ8wo/k6MHnRq aPu803dd/+Y1WiZ5eh7BNTBLaI0zHnAsG/DoPYf1pN8rUk+6f/aiiz11aeqyorRsn6Y3pTjv6 ewQQ4GdUj7Au0zDP8UN4mhNWiyz9v42wqegoKZHYtk7iSWV8wITdhEzpK5deqrKAoQTima9uY cnnutVcW+VyMxytNNe8+w9RQIiYnmn6HR6v2nS8sWfkmwvZfMUX1bViOlLnSCqlj4K94QU2PY o8QqCSvrryNlyHwMhx8/Rp3psUnTEFcF6/nrLBQtrt0EJEFYX6Ns3f01xfVhq+Ju8y/+tW9mP IhtkGR+9r45fX7RNfe0FupfUdX3LWxggwS2PhMSdE0ZHu9dJ0KkDCNcz3Yq5QDvQ/BQb8hojX ALTDEzQLeFTIDO9nHT4I/47zsUA6Yf/EbtLShhkGo4qrTYEQzn9cUbyeXyVWajhbHPLnM1jPh xvWClsBbTEz1/n2Xce9fjAK1PU82xhdfHdvimvRr8aDqcz5R6SkV9PH5FB+BGCj/Q7hgYyMhb x5qA+TbQ7lBi6MKaz7SnKTOGqP4INy1Cc5KOtK/8v2scEFUECeC46BX8Pp4gC0YVsdiw= Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The bnxt_coredump_record structure is very long, causing a warning about possible stack overflow on 32-bit architectures: drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c: In function 'bnxt_get_coredump': drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c:2989:1: error: the frame size of 1188 bytes is larger than 1024 bytes [-Werror=frame-larger-than=] I could not see any reason to operate on an on-stack copy of the structure before copying it back into the caller-provided buffer, which also simplifies the code here. Fixes: 6c5657d085ae ("bnxt_en: Add support for ethtool get dump.") Signed-off-by: Arnd Bergmann --- drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c | 9 +++------ 1 file changed, 3 insertions(+), 6 deletions(-) -- 2.18.0 diff --git a/drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c b/drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c index 539be1d1b67f..e52d7af3ab3e 100644 --- a/drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c +++ b/drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c @@ -2900,7 +2900,6 @@ static int bnxt_get_coredump(struct bnxt *bp, void *buf, u32 *dump_len) struct coredump_segment_record *seg_record = NULL; u32 offset = 0, seg_hdr_len, seg_record_len; struct bnxt_coredump_segment_hdr seg_hdr; - struct bnxt_coredump_record coredump_rec; struct bnxt_coredump coredump = {NULL}; time64_t start_time; u16 start_utc; @@ -2976,14 +2975,12 @@ static int bnxt_get_coredump(struct bnxt *bp, void *buf, u32 *dump_len) } err: - if (buf) { - bnxt_fill_coredump_record(bp, &coredump_rec, start_time, + if (buf) + bnxt_fill_coredump_record(bp, buf + offset, start_time, start_utc, coredump.total_segs + 1, rc); - memcpy(buf + offset, &coredump_rec, sizeof(coredump_rec)); - } kfree(coredump.data); - *dump_len += sizeof(coredump_rec); + *dump_len += sizeof(struct bnxt_coredump_record); return rc; }