Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2000579imu; Fri, 14 Dec 2018 04:18:18 -0800 (PST) X-Google-Smtp-Source: AFSGD/WxF8um8LxE1ezTYiUslVIoTEdWHBpwHy8x5Embk+XuwlzmAzFVAFPxUfl3KYFe53/Niksg X-Received: by 2002:a62:4714:: with SMTP id u20mr2609012pfa.144.1544789898407; Fri, 14 Dec 2018 04:18:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544789898; cv=none; d=google.com; s=arc-20160816; b=iePH8mYp7/grUpIM9Pa3SWO/fVxh/vgR2IxWdDx9Ahg5Gbs9a9vmN6kIOWe4Kj3hzs fydxr8TC+iQ/UWveUbss8pNEhfBzQZh42lL4d26OpqsG92aIXVpV7jnIkPMKVSeVTZ3v zcQArKipzeHLiXiGDv9m6HZNXz3z/CyCJPXVoM0Rc9bC7hEJs5B2xphDF4JeA/4MD2qf nyP/Bo+Omv1pwCAMR74Ga2mBKh8JhJc2GwqQkN1JufBppjk2RGePuebGzmMMxmHIWsLO LxYvvilSBbV+qeBaweegp16skmqO1rkPsXOHdef6uiogq2S6p26T5C+AnA+49+MPQ0UM YDqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Dl8mh8/apyneawp/7WkrfQI1s7lXuKZjOr/djeL31NI=; b=xOMAcnCkXHmQTaWEsceYErHM5xHq/bldheYO+aS8v3C+2KvdLVHWFEbqyeKcD+/PB8 5V9mH5Z0u3FxhfwwHyurfTatuH92WXRudnxv3Od5xIRUOg7bnMXc3+U7UnpBxEX1brWV m+3tdGPfXkklmY/lk7NaIH3lktnlKHt1qQQRVxXyFtZ8w/RQfKFRy/H9gl+pcB3yffM8 Of5QIST8Izz2IM7xg9/SlLB6M693rarDVmUoj7G1R5/ah1MStDf/qwHgf8dzqmdf+IK6 akS1vy7WaDJCCTnmi3Hc4RWSxTJali8Blq2E1ScgflgupSF1ifHBLBVYKGJt6GZ42eiP sxSg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xcNupi1Y; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h32si4197888pgh.276.2018.12.14.04.18.03; Fri, 14 Dec 2018 04:18:18 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xcNupi1Y; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732678AbeLNMRS (ORCPT + 99 others); Fri, 14 Dec 2018 07:17:18 -0500 Received: from mail.kernel.org ([198.145.29.99]:37596 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732894AbeLNMRQ (ORCPT ); Fri, 14 Dec 2018 07:17:16 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 809D62133F; Fri, 14 Dec 2018 12:17:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1544789835; bh=jpizETr2XFATKkxFtJvQcQfCAbR0VKmDVH42n8T2AKk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=xcNupi1YXzwMew5+qK8YcMFak9UdnAMV0ERTLyWXe4Jb6FKl5P0cc9Ty+QGKaxdLg 0DEcZPqFRY7rhLXTm2Ti95xTqXmKgDIESdzJnKnr++l52Hw867QtAuGxKVfwCswtxS hQ6hKs/2GH/o1gL6z6EhU5avpc/VQLSCskvi7by8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Arnd Bergmann , "David S. Miller" Subject: [PATCH 4.4 87/88] rocker: fix rocker_tlv_put_* functions for KASAN Date: Fri, 14 Dec 2018 13:01:01 +0100 Message-Id: <20181214115709.471581903@linuxfoundation.org> X-Mailer: git-send-email 2.20.0 In-Reply-To: <20181214115702.151309521@linuxfoundation.org> References: <20181214115702.151309521@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Arnd Bergmann commit 6098d7ddd62f532f80ee2a4b01aca500a8e4e9e4 upstream. Inlining these functions creates lots of stack variables that each take 64 bytes when KASAN is enabled, leading to this warning about potential stack overflow: drivers/net/ethernet/rocker/rocker_ofdpa.c: In function 'ofdpa_cmd_flow_tbl_add': drivers/net/ethernet/rocker/rocker_ofdpa.c:621:1: error: the frame size of 2752 bytes is larger than 1536 bytes [-Werror=frame-larger-than=] gcc-8 can now consolidate the stack slots itself, but on older versions we get the same behavior by using a temporary variable that holds a copy of the inline function argument. Cc: stable@vger.kernel.org Link: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=81715 Signed-off-by: Arnd Bergmann Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/rocker/rocker.c | 24 ++++++++++++++++++------ 1 file changed, 18 insertions(+), 6 deletions(-) --- a/drivers/net/ethernet/rocker/rocker.c +++ b/drivers/net/ethernet/rocker/rocker.c @@ -821,37 +821,49 @@ static int rocker_tlv_put(struct rocker_ static int rocker_tlv_put_u8(struct rocker_desc_info *desc_info, int attrtype, u8 value) { - return rocker_tlv_put(desc_info, attrtype, sizeof(u8), &value); + u8 tmp = value; /* work around GCC PR81715 */ + + return rocker_tlv_put(desc_info, attrtype, sizeof(u8), &tmp); } static int rocker_tlv_put_u16(struct rocker_desc_info *desc_info, int attrtype, u16 value) { - return rocker_tlv_put(desc_info, attrtype, sizeof(u16), &value); + u16 tmp = value; + + return rocker_tlv_put(desc_info, attrtype, sizeof(u16), &tmp); } static int rocker_tlv_put_be16(struct rocker_desc_info *desc_info, int attrtype, __be16 value) { - return rocker_tlv_put(desc_info, attrtype, sizeof(__be16), &value); + __be16 tmp = value; + + return rocker_tlv_put(desc_info, attrtype, sizeof(__be16), &tmp); } static int rocker_tlv_put_u32(struct rocker_desc_info *desc_info, int attrtype, u32 value) { - return rocker_tlv_put(desc_info, attrtype, sizeof(u32), &value); + u32 tmp = value; + + return rocker_tlv_put(desc_info, attrtype, sizeof(u32), &tmp); } static int rocker_tlv_put_be32(struct rocker_desc_info *desc_info, int attrtype, __be32 value) { - return rocker_tlv_put(desc_info, attrtype, sizeof(__be32), &value); + __be32 tmp = value; + + return rocker_tlv_put(desc_info, attrtype, sizeof(__be32), &tmp); } static int rocker_tlv_put_u64(struct rocker_desc_info *desc_info, int attrtype, u64 value) { - return rocker_tlv_put(desc_info, attrtype, sizeof(u64), &value); + u64 tmp = value; + + return rocker_tlv_put(desc_info, attrtype, sizeof(u64), &tmp); } static struct rocker_tlv *