Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp2472404ybi; Mon, 17 Jun 2019 05:32:04 -0700 (PDT) X-Google-Smtp-Source: APXvYqx79ASTmaf2IrEWmYhyYRPSWCMMth1Y1Kk/IBixzJjdhccoE/goRC7B1/wT5+PgUXPjGB93 X-Received: by 2002:a63:a08:: with SMTP id 8mr49125483pgk.46.1560774723716; Mon, 17 Jun 2019 05:32:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560774723; cv=none; d=google.com; s=arc-20160816; b=csg8tCporjxVhMBUZD+PehZHIde2/ZZS18UDOjgHBC2Mzj0g6WShd3pHQIvmAx/1He WK+MsSKVP6RCWJv8NvOx7ksL8N0KzeSSOT68bP+nZEmwM03BJumtn3emak80IBvjJiXn AacN7iOW4XWi2Yys9GPkfBdHM+fP3GUeQH4tAltR+O7b13WUIcgltmwAIpmHsSuEHxNQ 1S59xrYFgqOnA0EUINoFy+7s/6lySX77Ip7WDSD9xOxOnXLGI0Z/BQOtalRRtaTX0Zre mqkE15pQnRJ/ZmC41afq+hvJOIRWOaEmIFB5JvY3LkiPorHqPPIGSEC/DizU2ev8oeq7 nLGg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=mstdkW+i3aHnx27xSlZz6sYwBqtFN5w2vAadecwyTTo=; b=YH0VHy7Nv3RCdzmKUdbqucvvYiLPJlKPSNOabB9C1XEWX8ZFBKhRcsYZAU123/dTv8 NOxkGMLcUtR2OyRIJH2DIMwU+QoHrI0oN4mAZe2ZMBRZYx+UrXg0TXJoBnuT2IeDIRA3 qJza1ahQR48f0pG/ciMQEQCKP7EeMispoY3E3+lJDEJcAXGxqZ5q4XN8o2e+faD/+G6L 4VQQUBxSCJCrvTAFf9KqJLjlf9gRgIt6g7H2JPzwy05E0rf6f5bl382wmho3vJijd/4A 6iBOAdrUQ+vN38UJmJwisM69HZj8kxzzfYO+X2UO7DAX7dsfd82rDodbLMG0PZ8eXlHn xuWQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n13si10646250pgv.304.2019.06.17.05.31.47; Mon, 17 Jun 2019 05:32:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727376AbfFQMbo (ORCPT + 99 others); Mon, 17 Jun 2019 08:31:44 -0400 Received: from mout.kundenserver.de ([212.227.126.130]:53495 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726121AbfFQMbo (ORCPT ); Mon, 17 Jun 2019 08:31:44 -0400 Received: from threadripper.lan ([149.172.19.189]) by mrelayeu.kundenserver.de (mreue011 [212.227.15.129]) with ESMTPA (Nemesis) id 1MhlbM-1iGKPA0jWS-00djt7; Mon, 17 Jun 2019 14:31:20 +0200 From: Arnd Bergmann To: Andrey Ryabinin , akpm@linux-foundation.org Cc: Josh Poimboeuf , Peter Zijlstra , linux-kernel@vger.kernel.org, Arnd Bergmann , stable@vger.kernel.org Subject: [PATCH] ubsan: mark ubsan_type_mismatch_common inline Date: Mon, 17 Jun 2019 14:31:09 +0200 Message-Id: <20190617123109.667090-1-arnd@arndb.de> X-Mailer: git-send-email 2.20.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Provags-ID: V03:K1:RdrPG7YYozPOO4moFcrupalm1fFjUIeD1Q8rHF6IwUGNo79JcXH miKAhPNzei6GuU9U1bsgDZ8kG1jVk32osA4MHetoIE5ZsIYqMyTgCvnG+vMgAlYviqXB8aN a9wfzrI6f8gpze1TZWcSRXEgaozaMk4T3JwjusG3CMr7ZP2P8xxhrSDPn+Hjdzc0nXiljhb gAQj1zphITg1lfCVb1zlw== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:OtOLG0VadSQ=:XsrhptSTyA02Et1uaEtCuI BLtI2n1fQrB7hHBYUluxjNkET7dy8P1RWzr6u8ltKIroe8fL3tMp5BOhzyD6oWF5sC62a1IKp NVnjSaTn/KQN1TCXTF04NJBMGUzH2E1KS9tapWvGMgEsL+Xn5kSFBI6uQrkp9Em2V4Kt5Mczd 8121xcgyrMya6GNS+xexw6fU2mfymI6X47yQefgyFsH64DN2ugUfEs2gyu/nYBYWt2C56Kp2o rhhsZo5VIwK2Bug5WrzOWLr8ZNLkn27J55n0Hycluj6h5UNogfQv3rQDPd8aE5oMn6Lry/Nqs SIDyZUuv3doxaFGfEY+xwB3ekAFtU/ZXk1biWw6OgvwZhj+CIbrZ09+1/9R1YoJLexrOM6ihz ZauPN9BevksogYmUc5whKUqg4hLSolBCEZereObQRocrz6deopDGt7xJtcetvv91eYIRAXXLS oUmmPVdFOgH2tuE7kjqOTO8gqrK34qrv7+40BwbH74izvdaKiM01Xs+p5t8KEQZFyvFgoscJY E3KLyEzZkKU65G25+4A0G46Hx6m+zr1afShcfYNo5jsNIv1Oom057fImFi8zbm8z+hLAUj7nA bV1uI8nRN4yZf9/KQuusEdi7XHXmLXnbcp1i8COCDZkIeNRLl9EKbADF6MFtcLqeC08RG85Hs ekBZKOpRFi5YTyTKqTX7PCFsIyYHX1AdIfPQ8qpCz0cUxDNdsu1ni5GzxKHrXXzvIpa0q9WKj Bhp8Ec+4/uFOookVQleHJ4RTlsMu3Nz/ieF8RQ== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org objtool points out a condition that it does not like: lib/ubsan.o: warning: objtool: __ubsan_handle_type_mismatch()+0x4a: call to stackleak_track_stack() with UACCESS enabled lib/ubsan.o: warning: objtool: __ubsan_handle_type_mismatch_v1()+0x4a: call to stackleak_track_stack() with UACCESS enabled I guess this is related to the call ubsan_type_mismatch_common() not being inline before it calls user_access_restore(), though I don't fully understand why that is a problem. Marking the function inline shuts up the warning and might be the right thing to do. The patch that caused this is marked for stable backports, so this one should probably be backported as well. Fixes: 42440c1f9911 ("lib/ubsan: add type mismatch handler for new GCC/Clang") Cc: stable@vger.kernel.org Signed-off-by: Arnd Bergmann --- lib/ubsan.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/ubsan.c b/lib/ubsan.c index ecc179338094..3d8836f0fc5c 100644 --- a/lib/ubsan.c +++ b/lib/ubsan.c @@ -309,7 +309,7 @@ static void handle_object_size_mismatch(struct type_mismatch_data_common *data, ubsan_epilogue(&flags); } -static void ubsan_type_mismatch_common(struct type_mismatch_data_common *data, +static __always_inline void ubsan_type_mismatch_common(struct type_mismatch_data_common *data, unsigned long ptr) { unsigned long flags = user_access_save(); -- 2.20.0