Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp69266ybp; Thu, 3 Oct 2019 10:17:04 -0700 (PDT) X-Google-Smtp-Source: APXvYqxG/F8xrG0K3eFPhj+M2jLzGxQH/5ntgeZPJ0/Cup0C/TbFYDfQZvAm0IbVzF0PhZo0q48v X-Received: by 2002:a17:906:c7d4:: with SMTP id dc20mr8676406ejb.235.1570123024753; Thu, 03 Oct 2019 10:17:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570123024; cv=none; d=google.com; s=arc-20160816; b=G4jhFlkb35up2tXGuui+qa44uSbtjEPo6zPUC9zH72D2wynJc82UgQtCFAFM9L74Pr 90R3CmzPW8zhqD/33uXqCaBtkgL11yMjlETRiFNuxwrgXrGwJ7KXx3nVynztTSy6NPev 67nhqafGnWXa48Nsok+PljINnp1ZLChc0Y2R6TaqiKJMX99S6Nwh21ZhydOOb6SWJdUe 0gDJwY5x46BBxl+bij/gDR5QwyWlqHMx//jO6oUKvTISlRqYOS/4tuiZ2tqYJBeaUUlj B3QTb5l8YcQcNib2W1Qw4bLYh1tbPl8VAHkRPAHF0+gDW4IpHlZW/JaY3bCzbhXLW+TI j21Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=js+vsS4Cb+XSnJ107Cy/hrWEqzHWBMe9EchO7f0a5I0=; b=uRRHQO9sMLSSCpmHmpEgLGKDjyql/obAYrEmeDtbUQ+Q1IU2+m5FSu5n1OyduTJzTg YGJ4/Bp1tpQBjccMgCmq3H7MbrKRwpdj2EMoRtvNEcGgSXiyF0JXqO7BUlrAKAB7Xvkp fpBjV1PEW0wIjtAMZrI+gEO/nmbtt2xwf+VEpkvaNRqgP+qlLsUSzpVatB+iL9CzpTMX 1ntjxUvB9wwSLJWSR7VMKkjBSRjMb5rEsGXStWom34C2Ir663g8b7bArScQoqoXzdgFj wnmyU1A8fwuZ+q5p0/MIS0L6wlLzKv/Rl4QwBr8A6+Cv2twMGS0W4Hi5TBQVHhLf9xAA 4kqw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=R4Far0rO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f57si1971236ede.78.2019.10.03.10.16.39; Thu, 03 Oct 2019 10:17:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=R4Far0rO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404347AbfJCRPP (ORCPT + 99 others); Thu, 3 Oct 2019 13:15:15 -0400 Received: from mail.kernel.org ([198.145.29.99]:57106 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391032AbfJCQ0M (ORCPT ); Thu, 3 Oct 2019 12:26:12 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5EA4720700; Thu, 3 Oct 2019 16:26:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570119971; bh=1gu4rf+5VEszUoONBv6+5oClhIK+BZ/7dqRQHE6quhM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=R4Far0rOJNQMqMpHlfXGOjMAaepn0sYBDtvth+vrg//rvIKt9MGNeJsFmHxpVY3dj DVbI1fE/lhCZdv/jSX0yBAtCbs9zQtRRAlfeR53PiYKhGIsPOdjquEBzVGeSkOKLsd 3xB6gO5Ja1mCMZ+gwMxfCYlxkVJcgYDlQy31ctc0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Arnd Bergmann , Nick Desaulniers , Hans Verkuil , Mauro Carvalho Chehab , Sasha Levin Subject: [PATCH 5.2 050/313] media: vivid: work around high stack usage with clang Date: Thu, 3 Oct 2019 17:50:28 +0200 Message-Id: <20191003154538.033733798@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191003154533.590915454@linuxfoundation.org> References: <20191003154533.590915454@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Arnd Bergmann [ Upstream commit 1a03f91c2c2419c3709c4554952c66695575e91c ] Building a KASAN-enabled kernel with clang ends up in a case where too much is inlined into vivid_thread_vid_cap() and the stack usage grows a lot, possibly when the register allocation fails to produce efficient code and spills a lot of temporaries to the stack. This uses more than twice the amount of stack than the sum of the individual functions when they are not inlined: drivers/media/platform/vivid/vivid-kthread-cap.c:766:12: error: stack frame size of 2208 bytes in function 'vivid_thread_vid_cap' [-Werror,-Wframe-larger-than=] Marking two of the key functions in here as 'noinline_for_stack' avoids the pathological case in clang without any apparent downside for gcc. Signed-off-by: Arnd Bergmann Acked-by: Nick Desaulniers Signed-off-by: Hans Verkuil Signed-off-by: Mauro Carvalho Chehab Signed-off-by: Sasha Levin --- drivers/media/platform/vivid/vivid-kthread-cap.c | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/drivers/media/platform/vivid/vivid-kthread-cap.c b/drivers/media/platform/vivid/vivid-kthread-cap.c index cf6dfecf879f7..96d85cd8839f3 100644 --- a/drivers/media/platform/vivid/vivid-kthread-cap.c +++ b/drivers/media/platform/vivid/vivid-kthread-cap.c @@ -232,8 +232,8 @@ static void *plane_vaddr(struct tpg_data *tpg, struct vivid_buffer *buf, return vbuf; } -static int vivid_copy_buffer(struct vivid_dev *dev, unsigned p, u8 *vcapbuf, - struct vivid_buffer *vid_cap_buf) +static noinline_for_stack int vivid_copy_buffer(struct vivid_dev *dev, unsigned p, + u8 *vcapbuf, struct vivid_buffer *vid_cap_buf) { bool blank = dev->must_blank[vid_cap_buf->vb.vb2_buf.index]; struct tpg_data *tpg = &dev->tpg; @@ -672,7 +672,8 @@ static void vivid_cap_update_frame_period(struct vivid_dev *dev) dev->cap_frame_period = f_period; } -static void vivid_thread_vid_cap_tick(struct vivid_dev *dev, int dropped_bufs) +static noinline_for_stack void vivid_thread_vid_cap_tick(struct vivid_dev *dev, + int dropped_bufs) { struct vivid_buffer *vid_cap_buf = NULL; struct vivid_buffer *vbi_cap_buf = NULL; -- 2.20.1