Received: by 2002:a25:23cc:0:0:0:0:0 with SMTP id j195csp916144ybj; Tue, 5 May 2020 09:36:14 -0700 (PDT) X-Google-Smtp-Source: APiQypJ54JuSvkDXwVV2lz4dUypxSBexfpfaVEaF8CLQqgQghELC8FAq34Y0mZCiKi22kecHTAAV X-Received: by 2002:a05:6402:602:: with SMTP id n2mr3328440edv.79.1588696574187; Tue, 05 May 2020 09:36:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588696574; cv=none; d=google.com; s=arc-20160816; b=fxTUfFpUiTuvXqZX3WqZz41AJ8F5MDLPt7wRWbfz7A97b0xJB86NfNH4xPGhOJ2uGc 6cbGSJd6Z9o8Ea3OtX77VG7T8EJE8fKie5TnHBV34rgxCPL4Aoy+uL4Z6lBsWJgg70FT FeHmw1y8XMCRE8frWLYtf2bHZ3j2q6kCOyi3H9YEYBV3+bRidhK9LT7qJMm8A12jsUKs Qesx0RLWG311Nw6c9rfYBF7okTZneWUVss4//iAxrF1gAs8nrykXsO9sl9CbcgIiDMVK YEnL3J//UrNy7nKFADhawmq8zOrqyODIEBnzoOU2jmGlFNCzGqOiV+l+dLprept/zYpb FIbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=vou6fHugFTANh9h5WFFZaIXUY0TPrRJW6tknpfL+ewU=; b=rlULvk5CDp0sZcr+I6bZLo45/LfKKGgN6DrLYQnCEUAQ5yAu3dxDXIFZXF5liXAwUS 84wRhxcLE11IQ5qUWmkVa8e89BJoJa7qRYExjMHZlrkzdUSYBDPknXE1YVgoJTiQEkdX IdsN/LwTvNcXUyPv8mUT5X/XgLIDExd2RVq416j0XPcl70FTckQHCoZPfndISZt0GqAo WlqXr/UicRZ+HjHncjZ5i/zAHOh2vW2v8QReNT1dtsTVdqV8+TINaYX1QtyQEqqOAaZw kdsGj2YTHz03OQrX/FsNiyDCHWq9d7rnxOEPuF20vlAz4ZsPiTSuDEjI38rvR5O8blfs /n4Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y9si1453778edr.281.2020.05.05.09.35.50; Tue, 05 May 2020 09:36:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729604AbgEEQeO (ORCPT + 99 others); Tue, 5 May 2020 12:34:14 -0400 Received: from mx2.suse.de ([195.135.220.15]:32944 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728687AbgEEQeN (ORCPT ); Tue, 5 May 2020 12:34:13 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 34C5BAFB8; Tue, 5 May 2020 16:34:14 +0000 (UTC) Subject: Re: [PATCH] xenbus: avoid stack overflow warning To: Boris Ostrovsky , Arnd Bergmann Cc: Stefano Stabellini , Yan Yankovskyi , Wei Liu , xen-devel , "linux-kernel@vger.kernel.org" , clang-built-linux References: <20200505141546.824573-1-arnd@arndb.de> <30d49e6d-570b-f6fd-3a6f-628abcc8b127@suse.com> <48893239-dde9-4e94-040d-859f4348816d@suse.com> <656d0dc4-6c4f-29df-be7b-4cb70c2c0a5e@oracle.com> From: =?UTF-8?B?SsO8cmdlbiBHcm/Dnw==?= Message-ID: <02dcf5df-f447-d29b-052e-c3fcd71a214f@suse.com> Date: Tue, 5 May 2020 18:34:10 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.7.0 MIME-Version: 1.0 In-Reply-To: <656d0dc4-6c4f-29df-be7b-4cb70c2c0a5e@oracle.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05.05.20 18:12, Boris Ostrovsky wrote: > > On 5/5/20 12:02 PM, Jürgen Groß wrote: >> On 05.05.20 17:01, Arnd Bergmann wrote: >>> On Tue, May 5, 2020 at 4:34 PM Jürgen Groß wrote: >>>> On 05.05.20 16:15, Arnd Bergmann wrote: >>>>> The __xenbus_map_ring() function has two large arrays, 'map' and >>>>> 'unmap' on its stack. When clang decides to inline it into its caller, >>>>> xenbus_map_ring_valloc_hvm(), the total stack usage exceeds the >>>>> warning >>>>> limit for stack size on 32-bit architectures. >>>>> >>>>> drivers/xen/xenbus/xenbus_client.c:592:12: error: stack frame size >>>>> of 1104 bytes in function 'xenbus_map_ring_valloc_hvm' >>>>> [-Werror,-Wframe-larger-than=] >>>>> >>>>> As far as I can tell, other compilers don't inline it here, so we get >>>>> no warning, but the stack usage is actually the same. It is possible >>>>> for both arrays to use the same location on the stack, but the >>>>> compiler >>>>> cannot prove that this is safe because they get passed to external >>>>> functions that may end up using them until they go out of scope. >>>>> >>>>> Move the two arrays into separate basic blocks to limit the scope >>>>> and force them to occupy less stack in total, regardless of the >>>>> inlining decision. >>>> >>>> Why don't you put both arrays into a union? >>> >>> I considered that as well, and don't really mind either way. I think >>> it does >>> get a bit ugly whatever we do. If you prefer the union, I can respin the >>> patch that way. >> >> Hmm, thinking more about it I think the real clean solution would be to >> extend struct map_ring_valloc_hvm to cover the pv case, too, to add the >> map and unmap arrays (possibly as a union) to it and to allocate it >> dynamically instead of having it on the stack. >> >> Would you be fine doing this? > > > > Another option might be to factor out/modify code from > xenbus_unmap_ring() and call the resulting code from > __xenbus_map_ring()'s fail path. This will still allocate large arrays on the stack. If we ever increase the max ring page order it will explode. Juergen