Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp5125102rwl; Wed, 28 Dec 2022 13:22:30 -0800 (PST) X-Google-Smtp-Source: AMrXdXsbxTYcblBhyHaPO8/8LFRE0I9PelW3co1uiz7Hws8CrSOaMK+sNy0us1115JFZaUbOWOiX X-Received: by 2002:a05:6a00:4501:b0:577:1f5f:cc20 with SMTP id cw1-20020a056a00450100b005771f5fcc20mr32336459pfb.5.1672262549869; Wed, 28 Dec 2022 13:22:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672262549; cv=none; d=google.com; s=arc-20160816; b=Z25w4MWMXK4I3raCjeA9bc5d9kEq5O9Q+OZyZkXRAUS5/SwWAouZkYWqq2EYM0NMkv PF6hsgzR6gtaecmkvVxOH8LxTJHDgd+tHiHZCz31LYsa0jQmFoOcdwI8ThEbL2+1LNat NCF3oKY2UnLMOB5gmHfe2dVddrUkH40lwMB6ygmX+7UzMUjzBRoXdNbVbkr22PS5CjRO 1C/t/Pz/bWzQboliSpGmR8MgZO2xJlZpLHwrtcbKmd6c8f8oUx9UgocVQgLMFoa1bNpE SjpchlOIQLlN8WW/69BqBztSa0mITJeq2FMk0GFbeFlyFEigFSoVQFNhEDt9Bn0lFstL R4Ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=+7ooGxz+slyS/E6q6mPR6pfactn5WEBlXeWzI+mnkNI=; b=1BE0x/+rvt5u98eNeXY/oT5MiFMcE3Z3crE4wubRRKblmQ/YQ2mSmhPb/RwuaO+HLf fwmND5wZhkc+4WvfDFeWTgDh0HIpFyAmpRKpCvQMpysNWrr/EeLPPd0EbA6mpj+ty1AM Hgeu02fdtg1Cv9hfDHtjDA6BT3/QhApCk1oCcZMSm6KOM6rk/OQLSm9uai6VBm9XZEEw frk29HIsyqiQXwxrwMOb9dtEU/0mEdcei5a6oNxttZHr+MPYWToi9McM8FICbDMxxjc4 yJzTziFpJAMdfSCmExLKE1m58v0sC2bi3/vZxcU0LM4aZ8erUiAIzDiCR2fnnqpynKsh gqcQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=ih97jiTj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a42-20020a056a001d2a00b005815017ccbfsi6537819pfx.226.2022.12.28.13.22.20; Wed, 28 Dec 2022 13:22:29 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=ih97jiTj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230239AbiL1VMn (ORCPT + 63 others); Wed, 28 Dec 2022 16:12:43 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38064 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229716AbiL1VMl (ORCPT ); Wed, 28 Dec 2022 16:12:41 -0500 Received: from mail-yw1-x1136.google.com (mail-yw1-x1136.google.com [IPv6:2607:f8b0:4864:20::1136]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4354613E9C for ; Wed, 28 Dec 2022 13:12:39 -0800 (PST) Received: by mail-yw1-x1136.google.com with SMTP id 00721157ae682-43ea87d0797so236934167b3.5 for ; Wed, 28 Dec 2022 13:12:39 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=+7ooGxz+slyS/E6q6mPR6pfactn5WEBlXeWzI+mnkNI=; b=ih97jiTj5/uvAHQi1SWZaUjBeXFNFLtW/L9Hr9vhA+WQfOHxMAnExk4bbjcsVNabCW HeKqmkdzPhmyWoS62nY4lwgh34goModIcMoZkgAZiGkLRDyhzt7SraAkeIQw+9Uhz9DP EYyMcKiIJK6/1LXp6AjX7BYgPhR1JpZKb2VHVhZsFFZyRg7Nwo4nbGAmGaGwMzYQgXed sjni7INdx2icrIAEAXbjjHBkN0iNa6FlazuUYl5LHmRvzbiRo0Hwz9lWy07HYNYn0iSz JkaJIeebofKuXyxQfxtDyuXOfPFUotcXWOKX9YkMv4n3U0JmuhwbQQT86uC4hMjbTXo8 8DZQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=+7ooGxz+slyS/E6q6mPR6pfactn5WEBlXeWzI+mnkNI=; b=sHcX26Ij3izBJ1GrXoON8vLuAxGTAnRvVnK8qTudZUVbQyop/dYnQhS2SyFWRfPhyg j3qGemZWVpc1UTKuWXGIXXiX7GiQbuh+Nm0TrfqNJcMY1zMNV4g2LVGp02cDa8TsY0/b sOdbypZiEgtgY8OJUG/QhEVgClCZaL6y/5Izijexqt3sIgx5PBwLKXmjWaOQc7+gHIkz Lgmxrbys6Duex1b6yQiFHgsYxUSoLcB57h804uIzyMcmPmrIecNMZZc8YzsQbWkYb7gk oo27LeBuzBU9Ss7qgD0h9onyLyWR/HNNpsgRwYRlw0lqkhHsKBPttbZ6Hsk4TmzWUJ5V 1tFg== X-Gm-Message-State: AFqh2kofomo8uLBdNiChiZ7bSVaS5ri4AMETLiQs9NysNXeAUIHhIuAe ujuBgp6CwI5Uib6mKtjguET2WQ4CHRXA+VXWhRd9Yh90XX11LKpt X-Received: by 2002:a0d:d5cf:0:b0:3dd:b7d7:ae7e with SMTP id x198-20020a0dd5cf000000b003ddb7d7ae7emr2597695ywd.11.1672261958348; Wed, 28 Dec 2022 13:12:38 -0800 (PST) MIME-Version: 1.0 References: <20221223074238.4092772-1-jcmvbkbc@gmail.com> In-Reply-To: <20221223074238.4092772-1-jcmvbkbc@gmail.com> From: Marco Elver Date: Wed, 28 Dec 2022 22:12:01 +0100 Message-ID: Subject: Re: [PATCH] kcsan: test: don't put the expect array on the stack To: Max Filippov Cc: Dmitry Vyukov , kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, linux-xtensa@linux-xtensa.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 23 Dec 2022 at 08:42, Max Filippov wrote: > > Size of the 'expect' array in the __report_matches is 1536 bytes, which > is exactly the default frame size warning limit of the xtensa > architecture. > As a result allmodconfig xtensa kernel builds with the gcc that does not > support the compiler plugins (which otherwise would push the said > warning limit to 2K) fail with the following message: > > kernel/kcsan/kcsan_test.c:257:1: error: the frame size of 1680 bytes > is larger than 1536 bytes > > Fix it by dynamically alocating the 'expect' array. > > Signed-off-by: Max Filippov > --- > kernel/kcsan/kcsan_test.c | 7 ++++++- > 1 file changed, 6 insertions(+), 1 deletion(-) > > diff --git a/kernel/kcsan/kcsan_test.c b/kernel/kcsan/kcsan_test.c > index dcec1b743c69..af62ec51bd5f 100644 > --- a/kernel/kcsan/kcsan_test.c > +++ b/kernel/kcsan/kcsan_test.c > @@ -159,7 +159,7 @@ static bool __report_matches(const struct expect_report *r) > const bool is_assert = (r->access[0].type | r->access[1].type) & KCSAN_ACCESS_ASSERT; > bool ret = false; > unsigned long flags; > - typeof(observed.lines) expect; > + typeof(*observed.lines) *expect; > const char *end; > char *cur; > int i; > @@ -168,6 +168,10 @@ static bool __report_matches(const struct expect_report *r) > if (!report_available()) > return false; > > + expect = kmalloc(sizeof(observed.lines), GFP_KERNEL); > + if (!expect) WARN_ON(), because this may either spuriously fail or pass a test case, and we'd want to know about that. Thanks, -- Marco