lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202110111844.45x4OfWm-lkp@intel.com>
Date:   Mon, 11 Oct 2021 18:35:00 +0800
From:   kernel test robot <lkp@...el.com>
To:     "Ahmed S. Darwish" <a.darwish@...utronix.de>
Cc:     llvm@...ts.linux.dev, kbuild-all@...ts.01.org,
        linux-kernel@...r.kernel.org,
        Sebastian Andrzej Siewior <bigeasy@...utronix.de>
Subject: [rt-devel:linux-5.15.y-rt-rebase 62/155]
 net/sched/sch_gred.c:902:13: warning: stack frame size (1184) exceeds limit
 (1024) in 'gred_destroy'

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-rt-devel.git linux-5.15.y-rt-rebase
head:   f9f1cb3ac5916290046ad676c33789215f65f80c
commit: 4490e089355ef16ed18f0ff62a88803d70ddf469 [62/155] net: sched: Protect Qdisc::bstats with u64_stats
config: hexagon-randconfig-r002-20211011 (attached as .config)
compiler: clang version 14.0.0 (https://github.com/llvm/llvm-project f95d9c95bbf4cf662b9a181245fc6dcede39f590)
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # https://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-rt-devel.git/commit/?id=4490e089355ef16ed18f0ff62a88803d70ddf469
        git remote add rt-devel https://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-rt-devel.git
        git fetch --no-tags rt-devel linux-5.15.y-rt-rebase
        git checkout 4490e089355ef16ed18f0ff62a88803d70ddf469
        # save the attached .config to linux build tree
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 ARCH=hexagon 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@...el.com>

All warnings (new ones prefixed by >>):

>> net/sched/sch_gred.c:902:13: warning: stack frame size (1184) exceeds limit (1024) in 'gred_destroy' [-Wframe-larger-than]
   static void gred_destroy(struct Qdisc *sch)
               ^
>> net/sched/sch_gred.c:310:13: warning: stack frame size (1184) exceeds limit (1024) in 'gred_offload' [-Wframe-larger-than]
   static void gred_offload(struct Qdisc *sch, enum tc_gred_command command)
               ^
   2 warnings generated.


vim +/gred_destroy +902 net/sched/sch_gred.c

^1da177e4c3f41 Linus Torvalds 2005-04-16  901  
^1da177e4c3f41 Linus Torvalds 2005-04-16 @902  static void gred_destroy(struct Qdisc *sch)
^1da177e4c3f41 Linus Torvalds 2005-04-16  903  {
^1da177e4c3f41 Linus Torvalds 2005-04-16  904  	struct gred_sched *table = qdisc_priv(sch);
^1da177e4c3f41 Linus Torvalds 2005-04-16  905  	int i;
^1da177e4c3f41 Linus Torvalds 2005-04-16  906  
^1da177e4c3f41 Linus Torvalds 2005-04-16  907  	for (i = 0; i < table->DPs; i++) {
^1da177e4c3f41 Linus Torvalds 2005-04-16  908  		if (table->tab[i])
6639607ed9deae Thomas Graf    2005-11-05  909  			gred_destroy_vq(table->tab[i]);
^1da177e4c3f41 Linus Torvalds 2005-04-16  910  	}
890d8d23ec3c9e Jakub Kicinski 2018-11-19  911  	gred_offload(sch, TC_GRED_DESTROY);
^1da177e4c3f41 Linus Torvalds 2005-04-16  912  }
^1da177e4c3f41 Linus Torvalds 2005-04-16  913  

:::::: The code at line 902 was first introduced by commit
:::::: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Linux-2.6.12-rc2

:::::: TO: Linus Torvalds <torvalds@...970.osdl.org>
:::::: CC: Linus Torvalds <torvalds@...970.osdl.org>

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org

Download attachment ".config.gz" of type "application/gzip" (31700 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ