lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Mon, 19 Jun 2023 06:22:59 +0800
From:   kernel test robot <lkp@...el.com>
To:     Song Chen <chensong_2000@....cn>
Cc:     llvm@...ts.linux.dev, oe-kbuild-all@...ts.linux.dev,
        linux-kernel@...r.kernel.org,
        "Masami Hiramatsu (Google)" <mhiramat@...nel.org>
Subject: kernel/trace/trace_eprobe.c:460:1: warning: stack frame size (1760)
 exceeds limit (1024) in '__eprobe_trace_func'

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head:   8c1f0c38b31025f60437215dd27fffc293565fa4
commit: 672a2bf84061f0f19acfc5869f5b3689759a55a8 kernel/trace: Provide default impelentations defined in trace_probe_tmpl.h
date:   4 months ago
config: riscv-randconfig-r011-20230619 (https://download.01.org/0day-ci/archive/20230619/202306190644.qKs8k0ng-lkp@intel.com/config)
compiler: clang version 17.0.0 (https://github.com/llvm/llvm-project.git 4a5ac14ee968ff0ad5d2cc1ffa0299048db4c88a)
reproduce: (https://download.01.org/0day-ci/archive/20230619/202306190644.qKs8k0ng-lkp@intel.com/reproduce)

If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@...el.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202306190644.qKs8k0ng-lkp@intel.com/

All warnings (new ones prefixed by >>):

   kernel/trace/trace_eprobe.c:428:1: warning: stack frame size (1424) exceeds limit (1024) in 'process_fetch_insn' [-Wframe-larger-than]
     428 | process_fetch_insn(struct fetch_insn *code, void *rec, void *dest,
         | ^
>> kernel/trace/trace_eprobe.c:460:1: warning: stack frame size (1760) exceeds limit (1024) in '__eprobe_trace_func' [-Wframe-larger-than]
     460 | __eprobe_trace_func(struct eprobe_data *edata, void *rec)
         | ^
   2 warnings generated.


vim +/__eprobe_trace_func +460 kernel/trace/trace_eprobe.c

7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  457) 
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  458) /* eprobe handler */
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  459) static inline void
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19 @460) __eprobe_trace_func(struct eprobe_data *edata, void *rec)
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  461) {
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  462) 	struct eprobe_trace_entry_head *entry;
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  463) 	struct trace_event_call *call = trace_probe_event_call(&edata->ep->tp);
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  464) 	struct trace_event_buffer fbuffer;
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  465) 	int dsize;
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  466) 
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  467) 	if (WARN_ON_ONCE(call != edata->file->event_call))
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  468) 		return;
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  469) 
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  470) 	if (trace_trigger_soft_disabled(edata->file))
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  471) 		return;
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  472) 
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  473) 	dsize = get_eprobe_size(&edata->ep->tp, rec);
3e8b1a29a0e8d3 Steven Rostedt (VMware      2021-11-29  474) 
3e8b1a29a0e8d3 Steven Rostedt (VMware      2021-11-29  475) 	entry = trace_event_buffer_reserve(&fbuffer, edata->file,
3e8b1a29a0e8d3 Steven Rostedt (VMware      2021-11-29  476) 					   sizeof(*entry) + edata->ep->tp.size + dsize);
3e8b1a29a0e8d3 Steven Rostedt (VMware      2021-11-29  477) 
3e8b1a29a0e8d3 Steven Rostedt (VMware      2021-11-29  478) 	if (!entry)
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  479) 		return;
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  480) 
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  481) 	entry = fbuffer.entry = ring_buffer_event_data(fbuffer.event);
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  482) 	store_trace_args(&entry[1], &edata->ep->tp, rec, sizeof(*entry), dsize);
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  483) 
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  484) 	trace_event_buffer_commit(&fbuffer);
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  485) }
7491e2c442781a Tzvetomir Stoyanov (VMware  2021-08-19  486) 

:::::: The code at line 460 was first introduced by commit
:::::: 7491e2c442781a1860181adb5ab472a52075f393 tracing: Add a probe that attaches to trace events

:::::: TO: Tzvetomir Stoyanov (VMware) <tz.stoyanov@...il.com>
:::::: CC: Steven Rostedt (VMware) <rostedt@...dmis.org>

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ