From nobody Fri Sep 19 09:22:47 2025 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id A3B2EC4332F for ; Fri, 25 Nov 2022 12:08:12 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229676AbiKYMIK (ORCPT ); Fri, 25 Nov 2022 07:08:10 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34126 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229631AbiKYMIG (ORCPT ); Fri, 25 Nov 2022 07:08:06 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8A99B22B1C for ; Fri, 25 Nov 2022 04:08:05 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 3A399B82A7F for ; Fri, 25 Nov 2022 12:08:04 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E9E25C43470; Fri, 25 Nov 2022 12:07:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1669378083; bh=TwhSqRrup21U4CF27sTO/M6pc2iifKvlpLvARqgBso8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=tlQQJPMETl9fmBXDukSJVB/J+xVITuSX3gm/HkozT6+4sh82miMixQPUN9aNwWv8a x2IpaZ4alkUFLFbpXFfXSzXE8h7iq/k7KM06T0Kd2wceVVmw7dmBU1+dqjTiNfuRZf hLuCsI5j4Y68+NnEkXgpFBAzIMOs6je7pW1J63960/clm/pxtYbB1rPQtVFFKEAsF6 /P/IezXyogA9f4OhyHHtNPYA9yhh7J4mI5GKUxWZ9Hc1uZBvjYph0YWrKgpFVGTJm0 Duyejm8EeY8NbCxdgFHzQMW84yHjwwQVketQGnuXTzn4vzaV7tOMeOGQCmh61YPzaj 8Lswuge7nEUNA== From: Lee Jones To: lee@kernel.org, arnd@arndb.de, akpm@linux-foundation.org, nathan@kernel.org, maarten.lankhorst@linux.intel.com, mripard@kernel.org, tzimmermann@suse.de, airlied@gmail.com, daniel@ffwll.ch, ndesaulniers@google.com, trix@redhat.com, harry.wentland@amd.com, sunpeng.li@amd.com, Rodrigo.Siqueira@amd.com, alexander.deucher@amd.com, christian.koenig@amd.com, Xinhui.Pan@amd.com Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, llvm@lists.linux.dev, amd-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org Subject: [PATCH v2 1/2] drm/amdgpu: Temporarily disable broken Clang builds due to blown stack-frame Date: Fri, 25 Nov 2022 12:07:49 +0000 Message-Id: <20221125120750.3537134-2-lee@kernel.org> X-Mailer: git-send-email 2.38.1.584.g0f3c55d4c2-goog In-Reply-To: <20221125120750.3537134-1-lee@kernel.org> References: <20221125120750.3537134-1-lee@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" calculate_bandwidth() is presently broken on all !(X86_64 || SPARC64 || ARM= 64) architectures built with Clang (all released versions), whereby the stack frame gets blown up to well over 5k. This would cause an immediate kernel panic on most architectures. We'll revert this when the following bug repo= rt has been resolved: https://github.com/llvm/llvm-project/issues/41896. Suggested-by: Arnd Bergmann Signed-off-by: Lee Jones Acked-by: Arnd Bergmann Reviewed-by: Nathan Chancellor --- drivers/gpu/drm/amd/display/Kconfig | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/drivers/gpu/drm/amd/display/Kconfig b/drivers/gpu/drm/amd/disp= lay/Kconfig index 6925e0280dbe6..f4f3d2665a6b2 100644 --- a/drivers/gpu/drm/amd/display/Kconfig +++ b/drivers/gpu/drm/amd/display/Kconfig @@ -5,6 +5,7 @@ menu "Display Engine Configuration" config DRM_AMD_DC bool "AMD DC - Enable new display engine" default y + depends on BROKEN || !CC_IS_CLANG || X86_64 || SPARC64 || ARM64 select SND_HDA_COMPONENT if SND_HDA_CORE select DRM_AMD_DC_DCN if (X86 || PPC_LONG_DOUBLE_128) help @@ -12,6 +13,12 @@ config DRM_AMD_DC support for AMDGPU. This adds required support for Vega and Raven ASICs. =20 + calculate_bandwidth() is presently broken on all !(X86_64 || SPARC64 ||= ARM64) + architectures built with Clang (all released versions), whereby the sta= ck + frame gets blown up to well over 5k. This would cause an immediate ker= nel + panic on most architectures. We'll revert this when the following bug = report + has been resolved: https://github.com/llvm/llvm-project/issues/41896. + config DRM_AMD_DC_DCN def_bool n help --=20 2.38.1.584.g0f3c55d4c2-goog From nobody Fri Sep 19 09:22:47 2025 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id B5C2AC4167B for ; Fri, 25 Nov 2022 12:08:18 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229719AbiKYMIP (ORCPT ); Fri, 25 Nov 2022 07:08:15 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34198 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229589AbiKYMII (ORCPT ); Fri, 25 Nov 2022 07:08:08 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8E0812315A for ; Fri, 25 Nov 2022 04:08:08 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 282A6622AA for ; Fri, 25 Nov 2022 12:08:08 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 74F04C433C1; Fri, 25 Nov 2022 12:08:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1669378087; bh=gevkG6TfDd9z8LOLiUxeJy2lRLn2rHcp1JIJZyU3WcI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=AKro9j5bc3m00YbU0C47HLUKAGS90KVKcmKx+1ecGTLz37DxwZyrNZ7fwQfp5Fj8a CiapE/0vqwCbVzyT6HhmpVX/XBKeejO6lK9QXxlStLS1dng1RuhTy8Gv9LR40rZ0jI roICL0dzAEKCllb1GT6QZQ+AtTu+w3R+7rdxjgCAE1deHnnnSu+Z/h7tZB73K+FSld XRk6ZlECfR0pF1ev+J1frrZh1lxzN9kmR+Fjv8dEZfZq6nOsnGmetTUu7q/Fi/QHMM YzPWHY3w9e6RdCRmPk8euVAu7uXqWYeOEwwkhpP0qaJK3hxNzjlkv3EduQ+nlzeo2z eWiR5vohumuvw== From: Lee Jones To: lee@kernel.org, arnd@arndb.de, akpm@linux-foundation.org, nathan@kernel.org, maarten.lankhorst@linux.intel.com, mripard@kernel.org, tzimmermann@suse.de, airlied@gmail.com, daniel@ffwll.ch, ndesaulniers@google.com, trix@redhat.com, harry.wentland@amd.com, sunpeng.li@amd.com, Rodrigo.Siqueira@amd.com, alexander.deucher@amd.com, christian.koenig@amd.com, Xinhui.Pan@amd.com Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, llvm@lists.linux.dev, amd-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org Subject: [PATCH v2 2/2] Kconfig.debug: Provide a little extra FRAME_WARN leeway when KASAN is enabled Date: Fri, 25 Nov 2022 12:07:50 +0000 Message-Id: <20221125120750.3537134-3-lee@kernel.org> X-Mailer: git-send-email 2.38.1.584.g0f3c55d4c2-goog In-Reply-To: <20221125120750.3537134-1-lee@kernel.org> References: <20221125120750.3537134-1-lee@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" When enabled, KASAN enlarges function's stack-frames. Pushing quite a few over the current threshold. This can mainly be seen on 32-bit architectures where the present limit (when !GCC) is a lowly 1024-Bytes. Signed-off-by: Lee Jones Reviewed-by: Arnd Bergmann Reviewed-by: Nathan Chancellor --- lib/Kconfig.debug | 1 + 1 file changed, 1 insertion(+) diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug index c3c0b077ade33..82d475168db95 100644 --- a/lib/Kconfig.debug +++ b/lib/Kconfig.debug @@ -399,6 +399,7 @@ config FRAME_WARN default 2048 if GCC_PLUGIN_LATENT_ENTROPY default 2048 if PARISC default 1536 if (!64BIT && XTENSA) + default 1280 if KASAN && !64BIT default 1024 if !64BIT default 2048 if 64BIT help --=20 2.38.1.584.g0f3c55d4c2-goog