Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp798598ybl; Fri, 24 Jan 2020 09:43:45 -0800 (PST) X-Google-Smtp-Source: APXvYqxOZNS/Gdmmc5hOyaY/xva4/0OdLHnWLtK4hLxL80XT6PNM6lXlT1XR36WWTMd2Iz5bVnMp X-Received: by 2002:a54:4f04:: with SMTP id e4mr64495oiy.111.1579887825618; Fri, 24 Jan 2020 09:43:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579887825; cv=none; d=google.com; s=arc-20160816; b=B2LrVOekPVA/ObBdmI/L17wjPYuYHKTJgSqnZFh5+GYpNhxS5MtvYLvRJfWWjQQyGL PbHvXNv8ikaL85zTsx8ex5So0YRh13dtVlqDiRsn8WHZD9nBmq1qvPTgmfUgvltBJwy8 XCqgY/z98kjeTtL1ZNmE8881/IEX7xYKxuTXcMmYqVpzCkW3udCKy4eWCyCIxXVeBvMT JFa0egdJYKBSdQNofBFrxcEuD6lKbJLZtXVO1TJVOom6mPOvKFr2Gc+WOzCkFC1ikrxp w6tZh/P7afX4zlf4ZsM7JLK9NEW5nmJLATrukSrea5wRHIvQ+s5LpDOomAirvJXy8o8Y K9wA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=p/P4zmi6OPe2vOtnucUDBIbt2b+HBpA3YX2WNU+AsZ4=; b=s6Q3XoWuk3ZZIdYNmhWNlgwaTpwFcyiF5NC22TSLb4BdPefxDNvsaIh9BOTgl9aEv8 gifgwafP+gu/i767Zq9syHemdOmjJ+4FyGRi7szr35TPorqXgDx66NzlUilScCCu2LA2 GrGU1i+Od5hhx8FNw1uNiMyTyM2g+2T/BXEmYCkpOoS9rXJERHt0/I8vSCNnU4ymicRk JqVjSvy4ffn1FuRsxBUbIuFODpZrRg00Y18ll/yzSRjNHUpefGH45jfLIvd+REYItwQ/ o9wVZmfrdMt3sWhGDNeb+pg+u4DG5894ngPHqDF2HAUWg+p3nCkjAAqG3nKsdeg4V/yX +75w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RiKWtfi6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c79si103262oig.208.2020.01.24.09.43.32; Fri, 24 Jan 2020 09:43:45 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RiKWtfi6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733169AbgAXLPL (ORCPT + 99 others); Fri, 24 Jan 2020 06:15:11 -0500 Received: from mail.kernel.org ([198.145.29.99]:51478 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389143AbgAXLPA (ORCPT ); Fri, 24 Jan 2020 06:15:00 -0500 Received: from localhost (ip-213-127-102-57.ip.prioritytelecom.net [213.127.102.57]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D12DA2075D; Fri, 24 Jan 2020 11:14:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1579864500; bh=X9i5C4/sC5uBnkoCnSFyPe6JepwPdQ+sVLyu9VPvxuI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RiKWtfi6yLE3AOm9TerVN6nd8tDSPZ91cPYije+vkuJcBP9mPAQhhIVoU5K5XGcfF yR5T6x7s25cxQZft48Rz7mBtE79RHsH+RKAUgj1EXHGTPgAoKs1xIW0ksDft4VHotx fzjxVk2zsrmeJIfZFaT8LWasajIY6fVI9y3omqz4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Arnd Bergmann , Gilad Ben-Yossef , Herbert Xu , Sasha Levin Subject: [PATCH 4.19 269/639] crypto: ccree - reduce kernel stack usage with clang Date: Fri, 24 Jan 2020 10:27:19 +0100 Message-Id: <20200124093120.395167362@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200124093047.008739095@linuxfoundation.org> References: <20200124093047.008739095@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Arnd Bergmann [ Upstream commit 5db46ac29a6797541943d3c4081821747e342732 ] Building with clang for a 32-bit architecture runs over the stack frame limit in the setkey function: drivers/crypto/ccree/cc_cipher.c:318:12: error: stack frame size of 1152 bytes in function 'cc_cipher_setkey' [-Werror,-Wframe-larger-than=] The problem is that there are two large variables: the temporary 'tmp' array and the SHASH_DESC_ON_STACK() declaration. Moving the first into the block in which it is used reduces the total frame size to 768 bytes, which seems more reasonable and is under the warning limit. Fixes: 63ee04c8b491 ("crypto: ccree - add skcipher support") Signed-off-by: Arnd Bergmann Acked-By: Gilad Ben-Yossef Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/ccree/cc_cipher.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/crypto/ccree/cc_cipher.c b/drivers/crypto/ccree/cc_cipher.c index 54a39164aab8f..28a5b8b38fa2f 100644 --- a/drivers/crypto/ccree/cc_cipher.c +++ b/drivers/crypto/ccree/cc_cipher.c @@ -306,7 +306,6 @@ static int cc_cipher_setkey(struct crypto_skcipher *sktfm, const u8 *key, struct crypto_tfm *tfm = crypto_skcipher_tfm(sktfm); struct cc_cipher_ctx *ctx_p = crypto_tfm_ctx(tfm); struct device *dev = drvdata_to_dev(ctx_p->drvdata); - u32 tmp[DES3_EDE_EXPKEY_WORDS]; struct cc_crypto_alg *cc_alg = container_of(tfm->__crt_alg, struct cc_crypto_alg, skcipher_alg.base); @@ -332,6 +331,7 @@ static int cc_cipher_setkey(struct crypto_skcipher *sktfm, const u8 *key, * HW does the expansion on its own. */ if (ctx_p->flow_mode == S_DIN_to_DES) { + u32 tmp[DES3_EDE_EXPKEY_WORDS]; if (keylen == DES3_EDE_KEY_SIZE && __des3_ede_setkey(tmp, &tfm->crt_flags, key, DES3_EDE_KEY_SIZE)) { -- 2.20.1