Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp8141828rwb; Tue, 13 Dec 2022 02:46:02 -0800 (PST) X-Google-Smtp-Source: AA0mqf57SBbkYe4Sr6fnbZibhiI8W/eXl2vVIZZf+rSUNJ2U5GlHkagMZNj9DokKRiqbOeYAq2oT X-Received: by 2002:a05:6a20:6f9c:b0:aa:6efd:1885 with SMTP id gv28-20020a056a206f9c00b000aa6efd1885mr24206775pzb.1.1670928362654; Tue, 13 Dec 2022 02:46:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670928362; cv=none; d=google.com; s=arc-20160816; b=Om0Y59InWiDn6v7ZWNJxaRG8GXz/ogaAfBGTmkK51j/vVrtqriYias+aiYQ9vq4B9n D/mn/tShEpagMdGQd2RjKb2Y6JS1rVFaQxvmqNzhXmEvQC11jNsiDW/aYLOiqNnPVn1D 64tPm5AJgqdDpV5VDgqREw3/QsfpHX5Y+T3zqwz+6atjdBhOofJbguN6vj6pY2GiwfSL 43hO53PN5IDYGYWxKw/2F3PeBe1eZrsbI6cnomq4EiweBjleZ7Bii61vtdW1aYJNW4Gr SIZ3mW+0AXtYl/t4QqBhC72jebRyljo7syeIfzx2CqgkOFOXlz4wLgKons12BW+m/OGE unwA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=1HOW53cWsRAkxul4gM0lZ0lz+82DNWTAY212lZVky0A=; b=kiBRYa0qIrWtzPc5jLmnxqis3Bbq64m6m37CuTLVfX/P1XKC0M03Ipoxpm2q6zxK0c QPOZOTi4cU27WRdfOqC5zXOMCkyG6vBEsW2RX3IKKyTcptbUHpwcMW+SdVfZqxmip/Lv PoJi9/AAAoaqCuhzypBDOXcEkdQhnqDEflB7tZ14hQoL8GE/Vfr3tXmb6mkC6CUnTM4x jeMzP+bMgIlMdyO1uwsNC8+rw1XC4VBGGRi8o0PUvuQRDORs+PK6wUXTqaaiS/E5joiE /zpnzKZUpSru/2eAzo1uyr8H6hPtG4quJ0QRJJFvfwTyX/xbQWU/R0gqA6RFM6b/04RZ +I8g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 130-20020a630088000000b00478ebd3d4d8si11224025pga.633.2022.12.13.02.45.40; Tue, 13 Dec 2022 02:46:02 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234974AbiLMKnw (ORCPT + 99 others); Tue, 13 Dec 2022 05:43:52 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36300 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234909AbiLMKnr (ORCPT ); Tue, 13 Dec 2022 05:43:47 -0500 Received: from formenos.hmeau.com (helcar.hmeau.com [216.24.177.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DB3F8644C; Tue, 13 Dec 2022 02:43:45 -0800 (PST) Received: from loth.rohan.me.apana.org.au ([192.168.167.2]) by formenos.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1p52l0-006n59-GP; Tue, 13 Dec 2022 18:43:31 +0800 Received: by loth.rohan.me.apana.org.au (sSMTP sendmail emulation); Tue, 13 Dec 2022 18:43:30 +0800 Date: Tue, 13 Dec 2022 18:43:30 +0800 From: Herbert Xu To: Ard Biesheuvel Cc: kernel test robot , Robert Elliott , llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev, linux-kernel@vger.kernel.org, Linux Crypto Mailing List Subject: [PATCH] crypto: arm/sha1 - Fix clang function cast warnings Message-ID: References: <202211041904.f9S5gAGL-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Thu, Dec 08, 2022 at 07:05:45PM +0100, Ard Biesheuvel wrote: > > We can, as the BUILD_BUG() will catch it if struct sha1_state gets > modified in an incompatible way. Thanks for confirming! ---8<--- Instead of casting the function which upsets clang for some reason, change the assembly function siganture instead. Reported-by: kernel test robot Signed-off-by: Herbert Xu diff --git a/arch/arm/crypto/sha1_glue.c b/arch/arm/crypto/sha1_glue.c index 6c2b849e459d..95a727bcd664 100644 --- a/arch/arm/crypto/sha1_glue.c +++ b/arch/arm/crypto/sha1_glue.c @@ -21,31 +21,29 @@ #include "sha1.h" -asmlinkage void sha1_block_data_order(u32 *digest, - const unsigned char *data, unsigned int rounds); +asmlinkage void sha1_block_data_order(struct sha1_state *digest, + const u8 *data, int rounds); int sha1_update_arm(struct shash_desc *desc, const u8 *data, unsigned int len) { - /* make sure casting to sha1_block_fn() is safe */ + /* make sure signature matches sha1_block_fn() */ BUILD_BUG_ON(offsetof(struct sha1_state, state) != 0); - return sha1_base_do_update(desc, data, len, - (sha1_block_fn *)sha1_block_data_order); + return sha1_base_do_update(desc, data, len, sha1_block_data_order); } EXPORT_SYMBOL_GPL(sha1_update_arm); static int sha1_final(struct shash_desc *desc, u8 *out) { - sha1_base_do_finalize(desc, (sha1_block_fn *)sha1_block_data_order); + sha1_base_do_finalize(desc, sha1_block_data_order); return sha1_base_finish(desc, out); } int sha1_finup_arm(struct shash_desc *desc, const u8 *data, unsigned int len, u8 *out) { - sha1_base_do_update(desc, data, len, - (sha1_block_fn *)sha1_block_data_order); + sha1_base_do_update(desc, data, len, sha1_block_data_order); return sha1_final(desc, out); } EXPORT_SYMBOL_GPL(sha1_finup_arm); -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt