Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1312420rwb; Thu, 15 Dec 2022 08:38:42 -0800 (PST) X-Google-Smtp-Source: AA0mqf4Uy/iyjhI0ST/gBSI5P3VlmEgLHvvCJNa+OE4SWogIGr72en12rxZ0GBCp9mb8yJBWPSdA X-Received: by 2002:a05:6a20:8410:b0:a8:61bd:d9af with SMTP id c16-20020a056a20841000b000a861bdd9afmr49301218pzd.40.1671122322317; Thu, 15 Dec 2022 08:38:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1671122322; cv=none; d=google.com; s=arc-20160816; b=TDyse5rtTmEXfVeBcTMHEmFNE0WtxEuzkhrYsgKSwf1SpZBLqEaBNoW8MsvWoqNpFf 1HhozZx97wf8xjYyKtj/KV3WJ67SQi8Bpiwdfxl0cvacNWak/Fyqfu4/wxGkmJtZeTtM TtjF7sexVQ9ajBCa/V8sbF7puW2DoABZ8/ZEct9nHAHNQT/p/2ovdKnHRIDb2uMvs1Ti DlMs91W/vsyvtODVZFJwG8aevX+E2HY9YlDqL1SjgNbCJKstYXWZlk6HmeqjtMUu+q5/ ST8V++mnhhyGTD/2/jAUoQOXrjVmZKHHRuBCr1SC9Yj0rdEbXhuxyUhaR752ZiwxB/Ct 6BkA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=ZbZzkej9NNpfl/KyMf0TjnCWZCx3/RGdXTYuFY4PdUw=; b=Glem7LZp+R/2tUMEdiD2eGjIamRx19jWRfRAexncz7lyetzkeHBet23SBtLHhoPm9p hqns/rCQlDZQu5pwSg47eGPwHVDo/Z8dBdsDyZj/x8vmSEAizOL4UWv3uQzaKGpzh/R2 1+VmwyD2j+0WoChVze2XXcGp9xtM+wgz3v9GgYmbxsnquCRMj2EqikXd0HnFmRpQDKf/ W9Gb9QK0RgKZ6odMU80zKh1piQOhmk4+6gZRbFqtyN1BJL3zYyOWrikOAbBqdftXGVP3 KEex9znPTbVWaYiSG6uy8qAwLpOUruqRY6Yd2fyvQEKTMmRx3/PakrJbbRAbDchpGR9a 851Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=MX6DCk3L; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i2-20020a63cd02000000b004784f928f15si3319676pgg.91.2022.12.15.08.38.23; Thu, 15 Dec 2022 08:38:42 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=MX6DCk3L; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230268AbiLOQaj (ORCPT + 99 others); Thu, 15 Dec 2022 11:30:39 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55012 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230004AbiLOQaO (ORCPT ); Thu, 15 Dec 2022 11:30:14 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7775137FB8; Thu, 15 Dec 2022 08:30:04 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 275B7B81BA1; Thu, 15 Dec 2022 16:30:03 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8157DC433EF; Thu, 15 Dec 2022 16:30:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1671121801; bh=nYCUcHgLM7p2KgVDr3zhrywdX+DOccT78qCBgHQVm00=; h=From:To:Cc:Subject:Date:From; b=MX6DCk3LHv3wfFD6gfqiZtpQ/htBYO9Us/Znb0DSNtdX8y+UDA+8BkUvlVsKi0P0v /XweUW3LAGRTSs9UHlfU4ztuYAusujhT/U7UiMo+TlJ7exHjtnpJZFu+5jJZO97qKG dMzPF54/8CCi0or2l1vyw+vQb6ocmwqTzX82yFRYYrbpGoiSdGUiRCVbs4Dq+Jp233 k83AEgNkzM/yOhzRYd3/3eoNHfh7l0JK4v2BpzpC/iVrZMmjs60u34NTkg1NL7bQyD ipizUHZnjtnI5It+mV+x9LbYZF7jOlLT70N7z6r7rJN+A5LU0wSRFtfVZqPfVmbdPi CDkV+liHgHn6w== From: Arnd Bergmann To: Herbert Xu , "David S. Miller" Cc: Arnd Bergmann , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] crypto: wp512: disable kmsan checks in wp512_process_buffer() Date: Thu, 15 Dec 2022 17:29:38 +0100 Message-Id: <20221215162956.4037570-1-arnd@kernel.org> X-Mailer: git-send-email 2.35.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org From: Arnd Bergmann The memory sanitizer causes excessive register spills in this function: crypto/wp512.c:782:13: error: stack frame size (2104) exceeds limit (2048) in 'wp512_process_buffer' [-Werror,-Wframe-larger-than] Assume that this one is safe, and mark it as needing no checks to get the stack usage back down to the normal level. Signed-off-by: Arnd Bergmann --- crypto/wp512.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/crypto/wp512.c b/crypto/wp512.c index 5e820afa3c78..07994e5ebf4e 100644 --- a/crypto/wp512.c +++ b/crypto/wp512.c @@ -779,7 +779,7 @@ static const u64 rc[WHIRLPOOL_ROUNDS] = { * The core Whirlpool transform. */ -static void wp512_process_buffer(struct wp512_ctx *wctx) { +static __no_kmsan_checks void wp512_process_buffer(struct wp512_ctx *wctx) { int i, r; u64 K[8]; /* the round key */ u64 block[8]; /* mu(buffer) */ -- 2.35.1