lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202011191208.csAQP6ac-lkp@intel.com>
Date:   Thu, 19 Nov 2020 12:36:13 +0800
From:   kernel test robot <lkp@...el.com>
To:     Kees Cook <keescook@...omium.org>
Cc:     kbuild-all@...ts.01.org, linux-kernel@...r.kernel.org,
        Andrew Morton <akpm@...ux-foundation.org>,
        Linux Memory Management List <linux-mm@...ck.org>
Subject: lib/crypto/curve25519-hacl64.c:601:1: warning: the frame size of
 3168 bytes is larger than 2048 bytes

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head:   c2e7554e1b85935d962127efa3c2a76483b0b3b6
commit: 8d58f222e85f01da0c0e1fc1e77986c86de889e2 ubsan: disable UBSAN_ALIGNMENT under COMPILE_TEST
date:   7 months ago
config: arm64-randconfig-r024-20201119 (attached as .config)
compiler: aarch64-linux-gcc (GCC) 9.3.0
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8d58f222e85f01da0c0e1fc1e77986c86de889e2
        git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
        git fetch --no-tags linus master
        git checkout 8d58f222e85f01da0c0e1fc1e77986c86de889e2
        # save the attached .config to linux build tree
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-9.3.0 make.cross ARCH=arm64 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@...el.com>

All warnings (new ones prefixed by >>):

   lib/crypto/curve25519-hacl64.c: In function 'ladder_cmult.constprop':
>> lib/crypto/curve25519-hacl64.c:601:1: warning: the frame size of 3168 bytes is larger than 2048 bytes [-Wframe-larger-than=]
     601 | }
         | ^
   lib/crypto/curve25519-hacl64.c: In function 'curve25519_generic':
   lib/crypto/curve25519-hacl64.c:788:1: warning: the frame size of 2704 bytes is larger than 2048 bytes [-Wframe-larger-than=]
     788 | }
         | ^

vim +601 lib/crypto/curve25519-hacl64.c

0ed42a6f431e930 Jason A. Donenfeld 2019-11-08  589  
0ed42a6f431e930 Jason A. Donenfeld 2019-11-08  590  static void ladder_cmult(u64 *result, u8 *n1, u64 *q)
0ed42a6f431e930 Jason A. Donenfeld 2019-11-08  591  {
0ed42a6f431e930 Jason A. Donenfeld 2019-11-08  592  	u64 point_buf[40] = { 0 };
0ed42a6f431e930 Jason A. Donenfeld 2019-11-08  593  	u64 *nq = point_buf;
0ed42a6f431e930 Jason A. Donenfeld 2019-11-08  594  	u64 *nqpq = point_buf + 10;
0ed42a6f431e930 Jason A. Donenfeld 2019-11-08  595  	u64 *nq2 = point_buf + 20;
0ed42a6f431e930 Jason A. Donenfeld 2019-11-08  596  	u64 *nqpq2 = point_buf + 30;
0ed42a6f431e930 Jason A. Donenfeld 2019-11-08  597  	point_copy(nqpq, q);
0ed42a6f431e930 Jason A. Donenfeld 2019-11-08  598  	nq[0] = 1;
0ed42a6f431e930 Jason A. Donenfeld 2019-11-08  599  	ladder_bigloop_cmult_big_loop(n1, nq, nqpq, nq2, nqpq2, q, 32);
0ed42a6f431e930 Jason A. Donenfeld 2019-11-08  600  	point_copy(result, nq);
0ed42a6f431e930 Jason A. Donenfeld 2019-11-08 @601  }
0ed42a6f431e930 Jason A. Donenfeld 2019-11-08  602  

:::::: The code at line 601 was first introduced by commit
:::::: 0ed42a6f431e930b2e8fae21955406e09fe75d70 crypto: curve25519 - generic C library implementations

:::::: TO: Jason A. Donenfeld <Jason@...c4.com>
:::::: CC: Herbert Xu <herbert@...dor.apana.org.au>

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org

Download attachment ".config.gz" of type "application/gzip" (33885 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ