[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202107310841.wxY4efD6-lkp@intel.com>
Date: Sat, 31 Jul 2021 08:45:55 +0800
From: kernel test robot <lkp@...el.com>
To: Heiko Carstens <hca@...ux.ibm.com>
Cc: kbuild-all@...ts.01.org, linux-kernel@...r.kernel.org,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: [linux-stable-rc:linux-5.4.y 5847/5947] crypto/ecc.c:1281:1:
warning: the frame size of 2144 bytes is larger than 2048 bytes
tree: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y
head: 0aabc02724664358bdcea0cacee374b42c6dcfdb
commit: 43dd03f088191e6c85529e649ebb5c54994486ee [5847/5947] init/Kconfig: make COMPILE_TEST depend on !S390
config: s390-randconfig-r033-20210722 (attached as .config)
compiler: s390-linux-gcc (GCC) 10.3.0
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git/commit/?id=43dd03f088191e6c85529e649ebb5c54994486ee
git remote add linux-stable-rc https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
git fetch --no-tags linux-stable-rc linux-5.4.y
git checkout 43dd03f088191e6c85529e649ebb5c54994486ee
# save the attached .config to linux build tree
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-10.3.0 make.cross ARCH=s390
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@...el.com>
All warnings (new ones prefixed by >>):
crypto/ecc.c: In function 'ecc_point_mult_shamir':
>> crypto/ecc.c:1281:1: warning: the frame size of 2144 bytes is larger than 2048 bytes [-Wframe-larger-than=]
1281 | }
| ^
vim +1281 crypto/ecc.c
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1224
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1225 /* Computes R = u1P + u2Q mod p using Shamir's trick.
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1226 * Based on: Kenneth MacKay's micro-ecc (2014).
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1227 */
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1228 void ecc_point_mult_shamir(const struct ecc_point *result,
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1229 const u64 *u1, const struct ecc_point *p,
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1230 const u64 *u2, const struct ecc_point *q,
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1231 const struct ecc_curve *curve)
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1232 {
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1233 u64 z[ECC_MAX_DIGITS];
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1234 u64 sump[2][ECC_MAX_DIGITS];
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1235 u64 *rx = result->x;
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1236 u64 *ry = result->y;
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1237 unsigned int ndigits = curve->g.ndigits;
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1238 unsigned int num_bits;
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1239 struct ecc_point sum = ECC_POINT_INIT(sump[0], sump[1], ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1240 const struct ecc_point *points[4];
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1241 const struct ecc_point *point;
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1242 unsigned int idx;
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1243 int i;
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1244
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1245 ecc_point_add(&sum, p, q, curve);
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1246 points[0] = NULL;
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1247 points[1] = p;
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1248 points[2] = q;
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1249 points[3] = ∑
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1250
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1251 num_bits = max(vli_num_bits(u1, ndigits),
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1252 vli_num_bits(u2, ndigits));
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1253 i = num_bits - 1;
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1254 idx = (!!vli_test_bit(u1, i)) | ((!!vli_test_bit(u2, i)) << 1);
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1255 point = points[idx];
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1256
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1257 vli_set(rx, point->x, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1258 vli_set(ry, point->y, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1259 vli_clear(z + 1, ndigits - 1);
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1260 z[0] = 1;
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1261
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1262 for (--i; i >= 0; i--) {
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1263 ecc_point_double_jacobian(rx, ry, z, curve->p, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1264 idx = (!!vli_test_bit(u1, i)) | ((!!vli_test_bit(u2, i)) << 1);
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1265 point = points[idx];
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1266 if (point) {
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1267 u64 tx[ECC_MAX_DIGITS];
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1268 u64 ty[ECC_MAX_DIGITS];
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1269 u64 tz[ECC_MAX_DIGITS];
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1270
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1271 vli_set(tx, point->x, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1272 vli_set(ty, point->y, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1273 apply_z(tx, ty, z, curve->p, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1274 vli_mod_sub(tz, rx, tx, curve->p, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1275 xycz_add(tx, ty, rx, ry, curve->p, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1276 vli_mod_mult_fast(z, z, tz, curve->p, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1277 }
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1278 }
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1279 vli_mod_inv(z, z, curve->p, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1280 apply_z(rx, ry, z, curve->p, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11 @1281 }
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1282 EXPORT_SYMBOL(ecc_point_mult_shamir);
0d7a78643f6972 Vitaly Chikunov 2019-04-11 1283
:::::: The code at line 1281 was first introduced by commit
:::::: 0d7a78643f6972214e99205b364e508f8ea9598e crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
:::::: TO: Vitaly Chikunov <vt@...linux.org>
:::::: CC: Herbert Xu <herbert@...dor.apana.org.au>
---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org
Download attachment ".config.gz" of type "application/gzip" (15147 bytes)
Powered by blists - more mailing lists