lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202203191122.mbOGJL7c-lkp@intel.com>
Date:   Sat, 19 Mar 2022 11:18:29 +0800
From:   kernel test robot <lkp@...el.com>
To:     Kees Cook <keescook@...omium.org>
Cc:     kbuild-all@...ts.01.org, linux-kernel@...r.kernel.org
Subject: [kees:for-next/execve 12/15] fs/binfmt_elf_test.c:52:1: warning: the
 frame size of 1056 bytes is larger than 1024 bytes

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git for-next/execve
head:   dd664099002db909912a23215f8775c97f7f4f10
commit: 9e1a3ce0a952450a1163cc93ab1df6d4fa8c8155 [12/15] binfmt_elf: Introduce KUnit test
config: powerpc-randconfig-r031-20220318 (https://download.01.org/0day-ci/archive/20220319/202203191122.mbOGJL7c-lkp@intel.com/config)
compiler: powerpc-linux-gcc (GCC) 11.2.0
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git/commit/?id=9e1a3ce0a952450a1163cc93ab1df6d4fa8c8155
        git remote add kees https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git
        git fetch --no-tags kees for-next/execve
        git checkout 9e1a3ce0a952450a1163cc93ab1df6d4fa8c8155
        # save the config file to linux build tree
        mkdir build_dir
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-11.2.0 make.cross O=build_dir ARCH=powerpc SHELL=/bin/bash

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@...el.com>

All warnings (new ones prefixed by >>):

   In file included from fs/binfmt_elf.c:2351:
   fs/binfmt_elf_test.c: In function 'total_mapping_size_test':
>> fs/binfmt_elf_test.c:52:1: warning: the frame size of 1056 bytes is larger than 1024 bytes [-Wframe-larger-than=]
      52 | }
         | ^


vim +52 fs/binfmt_elf_test.c

     3	
     4	static void total_mapping_size_test(struct kunit *test)
     5	{
     6		struct elf_phdr empty[] = {
     7			{ .p_type = PT_LOAD, .p_vaddr = 0, .p_memsz = 0, },
     8			{ .p_type = PT_INTERP, .p_vaddr = 10, .p_memsz = 999999, },
     9		};
    10		/*
    11		 * readelf -lW /bin/mount | grep '^  .*0x0' | awk '{print "\t\t{ .p_type = PT_" \
    12		 *				$1 ", .p_vaddr = " $3 ", .p_memsz = " $6 ", },"}'
    13		 */
    14		struct elf_phdr mount[] = {
    15			{ .p_type = PT_PHDR, .p_vaddr = 0x00000040, .p_memsz = 0x0002d8, },
    16			{ .p_type = PT_INTERP, .p_vaddr = 0x00000318, .p_memsz = 0x00001c, },
    17			{ .p_type = PT_LOAD, .p_vaddr = 0x00000000, .p_memsz = 0x0033a8, },
    18			{ .p_type = PT_LOAD, .p_vaddr = 0x00004000, .p_memsz = 0x005c91, },
    19			{ .p_type = PT_LOAD, .p_vaddr = 0x0000a000, .p_memsz = 0x0022f8, },
    20			{ .p_type = PT_LOAD, .p_vaddr = 0x0000d330, .p_memsz = 0x000d40, },
    21			{ .p_type = PT_DYNAMIC, .p_vaddr = 0x0000d928, .p_memsz = 0x000200, },
    22			{ .p_type = PT_NOTE, .p_vaddr = 0x00000338, .p_memsz = 0x000030, },
    23			{ .p_type = PT_NOTE, .p_vaddr = 0x00000368, .p_memsz = 0x000044, },
    24			{ .p_type = PT_GNU_PROPERTY, .p_vaddr = 0x00000338, .p_memsz = 0x000030, },
    25			{ .p_type = PT_GNU_EH_FRAME, .p_vaddr = 0x0000b490, .p_memsz = 0x0001ec, },
    26			{ .p_type = PT_GNU_STACK, .p_vaddr = 0x00000000, .p_memsz = 0x000000, },
    27			{ .p_type = PT_GNU_RELRO, .p_vaddr = 0x0000d330, .p_memsz = 0x000cd0, },
    28		};
    29		size_t mount_size = 0xE070;
    30		/* https://lore.kernel.org/linux-fsdevel/YfF18Dy85mCntXrx@fractal.localdomain */
    31		struct elf_phdr unordered[] = {
    32			{ .p_type = PT_LOAD, .p_vaddr = 0x00000000, .p_memsz = 0x0033a8, },
    33			{ .p_type = PT_LOAD, .p_vaddr = 0x0000d330, .p_memsz = 0x000d40, },
    34			{ .p_type = PT_LOAD, .p_vaddr = 0x00004000, .p_memsz = 0x005c91, },
    35			{ .p_type = PT_LOAD, .p_vaddr = 0x0000a000, .p_memsz = 0x0022f8, },
    36		};
    37	
    38		/* No headers, no size. */
    39		KUNIT_EXPECT_EQ(test, total_mapping_size(NULL, 0), 0);
    40		KUNIT_EXPECT_EQ(test, total_mapping_size(empty, 0), 0);
    41		/* Empty headers, no size. */
    42		KUNIT_EXPECT_EQ(test, total_mapping_size(empty, 1), 0);
    43		/* No PT_LOAD headers, no size. */
    44		KUNIT_EXPECT_EQ(test, total_mapping_size(&empty[1], 1), 0);
    45		/* Empty PT_LOAD and non-PT_LOAD headers, no size. */
    46		KUNIT_EXPECT_EQ(test, total_mapping_size(empty, 2), 0);
    47	
    48		/* Normal set of PT_LOADS, and expected size. */
    49		KUNIT_EXPECT_EQ(test, total_mapping_size(mount, ARRAY_SIZE(mount)), mount_size);
    50		/* Unordered PT_LOADs result in same size. */
    51		KUNIT_EXPECT_EQ(test, total_mapping_size(unordered, ARRAY_SIZE(unordered)), mount_size);
  > 52	}
    53	

---
0-DAY CI Kernel Test Service
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ