LKML Archive on lore.kernel.org
help / color / mirror / Atom feed
From: kernel test robot <lkp@intel.com>
To: Heiko Carstens <hca@linux.ibm.com>
Cc: kbuild-all@lists.01.org, linux-kernel@vger.kernel.org,
	Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Subject: [linux-stable-rc:linux-5.4.y 5847/5947] crypto/ecc.c:1281:1: warning: the frame size of 2144 bytes is larger than 2048 bytes
Date: Sat, 31 Jul 2021 08:45:55 +0800	[thread overview]
Message-ID: <202107310841.wxY4efD6-lkp@intel.com> (raw)

[-- Attachment #1: Type: text/plain, Size: 6401 bytes --]

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y
head:   0aabc02724664358bdcea0cacee374b42c6dcfdb
commit: 43dd03f088191e6c85529e649ebb5c54994486ee [5847/5947] init/Kconfig: make COMPILE_TEST depend on !S390
config: s390-randconfig-r033-20210722 (attached as .config)
compiler: s390-linux-gcc (GCC) 10.3.0
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git/commit/?id=43dd03f088191e6c85529e649ebb5c54994486ee
        git remote add linux-stable-rc https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
        git fetch --no-tags linux-stable-rc linux-5.4.y
        git checkout 43dd03f088191e6c85529e649ebb5c54994486ee
        # save the attached .config to linux build tree
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-10.3.0 make.cross ARCH=s390 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>

All warnings (new ones prefixed by >>):

   crypto/ecc.c: In function 'ecc_point_mult_shamir':
>> crypto/ecc.c:1281:1: warning: the frame size of 2144 bytes is larger than 2048 bytes [-Wframe-larger-than=]
    1281 | }
         | ^


vim +1281 crypto/ecc.c

0d7a78643f6972 Vitaly Chikunov 2019-04-11  1224  
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1225  /* Computes R = u1P + u2Q mod p using Shamir's trick.
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1226   * Based on: Kenneth MacKay's micro-ecc (2014).
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1227   */
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1228  void ecc_point_mult_shamir(const struct ecc_point *result,
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1229  			   const u64 *u1, const struct ecc_point *p,
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1230  			   const u64 *u2, const struct ecc_point *q,
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1231  			   const struct ecc_curve *curve)
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1232  {
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1233  	u64 z[ECC_MAX_DIGITS];
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1234  	u64 sump[2][ECC_MAX_DIGITS];
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1235  	u64 *rx = result->x;
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1236  	u64 *ry = result->y;
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1237  	unsigned int ndigits = curve->g.ndigits;
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1238  	unsigned int num_bits;
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1239  	struct ecc_point sum = ECC_POINT_INIT(sump[0], sump[1], ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1240  	const struct ecc_point *points[4];
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1241  	const struct ecc_point *point;
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1242  	unsigned int idx;
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1243  	int i;
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1244  
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1245  	ecc_point_add(&sum, p, q, curve);
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1246  	points[0] = NULL;
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1247  	points[1] = p;
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1248  	points[2] = q;
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1249  	points[3] = &sum;
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1250  
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1251  	num_bits = max(vli_num_bits(u1, ndigits),
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1252  		       vli_num_bits(u2, ndigits));
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1253  	i = num_bits - 1;
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1254  	idx = (!!vli_test_bit(u1, i)) | ((!!vli_test_bit(u2, i)) << 1);
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1255  	point = points[idx];
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1256  
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1257  	vli_set(rx, point->x, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1258  	vli_set(ry, point->y, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1259  	vli_clear(z + 1, ndigits - 1);
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1260  	z[0] = 1;
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1261  
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1262  	for (--i; i >= 0; i--) {
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1263  		ecc_point_double_jacobian(rx, ry, z, curve->p, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1264  		idx = (!!vli_test_bit(u1, i)) | ((!!vli_test_bit(u2, i)) << 1);
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1265  		point = points[idx];
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1266  		if (point) {
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1267  			u64 tx[ECC_MAX_DIGITS];
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1268  			u64 ty[ECC_MAX_DIGITS];
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1269  			u64 tz[ECC_MAX_DIGITS];
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1270  
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1271  			vli_set(tx, point->x, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1272  			vli_set(ty, point->y, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1273  			apply_z(tx, ty, z, curve->p, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1274  			vli_mod_sub(tz, rx, tx, curve->p, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1275  			xycz_add(tx, ty, rx, ry, curve->p, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1276  			vli_mod_mult_fast(z, z, tz, curve->p, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1277  		}
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1278  	}
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1279  	vli_mod_inv(z, z, curve->p, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1280  	apply_z(rx, ry, z, curve->p, ndigits);
0d7a78643f6972 Vitaly Chikunov 2019-04-11 @1281  }
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1282  EXPORT_SYMBOL(ecc_point_mult_shamir);
0d7a78643f6972 Vitaly Chikunov 2019-04-11  1283  

:::::: The code at line 1281 was first introduced by commit
:::::: 0d7a78643f6972214e99205b364e508f8ea9598e crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm

:::::: TO: Vitaly Chikunov <vt@altlinux.org>
:::::: CC: Herbert Xu <herbert@gondor.apana.org.au>

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org

[-- Attachment #2: .config.gz --]
[-- Type: application/gzip, Size: 15147 bytes --]

                 reply	other threads:[~2021-07-31  0:46 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=202107310841.wxY4efD6-lkp@intel.com \
    --to=lkp@intel.com \
    --cc=gregkh@linuxfoundation.org \
    --cc=hca@linux.ibm.com \
    --cc=kbuild-all@lists.01.org \
    --cc=linux-kernel@vger.kernel.org \
    --subject='Re: [linux-stable-rc:linux-5.4.y 5847/5947] crypto/ecc.c:1281:1: warning: the frame size of 2144 bytes is larger than 2048 bytes' \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).