tree:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
linux-4.14.y
head: e1f7d50ae3a3ec342e87a9b1ce6787bfb8b3c08b
commit: 760f8522ce08a24abac3208290f93fe3fffc0d6c [6067/9999] selinux: use kernel
linux/socket.h for genheaders and mdp
config: x86_64-allyesconfig (attached as .config)
compiler: gcc-7 (Ubuntu 7.5.0-6ubuntu2) 7.5.0
reproduce (this is a W=1 build):
#
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.gi...
git remote add linux-stable-rc
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
git fetch --no-tags linux-stable-rc linux-4.14.y
git checkout 760f8522ce08a24abac3208290f93fe3fffc0d6c
# save the attached .config to linux build tree
make W=1 ARCH=x86_64
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp(a)intel.com>
All warnings (new ones prefixed by >>):
drivers/crypto/qat/qat_common/qat_algs.c: In function
'qat_alg_do_precomputes':
> drivers/crypto/qat/qat_common/qat_algs.c:156:7: warning: argument
1 range [18446744071562067968, 18446744073709551615] exceeds maximum object size
9223372036854775807 [-Walloc-size-larger-than=]
char ipad[block_size];
^~~~
drivers/crypto/qat/qat_common/qat_algs.c:156:7: note: in a call to built-in allocation
function '__builtin_alloca_with_align'
--
drivers/watchdog/eurotechwdt.c: In function 'eurwdt_ioctl':
> drivers/watchdog/eurotechwdt.c:292:3: warning: this statement may
fall through [-Wimplicit-fallthrough=]
spin_unlock(&eurwdt_lock);
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/watchdog/eurotechwdt.c:295:2: note: here
case WDIOC_GETTIMEOUT:
^~~~
arch/x86/include/asm/bitops.h: Assembler messages:
arch/x86/include/asm/bitops.h:225: Warning: no instruction mnemonic suffix given and no
register operands; using default for `bts'
vim +156 drivers/crypto/qat/qat_common/qat_algs.c
d370cec3219490 Tadeusz Struk 2014-06-05 144
d370cec3219490 Tadeusz Struk 2014-06-05 145 static int qat_alg_do_precomputes(struct
icp_qat_hw_auth_algo_blk *hash,
338e84f3a9740a Tadeusz Struk 2014-12-08 146 struct qat_alg_aead_ctx *ctx,
d370cec3219490 Tadeusz Struk 2014-06-05 147 const uint8_t *auth_key,
26c3af6c1580a0 Tadeusz Struk 2014-09-10 148 unsigned int auth_keylen)
d370cec3219490 Tadeusz Struk 2014-06-05 149 {
37e5265437a02e Behan Webster 2014-04-04 150 SHASH_DESC_ON_STACK(shash,
ctx->hash_tfm);
d370cec3219490 Tadeusz Struk 2014-06-05 151 struct sha1_state sha1;
d370cec3219490 Tadeusz Struk 2014-06-05 152 struct sha256_state sha256;
d370cec3219490 Tadeusz Struk 2014-06-05 153 struct sha512_state sha512;
d370cec3219490 Tadeusz Struk 2014-06-05 154 int block_size =
crypto_shash_blocksize(ctx->hash_tfm);
d370cec3219490 Tadeusz Struk 2014-06-05 155 int digest_size =
crypto_shash_digestsize(ctx->hash_tfm);
48eb3691e8beab Herbert Xu 2015-01-14 @156 char ipad[block_size];
48eb3691e8beab Herbert Xu 2015-01-14 157 char opad[block_size];
d370cec3219490 Tadeusz Struk 2014-06-05 158 __be32 *hash_state_out;
d370cec3219490 Tadeusz Struk 2014-06-05 159 __be64 *hash512_state_out;
d370cec3219490 Tadeusz Struk 2014-06-05 160 int i, offset;
d370cec3219490 Tadeusz Struk 2014-06-05 161
48eb3691e8beab Herbert Xu 2015-01-14 162 memset(ipad, 0, block_size);
48eb3691e8beab Herbert Xu 2015-01-14 163 memset(opad, 0, block_size);
37e5265437a02e Behan Webster 2014-04-04 164 shash->tfm = ctx->hash_tfm;
37e5265437a02e Behan Webster 2014-04-04 165 shash->flags = 0x0;
d370cec3219490 Tadeusz Struk 2014-06-05 166
d370cec3219490 Tadeusz Struk 2014-06-05 167 if (auth_keylen > block_size) {
37e5265437a02e Behan Webster 2014-04-04 168 int ret = crypto_shash_digest(shash,
auth_key,
48eb3691e8beab Herbert Xu 2015-01-14 169 auth_keylen, ipad);
d370cec3219490 Tadeusz Struk 2014-06-05 170 if (ret)
d370cec3219490 Tadeusz Struk 2014-06-05 171 return ret;
d370cec3219490 Tadeusz Struk 2014-06-05 172
48eb3691e8beab Herbert Xu 2015-01-14 173 memcpy(opad, ipad, digest_size);
d370cec3219490 Tadeusz Struk 2014-06-05 174 } else {
d370cec3219490 Tadeusz Struk 2014-06-05 175 memcpy(ipad, auth_key, auth_keylen);
d370cec3219490 Tadeusz Struk 2014-06-05 176 memcpy(opad, auth_key, auth_keylen);
d370cec3219490 Tadeusz Struk 2014-06-05 177 }
d370cec3219490 Tadeusz Struk 2014-06-05 178
d370cec3219490 Tadeusz Struk 2014-06-05 179 for (i = 0; i < block_size; i++) {
d370cec3219490 Tadeusz Struk 2014-06-05 180 char *ipad_ptr = ipad + i;
d370cec3219490 Tadeusz Struk 2014-06-05 181 char *opad_ptr = opad + i;
f14011ad7cf79a Corentin LABBE 2017-05-19 182 *ipad_ptr ^= HMAC_IPAD_VALUE;
f14011ad7cf79a Corentin LABBE 2017-05-19 183 *opad_ptr ^= HMAC_OPAD_VALUE;
d370cec3219490 Tadeusz Struk 2014-06-05 184 }
d370cec3219490 Tadeusz Struk 2014-06-05 185
37e5265437a02e Behan Webster 2014-04-04 186 if (crypto_shash_init(shash))
d370cec3219490 Tadeusz Struk 2014-06-05 187 return -EFAULT;
d370cec3219490 Tadeusz Struk 2014-06-05 188
37e5265437a02e Behan Webster 2014-04-04 189 if (crypto_shash_update(shash, ipad,
block_size))
d370cec3219490 Tadeusz Struk 2014-06-05 190 return -EFAULT;
d370cec3219490 Tadeusz Struk 2014-06-05 191
d370cec3219490 Tadeusz Struk 2014-06-05 192 hash_state_out = (__be32
*)hash->sha.state1;
d370cec3219490 Tadeusz Struk 2014-06-05 193 hash512_state_out = (__be64
*)hash_state_out;
d370cec3219490 Tadeusz Struk 2014-06-05 194
d370cec3219490 Tadeusz Struk 2014-06-05 195 switch (ctx->qat_hash_alg) {
d370cec3219490 Tadeusz Struk 2014-06-05 196 case ICP_QAT_HW_AUTH_ALGO_SHA1:
37e5265437a02e Behan Webster 2014-04-04 197 if (crypto_shash_export(shash,
&sha1))
d370cec3219490 Tadeusz Struk 2014-06-05 198 return -EFAULT;
d370cec3219490 Tadeusz Struk 2014-06-05 199 for (i = 0; i < digest_size >>
2; i++, hash_state_out++)
d370cec3219490 Tadeusz Struk 2014-06-05 200 *hash_state_out =
cpu_to_be32(*(sha1.state + i));
d370cec3219490 Tadeusz Struk 2014-06-05 201 break;
d370cec3219490 Tadeusz Struk 2014-06-05 202 case ICP_QAT_HW_AUTH_ALGO_SHA256:
37e5265437a02e Behan Webster 2014-04-04 203 if (crypto_shash_export(shash,
&sha256))
d370cec3219490 Tadeusz Struk 2014-06-05 204 return -EFAULT;
d370cec3219490 Tadeusz Struk 2014-06-05 205 for (i = 0; i < digest_size >>
2; i++, hash_state_out++)
d370cec3219490 Tadeusz Struk 2014-06-05 206 *hash_state_out =
cpu_to_be32(*(sha256.state + i));
d370cec3219490 Tadeusz Struk 2014-06-05 207 break;
d370cec3219490 Tadeusz Struk 2014-06-05 208 case ICP_QAT_HW_AUTH_ALGO_SHA512:
37e5265437a02e Behan Webster 2014-04-04 209 if (crypto_shash_export(shash,
&sha512))
d370cec3219490 Tadeusz Struk 2014-06-05 210 return -EFAULT;
d370cec3219490 Tadeusz Struk 2014-06-05 211 for (i = 0; i < digest_size >>
3; i++, hash512_state_out++)
d370cec3219490 Tadeusz Struk 2014-06-05 212 *hash512_state_out =
cpu_to_be64(*(sha512.state + i));
d370cec3219490 Tadeusz Struk 2014-06-05 213 break;
d370cec3219490 Tadeusz Struk 2014-06-05 214 default:
d370cec3219490 Tadeusz Struk 2014-06-05 215 return -EFAULT;
d370cec3219490 Tadeusz Struk 2014-06-05 216 }
d370cec3219490 Tadeusz Struk 2014-06-05 217
37e5265437a02e Behan Webster 2014-04-04 218 if (crypto_shash_init(shash))
d370cec3219490 Tadeusz Struk 2014-06-05 219 return -EFAULT;
d370cec3219490 Tadeusz Struk 2014-06-05 220
37e5265437a02e Behan Webster 2014-04-04 221 if (crypto_shash_update(shash, opad,
block_size))
d370cec3219490 Tadeusz Struk 2014-06-05 222 return -EFAULT;
d370cec3219490 Tadeusz Struk 2014-06-05 223
d370cec3219490 Tadeusz Struk 2014-06-05 224 offset =
round_up(qat_get_inter_state_size(ctx->qat_hash_alg), 8);
d370cec3219490 Tadeusz Struk 2014-06-05 225 hash_state_out = (__be32
*)(hash->sha.state1 + offset);
d370cec3219490 Tadeusz Struk 2014-06-05 226 hash512_state_out = (__be64
*)hash_state_out;
d370cec3219490 Tadeusz Struk 2014-06-05 227
d370cec3219490 Tadeusz Struk 2014-06-05 228 switch (ctx->qat_hash_alg) {
d370cec3219490 Tadeusz Struk 2014-06-05 229 case ICP_QAT_HW_AUTH_ALGO_SHA1:
37e5265437a02e Behan Webster 2014-04-04 230 if (crypto_shash_export(shash,
&sha1))
d370cec3219490 Tadeusz Struk 2014-06-05 231 return -EFAULT;
d370cec3219490 Tadeusz Struk 2014-06-05 232 for (i = 0; i < digest_size >>
2; i++, hash_state_out++)
d370cec3219490 Tadeusz Struk 2014-06-05 233 *hash_state_out =
cpu_to_be32(*(sha1.state + i));
d370cec3219490 Tadeusz Struk 2014-06-05 234 break;
d370cec3219490 Tadeusz Struk 2014-06-05 235 case ICP_QAT_HW_AUTH_ALGO_SHA256:
37e5265437a02e Behan Webster 2014-04-04 236 if (crypto_shash_export(shash,
&sha256))
d370cec3219490 Tadeusz Struk 2014-06-05 237 return -EFAULT;
d370cec3219490 Tadeusz Struk 2014-06-05 238 for (i = 0; i < digest_size >>
2; i++, hash_state_out++)
d370cec3219490 Tadeusz Struk 2014-06-05 239 *hash_state_out =
cpu_to_be32(*(sha256.state + i));
d370cec3219490 Tadeusz Struk 2014-06-05 240 break;
d370cec3219490 Tadeusz Struk 2014-06-05 241 case ICP_QAT_HW_AUTH_ALGO_SHA512:
37e5265437a02e Behan Webster 2014-04-04 242 if (crypto_shash_export(shash,
&sha512))
d370cec3219490 Tadeusz Struk 2014-06-05 243 return -EFAULT;
d370cec3219490 Tadeusz Struk 2014-06-05 244 for (i = 0; i < digest_size >>
3; i++, hash512_state_out++)
d370cec3219490 Tadeusz Struk 2014-06-05 245 *hash512_state_out =
cpu_to_be64(*(sha512.state + i));
d370cec3219490 Tadeusz Struk 2014-06-05 246 break;
d370cec3219490 Tadeusz Struk 2014-06-05 247 default:
d370cec3219490 Tadeusz Struk 2014-06-05 248 return -EFAULT;
d370cec3219490 Tadeusz Struk 2014-06-05 249 }
aa408d6019775c Struk, Tadeusz 2014-11-14 250 memzero_explicit(ipad, block_size);
aa408d6019775c Struk, Tadeusz 2014-11-14 251 memzero_explicit(opad, block_size);
d370cec3219490 Tadeusz Struk 2014-06-05 252 return 0;
d370cec3219490 Tadeusz Struk 2014-06-05 253 }
d370cec3219490 Tadeusz Struk 2014-06-05 254
:::::: The code at line 156 was first introduced by commit
:::::: 48eb3691e8beab349e3a700d45f070be8d4b88ba crypto: qat - Ensure ipad and opad are
zeroed
:::::: TO: Herbert Xu <herbert(a)gondor.apana.org.au>
:::::: CC: Herbert Xu <herbert(a)gondor.apana.org.au>
---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org