From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9585418872A for ; Thu, 16 Apr 2026 03:05:20 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.175.65.11 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1776308722; cv=none; b=ovHmUvR20aWXhudtO/8SlHnk/tLeN3u9VVb4AJg6Nk0Z99AA0xP3Og99dGd0/9Fw0GNt4MSQG2poz6/V09bbYfcaVhNWmo0u9SKunLpsA+O8t50nqyrdECxMYPnm/c9bd+OOg+6jmjec5mSXTxn54hQhn2F8sPFe2H9c8mXGueM= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1776308722; c=relaxed/simple; bh=oLlRjTggjSKGCdDYy8mh0XDo852VTrTFEUJ8S01rCTk=; h=Date:From:To:Cc:Subject:Message-ID; b=QoG/pO+jzZVZDEgM2M5tQVXY2jLnR8HI7tNNga/KfrPtHbCpjNIhGuQFlUf7CEY+DAOHWPd3AybbeUGVYGj6suB0Lu7ppmIDpdeR8EJkx02FP+pnrR5jHX/plAqd/Rni81WfrpVSTJ2TpIbddjKxByPSP8toek4a8BurHQmQqn8= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=jnwtOSm4; arc=none smtp.client-ip=198.175.65.11 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="jnwtOSm4" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1776308720; x=1807844720; h=date:from:to:cc:subject:message-id; bh=oLlRjTggjSKGCdDYy8mh0XDo852VTrTFEUJ8S01rCTk=; b=jnwtOSm4KEHvqXZo2/najEazUxiF5nE3N17Uud/79cuKZ3x+rSqj6kz+ EcAFFrbHF1zyeLkfNt7z3TVXQwjjY3oe/eEsTDEPWVh0/qVhtxU2iaxjS pUOHo2PlGVuMIEwdLT06HeMVeUvDMEyYorWjCKnkOKU6XBJzMh4jhwfts KeKqavajxz6MNOPha0eZkISKw8VxLLoHQQW7pDMuJBoDZtzQGYW1VithZ bHZKkFZv4v5WCO3n5doolVWwTd7hB5EYiCTaB6yulVKXyJ8newhrGinDO ecxPlKUrOBk2d6sxcS7xfbQ5KsRnc6TujBA1DpEsfeZAVWfkLR1J++nVf w==; X-CSE-ConnectionGUID: 1PykMQXbQQGWGIm84iwpxA== X-CSE-MsgGUID: V7m28JX4StKs2vEjCArHMg== X-IronPort-AV: E=McAfee;i="6800,10657,11760"; a="87602011" X-IronPort-AV: E=Sophos;i="6.23,181,1770624000"; d="scan'208";a="87602011" Received: from orviesa008.jf.intel.com ([10.64.159.148]) by orvoesa103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Apr 2026 20:05:20 -0700 X-CSE-ConnectionGUID: QTvpotYRRqGR7rMmBoQ6hw== X-CSE-MsgGUID: ylI335nnSi+jl2U5PyKpkA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.23,181,1770624000"; d="scan'208";a="230534856" Received: from lkp-server01.sh.intel.com (HELO 7f3b36e5d6a5) ([10.239.97.150]) by orviesa008.jf.intel.com with ESMTP; 15 Apr 2026 20:05:19 -0700 Received: from kbuild by 7f3b36e5d6a5 with local (Exim 4.98.2) (envelope-from ) id 1wDD2Z-000000001E8-3ztT; Thu, 16 Apr 2026 03:05:15 +0000 Date: Thu, 16 Apr 2026 11:04:43 +0800 From: kernel test robot To: Herbert Xu Cc: llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev, linux-kernel@vger.kernel.org Subject: crypto/hmac.c:251:12: warning: stack frame size (1152) exceeds limit (1024) in 'hmac_setkey_ahash' Message-ID: <202604161035.PMTaI4Cg-lkp@intel.com> User-Agent: s-nail v14.9.25 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Hi Herbert, FYI, the error/warning still remains. tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master head: 9e1e9d660255d7216067193d774f338d08d8528d commit: c3103416d5217655d707d9417aaf66f184e3d72f crypto: hmac - Add ahash support date: 11 months ago config: mips-eyeq6_defconfig (https://download.01.org/0day-ci/archive/20260416/202604161035.PMTaI4Cg-lkp@intel.com/config) compiler: clang version 23.0.0git (https://github.com/llvm/llvm-project 5bac06718f502014fade905512f1d26d578a18f3) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20260416/202604161035.PMTaI4Cg-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Fixes: c3103416d521 ("crypto: hmac - Add ahash support") | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202604161035.PMTaI4Cg-lkp@intel.com/ All warnings (new ones prefixed by >>): >> crypto/hmac.c:251:12: warning: stack frame size (1152) exceeds limit (1024) in 'hmac_setkey_ahash' [-Wframe-larger-than] 251 | static int hmac_setkey_ahash(struct crypto_ahash *parent, | ^ 1 warning generated. vim +/hmac_setkey_ahash +251 crypto/hmac.c 250 > 251 static int hmac_setkey_ahash(struct crypto_ahash *parent, 252 const u8 *inkey, unsigned int keylen) 253 { 254 struct ahash_hmac_ctx *tctx = crypto_ahash_ctx(parent); 255 struct crypto_ahash *fb = crypto_ahash_fb(tctx->hash); 256 int ds = crypto_ahash_digestsize(parent); 257 int bs = crypto_ahash_blocksize(parent); 258 int ss = crypto_ahash_statesize(parent); 259 HASH_REQUEST_ON_STACK(req, fb); 260 u8 *opad = &tctx->pads[ss]; 261 u8 *ipad = &tctx->pads[0]; 262 int err, i; 263 264 if (fips_enabled && (keylen < 112 / 8)) 265 return -EINVAL; 266 267 ahash_request_set_callback(req, 0, NULL, NULL); 268 269 if (keylen > bs) { 270 ahash_request_set_virt(req, inkey, ipad, keylen); 271 err = crypto_ahash_digest(req); 272 if (err) 273 goto out_zero_req; 274 275 keylen = ds; 276 } else 277 memcpy(ipad, inkey, keylen); 278 279 memset(ipad + keylen, 0, bs - keylen); 280 memcpy(opad, ipad, bs); 281 282 for (i = 0; i < bs; i++) { 283 ipad[i] ^= HMAC_IPAD_VALUE; 284 opad[i] ^= HMAC_OPAD_VALUE; 285 } 286 287 ahash_request_set_virt(req, ipad, NULL, bs); 288 err = crypto_ahash_init(req) ?: 289 crypto_ahash_update(req) ?: 290 crypto_ahash_export(req, ipad); 291 292 ahash_request_set_virt(req, opad, NULL, bs); 293 err = err ?: 294 crypto_ahash_init(req) ?: 295 crypto_ahash_update(req) ?: 296 crypto_ahash_export(req, opad); 297 298 out_zero_req: 299 HASH_REQUEST_ZERO(req); 300 return err; 301 } 302 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki