On arm32, we get warnings about high stack usage in some of the functions:

crypto/testmgr.c:2269:12: error: stack frame size of 1032 bytes in function 
'alg_test_aead' [-Werror,-Wframe-larger-than=]
static int alg_test_aead(const struct alg_test_desc *desc, const char *driver,
           ^
crypto/testmgr.c:1693:12: error: stack frame size of 1312 bytes in function 
'__alg_test_hash' [-Werror,-Wframe-larger-than=]
static int __alg_test_hash(const struct hash_testvec *vecs,
           ^

On of the larger objects on the stack here is struct testvec_config, so
change that to dynamic allocation.

Fixes: 40153b10d91c ("crypto: testmgr - fuzz AEADs against their generic 
implementation")
Fixes: d435e10e67be ("crypto: testmgr - fuzz skciphers against their generic 
implementation")
Fixes: 9a8a6b3f0950 ("crypto: testmgr - fuzz hashes against their generic 
implementation")
Signed-off-by: Arnd Bergmann <a...@arndb.de>
---
 crypto/testmgr.c | 43 ++++++++++++++++++++++++++++++++-----------
 1 file changed, 32 insertions(+), 11 deletions(-)

diff --git a/crypto/testmgr.c b/crypto/testmgr.c
index 6c28055d41ca..0e07f61f1a31 100644
--- a/crypto/testmgr.c
+++ b/crypto/testmgr.c
@@ -1565,7 +1565,7 @@ static int test_hash_vs_generic_impl(const char *driver,
        unsigned int i;
        struct hash_testvec vec = { 0 };
        char vec_name[64];
-       struct testvec_config cfg;
+       struct testvec_config *cfg;
        char cfgname[TESTVEC_CONFIG_NAMELEN];
        int err;
 
@@ -1595,6 +1595,12 @@ static int test_hash_vs_generic_impl(const char *driver,
                return err;
        }
 
+       cfg = kzalloc(sizeof(*cfg), GFP_KERNEL);
+       if (!cfg) {
+               err = -ENOMEM;
+               goto out;
+       }
+
        /* Check the algorithm properties for consistency. */
 
        if (digestsize != crypto_shash_digestsize(generic_tfm)) {
@@ -1629,9 +1635,9 @@ static int test_hash_vs_generic_impl(const char *driver,
                generate_random_hash_testvec(generic_tfm, &vec,
                                             maxkeysize, maxdatasize,
                                             vec_name, sizeof(vec_name));
-               generate_random_testvec_config(&cfg, cfgname, sizeof(cfgname));
+               generate_random_testvec_config(cfg, cfgname, sizeof(cfgname));
 
-               err = test_hash_vec_cfg(driver, &vec, vec_name, &cfg,
+               err = test_hash_vec_cfg(driver, &vec, vec_name, cfg,
                                        req, desc, tsgl, hashstate);
                if (err)
                        goto out;
@@ -1639,6 +1645,7 @@ static int test_hash_vs_generic_impl(const char *driver,
        }
        err = 0;
 out:
+       kfree(cfg);
        kfree(vec.key);
        kfree(vec.plaintext);
        kfree(vec.digest);
@@ -2135,7 +2142,7 @@ static int test_aead_vs_generic_impl(const char *driver,
        unsigned int i;
        struct aead_testvec vec = { 0 };
        char vec_name[64];
-       struct testvec_config cfg;
+       struct testvec_config *cfg;
        char cfgname[TESTVEC_CONFIG_NAMELEN];
        int err;
 
@@ -2165,6 +2172,12 @@ static int test_aead_vs_generic_impl(const char *driver,
                return err;
        }
 
+       cfg = kzalloc(sizeof(*cfg), GFP_KERNEL);
+       if (!cfg) {
+               err = -ENOMEM;
+               goto out;
+       }
+
        generic_req = aead_request_alloc(generic_tfm, GFP_KERNEL);
        if (!generic_req) {
                err = -ENOMEM;
@@ -2219,13 +2232,13 @@ static int test_aead_vs_generic_impl(const char *driver,
                generate_random_aead_testvec(generic_req, &vec,
                                             maxkeysize, maxdatasize,
                                             vec_name, sizeof(vec_name));
-               generate_random_testvec_config(&cfg, cfgname, sizeof(cfgname));
+               generate_random_testvec_config(cfg, cfgname, sizeof(cfgname));
 
-               err = test_aead_vec_cfg(driver, ENCRYPT, &vec, vec_name, &cfg,
+               err = test_aead_vec_cfg(driver, ENCRYPT, &vec, vec_name, cfg,
                                        req, tsgls);
                if (err)
                        goto out;
-               err = test_aead_vec_cfg(driver, DECRYPT, &vec, vec_name, &cfg,
+               err = test_aead_vec_cfg(driver, DECRYPT, &vec, vec_name, cfg,
                                        req, tsgls);
                if (err)
                        goto out;
@@ -2233,6 +2246,7 @@ static int test_aead_vs_generic_impl(const char *driver,
        }
        err = 0;
 out:
+       kfree(cfg);
        kfree(vec.key);
        kfree(vec.iv);
        kfree(vec.assoc);
@@ -2682,7 +2696,7 @@ static int test_skcipher_vs_generic_impl(const char 
*driver,
        unsigned int i;
        struct cipher_testvec vec = { 0 };
        char vec_name[64];
-       struct testvec_config cfg;
+       struct testvec_config *cfg;
        char cfgname[TESTVEC_CONFIG_NAMELEN];
        int err;
 
@@ -2716,6 +2730,12 @@ static int test_skcipher_vs_generic_impl(const char 
*driver,
                return err;
        }
 
+       cfg = kzalloc(sizeof(*cfg), GFP_KERNEL);
+       if (!cfg) {
+               err = -ENOMEM;
+               goto out;
+       }
+
        generic_req = skcipher_request_alloc(generic_tfm, GFP_KERNEL);
        if (!generic_req) {
                err = -ENOMEM;
@@ -2763,20 +2783,21 @@ static int test_skcipher_vs_generic_impl(const char 
*driver,
        for (i = 0; i < fuzz_iterations * 8; i++) {
                generate_random_cipher_testvec(generic_req, &vec, maxdatasize,
                                               vec_name, sizeof(vec_name));
-               generate_random_testvec_config(&cfg, cfgname, sizeof(cfgname));
+               generate_random_testvec_config(cfg, cfgname, sizeof(cfgname));
 
                err = test_skcipher_vec_cfg(driver, ENCRYPT, &vec, vec_name,
-                                           &cfg, req, tsgls);
+                                           cfg, req, tsgls);
                if (err)
                        goto out;
                err = test_skcipher_vec_cfg(driver, DECRYPT, &vec, vec_name,
-                                           &cfg, req, tsgls);
+                                           cfg, req, tsgls);
                if (err)
                        goto out;
                cond_resched();
        }
        err = 0;
 out:
+       kfree(cfg);
        kfree(vec.key);
        kfree(vec.iv);
        kfree(vec.ptext);
-- 
2.20.0

Reply via email to