tree: https://git.kernel.org/pub/scm/linux/kernel/git/herbert/cryptodev-2.6.git master head: 161151d79ff4f7ed35d4ebb0eb7727a517c34ef2 commit: 3d5b1ecdea6fb94f8c61554fcb2ba776a2d3d0e6 [53/54] crypto: rsa - RSA padding algorithm config: s390-allmodconfig (attached as .config) reproduce: wget https://git.kernel.org/cgit/linux/kernel/git/wfg/lkp-tests.git/plain/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross git checkout 3d5b1ecdea6fb94f8c61554fcb2ba776a2d3d0e6 # save the attached .config to linux build tree make.cross ARCH=s390 All warnings (new ones prefixed by >>): crypto/rsa-pkcs1pad.c: In function 'pkcs1pad_encrypt_sign_complete': >> crypto/rsa-pkcs1pad.c:135:1: warning: 'pkcs1pad_encrypt_sign_complete' uses dynamic stack allocation } ^ vim +/pkcs1pad_encrypt_sign_complete +135 crypto/rsa-pkcs1pad.c 119 sg_nents_for_len(req->dst, 120 sizeof(zeros)), 121 zeros, sizeof(zeros)); 122 } 123 124 sg_pcopy_from_buffer(req->dst, 125 sg_nents_for_len(req->dst, ctx->key_size), 126 req_ctx->out_buf, req_ctx->child_req.dst_len, 127 sizeof(zeros)); 128 } 129 req->dst_len = ctx->key_size; 130 131 kfree(req_ctx->in_buf); 132 kzfree(req_ctx->out_buf); 133 134 return err; > 135 } 136 137 static void pkcs1pad_encrypt_sign_complete_cb( 138 struct crypto_async_request *child_async_req, int err) 139 { 140 struct akcipher_request *req = child_async_req->data; 141 struct crypto_async_request async_req; 142 143 if (err == -EINPROGRESS) --- 0-DAY kernel test infrastructure Open Source Technology Center https://lists.01.org/pipermail/kbuild-all Intel Corporation