Hello Tom,

On 06.01.26 00:58, Tom Rini wrote:
** CID 449815:       Memory - illegal accesses  (OVERRUN)
/lib/sm3.c: 252           in sm3_final()


_____________________________________________________________________________________________
*** CID 449815:         Memory - illegal accesses  (OVERRUN)
/lib/sm3.c: 252             in sm3_final()
246             unsigned int partial = sctx->count % SM3_BLOCK_SIZE;
247             u32 W[16];
248             int i;
249
250             sctx->buffer[partial++] = 0x80;
251             if (partial > bit_offset) {
     CID 449815:         Memory - illegal accesses  (OVERRUN)
     Overrunning array of 64 bytes at byte offset 64 by dereferencing pointer 
"sctx->buffer + partial". [Note: The source code implementation of the function 
has been overridden by a builtin model.]
252                     memset(sctx->buffer + partial, 0, SM3_BLOCK_SIZE - 
partial);
253                     partial = 0;
254
255                     sm3_block(sctx, sctx->buffer, 1, W);
256             }
257

** CID 432237:       Null pointer dereferences  (NULL_RETURNS)

Good catch, as this part is completly from linux [1]
(nowaydays this code is gone at HEAD)

prepared patch, azure run started for it:

https://dev.azure.com/hs0298/hs/_build/results?buildId=197&view=results

if no problems found, I send it.

bye,
Heiko

[1] https://elixir.bootlin.com/linux/v6.14/source/include/crypto/sm3_base.h#L86
--
Nabla Software Engineering
HRB 40522 Augsburg
Phone: +49 821 45592596
E-Mail: [email protected]
Geschäftsführer : Stefano Babic

Reply via email to