Hello Tom, On 06.01.26 00:58, Tom Rini wrote:
** CID 449815: Memory - illegal accesses (OVERRUN) /lib/sm3.c: 252 in sm3_final()_____________________________________________________________________________________________ *** CID 449815: Memory - illegal accesses (OVERRUN) /lib/sm3.c: 252 in sm3_final() 246 unsigned int partial = sctx->count % SM3_BLOCK_SIZE; 247 u32 W[16]; 248 int i; 249 250 sctx->buffer[partial++] = 0x80; 251 if (partial > bit_offset) {CID 449815: Memory - illegal accesses (OVERRUN) Overrunning array of 64 bytes at byte offset 64 by dereferencing pointer "sctx->buffer + partial". [Note: The source code implementation of the function has been overridden by a builtin model.]252 memset(sctx->buffer + partial, 0, SM3_BLOCK_SIZE - partial); 253 partial = 0; 254 255 sm3_block(sctx, sctx->buffer, 1, W); 256 } 257 ** CID 432237: Null pointer dereferences (NULL_RETURNS)
Good catch, as this part is completly from linux [1] (nowaydays this code is gone at HEAD) prepared patch, azure run started for it: https://dev.azure.com/hs0298/hs/_build/results?buildId=197&view=results if no problems found, I send it. bye, Heiko [1] https://elixir.bootlin.com/linux/v6.14/source/include/crypto/sm3_base.h#L86 -- Nabla Software Engineering HRB 40522 Augsburg Phone: +49 821 45592596 E-Mail: [email protected] Geschäftsführer : Stefano Babic

