lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 21 Apr 2017 08:54:09 +0800
From:   kbuild test robot <lkp@...el.com>
To:     Megha Dey <megha.dey@...ux.intel.com>
Cc:     kbuild-all@...org, herbert@...dor.apana.org.au,
        tim.c.chen@...ux.intel.com, davem@...emloft.net,
        linux-crypto@...r.kernel.org, linux-kernel@...r.kernel.org,
        megha.dey@...el.com, Megha Dey <megha.dey@...ux.intel.com>
Subject: Re: [Patch V5 7/7] crypto: AES CBC multi-buffer tcrypt

Hi Megha,

[auto build test WARNING on next-20170420]
[also build test WARNING on v4.11-rc7]
[cannot apply to crypto/master sparc-next/master v4.9-rc8 v4.9-rc7 v4.9-rc6]
[if your patch is applied to the wrong git tree, please drop us a note to help improve the system]

url:    https://github.com/0day-ci/linux/commits/Megha-Dey/crypto-AES-CBC-multibuffer-implementation/20170421-064210
config: m68k-sun3_defconfig (attached as .config)
compiler: m68k-linux-gcc (GCC) 4.9.0
reproduce:
        wget https://raw.githubusercontent.com/01org/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # save the attached .config to linux build tree
        make.cross ARCH=m68k 

All warnings (new ones prefixed by >>):

   crypto/tcrypt.c: In function 'test_mb_acipher_cycles':
>> crypto/tcrypt.c:1082:3: warning: format '%llu' expects argument of type 'long long unsigned int', but argument 2 has type 'long unsigned int' [-Wformat=]
      pr_cont("1 operation in %llu cycles (%d bytes)\n",
      ^

vim +1082 crypto/tcrypt.c

  1066		 * Initiate a maximum of MB_WIDTH operations per loop
  1067		 * Measure performance over MB_WIDTH iterations
  1068		 * Let do_multi_acipher_op count the cycles
  1069		 */
  1070		for (i = 0; i < ITR; i++) {
  1071			mb_start = get_cycles();
  1072			ret = do_multi_acipher_op(req, enc);
  1073	
  1074			mb_end = get_cycles();
  1075			cycles += mb_end - mb_start;
  1076			if (ret)
  1077				goto out;
  1078		}
  1079	
  1080	out:
  1081		if (ret == 0)
> 1082			pr_cont("1 operation in %llu cycles (%d bytes)\n",
  1083				(cycles + 4) / (ITR*MB_WIDTH), blen);
  1084	
  1085		return ret;
  1086	}
  1087	
  1088	static void test_mb_acipher_speed(const char *algo, int enc, unsigned int secs,
  1089					struct cipher_speed_template *template,
  1090					unsigned int tcount, u8 *keysize)

---
0-DAY kernel test infrastructure                Open Source Technology Center
https://lists.01.org/pipermail/kbuild-all                   Intel Corporation

Download attachment ".config.gz" of type "application/gzip" (11963 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ