lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CA+icZUUuxphqCBhgGF+XhBG12v-rJ9BB9r5xEWJHLUAHfxFJWA@mail.gmail.com>
Date:   Fri, 25 Mar 2022 13:05:26 +0100
From:   Sedat Dilek <sedat.dilek@...il.com>
To:     Peter Zijlstra <peterz@...radead.org>
Cc:     x86@...nel.org, linux-kernel@...r.kernel.org,
        linux-crypto@...r.kernel.org, ebiggers@...gle.com,
        herbert@...dor.apana.org.au, Jason@...c4.com,
        Josh Poimboeuf <jpoimboe@...hat.com>,
        Stephen Rothwell <sfr@...b.auug.org.au>,
        Nathan Chancellor <nathan@...nel.org>,
        Nick Desaulniers <ndesaulniers@...gle.com>
Subject: [PATCH 1/2] x86/chacha20: Avoid spurious jumps to other functions

[ CC me I am not subscribed to LKML/linux-x86 mailing-lists ]

[ CC Nathan and Nick D. ]

Hi Peter,

Thanks for the patch it fixes a long standing build warning for me
with LLVM/Clang toolchain (here: v14.0.0).

Along with a workaround in [1] I am now "warning-free".

Just a note:
I guess crypto folk want a "***crypto:*** x86/chacha20: ..." in the
subject line.

Feel free to add my:

Tested-by: Sedat Dilek <sedat.dilek@...il.com> # LLVM/Clang v14.0.0 (x86-64)

Regards,
- Sedat -

[0] https://github.com/ClangBuiltLinux/linux/issues/1613
[1] https://github.com/ClangBuiltLinux/linux/issues/1613#issuecomment-1078663165

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ