From: kernel test robot <lkp@intel.com>
To: Holger Dengler <dengler@linux.ibm.com>,
Eric Biggers <ebiggers@kernel.org>,
David Laight <david.laight.linux@gmail.com>
Cc: llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev,
Ard Biesheuvel <ardb@kernel.org>,
"Jason A . Donenfeld" <Jason@zx2c4.com>,
Herbert Xu <herbert@gondor.apana.org.au>,
Harald Freudenberger <freude@linux.ibm.com>,
Holger Dengler <dengler@linux.ibm.com>,
linux-kernel@vger.kernel.org, linux-crypto@vger.kernel.org
Subject: Re: [PATCH v2 1/1] lib/crypto: tests: Add KUnit tests for AES
Date: Tue, 20 Jan 2026 01:22:59 +0800 [thread overview]
Message-ID: <202601200149.4hhdN1QQ-lkp@intel.com> (raw)
In-Reply-To: <20260119121210.2662-2-dengler@linux.ibm.com>
Hi Holger,
kernel test robot noticed the following build warnings:
[auto build test WARNING on 47753e09a15d9fd7cdf114550510f4f2af9333ec]
url: https://github.com/intel-lab-lkp/linux/commits/Holger-Dengler/lib-crypto-tests-Add-KUnit-tests-for-AES/20260119-201615
base: 47753e09a15d9fd7cdf114550510f4f2af9333ec
patch link: https://lore.kernel.org/r/20260119121210.2662-2-dengler%40linux.ibm.com
patch subject: [PATCH v2 1/1] lib/crypto: tests: Add KUnit tests for AES
config: arm-randconfig-003-20260119 (https://download.01.org/0day-ci/archive/20260120/202601200149.4hhdN1QQ-lkp@intel.com/config)
compiler: clang version 22.0.0git (https://github.com/llvm/llvm-project 9b8addffa70cee5b2acc5454712d9cf78ce45710)
reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20260120/202601200149.4hhdN1QQ-lkp@intel.com/reproduce)
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@intel.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202601200149.4hhdN1QQ-lkp@intel.com/
All warnings (new ones prefixed by >>):
>> lib/crypto/tests/aes_kunit.c:77:31: warning: overflow in expression; result is -1'179'869'184 with type 'long' [-Winteger-overflow]
77 | div64_u64(AES_BLOCK_SIZE * NSEC_PER_SEC / 1000000,
| ~~~~~~~~~~~~~~~^~~~~~~~~~~~~~
include/kunit/test.h:680:39: note: expanded from macro 'kunit_info'
680 | kunit_printk(KERN_INFO, test, fmt, ##__VA_ARGS__)
| ^~~~~~~~~~~
include/kunit/test.h:668:21: note: expanded from macro 'kunit_printk'
668 | (test)->name, ##__VA_ARGS__)
| ^~~~~~~~~~~
include/kunit/test.h:661:21: note: expanded from macro 'kunit_log'
661 | printk(lvl fmt, ##__VA_ARGS__); \
| ^~~~~~~~~~~
include/linux/printk.h:512:60: note: expanded from macro 'printk'
512 | #define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
| ^~~~~~~~~~~
include/linux/printk.h:484:19: note: expanded from macro 'printk_index_wrap'
484 | _p_func(_fmt, ##__VA_ARGS__); \
| ^~~~~~~~~~~
>> lib/crypto/tests/aes_kunit.c:77:31: warning: overflow in expression; result is -1'179'869'184 with type 'long' [-Winteger-overflow]
77 | div64_u64(AES_BLOCK_SIZE * NSEC_PER_SEC / 1000000,
| ~~~~~~~~~~~~~~~^~~~~~~~~~~~~~
include/kunit/test.h:680:39: note: expanded from macro 'kunit_info'
680 | kunit_printk(KERN_INFO, test, fmt, ##__VA_ARGS__)
| ^~~~~~~~~~~
include/kunit/test.h:668:21: note: expanded from macro 'kunit_printk'
668 | (test)->name, ##__VA_ARGS__)
| ^~~~~~~~~~~
include/kunit/test.h:663:8: note: expanded from macro 'kunit_log'
663 | ##__VA_ARGS__); \
| ^~~~~~~~~~~
lib/crypto/tests/aes_kunit.c:80:31: warning: overflow in expression; result is -1'179'869'184 with type 'long' [-Winteger-overflow]
80 | div64_u64(AES_BLOCK_SIZE * NSEC_PER_SEC / 1000000,
| ~~~~~~~~~~~~~~~^~~~~~~~~~~~~~
include/kunit/test.h:680:39: note: expanded from macro 'kunit_info'
680 | kunit_printk(KERN_INFO, test, fmt, ##__VA_ARGS__)
| ^~~~~~~~~~~
include/kunit/test.h:668:21: note: expanded from macro 'kunit_printk'
668 | (test)->name, ##__VA_ARGS__)
| ^~~~~~~~~~~
include/kunit/test.h:661:21: note: expanded from macro 'kunit_log'
661 | printk(lvl fmt, ##__VA_ARGS__); \
| ^~~~~~~~~~~
include/linux/printk.h:512:60: note: expanded from macro 'printk'
512 | #define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
| ^~~~~~~~~~~
include/linux/printk.h:484:19: note: expanded from macro 'printk_index_wrap'
484 | _p_func(_fmt, ##__VA_ARGS__); \
| ^~~~~~~~~~~
lib/crypto/tests/aes_kunit.c:80:31: warning: overflow in expression; result is -1'179'869'184 with type 'long' [-Winteger-overflow]
80 | div64_u64(AES_BLOCK_SIZE * NSEC_PER_SEC / 1000000,
| ~~~~~~~~~~~~~~~^~~~~~~~~~~~~~
include/kunit/test.h:680:39: note: expanded from macro 'kunit_info'
680 | kunit_printk(KERN_INFO, test, fmt, ##__VA_ARGS__)
| ^~~~~~~~~~~
include/kunit/test.h:668:21: note: expanded from macro 'kunit_printk'
668 | (test)->name, ##__VA_ARGS__)
| ^~~~~~~~~~~
include/kunit/test.h:663:8: note: expanded from macro 'kunit_log'
663 | ##__VA_ARGS__); \
| ^~~~~~~~~~~
4 warnings generated.
vim +77 lib/crypto/tests/aes_kunit.c
45
46 static void benchmark_aes(struct kunit *test, const struct aes_testvector *tv)
47 {
48 const size_t num_iters = 100;
49 struct aes_key aes_key;
50 u8 out[AES_BLOCK_SIZE];
51 u64 t, t_enc, t_dec;
52 int rc;
53
54 if (!IS_ENABLED(CONFIG_CRYPTO_LIB_BENCHMARK))
55 kunit_skip(test, "not enabled");
56
57 rc = aes_preparekey(&aes_key, tv->key.b, tv->key.len);
58 KUNIT_ASSERT_EQ(test, 0, rc);
59
60 /* warm-up */
61 for (size_t i = 0; i < num_iters; i++) {
62 aes_encrypt(&aes_key, out, tv->plain);
63 aes_decrypt(&aes_key, out, tv->cipher);
64 }
65
66 t_enc = NSEC_PER_SEC;
67 t_dec = NSEC_PER_SEC;
68 for (size_t i = 0; i < num_iters; i++) {
69 t = time_aes_op(true, &aes_key, out, tv->plain);
70 t_enc = MIN_T(u64, t, t_enc);
71
72 t = time_aes_op(false, &aes_key, out, tv->cipher);
73 t_dec = MIN_T(u64, t, t_dec);
74 }
75
76 kunit_info(test, "enc (len=%zu): %llu MB/s", (size_t)AES_BLOCK_SIZE,
> 77 div64_u64(AES_BLOCK_SIZE * NSEC_PER_SEC / 1000000,
78 (t_enc ?: 1)));
79 kunit_info(test, "dec (len=%zu): %llu MB/s", (size_t)AES_BLOCK_SIZE,
80 div64_u64(AES_BLOCK_SIZE * NSEC_PER_SEC / 1000000,
81 (t_dec ?: 1)));
82 }
83
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
next prev parent reply other threads:[~2026-01-19 17:24 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-01-19 12:12 [PATCH v2 0/1] lib/crypto: tests: KUnit test-suite for AES Holger Dengler
2026-01-19 12:12 ` [PATCH v2 1/1] lib/crypto: tests: Add KUnit tests " Holger Dengler
2026-01-19 16:39 ` kernel test robot
2026-01-19 17:22 ` kernel test robot [this message]
2026-01-19 20:31 ` kernel test robot
2026-01-29 1:18 ` Eric Biggers
2026-01-30 10:54 ` Holger Dengler
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=202601200149.4hhdN1QQ-lkp@intel.com \
--to=lkp@intel.com \
--cc=Jason@zx2c4.com \
--cc=ardb@kernel.org \
--cc=david.laight.linux@gmail.com \
--cc=dengler@linux.ibm.com \
--cc=ebiggers@kernel.org \
--cc=freude@linux.ibm.com \
--cc=herbert@gondor.apana.org.au \
--cc=linux-crypto@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=llvm@lists.linux.dev \
--cc=oe-kbuild-all@lists.linux.dev \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox