diff options
| author | Thomas Weißschuh <thomas.weissschuh@linutronix.de> | 2026-01-02 08:32:03 +0100 |
|---|---|---|
| committer | Eric Biggers <ebiggers@kernel.org> | 2026-01-08 11:14:59 -0800 |
| commit | fcff71fd888dce1533a3975e68fc80824ff69ef9 (patch) | |
| tree | 4555d1365e243f18abf608dbc812630f91ab63a1 /include/uapi/linux | |
| parent | 9ace4753a5202b02191d54e9fdf7f9e3d02b85eb (diff) | |
lib/crypto: tests: polyval_kunit: Increase iterations for preparekey in IRQs
On my development machine the generic, memcpy()-only implementation of
polyval_preparekey() is too fast for the IRQ workers to actually fire.
The test fails.
Increase the iterations to make the test more robust.
The test will run for a maximum of one second in any case.
[EB: This failure was already fixed by commit c31f4aa8fed0 ("kunit:
Enforce task execution in {soft,hard}irq contexts"). I'm still applying
this patch too, since the iteration count in this test made its running
time much shorter than the other similar ones.]
Fixes: b3aed551b3fc ("lib/crypto: tests: Add KUnit tests for POLYVAL")
Signed-off-by: Thomas Weißschuh <thomas.weissschuh@linutronix.de>
Link: https://lore.kernel.org/r/20260102-kunit-polyval-fix-v1-1-5313b5a65f35@linutronix.de
Signed-off-by: Eric Biggers <ebiggers@kernel.org>
Diffstat (limited to 'include/uapi/linux')
0 files changed, 0 insertions, 0 deletions
