From patchwork Wed Dec 4 15:28:03 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "kernelci.org bot" X-Patchwork-Id: 180799 Delivered-To: patch@linaro.org Received: by 2002:ac9:3d8b:0:0:0:0:0 with SMTP id u11csp771516oce; Wed, 4 Dec 2019 07:28:07 -0800 (PST) X-Google-Smtp-Source: APXvYqztxdX9+Dv1PNWXZdgUTHNEr34anYkcX4mRSSVyWfiNPYMCT5QjiuhFm3LbH7Epzooxrh33 X-Received: by 2002:a9d:6d06:: with SMTP id o6mr2926343otp.239.1575473287649; Wed, 04 Dec 2019 07:28:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575473287; cv=none; d=google.com; s=arc-20160816; b=B4mpNoGUEW7iINUe4vMDRzaQvXv3qt72tvjvu+OdnjTLTN2UHz3s1iarC3AwXmAUNS wMqpuluXf1AyYR1x/rVsQVpj5yTSju30wBRSTWsSgLyi/v6IfXco9yVUKp6Z7YdBBWTB 5lNhoooKLLe3qCrEia9QpHs11JB5stz4TeT+d+Vvc72Yvb77l7gYu+AIMiZfK/T3abhu Li3vLHbfBnhkxhYCKmHIos7gA+ozf0q/7v5pghaldYUUkyP7asLuIKqkzlMwUxOuy26q cip3SkCTkBX5bD7vAx/3ijfGSwciF8IpHw3ihN9GnmmA7UO9zx/qy3CGwLysLTDfCkWQ KplA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:from:to:subject :content-transfer-encoding:mime-version:date:message-id :dkim-signature; bh=n0PMYgXBxpTJTwUFndMR8j8g1X+3mghMk/wqd/jqgb4=; b=raY3FE7qcfFSAfT20LqXzlhB5QGVtGwvRcHb2SrQ1Fe0TrrWeazfPH6vxry9QawJ2x uWvPD5flmaIkL2rAQoWvyXlyd80m5RQt0duOQYUdMangeHdeGJHQMOnrmb1cXdVZDY8e x7sVsRXH+bJfLAty6t0vl8rqvjz5y5d5bRmUxVWiy7zDiYwO9Yfd1A7mJc3pIdQLzo4X eANA6ljYqwwHpmIflqc6zezHWjafzg0KX8VPQxHt17D6GKncNxThAZvNmJn+9mOJ/lZ4 X30bhTX3F28hvQPztuxfHOmJr6QfAM9wfxqHHaEQ1e0j28ViXZMfyqpdnF7XqMMObxW4 IgBw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernelci-org.20150623.gappssmtp.com header.s=20150623 header.b=cPNuQoPs; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v18si3405119otn.257.2019.12.04.07.28.07; Wed, 04 Dec 2019 07:28:07 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernelci-org.20150623.gappssmtp.com header.s=20150623 header.b=cPNuQoPs; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728293AbfLDP2G (ORCPT + 3 others); Wed, 4 Dec 2019 10:28:06 -0500 Received: from mail-wr1-f67.google.com ([209.85.221.67]:34817 "EHLO mail-wr1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728274AbfLDP2G (ORCPT ); Wed, 4 Dec 2019 10:28:06 -0500 Received: by mail-wr1-f67.google.com with SMTP id g17so9145095wro.2 for ; Wed, 04 Dec 2019 07:28:05 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kernelci-org.20150623.gappssmtp.com; s=20150623; h=message-id:date:mime-version:content-transfer-encoding:subject:to :from:cc; bh=n0PMYgXBxpTJTwUFndMR8j8g1X+3mghMk/wqd/jqgb4=; b=cPNuQoPsK/IaM6bjnT9f9fznnLZV6W3amrqNwE5KT0g0fAzb0IB/r7CZzMMmqG5ooF bH1J5zqnHViwUlMvEZUMnhKSdwt5CVERjPLQwXJJ59xzXl4TkPThLLFguRiCuTZqZLgh p8o9z51+Io63YGZ1D9Y3mBoy3VbQcM+CbjGLvPNMOhaoW6Hz6VFWLzT4xI3Xe6Ft6jSG SWNl6f5cKTA5UVJI9eL/iWIM3Xqav0Ge9KFr1dzDqT+TaR4jNStC23Z+6MfNvMlDZFg5 vHOUT9n0pWZu63JbNZUgt5Wr8SRaNB8EYuYCYVvGYsz6+agsYFdQQOU/RNfLOp2vMOnS 7XbQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:message-id:date:mime-version :content-transfer-encoding:subject:to:from:cc; bh=n0PMYgXBxpTJTwUFndMR8j8g1X+3mghMk/wqd/jqgb4=; b=kB+Ip5ZP9DpvmXsHXvEkhcgRUqH+DP2UoLfHToYQ0affnBleshiHD9Irax7dBWYO4z Gye3/dHw+h1yVK4WvL1o8FT7ilRsJDMAsyT1ZCu8RclrmTx+3Uj0Ir0xuSHX0Qz00/d+ BE5npmhDEY0ZinNO4aAPxr8r4jimkqL8WAxiLIBUnc5sLEoRfVpC2h1I5LpCpPOOt5gI Ul2vwwnuJ8m0YELBkJjd5cqino+OxzvI3SJWpSZ1NcLdl0Ar9sVN7FfwzRHepCmQ0rPF JA7+ZzweO8jao8wkmfUZUFaM7z64LzIR/rfg+rsraj151sklpmPP0+pT5thLn0xKQFTK ViMQ== X-Gm-Message-State: APjAAAUbX09xMm1X5pVdNFA2ygE9R83Ts+rLqKEHmgbrn7A/IAGeNWfo 5Rsq2amiM2/Y/xAXhjnO+VDf+Q== X-Received: by 2002:adf:eb46:: with SMTP id u6mr4788809wrn.239.1575473284403; Wed, 04 Dec 2019 07:28:04 -0800 (PST) Received: from [148.251.42.114] ([2a01:4f8:201:9271::2]) by smtp.gmail.com with ESMTPSA id b2sm8607869wrr.76.2019.12.04.07.28.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 04 Dec 2019 07:28:03 -0800 (PST) Message-ID: <5de7d083.1c69fb81.82fe2.b0da@mx.google.com> Date: Wed, 04 Dec 2019 07:28:03 -0800 (PST) MIME-Version: 1.0 X-Kernelci-Report-Type: bisect X-Kernelci-Kernel: v5.4-9340-g16839329da69 X-Kernelci-Tree: ardb X-Kernelci-Branch: for-kernelci X-Kernelci-Lab-Name: lab-collabora Subject: ardb/for-kernelci bisection: boot on rk3288-rock2-square To: tomeu.vizoso@collabora.com, guillaume.tucker@collabora.com, enric.balletbo@collabora.com, khilman@baylibre.com, mgalka@collabora.com, Ard Biesheuvel , broonie@kernel.org From: "kernelci.org bot" Cc: Alexandre Torgue , linux-stm32@st-md-mailman.stormreply.com, linux-crypto@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, "David S. Miller" , Maxime Coquelin , Herbert Xu Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * This automated bisection report was sent to you on the basis * * that you may be involved with the breaking commit it has * * found. No manual investigation has been done to verify it, * * and the root cause of the problem may be somewhere else. * * * * If you do send a fix, please include this trailer: * * Reported-by: "kernelci.org bot" * * * * Hope this helps! * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * ardb/for-kernelci bisection: boot on rk3288-rock2-square Summary: Start: 16839329da69 enable extra tests by default Details: https://kernelci.org/boot/id/5de791acd6451dc5be960f08 Plain log: https://storage.kernelci.org//ardb/for-kernelci/v5.4-9340-g16839329da69/arm/multi_v7_defconfig+CONFIG_SMP=n/gcc-8/lab-collabora/boot-rk3288-rock2-square.txt HTML log: https://storage.kernelci.org//ardb/for-kernelci/v5.4-9340-g16839329da69/arm/multi_v7_defconfig+CONFIG_SMP=n/gcc-8/lab-collabora/boot-rk3288-rock2-square.html Result: 16839329da69 enable extra tests by default Checks: revert: PASS verify: PASS Parameters: Tree: ardb URL: git://git.kernel.org/pub/scm/linux/kernel/git/ardb/linux.git Branch: for-kernelci Target: rk3288-rock2-square CPU arch: arm Lab: lab-collabora Compiler: gcc-8 Config: multi_v7_defconfig+CONFIG_SMP=n Test suite: boot Breaking commit found: ------------------------------------------------------------------------------- commit 16839329da69263e7360f3819bae01bcf4b220ec Author: Ard Biesheuvel Date: Tue Dec 3 12:29:31 2019 +0000 enable extra tests by default ------------------------------------------------------------------------------- Git bisection log: ------------------------------------------------------------------------------- git bisect start # good: [b94ae8ad9fe79da61231999f347f79645b909bda] Merge tag 'seccomp-v5.5-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux git bisect good b94ae8ad9fe79da61231999f347f79645b909bda # bad: [16839329da69263e7360f3819bae01bcf4b220ec] enable extra tests by default git bisect bad 16839329da69263e7360f3819bae01bcf4b220ec # good: [25cbf24a7eec7c3dee4113b2e98b572e128009b7] crypto: aead - move crypto_aead_maxauthsize() to git bisect good 25cbf24a7eec7c3dee4113b2e98b572e128009b7 # good: [7b19c7a82950ed034645fa92adce29cd6163ed3e] crypto: testmgr - check skcipher min_keysize git bisect good 7b19c7a82950ed034645fa92adce29cd6163ed3e # good: [062752a354aaf03b46b86cba5fdaa2fd5c932860] crypto: testmgr - create struct aead_extra_tests_ctx git bisect good 062752a354aaf03b46b86cba5fdaa2fd5c932860 # good: [2cd56a00fff8584e342164c65e6b55da61f79c4a] crypto: testmgr - generate inauthentic AEAD test vectors git bisect good 2cd56a00fff8584e342164c65e6b55da61f79c4a # first bad commit: [16839329da69263e7360f3819bae01bcf4b220ec] enable extra tests by default ------------------------------------------------------------------------------- diff --git a/crypto/Kconfig b/crypto/Kconfig index 5575d48473bd..36af840aa820 100644 --- a/crypto/Kconfig +++ b/crypto/Kconfig @@ -140,7 +140,6 @@ if CRYPTO_MANAGER2 config CRYPTO_MANAGER_DISABLE_TESTS bool "Disable run-time self tests" - default y help Disable run-time self tests that normally take place at algorithm registration. @@ -148,6 +147,7 @@ config CRYPTO_MANAGER_DISABLE_TESTS config CRYPTO_MANAGER_EXTRA_TESTS bool "Enable extra run-time crypto self tests" depends on DEBUG_KERNEL && !CRYPTO_MANAGER_DISABLE_TESTS + default y help Enable extra run-time self tests of registered crypto algorithms, including randomized fuzz tests. diff --git a/crypto/testmgr.c b/crypto/testmgr.c index 88f33c0efb23..5df87bcf6c4d 100644 --- a/crypto/testmgr.c +++ b/crypto/testmgr.c @@ -40,7 +40,7 @@ static bool notests; module_param(notests, bool, 0644); MODULE_PARM_DESC(notests, "disable crypto self-tests"); -static bool panic_on_fail; +static bool panic_on_fail = true; module_param(panic_on_fail, bool, 0444); #ifdef CONFIG_CRYPTO_MANAGER_EXTRA_TESTS