Received: by 2002:ab2:620c:0:b0:1ef:ffd0:ce49 with SMTP id o12csp1037797lqt; Tue, 19 Mar 2024 10:51:45 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCV6LYRhg9T1bqwzQlIUtw5s9pb2UbPjMqqNX8o3Alzx1cZ2frIGQh9mV+A6YoCUNgjK0q7heKlvU//KLMFL8C8TKYnqqWXl7qEBpg3aGA== X-Google-Smtp-Source: AGHT+IGMRxaLIXDhIoWthZ5uIUN2KtpsYawV+2/QqT9kQCw1FyjaUhDPredvqA+ov2xF4QNfZfB2 X-Received: by 2002:a05:6a20:8417:b0:1a3:5efa:b32c with SMTP id c23-20020a056a20841700b001a35efab32cmr10542703pzd.29.1710870704915; Tue, 19 Mar 2024 10:51:44 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1710870704; cv=pass; d=google.com; s=arc-20160816; b=pYHEimnid2SD+fxzJuN9uOFb3BBCDql56YKXuR9rvkMUwCOB/N1a6d3svU71pJ6bwE YcxOU5hlPX7/357CcMtMyv1djiWA3e+UTs9cUZZXbYd12wBJXn1LPC8Mpz9BvQXzIgL0 7wp+4kniguK1eUAKCqfgoMiB9A3BEGzjqnsOWZoTmfcacQ9QLQHIpNKBgTxM2vNee4zH UTYFy6zT8/OHs11ms9U36eBe6UHySlDzrcOmS29xIeJ9IeA19awma7z/Vdgpm007mPO0 p75afSJKjKBqwi/+ruumjfwM2QzO9u20Nr+3oRf6HPBmEvj2yiuvD8gxK+G7YPDjAYPF domg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=lQa9X5OL42PloAT+Lq3ciH3Mi3+6kQBIQRvkmOAudFo=; fh=AA/kh5VPdX/5rTcgdaPx24T+v3XG+xUGDbsY40s/910=; b=UavIH1Bh/GWDtP31tvgKayOl0Wft7CfjqJztNSl2vKDg+VjiQele6wYUTo/P84th/F 4UlsvJ4XDGqevdeRSId1dqPBqGVgoj0RbxCyh7hdus4KXVp55t1+DnC8c/D1y10B+MFa ELPddag1NHd69MCH8cE6FebOcwdZ4wXdB+5hUT/mnO1sWp55n7pwouNdNqOFaHek/hsn VgXty9EZwMyVlhxsICPV7wQwyQz+ZdKYQIDpqAJv9TefPakNeIq+hmiKlyhVRAtK93ev CE1n6ouTGRMPKYLJ9e9FiP+jIsLsym2S7xUs+bRlBsynyhLb0lgv/xkNMcUisXO1niS9 ZZ9Q==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=GS4+m2BR; arc=pass (i=1 spf=pass spfdomain=redhat.com dkim=pass dkdomain=redhat.com dmarc=pass fromdomain=redhat.com); spf=pass (google.com: domain of linux-nfs+bounces-2402-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-nfs+bounces-2402-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id gx26-20020a056a001e1a00b006e603c6a31asi11446018pfb.51.2024.03.19.10.51.44 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 Mar 2024 10:51:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs+bounces-2402-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=GS4+m2BR; arc=pass (i=1 spf=pass spfdomain=redhat.com dkim=pass dkdomain=redhat.com dmarc=pass fromdomain=redhat.com); spf=pass (google.com: domain of linux-nfs+bounces-2402-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-nfs+bounces-2402-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 7803528274D for ; Tue, 19 Mar 2024 17:51:44 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 2E8602C183; Tue, 19 Mar 2024 17:51:42 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="GS4+m2BR" X-Original-To: linux-nfs@vger.kernel.org Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3BCB82BAE7 for ; Tue, 19 Mar 2024 17:51:39 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.133.124 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710870702; cv=none; b=ASHuFu61XwpqAUYFZo8wRTqQvfTS8jR7OSUkfqG7XwQ2KGV7nyWDet2M/4tcuOSXRydOPJWzeiqZgxohd/bom0OEOtcS/EW91RxE6s5tE+HOXT/Vr0rC7n5CaysOHYhwk320MsHIEvmCNXldkujEkvJsF3djXtng+U3+Mvokh6U= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710870702; c=relaxed/simple; bh=B72w7FbCI8H0ZDULnBPEJgLKDYdKlo7A9mgelHY+E1I=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=gO1HGa6aJR7FeO7dMq9oWs7pbtlOHxKiToCvPCkKxNv4OnPPc9xnkgd7wBIq/TaVfjPBpDvLbjQq4EjCRCKVikSIZFSbTUBAk56ApB4XKDHOZHuoL8EbVsUa4tahdJlnEodh5D+xfKLizcI3/XJxsGHUQMQ2BoH++uPC8Kp9TLg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=GS4+m2BR; arc=none smtp.client-ip=170.10.133.124 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1710870699; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=lQa9X5OL42PloAT+Lq3ciH3Mi3+6kQBIQRvkmOAudFo=; b=GS4+m2BRF9+q7wKbdXojHuGq9BDA7RkFsnQ5iOpCtMpImsSkf9RvXL0MM+552G98CvBsXs avBG4Sg/q33DrBQDlxIpO7MRnM9ILFiYYwrWXjOGUbSe9gpbDvb5gTi5/w1tDna9ldLgpB +BPX6lsG2RJiVpz4OcMwsRF2/XalACE= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-568-09c7dVnePbegZChnZdt0Sg-1; Tue, 19 Mar 2024 13:51:34 -0400 X-MC-Unique: 09c7dVnePbegZChnZdt0Sg-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.rdu2.redhat.com [10.11.54.8]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 2A5A7185A786; Tue, 19 Mar 2024 17:51:34 +0000 (UTC) Received: from aion.redhat.com (unknown [10.22.32.11]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 0FC46C54F80; Tue, 19 Mar 2024 17:51:34 +0000 (UTC) Received: by aion.redhat.com (Postfix, from userid 1000) id 8B29812DCB5; Tue, 19 Mar 2024 13:51:29 -0400 (EDT) Date: Tue, 19 Mar 2024 13:51:29 -0400 From: Scott Mayhew To: Nico Pache Cc: linux-nfs@vger.kernel.org, kunit-dev@googlegroups.com Subject: Re: [BUG REPORT] not ok 1 Derive Kc subkey for camellia128-cts-cmac Message-ID: References: <20240307140923.16598-1-npache@redhat.com> Precedence: bulk X-Mailing-List: linux-nfs@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20240307140923.16598-1-npache@redhat.com> X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.8 Hi, On Thu, 07 Mar 2024, Nico Pache wrote: > Hi, > > One of the RFC 6803 key derivation kunit subtests is failing. > > cki-project data warehouse : https://datawarehouse.cki-project.org/issue/2514 > > Arches: X86_64, ARM64, S390x, ppc64le > First Appeared: ~6.8.rc2 > > TRACE: > # Subtest: RFC 6803 key derivation > # RFC 6803 key derivation: ASSERTION FAILED at net/sunrpc/auth_gss/gss_krb5_test.c:63 > Expected err == 0, but > err == -110 (0xffffffffffffff92) > not ok 1 Derive Kc subkey for camellia128-cts-cmac > ok 2 Derive Ke subkey for camellia128-cts-cmac > ok 3 Derive Ki subkey for camellia128-cts-cmac > ok 4 Derive Kc subkey for camellia256-cts-cmac > ok 5 Derive Ke subkey for camellia256-cts-cmac > ok 6 Derive Ki subkey for camellia256-cts-cmac > # RFC 6803 key derivation: pass:5 fail:1 skip:0 total:6 > not ok 1 RFC 6803 key derivation This was broken by: c72a870926c2 kunit: add ability to run tests after boot using debugfs __kunit_test_suites_init() runs any time a kernel module is loaded, via the "kunit_mod_nb" notifier_block... even if the kernel module has no kunit tests. But now __kunit_test_suites_init() also locks a mutex, which is a problem if a kunit test itself needs to load a kernel module (which the gss_krb5_test module does). This fixes it for me: ---8<--- diff --git a/lib/kunit/test.c b/lib/kunit/test.c index 088489856db8..18af9453632b 100644 --- a/lib/kunit/test.c +++ b/lib/kunit/test.c @@ -707,6 +707,9 @@ int __kunit_test_suites_init(struct kunit_suite * const * const suites, int num_ { unsigned int i; + if (num_suites == 0) + return 0; + if (!kunit_enabled() && num_suites > 0) { pr_info("kunit: disabled\n"); return 0; ---8<--- More detail below: Here's the modprobe command where I loaded the gss_krb5_test module. This process has the "kunit_run_lock" mutex locked: PID: 1468 TASK: ffff9aed0ac20000 CPU: 0 COMMAND: "modprobe" #0 [ffffba974196f6f8] __schedule at ffffffff83fd85f5 #1 [ffffba974196f7b0] schedule at ffffffff83fd9672 #2 [ffffba974196f7c8] schedule_timeout at ffffffff83fe0308 #3 [ffffba974196f818] wait_for_completion_timeout at ffffffff83fda3d4 #4 [ffffba974196f878] kunit_try_catch_run at ffffffffc0d5e851 [kunit] #5 [ffffba974196f8c8] kunit_run_tests at ffffffffc0d5c0ea [kunit] #6 [ffffba974196fb78] __kunit_test_suites_init at ffffffffc0d5c9af [kunit] #7 [ffffba974196fb98] kunit_module_notify at ffffffffc0d5ba4b [kunit] #8 [ffffba974196fc08] notifier_call_chain at ffffffff8314647a #9 [ffffba974196fc40] blocking_notifier_call_chain_robust at ffffffff83146565 #10 [ffffba974196fc88] load_module at ffffffff831e1935 #11 [ffffba974196fde8] __do_sys_init_module at ffffffff831e1fba #12 [ffffba974196fec0] do_syscall_64 at ffffffff83fc3461 #13 [ffffba974196fee8] do_user_addr_fault at ffffffff830979df #14 [ffffba974196ff28] exc_page_fault at ffffffff83fc9c7f #15 [ffffba974196ff50] entry_SYSCALL_64_after_hwframe at ffffffff840000ea RIP: 00007ff1f272b4ae RSP: 00007ffd45db8f68 RFLAGS: 00000246 RAX: ffffffffffffffda RBX: 000055bf4c0c4b20 RCX: 00007ff1f272b4ae RDX: 000055bf4b204e79 RSI: 0000000000099691 RDI: 000055bf4cbfd130 RBP: 00007ffd45db9020 R8: 000055bf4c0c4010 R9: 0000000000000007 R10: 0000000000000001 R11: 0000000000000246 R12: 000055bf4b204e79 R13: 0000000000040000 R14: 000055bf4c0c4c50 R15: 000055bf4c0c4390 ORIG_RAX: 00000000000000af CS: 0033 SS: 002b Here's the kunit test case running. It's trying to allocate "cmac(camellia)" via crypto_alloc_shash(): PID: 1508 TASK: ffff9aed155d0000 CPU: 1 COMMAND: "kunit_try_catch" #0 [ffffba974194fba0] __schedule at ffffffff83fd85f5 #1 [ffffba974194fc58] schedule at ffffffff83fd9672 #2 [ffffba974194fc70] schedule_timeout at ffffffff83fe0308 #3 [ffffba974194fcc0] wait_for_completion_killable_timeout at ffffffff83fda708 #4 [ffffba974194fd20] crypto_larval_wait at ffffffff83747fb4 #5 [ffffba974194fd38] crypto_alg_mod_lookup at ffffffff83748252 #6 [ffffba974194fd70] crypto_alloc_tfm_node at ffffffff83748492 #7 [ffffba974194fdb0] krb5_kdf_feedback_cmac at ffffffffc0d76bb2 [rpcsec_gss_krb5] #8 [ffffba974194fe30] kdf_case at ffffffffc0d800a8 [gss_krb5_test] #9 [ffffba974194fe80] kunit_try_run_case at ffffffffc0d5bb54 [kunit] #10 [ffffba974194fee8] kunit_generic_run_threadfn_adapter at ffffffffc0d5e797 [kunit] #11 [ffffba974194fef8] kthread at ffffffff8313eda5 #12 [ffffba974194ff30] ret_from_fork at ffffffff830414a1 #13 [ffffba974194ff50] ret_from_fork_asm at ffffffff830039ab Here the crypto manager is trying to modprobe the camellia kernel module via a usermodehelper call: PID: 1511 TASK: ffff9aed04630000 CPU: 3 COMMAND: "cryptomgr_probe" #0 [ffffba974195fb88] __schedule at ffffffff83fd85f5 #1 [ffffba974195fc40] schedule at ffffffff83fd9672 #2 [ffffba974195fc58] schedule_timeout at ffffffff83fe03c1 #3 [ffffba974195fca8] wait_for_completion_state at ffffffff83fdb06d #4 [ffffba974195fd18] call_usermodehelper_exec at ffffffff83130313 #5 [ffffba974195fd68] __request_module at ffffffff831e325d #6 [ffffba974195fe28] crypto_alg_mod_lookup at ffffffff83748220 #7 [ffffba974195fe60] crypto_grab_spawn at ffffffff83749ff7 #8 [ffffba974195fe98] cmac_create at ffffffff8375c2f0 #9 [ffffba974195fed8] cryptomgr_probe at ffffffff83754a93 #10 [ffffba974195fef8] kthread at ffffffff8313eda5 #11 [ffffba974195ff30] ret_from_fork at ffffffff830414a1 #12 [ffffba974195ff50] ret_from_fork_asm at ffffffff830039ab And here's the resulting modprobe command, which is stuck waiting on the "kunit_run_lock" mutex: PID: 1512 TASK: ffff9aed143fafc0 CPU: 2 COMMAND: "modprobe" #0 [ffffba9741957990] __schedule at ffffffff83fd85f5 #1 [ffffba9741957a48] schedule at ffffffff83fd9672 #2 [ffffba9741957a60] schedule_preempt_disabled at ffffffff83fd9cb5 #3 [ffffba9741957a68] __mutex_lock.constprop.0 at ffffffff83fdc57a #4 [ffffba9741957ae8] __kunit_test_suites_init at ffffffffc0d5c95a [kunit] #5 [ffffba9741957b08] kunit_module_notify at ffffffffc0d5ba4b [kunit] #6 [ffffba9741957b78] notifier_call_chain at ffffffff8314647a #7 [ffffba9741957bb0] blocking_notifier_call_chain_robust at ffffffff83146565 #8 [ffffba9741957bf8] load_module at ffffffff831e1935 #9 [ffffba9741957d58] __do_sys_init_module at ffffffff831e1fba #10 [ffffba9741957e30] do_syscall_64 at ffffffff83fc3461 #11 [ffffba9741957e48] __vm_munmap at ffffffff833bcdeb #12 [ffffba9741957ee8] do_syscall_64 at ffffffff83fc3470 #13 [ffffba9741957f50] entry_SYSCALL_64_after_hwframe at ffffffff840000ea RIP: 00007f8ba092b4ae RSP: 00007ffc771e0378 RFLAGS: 00000246 RAX: ffffffffffffffda RBX: 00005572137e6e40 RCX: 00007f8ba092b4ae RDX: 0000557211c4de79 RSI: 0000000000080451 RDI: 00007f8b9ff90010 RBP: 00007ffc771e0430 R8: 00005572137e6010 R9: 0000000000000007 R10: 0000000000000001 R11: 0000000000000246 R12: 0000557211c4de79 R13: 0000000000040000 R14: 00005572137e73b0 R15: 00005572137e6400 ORIG_RAX: 00000000000000af CS: 0033 SS: 002b The camellia module doesn't even have any kunit tests, so __kunit_test_suites_init() is waiting to lock the "kunit_run_lock" mutex for nothing: crash> module -o | grep num_kunit [0x478] int num_kunit_init_suites; [0x488] int num_kunit_suites; crash> mod | grep camellia ffffffffc0da15c0 camellia_x86_64 ffffffffc0d99000 57344 (not loaded) [CONFIG_KALLSYMS] crash> px 0xffffffffc0da15c0+0x478 $1 = 0xffffffffc0da1a38 crash> px 0xffffffffc0da15c0+0x488 $2 = 0xffffffffc0da1a48 crash> rd 0xffffffffc0da1a38 ffffffffc0da1a38: 0000000000000000 ........ crash> rd 0xffffffffc0da1a48 ffffffffc0da1a48: 0000000000000000 ........ -Scott > -- > 2.44.0 > >