Received: by 2002:ab2:6857:0:b0:1ef:ffd0:ce49 with SMTP id l23csp495108lqp; Thu, 21 Mar 2024 07:25:53 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCVhZMmLbsoojxvhsIgRGJaN0eTeoZZhvB7szPfkVr8JbAS47acMH0RSwuFj0gwRr64IaGTyoACXZEyQilNhQQ8dQn+iLkroeruzYyBK4w== X-Google-Smtp-Source: AGHT+IEl2+0jV35Vgxf7OvhIOm0pq1/h/Rh+xZxVK0HcWkYFYPlNHLXdgXUyoAMLe2OO6ObtuoBh X-Received: by 2002:a05:6a00:a83:b0:6ea:7b34:38ab with SMTP id b3-20020a056a000a8300b006ea7b3438abmr835180pfl.9.1711031152968; Thu, 21 Mar 2024 07:25:52 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1711031152; cv=pass; d=google.com; s=arc-20160816; b=ns/MdDOKVKEiyBODnnBY+5n4gQp775SGKosmp0DnVjr/GoyvOkv/MBI8ZFayRqIZYM 4PMRNjSiIWvgZ1IBP0Xt8OMEOpKDjTxP0VEbo/abRdfk0sHOA6jdqej2SeWWj18abucL Z1I1yP9AI5Yp3Z+ysH1eWgOs+lvxrfIUKElTnwCoxipUX2GAlmI5tZhpVnMvuvTQc0j/ sKkfuwECMQdM9a1A8f7zRsL0QIc7dyHuCiXfAeuJSuwLjxqxBwQhzaBQl9NLQc6b1/l3 xiqZs6OLkxdaBL1pUWKeC2s6DEsPdOVquyzuGOO2Xhy0GaBwefGQHycsx9BAIqteTGEI zYVw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :references:message-id:subject:cc:to:from:date:dkim-signature; bh=9IDgw6vlkJFfKSzocMDYxMnB2QVoqjakwPE/MzGva4A=; fh=AA/kh5VPdX/5rTcgdaPx24T+v3XG+xUGDbsY40s/910=; b=mvkZfblsEY+qPhL/H7PwZ8rvJpuzBHit96TL67DG/ZC0zcAC71bZqZp1gN2VIxFoFq 5uVVkC5MN3GjrWarEh7yAk0Tre4iqQBseLFyKXXLhPqgMQ1lzTg5gJ+FVil0GZ2cBR39 4T3tacCZIJSi/dxjRoe1qpizcCZw/hSzAFPyfw+l0V0JaJG8VjHJ6oyOUQTZuwIZFHCG CApXGRLCYoLLeyOyyn9MoBogK3V7FGogQBk1xnNORtn7uKWR9m55Hhd/XjxNfNCeFcWe P9HvRgnwhaSH62sTaaJBB3m6mgcZRluUwKgmN9qz5vqGV1rwudSoDrzl2N7qi3Y0uFb4 Vk+Q==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=K4Ck5ERd; arc=pass (i=1 spf=pass spfdomain=redhat.com dkim=pass dkdomain=redhat.com dmarc=pass fromdomain=redhat.com); spf=pass (google.com: domain of linux-nfs+bounces-2429-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-nfs+bounces-2429-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id y24-20020aa78558000000b006e6c079a0f7si15056108pfn.219.2024.03.21.07.25.52 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 21 Mar 2024 07:25:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs+bounces-2429-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=K4Ck5ERd; arc=pass (i=1 spf=pass spfdomain=redhat.com dkim=pass dkdomain=redhat.com dmarc=pass fromdomain=redhat.com); spf=pass (google.com: domain of linux-nfs+bounces-2429-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-nfs+bounces-2429-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 5EA37B22363 for ; Thu, 21 Mar 2024 14:25:22 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id AEF1A85277; Thu, 21 Mar 2024 14:25:10 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="K4Ck5ERd" X-Original-To: linux-nfs@vger.kernel.org Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 71A4184A5A for ; Thu, 21 Mar 2024 14:25:07 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.129.124 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711031110; cv=none; b=jcbq/l1KAusJlEI+y1EGLBUiGoo7+I8nNLlSjy+e7e0jp+gnsKJaz0Z10yj1TjSVRyeup6xxWxpybru5irMjAQbq0Ch/wYiuD3ANWWtRGixDFTlpNsgbQt4YYnkcfFQvfQ0lvcUf9wFkYQs+O9xl08lHRj6qefnJ9xj0IXz8YZc= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711031110; c=relaxed/simple; bh=EQGnbyNrepD23xLzCc1BHmEZ0uu9zXYtuW7At3tC2no=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=LFWgxyg+lZDEcD/sJX6C+9Grew03182yh2tKswjT6j9Dll+vOfrmJDZAGCSQtbLB21wOnvg/rtBbO9+su5TYFcFDySR0Odh30PbpGo+0NATMvGchd+d1oe8/Z8PXcI6/HcZswFTe4S41EgmZJSwUALR2Vj34eFVKSjR+BU3NPR4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=K4Ck5ERd; arc=none smtp.client-ip=170.10.129.124 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1711031105; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=9IDgw6vlkJFfKSzocMDYxMnB2QVoqjakwPE/MzGva4A=; b=K4Ck5ERdoSC0Cayjl3e/9eayEF6bcXU49pFTXTLnThrav1Mmct0ypXsVsFg3cP0fqQHuQN 2YCJCAv9TEDsYdJZme9r8Zj26kbpRXQgT5bq41bCAvrcBrmE2NUTsAU2teOwdYHxPX/aRM sfPRwhLGhZPJVAZ5xDKe4mbY9UVg5/k= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-361-cn44qq99OmWSfbfSp0RZlg-1; Thu, 21 Mar 2024 10:24:59 -0400 X-MC-Unique: cn44qq99OmWSfbfSp0RZlg-1 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com [10.11.54.5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 37920185A786; Thu, 21 Mar 2024 14:24:59 +0000 (UTC) Received: from aion.redhat.com (unknown [10.22.32.11]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 1DFE810189; Thu, 21 Mar 2024 14:24:59 +0000 (UTC) Received: by aion.redhat.com (Postfix, from userid 1000) id 85B1212E0F6; Thu, 21 Mar 2024 10:24:54 -0400 (EDT) Date: Thu, 21 Mar 2024 10:24:54 -0400 From: Scott Mayhew To: Nico Pache Cc: linux-nfs@vger.kernel.org, kunit-dev@googlegroups.com Subject: Re: [BUG REPORT] not ok 1 Derive Kc subkey for camellia128-cts-cmac Message-ID: References: <20240307140923.16598-1-npache@redhat.com> Precedence: bulk X-Mailing-List: linux-nfs@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable In-Reply-To: X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.5 On Wed, 20 Mar 2024, Nico Pache wrote: > On Tue, Mar 19, 2024 at 11:51=E2=80=AFAM Scott Mayhew wrote: > > > > Hi, > > > > On Thu, 07 Mar 2024, Nico Pache wrote: > > > > > Hi, > > > > > > One of the RFC 6803 key derivation kunit subtests is failing. > > > > > > cki-project data warehouse : https://datawarehouse.cki-project.org/is= sue/2514 > > > > > > Arches: X86_64, ARM64, S390x, ppc64le > > > First Appeared: ~6.8.rc2 > > > > > > TRACE: > > > # Subtest: RFC 6803 key derivation > > > # RFC 6803 key derivation: ASSERTION FAILED at net/sunrpc/auth_gs= s/gss_krb5_test.c:63 > > > Expected err =3D=3D 0, but > > > err =3D=3D -110 (0xffffffffffffff92) > > > not ok 1 Derive Kc subkey for camellia128-cts-cmac > > > ok 2 Derive Ke subkey for camellia128-cts-cmac > > > ok 3 Derive Ki subkey for camellia128-cts-cmac > > > ok 4 Derive Kc subkey for camellia256-cts-cmac > > > ok 5 Derive Ke subkey for camellia256-cts-cmac > > > ok 6 Derive Ki subkey for camellia256-cts-cmac > > > # RFC 6803 key derivation: pass:5 fail:1 skip:0 total:6 > > > not ok 1 RFC 6803 key derivation > > > > This was broken by: > > c72a870926c2 kunit: add ability to run tests after boot using debugfs > > > > __kunit_test_suites_init() runs any time a kernel module is loaded, via > > the "kunit_mod_nb" notifier_block... even if the kernel module has no > > kunit tests. But now __kunit_test_suites_init() also locks a mutex, > > which is a problem if a kunit test itself needs to load a kernel module > > (which the gss_krb5_test module does). > > > > This fixes it for me: > > > > ---8<--- > > diff --git a/lib/kunit/test.c b/lib/kunit/test.c > > index 088489856db8..18af9453632b 100644 > > --- a/lib/kunit/test.c > > +++ b/lib/kunit/test.c > > @@ -707,6 +707,9 @@ int __kunit_test_suites_init(struct kunit_suite * c= onst * const suites, int num_ > > { > > unsigned int i; > > > > + if (num_suites =3D=3D 0) > > + return 0; > > + > > if (!kunit_enabled() && num_suites > 0) { > > pr_info("kunit: disabled\n"); > > return 0; > > ---8<--- > > > Nice find! Would you mind posting a patch? Yes - while testing I also found an issue with the RFC 8009 encryption test and I wanted to be sure it wasn't related to this issue before posting the patch. -Scott >=20 > -- Nico >=20 > > More detail below: > > > > Here's the modprobe command where I loaded the gss_krb5_test module. T= his > > process has the "kunit_run_lock" mutex locked: > > > > PID: 1468 TASK: ffff9aed0ac20000 CPU: 0 COMMAND: "modprobe" > > #0 [ffffba974196f6f8] __schedule at ffffffff83fd85f5 > > #1 [ffffba974196f7b0] schedule at ffffffff83fd9672 > > #2 [ffffba974196f7c8] schedule_timeout at ffffffff83fe0308 > > #3 [ffffba974196f818] wait_for_completion_timeout at ffffffff83fda3d4 > > #4 [ffffba974196f878] kunit_try_catch_run at ffffffffc0d5e851 [kunit] > > #5 [ffffba974196f8c8] kunit_run_tests at ffffffffc0d5c0ea [kunit] > > #6 [ffffba974196fb78] __kunit_test_suites_init at ffffffffc0d5c9af [ku= nit] > > #7 [ffffba974196fb98] kunit_module_notify at ffffffffc0d5ba4b [kunit] > > #8 [ffffba974196fc08] notifier_call_chain at ffffffff8314647a > > #9 [ffffba974196fc40] blocking_notifier_call_chain_robust at ffffffff8= 3146565 > > #10 [ffffba974196fc88] load_module at ffffffff831e1935 > > #11 [ffffba974196fde8] __do_sys_init_module at ffffffff831e1fba > > #12 [ffffba974196fec0] do_syscall_64 at ffffffff83fc3461 > > #13 [ffffba974196fee8] do_user_addr_fault at ffffffff830979df > > #14 [ffffba974196ff28] exc_page_fault at ffffffff83fc9c7f > > #15 [ffffba974196ff50] entry_SYSCALL_64_after_hwframe at ffffffff840000= ea > > RIP: 00007ff1f272b4ae RSP: 00007ffd45db8f68 RFLAGS: 00000246 > > RAX: ffffffffffffffda RBX: 000055bf4c0c4b20 RCX: 00007ff1f272b4ae > > RDX: 000055bf4b204e79 RSI: 0000000000099691 RDI: 000055bf4cbfd130 > > RBP: 00007ffd45db9020 R8: 000055bf4c0c4010 R9: 0000000000000007 > > R10: 0000000000000001 R11: 0000000000000246 R12: 000055bf4b204e79 > > R13: 0000000000040000 R14: 000055bf4c0c4c50 R15: 000055bf4c0c4390 > > ORIG_RAX: 00000000000000af CS: 0033 SS: 002b > > > > Here's the kunit test case running. It's trying to allocate "cmac(came= llia)" > > via crypto_alloc_shash(): > > > > PID: 1508 TASK: ffff9aed155d0000 CPU: 1 COMMAND: "kunit_try_cat= ch" > > #0 [ffffba974194fba0] __schedule at ffffffff83fd85f5 > > #1 [ffffba974194fc58] schedule at ffffffff83fd9672 > > #2 [ffffba974194fc70] schedule_timeout at ffffffff83fe0308 > > #3 [ffffba974194fcc0] wait_for_completion_killable_timeout at ffffffff= 83fda708 > > #4 [ffffba974194fd20] crypto_larval_wait at ffffffff83747fb4 > > #5 [ffffba974194fd38] crypto_alg_mod_lookup at ffffffff83748252 > > #6 [ffffba974194fd70] crypto_alloc_tfm_node at ffffffff83748492 > > #7 [ffffba974194fdb0] krb5_kdf_feedback_cmac at ffffffffc0d76bb2 [rpcs= ec_gss_krb5] > > #8 [ffffba974194fe30] kdf_case at ffffffffc0d800a8 [gss_krb5_test] > > #9 [ffffba974194fe80] kunit_try_run_case at ffffffffc0d5bb54 [kunit] > > #10 [ffffba974194fee8] kunit_generic_run_threadfn_adapter at ffffffffc0= d5e797 [kunit] > > #11 [ffffba974194fef8] kthread at ffffffff8313eda5 > > #12 [ffffba974194ff30] ret_from_fork at ffffffff830414a1 > > #13 [ffffba974194ff50] ret_from_fork_asm at ffffffff830039ab > > > > Here the crypto manager is trying to modprobe the camellia kernel modul= e via a > > usermodehelper call: > > > > PID: 1511 TASK: ffff9aed04630000 CPU: 3 COMMAND: "cryptomgr_pro= be" > > #0 [ffffba974195fb88] __schedule at ffffffff83fd85f5 > > #1 [ffffba974195fc40] schedule at ffffffff83fd9672 > > #2 [ffffba974195fc58] schedule_timeout at ffffffff83fe03c1 > > #3 [ffffba974195fca8] wait_for_completion_state at ffffffff83fdb06d > > #4 [ffffba974195fd18] call_usermodehelper_exec at ffffffff83130313 > > #5 [ffffba974195fd68] __request_module at ffffffff831e325d > > #6 [ffffba974195fe28] crypto_alg_mod_lookup at ffffffff83748220 > > #7 [ffffba974195fe60] crypto_grab_spawn at ffffffff83749ff7 > > #8 [ffffba974195fe98] cmac_create at ffffffff8375c2f0 > > #9 [ffffba974195fed8] cryptomgr_probe at ffffffff83754a93 > > #10 [ffffba974195fef8] kthread at ffffffff8313eda5 > > #11 [ffffba974195ff30] ret_from_fork at ffffffff830414a1 > > #12 [ffffba974195ff50] ret_from_fork_asm at ffffffff830039ab > > > > And here's the resulting modprobe command, which is stuck waiting on the > > "kunit_run_lock" mutex: > > > > PID: 1512 TASK: ffff9aed143fafc0 CPU: 2 COMMAND: "modprobe" > > #0 [ffffba9741957990] __schedule at ffffffff83fd85f5 > > #1 [ffffba9741957a48] schedule at ffffffff83fd9672 > > #2 [ffffba9741957a60] schedule_preempt_disabled at ffffffff83fd9cb5 > > #3 [ffffba9741957a68] __mutex_lock.constprop.0 at ffffffff83fdc57a > > #4 [ffffba9741957ae8] __kunit_test_suites_init at ffffffffc0d5c95a [ku= nit] > > #5 [ffffba9741957b08] kunit_module_notify at ffffffffc0d5ba4b [kunit] > > #6 [ffffba9741957b78] notifier_call_chain at ffffffff8314647a > > #7 [ffffba9741957bb0] blocking_notifier_call_chain_robust at ffffffff8= 3146565 > > #8 [ffffba9741957bf8] load_module at ffffffff831e1935 > > #9 [ffffba9741957d58] __do_sys_init_module at ffffffff831e1fba > > #10 [ffffba9741957e30] do_syscall_64 at ffffffff83fc3461 > > #11 [ffffba9741957e48] __vm_munmap at ffffffff833bcdeb > > #12 [ffffba9741957ee8] do_syscall_64 at ffffffff83fc3470 > > #13 [ffffba9741957f50] entry_SYSCALL_64_after_hwframe at ffffffff840000= ea > > RIP: 00007f8ba092b4ae RSP: 00007ffc771e0378 RFLAGS: 00000246 > > RAX: ffffffffffffffda RBX: 00005572137e6e40 RCX: 00007f8ba092b4ae > > RDX: 0000557211c4de79 RSI: 0000000000080451 RDI: 00007f8b9ff90010 > > RBP: 00007ffc771e0430 R8: 00005572137e6010 R9: 0000000000000007 > > R10: 0000000000000001 R11: 0000000000000246 R12: 0000557211c4de79 > > R13: 0000000000040000 R14: 00005572137e73b0 R15: 00005572137e6400 > > ORIG_RAX: 00000000000000af CS: 0033 SS: 002b > > > > The camellia module doesn't even have any kunit tests, so __kunit_test_= suites_init() > > is waiting to lock the "kunit_run_lock" mutex for nothing: > > > > crash> module -o | grep num_kunit > > [0x478] int num_kunit_init_suites; > > [0x488] int num_kunit_suites; > > crash> mod | grep camellia > > ffffffffc0da15c0 camellia_x86_64 ffffffffc0d99000 57= 344 (not loaded) [CONFIG_KALLSYMS] > > crash> px 0xffffffffc0da15c0+0x478 > > $1 =3D 0xffffffffc0da1a38 > > crash> px 0xffffffffc0da15c0+0x488 > > $2 =3D 0xffffffffc0da1a48 > > crash> rd 0xffffffffc0da1a38 > > ffffffffc0da1a38: 0000000000000000 ........ > > crash> rd 0xffffffffc0da1a48 > > ffffffffc0da1a48: 0000000000000000 ........ > > > > -Scott > > > -- > > > 2.44.0 > > > > > > > > >=20