Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp577898ybl; Wed, 4 Dec 2019 07:32:38 -0800 (PST) X-Google-Smtp-Source: APXvYqwbjAdMyAx9bX0j39rQdBDxls/UHV44rb4VhjT1AqJ0A2PZxx/W6IRZZPrtLm0cqVPQevRC X-Received: by 2002:a05:6808:3bc:: with SMTP id n28mr2936897oie.112.1575473558351; Wed, 04 Dec 2019 07:32:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575473558; cv=none; d=google.com; s=arc-20160816; b=JDDG4vYiCvoXCKrGpq1zlTtXu4jN9abp0YeeOkhYuF2+BCMRUR5uPT3FnsSTpz9bBk 4MjXxyn6IWfG1cjDkfrBm0qRRBMd/AHPvd97hgzv0zKcRiM+qKUj6kU/Wa9JO1xCtxV8 imOqU+nfg3RhxGprUuvzwMMb0DU2pZM07Sn/0fwLs7J8ragm8zNibwaV/Ef/32n99ocW kVKAN5/foGsoIAwcaHRBzQHeOuqfgdlOm0S1jB7zmVLZR3GFOOlejWH05QQN2jW/JeFO dtWQbXDzpAoPTku9e2t2Uy1R4Iy3h/FwYKTaIaMBnsvb1AUywMdYZijInzYjbAORq78C njdQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:from:to:subject :content-transfer-encoding:mime-version:date:message-id :dkim-signature; bh=ijoLCBnJ3pPexA/GR1FIE4d3lIT82dN/vPnRiftiEjE=; b=cFspP/4eFUip1jvBcZFaKfwiC6ZyEQApcMA0M5hsDtS6vwvuz05b1NLCq8bOGYhhJq mT/B7efYhmULcUhUYSCvNbsXJwv9TzFKIgwzEZ89GFUZwjvK6niHnyIjk7Xwvo+tRWR/ +gZRONGYfd62ihozaycK4kO7F10MzsUH3momrk+ya6HW/dvfzyUesXY0J3rpwX62z5OF ht0jdF6AMcplB9q0Od91M78v1V/UD8SLCMDxtGBnBoY9mYCjlLyVcVL4y8Fc/rVFqYeN +fp2HZ/6DVpIpHicrFO4rvkLQab/3Fbzubzi+6rWJjoP1CDvx+ChgEf6/G1DzxZ87sES Rnlw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernelci-org.20150623.gappssmtp.com header.s=20150623 header.b=E3DsFqNY; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c12si3495467otn.7.2019.12.04.07.32.26; Wed, 04 Dec 2019 07:32:38 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernelci-org.20150623.gappssmtp.com header.s=20150623 header.b=E3DsFqNY; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728484AbfLDPbh (ORCPT + 99 others); Wed, 4 Dec 2019 10:31:37 -0500 Received: from mail-wm1-f67.google.com ([209.85.128.67]:54153 "EHLO mail-wm1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728331AbfLDPbh (ORCPT ); Wed, 4 Dec 2019 10:31:37 -0500 Received: by mail-wm1-f67.google.com with SMTP id u18so145331wmc.3 for ; Wed, 04 Dec 2019 07:31:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kernelci-org.20150623.gappssmtp.com; s=20150623; h=message-id:date:mime-version:content-transfer-encoding:subject:to :from:cc; bh=ijoLCBnJ3pPexA/GR1FIE4d3lIT82dN/vPnRiftiEjE=; b=E3DsFqNYYoNk3wJ8krQcMebT9+rMBTieirdWX7fi/YE5D0FA1P8YnZ4k8ZZNAJObnb fwLjJ+H6rCS2tv9FYx6CjYeL8ThmCGHLTgz1oQ2HYmorHjwTAm/xeNKu04RpHTjQgQSG AGMUyh6S3BMEQ2BLImO5bJKMED3wiqljPM4VykXcD+mEnl571jShECGkL0tKNNGvDoji nfb8k2Z2q5tf+39Edjv03J1+IuyiwI+cL3VIBnhH/7Rb68MAKPpO7r9CJBczn9CI13DP V6MxlO0bM2m5y3GEm0o639CBJoTN6oHCbL6mrpT1tHVhxqbw3lA4dmRFoeoT9dGPwlCV RyAg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:message-id:date:mime-version :content-transfer-encoding:subject:to:from:cc; bh=ijoLCBnJ3pPexA/GR1FIE4d3lIT82dN/vPnRiftiEjE=; b=fuzJT58uCKnQPvr7YXxU26o9JmFjPvJiBb5HBrsS2NjU0z7b05QXHnAmvKoiUxTANc pWEIw265x+kwtW3DqUfTUeXrAkGxmh5YVr1VUKDAK9Mo1QhcaSxHpr7vKuY4/1Z98QMD C+aBO0I5zUfsRLrhv9viCe2dSWY/OUIy+p/39SL54rJkjYgttRZz3+5ZG+qUcIm5j7XN 1QB2Y7dVVr2Aew80ISIyjNW7XgKA+gmlUArKB+RuUEBUabfLuiDh6SwJD4v9jwMja7Dz pscFgLfdInjfNRLcN8k1ncpHbL4Kq7SFoV2Bng1b+RriTA8+98RDDa6E/kdD75p94MEU sAhg== X-Gm-Message-State: APjAAAVa/mz3k9QXAL7PriYEEcB9Pvlgv+eI1+8/NT9JSQ6CIW0kpoDN 091PgAyFFU+3l+o30w/+7jK1DQ== X-Received: by 2002:a1c:a906:: with SMTP id s6mr133439wme.125.1575473494478; Wed, 04 Dec 2019 07:31:34 -0800 (PST) Received: from [148.251.42.114] ([2a01:4f8:201:9271::2]) by smtp.gmail.com with ESMTPSA id u10sm6971432wmd.1.2019.12.04.07.31.33 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 04 Dec 2019 07:31:33 -0800 (PST) Message-ID: <5de7d155.1c69fb81.c06f8.3583@mx.google.com> Date: Wed, 04 Dec 2019 07:31:33 -0800 (PST) Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Kernelci-Report-Type: bisect X-Kernelci-Kernel: v5.4-9340-g16839329da69 X-Kernelci-Tree: ardb X-Kernelci-Branch: for-kernelci X-Kernelci-Lab-Name: lab-collabora Subject: ardb/for-kernelci bisection: boot on rk3288-rock2-square To: Ard Biesheuvel , mgalka@collabora.com, guillaume.tucker@collabora.com, broonie@kernel.org, enric.balletbo@collabora.com, tomeu.vizoso@collabora.com, khilman@baylibre.com From: "kernelci.org bot" Cc: Herbert Xu , Maxime Coquelin , linux-stm32@st-md-mailman.stormreply.com, linux-arm-kernel@lists.infradead.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, Alexandre Torgue , "David S. Miller" Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * This automated bisection report was sent to you on the basis * * that you may be involved with the breaking commit it has * * found. No manual investigation has been done to verify it, * * and the root cause of the problem may be somewhere else. * * * * If you do send a fix, please include this trailer: * * Reported-by: "kernelci.org bot" * * * * Hope this helps! * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * ardb/for-kernelci bisection: boot on rk3288-rock2-square Summary: Start: 16839329da69 enable extra tests by default Details: https://kernelci.org/boot/id/5de79104990bc03e5a960f0b Plain log: https://storage.kernelci.org//ardb/for-kernelci/v5.4-9340-g16= 839329da69/arm/multi_v7_defconfig+CONFIG_EFI=3Dy+CONFIG_ARM_LPAE=3Dy/gcc-8/= lab-collabora/boot-rk3288-rock2-square.txt HTML log: https://storage.kernelci.org//ardb/for-kernelci/v5.4-9340-g16= 839329da69/arm/multi_v7_defconfig+CONFIG_EFI=3Dy+CONFIG_ARM_LPAE=3Dy/gcc-8/= lab-collabora/boot-rk3288-rock2-square.html Result: 16839329da69 enable extra tests by default Checks: revert: PASS verify: PASS Parameters: Tree: ardb URL: git://git.kernel.org/pub/scm/linux/kernel/git/ardb/linux.git Branch: for-kernelci Target: rk3288-rock2-square CPU arch: arm Lab: lab-collabora Compiler: gcc-8 Config: multi_v7_defconfig+CONFIG_EFI=3Dy+CONFIG_ARM_LPAE=3Dy Test suite: boot Breaking commit found: ---------------------------------------------------------------------------= ---- commit 16839329da69263e7360f3819bae01bcf4b220ec Author: Ard Biesheuvel Date: Tue Dec 3 12:29:31 2019 +0000 enable extra tests by default diff --git a/crypto/Kconfig b/crypto/Kconfig index 5575d48473bd..36af840aa820 100644 --- a/crypto/Kconfig +++ b/crypto/Kconfig @@ -140,7 +140,6 @@ if CRYPTO_MANAGER2 = config CRYPTO_MANAGER_DISABLE_TESTS bool "Disable run-time self tests" - default y help Disable run-time self tests that normally take place at algorithm registration. @@ -148,6 +147,7 @@ config CRYPTO_MANAGER_DISABLE_TESTS config CRYPTO_MANAGER_EXTRA_TESTS bool "Enable extra run-time crypto self tests" depends on DEBUG_KERNEL && !CRYPTO_MANAGER_DISABLE_TESTS + default y help Enable extra run-time self tests of registered crypto algorithms, including randomized fuzz tests. diff --git a/crypto/testmgr.c b/crypto/testmgr.c index 88f33c0efb23..5df87bcf6c4d 100644 --- a/crypto/testmgr.c +++ b/crypto/testmgr.c @@ -40,7 +40,7 @@ static bool notests; module_param(notests, bool, 0644); MODULE_PARM_DESC(notests, "disable crypto self-tests"); = -static bool panic_on_fail; +static bool panic_on_fail =3D true; module_param(panic_on_fail, bool, 0444); = #ifdef CONFIG_CRYPTO_MANAGER_EXTRA_TESTS ---------------------------------------------------------------------------= ---- Git bisection log: ---------------------------------------------------------------------------= ---- git bisect start # good: [b94ae8ad9fe79da61231999f347f79645b909bda] Merge tag 'seccomp-v5.5-= rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux git bisect good b94ae8ad9fe79da61231999f347f79645b909bda # bad: [16839329da69263e7360f3819bae01bcf4b220ec] enable extra tests by def= ault git bisect bad 16839329da69263e7360f3819bae01bcf4b220ec # good: [25cbf24a7eec7c3dee4113b2e98b572e128009b7] crypto: aead - move cryp= to_aead_maxauthsize() to git bisect good 25cbf24a7eec7c3dee4113b2e98b572e128009b7 # good: [7b19c7a82950ed034645fa92adce29cd6163ed3e] crypto: testmgr - check = skcipher min_keysize git bisect good 7b19c7a82950ed034645fa92adce29cd6163ed3e # good: [062752a354aaf03b46b86cba5fdaa2fd5c932860] crypto: testmgr - create= struct aead_extra_tests_ctx git bisect good 062752a354aaf03b46b86cba5fdaa2fd5c932860 # good: [2cd56a00fff8584e342164c65e6b55da61f79c4a] crypto: testmgr - genera= te inauthentic AEAD test vectors git bisect good 2cd56a00fff8584e342164c65e6b55da61f79c4a # first bad commit: [16839329da69263e7360f3819bae01bcf4b220ec] enable extra= tests by default ---------------------------------------------------------------------------= ----