Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1380896pxb; Thu, 4 Nov 2021 00:59:12 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzh2undxEmCELge+ZiOYI2/S9taze1tVc+URW4ZvkN+cXQcWTkJ5wyas3/st9YkrlCKWjdW X-Received: by 2002:a92:cd8f:: with SMTP id r15mr27259835ilb.278.1636012751878; Thu, 04 Nov 2021 00:59:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1636012751; cv=none; d=google.com; s=arc-20160816; b=se3pYmM6ycUpoUxe9SCUZFSHglApq5UorfsDvHhE3XW4euHkQTZmyjIUD55pkVn1+6 OQwzm5A/y0kQZcs2o43qv4Sa4/SCgcw9zckDgOFb7j3qiFyo4ExYK8YN/NvyvN40him9 xer7mwL6ovSkznlfurJj2jXDrkgS9SUXNaPnsjf3dhvhIzvCRRg+l/rdxXoKh5dScsAA E8EDdT5g8pEosQ5Mnw/vQdQ8SpiveMll2IwpzRbO1h6kkhHOXUocaTESlb2lTQpELkGg UhMoSe++SLcGphTLKuTyDtik5QtQCyXfglrpuK8AYhWVOrtOuQtCijWGTmcGE9EUevEe 8oRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version; bh=C0VeHDwd0st+efSBfafTGRGInECO+leW6YfH2krS5v8=; b=Qg1khU+9pFtveJbHSAcyOWjQ5+pXiKE89dQ/ovjRwe7mLvE9kkUAFHM+1W0cDu9wlM I7a5ur5Kn/xjHYSfvuBISehdwt7usGmi2Axlug+c2QxUj00LmlD+HTEvHnfze3cB/eSc uw2Rhi79kuHDvECLS0o8GBIaHUDctBmWNk3z+m6LdxPy+VhJY1HquQg6rbny/Dw9RflB FlGIJMifZZ7PU0SwnUy7/aBz6v1+UttnpcUfd31XnL8wQGoURbrjgyH3sskQBIiiV61g /ZpanH3JqdAw/NqenKle4L59dBrXH/KN+UcWbOUufzMfECpzHvZbpZgZWFwYNyVXbm+f vLSQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t2si6532624jam.80.2021.11.04.00.58.32; Thu, 04 Nov 2021 00:59:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230202AbhKDIBJ (ORCPT + 99 others); Thu, 4 Nov 2021 04:01:09 -0400 Received: from mail-ua1-f41.google.com ([209.85.222.41]:39616 "EHLO mail-ua1-f41.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230084AbhKDIBI (ORCPT ); Thu, 4 Nov 2021 04:01:08 -0400 Received: by mail-ua1-f41.google.com with SMTP id i6so9248819uae.6; Thu, 04 Nov 2021 00:58:30 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=C0VeHDwd0st+efSBfafTGRGInECO+leW6YfH2krS5v8=; b=k2nTBMAfUmED23BJ5zx6DxU6ulYDdc2HG1EB48xkGJW+CGGb1GlVBI9a4CzpR8Cjqb TpuImGOXO4hsl0aGG2vxsMlJGvlP+GkZ/on/uCoDEHsvDaXPyyzu7iA1tYq1Mo6Q2zO7 AC1rdLtGKB0tpxLB/IaknpsqlImQMi3Oo+i57INLn8Vjo79X/lq0t3lUQlzdmza4ZZ/o swzOc1In+0WrAidvFnV9igs+LiP0Vrb/nc7HwQlzmXYRbS6osUSjBN6a0qcKo67ApDPq IBZNGm28/+zmBv77lQCnw/KQNzU9E4Ihean2QNMTOJczWL9vc1HatL3X4IsRNv/YLIPG UK3A== X-Gm-Message-State: AOAM532tXdVUyZ59KIc8EKMvXgFeJw2udxjnMDp/wcREc8DbSibkwUuT 195Y4nxDJ5Pa6A/ZtI7xcLj5vw5FjhmTgA== X-Received: by 2002:a05:6102:f08:: with SMTP id v8mr27167977vss.38.1636012708990; Thu, 04 Nov 2021 00:58:28 -0700 (PDT) Received: from mail-ua1-f52.google.com (mail-ua1-f52.google.com. [209.85.222.52]) by smtp.gmail.com with ESMTPSA id q8sm628059uae.10.2021.11.04.00.58.28 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 04 Nov 2021 00:58:28 -0700 (PDT) Received: by mail-ua1-f52.google.com with SMTP id v20so9232485uaj.9; Thu, 04 Nov 2021 00:58:28 -0700 (PDT) X-Received: by 2002:a05:6102:b13:: with SMTP id b19mr10910538vst.50.1636012707755; Thu, 04 Nov 2021 00:58:27 -0700 (PDT) MIME-Version: 1.0 References: <20210913071251.GA15235@gondor.apana.org.au> <20210917002619.GA6407@gondor.apana.org.au> <20211001055058.GA6081@gondor.apana.org.au> <20211003002801.GA5435@gondor.apana.org.au> <20211019132802.GA14233@gondor.apana.org.au> In-Reply-To: From: Geert Uytterhoeven Date: Thu, 4 Nov 2021 08:58:16 +0100 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH] crypto: api - Do not create test larvals if manager is disabled To: Damien Le Moal Cc: Herbert Xu , Nathan Chancellor , Linux Crypto Mailing List , Vladis Dronov , Simo Sorce , Eric Biggers , "llvm@lists.linux.dev" , kernel test robot , "linux-kernel@vger.kernel.org" Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi Damien, On Thu, Nov 4, 2021 at 8:29 AM Damien Le Moal wrote: > On 2021/11/03 0:41, Geert Uytterhoeven wrote: > > On Tue, 19 Oct 2021, Herbert Xu wrote: > >> On Tue, Oct 05, 2021 at 07:33:28PM -0700, Nathan Chancellor wrote: > >>> I assume this is the diff you mean? This does not resolve the issue. My > >>> apologies if I am slow to respond, I am on vacation until the middle of > >>> next week. > >> > >> Sorry for the delay. The kernel robot figured out the problem > >> for me. It's the crypto_alg_tested call that causes api.c to > >> depend on algapi.c. This call is only invoked in the case where > >> the crypto manager is turned off. We could instead simply make > >> test larvals disappear in that case. > >> > >> ---8<--- > >> The delayed boot-time testing patch created a dependency loop > >> between api.c and algapi.c because it added a crypto_alg_tested > >> call to the former when the crypto manager is disabled. > >> > >> We could instead avoid creating the test larvals if the crypto > >> manager is disabled. This avoids the dependency loop as well > >> as saving some unnecessary work, albeit in a very unlikely case. > >> > >> Reported-by: Nathan Chancellor > >> Reported-by: Naresh Kamboju > >> Reported-by: kernel test robot > >> Fixes: adad556efcdd ("crypto: api - Fix built-in testing dependency failures") > >> Signed-off-by: Herbert Xu > > > > Thanks for your patch, which is now commit cad439fc040efe5f > > ("crypto: api - Do not create test larvals if manager is disabled"). > > > > I have bisected a failure to mount the root file system on k210 to this > > commit. > > > > Dmesg before/after: > > > > mmcblk0: mmc0:0000 SA04G 3.68 GiB > > random: fast init done > > mmcblk0: p1 > > -EXT4-fs (mmcblk0p1): mounted filesystem with ordered data mode. Opts: (null). Quota mode: disabled. > > -VFS: Mounted root (ext4 filesystem) readonly on device 179:1. > > +EXT4-fs (mmcblk0p1): Cannot load crc32c driver. > > +VFS: Cannot open root device "mmcblk0p1" or unknown-block(179,1): error -80 > > p1 exist as the message 2 lines above shows. And since the mount error is -80 > (ELIBBAD), it is really all about crypto. Since the default k210 config compile > everything in-kernel (no modules), it should work. Was crc32c compiled as a > module ? If yes, then the k210 will need to be booted with U-Boot and use a real > initrd, which likely will all end-up in a no memory situation. ext4 in itself > will consume way too much memory... Everything is built-in, including crc32c. It worked fine, until the commit referenced. Gr{oetje,eeting}s, Geert -- Geert Uytterhoeven -- There's lots of Linux beyond ia32 -- geert@linux-m68k.org In personal conversations with technical people, I call myself a hacker. But when I'm talking to journalists I just say "programmer" or something like that. -- Linus Torvalds