Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp940576pxp; Wed, 16 Mar 2022 22:03:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxqUFDJ1AgQQH7g9pNXcewQT4I7Qz7ZsJflj/4rVtdkmMRPfGigwHlPqagKOT8OkU1Ckvta X-Received: by 2002:a17:90a:7181:b0:1bf:a024:ab61 with SMTP id i1-20020a17090a718100b001bfa024ab61mr3328112pjk.200.1647493380749; Wed, 16 Mar 2022 22:03:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1647493380; cv=none; d=google.com; s=arc-20160816; b=S6z2Q5oF8petuymXYOcQQeWnyxFCR03JfUfalVGfqv/vaqtjPUOKuShV3sEhyIFKRq byMOZFfb5qCNxQWQPsxZeh7ANjgdTArPS/xoNsj2yBXiDoEM8wvhrBhLVA+N1Qd2k8gm loOAUelOYXGX43gF2yFnnEObLxnUxBE6plfcnimiJzRH7ax0T7OUjoVFxGmLIDxXZWqk EsJQuovtDbZjkxlU3ZniBm/G5nUXejgzO3Jg6UAOMIpI1eCPU1e8kBl/25pQmmw60tq1 A8NJ5xXEw/hOUCEwtq/Gw1gLLlLW1nG9peL9XIxKAscziqMmuW2xCFw89TzHqYoFAlN8 jwvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=hn8Dfdxf9WkkOrFSSQ0bZ80P2q4VcuJF6LA3IEsV21A=; b=WAYPp4BZGGb8FrBMgHzk/LCalELgBCPC9wEpRrqHoPNSrc0kHmTsyR00wCwEh0qwXc TVSCPkZvpmo2eLpRoKHcMmVsqGmlyS376P67nF1sZTXUA66S+E5wkeOrK/IabtcIps9i tegFv1YtJ1iS20N4DO0zbVEatrkrdbtg9sOXpdVNATYTPQuyzGLwSDPvcGp1pfeI3mSt pdGhDt32dqfy6XE0D+hisRXcwJT5ohhEJhkDVE7jo5DjYWPzf/jTO4Mr+30kn3T1e+WT X1r/QJMmrMOBZNRvSJa2mEYrj5uJ4p2PqCJwxbclF7JByO1ZkR3WGrZRQwS1vpwAtSeU hfdA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=lojkhxhJ; spf=softfail (google.com: domain of transitioning linux-crypto-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id t3-20020aa79383000000b004f6d4447a93si3399205pfe.360.2022.03.16.22.03.00 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 16 Mar 2022 22:03:00 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-crypto-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=lojkhxhJ; spf=softfail (google.com: domain of transitioning linux-crypto-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 8D6C6198EFA; Wed, 16 Mar 2022 21:16:29 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244761AbiCPHYw (ORCPT + 99 others); Wed, 16 Mar 2022 03:24:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39900 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242653AbiCPHYw (ORCPT ); Wed, 16 Mar 2022 03:24:52 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 41C4D31DE2 for ; Wed, 16 Mar 2022 00:23:38 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 07E22612FF for ; Wed, 16 Mar 2022 07:23:37 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6B846C340EE for ; Wed, 16 Mar 2022 07:23:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1647415416; bh=q4j46fhryJnvKa1/K5vmoMKIyPO8wirfdALCJ72+mls=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=lojkhxhJmPape33fEH2a70JG8SvZiOxl7eTGNcqCMYXuQAVPgoHUBrE0WdOTKn00x EieuEL4R9yVcDFyk5SGadOInO9TMIecSSu8IwBSavpVaVi1Y5vDjvy44PWAU6ArH+r GqoBw1k0wuBKS1cgkp2h7nsGH7pwGOqcYylNwXsV9lu0MEnRkXt4/vT2wmdKq8dXrP r91Cl95qShyeMbkTEvgXEjjBQuhnx/TFenAxF3lX8GBqXVx0XMqAYoHO7mKW+alDbn duYCuo/ATlZCj9h4c7MLTO4NA5EZxUWfgjcz7MAX8VPOZ+ypVtK96AfFlwn4puO2Tw ALlgJ8MMdaFfg== Received: by mail-yb1-f169.google.com with SMTP id w16so2775052ybi.12 for ; Wed, 16 Mar 2022 00:23:36 -0700 (PDT) X-Gm-Message-State: AOAM5324yQIGjCsJb9T7LGS//N9XQuHHV8yyWVornYHaFGab6JjhhKcM NqR3HeK1mW46g0EYfkU5dVKpZPuWO7luY6jk+xQ= X-Received: by 2002:a25:585:0:b0:628:9860:39da with SMTP id 127-20020a250585000000b00628986039damr26751848ybf.383.1647415415482; Wed, 16 Mar 2022 00:23:35 -0700 (PDT) MIME-Version: 1.0 References: <20220126145322.646723-1-p.zabel@pengutronix.de> In-Reply-To: From: Ard Biesheuvel Date: Wed, 16 Mar 2022 08:23:24 +0100 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH] crypto: algapi - Remove test larvals to fix error paths To: Herbert Xu Cc: Philipp Zabel , Linux Crypto Mailing List , kernel@pengutronix.de, "David S. Miller" Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-3.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Wed, 16 Mar 2022 at 02:11, Herbert Xu wrote: > > On Wed, Jan 26, 2022 at 04:01:04PM +0100, Philipp Zabel wrote: > > > > I see this happen on ARM with CONFIG_CRYPTO_AES_ARM_BS=y since v5.16-rc1 > > because the simd_skcipher_create_compat("ecb(aes)", "ecb-aes-neonbs", > > "__ecb-aes-neonbs") call in arch/arm/crypto/aes-neonbs-glue.c returns > > -ENOENT. I believe that is the same issue as reported in [1]. > > I cannot reproduce this crash with qemu. If you can still > reproduce this, please send me your complete kconfig file. > According to the bisect log in the other thread, adad556efcdd42a1d9e060cb is the culprit, which does not seem surprising, at is would result in the SIMD skcipher being encapsulated to not be available yet when the SIMD helper tries to take a reference to it. Given that the resulting algo will be subject to testing as well, could we simply override the test requirement for the inner algo? That should make it available immediately, IIUC, and the outer algo test is guaranteed to cover the inner one.