Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp218851ybl; Fri, 16 Aug 2019 22:49:36 -0700 (PDT) X-Google-Smtp-Source: APXvYqxHeK0/FzpmiJ1ep7P+V65blzN7OeT4SswefBAyAdkDAigCnyJpnXIZBf3AewjDF6r3s2lU X-Received: by 2002:a17:902:a9c3:: with SMTP id b3mr12527688plr.179.1566020976569; Fri, 16 Aug 2019 22:49:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566020976; cv=none; d=google.com; s=arc-20160816; b=KrUhSQA/bUbiemKSED0H5KRrINb/dBu2nMS3rvwQUAlbxn1w2RDkFrqJad4DKMIoOH mD6S8/ZB5V9bunAmHQYMU2KO4vorwYblGi8vNkkmZtzB157KI+xnRSzn6YxmSZpiKmz7 EQtmoWPCRe6cuZLuPVoixDbHKKZoS/PBXRLhTPaADevp6/UaNc6hs2C8c/bOniPjY2X7 vj9UkaZuKv5NyHNsMmZR3HXHuumTWN8nZCHdIrMQMYTsr/fQyMXG5y/rV5mbTyazJZeF IzrTbJiKQsICq9Pzz3hTjB5o0FzGYRmU2pdYUm1Oa1RHtL6okb6/Kz8xA96HkwyQxZ4h QX5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :message-id:subject:cc:to:from:date:dkim-signature; bh=KjIOBhx01yseOJGW03oa0Bt30QvRM/sJBw5xHFJoRLQ=; b=Nue2n4XyM8XNhBsyvJhWJeB+NSPlQKxs7PV/ARJbXp6b9vk6NJRpCSi28AV+OUiL5/ DDQvvIixod8COYu+cqNXc0yVF4rmS7+NSCmDduYDt+3PC4+Q+afTVC6O1H5KtVHOD2PP L7xrCpxEaRYEiBckqDr4GlMtZLsfbBxPwxbQ/O9byQDkHjDudQGUmhVGI7V4ayZVtjH+ wunIA0KwWpGw6oGH8o9zuYWpPxfqNVUNDbI0/DY5O7TAnDrKyTdspLJYGRru1IwOtQbg AIJzs+U5JGxbhpxEILH8F35AQnQkT4sHSKTk8w2aYowiz58TFEZZBM5i2NI7gh7OS0jr h40w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jeRLKw7D; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f1si2053556pld.69.2019.08.16.22.49.12; Fri, 16 Aug 2019 22:49:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jeRLKw7D; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725988AbfHQFrq (ORCPT + 99 others); Sat, 17 Aug 2019 01:47:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:60798 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725975AbfHQFrp (ORCPT ); Sat, 17 Aug 2019 01:47:45 -0400 Received: from sol.localdomain (c-24-5-143-220.hsd1.ca.comcast.net [24.5.143.220]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7E3A021019; Sat, 17 Aug 2019 05:47:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1566020865; bh=lxUYLtvBEUEzWwLJTyyeXIKjo7WX90NrxflgYrnNUqU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=jeRLKw7DJRurEy3f37XGcoTkX3Nwld4cB9Mc0cDVvJsxY86HlYN1+O5+7BXYt7cnH qXYb/MFgYR42ncN4hn6LV5DzX31WLZbSprTpvnlYcCZ2pNAA+cemdubOEnt4GFmIOL hZNdLVu/6In1utJjVCqoBoGhO2vBiNlSnr6GpDVw= Date: Fri, 16 Aug 2019 22:47:43 -0700 From: Eric Biggers To: Steffen Klassert Cc: Jakub Kicinski , syzbot , ast@kernel.org, aviadye@mellanox.com, borisp@mellanox.com, bpf@vger.kernel.org, daniel@iogearbox.net, davejwatson@fb.com, davem@davemloft.net, hdanton@sina.com, john.fastabend@gmail.com, netdev@vger.kernel.org, syzkaller-bugs@googlegroups.com, herbert@gondor.apana.org.au, linux-crypto@vger.kernel.org Subject: Re: INFO: task hung in tls_sw_release_resources_tx Message-ID: <20190817054743.GE8209@sol.localdomain> Mail-Followup-To: Steffen Klassert , Jakub Kicinski , syzbot , ast@kernel.org, aviadye@mellanox.com, borisp@mellanox.com, bpf@vger.kernel.org, daniel@iogearbox.net, davejwatson@fb.com, davem@davemloft.net, hdanton@sina.com, john.fastabend@gmail.com, netdev@vger.kernel.org, syzkaller-bugs@googlegroups.com, herbert@gondor.apana.org.au, linux-crypto@vger.kernel.org References: <000000000000523ea3059025b11d@google.com> <000000000000e75f1805902bb919@google.com> <20190816190234.2aaab5b6@cakuba.netronome.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190816190234.2aaab5b6@cakuba.netronome.com> User-Agent: Mutt/1.12.1 (2019-06-15) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org [+Steffen, who is the maintainer of pcrypt] On Fri, Aug 16, 2019 at 07:02:34PM -0700, Jakub Kicinski wrote: > On Thu, 15 Aug 2019 11:06:00 -0700, syzbot wrote: > > syzbot has bisected this bug to: > > > > commit 130b392c6cd6b2aed1b7eb32253d4920babb4891 > > Author: Dave Watson > > Date: Wed Jan 30 21:58:31 2019 +0000 > > > > net: tls: Add tls 1.3 support > > > > bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=118e8dee600000 > > start commit: 6d5afe20 sctp: fix memleak in sctp_send_reset_streams > > git tree: net > > final crash: https://syzkaller.appspot.com/x/report.txt?x=138e8dee600000 > > console output: https://syzkaller.appspot.com/x/log.txt?x=158e8dee600000 > > kernel config: https://syzkaller.appspot.com/x/.config?x=a4c9e9f08e9e8960 > > dashboard link: https://syzkaller.appspot.com/bug?extid=6a9ff159672dfbb41c95 > > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=17cb0502600000 > > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=14d5dc22600000 > > > > Reported-by: syzbot+6a9ff159672dfbb41c95@syzkaller.appspotmail.com > > Fixes: 130b392c6cd6 ("net: tls: Add tls 1.3 support") > > > > For information about bisection process see: https://goo.gl/tpsmEJ#bisection > > CC Herbert, linux-crypto > > This is got to be something in the crypto code :S > > The test case opens a ktls socket and back log writes to it. > Then it opens a AF_ALG socket, binds "pcrypt(gcm(aes))" and dies. > > The ktls socket upon close waits for async crypto callbacks, but they > never come. If I unset CRYPTO_USER_API_AEAD or change the alg to bind > to "gcm(aes)" the bug does not trigger. > > Any suggestions? Seeing as pcrypt is involved and this is a "task hung" bug, this is probably caused by the recursive pcrypt deadlock, which is yet to be fixed. See the original thread for more info: https://groups.google.com/forum/#!msg/syzkaller-bugs/1_CXUd3gBcg/BvsRLH0lAgAJ And the syzbot dashboard link: https://syzkaller.appspot.com/bug?id=178f2528d10720d563091fb51dceb4cb20f75525 Let's tell syzbot this is a duplicate: #syz dup: INFO: task hung in aead_recvmsg Steffen, do you have any plan to fix this? - Eric