Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp3818534ybb; Tue, 31 Mar 2020 12:36:08 -0700 (PDT) X-Google-Smtp-Source: ADFU+vtvLcqrxTMRlmuJ2s/wEUDIIRtBL4h9sWBPHfWaGgqJJ6PZSGbwciLYap1HuDbEYjQfVxcn X-Received: by 2002:a05:6830:1159:: with SMTP id x25mr2307762otq.110.1585683368413; Tue, 31 Mar 2020 12:36:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585683368; cv=none; d=google.com; s=arc-20160816; b=KpdaYdBnDkBG2yT/Qe2ZsWl21PljD4xlEQldJkh+B9MjYMO3VyLg6BFIk1PbTxEHFd Hcaf3ao5SfPSmfUq0ukLtliGxl7AVldDurDbdCDopXf6bhXzj+A05bWs76vY0G9MW1v0 hT9nCM4p/4ebdGNQHUEBZ4O/rUYCm0otMqKoW0r+nTLgaoa8VmtYx1ZGvcnuKb0rJ/mL MDmrPVOBCcv5CJ9s40ASFOaKZYaNnXlfGIe0q5MyP1tvkXJsI+r3AaAkcIw9S3kcWVKa aNc6qEzurw3C/YTua5qinTF9CaOvlF+U1wzu8YJ1Inm/3RR1P0aFYetqi+oUprJtE7/l 7x0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:from:subject:message-id:date :mime-version; bh=2lew1a0pD6ctFtAcsbPWqwFLxKM5Fc4DIihP/2hJOgM=; b=Ym82heYXpBBnC5SS441TIrrjA+CysfaskOF1chqZIk9l4lD6bpI1uufy7Fh902edTl DuRDAazI4oJRet2s3WJy7sFqc7J2Pkzg9Kileqzv7OG6oc7xrWWGQYINw6xR0JXRy0TW eqqSV2IyVwsJPzh+gbgOqTeDbFE95N4mZZO1K/T1fST7DK3c+X5J8vT3tg2z3RImL9PL 5673+/L3yX+QJ5nPSC20P1VT+544QB3yBgeluOizwqmDP3lKlGJdb7nZr7m6ryDylSmJ v739y0aHzRmo+i+tGKSZVRKgRKPgNPaIX8HIsWLNYhxyuMd1RGEKV2rfvaunWm1TjRb9 zfMg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 184si7037067oig.33.2020.03.31.12.35.47; Tue, 31 Mar 2020 12:36:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728492AbgCaTfQ (ORCPT + 99 others); Tue, 31 Mar 2020 15:35:16 -0400 Received: from mail-io1-f69.google.com ([209.85.166.69]:37487 "EHLO mail-io1-f69.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727830AbgCaTfP (ORCPT ); Tue, 31 Mar 2020 15:35:15 -0400 Received: by mail-io1-f69.google.com with SMTP id p4so20140057ioo.4 for ; Tue, 31 Mar 2020 12:35:13 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:date:message-id:subject:from:to; bh=2lew1a0pD6ctFtAcsbPWqwFLxKM5Fc4DIihP/2hJOgM=; b=iJ/r9/41eVWtdpD8atavNjWCjaDzr3k7bdJC+X1VIhV+w+1nzaRShns/Y5JpmBtHxQ 2Qe8UXuAHb6me7cqaUmk2t2v8Uat41O7/Kpw3a7kiaeKwLJ+KKo4A+8bKWJ2v3KCqnxv mCU/ow9UwAsPnSE5NXClJvi9jVCRRBjHaEiQv0ZvRT7kPyNoEz0MKK2kN8QBvwP9oZAY F2wEmBgKNlS2ud4sfXMZqnPGFNPk39PJ/er2VMU610ZVJnnc7bUTsM1YCdgqLWb2mFmx AX+mcfKFjzp6uBh1GsckZCuuxO7kLeizjtkk0p5JJC0mcad/QR4nyqMk7xEQRxD/5r/5 wWnQ== X-Gm-Message-State: ANhLgQ3V/YuOVNB6nTMtVrcVN5bCoX6eWnjQv+0qYtgRQeTpEV4SPiQb yyvs4NKk+UFBeviEuAkGDb9WodlbrDjob79ajc5cpzePI95Z MIME-Version: 1.0 X-Received: by 2002:a02:9a18:: with SMTP id b24mr17919080jal.110.1585683313284; Tue, 31 Mar 2020 12:35:13 -0700 (PDT) Date: Tue, 31 Mar 2020 12:35:13 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <0000000000009d5cef05a22baa95@google.com> Subject: KCSAN: data-race in glue_cbc_decrypt_req_128bit / glue_cbc_decrypt_req_128bit From: syzbot To: bp@alien8.de, davem@davemloft.net, elver@google.com, herbert@gondor.apana.org.au, hpa@zytor.com, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, mingo@redhat.com, syzkaller-bugs@googlegroups.com, tglx@linutronix.de, x86@kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hello, syzbot found the following crash on: HEAD commit: b12d66a6 mm, kcsan: Instrument SLAB free with ASSERT_EXCLU.. git tree: https://github.com/google/ktsan.git kcsan console output: https://syzkaller.appspot.com/x/log.txt?x=111f0865e00000 kernel config: https://syzkaller.appspot.com/x/.config?x=10bc0131c4924ba9 dashboard link: https://syzkaller.appspot.com/bug?extid=6a6bca8169ffda8ce77b compiler: gcc (GCC) 9.0.0 20181231 (experimental) Unfortunately, I don't have any reproducer for this crash yet. IMPORTANT: if you fix the bug, please add the following tag to the commit: Reported-by: syzbot+6a6bca8169ffda8ce77b@syzkaller.appspotmail.com ================================================================== BUG: KCSAN: data-race in glue_cbc_decrypt_req_128bit / glue_cbc_decrypt_req_128bit write to 0xffff88809966e128 of 8 bytes by task 24119 on cpu 0: u128_xor include/crypto/b128ops.h:67 [inline] glue_cbc_decrypt_req_128bit+0x396/0x460 arch/x86/crypto/glue_helper.c:144 cbc_decrypt+0x26/0x40 arch/x86/crypto/serpent_avx2_glue.c:152 crypto_skcipher_decrypt+0x65/0x90 crypto/skcipher.c:652 _skcipher_recvmsg crypto/algif_skcipher.c:142 [inline] skcipher_recvmsg+0x7fa/0x8c0 crypto/algif_skcipher.c:161 skcipher_recvmsg_nokey+0x5e/0x80 crypto/algif_skcipher.c:279 sock_recvmsg_nosec net/socket.c:886 [inline] sock_recvmsg net/socket.c:904 [inline] sock_recvmsg+0x92/0xb0 net/socket.c:900 ____sys_recvmsg+0x167/0x3a0 net/socket.c:2566 ___sys_recvmsg+0xb2/0x100 net/socket.c:2608 __sys_recvmsg+0x9d/0x160 net/socket.c:2642 __do_sys_recvmsg net/socket.c:2652 [inline] __se_sys_recvmsg net/socket.c:2649 [inline] __x64_sys_recvmsg+0x51/0x70 net/socket.c:2649 do_syscall_64+0xcc/0x3a0 arch/x86/entry/common.c:294 entry_SYSCALL_64_after_hwframe+0x44/0xa9 read to 0xffff88809966e128 of 8 bytes by task 24118 on cpu 1: u128_xor include/crypto/b128ops.h:67 [inline] glue_cbc_decrypt_req_128bit+0x37c/0x460 arch/x86/crypto/glue_helper.c:144 cbc_decrypt+0x26/0x40 arch/x86/crypto/serpent_avx2_glue.c:152 crypto_skcipher_decrypt+0x65/0x90 crypto/skcipher.c:652 _skcipher_recvmsg crypto/algif_skcipher.c:142 [inline] skcipher_recvmsg+0x7fa/0x8c0 crypto/algif_skcipher.c:161 skcipher_recvmsg_nokey+0x5e/0x80 crypto/algif_skcipher.c:279 sock_recvmsg_nosec net/socket.c:886 [inline] sock_recvmsg net/socket.c:904 [inline] sock_recvmsg+0x92/0xb0 net/socket.c:900 ____sys_recvmsg+0x167/0x3a0 net/socket.c:2566 ___sys_recvmsg+0xb2/0x100 net/socket.c:2608 __sys_recvmsg+0x9d/0x160 net/socket.c:2642 __do_sys_recvmsg net/socket.c:2652 [inline] __se_sys_recvmsg net/socket.c:2649 [inline] __x64_sys_recvmsg+0x51/0x70 net/socket.c:2649 do_syscall_64+0xcc/0x3a0 arch/x86/entry/common.c:294 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 24118 Comm: syz-executor.1 Not tainted 5.6.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ================================================================== --- This bug is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this bug report. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot.