Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp2097112ybg; Fri, 5 Jun 2020 05:39:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJylig0JGc+WhZGxST6+L7dWU8sCRGjDQYUWvuLjnP5UoqA08a1ZxdvXpr2SDZmddP3ElYWG X-Received: by 2002:a17:906:49ca:: with SMTP id w10mr8798571ejv.31.1591360787623; Fri, 05 Jun 2020 05:39:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591360787; cv=none; d=google.com; s=arc-20160816; b=EDcjH3x0QLf8Ui7wvyAKyjkJ+eV/qiC/dfuhEEJzVY4x0bfVmtets1L55L7P4t4vP7 3Gr6WUpOEVEbsOX3sMmxJqdKpuk9k3gx8J2LUaHJcRQmE0lEO/kcZ/B3qPunVh4RqCar Dko6PwFJewfTYnlQ+cA/gdVC9QBAT/z2atlgJhfAHg8OXio0JuxfQHWlB2H5QVWmDGWv hOzaxOqV2/ZvxgK0TpealszKB38tXYu2Xt5AtncSkp6Wt7ZOcVmowTM/bY4z59jeAwZS uL12g6SzdpJLm7S8FSfgOcedjEm5KefVi0osfVQu4lPyvlpw7KGtpQ9JObmIvotE3xEf /ZOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=IyUwAxIwQVM0qPxUr9K8UBWw/8jtfLywmzIwEM4Kl3Q=; b=Wk8F+BBljJNFwnaM7v/dGGERmVGRtxQEvgRL09Z/vBCH3en9SnaMkG06FJniBVoBEL v/ISK3dqeWiaJHheDWAh3+ex5sc2briLkPvYV7ZDNdVkzNAO+PR7H8qxhVoEejgpUCs0 eZDD2UxApHw9nWx05dpV7bUC42tSVhRIvZjq/0a0vvT2vCDPN7BUMnFhY5BpOv7Hnxx6 FAyrxtDBe3omxaPI0rYBM9pawgfzbSj3ON0ZQHLaKbW2AyLHjqL265N5C6W9gghPuDor fIqK3FG8Wq3L6Y+QGEVLjzogSJS2+sWThHnEkgLasyp1uBnTsGaY6mh2nBtMSEhtJKlc j4sw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d22si3521637edv.113.2020.06.05.05.39.13; Fri, 05 Jun 2020 05:39:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726670AbgFEMid (ORCPT + 99 others); Fri, 5 Jun 2020 08:38:33 -0400 Received: from helcar.hmeau.com ([216.24.177.18]:42256 "EHLO fornost.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726409AbgFEMid (ORCPT ); Fri, 5 Jun 2020 08:38:33 -0400 Received: from gwarestrin.arnor.me.apana.org.au ([192.168.0.7]) by fornost.hmeau.com with smtp (Exim 4.92 #5 (Debian)) id 1jhBc2-0006N7-UN; Fri, 05 Jun 2020 22:38:20 +1000 Received: by gwarestrin.arnor.me.apana.org.au (sSMTP sendmail emulation); Fri, 05 Jun 2020 22:38:18 +1000 Date: Fri, 5 Jun 2020 22:38:18 +1000 From: Herbert Xu To: syzbot Cc: ardb@kernel.org, davem@davemloft.net, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com, t-kristo@ti.com Subject: Re: WARNING: refcount bug in crypto_mod_get Message-ID: <20200605123818.GA3984@gondor.apana.org.au> References: <00000000000004f67705a4992160@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <00000000000004f67705a4992160@google.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Fri, May 01, 2020 at 10:01:14AM -0700, syzbot wrote: > > ------------[ cut here ]------------ > refcount_t: addition on 0; use-after-free. ... > refcount_add include/linux/refcount.h:204 [inline] > refcount_inc include/linux/refcount.h:241 [inline] > crypto_alg_get crypto/internal.h:87 [inline] > crypto_mod_get+0xc6/0xf0 crypto/api.c:37 > crypto_spawn_alg.isra.0+0xa8/0x110 crypto/algapi.c:723 > crypto_spawn_tfm2+0x19/0xb0 crypto/algapi.c:763 > crypto_spawn_aead include/crypto/internal/aead.h:102 [inline] > pcrypt_aead_init_tfm+0x144/0x273 crypto/pcrypt.c:182 > crypto_aead_init_tfm+0x138/0x1a0 crypto/aead.c:140 > crypto_create_tfm+0xd5/0x2f0 crypto/api.c:454 > crypto_alloc_tfm+0x100/0x340 crypto/api.c:526 > aead_bind+0x69/0x170 crypto/algif_aead.c:483 > alg_bind+0x260/0x530 crypto/af_alg.c:182 > __sys_bind+0x20e/0x250 net/socket.c:1662 > __do_sys_bind net/socket.c:1673 [inline] > __se_sys_bind net/socket.c:1671 [inline] > __x64_sys_bind+0x6f/0xb0 net/socket.c:1671 > do_syscall_64+0xf6/0x7d0 arch/x86/entry/common.c:295 > entry_SYSCALL_64_after_hwframe+0x49/0xb3 This should be fixed already: #syz fix: crypto: api - Fix use-after-free and race in crypto_spawn_alg Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt