Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp22073573rwd; Fri, 30 Jun 2023 03:35:43 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7cv+OJcWbChjAmfL9xmXusu1iy6nGmmvnSQclnJSlY85Afg5Lnm4Ma5jgB5q6/Ycwi13Z7 X-Received: by 2002:aca:bc41:0:b0:39c:8216:e648 with SMTP id m62-20020acabc41000000b0039c8216e648mr1479164oif.1.1688121342972; Fri, 30 Jun 2023 03:35:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1688121342; cv=none; d=google.com; s=arc-20160816; b=tFXzg5AP5TSzOIIjw340rnnAkgBovdASW4nNQFg+bsQdJOCyUq4JaFFR9Rglrwdvz4 S/hFNwh1AUeujpdpZAMbrmTyzEu37SlZG/YS4MO3tc5cyaZ2ZdF02+uh/yBhskImmgl7 CmoaN32TcS+f6MfUuaLEHca6PE5hSOFDfRLhqMcF1QzgotUG/+Icjggoe77jGUd+co0T CC7Tx+CYwVwRSAMQxN/2J9YSMM0gjwtzZxszhdba3X3IDLrPHPS5rb3f7zj/ENJ139+m IHe3gOJBH7lKsKV34VH0kTOT1khnQu3594ByUyfZ4iVXwPQ3+BsX5QgU8N/PiIphOYYd pgBA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=qayM9oDvTxb6Xm9+IkHuSoW95s/Sz5bR3jRGXkuJO58=; fh=ixFOam3Mo/TNk8BvTQlncxuGVa82wQNH3Bd63twaP9k=; b=gtM7lpUF2L6wDG9QtIOnYBCh49oMKXQXeu81n6ljg6eacH5tF6GSv9Smt7ba0btYk5 cpn5gJW2oNa9z348MFa48btnBkYUmd6QA2BG+P8jzz6u4Yd7gNJurpifW3Xu5fa5uKgJ /AJY0xXGdk2LjjYlCKZMSCIrQOtzfw/TobbzlZ/SLCVkUs4yzqoSK2bqALKU8AltlgWn zT8glMHrUc/jn2ojJGDJ7wurKmBst2y0BcTHx30Lo0+NXnFV7jL+rNoYrfXOk6kq3b4Z 7eqGH5idFznjBt73JIIrz9cB82OV22Plyr/+bdE/tj5rLAVhxCMkzYC8stF6VLkOnFQf lZSg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=SOMLE+IN; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id o5-20020a17090a4e8500b0025359a570fesi3243993pjh.19.2023.06.30.03.35.22; Fri, 30 Jun 2023 03:35:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=SOMLE+IN; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231431AbjF3KST (ORCPT + 99 others); Fri, 30 Jun 2023 06:18:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57658 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230436AbjF3KSR (ORCPT ); Fri, 30 Jun 2023 06:18:17 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E4540270E for ; Fri, 30 Jun 2023 03:18:15 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 844F56171A for ; Fri, 30 Jun 2023 10:18:15 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E7F7CC433C9; Fri, 30 Jun 2023 10:18:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1688120294; bh=qayM9oDvTxb6Xm9+IkHuSoW95s/Sz5bR3jRGXkuJO58=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=SOMLE+INYiJ/acA/1G0GDI9Nk0eD+qUeVm/P78PDMCShmxklOilp8PCpsvV96tjF6 chGnze4z5z+9g1jFh3fQczUXBEPS/zcDdmW6LQkDyWSCpfFhXyz6Bm5Pxppdne4DCa 9kuwukULHA8cBeMJHPY5dm3pr5bg2dZ4yElNTFHksFj33ayNtWuWemSPCEfLreyGG5 EzjFaqBU0NHpNP5q1eFioEG9YiqmLO2m7TUAFnel0UsF0yDPQC3BiEErEABv4ZIKoz fCvkMA6xBC3zw02FDrQOVGisGNnKh4A3a9MHnvZ7jIuYI/n4xlW3DKML+Z9EwHWTH5 GB0Al6XTNL5lg== Received: by mail-lf1-f41.google.com with SMTP id 2adb3069b0e04-4fba03becc6so1465660e87.0; Fri, 30 Jun 2023 03:18:14 -0700 (PDT) X-Gm-Message-State: AC+VfDwToh3xTVmVWOBD0+n3WceHRMVwQO285FyyIwXUSLQq47Y3saHi Pd11CBjwkK9QQyIklK0DhtH/q//lsMTPLIgwGz8= X-Received: by 2002:a05:6512:3d87:b0:4fb:7bf8:51c8 with SMTP id k7-20020a0565123d8700b004fb7bf851c8mr2590243lfv.1.1688120292812; Fri, 30 Jun 2023 03:18:12 -0700 (PDT) MIME-Version: 1.0 References: <0000000000008a7ae505aef61db1@google.com> <20200911170150.GA889@sol.localdomain> <59e1d5c0-aedb-7b5b-f37f-0c20185d7e9b@I-love.SAKURA.ne.jp> In-Reply-To: From: Ard Biesheuvel Date: Fri, 30 Jun 2023 12:18:01 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH] net: tls: enable __GFP_ZERO upon tls_init() To: Alexander Potapenko Cc: Tetsuo Handa , Boris Pismenny , John Fastabend , Jakub Kicinski , herbert@gondor.apana.org.au, linux-crypto@vger.kernel.org, syzkaller-bugs@googlegroups.com, syzbot , Eric Biggers , Aviad Yehezkel , Daniel Borkmann , netdev@vger.kernel.org, "David S. Miller" , Eric Dumazet , Paolo Abeni Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Fri, 30 Jun 2023 at 12:11, Alexander Potapenko wrote= : > > On Fri, Jun 30, 2023 at 12:02=E2=80=AFPM Ard Biesheuvel = wrote: > > > > On Fri, 30 Jun 2023 at 11:53, Tetsuo Handa > > wrote: > > > > > > On 2023/06/30 18:36, Ard Biesheuvel wrote: > > > > Why are you sending this now? > > > > > > Just because this is currently top crasher and I can reproduce locall= y. > > > > > > > Do you have a reproducer for this issue? > > > > > > Yes. https://syzkaller.appspot.com/text?tag=3DReproC&x=3D129316219000= 00 works. > > > > > > > Could you please share your kernel config and the resulting kernel log > > when running the reproducer? I'll try to reproduce locally as well, > > and see if I can figure out what is going on in the crypto layer > > The config together with the repro is available at > https://syzkaller.appspot.com/bug?extid=3D828dfc12440b4f6f305d, see the > latest row of the "Crashes" table that contains a C repro. Could you explain why that bug contains ~50 reports that seem entirely unrelated? AIUI, this actual issue has not been reproduced since 2020?? > Config: https://syzkaller.appspot.com/text?tag=3DKernelConfig&x=3Dee5f7a0= b2e48ed66 > Report: https://syzkaller.appspot.com/text?tag=3DCrashReport&x=3D1325260d= 900000 > Syz repro: https://syzkaller.appspot.com/text?tag=3DReproSyz&x=3D11af973e= 900000 > C repro: https://syzkaller.appspot.com/text?tag=3DReproC&x=3D163a1e459000= 00 > > The bug is reproducible for me locally as well (and Tetsuo's patch > makes it disappear, although I have no opinion on its correctness). What I'd like to do is run a kernel plus initrd locally in OVMF and reproduce the issue - can I do that without all the syzkaller machinery?