Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp816829rdg; Fri, 13 Oct 2023 01:50:03 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHWVNwB1kh7PqvpcmizQiT5hUFHWzdxYonsO6SKL9Hpzf9jdSB8qQvB3IwuS7u8TXAIZEEV X-Received: by 2002:a17:90b:3cc:b0:27d:67a:e8c0 with SMTP id go12-20020a17090b03cc00b0027d067ae8c0mr10210123pjb.22.1697187003001; Fri, 13 Oct 2023 01:50:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697187002; cv=none; d=google.com; s=arc-20160816; b=mXOjqbteUa3AXsz+VJrFfTT7gfPGFcFJwhhPQ0TORE5q53wTSS/v++2dr66zAJEUDe kuE5PvdWeIvh5vTKszSkWBromnauOpLaj7JQzDSpdytlQPXHhM8wU+tqoRuvpWGkxAeI wOLkqHaNr9s68gnn0x9avcWI3PIXqZo6BtXsptjQG4pS5aH2JY2IZXDSDpx4UakvYaxk hiwAqR3gDViJnSQYgn0svdA6m1m3EglaSH5tXXUoD5zu5MLIPDela0ZKZHWG59hegV3r vP0CjowvrpJwXBYT75byMcqt1omhw3wCLChd34zRoyvcOIEd3p8bnehZp2W4eLojnf8m lKcw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=CU0LErJzqATxZLP+6vyPSDU1wih017sQU115a6qdIo4=; fh=u4JhBSWjfuXXDiaCSA9anxonlSc16DZYL26So1PTTJw=; b=vj+Rf0YKZPq1dTVn6/IeOkT7kE3/pLpip4CaQn/b/KB9yN+flN4B8qhcLB2lLCsWD8 FuxgBlU7gJFSOmR70mGccO2vFecDrvCIyJsjuiIIGvH3OcyZyEPiX/JJJk/OU3VLAh3b 79ScnzuxMOWDtaNQ4B2seFjQOKTxLZJWBgW3O/rNkYw5JtIL/Hy1YTOmAp1zodpO8QG9 QRvxvM5KZ2KYo2RpL381OHQzLxK5pTEo3SqDfyVlOClKfyCftpC3SBMeeZOorfUH1X65 Syg0KMI2bk775H+AZb39io1GsasxLsGa8gJd9bGy0fxgylrh9GSVoUlPF6IjOZPPWTNu lpDw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [2620:137:e000::3:3]) by mx.google.com with ESMTPS id w24-20020a17090aea1800b00274a22e6364si4024609pjy.92.2023.10.13.01.50.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 13 Oct 2023 01:50:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) client-ip=2620:137:e000::3:3; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id BCC0182C2D0E; Fri, 13 Oct 2023 01:49:59 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230327AbjJMItv (ORCPT + 99 others); Fri, 13 Oct 2023 04:49:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47366 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230215AbjJMItr (ORCPT ); Fri, 13 Oct 2023 04:49:47 -0400 Received: from us-smtp-delivery-44.mimecast.com (us-smtp-delivery-44.mimecast.com [205.139.111.44]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5985EEA for ; Fri, 13 Oct 2023 01:49:42 -0700 (PDT) Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-388-sTSYr53zPc6DLKLlrA2nDg-1; Fri, 13 Oct 2023 04:49:37 -0400 X-MC-Unique: sTSYr53zPc6DLKLlrA2nDg-1 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.rdu2.redhat.com [10.11.54.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id D00F8185A7B3; Fri, 13 Oct 2023 08:49:36 +0000 (UTC) Received: from hog (unknown [10.45.224.17]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 21D5540C6F79; Fri, 13 Oct 2023 08:49:32 +0000 (UTC) Date: Fri, 13 Oct 2023 10:49:31 +0200 From: Sabrina Dubroca To: syzbot Cc: aviadye@mellanox.com, borisp@mellanox.com, bp@alien8.de, daniel@iogearbox.net, davem@davemloft.net, ebiggers@kernel.org, herbert@gondor.apana.org.au, hpa@zytor.com, john.fastabend@gmail.com, kuba@kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, liujian56@huawei.com, mingo@redhat.com, netdev@vger.kernel.org, pabeni@redhat.com, syzkaller-bugs@googlegroups.com, tglx@linutronix.de, vfedorenko@novek.ru, x86@kernel.org Subject: Re: [syzbot] [net] [crypto] general protection fault in scatterwalk_copychunks (4) Message-ID: References: <00000000000006e7be05bda1c084@google.com> <0000000000004b2b3d06078b94b0@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <0000000000004b2b3d06078b94b0@google.com> X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.2 X-Spam-Status: No, score=1.7 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SORTED_RECIPS,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Fri, 13 Oct 2023 01:49:59 -0700 (PDT) X-Spam-Level: * 2023-10-12, 14:25:30 -0700, syzbot wrote: > syzbot suspects this issue was fixed by commit: > > commit cfaa80c91f6f99b9342b6557f0f0e1143e434066 > Author: Liu Jian > Date: Sat Sep 9 08:14:34 2023 +0000 > > net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() > > bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=17338965680000 > start commit: bd6c11bc43c4 Merge tag 'net-next-6.6' of git://git.kernel... > git tree: net-next > kernel config: https://syzkaller.appspot.com/x/.config?x=634e05b4025da9da > dashboard link: https://syzkaller.appspot.com/bug?extid=66e3ea42c4b176748b9c > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=10160198680000 > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=15feabc0680000 Yes, looks like it. > If the result looks correct, please mark the issue as fixed by replying with: #syz fix: net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() -- Sabrina