From: Stephan Mueller <smueller@chronox.de>
To: Dmitry Vyukov <dvyukov@google.com>
Cc: "Theodore Y. Ts'o" <tytso@mit.edu>,
Matthew Wilcox <willy@infradead.org>,
Herbert Xu <herbert@gondor.apana.org.au>,
David Miller <davem@davemloft.net>,
linux-crypto@vger.kernel.org, Eric Biggers <ebiggers3@gmail.com>,
syzbot <syzbot+75397ee3df5c70164154@syzkaller.appspotmail.com>,
linux-fsdevel <linux-fsdevel@vger.kernel.org>,
LKML <linux-kernel@vger.kernel.org>,
syzkaller-bugs <syzkaller-bugs@googlegroups.com>,
Al Viro <viro@zeniv.linux.org.uk>
Subject: Re: [PATCH] crypto: DRBG - guard uninstantion by lock
Date: Tue, 10 Apr 2018 17:35:29 +0200 [thread overview]
Message-ID: <2704286.80iLvC0rRL@tauon.chronox.de> (raw)
In-Reply-To: <CACT4Y+Y+ydyBAL=j2QOWaBnpY8+Bsr_80d80RXth0SwuY0wMuQ@mail.gmail.com>
Am Dienstag, 10. April 2018, 17:23:46 CEST schrieb Dmitry Vyukov:
Hi Dmitry,
> Stephan,
>
> Do you have any hypothesis as to why this is not detected by KASAN and
> causes silent corruptions?
> We generally try to understand such cases and improve KASAN so that it
> catches such cases more reliably and they do not cause splashes of
> random crashes on syzbot.
I do not have any hypothesis at this point. I know that you induce some fault.
As you mentioned the drbg_kcapi_seed function, I was looking through the error
code paths to see whether some error handlers trip over each other. But all is
guesswork so far. And I am not even sure whether the bug is in the DRBG code
base.
Looking into the trace you sent, I see a NULL pointer dereference. At one
point there is also the drbg_init_hash_kernel that is called. But nowhere I
see any smoking gun.
Could you please give me a description of the fault you are inducing?
Ciao
Stephan
next prev parent reply other threads:[~2018-04-10 15:36 UTC|newest]
Thread overview: 24+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-04-06 13:24 WARNING in kmem_cache_free syzbot
2018-04-06 13:33 ` Dmitry Vyukov
2018-04-08 3:16 ` Use struct page for filename Matthew Wilcox
2018-04-08 4:42 ` Al Viro
2018-04-08 5:59 ` WARNING in kmem_cache_free Al Viro
2018-04-08 6:01 ` Matthew Wilcox
2018-04-08 10:26 ` Dmitry Vyukov
2018-04-08 11:18 ` Dmitry Vyukov
2018-04-08 15:31 ` Stephan Müller
2018-04-08 15:41 ` Dmitry Vyukov
2018-04-08 19:07 ` [PATCH] crypto: DRBG - guard uninstantion by lock Stephan Müller
2018-04-08 22:46 ` Theodore Y. Ts'o
2018-04-09 5:40 ` Stephan Mueller
2018-04-09 7:57 ` Dmitry Vyukov
2018-04-10 15:23 ` Dmitry Vyukov
2018-04-10 15:35 ` Stephan Mueller [this message]
2018-04-11 12:29 ` Dmitry Vyukov
2018-04-11 12:59 ` Stephan Mueller
2018-04-11 14:26 ` Stephan Müller
2018-04-11 14:31 ` [PATCH] crypto: drbg - set freed buffers to NULL Stephan Müller
2018-04-11 17:29 ` Eric Biggers
2018-04-12 6:40 ` Stephan Müller
2018-04-20 16:54 ` Herbert Xu
2018-04-11 17:09 ` [PATCH] crypto: DRBG - guard uninstantion by lock Dmitry Vyukov
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2704286.80iLvC0rRL@tauon.chronox.de \
--to=smueller@chronox.de \
--cc=davem@davemloft.net \
--cc=dvyukov@google.com \
--cc=ebiggers3@gmail.com \
--cc=herbert@gondor.apana.org.au \
--cc=linux-crypto@vger.kernel.org \
--cc=linux-fsdevel@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=syzbot+75397ee3df5c70164154@syzkaller.appspotmail.com \
--cc=syzkaller-bugs@googlegroups.com \
--cc=tytso@mit.edu \
--cc=viro@zeniv.linux.org.uk \
--cc=willy@infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).