[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <a47b250f-4008-321d-fca6-73f766115a8b@gmail.com>
Date: Tue, 14 Jun 2022 22:53:24 +0300
From: Pavel Skripkin <paskripkin@...il.com>
To: syzbot <syzbot+b17d3e853d5dce65f981@...kaller.appspotmail.com>,
linux-kernel@...r.kernel.org, syzkaller-bugs@...glegroups.com
Subject: Re: [syzbot] KASAN: stack-out-of-bounds Read in __show_regs
Hi Syzbot,
On 6/14/22 22:05, syzbot wrote:
> syzbot has found a reproducer for the following issue on:
>
> HEAD commit: 2f3064574275 README.md: ORC is no more a problem
> git tree: https://github.com/google/kmsan.git master
> console output: https://syzkaller.appspot.com/x/log.txt?x=169a2310080000
> kernel config: https://syzkaller.appspot.com/x/.config?x=8e6293529531e9ca
> dashboard link: https://syzkaller.appspot.com/bug?extid=b17d3e853d5dce65f981
> compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project.git 9ffb5944a699b6a0d69c169ceff97636395ee30f), GNU ld (GNU Binutils for Debian) 2.35.2
> syz repro: https://syzkaller.appspot.com/x/repro.syz?x=14917c2ff00000
> C reproducer: https://syzkaller.appspot.com/x/repro.c?x=1303752ff00000
>
> IMPORTANT: if you fix the issue, please add the following tag to the commit:
> Reported-by: syzbot+b17d3e853d5dce65f981@...kaller.appspotmail.com
>
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
> RIP: 0010:j1939_session_deactivate net/can/j1939/transport.c:1090 [inline]
> RIP: 0010:j1939_session_deactivate_activate_next+0x271/0x480 net/can/j1939/transport.c:1100
> Code: f4 e9 ed fd ff ff 8b 7d d4 e8 fb 31 13 f4 e9 24 fe ff ff 44 89 ff e8 ee 31 13 f4 41 83 fc 02 0f 83 68 fe ff ff e8 df 70 82 f3 <0f> 0b e9 61 fe ff ff 8b 7d d4 e8 d0 31 13 f4 e9 68 fe ff ff 44 89
> RSP: 0018:ffff888102e3f5c8 EFLAGS: 00010246
> =====================================================
> BUG: KMSAN: uninit-value in __show_regs+0xe6/0x1040 arch/x86/kernel/process_64.c:76
This bug looks unrelated to initial `stack-out-of-bounds Read in
__show_regs`
> __show_regs+0xe6/0x1040 arch/x86/kernel/process_64.c:76
> show_regs+0xc0/0x160 arch/x86/kernel/dumpstack.c:463
> __warn+0x3c2/0x730 kernel/panic.c:596
> report_bug+0x8eb/0xae0 lib/bug.c:199
> handle_bug+0x41/0x70 arch/x86/kernel/traps.c:315
> exc_invalid_op+0x1b/0x50 arch/x86/kernel/traps.c:335
> asm_exc_invalid_op+0x12/0x20
> j1939_session_deactivate_activate_next+0x271/0x480 net/can/j1939/transport.c:1100
> j1939_xtp_rx_abort_one+0x861/0x900 net/can/j1939/transport.c:1340
> j1939_xtp_rx_abort net/can/j1939/transport.c:1351 [inline]
> j1939_tp_cmd_recv net/can/j1939/transport.c:2100 [inline]
> j1939_tp_recv+0x1534/0x1cd0 net/can/j1939/transport.c:2133
> j1939_can_recv+0xed0/0x1070 net/can/j1939/main.c:108
> deliver net/can/af_can.c:574 [inline]
> can_rcv_filter+0x74b/0x1110 net/can/af_can.c:608
> can_receive+0x4fb/0x6d0 net/can/af_can.c:665
> can_rcv+0x1f0/0x490 net/can/af_can.c:696
> __netif_receive_skb_one_core net/core/dev.c:5405 [inline]
> __netif_receive_skb+0x1f1/0x640 net/core/dev.c:5519
> process_backlog+0x4e7/0xb50 net/core/dev.c:5847
> __napi_poll+0x14e/0xb80 net/core/dev.c:6413
> napi_poll net/core/dev.c:6480 [inline]
> net_rx_action+0x7e8/0x1830 net/core/dev.c:6567
> __do_softirq+0x206/0x809 kernel/softirq.c:558
> run_ksoftirqd+0x37/0x50 kernel/softirq.c:921
> smpboot_thread_fn+0x626/0xbf0 kernel/smpboot.c:164
> kthread+0x3c7/0x500 kernel/kthread.c:376
> ret_from_fork+0x1f/0x30
>
> Local variable mic created at:
> ieee80211_rx_h_michael_mic_verify+0x54/0x10f0 net/mac80211/wpa.c:100
> ieee80211_rx_handlers+0x2d31/0xf170 net/mac80211/rx.c:3929
>
Anyway, looks like missing error handling of michael_mic. `michael_mic`
may fail in a lot of cases and mic will be uninitialized in case of
michael_mic failure.
#syz test: https://github.com/google/kmsan.git master
With regards,
Pavel Skripkin
View attachment "ph" of type "text/plain" (569 bytes)
Download attachment "OpenPGP_signature" of type "application/pgp-signature" (841 bytes)
Powered by blists - more mailing lists