INFO: trying to register non-static key in nl802154_dump_llsec_key

4 views
Skip to first unread message

syzbot

unread,
Apr 19, 2021, 8:39:20 AM4/19/21
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: cf256fbc Linux 4.14.231
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=1013a7b1d00000
kernel config: https://syzkaller.appspot.com/x/.config?x=403e68efdb1dcca6
dashboard link: https://syzkaller.appspot.com/bug?extid=b21a54729012e4a79dcd

Unfortunately, I don't have any reproducer for this issue yet.

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+b21a54...@syzkaller.appspotmail.com

batman_adv: batadv0: The MTU of interface vlan28 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
batman_adv: batadv0: Not using interface vlan28 (retrying later): interface not active
INFO: trying to register non-static key.
the code is fine but needs lockdep annotation.
turning off the locking correctness validator.
CPU: 1 PID: 6712 Comm: syz-executor.1 Not tainted 4.14.231-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x1b2/0x281 lib/dump_stack.c:58
register_lock_class+0x32b/0x1320 kernel/locking/lockdep.c:768
__lock_acquire+0x167/0x3f20 kernel/locking/lockdep.c:3378
lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998
__mutex_lock_common kernel/locking/mutex.c:756 [inline]
__mutex_lock+0xc4/0x1310 kernel/locking/mutex.c:893
rdev_lock_llsec_table net/ieee802154/rdev-ops.h:226 [inline]
nl802154_dump_llsec_key+0x13e/0xb70 net/ieee802154/nl802154.c:1524
genl_lock_dumpit+0x60/0x90 net/netlink/genetlink.c:481
netlink_dump+0x39c/0xad0 net/netlink/af_netlink.c:2203
__netlink_dump_start+0x4e2/0x740 net/netlink/af_netlink.c:2300
genl_family_rcv_msg+0x95c/0xb20 net/netlink/genetlink.c:549
genl_rcv_msg+0xaf/0x140 net/netlink/genetlink.c:625
netlink_rcv_skb+0x125/0x390 net/netlink/af_netlink.c:2433
genl_rcv+0x24/0x40 net/netlink/genetlink.c:636
netlink_unicast_kernel net/netlink/af_netlink.c:1287 [inline]
netlink_unicast+0x437/0x610 net/netlink/af_netlink.c:1313
netlink_sendmsg+0x62e/0xb80 net/netlink/af_netlink.c:1878
sock_sendmsg_nosec net/socket.c:646 [inline]
sock_sendmsg+0xb5/0x100 net/socket.c:656
___sys_sendmsg+0x6c8/0x800 net/socket.c:2062
__sys_sendmsg+0xa3/0x120 net/socket.c:2096
SYSC_sendmsg net/socket.c:2107 [inline]
SyS_sendmsg+0x27/0x40 net/socket.c:2103
do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x466459
RSP: 002b:00007fab1bddc188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
RDX: 00000000000cc000 RSI: 0000000020000140 RDI: 0000000000000004
RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60
R13: 00007ffd144f9ebf R14: 00007fab1bddc300 R15: 0000000000022000
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 1 PID: 6712 Comm: syz-executor.1 Not tainted 4.14.231-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff8880a2ac8240 task.stack: ffff8882328d0000
RIP: 0010:ieee802154_llsec_send_key_id+0x71/0x650 net/ieee802154/nl802154.c:691
RSP: 0018:ffff8882328d7498 EFLAGS: 00010202
RAX: 0000000000000002 RBX: 0000000000000010 RCX: ffffc90011d64000
RDX: 0000000000040000 RSI: ffffffff86db06fa RDI: ffff888045e01540
RBP: 1ffff1104651ae97 R08: 0000000000000000 R09: ffff88808fb16664
R10: ffff88808fb1665b R11: ffff8880a2ac8240 R12: ffff888045e01540
R13: dffffc0000000000 R14: 0000000000000000 R15: ffff88808fb16654
FS: 00007fab1bddc700(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fb5700ee020 CR3: 0000000220da6000 CR4: 00000000001426e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
nl802154_send_key net/ieee802154/nl802154.c:1474 [inline]
nl802154_dump_llsec_key+0x44a/0xb70 net/ieee802154/nl802154.c:1532
genl_lock_dumpit+0x60/0x90 net/netlink/genetlink.c:481
netlink_dump+0x39c/0xad0 net/netlink/af_netlink.c:2203
__netlink_dump_start+0x4e2/0x740 net/netlink/af_netlink.c:2300
genl_family_rcv_msg+0x95c/0xb20 net/netlink/genetlink.c:549
genl_rcv_msg+0xaf/0x140 net/netlink/genetlink.c:625
netlink_rcv_skb+0x125/0x390 net/netlink/af_netlink.c:2433
genl_rcv+0x24/0x40 net/netlink/genetlink.c:636
netlink_unicast_kernel net/netlink/af_netlink.c:1287 [inline]
netlink_unicast+0x437/0x610 net/netlink/af_netlink.c:1313
netlink_sendmsg+0x62e/0xb80 net/netlink/af_netlink.c:1878
sock_sendmsg_nosec net/socket.c:646 [inline]
sock_sendmsg+0xb5/0x100 net/socket.c:656
___sys_sendmsg+0x6c8/0x800 net/socket.c:2062
__sys_sendmsg+0xa3/0x120 net/socket.c:2096
SYSC_sendmsg net/socket.c:2107 [inline]
SyS_sendmsg+0x27/0x40 net/socket.c:2103
do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x466459
RSP: 002b:00007fab1bddc188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
RDX: 00000000000cc000 RSI: 0000000020000140 RDI: 0000000000000004
RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60
R13: 00007ffd144f9ebf R14: 00007fab1bddc300 R15: 0000000000022000
Code: 8d 44 2d 00 c7 00 f1 f1 f1 f1 c7 40 04 f1 f1 01 f2 c7 40 08 02 f2 04 f2 c7 40 0c 00 f3 f3 f3 e8 76 1e 7a fa 48 89 d8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 06 0f 8e 14 05 00 00 0f b6 03 4c 8d 74
RIP: ieee802154_llsec_send_key_id+0x71/0x650 net/ieee802154/nl802154.c:691 RSP: ffff8882328d7498
---[ end trace 74e366d26489827b ]---


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Aug 17, 2021, 8:39:13 AM8/17/21
to syzkaller...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages