From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 65498C433FE for ; Mon, 14 Nov 2022 00:06:04 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235595AbiKNAGC (ORCPT ); Sun, 13 Nov 2022 19:06:02 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54338 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235557AbiKNAFu (ORCPT ); Sun, 13 Nov 2022 19:05:50 -0500 Received: from mail-il1-f199.google.com (mail-il1-f199.google.com [209.85.166.199]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3A3D7FADC for ; Sun, 13 Nov 2022 16:05:48 -0800 (PST) Received: by mail-il1-f199.google.com with SMTP id 13-20020a056e0216cd00b003023e8b7d03so5371399ilx.7 for ; Sun, 13 Nov 2022 16:05:48 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:from:subject:message-id:date:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=Hr7wS+pJ69I44GVyM4s7OZmeFSZLRy9SbGypxd6p3yc=; b=79hSHpetSLDs0cFMijOmay1MmTdh9WgRvts7sAvZ1bc3BsD413d4LEFAEJf9L58MO1 HGrvhEuBoNjyCAhQxgbr1OaZEkERXbSmBfoLQctXAqyF0AA2IJFamoNsjBc7ryI6lJjX 8ttlsZ96dbeduNJPm0ELeY8gdbwdHJWxT/exy1sDDWAuGhflpJZmPiHAAL+w4Dkc9r9c qU1sLpfQV+SfGfU3wqd+xoOyEzJ5uYi3FSFRAuU9SEIQnCgBnD79JLwvmg2fujEOGfFs hJjX9ueRWt2MHlJT7w3kSfWtCJIUT9ArEBAskStcMRdlkeXXE8j5q5BIDLiHojFMYEwy Ck7A== X-Gm-Message-State: ANoB5plmZPXE5TtkDoTx0WZK2KS/fFkAeF1sItb9uq/SYczyEdrFM6Pl b4wR2exjtiZQ5tqh1aiYqzv8J/cJ4y1zm3e+WG8+cbuQvF8F X-Google-Smtp-Source: AA0mqf5VC9l3lM2/b6X13YxJm5HhrgqaLlkjHm6c7EWMi10KVjfiDZqlulrDwDoJf5kuOjvvN0x/YgAw31Bw5FzcNveKsOPP6o1v MIME-Version: 1.0 X-Received: by 2002:a6b:b4d2:0:b0:6dd:f70e:dda5 with SMTP id d201-20020a6bb4d2000000b006ddf70edda5mr2102788iof.100.1668384347517; Sun, 13 Nov 2022 16:05:47 -0800 (PST) Date: Sun, 13 Nov 2022 16:05:47 -0800 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <00000000000061fe2205ed6300fa@google.com> Subject: [syzbot] BUG: unable to handle kernel NULL pointer dereference in smack_inode_permission From: syzbot To: casey@schaufler-ca.com, jmorris@namei.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, netdev@vger.kernel.org, paul@paul-moore.com, richardcochran@gmail.com, serge@hallyn.com, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following issue on: HEAD commit: 56751c56c2a2 Merge branch 'for-next/fixes' into for-kernelci git tree: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci console output: https://syzkaller.appspot.com/x/log.txt?x=11fc8b0e880000 kernel config: https://syzkaller.appspot.com/x/.config?x=606e57fd25c5c6cc dashboard link: https://syzkaller.appspot.com/bug?extid=0f89bd13eaceccc0e126 compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2 userspace arch: arm64 syz repro: https://syzkaller.appspot.com/x/repro.syz?x=10a691fa880000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=1733c5b9880000 Downloadable assets: disk image: https://storage.googleapis.com/syzbot-assets/cf4668c75dea/disk-56751c56.raw.xz vmlinux: https://storage.googleapis.com/syzbot-assets/e1ef82e91ef7/vmlinux-56751c56.xz kernel image: https://storage.googleapis.com/syzbot-assets/3dabe076170f/Image-56751c56.gz.xz IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+0f89bd13eaceccc0e126@syzkaller.appspotmail.com Unable to handle kernel NULL pointer dereference at virtual address 0000000000000028 Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault Data abort info: ISV = 0, ISS = 0x00000004 CM = 0, WnR = 0 user pgtable: 4k pages, 48-bit VAs, pgdp=0000000109d98000 [0000000000000028] pgd=0000000000000000, p4d=0000000000000000 Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 2557 Comm: udevd Not tainted 6.1.0-rc4-syzkaller-31859-g56751c56c2a2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : smack_inode_permission+0x70/0x164 security/smack/smack_lsm.c:1149 lr : smack_inode_permission+0x68/0x164 security/smack/smack_lsm.c:1146 sp : ffff800016a53a30 x29: ffff800016a53a80 x28: fefefefefefefeff x27: ffff0000ca5c0025 x26: 0000000000000000 x25: 0000000000000000 x24: ffff0000ca5c0025 x23: 0000000000000000 x22: 0000000000000008 x21: 0000000000000001 x20: 0000000000000001 x19: ffff0000c70cf2d8 x18: 0000000000000000 x17: 0000000000000000 x16: ffff80000db1a158 x15: ffff0000c4f39a40 x14: 0000000000000090 x13: 00000000ffffffff x12: ffff0000c4f39a40 x11: ff8080000944189c x10: 0000000000000000 x9 : ffff0000c4f39a40 x8 : ffff80000944189c x7 : ffff8000086feb70 x6 : 0000000000000000 x5 : ffff0000c4f39a40 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000001 x1 : 0000000000000001 x0 : 0000000000000000 Call trace: smack_inode_permission+0x70/0x164 security_inode_permission+0x50/0xa4 security/security.c:1326 inode_permission+0xa0/0x244 fs/namei.c:533 may_lookup fs/namei.c:1715 [inline] link_path_walk+0x138/0x628 fs/namei.c:2262 path_lookupat+0x54/0x208 fs/namei.c:2473 filename_lookup+0xf8/0x264 fs/namei.c:2503 user_path_at_empty+0x5c/0x114 fs/namei.c:2876 do_readlinkat+0x84/0x1c8 fs/stat.c:468 __do_sys_readlinkat fs/stat.c:495 [inline] __se_sys_readlinkat fs/stat.c:492 [inline] __arm64_sys_readlinkat+0x28/0x3c fs/stat.c:492 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:584 Code: f90003ff 97b9817f 34000134 8b1602f6 (b94022d7) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: f90003ff str xzr, [sp] 4: 97b9817f bl 0xfffffffffee60600 8: 34000134 cbz w20, 0x2c c: 8b1602f6 add x22, x23, x22 * 10: b94022d7 ldr w23, [x22, #32] <-- trapping instruction --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. syzbot can test patches for this issue, for details see: https://goo.gl/tpsmEJ#testing-patches