* [syzbot] [wpan?] KMSAN: uninit-value in ieee802154_hdr_push (2)
@ 2024-01-02 13:42 syzbot
2024-02-13 14:13 ` [syzbot] " syzbot
` (3 more replies)
0 siblings, 4 replies; 5+ messages in thread
From: syzbot @ 2024-01-02 13:42 UTC (permalink / raw)
To: alex.aring, davem, edumazet, kuba, linux-kernel, linux-wpan,
miquel.raynal, netdev, pabeni, stefan, syzkaller-bugs
Hello,
syzbot found the following issue on:
HEAD commit: 610a9b8f49fb Linux 6.7-rc8
git tree: upstream
console+strace: https://syzkaller.appspot.com/x/log.txt?x=1419f31ae80000
kernel config: https://syzkaller.appspot.com/x/.config?x=e51fe20c3e51ba7f
dashboard link: https://syzkaller.appspot.com/bug?extid=60a66d44892b66b56545
compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=12551029e80000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=12595b95e80000
Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/28ecdd56de1e/disk-610a9b8f.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/3c5afc17c174/vmlinux-610a9b8f.xz
kernel image: https://storage.googleapis.com/syzbot-assets/96ff79b2992d/bzImage-610a9b8f.xz
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+60a66d44892b66b56545@syzkaller.appspotmail.com
=====================================================
BUG: KMSAN: uninit-value in ieee802154_hdr_push_sechdr net/ieee802154/header_ops.c:54 [inline]
BUG: KMSAN: uninit-value in ieee802154_hdr_push+0x971/0xb90 net/ieee802154/header_ops.c:108
ieee802154_hdr_push_sechdr net/ieee802154/header_ops.c:54 [inline]
ieee802154_hdr_push+0x971/0xb90 net/ieee802154/header_ops.c:108
ieee802154_header_create+0x9c0/0xc00 net/mac802154/iface.c:396
wpan_dev_hard_header include/net/cfg802154.h:494 [inline]
dgram_sendmsg+0xd1d/0x1500 net/ieee802154/socket.c:677
ieee802154_sock_sendmsg+0x91/0xc0 net/ieee802154/socket.c:96
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg net/socket.c:745 [inline]
____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
__sys_sendmsg net/socket.c:2667 [inline]
__do_sys_sendmsg net/socket.c:2676 [inline]
__se_sys_sendmsg net/socket.c:2674 [inline]
__x64_sys_sendmsg+0x307/0x490 net/socket.c:2674
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b
Local variable hdr created at:
ieee802154_header_create+0x4e/0xc00 net/mac802154/iface.c:360
wpan_dev_hard_header include/net/cfg802154.h:494 [inline]
dgram_sendmsg+0xd1d/0x1500 net/ieee802154/socket.c:677
CPU: 1 PID: 5009 Comm: syz-executor271 Not tainted 6.7.0-rc8-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
=====================================================
---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzkaller@googlegroups.com.
syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title
If you want syzbot to run the reproducer, reply with:
#syz test: git://repo/address.git branch-or-commit-hash
If you attach or paste a git patch, syzbot will apply it before testing.
If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)
If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report
If you want to undo deduplication, reply with:
#syz undup
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [syzbot] [syzbot] [wpan?] KMSAN: uninit-value in ieee802154_hdr_push (2)
2024-01-02 13:42 [syzbot] [wpan?] KMSAN: uninit-value in ieee802154_hdr_push (2) syzbot
@ 2024-02-13 14:13 ` syzbot
2024-02-13 14:17 ` syzbot
` (2 subsequent siblings)
3 siblings, 0 replies; 5+ messages in thread
From: syzbot @ 2024-02-13 14:13 UTC (permalink / raw)
To: linux-kernel
For archival purposes, forwarding an incoming command email to
linux-kernel@vger.kernel.org.
***
Subject: [syzbot] [wpan?] KMSAN: uninit-value in ieee802154_hdr_push (2)
Author: n.zhandarovich@fintech.ru
Check that issue is still active.
#syz test https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [syzbot] [syzbot] [wpan?] KMSAN: uninit-value in ieee802154_hdr_push (2)
2024-01-02 13:42 [syzbot] [wpan?] KMSAN: uninit-value in ieee802154_hdr_push (2) syzbot
2024-02-13 14:13 ` [syzbot] " syzbot
@ 2024-02-13 14:17 ` syzbot
2025-12-13 20:43 ` Forwarded: [PATCH] mac802154: test patch for security parameter handling syzbot
2025-12-13 22:05 ` Forwarded: [PATCH] mac802154: fix uninitialized security header fields syzbot
3 siblings, 0 replies; 5+ messages in thread
From: syzbot @ 2024-02-13 14:17 UTC (permalink / raw)
To: linux-kernel
For archival purposes, forwarding an incoming command email to
linux-kernel@vger.kernel.org.
***
Subject: [syzbot] [wpan?] KMSAN: uninit-value in ieee802154_hdr_push (2)
Author: n.zhandarovich@fintech.ru
If cb->secen_override == 0 but cb->secen == 1
mac802154_set_header_security() will not finish with error yet some
values in sec header will remain uninited. Fix the issue by only
checking cb->secen.
#syz test https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
---
net/mac802154/iface.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/net/mac802154/iface.c b/net/mac802154/iface.c
index c0e2da5072be..ad799d349625 100644
--- a/net/mac802154/iface.c
+++ b/net/mac802154/iface.c
@@ -328,7 +328,7 @@ static int mac802154_set_header_security(struct ieee802154_sub_if_data *sdata,
mac802154_llsec_get_params(&sdata->sec, ¶ms);
- if (!params.enabled && cb->secen_override && cb->secen)
+ if (!params.enabled && cb->secen)
return -EINVAL;
if (!params.enabled ||
(cb->secen_override && !cb->secen) ||
^ permalink raw reply related [flat|nested] 5+ messages in thread
* Forwarded: [PATCH] mac802154: test patch for security parameter handling
2024-01-02 13:42 [syzbot] [wpan?] KMSAN: uninit-value in ieee802154_hdr_push (2) syzbot
2024-02-13 14:13 ` [syzbot] " syzbot
2024-02-13 14:17 ` syzbot
@ 2025-12-13 20:43 ` syzbot
2025-12-13 22:05 ` Forwarded: [PATCH] mac802154: fix uninitialized security header fields syzbot
3 siblings, 0 replies; 5+ messages in thread
From: syzbot @ 2025-12-13 20:43 UTC (permalink / raw)
To: linux-kernel, syzkaller-bugs
For archival purposes, forwarding an incoming command email to
linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com.
***
Subject: [PATCH] mac802154: test patch for security parameter handling
Author: katharasasikumar007@gmail.com
Signed-off-by: Kathara Sasikumar <katharasasikumar007@gmail.com>
#syz test: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
---
net/mac802154/iface.c | 10 ++++++++--
1 file changed, 8 insertions(+), 2 deletions(-)
diff --git a/net/mac802154/iface.c b/net/mac802154/iface.c
index 9e4631fade90..48220e645e4f 100644
--- a/net/mac802154/iface.c
+++ b/net/mac802154/iface.c
@@ -328,8 +328,14 @@ static int mac802154_set_header_security(struct ieee802154_sub_if_data *sdata,
mac802154_llsec_get_params(&sdata->sec, ¶ms);
- if (!params.enabled && cb->secen_override && cb->secen)
- return -EINVAL;
+ if (!cb->secen_override) {
+ if (!params.enabled)
+ return 0;
+ } else {
+ if (cb->secen && !params.enabled)
+ return -EINVAL;
+ }
+
if (!params.enabled ||
(cb->secen_override && !cb->secen) ||
!params.out_level)
--
2.51.0
^ permalink raw reply related [flat|nested] 5+ messages in thread
* Forwarded: [PATCH] mac802154: fix uninitialized security header fields
2024-01-02 13:42 [syzbot] [wpan?] KMSAN: uninit-value in ieee802154_hdr_push (2) syzbot
` (2 preceding siblings ...)
2025-12-13 20:43 ` Forwarded: [PATCH] mac802154: test patch for security parameter handling syzbot
@ 2025-12-13 22:05 ` syzbot
3 siblings, 0 replies; 5+ messages in thread
From: syzbot @ 2025-12-13 22:05 UTC (permalink / raw)
To: linux-kernel, syzkaller-bugs
For archival purposes, forwarding an incoming command email to
linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com.
***
Subject: [PATCH] mac802154: fix uninitialized security header fields
Author: katharasasikumar007@gmail.com
Signed-off-by: Kathara Sasikumar <katharasasikumar007@gmail.com>
#syz test: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
---
net/mac802154/iface.c | 14 ++++++++++----
1 file changed, 10 insertions(+), 4 deletions(-)
diff --git a/net/mac802154/iface.c b/net/mac802154/iface.c
index 9e4631fade90..a1222c1b62b3 100644
--- a/net/mac802154/iface.c
+++ b/net/mac802154/iface.c
@@ -328,8 +328,14 @@ static int mac802154_set_header_security(struct ieee802154_sub_if_data *sdata,
mac802154_llsec_get_params(&sdata->sec, ¶ms);
- if (!params.enabled && cb->secen_override && cb->secen)
- return -EINVAL;
+ if (!cb->secen_override) {
+ if (!params.enabled)
+ return 0;
+ } else {
+ if (cb->secen && !params.enabled)
+ return -EINVAL;
+ }
+
if (!params.enabled ||
(cb->secen_override && !cb->secen) ||
!params.out_level)
@@ -366,7 +372,7 @@ static int ieee802154_header_create(struct sk_buff *skb,
if (!daddr)
return -EINVAL;
- memset(&hdr.fc, 0, sizeof(hdr.fc));
+ memset(&hdr, 0, sizeof(hdr));
hdr.fc.type = cb->type;
hdr.fc.security_enabled = cb->secen;
hdr.fc.ack_request = cb->ackreq;
@@ -432,7 +438,7 @@ static int mac802154_header_create(struct sk_buff *skb,
if (!daddr)
return -EINVAL;
- memset(&hdr.fc, 0, sizeof(hdr.fc));
+ memset(&hdr, 0, sizeof(hdr));
hdr.fc.type = IEEE802154_FC_TYPE_DATA;
hdr.fc.ack_request = wpan_dev->ackreq;
hdr.seq = atomic_inc_return(&dev->ieee802154_ptr->dsn) & 0xFF;
--
2.51.0
^ permalink raw reply related [flat|nested] 5+ messages in thread
end of thread, other threads:[~2025-12-13 22:05 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-01-02 13:42 [syzbot] [wpan?] KMSAN: uninit-value in ieee802154_hdr_push (2) syzbot
2024-02-13 14:13 ` [syzbot] " syzbot
2024-02-13 14:17 ` syzbot
2025-12-13 20:43 ` Forwarded: [PATCH] mac802154: test patch for security parameter handling syzbot
2025-12-13 22:05 ` Forwarded: [PATCH] mac802154: fix uninitialized security header fields syzbot
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox