Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp2316264ybk; Sun, 17 May 2020 17:28:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwJgqcn4OTiXI6DOY+ZCxxP151Fem5mvFkQbRdDOimOPdFWX+IDk1gX/USXlLJXrmvIa/87 X-Received: by 2002:a17:906:3944:: with SMTP id g4mr13355794eje.55.1589761694298; Sun, 17 May 2020 17:28:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589761694; cv=none; d=google.com; s=arc-20160816; b=YbWI1peyFy03KD3gBAp1xcO46gMVvj4DddAyhw77wybvli72kxn0zWX84bg+5SCRLg 7q4knMeN85BSFFXnlTNDoJsMfwxHaE9PZms4lBnjA1VrmWF/93rB0tUwpxavpEvuajQ1 ZJQzbjMfdi8geezvbWxvbNcRD19YtJUDnCeNir8jvgYmhKUnJ4R3cmQlGW32PHy0vzJZ jrqZGvHAHTEnZJMTerbC9C+PkN1Fj7Pmz3UUHMLOW51abKWbHDsZlBw54s/HQjThOFy9 6LREt5ZzjgFQLLShtOOs9Pk3uTJcy1DaCJk1wUecyk0n1STPTKRayPDnnJI5bYqeD/bO spQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:subject:from:message-id:cc:to; bh=/nhAKLpWIViNeloQwFEhx0v3Fdych+lExsSQRJ94dFY=; b=aOw1oCwbKu2l5SFUhoDztSf63LUToXA38Z0+v2ZQXlVL3tThObVQp8wZTKVsSkbKgE MTmf/8m2WqEmmz5MXlOV8jl7sgdL4KE/597e46yjKOBFygqmhijUuX1O8NxX2yFyHJ/Z AGSeOgauA0+BMtWQCe5J+WB+w/Fl9h4xVgsNx7llj7WOylw6j8PbZqN/PIVtpnOjcc4p D9oZ6bx60K9KrqjmuvZqtHcE+xObFUjFk6m40Hn2z/WXq43lYeEb6R0mtL73VFJsc876 gHfybFDIjIhIAAH7399fz4Cam8sKq27oH8i9X5HybO4p7/Hmyh6KqFKVHEEO/3wBbj7I LcJA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o18si5483590edi.508.2020.05.17.17.27.35; Sun, 17 May 2020 17:28:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726732AbgERAXh (ORCPT + 99 others); Sun, 17 May 2020 20:23:37 -0400 Received: from kvm5.telegraphics.com.au ([98.124.60.144]:48004 "EHLO kvm5.telegraphics.com.au" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726246AbgERAXh (ORCPT ); Sun, 17 May 2020 20:23:37 -0400 Received: by kvm5.telegraphics.com.au (Postfix, from userid 502) id 168F1283BD; Sun, 17 May 2020 20:23:35 -0400 (EDT) To: "David S. Miller" Cc: "Paul Mackerras" , "Jeremy Kerr" , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Message-Id: <769e9041942802d0e9ff272c12ee359a04b84a90.1589761211.git.fthain@telegraphics.com.au> From: Finn Thain Subject: [PATCH] net: bmac: Fix stack corruption panic in bmac_probe() Date: Mon, 18 May 2020 10:20:11 +1000 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This fixes an old bug recently revealed by CONFIG_STACKPROTECTOR. [ 25.707616] scsi host0: MESH [ 28.488852] eth0: BMAC at 00:05:02:07:5a:a6 [ 28.488859] [ 28.505397] Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: bmac_probe+0x540/0x618 [ 28.535152] CPU: 0 PID: 1 Comm: swapper Not tainted 5.6.13 #1 [ 28.552399] Call Trace: [ 28.559754] [e101dc88] [c0031fe4] panic+0x138/0x314 (unreliable) [ 28.577764] [e101dce8] [c0031c2c] print_tainted+0x0/0xcc [ 28.593711] [e101dcf8] [c03a6bf8] bmac_probe+0x540/0x618 [ 28.609667] [e101dd38] [c035e8a8] macio_device_probe+0x60/0x114 [ 28.627457] [e101dd58] [c033ec1c] really_probe+0x100/0x3a0 [ 28.643908] [e101dd88] [c033f098] driver_probe_device+0x68/0x410 [ 28.661948] [e101dda8] [c033f708] device_driver_attach+0xb4/0xe4 [ 28.679986] [e101ddc8] [c033f7a0] __driver_attach+0x68/0x10c [ 28.696978] [e101dde8] [c033c8c0] bus_for_each_dev+0x88/0xf0 [ 28.713973] [e101de18] [c033ded8] bus_add_driver+0x1c0/0x228 [ 28.730966] [e101de48] [c033ff48] driver_register+0x88/0x15c [ 28.747966] [e101de68] [c00044a0] do_one_initcall+0x7c/0x218 [ 28.764976] [e101ded8] [c0640480] kernel_init_freeable+0x168/0x230 [ 28.783512] [e101df18] [c000486c] kernel_init+0x14/0x104 [ 28.799473] [e101df38] [c0012234] ret_from_kernel_thread+0x14/0x1c [ 28.818031] Rebooting in 180 seconds.. The bmac_probe() stack frame was apparently corrupted by an array bounds overrun in bmac_get_station_address(). This patch is the simplest way to resolve the issue given possible side effects (?) from hardware accesses in bmac_get_station_address(). Cc: Paul Mackerras Cc: Jeremy Kerr Fixes: 1a2509c946bf ("[POWERPC] netdevices: Constify & voidify get_property()") Reported-and-tested-by: Stan Johnson Signed-off-by: Finn Thain --- This choice of 'Fixes' tag is (of course) debatable. Other possible choices might be 1da177e4c3f4 ("Linux-2.6.12-rc2"), c3ff2a5193fa ("powerpc/32: add stack protector support") and so on. --- drivers/net/ethernet/apple/bmac.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/apple/bmac.c b/drivers/net/ethernet/apple/bmac.c index a58185b1d8bf..4d9deed3409c 100644 --- a/drivers/net/ethernet/apple/bmac.c +++ b/drivers/net/ethernet/apple/bmac.c @@ -1239,7 +1239,7 @@ static int bmac_probe(struct macio_dev *mdev, const struct of_device_id *match) int j, rev, ret; struct bmac_data *bp; const unsigned char *prop_addr; - unsigned char addr[6]; + unsigned char addr[12]; struct net_device *dev; int is_bmac_plus = ((int)match->data) != 0; -- 2.26.2