Received: by 2002:ac0:da4c:0:0:0:0:0 with SMTP id a12csp1372061imi; Sat, 23 Jul 2022 04:00:59 -0700 (PDT) X-Google-Smtp-Source: AGRyM1ucMGzNvvsHWa3RAhncylsH1pCIw/Mi5aOGQgHbMympZevvTvB+k5lejSH8ch7cVxF1aVPX X-Received: by 2002:a17:907:a0c6:b0:72f:2293:bd04 with SMTP id hw6-20020a170907a0c600b0072f2293bd04mr3176196ejc.123.1658574058780; Sat, 23 Jul 2022 04:00:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658574058; cv=none; d=google.com; s=arc-20160816; b=PlI5l9lbv86mSWfND3FnwGPLv7LYJcYQsilvpNbTdXgdHbu+vPxGTXs4GMCENPXxMi SG6bk/AFqpP/C45wt0HaF+A86k3FYO/tqgGgrd+0GkwqvTj2gJwkySwbo+ZR1QUaKJH2 njzApDfGquvGuSO+M/aanBUP6Mx6RILC2spQ0r77xl1Xqy6cWP9zafpL3xaoLTLgQ2vH ZfZrn/gEVxQ4kMcGMnxYvouDKEBsfD4/3OFza8TFtZi9c8fW6hQSYX9gbcaCNHTbGDfe gzFWTPjL9lF+OJ6ptN/b671m5TVQSjXndHgC691wMFsk/omj/BmHI9eb8lCc3T5YEBr/ v5vA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:in-reply-to :subject:cc:to:from:message-id:date:dkim-signature:dkim-signature; bh=dlvbdgXo8fZoWYxYl9CDOkJfqtiXJ4xUtfPsj6ix8I4=; b=Iyi2MqXJj0AQ8NNpVqjsAVbh/tR18xvMlRWqqUCFggGRhi96Oa8D8vju1Appk9UqQc BBYshq8dszTNpq6o4zW3jaH6fkzyXhJC74QmJQT0b3ieqiihCaELht0hoMKiYZH6PIAQ Cz7CeXsMQwiV1ayJOe3EedGZuCLSNWLGcLHSiM31yFun/Vu2pKBA+5rnkfknPHTe+e+a EcrTmjtv4019iNNUXqYx7hbu0kdfb9Kmk+xHkcrBQPA9PNzG7Kt3Y3lUg/IMu7qaAjVN WzeS2ASYggjm1hD1Pv9qFF/apStIycw2oJp5bz+hsig/bmb9xMiHo/S4OxXxIm02CXke HFgw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=cE9nJx4A; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519 header.b=UWfRXGVo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ji17-20020a170907981100b007269e67e7ffsi9730301ejc.544.2022.07.23.04.00.32; Sat, 23 Jul 2022 04:00:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=cE9nJx4A; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519 header.b=UWfRXGVo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239639AbiGWK0g (ORCPT + 99 others); Sat, 23 Jul 2022 06:26:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39634 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239612AbiGWK0V (ORCPT ); Sat, 23 Jul 2022 06:26:21 -0400 Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6B3FE743C7 for ; Sat, 23 Jul 2022 03:17:01 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id 018B520D97; Sat, 23 Jul 2022 10:17:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1658571420; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=dlvbdgXo8fZoWYxYl9CDOkJfqtiXJ4xUtfPsj6ix8I4=; b=cE9nJx4AMAeGT6pQwExbaMuSNqt/yNiXS/ExAUEwLPhdIFjclpAt0in6hl/R0XD/im69+n HmbuZIWhUJVzIEEsqH0pNwR1XQtdnyeu6wwMgId4X0pmUK/qEsfHUs+0I9CRW9QSzO9Z9b PgKMA6xnZdYp+7UfSZA+iaNcs1zsrDo= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1658571420; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=dlvbdgXo8fZoWYxYl9CDOkJfqtiXJ4xUtfPsj6ix8I4=; b=UWfRXGVo4KAK3jap/jHHgTTUp2CDvNk4xYaB49KQj6eKXoQt5i6DLWq7KtTuoHDJ96SXYV 0WgpDqGbPTXGAeBA== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id AE0F013A92; Sat, 23 Jul 2022 10:16:59 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id YSOjKZvK22JROwAAMHmgww (envelope-from ); Sat, 23 Jul 2022 10:16:59 +0000 Date: Sat, 23 Jul 2022 12:16:59 +0200 Message-ID: <874jz82kx0.wl-tiwai@suse.de> From: Takashi Iwai To: Dipanjan Das Cc: Greg KH , perex@perex.cz, tiwai@suse.com, consult.awy@gmail.com, alsa-devel@alsa-project.org, linux-kernel@vger.kernel.org, syzkaller@googlegroups.com, fleischermarius@googlemail.com, its.priyanka.bose@gmail.com Subject: Re: KASAN: vmalloc-out-of-bounds Write in snd_pcm_hw_params In-Reply-To: References: User-Agent: Wanderlust/2.15.9 (Almost Unreal) Emacs/27.2 Mule/6.0 MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 23 Jul 2022 09:00:08 +0200, Greg KH wrote: > > On Fri, Jul 22, 2022 at 09:37:52AM -0700, Dipanjan Das wrote: > > Hi, > > > > We would like to report the following bug which has been found by our > > modified version of syzkaller. > > > > ====================================================== > > description: KASAN: vmalloc-out-of-bounds Write in snd_pcm_hw_params > > affected file: sound/core/pcm_native.c > > kernel version: 5.10.131 > > kernel commit: de62055f423f5dcb548f74cebd68f03c8903f73a > > git tree: upstream > > kernel config: https://syzkaller.appspot.com/x/.config?x=e49433cfed49b7d9 > > crash reproducer: attached > > ====================================================== > > Crash log: > > ====================================================== > > BUG: KASAN: vmalloc-out-of-bounds in memset include/linux/string.h:384 [inline] > > BUG: KASAN: vmalloc-out-of-bounds in snd_pcm_hw_params+0x19b0/0x1db0 > > sound/core/pcm_native.c:799 > > Write of size 2097152 at addr ffffc900113b2000 by task syz-executor.5/14437 > > > > CPU: 1 PID: 14437 Comm: syz-executor.5 Tainted: G OE 5.10.131+ #3 > > Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS > > 1.13.0-1ubuntu1.1 04/01/2014 > > Call Trace: > > __dump_stack lib/dump_stack.c:77 [inline] > > dump_stack+0x107/0x163 lib/dump_stack.c:118 > > print_address_description.constprop.0.cold+0x5/0x4f7 mm/kasan/report.c:385 > > __kasan_report mm/kasan/report.c:545 [inline] > > kasan_report.cold+0x1f/0x37 mm/kasan/report.c:562 > > check_memory_region_inline mm/kasan/generic.c:194 [inline] > > check_memory_region+0x187/0x1e0 mm/kasan/generic.c:200 > > memset+0x20/0x40 mm/kasan/common.c:85 > > memset include/linux/string.h:384 [inline] > > snd_pcm_hw_params+0x19b0/0x1db0 sound/core/pcm_native.c:799 > > snd_pcm_kernel_ioctl+0xd1/0x240 sound/core/pcm_native.c:3401 > > snd_pcm_oss_change_params_locked+0x17b6/0x3aa0 sound/core/oss/pcm_oss.c:965 > > snd_pcm_oss_change_params+0x76/0xd0 sound/core/oss/pcm_oss.c:1107 > > snd_pcm_oss_make_ready+0xb7/0x170 sound/core/oss/pcm_oss.c:1166 > > snd_pcm_oss_set_trigger.isra.0+0x34f/0x770 sound/core/oss/pcm_oss.c:2074 > > snd_pcm_oss_poll+0x679/0xb40 sound/core/oss/pcm_oss.c:2858 > > vfs_poll include/linux/poll.h:90 [inline] > > do_pollfd fs/select.c:872 [inline] > > do_poll fs/select.c:920 [inline] > > do_sys_poll+0x63c/0xe40 fs/select.c:1014 > > __do_sys_poll fs/select.c:1079 [inline] > > __se_sys_poll fs/select.c:1067 [inline] > > __x64_sys_poll+0x18c/0x490 fs/select.c:1067 > > do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 > > entry_SYSCALL_64_after_hwframe+0x44/0xa9 > > RIP: 0033:0x7f095de4f4ed > > Code: 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 > > 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d > > 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 > > RSP: 002b:00007f095bdffbe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000007 > > RAX: ffffffffffffffda RBX: 00007f095df6df60 RCX: 00007f095de4f4ed > > RDX: 0000000000000009 RSI: 0000000000000001 RDI: 00000000200000c0 > > RBP: 00007f095bdffc40 R08: 0000000000000000 R09: 0000000000000000 > > R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001d > > R13: 00007ffff286ceff R14: 00007f095df6df60 R15: 00007f095bdffd80 > > > > > > Memory state around the buggy address: > > ffffc900115b1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > > ffffc900115b1d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > > >ffffc900115b1e00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 > > ^ > > ffffc900115b1e80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 > > ffffc900115b1f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 > > ================================================================== > > Wondeful, do you have a fix for this that solves the reported problem > that you have tested with the reproducer? ... or at least more detailed information. The given log snippet alone doesn't help for further analysis, as it doesn't show which device / driver is involved. The code is the common helper and the condition for the trigger might be depending on the driver side. The full kernel log might show which driver (IIUC, it's /dev/adsp1) is in place. Last but not least, you should check whether it's specific to your 5.10.x kernel or it's also seen with the latest upstream, too. thanks, Takashi